<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2471 to 2485.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/news/kids-on-facebook"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/a-net-of-hatred"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/fifth-meeting-of-two-sub-groups-on-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/session-m4-international-public-policy-and-internet-governance-issues-pertaining-to-the-internet"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/open-letter-to-hillary-clinton"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/constitutional-analysis-of-intermediaries-guidelines-rules"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/internet-censorship"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/indian-draft-dna-profiling-act"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/all-night-for-hackers"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/medical-privacy-conference-report"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/march-2012-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/may-2012-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/april-2012-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/feb-2012-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/january-2012-bulletin"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/news/kids-on-facebook">
    <title>The kids are all on Facebook</title>
    <link>https://cis-india.org/news/kids-on-facebook</link>
    <description>
        &lt;b&gt;In one photo, Prerna stands in front of the mirror, back slightly arched, a fringe covering her left eye, one hand on her hip, pursing her lips. The other hand holds the camera in a steadfast grip. Below this picture are almost a hundred likes and comments. There is nothing unusual as such about this photo on Facebook. Prerna, however, is just 11.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This article by Shikha Kumar was published in &lt;a class="external-link" href="http://www.dnaindia.com/lifestyle/report_the-kids-are-all-on-facebook_1712078"&gt;Daily News &amp;amp; Analysis&lt;/a&gt; on July 8, 2012. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;"Stop looking so pretty" and "OMG! You’re so thin" are some of the comments that appear under the picture of this young girl.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In another picture, Diksha’s wavy hair cascades around her face as she fixes the camera with an unwavering stare. The caption reads — "I love my hair. I know I sound like a conceited bitch." Diksha is 12.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Children like Prerna and Diksha, who are under the age of 13, are officially not allowed to open accounts on Facebook. But they are among the 7.5 million under-13 users of the popular social networking website, according to a study released by Consumer Reports last year. The study further revealed that among such users, 5 million were under the age of 10. Closer home, a McAfee-Synovate survey conducted across various cities in India revealed that 64% kids in the age group of 9-12 are members of social networking sites.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;You may find the trend daunting since ‘kids’ are supposed to step out and socialise, rather than chat online. However, it’s a reality that we have no choice but to accept as a modern reality.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Internally, Facebook seems to have accepted the trend. As revealed by a news reports last month, the company is readying a technology that will allow children younger than 13 to open accounts and operate them in a secure manner. Possible approaches include connecting the children’s Facebook accounts with their parents’, and giving parents the control over who befriends their children on the website.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The New ways of being in touch with ‘friends’&lt;/b&gt;&lt;br /&gt; The move has once again put the spotlight on the ways in which social networking is changing the way children interact with each other.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Namrata Bhoomkar, 13, logs on to the website at least two to three times a day. "I check my news feeds and see what my friends are up to. If you’re not on Facebook, you can’t be updated with what’s happening with everybody," she says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apart from finding out what their friends are up to, kids also spend a lot of time sharing their pictures, and are proficient at photo editing software like Photoshop, Picasa and Photobooth to make their pictures more striking.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another way of standing out is to give pictures creative captions. "I google random quotes on love and life and then put those up as captions on the pictures. I get a lot of likes for it, which makes me feel nice," says 13-year old Sakshi Shrivastav.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Having No clue about privacy settings&lt;/b&gt;&lt;br /&gt; However, while the kids use many of Facebook’s features, few are aware of the risks or the privacy settings available on the website that can protect them. In the McAfee-Synovate survey, 32% of the kids were not aware of any online threats, such as cyber hacking, stalking, bullying and identity thefts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As a result, lessons are often learnt the hard way. "A 39-year-old man started sending me messages saying that I’m very pretty. My father found out and told me to disable my account. I was very upset since all my friends are on Facebook. So finally, my sister helped me activate my privacy settings," says an underage girl on the condition of anonymity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Anandita Mishra, a security expert at McAfee Cybermum India, says that she does not advocate kids’ presence on Facebook. "There are several dangers; there might be paedophiles lurking, strangers pretending to be younger or your child may be a victim of online abusing or bullying," she says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With the new timeline format, even though one’s account is protected, the cover pictures are always visible to everybody. In such cases, Mishra recommends either keeping no cover photo or keeping pictures of favourite cartoon characters.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the face of so many risks, some experts believe that Facebook’s move to officially allow younger kids under some form of parental supervision is a step in the right direction.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Children’s interaction online should always be under parental supervision. Censorship and control is not the responsibility of the government, but of parents," points out Sunil Abraham, director, Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Abraham believes that if this technology comes into force, children will consume content more responsibly. This will also give them the chance to go out in the real world and get some real communication experience, the old-fashioned way.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"They will even behave responsibly. If the account is supervised, they are less likely to engage in bullying, abusing, sexting or any other unacceptable forms of social behaviour," he adds.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While she is not totally in favour of this development, McAfee’s Mishra sees no other way because parents are unable to control their children. "Seven million kids are online with or without parental supervision. You cannot have cyber policing of children. It is important to inculcate the right values about responsible internet usage," she says.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/kids-on-facebook'&gt;https://cis-india.org/news/kids-on-facebook&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-07-20T06:24:17Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/a-net-of-hatred">
    <title>A Net of Hatred</title>
    <link>https://cis-india.org/news/a-net-of-hatred</link>
    <description>
        &lt;b&gt;Citizens worlwide have been resisiting the threat of internet censorship that governments seek to impose — and justifiably so. But while we have seen democratic revolutions such as the Arab Spring emerge from the power of the net, it is increasingly becoming clear to even the most ardent defender 
&lt;/b&gt;
        &lt;p&gt;This article by Samar Khurshid was published in the &lt;a class="external-link" href="http://www.hindustantimes.com/technology/SocialMedia-Updates/A-net-of-hatred/SP-Article1-889152.aspx"&gt;Hindustan Times&lt;/a&gt; on July 14, 2012. Pranesh Prakash is quoted in it.&lt;/p&gt;
