<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2261 to 2275.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/news/livemint-december-27-2012-surabhi-agarwal-un-agrees-to-review-agencies-governing-internet"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/times-of-india-december-22-2012-kim-arora-no-fear-of-losing-internet-freedom-till-jan-15"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/state-surveillance-human-rights-camp-summary"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/times-of-india-december-29-2012-delhi-gang-rape"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/december-2012-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/indian-express-nishant-shah-december-29-2012-tomorrow-today"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/internet-driven-developments"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/bangalore-crypto-party"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/dna-bangalore-december-19-2012-the-it-act-is-fine-but-its-interpretation-is-not"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/state-surveillance-and-human-rights-camp"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/livemint-december-16-2012-surabhi-agarwal-govt-likely-to-issue-guidelines-to-clarify-it-rules-soon"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-hindu-opinion-lead-december-15-2012-chinmayi-arun-the-trouble-with-hurried-solutions"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/india-today-rahul-jayaram-december-18-2012-the-freedom-of-expression-debate"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/livemint-december-6-2012-surabhi-agarwal-ayodhya-trending-on-twitter-sparks-censorship-concerns"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/telegraphindia-december-3-2012-gs-mudur-66a-cut-and-paste-job"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/news/livemint-december-27-2012-surabhi-agarwal-un-agrees-to-review-agencies-governing-internet">
    <title>UN agrees to review agencies governing Internet</title>
    <link>https://cis-india.org/news/livemint-december-27-2012-surabhi-agarwal-un-agrees-to-review-agencies-governing-internet</link>
    <description>
        &lt;b&gt;Although India’s proposal has been criticized as an effort to control the Net, govt says this will ensure it has more say in policymaking.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article by Surabhi Agarwal was &lt;a class="external-link" href="http://www.livemint.com/Industry/noxrdKdOmZMnXGpXyGzXUO/UN-agrees-to-review-agencies-governing-Internet.html"&gt;published in Livemint on December 27, 2012&lt;/a&gt;. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In the fierce debate on who governs the Internet, the Indian government can claim a small victory of sorts after the UN decided to establish a working group to review the mandate of agencies administering the worldwide network of computers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India last year proposed creating an UN agency, dubbed the Committee on Internet-Related Policies (CIRP), that would decide on issues related to the Internet, including control of resources such as domain names and Internet Protocol (IP) addresses. The Internet Corporation for Assigned Names and Numbers (Icann), a non-governmental organization based in the US, currently administers these.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The US, the UK and Canada refused to sign a new communications treaty proposed at the 3-14 December Dubai conference of the International Telecommunications Union (ITU), which sets global telecom technical standards, on fears that it will give national governments greater control over the Internet and may restrict free speech. India, too, hasn’t signed the pact.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Even though the United Nations has not yet accepted India’s proposal for constituting CIRP, it (the formation of a working group) is a step forward, as now the working group on enhanced cooperation will deliberate on the need for CIRP,” a government official said, requesting anonymity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although India’s proposal has been criticized as an effort to control the Internet, the government has said this will ensure it has a greater say in Internet policymaking.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Commission on Science and Technology for Development, a UN body, has been asked to establish a working group on enhanced cooperation to examine the mandate of the World Summit on the Information Society, which issues non-binding guidelines on the Internet, “through seeking, compiling and reviewing inputs from all member states and all other stakeholders,” according to a 12 December letter from the UN to the Indian government. The working group has been asked to submit its report to the commission in 2014.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Mint &lt;/i&gt;has reviewed a copy of the letter and also India’s response to the UN welcoming the move.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UN’s move reflected India’s growing influence in multilateral policymaking bodies, according to &lt;a href="http://www.livemint.com/Search/Link/Keyword/Rajat%20Kathuria"&gt;Rajat Kathuria&lt;/a&gt;, chief executive and director of Indian Council for Research on International Economic Relations, a think tank.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“India’s increasing clout not only in the WTO (World Trade Organisation) but also in these kinds of forums is fairly obvious,” he said. The country should be able to stand its ground and use its negotiating powers well, he added. “Everybody is looking at India now and it should not be forced into getting into things it doesn’t want to.” Kathuria also agreed with India’s decision to consider in detail the new global telecom pact, which contains a resolution on the Internet, before signing it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We don’t have enough information on the impact of signing this treaty,” Kathuria said. “I agree with what India has done. We need to do our homework and understand clearly what it means.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although the treaty is restricted to telecom standards, it contained a non-binding resolution on the Internet. The treaty stated that its purview doesn’t include content over telecommunications networks or the Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, there have been divergent views on its implications. While some have argued that signing it would mean giving the ITU dominance over Internet governance, others dismiss it as harmless.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“This wasn’t an ITU takeover of the Internet and India’s signing of the treaty will not make it one,” said &lt;a href="http://www.livemint.com/Search/Link/Keyword/Pranesh%20Prakash"&gt;Pranesh Prakash&lt;/a&gt;, policy director at Centre for Internet Studies, a Bangalore-based think tank.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, India’s cautious approach is a good sign, he said. “I hope civil society is consulted before the decision is taken whether to support ITR (International Telecommunication Regulations) and the resolutions which were passed in Dubai.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Critical Internet resources such as domain names and IP addresses are like natural resources and no one country should monetize them or have control over them, said another government official.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It is of utmost importance for India to have a say in the matters of the Internet as the country has huge untapped potential in the area of Internet and technology,” said the official, who too declined to be named.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A white paper on Internet governance by Research and Information System for Developing Countries, chaired by &lt;a href="http://www.livemint.com/Search/Link/Keyword/Shyam%20Saran"&gt;Shyam Saran&lt;/a&gt;, former Indian diplomat, has said the Internet continues to be managed by private entities such as Icann “under contractual arrangements with the US government”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Icann is not controlled by the US government, an official of the Internet administrator said on condition of anonymity. It follows a multi-stakeholder model.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The paper on Internet governance argued against the allegation that India’s proposal of CIRP will lead to government’s control of the Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“India’s proposal for CIRP, a multilateral and multi-stakeholder mechanism, is not intended to control content,” it said. “It does not insist that the governments have the last word in regulating the Internet.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The paper had argued that India should pursue the establishment of a working group on enhanced cooperation, which will pave the way for further consideration of India’s proposal for the establishment of CIRP.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/livemint-december-27-2012-surabhi-agarwal-un-agrees-to-review-agencies-governing-internet'&gt;https://cis-india.org/news/livemint-december-27-2012-surabhi-agarwal-un-agrees-to-review-agencies-governing-internet&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ITU</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-12-31T02:40:20Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/times-of-india-december-22-2012-kim-arora-no-fear-of-losing-internet-freedom-till-jan-15">
    <title>No fear of losing internet freedom till Jan 15: Experts</title>
    <link>https://cis-india.org/news/times-of-india-december-22-2012-kim-arora-no-fear-of-losing-internet-freedom-till-jan-15</link>
    <description>
        &lt;b&gt;There is no need to get scared about losing internet freedom, at least till January 2015.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article by Kim Arora was &lt;a class="external-link" href="http://timesofindia.indiatimes.com/business/india-business/No-fear-of-losing-internet-freedom-till-Jan-15-Experts/articleshow/17711837.cms"&gt;published in the Times of India&lt;/a&gt; on December 22, 2012. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;That's the view of top telecom policy watchers, who closely monitored the World Conference on International Telecommunications (WCIT) of the &lt;a href="http://timesofindia.indiatimes.com/topic/International-Telecommunication-Union"&gt;International Telecommunication Union&lt;/a&gt; (ITU) that ended in uncertainty earlier this month in Dubai.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Policy experts say the changes affecting internet users in India, if any, would be slow and minor with little or no changes existing laws and governments largely retaining their current control. The resolutions are not binding and member-states are free to opt out of it. India is yet to ratify the treaty that lays out a broad framework on international co-operation over telecommunication resources.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ITR (International Telecom Regulations), decided by the &lt;a href="http://timesofindia.indiatimes.com/topic/International-Telecommunication-Union"&gt;ITU&lt;/a&gt; were last updated in 1988 when the internet, as we know it today, did not exist. And the hullabaloo was caused by the proliferation of internet in the intervening years had created a lot of complications and misgiving among nation states. The &lt;a href="http://timesofindia.indiatimes.com/topic/Dubai"&gt;Dubai&lt;/a&gt; conference also included alarmed internet evangelists who feared that the meeting would result in UN control of the internet. But with the US, the UK and several other countries vehemently refusing to sign on the dotted line, most decisions have been withheld till January 2015 when the treaty is expected to be ratified.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/times-of-india-december-22-2012-kim-arora-no-fear-of-losing-internet-freedom-till-jan-15'&gt;https://cis-india.org/news/times-of-india-december-22-2012-kim-arora-no-fear-of-losing-internet-freedom-till-jan-15&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ITU</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-12-31T02:20:31Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/state-surveillance-human-rights-camp-summary">
    <title>State Surveillance and Human Rights Camp: Summary</title>
    <link>https://cis-india.org/internet-governance/blog/state-surveillance-human-rights-camp-summary</link>
    <description>
        &lt;b&gt;On December 13 and 14, 2012, the Electronic Frontier Foundation organized the Surveillance and Human Rights Camp held in Rio de Janeiro, Brazil. The meeting examined trends in surveillance, reasons for state surveillance, surveillance tactics that governments are using, and safeguards that can be put in place to protect against unlawful or disproportionate surveillance.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/i&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The camp also examined different types of data, understanding tools that governments can use to access data, and looked at examples of surveillance measures in different contexts. The camp was divided into plenary sessions and individual participatory workshops, and brought together activists, researchers, and experts from all over the world. Experiences from multiple countries were shared, with an emphasis on the experience of surveillance in Latin America. Among other things, this blog summarizes my understanding of the discussions that took place.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The camp also served as a platform for collaboration on the &lt;i&gt;Draft International Principles on Communications Surveillance and Human Rights&lt;/i&gt;. These principles seek to set an international standard for safeguards to the surveillance of communications that recognizes and upholds human rights, and provide guidance for legislative changes related to communications and communications meta data to ensure that the use of modern communications technology does not violate individual privacy.  The principles were first drafted in October 2012 in Brussels, and are still in draft form. A global consultation is taking place to bring in feedback and perspective on the principles.&lt;/p&gt;
&lt;p&gt;The draft principles were institutionalized for a number of reasons including:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Currently there are no principles      or international best standards specifically prescribing necessary and      important safeguards to surveillance of communication data. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Practices around surveillance of      communications by governments and the technology used by governments is      rapidly changing, while legislation and safeguards protecting individual      communications from illegal or disproportionate surveillance are staying      the same, and thus rapidly becoming outdated. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;New legislation that allows      surveillance through access to communication data that is being proposed      often attempts to give sweeping powers to law enforcement for access to      data across multiple jurisdictions, and mandates extensive cooperation and      assistance from the private sector including extensive data retention      policies, back doors, and built in monitoring capabilities.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Surveillance of communications is      often carried out with few safeguards in place including limited transparency      to the public, and limited forms of appeal or redress for the individual. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;This has placed the individual in a vulnerable position as opaque surveillance of communications is carried out by governments across the world — the abuse of which is unclear. The principles try to address these challenges by establishing standards and safeguards which should be upheld and incorporated into legislation and practices allowing the surveillance of communications.&lt;/p&gt;
&lt;p&gt;A summary of the draft principles is below. As the principles are still a working draft, the most up to date version of the principles can be accessed &lt;a class="external-link" href="http://necessaryandproportionate.net/"&gt;here&lt;/a&gt;&lt;a href="http://necessaryandproportionate.net/"&gt;.&lt;/a&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Summary of the Draft International Principles on Communications Surveillance and Human Rights&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Legality&lt;/b&gt;: Any surveillance of communications undertaken by the government must be codified by statute. &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Legitimate Purpose&lt;/b&gt;: Laws should only allow surveillance of communications for legitimate purposes.&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Necessity&lt;/b&gt;: Laws allowing surveillance of communications should limit such measures to what is demonstrably necessary.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Adequacy&lt;/b&gt;: Surveillance of communications should only be undertaken to the extent that is adequate for fulfilling legitimate and necessary purposes. &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Competent Authority&lt;/b&gt;: Any authorization for surveillance of communications must be made by a competent and independent authority. &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Proportionality&lt;/b&gt;: All measures of surveillance of communications must be specific and proportionate to what is necessary to achieve a specific purpose. &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Due process&lt;/b&gt;: Governments undertaking surveillance of communications must respect and guarantee an individual’s human rights. Any interference with an individual's human rights must be authorized by a law in force.&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;User notification&lt;/b&gt;: Governments undertaking surveillance of communications must allow service providers to notify individuals of any legal access that takes place related to their personal information. &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Transparency about use of government surveillance&lt;/b&gt;: The governments ability to survey communications and the process for surveillance should be transparent to the public. &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Oversight&lt;/b&gt;: Governments must establish an independent oversight mechanism to ensure transparency and accountability of lawful surveillance measures carried out on communications. &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Integrity of communications and systems&lt;/b&gt;: In order to enable service providers to secure communications securely, governments cannot require service providers to build in surveillance or monitoring capabilities.&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Safeguards for international cooperation&lt;/b&gt;: When governments work with other governments across borders to fight crime, the higher/highest standard should apply. &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Safeguards against illegitimate access&lt;/b&gt;: Governments should provide sufficient penalties to dissuade against unwarranted surveillance of communications.  &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Cost of surveillance&lt;/b&gt;: The financial cost of the surveillance on communications should be borne by the government undertaking the surveillance.&lt;/p&gt;