&lt;h3&gt;The Problem&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;On the internet, anyone can say anything and largely get away with it, making it a near-perfect means for fanatics. India, in particular, with its religious diversity and history of communal tension, constantly struggles with this issue. Earlier this week, the phrase ‘Internet Hindus’ was trending on popular social media website, Twitter, brought to the fore by a discussion about online religious fundamentalism on Al Jazeera, a news network based in Qatar. The panelists sought to put in context the largely vocal community of internet users who support right-wing Hindu ideology. These ‘Internet Hindus’ have become synonymous with an "abusive, vocal, uncouth group of people who subscribe to Hindu nationalism," said one panellist. The tribe of ‘Twitter jihadis’ is now responding with equal fervour with mostly anonymous fundamentalists who are vocal with their message.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The problem," says Pranesh Prakash, programme manager at the Bangalore-based Centre for Internet and Society (CIS), "is that internet conversations become extreme. Liberals don’t get embroiled in heated arguments while fundamentalists, dedicated to extreme ideologies, tend to win out." Web censorship, he adds, is in vain as the net is too vast to control.&lt;br /&gt;&lt;br /&gt;Online fanaticism is not limited to Hindus. For long, extremist Islamic groups have taken their jihad on to the world wide web. Of late, jihadist groups have mushroomed on social media to expand their base of support. The trend was observed by BBC Islamic Groups Analyst, Murad Batal al-Shishani, on Twitter. Even the recent arrest of Lashkar-e-Toiba’s handler of the 26/11 Mumbai terror attacks, Syed Zabiuddin Ansari alias Abu Jundal, was possible after he was tracked on Facebook trying to recruit young Muslims for 'the cause'. The Afghanistani Taliban, in fact, has its own news website with a running Twitter feed. The site offers the ‘voice of jihad’ with events propagandised from the Taliban perspective – American and Afghan soldiers are referred to as puppets, minions, cowards and even terrorists.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Islamic groups, however, are not a major cause of concern for India, according to Prasanto K Roy, a tech analyst and social media commentator. "Jihadist groups are a relatively small minority in India. But right wing Hindu groups have majority support."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The greatest issue, says CIS’s Prakash, is that these fundamentalists are increasingly well-organised and make great efforts to build a stronger extremist position. They are encouraged, he says, by the likes of Janata Party president Subramanian Swamy, who believes that minorities in India should only be given political rights after they acknowledge their Hindu ancestry; Francois Gautier, a French-Indian writer and journalist who supports the cause of Hindutva; and Zakir Naik, a Mumbai-born Islamic televangelist whose controversial opinions often attracts criticism. Prakash also says that on the net, "Many people are not only manufacturing opinion but also manufacturing facts as the basis of that opinion. These falsities are fuelling Right-wing anger."&lt;/p&gt;
&lt;h3&gt;The Solution&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Governments are hard pressed to effectively censor and discourage otherwise reprehensible dialogue. The UPA attempted to tackle what they see as ‘objectionable content’. In December 2011, based on a petition, the government prosecuted internet giants like Yahoo, Google, Twitter and Facebook for hosting offensive material.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Legally, various sections of the Indian penal code, notably 153A – promoting enmity between communities – can be applied in cases of hate speech. But online speech falls short of being prosecutable, says sociologist Dipankar Gupta. "Something can only be (considered) hate speech if it directly incites people or results in violence, like statements made by Varun Gandhi in the 2009 Lok Sabha elections. Online fundamentalist speech does not cross the boundaries of the law. And we cannot prosecute someone for their opinion."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When a Twitter post asked the question whether certain people could be violating section 153A, the response was far from reasonable, or even civil. One person wrote, "We p*ss on you and your secular section." Another urged others to report the user to Twitter as spam and have him blocked. And of course all this comes with the barrage of by now infamous Twitter terms like 'sickular', 'pseudo secular' or 'Congress Dirty Tricks Department'. They have thousands of followers, even their own websites and are extremely organised.&lt;br /&gt;&lt;br /&gt;"The larger question is whether we should tackle this legally or develop other methods," says Siddharth Narayan, a lawyer with the Alternative Law Forum. "Hate-speech laws have been misused in the past. We don’t need a clampdown on internet freedom. We just need a more nuanced application of existing legislation," he says.&lt;br /&gt;&lt;br /&gt;When looking at net-speak, it is tough to distinguish between generic statements of hate and a genuine call to violence. The internet has no intermediaries; no editors to censure your posts. Then perhaps it bodes ill for India’s secular democracy, and for secularism in the world at large, that uncurbed dialogue, which seeks to crystallise hate between communities, is spreading like an epidemic. CIS’s Prakash says the government cannot cope with this. “But we as society should be strong enough to respond, even if we disagree."&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/a-net-of-hatred'&gt;https://cis-india.org/news/a-net-of-hatred&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-07-20T06:09:19Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/fifth-meeting-of-two-sub-groups-on-privacy">
    <title>Fifth Meeting of the two Sub-Groups on Privacy Issues under the Chairmanship of Justice AP Shah</title>
    <link>https://cis-india.org/news/fifth-meeting-of-two-sub-groups-on-privacy</link>
    <description>
        &lt;b&gt;The fifth meeting of the two sub-groups on privacy issues will be held on July 22, 2012 under the chairmanship of Justice AP Shah, former chief justice of Delhi High Court.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The next meeting of the two Sub-Groups (5th Meeting) on privacy issues under the Chairmanship of Justice A.P. Shah, former Chief Justice of Delhi High Court is scheduled to be held on July 22, 2012 at 11.00 a.m. This was announced vide notice No. M-13040/47/2011-CIT&amp;amp;I, dated the 10th June, 2012.&lt;/p&gt;
&lt;p&gt;A copy of the notice was sent to the following individuals:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Justice AP Shah, Chairman&lt;/li&gt;
&lt;li&gt;Dr. Kamlesh Bajaj&lt;/li&gt;
&lt;li&gt;Usha Ramanathan&lt;/li&gt;
&lt;li&gt;Sunil Abraham&lt;/li&gt;
&lt;li&gt;Prashant Reddy&lt;/li&gt;
&lt;li&gt;Prof. Arghya Sengupta&lt;/li&gt;
&lt;li&gt;Shri Som Mittal&lt;/li&gt;
&lt;li&gt;Shri Gulshan Rai&lt;/li&gt;
&lt;li&gt;Mala Dutt&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt; &lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/fifth-meeting-of-two-sub-groups-on-privacy'&gt;https://cis-india.org/news/fifth-meeting-of-two-sub-groups-on-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Meeting</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-08-07T10:11:25Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/session-m4-international-public-policy-and-internet-governance-issues-pertaining-to-the-internet">
    <title>Session M4 – International Public Policy and Internet Governance Issues Pertaining to the Internet</title>
    <link>https://cis-india.org/news/session-m4-international-public-policy-and-internet-governance-issues-pertaining-to-the-internet</link>
    <description>
        &lt;b&gt;The Asia Pacific Regional Internet Governance Forum 2012 is being organised at Aoyama Campus, Aoyama Gakuin University in Tokyo on July 20, 2012. Sunil Abraham will be speaking in the session on international public policy and internet governance issues pertaining to the internet. The event is organised by APrIGF.Asia&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The Internet is a vital strategic communications infrastructure for the Asia Pacific region, and so the future evolution of the Internet is a hugely important policy issue for individuals, business and government alike across the region. The region is the most  diverse and dynamic in the world and the formulation of a unified and coherent regional view on such an important policy issue is very challenging.  With internet governance becoming increasingly important, efforts are underway by some countries in Asia Pacific and elsewhere to change the nature of internet governance; moving from a relatively open multi-stakeholder model to a more closed, government led system of governance. What is the best evolution Internet governance path for Internet users of Asia Pacific to follow?  This workshop will discuss the competing paths currently under discussion and seek to offer delegates a comprehensive understanding of the issues.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Panel&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Moderator &lt;/b&gt;– Mr. Jeremy Malcolm, Consumers International&lt;/p&gt;
&lt;h3&gt;Speakers&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Hasanul Aaq Inu,  &lt;i&gt;Member, Bangladesh National Parliament; Chairman, Parliamentary Standing Committee for Ministry of Posts and Telecommunications&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;Atsushi Umino, &lt;i&gt;Director for International Policy Coordination, Global ICT Strategy Bureau (MIC)&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;Sunil Abraham, &lt;i&gt;Centre for Internet &amp;amp; Society, India&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;David Farrar, &lt;i&gt;Director of Curia Market Research&lt;/i&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Panelists&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Naoya Bessho, &lt;i&gt;General Counsel, Chief Compliance Officer, Yahoo Japan Corporation&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;William Drake, &lt;i&gt;International Fellow &amp;amp; Lecturer, Media Change &amp;amp; Innovation Division, IPMZ, University of Zurich, Switzerland&lt;/i&gt;&lt;/li&gt;
&lt;hr /&gt;
&lt;/ul&gt;