&lt;h3&gt;Types of Data&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The conversations during the camp reviewed a number of practices related to surveillance of communications, and emphasized the importance of establishing the draft principles. Setting the background to various surveillance measures that can be carried out by the government, the different categories of communication data that can be easily accessed by governments and law enforcement were discussed. For example, law enforcement frequently accesses information such as IP address, account name and number, telephone number, transactional records, and location data.  This data can be understood as 'non-content' data or communication data, and in many jurisdictions can easily be accessed by law enforcement/governments, as the requirements for accessing communication data are lower than the requirements for accessing the actual content of communications. For example, in the United States a court order is not needed to access communication data whereas a judicial order is needed to access the content of communications.&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Similarly, in the UK law enforcement can access communication data with authorization from a senior police officer.&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was discussed how it is concerning that communication data can be accessed easily, as it provides a plethora of facts about an individual. Given the sensitivity of communication data and the ability for personal information to be derived from the data, the ease that law enforcement is accessing the data, and the unawareness of the individual about the access- places the privacy of users at risk.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Ways of Accessing Data&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Ways in which governments and law enforcement access information and associated challenges was discussed, both in terms of the legislation that allows for access and the technology that is used for access.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Access and Technology&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In this discussion it was pointed out that in traditional forms of accessing data governments are no longer effective for a number of reasons. For example, in many cases communications and transactions, etc., that take place on the internet are encrypted. The ubiquitous use of encryption means more protection for the individual in everyday use of the internet, but serves as an obstacle to law enforcement and governments, as the content of a message is even more difficult to access. Thus, law enforcement and governments are using technologies like commercial surveillance software, targeted hacking, and malware to survey individuals. The software is sold off the shelf at trade shows by commercial software companies to law enforcement and governments. Though the software has been developed to be a useful tool for governments, it was found that in some cases it has been abused by authoritarian regimes. For example in 2012, it was found that  FinSpy, a computer espionage software made by the British company Gamma Group was being used to target political dissidents by the Government of Bahrain. FinSpy has the ability to capture computer screen shots, record Skype chats, turn on computer cameras and microphones, and log keystrokes.&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In order to intercept communications or block access to sites, governments and ISPs also  rely on the use of deep packet inspection (DPI).&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; Deep packet inspection is a tool traditionally used by internet service providers for effective management of the network. DPI allows for ISP's to monitor and filter data flowing through the network by inspecting the header of a packet of data and the content of the packet.&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; With this information it is possible to read the actual content of packets, and identify the program or service being used.&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;DPI can be used for the detection of viruses, spam, unfair use of bandwidth, and copyright enforcement.  At the same time, DPI can allow for the possibility of unauthorized data mining and real time interception to take place, and can be used to block internet traffic whether it is encrypted or not.&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Governmental requirements for deep packet inspection can in some cases be found in legislation and policy. In other cases it is not clear if it is mandatory for ISP's to provide DPI capabilities, thus the use of DPI by governments is often an opaque area. Recently, the ITU has sought to define an international standard for deep packet inspection known as the "Y.2770" standard. The standard proposes a technical interoperable protocol for deep packet inspection systems, which would be applicable to "application identification, flow identification, and inspected traffic types".&lt;a href="#fn8" name="fr8"&gt;[8]&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Access and Legislation&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The discussions also examined similarities across legislation and policy which allows governments legal access to data. It was pointed out that legislation providing access to different types of data is increasingly becoming outdated, and is unable to distinguish between communications data and personal data. Thus, relevant legislation is often based on inaccurate and outdated assumptions about what information would be useful and what types of safeguards are necessary. For example, it was discussed how US surveillance law has traditionally established safeguards based on assumptions like: surveillance of data on a personal computer is more invasive than access to data stored in the cloud, real-time surveillance is more invasive than access to stored data, surveillance of newer communications is more invasive than surveillance of older communications, etc. These assumptions are no longer valid as information stored in the cloud, surveillance of older communications, and surveillance of stored data can be more invasive than access to newer communications, etc. It was also discussed that increasingly relevant legislation also contains provisions that have generic access standards, unclear authorization processes, and provide broad circumstances in which communication data and content can be accessed. The discussion also examined how governments are beginning to put in place mandatory and extensive data retention plans as tools of surveillance. These data retention mandates highlight the changing role of internet intermediaries including the fact that they are no longer independent from political pressure, and no longer have the ability to easily protect clients from unauthorized surveillance.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. EFF. Mandatory Data Retention: United States. Available at: &lt;a class="external-link" href="https://www.eff.org/issues/mandatory-data-retention/us"&gt;https://www.eff.org/issues/mandatory-data-retention/us&lt;/a&gt;&lt;br /&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;].Espiner, T. Communications Data Bill: Need to Know. ZDNet. June 18th 2012. &lt;a class="external-link" href="http://www.zdnet.com/communications-data-bill-need-to-know-3040155406/"&gt;http://www.zdnet.com/communications-data-bill-need-to-know-3040155406/&lt;/a&gt;&lt;br /&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. Perlroth, M. Software Meant to Fight Crime is Used to Spy on Dissidents. The New York Times. August 30th 2012. Available at: &lt;a class="external-link" href="http://www.nytimes.com/2012/08/31/technology/finspy-software-is-tracking-political-dissidents.html?_r=0"&gt;http://www.nytimes.com/2012/08/31/technology/finspy-software-is-tracking-political-dissidents.html?_r=0&lt;/a&gt;&lt;br /&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. Wawro, A. What is Deep Packet Inspection?. PCWorld. February 1st 2012. Available at: &lt;a class="external-link" href="http://www.pcworld.com/article/249137/what_is_deep_packet_inspection_.html"&gt;http://www.pcworld.com/article/249137/what_is_deep_packet_inspection_.html&lt;/a&gt;&lt;br /&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. Geere, D. How deep packet inspection works. Wired. April 27th 2012. Available at: &lt;a class="external-link" href="http://www.wired.co.uk/news/archive/2012-04/27/how-deep-packet-inspection-works"&gt;http://www.wired.co.uk/news/archive/2012-04/27/how-deep-packet-inspection-works&lt;/a&gt;&lt;br /&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. Kassner. M. Deep Packet Inspection: What You Need to Know. Tech Republic. July 27th 2008. Available at: &lt;a class="external-link" href="http://www.techrepublic.com/blog/networking/deep-packet-inspection-what-you-need-to-know/609"&gt;http://www.techrepublic.com/blog/networking/deep-packet-inspection-what-you-need-to-know/609&lt;/a&gt;&lt;br /&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. Anonyproz. How to Bypass Deep Packet Inspection Devices or ISPs Blocking Open VPN Traffic. Available at: &lt;a class="external-link" href="http://www.anonyproz.com/supportsuite/index.php?_m=knowledgebase&amp;amp;amp;_a=viewarticle&amp;amp;amp;kbarticleid=138"&gt;http://www.anonyproz.com/supportsuite/index.php?_m=knowledgebase&amp;amp;_a=viewarticle&amp;amp;kbarticleid=138&lt;/a&gt;&lt;br /&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;].Chirgwin. R. Revealed: ITU's deep packet snooping standard leaks online: Boring tech doc or Internet eating monster. The Register. December 6th 2012. Available at: &lt;a class="external-link" href="http://www.theregister.co.uk/2012/12/06/dpi_standard_leaked/"&gt;http://www.theregister.co.uk/2012/12/06/dpi_standard_leaked/&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/state-surveillance-human-rights-camp-summary'&gt;https://cis-india.org/internet-governance/blog/state-surveillance-human-rights-camp-summary&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>SAFEGUARDS</dc:subject>
    

   <dc:date>2013-07-12T16:02:51Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/times-of-india-december-29-2012-delhi-gang-rape">
    <title>Delhi gang rape: What Facebook, Twitter expose about govt</title>
    <link>https://cis-india.org/news/times-of-india-december-29-2012-delhi-gang-rape</link>
    <description>
        &lt;b&gt;When constable Subhash Tomar collapsed during the anti-rape agitation in New Delhi, the government was keen to say he suffered injuries inflicted by the protesters. But the administration's version of events was challenged soon on social media, and the mainstream media latched onto the mystery and started pressurising the government to come clean.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://timesofindia.indiatimes.com/tech/social-media/Delhi-gang-rape-What-Facebook-Twitter-expose-about-govt/articleshow/17806247.cms"&gt;published in the Times of India&lt;/a&gt; on December 29, 2012. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="advenueINTEXT"&gt;The Tomar episode, when  &lt;a href="http://timesofindia.indiatimes.com/topic/social-media"&gt;social media&lt;/a&gt; set the agenda and put the government on the back foot, is one more  example of rise of people's power online. The political class in India  has been shaken by the speed and efficiency with which the recent  protests were coordinated. Some of them, like Abhijit Mukherjee, have  ended up putting their foot in their mouth while others like Congress'  youth icon and heir apparent Rahul Gandhi have not even cared to react. &lt;br /&gt;&lt;br /&gt; The reason for Tomar's death is still unclear, but the post-mortem report has attributed it to external injuries. &lt;br /&gt;&lt;br /&gt; "Frankly, right now, we haven't figured out how to deal with this phenomenon," said Congress Party Spokesman Sandeep Dikshit. &lt;br /&gt;&lt;br /&gt; The anti-corruption movement of Anna Hazare, the Occupy Wall Street  movement in the US, and the Arab Spring were all largely organised  through  &lt;a href="http://timesofindia.indiatimes.com/topic/social-networking-sites"&gt;social networking sites&lt;/a&gt;.  Even in neighbouring Pakistan, the raid that killed al-Qaeda chief  Osama bin Laden was first reported on microblogging site Twitter,  further highlighting social media's growing importance as a source of  information. Such is the influence and impact of social media that many  are increasingly referring to it as the "fifth pillar of democracy".&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;Influence bound to grow&lt;span id="advenueINTEXT"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="advenueINTEXT"&gt;India has over 120 million internet users - Twitter has about 16 million and  &lt;a href="http://timesofindia.indiatimes.com/topic/Facebook"&gt;Facebook&lt;/a&gt; over 60 million - but this is still just one-tenth of the population.&lt;/span&gt;&lt;span id="advenueINTEXT"&gt; &lt;/span&gt;&lt;span id="advenueINTEXT"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="advenueINTEXT"&gt;Also, as 3G penetration increases, data becomes accessible on more  feature phones. While about 221 million mobiles were sold in India in  2012, sales are expected to touch 251 million units in 2013, according  to technology market researcher Gartner. With so much of growth still  left to come, the influence of social media is only bound to grow. &lt;br /&gt;&lt;br /&gt; Minister of State for Human Resource Development Shashi Tharoor, one of  the early converts to social media and inveterate tweeter, said the  social media space is a "parallel universe to the mainstream media" and  that stories on these platforms have a "resonance of their own". &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="advenueINTEXT"&gt;"It is a medium that allows big issues to be made out of issues that  mainstream media ignores but politicians cannot," he said. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="advenueINTEXT"&gt;Brand guru Harish Bijoor is of the view that the political class must  pay attention to the information revolution as India is a very young  country in terms of demographics. "The political class appears a  gerontocracy while 54% of the population is below 25 and 70% below 35.  There is a disconnect that must be addressed." &lt;br /&gt;&lt;br /&gt; Kedar Gavane,  director at Internet analytics company ComScore India, said an average  Indian Facebook user has about 300 friends. "That's the kind of reach an  individual and his messages have on social networks," he said. "Twitter  has helped us identify the common man's feelings. For instance, when a  candlelight protest is organised, you get to know what the protesters  are thinking." &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="advenueINTEXT"&gt;But the real question, he said, is whether people  are actually willing to go beyond these platforms. "Whether it can  become the Fifth Estate or not is hard to say because at the end of the  day, this is just a channel for communication." &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="advenueINTEXT"&gt;With the government  struggling for a credible response to the growing influence of social  media, it has often resorted to blocking user accounts and web pages.  The government, which blocked 663 webpages in 2012, asked Indian  Internet service providers to block 16 Twitter accounts, including those  of right-wing leaders and journalists. &lt;br /&gt;&lt;br /&gt; In the first half of  2012, the government made 2,319 requests for information on 3,467 user  accounts of search engine giant Google.  &lt;a href="http://timesofindia.indiatimes.com/topic/Google"&gt;Google&lt;/a&gt; complied with 64% of these. &lt;br /&gt;&lt;br /&gt; While the influence of social media is not lost on those such as  Dikshit, he said the problem is "how to break in with an alternative  view". "It is like a community of people who think the same way and  validate each others' opinions. The number of people who validate your  opinion does not make it the right opinion, but that fine distinction is  getting lost somewhere." &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="advenueINTEXT"&gt;There are others who feel  the role of social media in protests is often exaggerated. "The agency  for change resides first in people and only secondarily in platforms,"  according to Pranesh Prakash, policy director at the Centre for Internet  and Society.&lt;/span&gt;&lt;b&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;(With inputs from Joji Thomas Philip in New Delhi)&lt;/b&gt; &lt;span id="storyendpath"&gt;&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/times-of-india-december-29-2012-delhi-gang-rape'&gt;https://cis-india.org/news/times-of-india-december-29-2012-delhi-gang-rape&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-12-31T01:02:44Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/december-2012-bulletin">
    <title>December 2012 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/december-2012-bulletin</link>
    <description>
        &lt;b&gt;We at the Centre for Internet &amp; Society wish you all a great year ahead. In the December 2012 newsletter, we bring you the draft early chapters of our “National Resource Kit” project for persons with disabilities (covering four southern states); and accessibility-related comments on the Twelfth Five Year Plan; the draft research on pervasive technologies and access to knowledge that we presented at the Global Congress on Intellectual Property and the Public Interest in Brazil; our comments on the privacy implications of including RFID tags in the proposed Rule 138A of the Motor Vehicle Rules, a report on the open access lectures delivered by Prof. Leslie Chan during his tour of India, reports of Wikipedia-related workshops conducted across three cities, and news and media coverage.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;b&gt;Jobs&lt;/b&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;CIS is seeking applications for the posts of &lt;a href="https://cis-india.org/jobs/programme-officer-indian-initiatives"&gt;Programme Officer&lt;/a&gt; (Access to Knowledge — Indic Language Initiatives), &lt;a href="https://cis-india.org/jobs/vacancy-for-developer"&gt;Developer&lt;/a&gt; (NVDA Project), &lt;a href="https://cis-india.org/about/jobs/research-manager"&gt;Research Manager&lt;/a&gt; (Digital Humanities project), and &lt;a href="https://cis-india.org/jobs/programme-officer-access-to-knowledge-and-openness"&gt;Policy&lt;/a&gt; Associate (Access to Knowledge and Openness) and Policy Associate (Internet Governance). To apply send your resume to &lt;a href="mailto:sunil@cis-india.org"&gt;sunil@cis-india.org&lt;/a&gt; and &lt;a href="mailto:pranesh@cis-india.org"&gt;pranesh@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/accessibility"&gt;Accessibility&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;India has an estimated 70 million disabled persons who are unable to read printed materials due to some form of physical, sensory, cognitive or other disability. The disabled need accessible content, devices and interfaces facilitated via copyright law and electronic accessibility policies:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;National Resource Kit for Persons with Disabilities&lt;/b&gt;&lt;br /&gt;CIS received a grant of INR 54,83,200 from the Hans Foundation for Creating a National Kit of Laws, Policies and Programs for Persons with Disabilities on August 16, 2012. Anandhi Vishwanathan from CIS and Shruti Ramakrishnan from the Centre for Law and Policy Research are the researchers presently working for this project. Early draft chapters have been published. Feedback and comments are invited from the readers:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/accessibility/blog/national-resource-kit-tamil-nadu-chapter-call-for-comments"&gt;The Tamil Nadu Chapter&lt;/a&gt; (by Shruti Ramakrishnan, December 30, 2012).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/accessibility/blog/national-resource-kit-karnataka-chapter"&gt;The Karnataka Chapter&lt;/a&gt; (by Shruti Ramakrishnan, December 30, 2012).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/accessibility/blog/national-resource-kerala-chapter-call-for-comments"&gt;The Kerala Chapter&lt;/a&gt; (by Anandi Vishwanathan, December 31, 2012).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/accessibility/blog/national-resource-kit-andhra-pradesh-call-for-comments"&gt;The Andhra Chapter&lt;/a&gt; (by Anandi Vishwanathan, December 31, 2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Feedback&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/accessibility/blog/feedback-on-draft-twelfth-five-year-plan"&gt;Comments and Feedback on the Draft Twelfth Five Year Plan with respect to Persons with Disabilities&lt;/a&gt; (by Rahul Cherian, December 28, 2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Media Coverage&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/ip-watch-catherine-saez-december-18-2012-wipo-to-negotiate-treaty-for-the-blind-in-june"&gt;WIPO To Negotiate Treaty For The Blind In June; ‘Still Some Distance To Travel’&lt;/a&gt; (by Catherine Saez, Intellectual Property Watch, December 18, 2012).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/times-of-india-city-mumbai-madhavi-rajadhyaksha-december-20-2012-disability-groups-in-india-welcome-progress-on-treaty-for-blind-persons"&gt;Disability groups in India welcome progress on treaty for blind persons&lt;/a&gt; (by Madhavi Rajadhyaksha, December 20, 2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Blog Entry&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/accessibility/blog/wipo-to-convene-conference-to-finalise-tvi-next-year"&gt;WIPO to Convene a Diplomatic Conference in Morocco to Finalise TVI&lt;/a&gt; (by Rahul Cherian, December 24, 2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/about/a2k"&gt;Access to Knowledge&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Access to Knowledge programme addresses the harms caused to consumers, developing countries, human rights, and creativity/innovation from excessive regimes of copyright, patents, and other such monopolistic rights over knowledge:&lt;/p&gt;
&lt;h3&gt;Event Organised&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/a2k/global-congress-on-ip"&gt;2012 Global Congress on Intellectual Property and the Public Interest&lt;/a&gt; (FGV Law School, Rio de Janeiro, December 15 – 17, 2012). The Second Global Congress on Intellectual Property and the Public Interest was organized by Fundação Getulio Vargas, American University Washington College of Law, Columbia University, Open AIR, and ICSTD. Sunil Abraham and Pranesh Prakash participated in the event. Pranesh was one of the moderators in the Roundtable Discussion on Priority Policy Forums, Research and Analysis Needs and Commitments.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Research for the Global Congress&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;For the 2012 Global Congress on Intellectual Property and Public Interest event, CIS conducted research. Jadine Lannon (based on research by Annapoornima and Rohan George and with help from Yogesh Kumar did research on documentation of phones and their patent, Amba Kak did research on copyright and mobile licensing, Vikrant Vasudev conducted research on patent pools and valuation methods, Hans Varghese Mathews did research on mathematical models of patent pools and Nehaa Chaudhuri did research on analysis of 3Gand 4G patent pools.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/about/newsletters/openness"&gt;Openness&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The 'Openness' programme critically examines alternatives to existing regimes of intellectual property rights, and transparency and accountability. Under this programme, we study Open Government Data, Open Access to Scholarly Literature, Open Access to Law, Open Content, Open Standards, and Free/Libre/Open Source Software:&lt;/p&gt;