&lt;p&gt;For the full agenda, &lt;a class="external-link" href="http://2012.rigf.asia/session-m4-international-public-policy-and-internet-governance-issues-pertaining-to-the-internet/"&gt;click here&lt;br /&gt;Click&lt;/a&gt; to read the original&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/session-m4-international-public-policy-and-internet-governance-issues-pertaining-to-the-internet'&gt;https://cis-india.org/news/session-m4-international-public-policy-and-internet-governance-issues-pertaining-to-the-internet&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-07-19T05:59:40Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/open-letter-to-hillary-clinton">
    <title>Open letter to Hillary Clinton on Internet Freedom</title>
    <link>https://cis-india.org/internet-governance/open-letter-to-hillary-clinton</link>
    <description>
        &lt;b&gt;Last month I wrote an open letter to Hillary Clinton. It was based on a presentation I that I made during a panel discussion at a Google sponsored conference titled Internet at Liberty 2012 in Washington DC on May 24, 2012.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Sunil Abraham's article was &lt;a class="external-link" href="http://thinkingaloud.in/ArticleComments.aspx?ArtId=1097"&gt;published&lt;/a&gt; in Thinking Aloud on July 17, 2012&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The question that my panel tried to grapple with was "In a world where nearly nine out of ten Internet users are not American, what is the responsibility of United States institutions in promoting internet freedom?" My co-panelists were Cynthia Wong who is with the Centre for Democracy and Technology, Mohamed El Dahshan a writer and journalist, Dunja Mijatovic the OSCE Representative on Freedom of the Media.&lt;br /&gt;&lt;br /&gt;Internet freedom is a curious subject. It is a technology specific liberty - for a moment consider television freedom. The US has more Muslims than India has Christians. But Indian television in the average hotel comes in hundreds and there are at least 3 channels of Christian preaching. But US television in hotels is usually less than 50 channels with no channels of Islamic preaching. In fact even the reception of secular channels from the Islamic World like Al Jazeera is still difficult in America. Can we accuse the US of not having television freedom since their television features Christian evangelists but not Muslim evangelists? Should it be part of India's foreign policy to evangelize television freedom given that there is a large domestic industry with clear international potential?&lt;br /&gt;&lt;br /&gt;In an ideal world - citizens will possess technology-neutral freedom to communication and expression. But nothing can be farther from the truth. Communication technologies are regulated using a plethora of policies and practices and very often these have a chilling effect on freedoms.&lt;br /&gt;&lt;br /&gt;The following is my response to the technology-specific demands for deregulation from the US Government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Text of the Open Letter[2]&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Recognise Access to Knowledge (A2K) as pre-condition for freedom of expression&lt;/b&gt;: There is no difference between aggressive enforcement of imbalanced and obsolete intellectual property laws and censorship. The need of the moment is not more enforcement to protect obsolete business models against the everyday practices of ordinary netizens but rather the reform of intellectual property law (levies, broader exceptions and limitations, pools, statutory and compulsory licenses, prizes etc.) to keep pace with innovations in technology and the production of knowledge and culture.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Recognise privacy as pre-condition for security:&lt;/b&gt; The alleged tension between privacy and security is a false dichotomy. Blanket surveillance by design compromises security. &lt;b&gt;Surveillance is like salt in cooking — essential in very small quantities but dangerous even if slightly in excess. Blanket surveillance technologies are only going make things easier for — and will only serve as targets for — current and future online villains.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Don't lose the moral high-ground:&lt;/b&gt; Remember, with great power comes great responsibility. Other countries are waiting to cherry pick from your worst practices. Also don't use trade agreements to selectively export components of US policy without the accompanying safeguards for civil liberties and rights. Citizens in oppressive and authoritarian states are depending on the US government, courts and civil society to protect their rights online. Don't undermine their capacity to shame their governments by holding up the US as the example of 'how to get things right'. They urgently need the US government to lead by example.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Recognise that freedom of expression has become a trade issue:&lt;/b&gt; This is unfortunate but this is true — thanks to the precedent set by the developed world when it came to asymmetric trade negotiations. Just as the US is interested in protecting the interests of its corporations in global markets — other governments are keen protect the interests of their own corporations. The optimal solution in this case is where all countries and corporations are equally unsatisfied. This will remain a continuing discussion.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Address developing country anxieties around critical internet infrastructure:&lt;/b&gt; Security by obscurity will no longer do — security by transparency through open standards, technologies and governance is the only way to fears and build a trust-worthy and secure Internet for all of us. For example, there is urgent need to develop standards for supply chain audits of information infrastructure. The US has dealt with the fear of back doors by banning the use of hardware and software from countries it does not trust. The developing world is not sure if there are back-doors in hardware and software manufactured by US corporations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Time has comes to address this and other related anxieties.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Appreciate diversity in nomenclature:&lt;/b&gt; 'Freedom' and 'liberty' may be appropriate terms to use in the United States of America. But openness may be more in countries that are not yet full and robust liberal democracies. The Internet Governance Forum for example uses 'openness' instead of 'freedom'. Openness is also preferred because it includes 'freedom of expression', 'freedom of information' (also known as right to information, access to information or public and 'free knowledge' (free software, open standards, open content, open access, open data, open educational resources, etc.)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Don't be too instrumental in your interventions:&lt;/b&gt; Don't undermine the local credibility of like-minded civil society, think-tanks and research organisations by being too directive in your support. Managerialism will undermine reform of policies and practices in information societies and so does inappropriate/premature monitoring and evaluation (for example, looking for explicit attribution in terms of casual connections between your actions and outcomes). There is a need to support greater reflexivity in the global information society by developing institutional capacity in developing countries through unrestricted funding. True critical thinking is the foundation of both scientific progress and open societies. Go out of your way to find and support those who disagree with you. Protect the plural foundation of our networked society!&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Video&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham was a speaker along with Cynthia Wong, Mohamed El Dahshan and Dunja Mijatovic in Plenary IV Debate 3 at the &lt;b&gt;Internet at Liberty 2012 &lt;/b&gt;event&lt;b&gt; &lt;/b&gt;organised by Google on May 24, 2012. &lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="http://www.youtube.com/embed/9YMte4hdYu0" width="320"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.youtube.com/watch?v=9YMte4hdYu0"&gt;View the video on YouTube&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/open-letter-to-hillary-clinton'&gt;https://cis-india.org/internet-governance/open-letter-to-hillary-clinton&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Video</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2012-09-04T08:28:02Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/constitutional-analysis-of-intermediaries-guidelines-rules">
    <title>Constitutional Analysis of the Information Technology (Intermediaries' Guidelines) Rules, 2011</title>
    <link>https://cis-india.org/internet-governance/constitutional-analysis-of-intermediaries-guidelines-rules</link>
    <description>
        &lt;b&gt;Ujwala Uppaluri provides a constitutional analysis of the Information Technology (Intermediaries' Guidelines) Rules notified in April 2011, and examines its compatibility with Articles 14, 19, 21 of the Constitution of India.&lt;/b&gt;