&lt;h3&gt;Event Report&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/openness/blog/random-hacks-of-kindness-december-2012-report"&gt;Random Hacks of Kindness Global December 2012 — A Report&lt;/a&gt; (by Yogesh Londhe, December 10, 2012). Event was hosted at CIS office in Bangalore. CIS, Amnesty International India Office, Greenpeace India Office, HasGeek, Yahoo Research &amp;amp; Development and SimpleTechLife sponsored the event held in CIS office in Bangalore on December 1 and 2, 2012.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Events Participated&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;‘&lt;a href="https://cis-india.org/news/i-and-n-partners-meeting-rio"&gt;Information &amp;amp; Networks’ Partners’ Meeting&lt;/a&gt; (organised by International Development Research Centre, Canada in Rio de Janeiro, December 11 – 12, 2013). Sunil Abraham spoke in session on Open Business and IP.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/leslie-chan-gives-five-talks-in-india"&gt;Open Access Champion Leslie Chan Delivers Five Talks in India&lt;/a&gt; (Department of Library &amp;amp; Information Science, University of Kerala, National Institute of Interdisciplinary Science &amp;amp; Technology, CSIR, Indian Institute of Information Technology and Management – Kerala, Manasa Media Centre, Mysore University Library and SDM Institute for Management Development, December 17 – 20, 2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;a href="https://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;Access to Knowledge&lt;/a&gt; (Wikipedia Project)&lt;/b&gt;&lt;br /&gt;Beginning from September 1, 2012, Wikimedia Foundation has &lt;a href="https://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;awarded&lt;/a&gt; CIS a two-year grant of INR 26,000,000 to support and develop free knowledge in India. The &lt;a href="http://meta.wikimedia.org/wiki/Access_To_Knowledge/Team" title="Access To Knowledge/Team"&gt;A2K team&lt;/a&gt; consists of three members based in Delhi: &lt;a href="https://cis-india.org/about/newsletters/people/our-team"&gt;Nitika Tandon&lt;/a&gt;, &lt;a href="https://cis-india.org/about/newsletters/people/our-team"&gt;Subhashish Panigrahi&lt;/a&gt; and &lt;a href="https://cis-india.org/about/newsletters/people/our-team"&gt;Noopur Raval&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;Events Organised&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/wikipedia-workshop-at-nmait"&gt;Wikipedia Workshop at NMAIT&lt;/a&gt; (NMAIT, Karkala Taluk, December 21, 2012, co-organised in association with Metawings Institute).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/wikipedia-workshop-at-srm-chennai"&gt;Wikipedia Workshop at SRM&lt;/a&gt; (SRM University, Chennai, December 17, 2012, co-organised in association with Metawings Institute).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/marathi-wiki-workshop-at-tiss"&gt;Marathi Wiki Workshop at TISS&lt;/a&gt; (Tata Institute of Social Sciences, Mumbai, December 8, 2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Blog Entries&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/non-unicode-iscii-text-can-be-converted-to-unicode"&gt;Non Unicode ISCII Text Can be Converted to Unicode Now!&lt;/a&gt; (by Subhashish Panigrahi, December 19, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/new-avenues"&gt;New Avenues: Media Wiki Groups&lt;/a&gt; (by Noopur Raval, December 28, 2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;News / Media Coverage&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/report-of-odia-wikipedia-workshop-in-iit-kharagpur"&gt;A Report of Odia Wikipedia Workshop at IIT, Kharagpur&lt;/a&gt; (Samaja, Odia daily, Kolkata edition, December 3, 2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Videos&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/events/wikipedia-state-of-tech-talk-by-erik-moeller"&gt;Wikipedia: State of Tech — A Talk by Erik Moeller&lt;/a&gt; (CIS, Bangalore, November 12, 2012). Erik Moeller, Vice President of Engineering and Product Development at the Wikimedia Foundation gave a talk.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/events/art-in-the-open-source-age"&gt;Art in the Open Source Age — A Talk by Gene Kogan&lt;/a&gt; (CIS, Bangalore, November 30, 2012). Gene Kogan, a programmer and digital artist gave a talk.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;HasGeek&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;HasGeek creates discussion spaces for geeks and has organised conferences like the &lt;a href="http://fifthelephant.in/2012/"&gt;Fifth Elephant&lt;/a&gt;, &lt;a href="http://droidcon.in/2011"&gt;Droidcon India 2011&lt;/a&gt;, &lt;a href="http://androidcamp.hasgeek.com/"&gt;Android Camp&lt;/a&gt;, etc. HasGeek is supported by CIS and works out from CIS office in Bengaluru.&lt;/p&gt;
&lt;h3&gt;Upcoming Event&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://metarefresh.in/2013/"&gt;Meta Refresh&lt;/a&gt; (MLR Convention Centre, JP Nagar, Bangalore, February 22 and 23, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/about/internet-governance"&gt;Internet Governance&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Internet Governance programme conducts research around the various social, technical, and political underpinnings of global and national Internet governance, and includes online privacy, freedom of speech, and Internet governance mechanisms and processes:&lt;/p&gt;
&lt;h3&gt;Analysis of Central Motor Vehicle Rules&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/comments-on-motor-vehicle-rules"&gt;Comments on the Proposed Rule 138A of the Central Motor Vehicle Rules, 1989&lt;/a&gt; Concerning Radio Frequency Identification Tags (by Bhairav Acharya, December 3, 2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h3&gt;Columns/Op-eds&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/economic-times-december-2-2012-sunil-abraham-online-censorship"&gt;Online Censorship: How Government should Approach Regulation of Speech&lt;/a&gt; (by Sunil Abraham, Economic Times, December 5, 2012).&lt;/li&gt;
&lt;li&gt;The Worldwide Web of Concerns (by Pranesh Prakash, &lt;a href="https://cis-india.org/internet-governance/blog/deccan-chronicle-pranesh-prakash-december-10-2012-the-worldwide-web-of-concerns"&gt;Deccan Chronicle&lt;/a&gt;, and &lt;a href="https://cis-india.org/internet-governance/blog/asian-age-column-december-10-2012-pranesh-prakash-the-worldwide-web-of-concerns"&gt;Asian Age&lt;/a&gt;, December 10, 2012).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/the-hindu-opinion-lead-december-15-2012-chinmayi-arun-the-trouble-with-hurried-solutions"&gt;The Trouble with Hurried Solutions&lt;/a&gt; (by Chinmayi Arun, The Hindu, December 15, 2012).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indian-express-nishant-shah-december-29-2012-tomorrow-today"&gt;Tomorrow, Today&lt;/a&gt; (Nishant Shah, The Indian Express, December 29, 2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Event Organised&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/events/meeting-of-network-of-internet-and-society-centers"&gt;Meeting of the Network of Internet &amp;amp; Society Centers&lt;/a&gt; (organised by Berkman Center for Internet &amp;amp; Society, Alexander von Humboldt Institute for Internet &amp;amp; Society, Center for Technology &amp;amp; Society, KEIO University SFC, the MIT Media Lab, the MIT Center for Civic Media, NEXA Center for Internet &amp;amp; Society and CIS, Cambridge, Massachusetts, December 6 – 8, 2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Upcoming Events&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/events/dml-conference-2013"&gt;DML Conference 2013&lt;/a&gt; (Sheraton Chicago Hotel &amp;amp; Towers - Chicago, Illinois, March 14 – 16, 2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Events Participated&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/second-international-e-governance-conference-at-baghdad"&gt;Second International e-Governance Conference&lt;/a&gt; (organized by the National Committee for Corporate Governance Electronic Iraq and the United Nations Development Programme, Rashid Hotel, Baghdad, December 2, 2012). Sunil Abraham presented on "Review of the Legal Environment in Iraq for Effective e-Governance".&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/seminar-artist-talks-outresourcing-with-the-transmediale-collective"&gt;Seminar/Artist Talks : "Outresourcing" with the Transmediale Collective&lt;/a&gt; (organised by the Berlin - Transmediale new media collective, December 3, 2012, Bangalore). Sharath Chandra Ram presented a White Paper. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;World Conference on International Telecommunications (organised by ITU, December 3 – 14). Chinmayi Arun participated as a civil society representative.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/internet-driven-developments"&gt;Internet Driven Developments: Structural Changes and Tipping Points&lt;/a&gt; (organised by Berkman Center for Internet &amp;amp; Society, Cambridge, Massachusetts at Harvard University, December 6 – 8, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.eihr.ee/en/annualconference/conference-2012/program/"&gt;Annual Conference on Human Rights 2012&lt;/a&gt; (organised by Estonian Institute of Human Rights and Google). Malavika Jayaram participated as a panelist.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/state-surveillance-and-human-rights-camp"&gt;State Surveillance and Human Rights Camp&lt;/a&gt; (Sheraton Rio Hotel &amp;amp; Resort, Rio, Brazil, December 13 and 14, 2012). Elonnai Hickok made a presentation on MLATS and International Cooperation for Law Enforcement Purposes.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.youtube.com/watch?v=VC9G_tbxI9Y"&gt;Economic Impact of Internet in India&lt;/a&gt; (organised by Aspen Institute India, December 21, 2012). Chinmayi Arun attended this event.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Blog Entries&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/transcripts-of-wcit-2012"&gt;Transcripts from WCIT-12&lt;/a&gt; (by Snehashish Ghosh, December 3, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/section-66-a-information-technology-act-2000-cases"&gt;Section 66-A, Information Technology Act, 2000: Cases&lt;/a&gt; (by Snehashish Ghosh, December 3, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/internet-driven-developments"&gt;Internet-driven Developments — Structural Changes and Tipping Points&lt;/a&gt; (by Elonnai Hickok, December 28, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/state-surveillance-human-rights-camp-summary"&gt;State Surveillance and Human Rights Camp: Summary&lt;/a&gt; (by Elonnai Hickok, December 31, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/mining-the-web-collective"&gt;Mining the Web Collective&lt;/a&gt; (by Sharath Chandra Ram, December 31, 2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Video&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/events/technology-culture-and-events-in-south-east-asia"&gt;Technology Culture and Events in South East Asia — A Presentation by Preetam Rai&lt;/a&gt; (CIS, Bangalore, December 18, 2012). Preetam Rai gave a lecture.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Media Coverage&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/telegraphindia-december-3-2012-gs-mudur-66a-cut-and-paste-job"&gt;66A ‘cut &amp;amp; paste job’&lt;/a&gt; (by GS Mudur, Telegraph, December 3, 2012). Pranesh Prakash and Snehashish Ghosh are quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/livemint-december-6-2012-surabhi-agarwal-ayodhya-trending-on-twitter-sparks-censorship-concerns"&gt;Ayodhya trending on Twitter sparks censorship concerns&lt;/a&gt; (by Surabhi Agarwal, December 6, 2012). Sunil Abraham is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/the-hindu-sci-tech-internet-december-10-2012-vasudha-venugopal-debate-on-section-66a"&gt;Debate on Section 66A rages on&lt;/a&gt; (Vasudha Venugopal, The Hindu, December 10, 2012). Pranesh Prakash is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/times-of-india-india-times-december-13-2012-kim-arora-hacktivists-deface-bsnl-website"&gt;Hacktivists deface BSNL website&lt;/a&gt; (by Kim Arora, The Times of India, December 13, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/livemint-december-16-2012-surabhi-agarwal-govt-likely-to-issue-guidelines-to-clarify-it-rules-soon"&gt;Govt likely to issue guidelines to clarify IT rules soon&lt;/a&gt; (by Surabhi Agarwal, LiveMint, December 16, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/india-today-rahul-jayaram-december-18-2012-the-freedom-of-expression-debate"&gt;The freedom of expression debate: The State must mend fences with The Web&lt;/a&gt; (by Rahul Jayaram, India Today, December 18, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/dna-bangalore-december-19-2012-the-it-act-is-fine-but-its-interpretation-is-not"&gt;‘The IT Act is fine, but its interpretation is not’&lt;/a&gt; (DNA, December 19, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/times-of-india-december-22-2012-kim-arora-no-fear-of-losing-internet-freedom-till-jan-15"&gt;No fear of losing internet freedom till Jan 15: Experts&lt;/a&gt; (by Kim Arora, The Times of India, December 22, 2012). Pranesh Prakash is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/livemint-december-27-2012-surabhi-agarwal-un-agrees-to-review-agencies-governing-internet"&gt;UN agrees to review agencies governing Internet&lt;/a&gt; (by Surabhi Agarwal, LiveMint, December 27, 2012). Pranesh Prakash is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/times-of-india-december-29-2012-delhi-gang-rape"&gt;Delhi gang rape: What Facebook, Twitter expose about govt&lt;/a&gt; (The Times of India, December 31, 2012). Pranesh Prakash is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/the-hindu-december-31-2012-op-ed-a-note-of-dissent-on-cash-transfers-and-uid"&gt;A note of dissent on cash transfers and UID&lt;/a&gt; (The Hindu, December 31, 2012). Sunil Abraham was one of the signatories.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/times-of-india-december-31-2012-javed-anwer-and-rukmini-shrinivasan-the-year-social-media-came-of-age-in-india"&gt;The year social media came of age in India&lt;/a&gt; (by Javed Anwer and Rukmini Shrinivasan, The Times of India, December 31, 2012). Sunil Abraham is quoted.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/about/telecom"&gt;Telecom&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;While the potential for growth and returns exist for telecommunications in India, a range of issues need to be addressed. One aspect is more extensive rural coverage and the other is a countrywide access to broadband which is low. Both require effective and efficient use of networks and resources, including spectrum:&lt;/p&gt;
&lt;h3&gt;Newspaper Column&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/telecom/blog/organizing-india-blogspot-shyam-ponappa-december-11-2012-inflation-control-through-structural-reforms"&gt;Inflation Control Through Structural Reforms&lt;/a&gt; (by Shyam Ponappa, Business Standard, December 11, 2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;a href="https://cis-india.org/about/telecom/telecom-knowledge-repository/knowledge-and-capacity-around-telecom-policy"&gt;Building Knowledge and Capacity around Telecommunication Policy in India&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;Ford Foundation has given a grant of USD 2,00,000 to CIS to build expertise in the area of telecommunications in India. The knowledge repository deals with these modules: Introduction to Telecommunications, Telecommunications Infrastructure and Technologies, Government of India Regulatory Framework for Telecom, Telecommunication and the Market, Universal Access and Accessibility, The International Telecommunications Union and other international bodies, Broadcasting, Emerging Topics and Way Forward. Dr. Surendra Pal, Satya N Gupta, Paranjoy Guha Thakurta, Payal Malik, Dr. Rakesh Mehrotra and Dr. Nadeem Akhtar are the expert reviewers.&lt;/p&gt;
&lt;p&gt;The following are the new outputs:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/telecom/telecom-knowledge-repository/licensing-framework-for-telecom"&gt;Licensing Framework for Telecom: A Historical Overview&lt;/a&gt; (by Snehashish Ghosh, December 31, 2012).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/telecom/telecom-knowledge-repository/market-structure-in-telecom-industry"&gt;Market Structure in the Telecom Industry&lt;/a&gt; (by Snehashish Ghosh, December 31, 2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/about/digital-natives"&gt;Digital Natives&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Digital Natives with a Cause? examines the changing landscape of social change and political participation in light of the role that young people play through digital and Internet technologies, in emerging information societies. Consolidating knowledge from Asia, Africa and Latin America, it builds a global network of knowledge partners who critically engage with discourse on youth, technology and social change, and look at alternative practices and ideas in the Global South:&lt;/p&gt;
&lt;h3&gt;Book Review&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/digital-natives/blog/indian-express-december-8-2012-nishant-shah-not-just-fancy-television"&gt;Not Just Fancy Television&lt;/a&gt; (by Nishant Shah, Indian Express, December 8, 2012): Nishant Shah reviews Ben Hammersley's book "64 Things You Need to Know for Then: How to Face the Digital Future Without Fear ", published by Hodder &amp;amp; Stoughton.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Media Coverage&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/cnn-december-8-2012-oliver-joy-what-does-it-mean-to-be-a-digital-native"&gt;What does it mean to be a digital native?&lt;/a&gt; (by Oliver Joy, CNN, December 8, 2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="http://cis-india.org/about/newsletters/"&gt;About CIS&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;CIS was registered as a society in Bangalore in 2008. As an independent, non-profit research organisation, it runs different policy research programmes such as Accessibility, Access to Knowledge, Openness, Internet Governance, and Telecom. The policy research programmes have resulted in outputs such as the &lt;a href="https://cis-india.org/about/advocacy/accessibility/blog/e-accessibility-handbook"&gt;e-Accessibility Policy Handbook for Persons with Disabilities&lt;/a&gt; with ITU and G3ict, and &lt;a href="https://cis-india.org/about/digital-natives/front-page/blog/dnbook"&gt;Digital Alternatives with a Cause?&lt;/a&gt;, &lt;a href="https://cis-india.org/about/digital-natives/front-page/blog/position-papers"&gt;Thinkathon Position Papers&lt;/a&gt; and the &lt;a href="https://cis-india.org/about/digital-natives/front-page/blog/digital-natives-with-a-cause-a-report"&gt;Digital Natives with a Cause? Report&lt;/a&gt; with Hivos, etc. We conducted policy research for the Ministry of Communications &amp;amp; Information Technology, Ministry of Human Resource Development, Ministry of Personnel, Public Grievances and Pensions, Ministry of Social Justice and Empowerment, etc., on &lt;a href="https://cis-india.org/about/a2k/blog/cis-analysis-july2011-treaty-print-disabilities"&gt;WIPO Treaties&lt;/a&gt;, &lt;a href="https://cis-india.org/about/a2k/blog/analysis-copyright-amendment-bill-2012"&gt;Copyright Bill&lt;/a&gt;, &lt;a href="https://cis-india.org/about/internet-governance/front-page/blog/cis-feedback-to-nia-bill"&gt;NIA Bill&lt;/a&gt;, etc. CIS is accredited as an observer at WIPO, and has given policy briefs to delegations from various countries, our Programme Manager, Nirmita Narasimhan won the &lt;a href="https://cis-india.org/about/accessibility/blog/national-award"&gt;National Award for Empowerment of Persons with Disabilities&lt;/a&gt; from the Government of India and also received the &lt;a href="https://cis-india.org/about/news/nirmita-nivh-award"&gt;NIVH Excellence Award&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Follow us elsewhere&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Get short, timely messages from us on &lt;a href="https://twitter.com/cis_india"&gt;Twitter&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Join the CIS group on &lt;a href="http://www.facebook.com/groups/28535315687/"&gt;Facebook&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Visit us at &lt;a href="https://cis-india.org/"&gt;http://cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Support Us&lt;/b&gt;&lt;br /&gt;Please help us defend consumer / citizen rights on the Internet! Write a cheque in favour of ‘The Centre for Internet and Society’ and mail it to us at No. 194, 2nd ‘C’ Cross, Domlur, 2nd Stage, Bengaluru – 5600 71.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Request for Collaboration&lt;/b&gt;&lt;br /&gt;We invite researchers, practitioners, and theoreticians, both organisationally and as individuals, to collaboratively engage with Internet and society and improve our understanding of this new field. To discuss the research collaborations, write to Sunil Abraham, Executive Director, at &lt;a href="mailto:sunil@cis-india.org"&gt;sunil@cis-india.org&lt;/a&gt; or Nishant Shah, Director – Research, at &lt;a href="mailto:nishant@cis-india.org"&gt;nishant@cis-india.org&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;CIS is grateful to its donors, Wikimedia Foundation, Ford Foundation, Privacy International, UK, Hans Foundation and the Kusuma Trust which was founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin, for its core funding and support for most of its projects.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/december-2012-bulletin'&gt;https://cis-india.org/about/newsletters/december-2012-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2013-01-16T05:15:27Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/indian-express-nishant-shah-december-29-2012-tomorrow-today">
    <title>Tomorrow, Today</title>
    <link>https://cis-india.org/internet-governance/blog/indian-express-nishant-shah-december-29-2012-tomorrow-today</link>
    <description>