        &lt;h2&gt;Summary of Salient Provisions&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The &lt;b&gt;Information Technology (Intermediaries’ Guidelines) Rules, 2011&lt;/b&gt; (‘&lt;b&gt;the Intermediary Guidelines&lt;/b&gt;’)&lt;b&gt; &lt;/b&gt; were notified in April, 2011 as rules enacted in exercise of powers conferred under section 87(2)(zg) read with Section 79 of the Information Technology Act, 2000 (as amended) (‘&lt;b&gt;the IT Act&lt;/b&gt;’).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rule 2 of the Intermediary Guidelines imports definitions for key terms from the IT Act. Notably, this includes an importation of Section 2 (w) by &lt;b&gt;Rule 2 (i)&lt;/b&gt;, which defines “intermediary” broadly in the following terms:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“&lt;i&gt; “intermediary”, with respect to any particular electronic records, means any person who on behalf of another person receives, stores or transmits that record or provides any service with respect to that record and includes telecom service providers, network service providers, internet service providers, web-hosting service providers, search engines, online payment sites, online-auction sites, online-market places and cyber cafes;&lt;/i&gt;”&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rule 3 whose margin note indicates that it is limited to due diligence measures to be adhered to by intermediaries nevertheless also raises other liabilities by creating a regime to censor content, pre-publication as well as once content has been made publically available online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Sub-rule (2) of Rule 3&lt;/b&gt; inventories the classes of content which are deemed actionable, with only clause (i), clause (c), clause (e) and, arguably clause (h), of that rule addressing the national interest, public order and security restrictions cognizable under Article 19(2) of the Constitution. The remainder of grounds includes private claims such as content which “belongs to another person”&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt;, or otherwise infringes proprietary rights&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt;, or is “defamatory”&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt;. Still others are terminologically indeterminate and purely subjective, with the terms “grossly harmful”, “harassing” and “disparaging” being examples.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This sub-rule also includes a number of redundancies. While there is reference to libelous as well as defamatory content in clause (b), it is well established that Indian law does not admit of the former concept, instead dissolving the common law distinction between the two to treat them alike.&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; There is also clause (e), which prohibits content which is all ready illegal for violating the provisions of an existing statute and the residuary phrasing of the clause (b)’s reference to content which is “otherwise unlawful in any manner whatever”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The sub-rules immediately following the list in Rule 3(2) address the consequences of users publishing content listed in that rule:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Sub-rule (3) of rule 3&lt;/b&gt; provides that intermediaries will not knowingly deal in any manner whatsoever, whether by hosting, publication, transmission or otherwise, with any content of the types that are listed in the previous clause.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Sub-rule (4) of rule 3&lt;/b&gt; creates a complaints mechanism in respect of content incompatible with Rule 3 (2) by requiring intermediaries to disable access to offending content within 36 hours of obtaining knowledge themselves or on being brought to “actual knowledge” by an “affected person”. The Intermediaries Guidelines do nothing to clarify what would amount to “actual knowledge”, to indicate in unambiguous terms, which parties would have sufficient &lt;i&gt;locus&lt;/i&gt; to bring complaints in order to be deemed an “affected person” for the purposes of these provisions or to suggest that there is a procedure or timeline for action by the intermediary, such that requirements such notice to the author of the content and time for the preparation of a defence by the author and/or the intermediary are accounted for.  Rule 3 (4) also requires that all information which is taken down be preserved, along with “associated records” for a duration of atleast ninety days for investigative purposes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Sub-rule (5) of rule 3 &lt;/b&gt;mandates that intermediaries inform users that non-compliance with the Intermediary Guidelines, &lt;i&gt;inter alia&lt;/i&gt;, is a ground for the exercise of their right to terminate access or usage rights and remove non-compliant content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finally, &lt;b&gt;sub-rule (11) of rule 3 &lt;/b&gt;requires intermediaries to name Grievance Officers to receive complaints on any matters relating to the computer resources made available by the intermediary, including for non-compliance or harm in terms of Rule 3 (2). This officer is bound to respond to the complaint within one month from the date of receipt of the complaint.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the result, the Intermediary Guidelines create a two-track system by which private censorship is legitimized online. In the first place, intermediaries can take down content on their own motion where they are of the opinion that the content falls under any of the grounds enumerated in Rule 3 (2) or, alternatively, do so in response to a complaint, in terms of Rule 3 (4).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition to the provisions relating to censorship, the Intermediary Guidelines also provide for information to be given over to government agencies making a request with lawful authority and in writing under &lt;b&gt;sub-rule (7) of rule 3&lt;/b&gt;, for data protection measures in accordance with the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Information) Rules, 2011 notified under Section 43A of the IT Act to be adhered to (&lt;b&gt;sub-rule (8) of rule 3&lt;/b&gt;) and for intermediaries to report and share information realting to cyber security with CERT-In (&lt;b&gt;sub-rule (9) of rule 3&lt;/b&gt;).&lt;/p&gt;
&lt;h2&gt;Areas of Infirmity&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;It is doubtful whether the Intermediary Guidelines could pass constitutional muster, on several grounds:&lt;/p&gt;
&lt;h3&gt;Compatibility with Article 19 (1) (a) and (2)&lt;/h3&gt;
&lt;p&gt;&lt;i&gt;(a) Applicability of Article 19 (2) to Rule 3 (2) Grounds&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In &lt;i&gt;Romesh Thappar v. State of Madras&lt;/i&gt;&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; the Supreme Court held that the freedom of speech and expression under Article 19(1)(a) includes the freedom to propogate and disseminate ideas. It also held that very narrow and stringent limits govern the permissibility of legislative abridgment of the right of free speech. Ordinarily, any abridgement of free speech by means of censorship must be compatible with one or more of the grounds provided for under Article 19 (2), and the Supreme Court held in &lt;i&gt;Express Newspapers (Private) Ltd. v. Union of India&lt;/i&gt;&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt;that limitations on the exercise of the Article 19(1)(a) right which do not fall within Article 19(2) cannot be upheld.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further, the right to free speech applies across all media, and the internet is no exception. In &lt;i&gt;Secretary, Ministry of Information and Broadcasting v. Cricket Association of Bengal&lt;/i&gt;&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt;, the Supreme Court reflected the understanding that where media are different, such that the treatment accorded to them must be different in accordance with that indicia of difference, it will treat them as such in order to uphold fundamental rights. More specifically, in &lt;i&gt;Ajay Goswami v. Union of India&lt;/i&gt;&lt;a href="#fn8" name="fr8"&gt;[8]&lt;/a&gt;, the Supreme Court opined (in &lt;i&gt;obiter&lt;/i&gt;) that the internet, as a unique medium of expression, deserved a different standard of protection than other mediums that have preceded it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rule 3 (2) of the Intermediary Guidelines, which lists the grounds for censorship, is not complaint with Article 19 (2) for two reasons:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;First&lt;/i&gt;, many of the grounds mentioned have no constitutional basis whatsoever. Rule 3 (2) prohibits, &lt;i&gt;inter alia&lt;/i&gt;, content which “grossly harmful”, “harassing”, “invasive of another’s privacy”, “hateful”, “disparaging”, “grossly offensive” or “menacing”, in addition to content which is simply illegal, and should be actionable &lt;i&gt;ex post&lt;/i&gt; rather than prohibited &lt;i&gt;ex ante &lt;/i&gt;(content infringing intellectual property under Rule 3 (2) (d), for example). Most of the terms employed are not legal standards, but merely subjective indicators of personal sensitivities, while still others though legal do not figure in Article 19 (2). Since the whole scheme of the Intermediary Guidelines is premised on these extra-constitutional grounds, they are, as a whole, subject to being to being struck down.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Second&lt;/i&gt;, the restriction is unreasonable because instead of preserving rights online in accordance with &lt;i&gt;Ajay Goswami&lt;/i&gt;, the Intermediary Guidelines unjustifiably abridge the right to speak and receive information on the internet. The Intermediary Guidelines overreach in their scope, by including as actionable content which is not itself punishable when communicated via any other medium. For example, disparaging speech, as long as it is not defamatory, is not criminalised in India, and cannot be because the Constitution does not allow for it. Similarly, content about gambling in print is not unlawful, but now all Internet intermediaries are required to remove any content that promotes gambling.