        &lt;b&gt;Our present is the future that our past had imagined. Around the same time last year, I remember taking stock of the technologies that we live with and wondering what 2012 would bring in.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Nishant Shah's end of the year column was &lt;a class="external-link" href="http://www.indianexpress.com/news/tomorrow-today/1051325/0"&gt;published in the Indian Express &lt;/a&gt;on December 29, 2012.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;And I find myself in a similar frame of mind, celebrating with joy the  promises that were kept, reflecting sombrely on the opportunities we  missed, and speculating about what the new year is going to bring in for  the future of digital and internet technologies, and how they are going  to change the ways in which we understand what it means to be human, to  be social, and to be the political architects of our lives.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We all know that dramatic change is rare. Nothing transforms overnight,  and a lot of what we can look forward to in the next year, is going to  be contingent on how we have lived in this one. And yet, the rapid pace  at which digital technologies change and morph, and the ways in which  they produce new networked conditions of living, make it worthwhile to  speculate on what are the top five things to look out for in 2013, when  it comes to the internet and how it is going to affect our techno-social  lives.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Head in the Cloud&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;If the last year was the year of the mobile, as more and more smartphones started penetrating societies, providing new conditions of portable and easy computing, making ‘app’ the word of the year, then the next year definitely promises to be the year of the cloud. As internet broadband and mobile data access become affordable, increasingly we are going to see services that no longer require personal computing power. All you will need is a screen and a Wi-Fi connection and everything else will happen in the cloud. No more hard drives, no more storage, no more disconnectivity, and data in the cloud.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;More Talk&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;One of the biggest problems with the internet has been that it has been extremely text heavy. We often forget that the text is still a matter of privilege as questions of illiteracy and translation still hound a large section of the global population. However, with the new protocols of access, availability of 4G spectrum and the release of IPV6 as the new standard, we can expect faster voice and video-based communication at almost zero costs. It might be soon time to say goodbye to the SMS.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Big Data&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;You think you are suffering from information overload now? Wait for the next year as mobile and internet penetration are estimated to rise by 30 per cent around the world! This is going to be the year of Big Data — data so big that it can no longer be fathomed or understood by human beings. We will be dependent on machines to read it, process it, and show us patterns and trends because we are now at a point in our information societies where we are producing data faster than we can process it. Our governments, markets and societies are going to have to produce new ways of governing these data landscapes, leading to dramatic changes in notions of privacy, property and safety.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;No Next Big Thing&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;If you haven’t noticed it, the pace of dramatic innovation has slowed down in the last few years and it will slow down even more. We have been riding the wave of the next big thing, in the last few years, constantly in search of new gadgets, platforms and ways of networking. However, the coming year is going to make innovation granular. It will be a year where things become better, and innovation happens behind the scene. So if you thought this was the year that Facebook will finally become obsolete and something else will take over, you might want to reconsider deleting your account, and start looking at the changes that shall happen behind the scenes, for better or for worse.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Return of the Human&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The rise of the social network has distracted us from looking at the human conditions. We have been so engaged in understanding friendship in the time of Facebook, analysing relationships, networked existences and our own performance as actors of information, that we haven’t given much thought to what it means to be human in our rapidly digitising worlds. And yet, the revolutions and the uprisings we have witnessed have been about people using these social networks to reinforce the ideas of equity, justice, inclusion, peace and rights across the world. As these processes strengthen and find new public spaces of collaboration, we will hopefully see social and political movements which reinforce, that at the end of the day, what really counts, is being human.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The future, specially in our superconnected times, is always unpredictable. But the rise of digital technologies has helped us revisit some of the problems that have been central to a lot of emerging societies — problems of inequity, injustice, violence and violation of rights. And here is hoping that the tech trends in the coming year, will be trends that help create a better version of today, tomorrow.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/indian-express-nishant-shah-december-29-2012-tomorrow-today'&gt;https://cis-india.org/internet-governance/blog/indian-express-nishant-shah-december-29-2012-tomorrow-today&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-01-02T05:00:41Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/internet-driven-developments">
    <title>Internet-driven Developments — Structural Changes and Tipping Points </title>
    <link>https://cis-india.org/internet-governance/blog/internet-driven-developments</link>
    <description>
        &lt;b&gt;A symposium on Internet Driven Developments: Structural Changes and Tipping Points was held in Cambridge, Massachusetts at Harvard University from December 6 to 8, 2012. The symposium was sponsored by the Ford Foundation and the MacArthur Foundation and was hosted by the Berkman Center for Internet &amp; Society. In this blog post, I summarize the discussions that took place over the two days and add my own personal reflections on the issues.

&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The symposium served as an inaugural event for the &lt;i&gt;Global Network of Interdisciplinary Centers&lt;/i&gt;, which currently includes as its members:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The Berkman Center for Internet and Society at Harvard University&lt;/li&gt;
&lt;li&gt;The Alexander von Humboldt Institute for Internet &amp;amp; Society&lt;/li&gt;
&lt;li&gt;The Centre for Internet and Society, Bangalore &lt;/li&gt;
&lt;li&gt;The Center for Technology &amp;amp; Society at the Fundacao Getulio Vargas Law School, Keio University&lt;/li&gt;
&lt;li&gt;The MIT Media Lab and its Center for Civic Media&lt;/li&gt;
&lt;li&gt;The NEXA Center for Internet &amp;amp; Society at Politicnico di Torino. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Individuals and researchers from the Centers focused on understanding the effects of internet and society. The participants were brought together to explore the past, present, and future tipping points of the internet, to identify knowledge gaps, and to find areas of collaboration and future action between institutes and individuals. Specifically, the symposium set out to examine fundamental questions about the internet, identify structural changes that are occurring because of the internet, and the forces that are catalyzing these changes. Questions asked and discussed included:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;What forces are changing production and service models? &lt;/li&gt;
&lt;li&gt;What forces are influencing entrepreneurship and innovation? and &lt;/li&gt;
&lt;li&gt;What forces are changing political participation?&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;Production and Service Models&lt;/h2&gt;
&lt;h3&gt;Discussion&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;When participants discussed the changes that are happening to production and service models, concepts such as big data, algorithms, peer based models of production, and intermediaries were identified as actors and tools that are driving change in production and service models in the context of the internet. For example, big data and algorithms are being used to alter the nature, scope, and reach of business by allowing for the personalization and customization of services. To this end, many organizations have incorporated customer participation into business models, and provide platforms for feedback and input. The personalization of services has placed greater emphasis on the voice of the customer, allowing customers to guide and influence business by voicing preferences, satisfaction levels, etc. In this way, consumers can determine what type of service they want, and can also make political statements through their choices and feedback. In the process, however, such platforms generate and depend on large amounts of data and thus raise concerns about privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Knowledge gaps that were identified during the conversation included how to predict what would make a participatory platform and peer based model successful, and how these platforms can be effectively researched. When looking at big data, a knowledge gap that was identified included how to ensure that data are collected ethically and accurately, as well as the related question: once large data sets are collected, how can the data be analyzed and used in a meaningful way?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There was also discussion about the increasingly critical and powerful role that intermediaries serve within the scope of the internet as they act as the platform provider and regulator for internet content. Intermediaries both allow for content to be posted on the internet, and determine what information is accessed through the filtering of web searches.  Increasingly, governments are seeking to regulate intermediaries and create strict rules of compliance with governmental mandates. At the same time governments are placing the responsibility and liability of regulating what content is posted on internet on intermediaries, essentially placing them in the role of an adjudicator. This is one example of how the relationship between the private sector, the government, and the individual is changing, because it is only recently that private intermediaries have been held responsible first to governments, and only secondarily to customers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Knowledge gaps identified in the discussion on intermediaries included understanding and researching how intermediaries decide to filter content found through searches. On what basis is each filter done? Are there actors influencing this process? And what are the economics behind the process?&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Personal Thoughts&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;When reflecting on how the internet is changing and influencing the production of goods and services, I personally would add to the points discussed in the meeting the fact that the internet has also impacted the job economy.  Reports show that jobs in the extraction and manufacturing sector are decreasing, as the internet has created a mandatory new tech oriented skill set that often outweighs the need for other skill sets.  This change is far reaching as the job economy influences what skills students choose to learn, why and for what purposes individuals migrate across borders for employment, and in what industries governments invest money towards domestic development. In addition to changing the nature of skills in demand, the nature of the services themselves is changing. Though services are becoming more personalized and tailored to the individual, this personalization is automated, and replacing the ‘human touch’ that was once prized in business. Whether customers care if the service they are given is generated by an algorithm or delivered by an individual may depend on a person’s preference, but the European Union has seen this shift as being significant enough to address automated decision making in Article 15 of the EU directive, which provides individuals the right to not be subject to a decision which legally impacts him/her which is based only on automated processing of data. This directive encompasses decisions such as evaluation of a person’s performance at work, creditworthiness, reliability, conduct, etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The internet has also increased the cost of small mistakes made by businesses, as any mistake will now potentially impact millions of customers. The impact of any mistake makes risk management much more important and difficult, as businesses must seek to anticipate and mitigate any and all mistakes. The internet has also created a new level of dependency on the network, as businesses shift all of their services and functions over to the internet. Thus, if the network goes down, businesses will lose revenue and customers. This level of dependency on the network that exists today is different from past reliance’s on technology — in the sense that in the past there was not one single type of technology that would be essential for many businesses to run. The closest analogue was transportation: if trucks, trains, or ships were unavailable, multiple industries would be impacted. The difference is that those who relied on rail could shift temporarily to ships or trucks. Those relying on the network have no alternatives. Furthermore, past technologies were constantly evolving in the resources they depended on — from coal to gas, etc, but for the internet, it seems that the resource is not evolving, so much as expanding as increased bandwidth and connectivity are the solution to allowing technological evolution and innovation through the internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As discussed above, intermediaries are becoming key and powerful players, but they also seem to be increasingly placed between a rock and a hard place, as governments around the world are asking national and multinational intermediaries to filter content that violates national laws in one context, but not another context. Furthermore, intermediaries are increasingly being asked to comply with law enforcement requests for access to data that is often not within the jurisdiction of the requesting country. The difficult position intermediaries are placed in demonstrates how the architecture of the internet is borderless but the regulation and use of the internet is still tied to borders and jurisdiction.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Entrepreneurship and Innovation&lt;/h2&gt;
&lt;h3&gt;Discussion&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;When discussing entrepreneurship and innovation it was pointed out by participants that grey markets and market failures are important indicators for possibilities of new business models and forms of innovation. Because of that, it is important to study what has failed and why when identifying new possibilities and trends. The importance of policies and laws that allow for innovation and entrepreneurship was also highlighted.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Personal Thoughts&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;When thinking about entrepreneurship and innovation on the internet and forces driving them, it seems clear that tethering, conglomerating, and organizing information from multiple sources is one direction that innovation is headed. Services are coming out that have the ability to search the internet based on individual preferences and provide more accurate data quickly. This removes the need for individuals to search the internet at length to find the information or products they want. Along the same lines, it seems that there is a greater trend towards personalization. Services are finding new and innovative ways to bring individuals customized products. Another trend is the digitization of all services — from moving libraries online, to bookstores online, to grocery stores online. Lastly, there is a constant demand for new applications to be developed. These can range from applications enabling communication through social networking, to applications that act as personal financial consultants, to applications that act as personal trainers. The ability for concepts, trends, etc to go viral on the internet has also added another dimension to entrepreneurship and innovation as any individual can potentially become successful by something going viral. The ability for something to go viral on the internet does not just impact entrepreneurship and innovation, but also impacts political participation and production and service models.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Political Participation&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Discussions also centered on how political participation is changing as the internet is being used as a new platform for participation. For example, it is now possible for individuals to leverage their voice and message to local and global communities. Furthermore, this message can be communicated on a seemingly personal scale. Individuals from one community are able to connect to communities from another location — both local and abroad, and to work together to catalyze change. Messages and communications can be spread easily to millions of people and can go viral.  This ability has changed and created new public spheres, where anyone can contribute to a dialogue from anywhere.  Empowerment is shifting as well, because the internet allows for new power structures to be created by any actor who knows how to leverage the network. These factors allow for more voices to be heard and for greater citizen participation. The role of the youth in political movements was also emphasized in the discussions. On the other hand governments have responded by more heavily regulating speech and content on the internet when dissenting voices and campaigns are seen as a threat. It was also brought out that though emerging forms of online political participation have been heralded by many for achievements such as facilitating democracy, transparency, and bringing a voice to the silenced — many have warned that analysis of these political forms of participation overlook individual contributions and time. Other critiques that were discussed included the fact that digital revolutions also exclude individuals who do not have access to the internet or to platforms/applications and overlook actions and movements that take place offline.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Knowledge gaps that were identified included understanding the basics of the change that is happening in political participation through the internet. For example, it is unclear who the actors are that determine the conditions and scope for these changes, and like participatory forms of business, what enables and mobilizes change. Furthermore, it is unclear who specifically benefits from these changes and how, and who participates in the changes — and in what capacity. Additionally, much of the change has been quantified in the dialogue of the ‘global’ — global voices, global movements — but that dialogue ignores the local.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Personal Thoughts&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In addition to the discussions on political participation, I believe the internet has created the possibility for ‘social governance’. To address situations in which there is no particular law against an action, but individuals come together and speak out against actions that they see on the internet that they believe should be stopped or changed. Depending on the extent individuals choose to enforce these decisions, this can be potentially dangerous as individuals are essentially rewriting laws and social norms without subjecting them to the crucible of consensus decision-making or review. In addition, forms of political participation are not changing just in terms of how the individual engages politically with states and governments, but also in the ways that politicians are engaging with citizens. For example, politicians are using Facebook and Twitter as means to communicate and gather feedback from supporters. Politicians are also using technology to reach more individuals with their messages — from experimenting with 3D holograms, to web casting, to using technology like CCTV cameras to prove transparency. The impact of this could be interesting, as technology is becoming a mediating tool that works in both directions between citizens and governments. Is this changing the traditional understandings of the State and the relationship between the State and the citizen?&lt;/p&gt;
&lt;h2&gt;Conclusion and ways forward&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The discussions also pulled out dichotomies that apply to the internet and illustrate tensions arising from different forces. These dichotomies can be shaped by individuals and actors attempting to regulate the internet, as for example with new models of regulation vs. old models of regulation,  private vs. public, local vs. global,  owned vs. unowned, and zoned vs. unzoned. These dichotomies can be shaped by how the internet is used. For example, fair vs. unfair, just vs. unjust, represented vs. silenced, and uniform vs. diverse.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Common questions being asked and areas for potential research that came out of these discussions included information communication and media, how to address different and at times contradictory policies and levels of development in different countries, and what is the impact of big data on different sectors and industries like e-health and journalism? What is the importance of ICT in creating economic progress? How is the Internet changing the nature of democracy?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When discussing ways forward and areas for future collaboration it was brought out that exploring ways to leverage open data, ways to effectively use and build off of perspectives and experiences from other contexts and cultures, and ways to share resources across borders including funding, human presence, and expertise were important questions to answer. Common challenges that were identified by participants ranged from cyber security and the rise of state and non-state actors in cyber warfare, finding adequate funding to support research, sustaining international collaborations, ensuring that research is meaningful and can translate into useful resources for policy and law makers, and ensuring that projects are designed with a long-term objective and vision in mind.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The discussions, presentations, and contributions by participants during the two day symposium were interesting and important as they demonstrated just how multi-faced the internet is, and how it is never one dimensional. How the internet is researched, how it is used, and how it is regulated will be constantly changing. Whether this change is a step forward, or a re-invention of what has already been done, is up to all who use the internet including the individual, the corporation, the researcher, the policy maker, and the government.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/internet-driven-developments'&gt;https://cis-india.org/internet-governance/blog/internet-driven-developments&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-12-28T15:34:51Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/bangalore-crypto-party">
    <title>Bangalore CryptoParty!</title>
    <link>https://cis-india.org/internet-governance/events/bangalore-crypto-party</link>
    <description>
        &lt;b&gt;Care about your privacy and online security? Want to fight against pervasive governmental surveillance and corporate invasions of privacy? The Centre for Internet &amp; Society invites you to the CryptoParty tonight (Friday) at 6.00 p.m. Make sure to bring friends (and your laptop and smart phones)!
&lt;/b&gt;
        &lt;p&gt;We will discuss, install and use digital security and privacy tools and practices.&lt;/p&gt;
&lt;h2&gt;Hosts&lt;/h2&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a class="external-link" href="https://twitter.com/thej"&gt;Thejesh GN&lt;/a&gt;&lt;br /&gt;&lt;a class="external-link" href="https://twitter.com/houndbee"&gt;Kaustubh Srikanth&lt;/a&gt;&lt;br /&gt;&lt;a class="external-link" href="https://twitter.com/pranesh_prakash"&gt;Pranesh Prakash&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;Details&lt;/h2&gt;
&lt;hr /&gt;
&lt;h3&gt;We Will Provide&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Food and drinks: Snacks - Samosas + Kachoris + Biscuits + Tea + Soft Drinks&lt;/li&gt;
&lt;li&gt;Software: Security-in-a-box toolkits + Ubuntu Live USBs + software + internet connection&lt;/li&gt;
&lt;li&gt;Expertise: Kaustubh Srikanth + Thejesh GN + Pranesh Prakash &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;span class="mw-headline" id="You_need_to_bring"&gt;You need to bring&lt;/span&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Your own laptop (highly recommended)&lt;/li&gt;
&lt;li&gt;Desire to learn about secure and private communications and storage (mandatory! :D)&lt;/li&gt;
&lt;li&gt;Expertise, to share with others (if possible) &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Intro&lt;/h3&gt;
&lt;p&gt;(20 mins)&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Privacy vs. convenience &lt;/li&gt;
&lt;li&gt;Importance of Free and Open      Source Software and Open Standards &lt;/li&gt;
&lt;li&gt;Basics of Passwords &lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;Choosing secure passwords &lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;Dropbox        Register Page &lt;/li&gt;
&lt;/ul&gt;
&lt;li&gt;Storing comes later &lt;/li&gt;
&lt;li&gt;2FA - Google Authenticator &lt;/li&gt;
&lt;/ul&gt;
&lt;li&gt;Securing online Identities &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Show and tell&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Browsing (45 mins)&lt;/b&gt;&lt;br /&gt;(5 mins)&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Firefox (multiple platforms)      / offline &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;(15 mins):&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;AdBlockPlus &lt;/li&gt;
&lt;li&gt;RequestPolicy &lt;/li&gt;
&lt;li&gt;HTTPSEverywhere &lt;/li&gt;
&lt;li&gt;Ghostery / DoNotTrackMe &lt;/li&gt;
&lt;li&gt;Noscript &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;(5 mins)&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Anti-Google Surveillance &lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;DuckDuckGo &lt;/li&gt;
&lt;li&gt;GoogleSharing &lt;/li&gt;
&lt;/ul&gt;
&lt;/ul&gt;
&lt;p&gt;(10 mins)&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Password management &lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;Keepass + Password Safe &lt;/li&gt;
&lt;li&gt;Cloud Services &lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;LastPass &lt;/li&gt;
&lt;li&gt;Keepass        + Dropbox &lt;/li&gt;
&lt;/ul&gt;
&lt;/ul&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Email + IM (1 hour)&lt;/b&gt;&lt;br /&gt;(10 mins)&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Thunderbird (multiple      platforms) / available offline &lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;Enigmail &lt;/li&gt;
&lt;/ul&gt;
&lt;/ul&gt;
&lt;p&gt;(30 mins)&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;GPG4Win + GPGTools / offline &lt;/li&gt;
&lt;li&gt;Seahorse (on Ubuntu Fresh      Install) &lt;/li&gt;
&lt;li&gt;Enigmail + Key Management      (Kaustubh) &lt;/li&gt;
&lt;li&gt;Key-signing party! &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;(15 mins)&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Instant Messaging with OTR &lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;Pidgin + Adium / offline &lt;/li&gt;
&lt;li&gt;OTR / offline &lt;/li&gt;
&lt;/ul&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Tell (27 mins)&lt;/b&gt;&lt;br /&gt;(5 mins)&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Tor (Pranesh) &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;(5 mins)&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;VPNs and SSH tunnel &lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;RiseUp (Kaustubh) &lt;/li&gt;
&lt;li&gt;SSH tunneling using AWS /       RackSpace (Thej) &lt;/li&gt;
&lt;/ul&gt;
&lt;/ul&gt;
&lt;p&gt;(12 mins)&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Mobiles &lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;APG + K9 (Pranesh) &lt;/li&gt;
&lt;li&gt;WhisperCore (Kaustubh       mentions) &lt;/li&gt;
&lt;li&gt;Text Secure (Thej) &lt;/li&gt;
&lt;li&gt;Gibbberbot (Pranesh) &lt;/li&gt;
&lt;/ul&gt;
&lt;/ul&gt;
&lt;p&gt;(3 mins)&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Full-disk encryption &lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;Ubuntu (Pranesh demoes       quickly) &lt;/li&gt;
&lt;li&gt;BitLocker &lt;/li&gt;
&lt;li&gt;TrueCrypt &lt;/li&gt;
&lt;/ul&gt;
&lt;/ul&gt;
&lt;p&gt;(2 mins)&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Virtual machines &lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;VirtualBox (Kaustubh demoes       quickly) &lt;/li&gt;
&lt;/ul&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/bangalore-crypto-party'&gt;https://cis-india.org/internet-governance/events/bangalore-crypto-party&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-01-06T13:47:02Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/dna-bangalore-december-19-2012-the-it-act-is-fine-but-its-interpretation-is-not">
    <title>‘The IT Act is fine, but its interpretation is not’</title>
    <link>https://cis-india.org/news/dna-bangalore-december-19-2012-the-it-act-is-fine-but-its-interpretation-is-not</link>
    <description>
        &lt;b&gt;Several organisations such as the Alternate Law Forum and Centre for Internet and Society are campaigning to amend the IT Act 2000. However, SV Raghavan, scientific secretary, office of PSA to the government of India, stated that the law in place is fine but the stakeholders need to be educated on implementing it better.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;The article was&lt;a class="external-link" href="http://www.dnaindia.com/bangalore/report_the-it-act-is-fine-but-its-interpretation-is-not_1779394"&gt; published&lt;/a&gt; in DNA on December 19, 2012.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Raghavan, who was at the National Institute of Advanced Studies (NIAS) in the Indian Institute of Science (IISc) on Tuesday to give a lecture on cyber security, specifically singled out the controversial Section 66 that can hold a person viable for posting ‘offensive’ content online. The IT Act 2000 is constituted to keep such law breakers under check.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The IT Act 2000 gives specific powers to some of the law agencies to take action. In cyberspace, nearly 90% of the users don’t come with any malicious intentions. Now there is a large concerted effort across the country, to teach policemen how to apply this law and interpret it. There is also an effort to teach the judiciary to interpret the law correctly, so that the right people are held accountable,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“No matter what you do, when the law is written in English, sometimes it comes across two dimensional and the original intent of the law may be lost, which is why there are agencies who are dedicated to teaching the judiciary on how to interpret it,” he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As for cyber security amongst civilians, vigilance is simply all it takes.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/dna-bangalore-december-19-2012-the-it-act-is-fine-but-its-interpretation-is-not'&gt;https://cis-india.org/news/dna-bangalore-december-19-2012-the-it-act-is-fine-but-its-interpretation-is-not&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Information Technology</dc:subject>
    

   <dc:date>2012-12-21T10:08:43Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/state-surveillance-and-human-rights-camp">
    <title>State Surveillance and Human Rights Camp</title>
    <link>https://cis-india.org/news/state-surveillance-and-human-rights-camp</link>
    <description>
        &lt;b&gt;A two-day conference was held in Rio on December 13 and 14 at Sheraton Rio Hotel &amp; Resort. Elonnai Hickok participated in the event and made a presentation on MLATS and International Cooperation for Law Enforcement Purposes.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://wiki.surveillancehumanrights.org/Rights_Camp_Brazil"&gt;Click here&lt;/a&gt; to see the Wiki page of the event. See Elonnai's presentation&lt;a href="https://cis-india.org/internet-governance/blog/presentation-on-mlats.pdf" class="internal-link"&gt; here&lt;/a&gt; [PDF, 313 Kb].&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;b&gt;DAY 1: Mapping Out Government Surveillance Problems &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;8:30 - 9:00 &lt;b&gt;Registration&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;9:00 - 9:10 &lt;b&gt;Welcome/Introduction&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://www.eff.org/about/staff/katitza-rodriguez"&gt;Katitza Rodriguez, Electronic Frontier Foundation [Peru, ES]&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Simultaneous interpretation from Spanish to English and Portuguese.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Plenary: Kinds of Data, Ways of Getting It &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;09:10 - 10:30&lt;/p&gt;
&lt;p&gt;Chair: Enrique Chaparro, Fundacion Via Libre [Argentina, ES]&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Metadata, online identifiers, and technologies of surveillance &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://www.eff.org/about/staff/seth-schoen"&gt;Seth Schoen, Electronic Frontier Foundation [United States, EN]&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Simultaneous interpretation from English to Spanish and Portuguese.&lt;/i&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Surveillance  is getting      easier and cheaper for many reasons, not least because  people are using      electronic communications more than ever before,  and there are so many      facts out there to be noticed about the ways  devices are talking to each      other. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;I will  talk about the kinds      of things that refer to people and their  devices, with a particular focus      on telecommunications metadata and  transactional records that are      described as "non-content" and may  receive lower levels of legal      protection. I'll discuss who is in a  position to record this information,      some of the things that can be  learned from it, and why traffic analysis      is powerful and  difficult to defend against. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;I'll  try to explain concepts      like MAC address, IP address, account name  and number, telephone number,      IMEI, IMSI, transient identifiers,  log files, transactional records,      locational privacy, and  associational privacy. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;&lt;a href="http://wiki.surveillancehumanrights.org/Cell_Phone_Location_Tracking" title="Cell Phone Location Tracking"&gt;How law enforcement agencies use cell phone location tracking technology in criminal cases&lt;/a&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://www.eff.org/about/staff/hanni-fakhoury"&gt;Hanni Fakhoury, Electronic Frontier Foundation [United States, EN]&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;With  the rise of      smartphones, the U.S. government's use of cell site  location data to      pinpoint our exact location has grown more  widespread (and precise) over      time. For years, U.S. courts  permitted the government to get this location      data without a search  warrant under a tortured interpretation of federal      electronic  privacy statutes and an even more alarming constitutional argument:       that we don't have any privacy in data we turn over to third parties,  like      cell phone companies. This talk will review what location data  is and why      the police want it, how they can get it under U.S. law,  and legal and      practical steps that need to be taken to safeguard  our privacy. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;i&gt;Simultaneous interpretation from English to Spanish and Portuguese.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;a href="http://wiki.surveillancehumanrights.org/Deep_packet_inspection:_What_it_is,_how_it_works,_and_how_it_is_used_for_surveillance" title="Deep packet inspection: What it is, how it works, and how it is used for surveillance"&gt;Deep packet inspection: What it is, how it works, and how it is used for surveillance&lt;/a&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Chris Parsons, Doctoral Candidate, University of Victoria [Canada, EN]&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Simultaneous interpretation from English to Spanish and Portuguese.&lt;/i&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;We are  in the midst of a      standardization revolution, a mass translation  of discordant analogue      signal types to interoperable digital  transmission standards. All this      digitized consumer traffic passes  through the gateways of Internet Service      Providers’ (ISPs). ISPs  function as communicative bottlenecks, ideally      positioning them to  monitor, mine, and modify data using the Deep Packet      Inspection  (DPI) appliances situated within their networks. Some uses of      these  appliances could reshape the conditions of communication in       democracies, blocking or modifying data transmissions in near real time. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;In  this presentation I      discuss the technical capabilities of deep  packet inspection and its      significance for increased private and  public surveillance capabilities.      Drawing from case material from  academic and advocacy work, I identify how      the technology has been  used for ISP-level surveillance, for copyright      purposes, for  national security purposes, and for advertising purposes.      Moreover,  I address how advocates in differing nations have opposed      various  uses of the technology, why they have done so, and conditions that       facilitate domestic resistance to deep packet inspections' uses. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;&lt;a href="http://wiki.surveillancehumanrights.org/Advances_in_online_spying:_Commercial_surveillance_software,_targeted_hacking_and_beyond" title="Advances in online spying: Commercial surveillance software, targeted hacking and beyond"&gt;Advances in online spying: Commercial surveillance software, targeted hacking and beyond&lt;/a&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Morgan Marquis-Boire, Google [New Zealand, EN]&lt;/p&gt;
&lt;p&gt;Eva Galperin, Electronic Frontier Foundation [United States, EN]&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Simultaneous interpretation from English to Spanish and Portuguese.&lt;/i&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Against  an increasingly      security-aware online community, the traditional  tools of blocking, filtering,      and wiretapping have become less  effective. Nervous regimes turn to the      largely unregulated $5  billion a year industry in Internet surveillance      tools. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Once  the realm of the black      market and intelligence agencies, the latest  computer spyware is now sold      at trade shows for dictator pocket  change. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;This  talk will detail the      cat and mouse game between authoritarian  regimes and dissidents, as well      as ongoing efforts to map out the  relationship between surveillance      software companies and  governments. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;10:30 - 10:40 &lt;b&gt;Coffee Break&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Workshops: Round I &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;10:40 - 11:50&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Format:&lt;/i&gt; Interactive sessions with active participat0ion from the audience.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Workshop 1: Mobile privacy threats &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;This  workshop addresses the      ways governments are tracking mobile  devices’ location and use, and why      it’s been harder to protect  communications privacy on mobile devices than      on PCs. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Facilitators:&lt;a href="https://www.eff.org/about/staff/hanni-fakhoury"&gt;&lt;br /&gt;Hanni Fakhoury, Electronic Frontier Foundation&lt;/a&gt; [United States, EN]&lt;a href="https://www.eff.org/about/staff/seth-schoen"&gt;&lt;br /&gt;Seth Schoen, Electronic Frontier Foundation [United States, EN/PT]&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Rapporteur:&lt;br /&gt;Enrique Chaparro, Fundación Vía Libre [Argentina, EN/ES]&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Workshop 2: Training activists about state surveillance capabilities &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;In  this workshop we’ll talk      about some of new surveillance  technologies that states are deploying, and      the tactics that are  used to legitimize the surveillance. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Going  beyond just ‘what is      used and how’, we speak to some political  tactics that advocates have used      to resist these tools on practical  and principled levels, some of the      conditions that contribute to  successes, and ways of mobilizing effective      strategies against  expansions of state surveillance. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Facilitator:&lt;a href="http://www.christopher-parsons.com"&gt;&lt;br /&gt;Chris Parsons, University of Victoria&lt;/a&gt; [Canada, EN]&lt;/p&gt;
&lt;p&gt;Rapporteur:&lt;br /&gt;Katarzyna Szymielewicz, European Digital Rights [Poland, EN]&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;a href="http://wiki.surveillancehumanrights.org/Workshop_Tactics_for_Opposing_Surveillance" title="Workshop Tactics for Opposing Surveillance"&gt;Workshop 3: Tactics for opposing state sponsored malware and surveillance&lt;/a&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;This  workshop will review      the different tactics government and  non-government actors have employed      to stop authoritarian regimes  from making use of surveillance technology      built in the United  States and Europe to spy on their citizens. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;We  will discuss corporate      responsibility, export controls, as well as  the role of security research      and user education campaigns. The  workshop will end with a brainstorm of      at least one concrete action  each workshop attendee can take. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Facilitators:&lt;/p&gt;
&lt;p&gt;Eva Galperin, Electronic Frontier Foundation [United States, EN]&lt;br /&gt;Morgan Marquis-Boire [New Zealand, EN]&lt;/p&gt;
&lt;p&gt;Rapporteur:&lt;br /&gt;Silvio Rhatto, Sarava Group [Brazil, PT]&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reporting Back Session &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;11:50 - 12:40 Chair:&lt;/p&gt;
&lt;p&gt;&lt;a href="https://www.eff.org/about/staff/katitza-rodriguez"&gt;Katitza Rodriguez, Electronic Frontier Foundation [Peru, ES]&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Rapporteurs:&lt;br /&gt;Enrique Chaparro, Fundación Vía Libre [Argentina, EN/ES]&lt;br /&gt;Katarzyna Szymielewicz, European Digital Rights [Poland, EN]&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;Report:&lt;/b&gt; &lt;a href="http://wiki.surveillancehumanrights.org/Report:Training_activists" title="Report:Training activists"&gt;Training Activists about State Surveillance Capabilities&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Silvio Rhatto, Sarava Group [Brazil, PT]&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Format: Each rapporteur has 10 minutes to report back about the  results of their workshop discussion and 20 minutes to answer questions.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;12:40 - 2:00 &lt;b&gt;Lunch&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Legal and Policy Plenary: Government Access to People’s Data &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;2:00 - 3:20&lt;/p&gt;