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(b) Nature of Censorship: Directness of Censorship and Legitimacy of Private and Prior Censorship&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In judging whether a statute is constitutional, the effect that the statute will have on the fundamental rights of citizens must be examined. The Supreme Court held in &lt;i&gt;Bennett Coleman &amp;amp; Co. v. Union of India&lt;/i&gt;&lt;a href="#fn9" name="fr9"&gt;[9]&lt;/a&gt; that the test was to examine whether the &lt;i&gt;effect&lt;/i&gt; of an impugned action was to abridge a fundamental right, notwithstanding its object.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further, while it is true in light of the Supreme Court’s holdings in &lt;i&gt;Prakash Jha Productions v. Union of India&lt;/i&gt;&lt;a href="#fn10" name="fr10"&gt;[10]&lt;/a&gt;&lt;i&gt; &lt;/i&gt;that pre-censorship is permissible within the Indian constitutional scheme, this permissibility is qualified. Prior censorship may be undertaken only within closely regulated circumstances, such as under the grounds in the Cinematograph Act, 1952, and even then, only by an appropriately empowered governmental entity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Intermediary Guidelines create mechanisms for the abridgement of the freedom of speech which amount to indirect and unjustifiable prior censorship, contrary to Article 19 (2):&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Firstly&lt;/i&gt;, while the state does not itself censor under these rules, it has empowered private, commercial entities to do so &lt;i&gt;vide &lt;/i&gt;the Intermediary Guidelines. These rules thus transfer the executive power of censorship to private intermediaries. This amounts to an indirect form of censorship for the purposes of the &lt;i&gt;Bennett Coleman &lt;/i&gt;test and has the result of increased censorship on the Internet because the state granted legislative sanction to such a system, although it does not censor by itself or through a state agency. The Intermediary Guidelines, and specifically Rule 3 (4) read with Rule 3 (2), place a burden on intermediaries to decide on the lawfulness of content as a pre-condition for their statutory exemption from liability. An intermediary, on receiving a complaint, to ensure that it continues to receive the protection offered by Section 79 of the IT Act, will be forced to disable access to the content posted by a user. Thus, the direct effect of the rules will be strict censoring of content posted on-line by users. The rules will have a direct effect on the fundamental right of freedom of speech and expression guaranteed under Article 19(1) of the Constitution unreasonable restrictions on fundamental rights, that are imposed by a statute or executive orders are liable to be struck down as unconstitutional.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Secondly&lt;/i&gt;,&lt;i&gt; &lt;/i&gt;while prior censorship is permissible only in a strictly limited range of cases, the Intermediary Guidelines allow for an unrestrained and unlimited degree of prior and arguably invisible censorship. Rule 3 of the Intermediary Guidelines clearly envisages such a system of prior censorship. Whereas the consequences for passively displaying content incompatible with Rule 3(2) would be a complete waiver and dissolution of the Section 79 immunity that would ordinary accrue to neutral intermediaries, intermediaries or complainants have no obligation in respect of ensuring the tenability of complaints and the grounds cited in them. The Intermediary Guidelines do not draw a distinction between arbitrary actions of an intermediary and take-downs subsequent to a request. Further, the inclusion of a residuary clause in Rule 3 (2) (b) allowing pre-censorship of content which is “unlawful in any manner whatever”, also indicates that the Intermediary Guidelines allow the use of the exceptional instrument of not only allows private censorship, but that they actively encourage it as the default rule rather than the exception without any justification whatsoever.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(c)&lt;/i&gt;&lt;i&gt; Vagueness and Overbreadth: Possibility for Over-Censorship&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Vagueness in the terms of a restriction to free speech is grounds for it to be struck down, even where the ground is apparently broadly constitutional. The Supreme Court held in &lt;i&gt;Sakal Papers (P) Ltd. v. Union of India&lt;/i&gt;&lt;a href="#fn11" name="fr11"&gt;[11]&lt;/a&gt; that the Constitution must be interpreted in order to enable citizens to enjoy their rights to fullest measure, subject to limited permissible restrictions. In &lt;i&gt;Romesh Thapar&lt;/i&gt;&lt;a href="#fn12" name="fr12"&gt;[12]&lt;/a&gt;&lt;i&gt; &lt;/i&gt;the Supreme Court also held that a legislation authorizing the imposition of restrictions on free speech in language wide enough to cover restrictions which are permissible as well as extra-constitutional will be held to be wholly unconstitutional.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The grounds listed in Rule 3 (2) of the Intermediary Guidelines are highly subjective, private interest grounds which are not defined either in the Intermediary Guidelines or in the IT Act itself. These include terms such as “grossly harmful”, “harassing”, “invasive of another’s privacy”, “hateful”, “disparaging”, “grossly offensive” or “menacing”. Consequently, the Intermediary Guidelines constitute unreasonable restrictions on freedom of speech, with Rule 3 (2) containing vague terms which, in addition to falling beyond the purview of Article 19(2), cover only private and subjective grounds, incapable of objective definition or application.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further, the Intermediary Guidelines do no precisely define the term “affected person” employed in Rule 3 (4). Thus, complaints from &lt;i&gt;any&lt;/i&gt; party, including those uninvolved or unaffected by content must all be complied with, without qualification.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the result, the vagueness of the grounds in Rule 3 (2) and the diffuse terminology of “affected person” leaves Rule 3 (2) grounds serving as placeholders for whatever claim a complainant, having no &lt;i&gt;locus&lt;/i&gt; whatsoever, chooses to bring, without regard for whether it is constitutional or even legal. Online content is thus treated as presumptively illegal and take down of content as the presumptive course of action. Additionally, there is a further consequence to the vagueness and overbreadth of the terms in Rule 3 (2): because of the indeterminacy in the grounds listed thereunder, intermediaries tasked with enforcing the law will tend to err on the side of caution and censor, rather than keep speech accessible online. There is empirical evidence to show that cautious intermediaries will over-censor and over comply with complaints in order to avoid liability under Section 79 of the IT Act.&lt;a href="#fn13" name="fr13"&gt;[13]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(d) Contravention of International Human Rights Norms &amp;amp; Horizontal Application&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The censorship regime constructed by the Intermediary Guidelines is non-compliant not only with domestic requirements under the Constitution, but also with India’s obligations under international human rights law under Articles 19 of the Universal Declaration of Human Rights (‘&lt;b&gt;UDHR&lt;/b&gt;’) and the International Covenant on Civil and Political Rights (‘&lt;b&gt;ICCPR&lt;/b&gt;’), under the UN Human Rights Council’s  Report of the Special Rapporteur Frank La Rue on the Promotion and Protection of the Right to Freedom of Opinion and Expression (2011)&lt;a href="#fn14" name="fr14"&gt;[14]&lt;/a&gt;(‘&lt;b&gt;Special Rapporteur’s Report&lt;/b&gt;’) and the UN Human Rights Council Resolution on Internet Freedom (2012)&lt;a href="#fn15" name="fr15"&gt;[15]&lt;/a&gt; (‘&lt;b&gt;UN Internet Freedom Resolution&lt;/b&gt;’).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the ICCPR as well as the UDHR guarantee a right to free speech “through any…media of…choice” in their respective Articles 19, the Special Rapporteur’s Report and the UN Internet Freedom Resolution recognize the need for special efforts to be undertaken by states to preserve free speech on the internet. The former document justifies censorship only in the most limited circumstances and makes specific mention of the commercial interests that may be implicated in delivering free speech.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Through the Intermediary Guidelines,  the Indian state creates a system by which the right to free speech can be systematically violated by private and undisclosed entities and even empowers them to do so, without imposing any constitutional safeguards whatsoever. Thus, egregious violations of the right to free speech and expression are a direct and inevitable consequence of the Intermediary Guidelines. To the degree that the Indian Supreme Court has enagaged with free speech online, it appears from &lt;i&gt;Ajay Goswami &lt;/i&gt;that it would apply standards consistent with international law obligations to rectify the Intermediary Guidelines to meet them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further, the Indian Supreme Court has held, where necessary for their true enjoyement, that fundamental rights may involve a degree of horizontality in their application. In other words, private action could be guided by fundamental rights, such as in &lt;i&gt;Vishaka v. State of Rajasthan&lt;/i&gt;&lt;a href="#fn16" name="fr16"&gt;[16]&lt;/a&gt; which evidences the Supreme Court’s willingness to hold that private entities could be held to constitutional and international human rights law standards where that is necessary for the real rather than illusory enjoyment of fundamental rights.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As a result, the Intermediary Guidelines are also liable to be struck down for their failure to recognize and account for the role of private interests while empowering them with the right to curtail fundamental rights.&lt;/p&gt;