&lt;p&gt;Chair: Pedro Paranaguá, Advisor for Internet Policy to the Workers’ Party in the Brazilian Chamber of Deputies [Brazil, PT/EN]&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;a href="http://wiki.surveillancehumanrights.org/Different_data,_different_rules%3F_How_the_law_has_assigned_varying_levels_of_privacy_protection_to_different_categories_of_personal_information" title="Different data, different rules? How the law has assigned varying levels of privacy protection to different categories of personal information"&gt;Different  data, different rules? How the law has assigned varying levels of  privacy protection to different categories of personal information&lt;/a&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Kevin Bankston, Center for Democracy and Technology [United States, EN]&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Using  the example of US law,      this presentation will map the different  legal protections that have      traditionally been applied to different  types surveillance of different      types of data, and consider how to  redraw that map in light of new      technologies. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Speaking  generally, US surveillance      law has been written based on the  assumptions that: (1) surveillance of      data on your computer is more  invasive than access to your data in the      cloud;(2) real-time  surveillance is more invasive than access to stored      data; (3)  surveillance of the content of communications is more invasive      than  surveillance of non-content meta-data; (4) surveillance of newer       communications is more invasive than surveillance of older  communications. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;These  assumptions have long      defined which types of surveillance are most  strongly regulated against      and which types of data are most  strongly protected by law. Changing      technology has made these  assumptions about invasiveness and privacy      increasingly obsolete,  assuming that they ever made sense at all. But if      these  distinctions are outdated, what if any legal distinctions between       different types of surveillance or data should replace them? How, if at       all, can the law sensibly distinguish between personal  communications and      communications data in which we have a  reasonable expectation of privacy,      and that which we do not? &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;i&gt;Simultaneous interpretation from English to Spanish and Portuguese.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;a href="http://wiki.surveillancehumanrights.org/Internet_companies_as_an_agent_of_the_state_%26_european_mandatory_telecommunications_data_retention" title="Internet companies as an agent of the state &amp;amp; european mandatory telecommunications data retention"&gt;Internet companies as an agent of the state &amp;amp; european mandatory telecommunications data retention&lt;/a&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Katarzyna Szymielewicz, European Digital Rights [Poland, EN]&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;In  this short presentation I      will introduce European (i.e. based on EU  legislation) regime of mandatory      retention of telecommunication  data for law enforcement purposes,      explaining its political  context, implementation and negative impact on      human rights  standards (not just privacy-related!). &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Using  case studies of Poland      and Germany I will present two strikingly  different approaches to storing      telecommunication data and law  enforcement, thus questioning the necessity      and proportionality of  this controversial measure. I will also touch      briefly on pending  political developments (including the revision of the      Data  Retention Directive and the reform of data protection law in the EU),       explaining what the stakes are, what European civil society  organisations      are fighting for and why it is such an important  fight. Finally, I will      explain how the debate about mandatory data  retention feeds into a broader      discussion about the role of  Internet intermediaries, including both their      independence from  political pressure and protection of their clients from       surveillance executed by “private police.” &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;i&gt;Simultaneous interpretation from English to Spanish and Portuguese.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Crossborder access to citizen's data and cloud computing in the investigation of criminal cases: Regional trends &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Marcos Salt, profesor de derecho penal y procesal penal de la universidad de Buenos Aires (UBA) [Argentina, ES]&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;During  the brief      presentation, I will present practical examples of the  problems caused by      the application by analogy of the rules on  physical evidence to obtain      digital evidence. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;I try  to show that this      trend is inconvenient to both for efficiency in  the investigation of      crimes by the state as to the validity of  individual rights. I will place      special reference to cross-border  access to citizen's data in the cloud. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;i&gt;Simultaneous interpretation from Spanish to English and Portuguese.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;a href="http://wiki.surveillancehumanrights.org/Background_on_lawful_interception_mandates_and_government_access_to_encryption_keys" title="Background on lawful interception mandates and government access to encryption keys"&gt;Background on lawful interception mandates and government access to encryption keys&lt;/a&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://www.eff.org/about/staff/seth-schoen"&gt;Seth Schoen, Electronic Frontier Foundation [United States, EN]&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Simultaneous interpretation from English to Spanish and Portuguese.&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;In  this session, I'll      discuss some of the history of fights over  government surveillance powers      and government access in the United  States, starting in the early 1990s      and continuing to the present  day. These issues have centered on three      main themes: restrictions  on cryptography and privacy tools, obligations      for communications  intermediaries to acquire and implement surveillance      capabilities,  and mandatory retention of telecommunications data. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;One  interesting point is      that many of the same themes keep recurring:  the powers that the      government is seeking today are often similar  to those it sought two      decades ago. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Another  interesting point is      that the government has not always been  successful in expanding its      surveillance powers. Many of its  proposals never became law and there are      still plenty of issues  left to fight over. But governments around the      world are continuing  to having a major effect on the design of technology,      getting  wiretapping interfaces and backdoors added to communications       systems and discouraging deployments of strong encryption. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;&lt;a href="http://wiki.surveillancehumanrights.org/MLATS_and_International_Cooperation_for_Law_Enforcement_Purposes" title="MLATS and International Cooperation for Law Enforcement Purposes"&gt;MLATS and International Cooperation for Law Enforcement Purposes&lt;/a&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Elonnai Hickok, Center for Internet &amp;amp; Society India [India, EN]&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;In  this session I will be      looking at the challenges, requisite  safeguards, and possible solutions in      the context of international  cooperation for fighting crime. In doing so I      will look closely at  the proposed principle of safeguards for      international cooperation. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The  objective of this      session will be to explore ways of improving  MLATS and international law      enforcement cooperation in order to  ensure that basic safeguards can be      built into the process of  international cooperation. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;i&gt;Simultaneous interpretation from English to Spanish and Portuguese.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Format: 10-15 minutes for each five speakers to introduce legal issues and 20 minutes of discussions&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;3:10 - 3:20 &lt;b&gt;Coffee Break&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Workshops: Round II&lt;/b&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;3:20 - 4:30&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Workshop 1: Electronic surveillance demonstrations &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;In  this workshop, we'll take      a look at a few electronic surveillance  devices (including an ordinary      laptop) and look at some of what  they can intercept. Technological      infrastructure permitting, we may  have a live demonstration of      intercepting or modifying users'  Internet communications. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;We'll  also consider low-cost      surveillance techniques and discuss what  kinds of demonstrations have the      most pedagogical value for making  users aware of particular threats. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Facilitator:&lt;br /&gt;Seth Schoen, Electronic Frontier Foundation [United States, EN]&lt;/p&gt;
&lt;p&gt;Rapporteur:&lt;br /&gt;Eva Galperin, Electronic Frontier Foundation [United States, EN/ES/PT]&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Simultaneous interpretation from English to Spanish and Portuguese.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Workshop 2: Legal framework regarding compelled disclosure of communications, subscriber information, and cryptographic keys &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;In  this workshop we will      cover various examples of compelled  disclosure of private information      (from subscriber information and  content of communication to cryptographic      keys) in the context of  law enforcement, focusing on their legal aspects.      We will briefly  present various legal frameworks, discussing both the      examples of  legal safeguards (“good practices”) and their shortcomings      that  allow for government surveillance. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;We  will also look at various      human rights implications of these  measures and (potential / existing)      role of private companies from  the perspective of their compliance with      such measures (incl. when  requested by non-democratic regimes). &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Facilitators:&lt;br /&gt;Katarzyna Szymielewicz, European Digital Rights [Poland, EN]&lt;br /&gt;Elonnai Hickok, Center for Internet &amp;amp; Society India [India, EN]&lt;/p&gt;
&lt;p&gt;Rapporteur:&lt;a href="https://www.eff.org/about/staff/hanni-fakhoury"&gt;&lt;br /&gt;Hanni Fakhoury, Electronic Frontier Foundation&lt;/a&gt; [United States, EN]&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Workshop 3: What data is most private? What surveillance is most invasive? How if at all should laws treat them differently? &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;This  workshop will build on      the discussion that began in the law &amp;amp;  policy plenary, discussing how      certain surveillance laws have  applied different legal protections to      different types of data and  surveillance, and questioning whether such      distinctions make sense  in light of new technology. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The  workshop will address      that question from legal, personal, and  political perspectives.      Participants will share with each other  details of how the laws in their      countries treat different types of  data and different types of      surveillance, to facilitate shared  understanding of the existing legal      frameworks and to identify  existing gaps and discrepancies in current      legal protections. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Based  on their own personal      experiences as Internet users and as  advocates, participants will then      discuss what data in their lives  they consider most private and what types      of surveillance they find  most invasive, and reflect on how if at all the      law should  distinguish between them. Finally, participants will discuss      the  politics of these different frameworks: both how gaps and weaknesses       in existing frameworks threaten the ability of advocates to  politically      organize in the face of government surveillance, and  how we can best work      through the political process and change those  frameworks to better      reflect current technology and human rights  norms. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Facilitators:&lt;br /&gt;Kevin Bankston, Center for Democracy and Technology [United States, EN]&lt;br /&gt;Danilo Doneda, Fundação Getúlio Vargas [Brazil, PT/EN]&lt;/p&gt;
&lt;p&gt;Rapporteur:&lt;br /&gt;Beatriz Busaniche, Fundación Vía Libre [Argentina, ES]&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reporting Back Session &amp;amp; Closing Meeting Day 1 &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;4:30 - 5:20&lt;/p&gt;
&lt;p&gt;Chair:&lt;a href="https://www.eff.org/about/staff/katitza-rodriguez"&gt;&lt;br /&gt;Katitza Rodriguez, Electronic Frontier Foundation [Peru, ES]&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Rapporteurs:&lt;br /&gt;Eva Galperin, Electronic Frontier Foundation [United States, EN/ES/PT]&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;Report:&lt;/b&gt; &lt;a href="http://wiki.surveillancehumanrights.org/Report:Demonstrating_Surveillance" title="Report:Demonstrating Surveillance"&gt;Demonstrating Surveillance&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href="https://www.eff.org/about/staff/hanni-fakhoury"&gt;Hanni Fakhoury, Electronic Frontier Foundation&lt;/a&gt; [United States, EN]&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;Report:&lt;/b&gt; &lt;a href="http://wiki.surveillancehumanrights.org/Report:Compelled_Disclosure" title="Report:Compelled Disclosure"&gt;Compelled Disclosure of Communications, Subscriber Information &amp;amp; Cryptographic Keys&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Beatriz Busaniche, Fundación Vía Libre [Argentina, ES]&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;Report:&lt;/b&gt; What Data is Most Private? What Surveillance is Most Invasive? Should Laws Treat Different Data Differently? &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;8:30 pm &lt;b&gt;Dinner&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;DAY 2: Challenges and Mapping Out Possible Solutions&lt;/b&gt;&lt;br /&gt;8:55 - 9:00 Welcome&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Plenary: Surveillance in Latin America&lt;/b&gt;&lt;br /&gt;9:00 - 10:20&lt;/p&gt;
&lt;p&gt;Chair: Camila Marques, Lawyer, ARTIGO 19 [Brazil, PT]&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Surveillance in Colombia&lt;/b&gt;&lt;br /&gt;Carlos Eduardo Huertas, Semana [Colombia, ES]&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Surveillance in Cuba&lt;/b&gt;&lt;br /&gt;“Mario Hernandez” [Cuba, ES]&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Surveillance in the Northern Triangle&lt;/b&gt;&lt;br /&gt;Renata Avila, Global Voices [Guatemala, ES]&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Surveillance in Peru&lt;/b&gt;&lt;br /&gt;Yonsi Solis, Global Voices [Peru, ES]&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Surveillance in Mexico&lt;/b&gt;&lt;br /&gt;Caracol Azul, [Mexico, ES]&lt;i&gt;&lt;br /&gt;This session will have simultaneous interpretation from Spanish to English and Portuguese&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Keynote: Challenges Posed By Electronic Surveillance &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;10:20 - 10:40&lt;br /&gt;Frank La Rue, United Nations Special Rapporteur on Freedom of Expression [Guatemala, ES]&lt;br /&gt;Increasing pressure (legal and political) on private parties to help carry out the state’s surveillance mandate.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Simultaneous interpretation from Spanish to English and Portuguese&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;10:40 - 11:00 &lt;b&gt;Coffee Break&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Plenary: International Surveillance &amp;amp; Human Rights Principles: Challenges and Opportunities in Latin America &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;11:00 - 11:50&lt;/p&gt;
&lt;p&gt;Chair: Carly Nyst, Privacy International [Australia/UK, EN]&lt;br /&gt;Simultaneous interpretation from English to Spanish and Portuguese.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Explanation of the Principles: Background, purpose, need, challenges and opportunities&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Chilean and Latin American perspectives&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Alberto Cerda, Derechos Digitales [Chile, ES]&lt;i&gt;&lt;br /&gt;Simultaneous interpretation from Spanish to English and Portuguese&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Expansion of Brazilian law enforcement powers to access users’ digital information &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Pablo Ortellado, GPOPAI [Brasil, PT/EN]&lt;i&gt;&lt;br /&gt;Simultaneous interpretation from Portuguese to Spanish and English&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Surveillance and regional human rights standards &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Juan Camilo Rivera, Comisión Colombiana de Juristas [Colombia, ES]&lt;i&gt;&lt;br /&gt;Simultaneous interpretation from Spanish to English and Portuguese&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Workshops: Round III &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;11:50 - 1:00&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;a href="http://wiki.surveillancehumanrights.org/Workshop_1:_International_surveillance_and_human_rights_principles:_Perspectives_from_Latin_America" title="Workshop 1: International surveillance and human rights principles: Perspectives from Latin America"&gt;Workshop 1: International surveillance and human rights principles: Perspectives from Latin America&lt;/a&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facilitator:&lt;br /&gt;Alberto Cerda, Derechos Digitales [ES] &amp;amp; Carly Nyst, Privacy International [UK, EN]&lt;/p&gt;
&lt;p&gt;Rapporteur:&lt;br /&gt;Juan Camilo Rivera, Comisión Colombiana de Juristas [Colombia, ES]&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;a href="http://wiki.surveillancehumanrights.org/Technical_community_activism" title="Technical community activism"&gt;Workshop 2: Technical community activism&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;What is the technology community doing to defend privacy?&lt;/p&gt;
&lt;p&gt;Facilitators:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://wiki.surveillancehumanrights.org/Enrique_Chaparro" title="Enrique Chaparro"&gt;Enrique Chaparro, Fundación Vía Libre [Argentina, ES&lt;/a&gt; ]&lt;br /&gt;João Carlos Caribé, Movimento Mega (aka Mega Não) [Brazil, PT/EN]&lt;/p&gt;
&lt;p&gt;Rapporteur:&lt;a href="https://www.eff.org/about/staff/eva-galperin"&gt;&lt;br /&gt;Eva Galperin, Electronic Frontier Foundation [USA, EN]&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Plenary: Hands-on Activism &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;2:40 - 3:50 p.m.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Chair: Rebecca Bowe,      Electronic Frontier Foundation [United States, EN] &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Simultaneous interpretation from English to Spanish and Portuguese.&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;What is meant by Hands-On       Activism? As you’ll learn from our panelists, there are many strategies       that can be utilized to push back against a surveillance practice  or      proposal. We’ll cover the most effective ways to obtain public  records;      strategies for generating interest in digital rights  issues; fresh and      extraordinary approaches to creative campaigning,  and tactics used by an      international nonprofit to tackle privacy  issues with online campaigns. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Raising digital awareness in Peru &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="http://wiki.surveillancehumanrights.org/Marco_Sifuentes" title="Marco Sifuentes"&gt;Marco Sifuentes, Instituto Prensa y Sociedad [Peru, ES]&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Peru has a very active and       influential online community. It can affect the course of elections,  prove      the president wrong and stop law projects. It can work very  well on      "real world" matters. But when it comes to online issues,  it's      been hard to raise awareness on the Peruvian general public  and even on      the media. What went wrong? However, in the past year,  some digital topics      have received a lot of coverage. Some not. What  changed? I’ll share Peru's      experience in the hope that every  participant can compare it with his or      her own country's situation. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Online organizing for human rights &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="http://wiki.surveillancehumanrights.org/Fabiola_Carrion" title="Fabiola Carrion"&gt;Fabiola Carrion, Access [Peru, ES/EN] &lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;A recent addition to the      Access  Team, Fabiola will begin her presentation by talking about her own       experiences in organizing and advocacy, arguing that the struggle for       human rights is increasingly moving online. She will discuss new  tools of      organizing, and the importance of combining technology,  policy, and      grassroots advocacy tactics to affect holistic change  in internet policy      debates. Her presentation will include a series  of short case studies from      around the world where Access, along  with its various allies, have      successfully campaigned for a free  and open internet. Her presentation      will conclude with a discussion  of lessons learned and best practices for      online organizing,  particularly around issues of surveillance and due      process. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Surveillance and secrecy: Strategy and tactics - Using the law to uncover abuse of LEAs’ surveillance powers &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="http://wiki.surveillancehumanrights.org/Geoff_King" title="Geoff King"&gt;Geoff King, Lawyer [United States, EN]&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Open government laws, though       riddled with exemptions, are powerful tools for shedding light on the       governmental operations. One way in which these laws can be used is  to      uncover the existence of law enforcement surveillance, as well  details      about the tools used to achieve such surveillance. This  portion of the presentation      will explore how journalists and  activists can employ successful      transparency strategies in the face  of various procedural pitfalls. It      will also give concrete  examples of how such strategies have paid off in      the recent past. &lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;a href="http://wiki.surveillancehumanrights.org/Materials:Law_to_Uncover_Surveillance" title="Materials:Law to Uncover Surveillance"&gt;Presentation      Materials&lt;/a&gt;&lt;/b&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Creative campaigning: tactical media mashup&lt;/b&gt;&lt;a href="http://wiki.surveillancehumanrights.org/Vladan_Joler" title="Vladan Joler"&gt;&lt;br /&gt;Vladan Joler, Share Foundation [Serbia, EN] &lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Explore the beautiful world      of tactical media as a creative tool for getting your message out there. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;From creative campaigning      during  Serbian protests in the 90s to “lo fi” media interventions,       protests inside computer games, media pranks and parasite media tactics  to      social media bots and Twitter bombs. &lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;a href="http://wiki.surveillancehumanrights.org/Materials:Tactical_Media" title="Materials:Tactical Media"&gt;Presentation      Materials&lt;/a&gt;&lt;/b&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;i&gt;Simultaneous interpretation from English to Spanish and Portuguese&lt;/i&gt; &lt;a href="http://wiki.surveillancehumanrights.org/Rights_Camp_Brazil#top"&gt;Return to Top&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;3:50 - 4:10 &lt;b&gt;Coffee Break&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Workshops: Round IV &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;4:10 - 5:10&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;a href="http://wiki.surveillancehumanrights.org/Workshop_1:_What_the_international_surveillance_and_human_rights_principles_are_asking_the_governments_to_do%3F" title="Workshop 1: What the international surveillance and human rights principles are asking the governments to do?"&gt;Workshop 1: What the international surveillance and human rights principles are asking the governments to do?&lt;/a&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;This session will be used to      call  out exactly what the International Surveillance and Human Rights       Principles are asking governments to change or legislative/policy  actions      they are asking governments to take. This will hopefully be  useful in      helping individuals and organizations understand what  aspects to highlight      and push when proposing the principles and  why. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Facilitators:&lt;/p&gt;
&lt;p&gt;&lt;a href="https://www.eff.org/about/staff/katitza-rodriguez"&gt;Katitza Rodriguez, Electronic Frontier Foundation [Peru, ES]&lt;/a&gt;&lt;br /&gt;Elonnai Hickok, Center for Internet &amp;amp; Society India [India, EN]&lt;/p&gt;
&lt;p&gt;Rapporteur:&lt;br /&gt;Graciela Selaimen, NUPEF [Brasil, EN/ES/PT]&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;a href="http://wiki.surveillancehumanrights.org/index.php?title=Workshop_2:_Creative_campaigning:_tactical_media_mashup_%26_anti-surveillance_campaigns&amp;amp;action=edit&amp;amp;redlink=1" title="Workshop 2: Creative campaigning: tactical media mashup &amp;amp; anti-surveillance campaigns (page does not exist)"&gt;Workshop 2: Creative campaigning: tactical media mashup &amp;amp; anti-surveillance campaigns&lt;/a&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;What are activists around      the  world doing to counter surveillance proposals and practices? And what       could they be doing, with just a little more knowledge and  inspiration? At      this session, workshop facilitators will share  stories about successful      campaigns launched around the world in  response to government      surveillance. How did a humorous Twitter  hashtag about a proponent of      surveillance legislation rise to  “trending” status on Twitter? How did a      small team of digital  rights activists in Argentina manage to position      themselves as one  of the most trusted media sources on issues relating to      privacy in  the digital realm? How did a small group of activists manage to       reach biggest world media and how are activists creating their own  media?      We’ll then open it up for a group discussion in which  participants can      share their own stories of effective tactics from  around the world, and      explore ideas for collaborating and  harnessing the knowledge gleaned from      our collective experiences. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Facilitators:&lt;/p&gt;
&lt;p&gt;&lt;a href="https://www.eff.org/about/staff/rebecca-bowe"&gt;Rebecca Bowe, Electronic Frontier Foundation [United States, EN]&lt;/a&gt;&lt;br /&gt;Vladan Joler, Share Foundation [Serbia, EN]&lt;/p&gt;
&lt;p&gt;Rapporteur:&lt;br /&gt;Hisham Almiraat, Global Voices Advocacy [Morocco, EN]&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reporting Back Session &amp;amp; Closing Remarks &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;5:10 - 6:00&lt;/p&gt;
&lt;p&gt;Chair:&lt;a href="https://www.eff.org/about/staff/katitza-rodriguez"&gt;&lt;br /&gt;Katitza Rodriguez, Electronic Frontier Foundation [Peru, ES]&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Rapporteurs:&lt;br /&gt;Graciela Selaimen, NUPEF [Brasil, EN/ES/PT]&lt;/p&gt;
&lt;p&gt;Renzo Lavin, Asociación Civil por la Igualdad y la Justicia [Argentina, ES]&lt;br /&gt;Hisham Almiraat, Global Voices Advocacy [Morocco, EN]&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Each breakout session will have one designated rapporteur, one note-taker, and a module to work around.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/state-surveillance-and-human-rights-camp'&gt;https://cis-india.org/news/state-surveillance-and-human-rights-camp&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-12-21T07:19:55Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/livemint-december-16-2012-surabhi-agarwal-govt-likely-to-issue-guidelines-to-clarify-it-rules-soon">
    <title>Govt likely to issue guidelines to clarify IT rules soon</title>
    <link>https://cis-india.org/news/livemint-december-16-2012-surabhi-agarwal-govt-likely-to-issue-guidelines-to-clarify-it-rules-soon</link>
    <description>
        &lt;b&gt;Norms relate to the role of intermediaries such as telcos, Web service providers, others on hosting content online, writes Surabhi Agarwal. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;The article was first &lt;a class="external-link" href="http://www.livemint.com/Home-Page/Nh4Bh1zyFjiCRPyTAilR3L/Govt-likely-to-issue-guidelines-to-clarify-IT-rules-soon.html"&gt;published&lt;/a&gt; in LiveMint on December 16, 2012.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;After the government issued guidelines on the controversial Section 66A of the Information Technology Act, it is expected to soon come out with similar guidelines to clarify the Information Technology (Intermediaries Guidelines) Rules, 2011, that have also been heavily criticised.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A  senior official of the department of electronics and information  technology said that even though the government is not looking at  amending the overall Act as the legislative process for that would be  time consuming, it is hoping to issue guidelines within a week.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  rules were notified in April 2011 with the aim of clearly defining the  role of intermediaries—including telcos, Internet and web-hosting  service providers and search engines—while hosting content on their  networks and websites along with ensuring some level of due diligence by  them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However,  this led to outrage among the Internet community as the rules mandated  hosts or owners of the websites to take action against “objectionable  content” within 36 hours of receiving a complaint. Experts argued that  the rules could lead to censorship attempts with some intermediaries  complying with illegitimate requests to remove content from websites in a  bid to avoid litigation.&lt;/p&gt;
&lt;p&gt;The government official said that there had been some confusion about what it meant to take action within 36 hours.&lt;/p&gt;
&lt;p class="p" id="U1904108412963yXG" style="text-align: justify; "&gt;“While the intent was to ensure that intermediaries take cognizance of  the request and initiate some proceeding on it, it has been misconstrued  as removing content within 36 hours in some cases,” this person said.&lt;/p&gt;
&lt;p class="p" style="text-align: justify; "&gt;The  official added that the government was looking at clarifying issues  such as this. “We are currently studying the representations sent by  different stakeholders on the rules.”&lt;span class="person"&gt;&lt;/span&gt;&lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Subho%20Ray"&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p class="p" style="text-align: justify; "&gt;&lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Subho%20Ray"&gt;Subho Ray&lt;/a&gt;&lt;/span&gt;,  president, Internet and Mobile Association of India (IAMAI), said that  the term “act” should be replaced by “acknowledge” to ensure that it is  not wrongly interpreted as removing content within 36 hours.&lt;/p&gt;
&lt;p class="p" style="text-align: justify; "&gt;“We  have also requested the time period to be extended to 72 hours as 36  hours is sometimes too short a period if it falls during the weekend,”  he said.&lt;/p&gt;
&lt;p class="p" style="text-align: justify; "&gt;While  only some clauses address issues such as national interest, public  order and security restrictions under which content can be removed, “the  remainder of grounds includes private claims such as content which  ‘belongs to another person’, or otherwise infringes proprietary rights,  or is ‘defamatory’,” said Bangalore-based think tank Centre for Internet  and Society (CIS) in its representation, of which &lt;i&gt;Mint&lt;/i&gt; has a  copy. Moreover, other terms, such as ‘grossly harmful’, ‘harassing’ and  ‘disparaging’, are “terminologically indeterminate and purely  subjective”, the representation said. It also said that “the  intermediary guidelines create a two-track system by which private  censorship is legitimized online”.&lt;/p&gt;
&lt;p class="p" style="text-align: justify; "&gt;IAMAI’s  recommendations include clearly defining who can qualify as the  ‘affected person’ eligible to post a complaint on content, which has  currently been left to the discretion and determination of the  intermediary.&lt;/p&gt;
&lt;p class="p" style="text-align: justify; "&gt;Ray’s representation also said the rules put the burden of interpretation and acting upon third-party content on the intermediary. “This, we believe is the function of the judiciary and not the intermediaries,” it said.&lt;/p&gt;
&lt;p class="p" style="text-align: justify; "&gt;Guidelines, while bringing some initial clarity, may not be enough, said an executive at a top technology firm who did not want to be identified. “To ensure long-term solutions to some of the issues highlighted, the Act needs to be amended eventually,” he said.&lt;/p&gt;
&lt;p class="p" style="text-align: justify; "&gt;Late last month, the government promised to issue guidelines to the states that complaints under the controversial Section 66A of the IT Act, which criminalizes “causing annoyance or inconvenience” online or electronically, can be registered only with the permission of an officer at or above the rank of deputy commissioner of police, and inspector general in metro cities. However, even in the case of Section 66A, it did not amend the terms in the Section that are said to be vague and subject to interpretation.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/livemint-december-16-2012-surabhi-agarwal-govt-likely-to-issue-guidelines-to-clarify-it-rules-soon'&gt;https://cis-india.org/news/livemint-december-16-2012-surabhi-agarwal-govt-likely-to-issue-guidelines-to-clarify-it-rules-soon&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-12-20T05:24:14Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-hindu-opinion-lead-december-15-2012-chinmayi-arun-the-trouble-with-hurried-solutions">
    <title>The Trouble with Hurried Solutions</title>
    <link>https://cis-india.org/internet-governance/blog/the-hindu-opinion-lead-december-15-2012-chinmayi-arun-the-trouble-with-hurried-solutions</link>
    <description>
        &lt;b&gt;The World Conference on International Telecommunication showed that countries are not yet ready to arrive at a consensus on regulation and control of the Internet&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: center; "&gt;Chinmayi Arun's Op-ed was &lt;a class="external-link" href="http://www.thehindu.com/opinion/lead/the-trouble-with-hurried-solutions/article4200604.ece?homepage=true"&gt;published&lt;/a&gt; in the Hindu on December 15, 2012.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The World Conference on International Telecommunication (WCIT) that concluded on December 14 saw much heated debate. Some countries wanted to use the International Telecommunication Union (ITU) to gain intergovernmental control of the World Wide Web. Some saw it as an opportunity to democratise the Internet, by replacing U.S. and corporate domination of Internet policy, with a more intergovernmental process. Others insisted that the Internet must be left alone.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The result is that after many days’ deliberations, there was no consensus. The amended International Telecommunication Regulations (ITRs) document has not yet been signed by over 50 countries, of which some like the United States have refused to sign altogether, while others have said that they will need to consult with their national governments before signing.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This article discusses the broader issue under question, which is, whether ITU is the best forum to solve the cross-border problems that arise in relation to the Internet.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;WCIT, ITU and ITRs&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The ITU has been creating international policy from the days in which the telegraph was prevalent. Although it is now a United Nations agency, its existence predates the U.N. As technology evolved, forcing the telegraph to give way to the telephone, the ITU created new standards for telephony. It even rechristened itself from ‘International Telegraph Union’ to ‘International Telecommunications Union’.&lt;br /&gt;&lt;br /&gt;The ITU performs an essential role in ensuring that multiple states with their varying technology, standards and legal systems, are able to interconnect and co-ordinate. Its harmonising rules and standards make co-ordination easier and cheaper than having each state come to an agreement with every other state. The ITRs within the ITU framework facilitate co-ordination by creating binding rules for member states.&lt;br /&gt;&lt;br /&gt;Some countries’ proposals for the amendment of the ITRs would have affected content on the Internet substantially. However, after prolonged negotiation, the final draft that was under consideration contained an explicit statement excluding such content from the ITRs’ purview. This draft also came with a resolution that made reference to states’ elaborating their Internet related public policy positions in ITU fora, which was a source of controversy.&lt;br /&gt;&lt;br /&gt;Some of the initial suggestions like Russia’s controversial proposal would have given the ITU greater sway over the Internet, permitting it to lay down global standards. These standards may have encouraged countries to inspect data transmitted across the Internet to check whether it is undesirable content raising serious privacy and freedom of speech concerns, especially in countries that do not protect these rights.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The global standards created by the ITU would have permeated to the companies that create the web-based applications that we use, and the resulting law and technological choices would have affected individual users.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Internet governance&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The ITU makes its decisions using a traditional model that only seeks consensus between governments, and this is far removed from the way in which the Internet has been governed thus far. Therefore, although expanding the ITU’s mandate to the Internet may seem natural to those who have followed its evolution mirroring the evolution of information technology, the ITU’s manner of functioning is viewed by many as being at odds with the more multi-stakeholder and ad hoc system used to build Internet policy.&lt;br /&gt;&lt;br /&gt;In the 1990s, John Perry Barlow proclaimed that cyberspace was outside national borders, and questioned the authority and legitimacy of a national government’s attempts to govern it. Over the years, it has become clear that national governments can exert jurisdiction in cyberspace: filtering content, launching surveillance of users, and creating law that impacts citizens’ behaviour online directly and indirectly.&lt;br /&gt;&lt;br /&gt;However, governments’ exertion of will on Internet users is tempered greatly by the other forces that have a strong influence on the Internet. User-behaviour and content often depend on the policies of major service providers like Google, Yahoo, Twitter and Facebook.&lt;br /&gt;&lt;br /&gt;Key standards and functions like the allocation of domain names and developing of Internet standards are managed by organisations like ICANN and IETF, which are not governmental organisations. Features like user anonymity are based on technological choices on the World Wide Web. Therefore, governments face significant obstacles and counterbalancing power when they attempt to impose their will on citizens online.&lt;br /&gt;&lt;br /&gt;The ITU can weigh this power balance in favour of governments. Many fear that more government power will lead to more censorship, surveillance and stifling of the innovation that is integral to the evolution of Internet. But others support ITU intervention, in the belief that an international inter-governmental regulatory body would be more accountable, and would prevent corporate abuse of power.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Several of the aforementioned corporations, as well as regulatory bodies under question, are headquartered in the United States. There are those who see this as excessive U.S. influence on the Internet, eroding the sovereignty of other states, which have relatively limited influence over what their citizens can transmit and access online. These people see the ITU as a forum that can democratise Internet Governance, giving states shared influence over the web. However, this shared influence is resisted by those who find that the U.S. influence offers them more leverage and protection for their freedom of speech, than increased influence of countries that threaten this internationally accepted human right.&lt;br /&gt;&lt;br /&gt;Powerful arguments in favour of increased ITU involvement include highlighting the dangers of abandoning the Internet to the free market. It is true that markets need some regulation to guard against malfunction and abuse of power by stronger players. However, the significant question is not whether these markets should be regulated, but how they should be regulated. Unfortunately, many of the arguments that supported expansion of the ITU’s mandate failed to establish why the ITU is the best solution to the problems plaguing the Internet, rather than being the most readily available reaction.&lt;br /&gt;&lt;br /&gt;Any regulatory intervention must have very clear objectives, and some estimate of its likely impact. The intervention must not be considered in isolation but in contrast with other ways to achieve the same goals. Although some of the serious transnational issues plaguing the Internet need international solutions, the ITU, at least in its current avatar, is not necessarily the best remedy. It also remains unclear exactly what effect ITU intervention would have on the Internet — whether it would really offer solutions as intended, or whether it would prove more detrimental than useful, condoning of human rights violations and slowing the blistering innovation that is characteristic of the Internet.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Lack of consensus&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Therefore, some of the initial concerns expressed by the countries that refused to sign the ITRs were legitimate. However, the final ITRs document addressed many of these concerns. The dissent emerged over the insertion of text in the preamble that recognised member states’ rights to access international telecommunication networks. These rights, being expressed only in the preamble, are not enforceable, even if they express intentions that are unacceptable to some.&lt;br /&gt;&lt;br /&gt;The debates at the WCIT made it clear that the world is not yet ready to come to a unified position on this subject. Perhaps the ITU’s continuation in its path towards increasing, and making effective, multi-stakeholder participation will be the unifying factor some day, if it evolves into a forum which everyone sees as sufficiently democratic, transparent and accountable for Internet policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(The writer is Assistant Professor of Law at National Law University,  Delhi, and a Fellow of the Centre for Internet and Society, Bangalore.  She attended the WCIT from December 3-14)&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-hindu-opinion-lead-december-15-2012-chinmayi-arun-the-trouble-with-hurried-solutions'&gt;https://cis-india.org/internet-governance/blog/the-hindu-opinion-lead-december-15-2012-chinmayi-arun-the-trouble-with-hurried-solutions&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>chinmayi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>WCIT</dc:subject>
    
    