&lt;h3&gt;Compatibility with Article 21&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; (a) Adverse Impact on Privacy (and consequently on Free Speech)&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A constitutional right to privacy has been read into Article 21’s guarantee of life and personal liberty in several instances by the Supreme Court. The State is consequently under an obligation to refrain from interfering, whether by itself or through any of its agencies, with private lives and spaces. By the same coin, laws which encourage unwarranted state or societal intrusions into private life will contravene the victim’s Article 21 right. In &lt;i&gt;People’s Union for Civil Liberties v. Union of India&lt;/i&gt;,&lt;a href="#fn17" name="fr17"&gt;[17]&lt;/a&gt; the Supreme Court held that Article 21 privacy protected individuals against the interception and monitoring of private communications by the state in the absence of sufficient safeguards.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Also, an individual’s privacy interests in information relating to him are not dissolved merely because information is not confidential or because another entity has some property interest in that information. In &lt;i&gt;District Registrar and Collector, Hyderabad v. Canara Bank&lt;/i&gt;&lt;a href="#fn18" name="fr18"&gt;[18]&lt;/a&gt;, the Supreme Court recognized that even where the search of private documents was concerned, Article 21 protected “persons not places”, &lt;i&gt;i.e.&lt;/i&gt;, that the privacy interest did not vest in property or communications but, rather, in the rightsholder himself.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Intermediary Guidelines include no limits whatsoever on the scope of disclosures that government agencies can demand or expect to retain, in contravention of Article 21.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Specifically, Rule 3 (4), which requires data retention for a statutory minimum of ninety days of content taken down as well as “associated records”, violates users’ rights to privacy. In addition to the financial and technical burden (in storing and securing data) imposed by the Intermediary Guidelines in requiring potentially unlimited data retention by intermediaries, there is no clarity as to what or how much information precisely must be held in the form of “associated records”. Instead of subjecting data to limited and closely qualified retention by private intermediaries, and thus limiting the impairment of the fundamental right to privacy to the minimum possible degree necessary, Rule 3 (4) imposes blanket data retention requirements.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further, Rule 3 (7), which makes any information held by an intermediary subject to being disclosed to the government upon request is also inconsistent with the requirement that the right to life and personal liberty be violated only in accordance with fair, just and reasonable procedures. Notwithstanding that Rule 3 (7) is consistent with Section 67C of the IT Act and specific rules framed in regard to the surveillance of communications, it is also unconstitutional because it fails to include any safeguards whatsoever in the process of surveillance. These would include, as minimum obligatory conditions in light of &lt;i&gt;PUCL&lt;/i&gt;, the requirement that the surveilled be informed of the surveillance and be allowed to challenge its propriety &lt;i&gt;ex ante &lt;/i&gt;or its procedural regularity &lt;i&gt;ex post&lt;/i&gt;, or atleast administrative or judicial review &lt;i&gt;ex parte&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(b)  Non-compliance with Due Process and Natural Justice Requirements&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article 21 explicitly includes a due process guarantee. This means that the right to life and personal liberty, and its constituent rights, can be interfered with only through constitutionally consistent procedures. A cornerstone of fair procedure, compliant with the rule of law, is the notion of natural justice. Consequently, Article 21 contemplates that the procedure by which fundamental rights are curtailed will satisfy natural justice principles.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In &lt;i&gt;Maneka Gandhi v. Union of India&lt;/i&gt;,&lt;a href="#fn19" name="fr19"&gt;[19]&lt;/a&gt; the Supreme Court held that natural justice was not a rigid or mechanical term, but one that referred to those practices and principles that would ensure&lt;i&gt; &lt;/i&gt;“fair play in action”&lt;i&gt;.&lt;/i&gt; In addition the Court held that all deviations&lt;i&gt; &lt;/i&gt;from natural justice requirements must be supported by a sufficiently justificatory “compelling state interest”. Specifically, in &lt;i&gt;Union&lt;/i&gt; &lt;i&gt;of&lt;/i&gt; &lt;i&gt;India&lt;/i&gt; &lt;i&gt;v.&lt;/i&gt; &lt;i&gt;Tulsiram&lt;/i&gt; &lt;i&gt;Patel&lt;/i&gt;&lt;a href="#fn20" name="fr20"&gt;[20]&lt;/a&gt;, the Supreme Court held that the principle of natural justice required the satisfaction of the &lt;i&gt;audi alteram partem&lt;/i&gt; rule, which consisted of several requirements, including the requirement that a person against whose detriment an action is taken be informed of the case against him and be afforded a full and fair opportunity to respond.  Finally, in &lt;i&gt;M.C. Mehta v. Union of India&lt;/i&gt;&lt;a href="#fn21" name="fr21"&gt;[21]&lt;/a&gt; the Supreme Court held that the absence of due notice and a reasonable opportunity to respond would vitiate any holding to the rightsholder’s detriment. &lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Intermediary Guidelines fail to satisfy the requirement of natural justice, and particularly the rights to prior notice as well as that of the affected party to a hearing:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;By requiring that content be taken down swiftly (within 36 hours of complaint, under Rule 3 (4)) and by failing to require the author of the content to be informed of the complaint and its contents, the Intermediary Guidelines violate the author’s right to notice and consequently affect his/her right to prepare and present a defence at all. In practice, authors of content which is the subject of a complaint may never know of the complaint or even of the fact of the take down, given the absence of any mechanism under the rules by which they could have been informed. In a scheme for silent, invisible censorship, authors are never afforded an opportunity to challenge the take down, just as they have no opportunity to rebut the initial complaint. In addition, at any event, it is the intermediary, a biased private entity whose immunity under Section 79 of the IT Act could be called into question based on the outcome, who must make the determination as to the legality of the content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While there is nothing to prohibit intermediaries from informing authors on the receipt of a complaint, the limited time within which action must be taken means that such intermediaries would risk liability for non-compliance with the compliant and a waiver of their Section 79 immunity, where the content is not taken down, whether because communication does not occur within the 36 hour timeframe or because an author elects to resist takedown. By creating a system in which takedowns necessarily occur in response to complaints, irrespective of their legitimacy, the Intermediary Guidelines presume and rule in favour of the complainants and in favour of (private) censorship instead of presuming in favour of the preservation of the fundamental right to free speech, or even maintaining neutrality between the two ends.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Compatibility with Article 14&lt;/h3&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The guarantee of “equal protection of laws” requires equality of treatment of persons who are similarly situated, without discrimination &lt;i&gt;inter se&lt;/i&gt;. It is a corollary that that persons differently situated cannot be treated alike. &lt;i&gt;In&lt;/i&gt;&lt;i&gt; E.&lt;/i&gt;&lt;i&gt; P.&lt;/i&gt;&lt;i&gt; Royappa&lt;/i&gt;&lt;i&gt; v. State&lt;/i&gt;&lt;i&gt; of&lt;/i&gt;&lt;i&gt; Tamil&lt;/i&gt;&lt;i&gt; Nadu&lt;/i&gt;&lt;a href="#fn22" name="fr22"&gt;[22]&lt;/a&gt;&lt;i&gt; the&lt;/i&gt;&lt;i&gt; Supreme&lt;/i&gt;&lt;i&gt; Court&lt;/i&gt;&lt;i&gt; held&lt;/i&gt;&lt;i&gt; that arbitrary or unfair actions necessarily run counter to Article 14. The Supreme Court explained in M/S&lt;/i&gt;&lt;i&gt; Sharma&lt;/i&gt;&lt;i&gt; Transport&lt;/i&gt;&lt;i&gt; v.&lt;/i&gt;&lt;i&gt; Government&lt;/i&gt;&lt;i&gt; of&lt;/i&gt;&lt;i&gt; Andhra Pradesh&lt;/i&gt;&lt;a href="#fn23" name="fr23"&gt;[23]&lt;/a&gt;&lt;i&gt; that&lt;/i&gt; arbitrary actions are actions which are unreasonable, non-rational done capriciously or without adequate determining principle, reason or in accordance with due judgment. In addition, Article 14 also requires that state action be reasonable. I&lt;i&gt;n&lt;/i&gt;&lt;i&gt; Mahesh&lt;/i&gt;&lt;i&gt; Chandra&lt;/i&gt;&lt;i&gt; v.&lt;/i&gt;&lt;i&gt; Regional&lt;/i&gt;&lt;i&gt; Manager,&lt;/i&gt;&lt;i&gt; U.P.&lt;/i&gt;&lt;i&gt; Financial&lt;/i&gt;&lt;i&gt; Corporation&lt;/i&gt;&lt;a href="#fn24" name="fr24"&gt;[24]&lt;/a&gt;&lt;i&gt; it was held that discretion must be exercised objectively, and that what is not fair or just will be unreasonable, and subject to being struck down as unconstitutional.