        <dc:subject>ITU</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-12-20T04:23:08Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/india-today-rahul-jayaram-december-18-2012-the-freedom-of-expression-debate">
    <title>The freedom of expression debate: The State must mend fences with The Web</title>
    <link>https://cis-india.org/news/india-today-rahul-jayaram-december-18-2012-the-freedom-of-expression-debate</link>
    <description>
        &lt;b&gt;A fortnight after her arrest, Renu Srinivasan spends her free time singing Ashley Tisdale's number Suddenly. The lyrics - Suddenly people know my name, suddenly, everything has changed - resonate with the story of her life ever since she 'liked' and 'shared' her friend, Shaheen Dhada's, 21, controversial post regarding Shiv Sena chief Bal Thackeray's funeral on Facebook on November 18 and got arrested for it.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article by Rahul Jayaram was &lt;a class="external-link" href="http://indiatoday.intoday.in/story/renu-srinivasan-shaheen-dhada-arrest-facebook/1/238397.html"&gt;published in India Today&lt;/a&gt; on December 18, 2012. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;She's now flooded with "hundreds" of messages on FB; some congratulatory, others abusive and gets at least a dozen friend requests on the social networking site. When Renu went to the doctor last week, two constables accompanied her.&lt;br /&gt;&lt;br /&gt;"All of a sudden, there's too much attention on me," says the Botany graduate from Dandekar College and a budding singer who is making new friends in the virtual world. There's, however, a word from caution from her father P.A. Srinivasan: "Don't comment on controversial issues you don't understand."&lt;br /&gt;&lt;br /&gt;Bloggers are careful. Krish Ashok, a well-known blogger is disappointed with the government's lack of engagement with India's surging online community. In a blog post in August 2010, he made fun of the Ramayana and the fact that women couldn't enter the Sabarimala temple in Kerala. A group called Hindu Janajagruti Samiti threatened to take him to court. Ashok spoke to his lawyer.&lt;br /&gt;&lt;br /&gt;"I was amazed. She said no individual could take action against me. But a group or organisation could," he says. Since then, he has become more aware of his Internet rights.&lt;br /&gt;&lt;br /&gt;Gursimran Khamba, who has over 30,000 followers on Twitter, kept his cool during Thackeray's death and funeral. When all the media went gaga over him, televising his family photo albums, Khamba, re-tweeted reports and accounts of the Shiv Sena's role during the Mumbai riots of 1992-93. "In my head, I am not courageous to say anything about it myself," he says. He didn't want to incite. He'd rather help his followers get a more nuanced picture of a venerated leader.&lt;br /&gt;&lt;br /&gt;Palghar and after, has made Ashok think. "I would reduce the number of provocative posts I might make," he says. Khamba says he will stick to comedy and doesn't believe in offence for the sake of offending although "taking offence is our national sport."&lt;br /&gt;&lt;br /&gt;It is a shame, for the Internet is growing in India like nobody's business. It's the medium of the age.&lt;br /&gt;&lt;br /&gt;According to comScore, a company that measures Internet trends, India is the fastest growing online market in the last 12 months among BRIC nations. There were 44.5 million unique visitors in July 2011 and in July 2012 there were 62.6 million unique visitors. That is, a growth of 44 per cent in one year. The total Internet usage of 124.7 million users in July 2012, that is, a 41 per cent growth from last year (July 2011).&lt;br /&gt;&lt;br /&gt;With 124 million users as of July 2012, India has an Internet penetration of 10 per cent. 75 per cent of India's online users are below the age of 35 making it one of the youngest Net-connected populations. 39.3 per cent of India's Internet population consists of females. It has the highest growth seen among 15 to 24 male and female segments. India has 56.2 million Facebook users and 4.1 million Twitter users. Facebook had 35.3 million users in July 2011 and it jumped to 52.1 million in July 2012. That's a growth of 47% in just one year!&lt;br /&gt;&lt;br /&gt;Growth of the Internet is one thing. Freedom of the Internet is another. Freedom House, an American organisation that tracks political and civil liberties worldwide, is blunt in its assessment. India is third in terms of Internet penetration, after the United States and China. Before November 2008, government control over the Internet was limited. All that changed after the November 2008 Mumbai attacks.&lt;br /&gt;&lt;br /&gt;Since then it says, "The need, desire, and ability of the Indian government to monitor, censor, and control the communication sector have grown. Given the range of security threats facing the country, many Indians feel that the government should be allowed to monitor personal communications such as telephone calls, email messages, and financial transactions. It is in this context that Parliament passed amendments to the Information Technology Act (ITA) in 2008, expanding censorship and monitoring capabilities. This trend continued in 2011 with the adoption of regulations increasing surveillance in cyber cafes. Meanwhile, the government and non-state actors have intensified pressure on intermediaries, including social media applications, to remove upon request a wide range of content vaguely defined as "offensive" and potentially pre-screen user-generated content. Despite new comprehensive data protection regulations adopted in 2011, the legal framework and oversight surrounding surveillance and interception remains weak, and several instances of abuse have emerged in recent years."&lt;br /&gt;&lt;br /&gt;Over this year we have had the cases of cartoonist Aseem Trivedi being put in jail and later released in September. In April, Ambikesh Mahaptra of Jadavpur University in Kolkata was arrested for a cartoon poking fun at West Bengal chief minister Mamta Banerjee and Railway Minister Mukul Roy. In October, Ravi, owner of plastic packaging material factory was arrested and let off on bail for joking about Finance Minister P. Chidambaram's son, Karti. The list gets longer. The Web and the State are at loggerheads. Why?&lt;br /&gt;&lt;br /&gt;Lawyers and bloggers haul up Internet laws. And for such a community, we have laws like Section 66 (A) of the Information Technology Act of 2000. The law states that "any person who sends by means of a computer resource or a communication device, any information that is grossly offensive or has menacing character," can be booked for online crime.&lt;br /&gt;&lt;br /&gt;Legal experts think Section 66 (A) and the whole of the IT Act of 2000, needs revisiting. According to cyber lawyer Pavan Duggal, Section 66 (A) "is a vanilla provision that can be used for anything online."&lt;br /&gt;&lt;br /&gt;Section 66(A) seeks to empower the police and the complainant. "The words 'grossly offensive' and 'menacing character' of Section 66 (A) have no definition given. Normal, legitimate bona fide conversation between boyfriend and girlfriend at noble times online is fine. Once relationship sours, and they are gone."&lt;br /&gt;&lt;br /&gt;"It's not clear what the purpose of Section 66A is.  It's like having a single provision covering murder, assault, intimidation, and nuisance, and prescribing the same penalty for all of them," says Pranesh Prakash of the Center for Internet and Society, Bangalore. Terminology and the law's purpose are massive concerns.&lt;br /&gt;&lt;br /&gt;"The extent of the ambiguity of Section 66A is worrying. Laws need to be very clear about what they want to achieve. If it is murder, then it must say murder. If its attempted murder, it must be clear it is attempted murder. Section 66 A is trying to do too many things at the same time. Its canvas is too vast," says Rajeev Chandrasekar.&lt;br /&gt;&lt;br /&gt;As a country, we look to imitate the West, and often copy it badly. Some wonder if we need to mime the West. Pranesh Prakash thinks the Indian Constitution is stronger on free speech grounds than the (unwritten) UK Constitution, and the judiciary has wide powers of judicial review of statutes (i.e., the ability of a court to strike down a law passed by Parliament as 'unconstitutional').&lt;br /&gt;&lt;br /&gt;Judicial review of statutes does not exist in the UK (with review under its EU obligations being the exception) as they believe that Parliament is supreme, unlike India. Putting those two aspects together, a law that is valid in the UK might well be unconstitutional in India for failing to fall within the eight octagonal walls of the reasonable restrictions allowed under Article 19(2).&lt;br /&gt;&lt;br /&gt;Rajeev Chandrasekar thinks the Brits got it right. During the London riots of June 2011, "the UK government kept a tab on social media networking sites so as to check incitement, he says. It was a good example of clear legislation and effective execution, in an extreme scenario." To defuse online paranoia he wants the government to have a multi-stakeholder arrangement in fixing IT laws. This must involve users, IT companies, cyber cafe owners and the government. The State must mend fences with the Web.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/india-today-rahul-jayaram-december-18-2012-the-freedom-of-expression-debate'&gt;https://cis-india.org/news/india-today-rahul-jayaram-december-18-2012-the-freedom-of-expression-debate&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2013-01-07T10:30:21Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/livemint-december-6-2012-surabhi-agarwal-ayodhya-trending-on-twitter-sparks-censorship-concerns">
    <title>Ayodhya trending on Twitter sparks censorship concerns</title>
    <link>https://cis-india.org/news/livemint-december-6-2012-surabhi-agarwal-ayodhya-trending-on-twitter-sparks-censorship-concerns</link>
    <description>
        &lt;b&gt;On the 20th anniversary of the Babri Masjid demolition, the ShauryaDiwas, Ayodhya and Babri Masjid hashtags were trending on Twitter all day, with almost 2,500 messages sent over 48 hours.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p class="mceContentBody documentContent" style="text-align: justify; "&gt;Surabhi Agarwal's article was &lt;a class="external-link" href="http://www.livemint.com/Specials/xFbIgqDW1qRzngiWdvl9NP/Ayodhya-trending-on-Twitter-sparks-censorship-concerns.html"&gt;published in LiveMint&lt;/a&gt; on December 6, 2012. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="mceContentBody documentContent" style="text-align: justify; "&gt;The tag ShauryaDiwas was used by supporters of the demolition and was used in half the total number of tweets.&lt;/p&gt;
&lt;p class="mceContentBody documentContent" style="text-align: justify; "&gt;Experts said the public display of extreme views on a  social networking platform has the potential to create social unrest,  leaving the government with few options but to regulate content, in turn  fuelling the Internet censorship debate further.&lt;/p&gt;
&lt;p class="mceContentBody documentContent" style="text-align: justify; "&gt;A senior government official said that in a situation in  which there are serious national security implications, the government  has no option but to "block content" in order to stop communal sentiment  from flaring up.&lt;/p&gt;
&lt;p class="mceContentBody documentContent" style="text-align: justify; "&gt;According to social web analytics firm Social Hues, the tweets reached an audience of 456,000 followers. However, according to &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Vinita%20Ananth"&gt;Vinita Ananth&lt;/a&gt;&lt;/span&gt;,  chief executive of Social Hues, there were also messages that "condemned the call for ShauryaDiwas” tagging it ShameDiwas. "New  platforms like Twitter are providing real-time feedback on public  sentiment, which is unprecedented."&lt;span class="person"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="mceContentBody documentContent" style="text-align: justify; "&gt;&lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Ashis%20Nandy"&gt;Ashis Nandy&lt;/a&gt;&lt;/span&gt;,  political and social analyst, said that even though very few Indians  are on platforms such as Twitter, communications over them give a hint  of what a certain section of the society is thinking about.&lt;/p&gt;
&lt;p class="mceContentBody documentContent" style="text-align: justify; "&gt;"It is a small representation of the middle class, which  is driven by ideology and some of the people with extreme opinions may  also belong to this group, so perhaps it could have some security  implications," he said.&lt;/p&gt;
&lt;p class="mceContentBody documentContent" style="text-align: justify; "&gt;Fringe groups such as those above tend to take extreme positions to get attention, said &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Sunil%20Abraham"&gt;Sunil Abraham&lt;/a&gt;&lt;/span&gt;, executive director of Bangalore-based research organization, the Centre for Internet and Society.&lt;/p&gt;
&lt;p class="mceContentBody documentContent" style="text-align: justify; "&gt;Having learnt their lessons after the recent  Assam-related panic, intelligence agencies are now keeping a close watch  on the Internet, another government official said.&lt;/p&gt;
&lt;p class="mceContentBody documentContent" style="text-align: justify; "&gt;"If necessary, posts will be removed through legitimate  ways," the official said, adding that a debate was underway about how to  strike a balance between freedom of speech and the lawful requirement  of agencies. "Mischief by a few people creates nuisance in society. The  government is now looking for ways through which it can regionally block  or remove inflammatory tweets. We don’t want to curb freedom of speech  and the government doesn’t have any such intentions either," the  official said.&lt;/p&gt;
&lt;p class="mceContentBody documentContent" style="text-align: justify; "&gt;Hate messages on social media had sparked a panic exodus  of people from the north-east from cities such as Bangalore, Pune and  Chennai in August.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/livemint-december-6-2012-surabhi-agarwal-ayodhya-trending-on-twitter-sparks-censorship-concerns'&gt;https://cis-india.org/news/livemint-december-6-2012-surabhi-agarwal-ayodhya-trending-on-twitter-sparks-censorship-concerns&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Social Media</dc:subject>
    

   <dc:date>2012-12-12T10:38:01Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/telegraphindia-december-3-2012-gs-mudur-66a-cut-and-paste-job">
    <title>66A ‘cut &amp; paste job’</title>
    <link>https://cis-india.org/news/telegraphindia-december-3-2012-gs-mudur-66a-cut-and-paste-job</link>
    <description>
        &lt;b&gt;The controversial Section 66A of the Information Technology Act has borrowed words out of context from British and American laws, according to lawyers here who are calling it a “poor cut-and-paste job”.&lt;/b&gt;
        &lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;GS Mudur's article was &lt;a class="external-link" href="http://www.telegraphindia.com/1121203/jsp/frontpage/story_16268138.jsp#.UMbCXaxWGZR"&gt;published in the Telegraph&lt;/a&gt; on December 3, 2012. Pranesh Prakash and Snehashish Ghosh are quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Section 66A, passed by Parliament in December 2008, draws on laws passed in the UK in 1988 and 2003 and the US in 1996. But some lawyers say that, unlike 66A, those foreign laws impose only reasonable restrictions on freedom of speech.&lt;br /&gt;&lt;br /&gt;"The text of 66A seems to be the result of a cut-and-paste job done without applying the mind," said Snehashish Ghosh, a lawyer with the Centre for Internet and Society (CIS), a non-government organisation in Bangalore.&lt;br /&gt;&lt;br /&gt;Some of the language in Section 66A is taken from Britain’s Malicious Communications Act (MCA) of 1988, which begins with the words: "Any person who sends to another person...."&lt;br /&gt;&lt;br /&gt;This provision in MCA 1988, Ghosh said, is intended to curb malicious messages from one person to another. "It does not cover a post on a social website or an electronic communication broadcast to the world."&lt;br /&gt;&lt;br /&gt;Section 66A has also borrowed words from Britain’s Communications Act of 2003 which, Ghosh said, is intended to prevent abuse of public communication services and does not directly deal with messages sent by individuals.&lt;br /&gt;&lt;br /&gt;Government officials have said that 66A has also plucked language from the US Telecommunications Act of 1996.&lt;br /&gt;&lt;br /&gt;This was a landmark legislation that overhauled America’s telecommunication law by taking into account the emergence of the Internet and changing communications technologies. Among other things, it made illegal the transmission of obscene or indecent material to minors via computers.&lt;br /&gt;&lt;br /&gt;"Section 66A in its current form fails to define a specific category (context) as defined in the laws from where it has borrowed words," Ghosh said. "This is what has led to its inconsistent and arbitrary applications."&lt;br /&gt;&lt;br /&gt;Ghosh and his colleagues say that 66A, through an "absurd" combination of borrowed and ambiguous language, curbs freedom of expression and threatens people with three years’ imprisonment for certain offences that would otherwise, under existing Indian Penal Code (IPC) provisions, draw a fine of only Rs 200.&lt;br /&gt;&lt;br /&gt;Section 66A(b), for example, clubs together the offences of persistently repeated communications that might lead to "annoyance", "inconvenience", "danger", "insult", "injury", "criminal intimidation", "enmity", "hatred", and "ill-will".&lt;br /&gt;&lt;br /&gt;This is "astounding and unparalleled", said Pranesh Prakash, policy director at the CIS, who has posted an analysis of Section 66A on the NGO’s institutional blog.&lt;br /&gt;&lt;br /&gt;"We do not have such a provision anywhere but in India’s information technology law."&lt;br /&gt;&lt;br /&gt;This is “akin to... providing equal punishment for calling someone a moron (insult) and threatening to kill someone (criminal intimidation),” Prakash wrote in the blog, where he has listed existing IPC provisions that can deal with the offences that 66A seeks to cover.&lt;br /&gt;&lt;br /&gt;Lawyers have also questioned 66A’s effect of criminalising what the existing IPC would label as civil offences. For example, Prakash said, while the punishment under IPC for criminal nuisance is Rs 200, the penalty imposed by 66A is jail for up to three years.&lt;br /&gt;&lt;br /&gt;Several sections in the IPC, they said, can effectively address offences that 66A attempts to address exclusively for electronic communications. For example, the IPC has sections for defamation (499 and 500), outraging religious sentiments (295) and obscenity (292).&lt;br /&gt;&lt;br /&gt;"We do not require extraordinary laws when existing laws suffice," Ghosh said.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/telegraphindia-december-3-2012-gs-mudur-66a-cut-and-paste-job'&gt;https://cis-india.org/news/telegraphindia-december-3-2012-gs-mudur-66a-cut-and-paste-job&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-12-11T05:43:50Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