&lt;/i&gt;Additionally, Article 14 also requires that the basis upon which classifications are undertaken for the purposes of same or differential treatment be reasoned and fair. The Supreme Court held in &lt;i&gt;Sube Singh v. State of Haryana&lt;/i&gt;&lt;a href="#fn25" name="fr25"&gt;[25]&lt;/a&gt; that the state’s failure to support a classification on the touchstone of reasonability, with the existence of intelligible differentia or the rational basis of achieving a stated object, will be ground for it to be held arbitrary and unreasonable. Finally, all state action having the potential to curtail Article 14 must be reasonable, justifiable, undertaken in &lt;i&gt;exercise of &lt;/i&gt;constitutional powers and be informed and guided by public interest. The Supreme Court held to this effect i&lt;i&gt;n&lt;/i&gt;&lt;i&gt; Kasturi&lt;/i&gt;&lt;i&gt; Lal&lt;/i&gt;&lt;i&gt; Lakshmi&lt;/i&gt;&lt;i&gt; Reddy&lt;/i&gt;&lt;i&gt; v.&lt;/i&gt;&lt;i&gt; State&lt;/i&gt;&lt;i&gt; of&lt;/i&gt;&lt;i&gt; Jammu&lt;/i&gt;&lt;i&gt; and&lt;/i&gt;&lt;i&gt; Kashmir&lt;/i&gt;&lt;a href="#fn26" name="fr26"&gt;[26]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Intermediary Guidelines contravene Article 14 on the following grounds:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;First&lt;/i&gt;, intermediaries who are not similarly situated are treated alike. Rule 2 (i) imports the IT Act’s omnibus definition of the term “intermediary”, such that all classes of intermediaries, ranging from intermediaries which control the architecture of the internet and the hardware  which enables it to run (such as ISPs and DNS providers) to intermediaries that enable content creation, sharing and communications online (such as email clients, content aggregators, social networking services and content hosts), are empowered to censor and are required to comply with complaints regarding content. Intermediaries, for the purposes of the IT Act and the Intermediary Guidelines, thus refer to a large and disparate group of providers of services enabling access to as well as use of the Internet. Reasoned state action must recognize that their liabilities must necessarily vary with the specific type of service that each provides. The Intermediary Guidelines fail to do so, and are consequently incompatible with Article 14.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Second&lt;/i&gt;, the Intermediary Guidelines treat the same or similar content across media differently, without apparent justification. More specifically, users of the internet are unfairly discriminated against. All of the Rule 3 (2) grounds which are not explicitly mentioned in Article 19 (2) in particular reflect this discriminatory, unreasoned treatment. To illustrate, the prohibition under Rule 3 (2) on the display of any content online when it relates to gambling treats speakers using the internet differently from speakers communicating this content via any other medium of communication. Given that nothing in the nature of the medium itself attaches a new or different character to the content, criminality or liability must attach to such content in a medium-neutral fashion. So, while content qualifying as seditious under law remains so across media, whether it be print, audio or video broadcast or online, the same as not the case for communications on the internet. In other words, while gambling itself may be prohibited under law, speech or expression involving it is nowhere prohibited under law. While such content is legal and protected across print and broadcasting media, the same content is liable to take down online. This would amount to discriminatory treatment of equal content &lt;i&gt;merely&lt;/i&gt; because speakers choose the internet, and the speech occurred online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Third&lt;/i&gt;, the Intermediary Guidelines accord unrestrained discretion in the curtailment of fundamental rights to &lt;i&gt;private &lt;/i&gt;functionaries, without any guidance whatsoever. This should have been the sole reserve of the state. In addition to the lack of guidance, the breadth of the grounds for censorship in Rule 3 (2), some of which are&lt;i&gt; themselves incapable of precise and non-subjective application&lt;/i&gt;, means that private censorship can occur to an arguably unlimited degree. Expecting compliance with such terms, and attaching liability (for intermediaries) or a curtailment of fundamental rights (for generators of content), without the provision of a right to challenge or even, more fundamentally, be informed is both unreasonable and arbitrary.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Similarly, Rules 3 (4) and 3 (5) empower intermediaries to take down content without providing any realistic opportunity of hearing to its author. Intermediaries are accorded an adjudicatory role to the intermediary in deciding questions whether or not authors can access their fundamental right to free speech in the process. This role is ordinarily reserved for competent courts or administrative authorities, which are subject to constitutional checks and balances and a general obligation to preserve and promote fundamental rights. Assigning such functions to a self-interested private entity without any accountability whatsoever is both unreasonable as well as arbitrary.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Finally&lt;/i&gt;, the Intermediary Guidelines fail to account for the public interest because they directly restrict the public’s freedom of speech and expression, without any justifiable reason, and privilege the personal and not necessarily constitutional sensitivities of private complainants instead. Rule 3(3) in effect vests an extraordinary power of censorship in intermediaries, entities which operate on the basis of private interest and outside the limits of administrative or even the most basic human rights control. Safeguards must apply to power-bearers to the degree and in the manner required in relation to the nature of the power, rather than its holder, if fundamental rights are to be legislatively preserved. While the Supreme Court in &lt;i&gt;A.K. Kraipak v. Union of India&lt;/i&gt;&lt;a href="#_ftn27"&gt;[27]&lt;/a&gt; extended the applicability of natural justice principles from judicial bodies alone and quasi-judicial bodies to administrative bodies as well, the applicability of such principles still remains limited to state entities. In other words, there is an acknowledged difficulty in applying public law standards to private, commercial entities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Intermediary Guidelines thus vest the right to abridge core fundamental rights (under Articles 14, 19 and 21) in private delegates operating outside public law controls that constrain the scope in which the power can be exercised and ensure that citizen interest can be preserved. In the alternative, they also failed to provide for other safeguards to prevent abuse to the detriment of fundamental rights private delegates of governmental power, even as they granted such powers in unlimited terms. As a result, the Intermediary Guidelines evidence thoughtless, arbitrary, unreasoned and unjust state action.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Vires vis á vis the Parent Act&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;While it is permissible within the constitutional scheme for legislative functions of the Parliament to be delegated to a degree, they may be struck down on several grounds. In general, per &lt;i&gt;Indian&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Express&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Newspapers&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;(Bombay)&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Pvt.&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Ltd.&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;v.&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Union&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;of&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;India&lt;/i&gt;&lt;a href="#_ftn28"&gt;,[28]&lt;/a&gt; subordinate legislation can be challenged not only on any of grounds on which the parent legislation is vulnerable to challenge, but also on the grounds that it does not conform to parent statute, that it is contrary to other statutes or that it is unreasonable, in the sense that it is manifestly arbitrary. Notably, the Court also held here that subordinate legislation is liable to being struck down where it fails to conform to constitutional requirements, or, specifically that “it offends Article 14 or Article 19 (1) (a) of the Constitution”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is a well-accepted proposition that delegated legislation which travels outside the scope of its enabling law will not stand as valid. It was held in &lt;i&gt;Agricultural&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Market&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Committee&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;v.&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Shalimar&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Chemical&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Works&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Ltd &lt;/i&gt;&lt;a href="#_ftn29"&gt;[29]&lt;/a&gt; that a delegate cannot alter the scope of the act under which it has been it has been empowered to make rules, or even of a provision or principle included there under. In &lt;i&gt;State&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;of&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Karnataka&lt;/i&gt;&lt;i&gt; v&lt;/i&gt;&lt;i&gt;.&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Ganesh&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Kamath&lt;/i&gt;&lt;a href="#_ftn30"&gt;[30]&lt;/a&gt; the Supreme Court held that “it is a well settled principle of interpretation of statutes that the conferment of rule-making power by an Act does not enable the rule-making authority to make a rule which travels beyond the scope of the enabling Act or which is inconsistent there with or repugnant thereto”. Similarly, in &lt;i&gt;KSEB&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;v.&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Indian&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Aluminium&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Company&lt;/i&gt;&lt;a href="#_ftn31"&gt;[31]&lt;/a&gt;, it held that“subordinate legislation cannot be said to be valid unless it is within the scope of the rule making power provided in the statute”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Intermediary Guidelines were enacted under Sections 79(2) and 87(2)(zg) of the Information Technology Act, 2000 (as amended). While the latter provision explicitly grants the Central Government rule-making powers by which it can lay out guidelines to be followed by intermediaries in order to comply with Section 79(2), it appears that the rules in their current form appear to have been drafted based on a misunderstanding of Section 79.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section 79(2) itself merely clarifies the circumstances in which intermediaries can claim that intermediaries are not liable for content where they do not initiate the transmission of potentially actionable content or select its recipient, modify its contents and observe all necessary “due diligence” requirements under the IT Act and rules.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The extent to which the Intermediary Guidelines alter the intent and scope of section 79 (or other provisions of the IT Act, in some cases) clearly leaves them &lt;i&gt;ultra vires&lt;/i&gt; the parent statute. The specific instances of deviation by the Intermediary Guidelines from the IT Act are listed below:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;First&lt;/i&gt;, Rule 3 (3) is ultra vires section 79 of the IT Act. Where this rule expressly prohibits the hosting, publication or initiation of transmission of content described in Rule 3 (2), section 79 does not intend any prohibition. All that it does is to waive the immunity otherwise accorded to intermediaries where the conditions specified are not satisfied. In other words, the section is optional, rather than mandatory and punitive: whether or not an intermediary can claim immunity will depend on whether it chooses to comply with section 79 (2).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Second&lt;/i&gt;, Rule 3 (4) requires intermediaries to take steps to disable access to within 36 hours of receiving a complaint in relation thereto. This is inconsistent with section 69B of the IT Act, which lays down in detail, the procedure to be followed to disable access to information. Since section 69B is statutory law, Rule 3 (4), being mere delegated legislation, will have to yield in its favour.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Third&lt;/i&gt;, Rule 3 (7) is &lt;i&gt;ultra&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;vires&lt;/i&gt; sections 69 and 69B, and falls outside the scope of section 79 (2). Rule 3 (7) provides that intermediaries must comply with requests for information or assistance when required to do so by appropriate authorities. This provision has no relation to the contents of section 79, which regulates intermediaries’ liability for content, and under which these rules were notified. In addition, rules have already been issued under the properly relevant sections, namely sections 69 and 69B, to provide a procedure to be followed by the government for the interception, monitoring, and decryption of information held by intermediaries. Rule 3 (7) is not consistent with the rules under sections 69 and 69B, as it removes all safeguards that those rules included. Under the Information Technology (Procedure and Safeguards for Interception, Monitoring, and Decryption) Rules 2009, for instance, permission must be obtained from the competent authority before an intermediary can be directed to provide access to its records and facilities while Rule 3 (7) makes intermediaries answerable to virtually any request from any government agency.&lt;/p&gt;
&lt;p align="left"&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;hr align="left" size="1" width="33%" /&gt;
&lt;p&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. Rule 3 (2) (a).&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. Rule 3 (2) (d).&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. Rule 3 (2) (b)&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. Section 499, Indian Penal Code, 1860 (“Defamation” is defined to include both written and spoken words).&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. AIR 1950 SC 124.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. AIR 1958 SC 578.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. AIR 1995 SC 1236.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;].(2007) 1 SCC 170.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]. AIR 1973 SC 106.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;]. (2011) 8 SCC 372.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;]. AIR 1962 SC 305, ¶31.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr12" name="fn12"&gt;12&lt;/a&gt;]. &lt;i&gt;Supra, &lt;/i&gt;n.5.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr13" name="fn13"&gt;13&lt;/a&gt;]. Centre for Internet &amp;amp; Society, &lt;i&gt;Intermediary Liability in India&lt;/i&gt;&lt;i&gt;: Chilling Effects on Free Expression on the Internet 2011&lt;/i&gt; &lt;i&gt;available at&lt;/i&gt; cis-india.org/internet-governance/chilling-effects-on-free-expression-on-internet/intermediary-liability-in-india.pdf.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr14" name="fn14"&gt;14&lt;/a&gt;]. UN Document no. A/HRC/17/27.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr15" name="fn15"&gt;15&lt;/a&gt;]. UN Document no. A/HRC/20/.13.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr16" name="fn16"&gt;16&lt;/a&gt;]. AIR 1997 SC 3011.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr17" name="fn17"&gt;17&lt;/a&gt;]. AIR 1997 SC 568.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr18" name="fn18"&gt;18&lt;/a&gt;]. (2005) 1 SCC 496.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr19" name="fn19"&gt;19&lt;/a&gt;]. 1978 SCR (2) 621.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr20" name="fn20"&gt;20&lt;/a&gt;]. AIR 1985 SC 1416.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr21" name="fn21"&gt;21&lt;/a&gt;]. AIR 1999 SC 2583.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr22" name="fn22"&gt;22&lt;/a&gt;]. AIR 1974 SC 555.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr23" name="fn23"&gt;23&lt;/a&gt;]. AIR 2002 SC&lt;i&gt; &lt;/i&gt;322&lt;i&gt;.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr24" name="fn24"&gt;24&lt;/a&gt;]. AIR 1993 SC 935&lt;i&gt;.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr25" name="fn25"&gt;25&lt;/a&gt;]. (2001) 7 SCC 545, 548, ¶10.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr26" name="fn26"&gt;26&lt;/a&gt;].1980 AIR 1992.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr27" name="fn27"&gt;27&lt;/a&gt;]. &lt;i&gt;AIR&lt;/i&gt; 1970 SC 150.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr28" name="fn28"&gt;28&lt;/a&gt;]. AIR 1986 SC 515.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr29" name="fn29"&gt;29&lt;/a&gt;]. AIR 1997 SC 2502.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr30" name="fn30"&gt;30&lt;/a&gt;]. (1983) 2 SCC 40.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr35" name="fn31"&gt;31&lt;/a&gt;]. AIR 1976 SC 1031.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/constitutional-analysis-of-intermediaries-guidelines-rules'&gt;https://cis-india.org/internet-governance/constitutional-analysis-of-intermediaries-guidelines-rules&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>ujwala</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Information Technology</dc:subject>
    

   <dc:date>2012-10-31T08:44:41Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/internet-censorship">
    <title>Internet Censorship: Anonymous Can’t be Just Harmful Hackers</title>
    <link>https://cis-india.org/internet-governance/internet-censorship</link>
    <description>
        &lt;b&gt;If there was ever an interesting time for people concerned with freedom of speech and expression to live in, it is now, and it is definitely in India. It has been a series of battles the last couple of years, where a slightly out-dated government machinery has been trying to control and contain the burgeoning online spaces, only to be put in their place by the new-age tech-ninjas that have risen as the new heroes in our digital times.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Nishant Shah's column was &lt;a class="external-link" href="http://www.firstpost.com/tech/internet-censorship-anonymous-protests-should-be-more-than-harmful-hacks-376564.html"&gt;published&lt;/a&gt; in the First Post on July 13, 2012&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We might not have had our Wikileaks moment in India yet, but the recent consolidation of resources by civic hacker groups and a public outrage against top-down blocking of everyday webspaces have steadily and surely put the questions of censorship and freedom on our minds.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The protests have taken many forms – from civic action routes of campaigns and petitions by civil society and non-governmental organisations to guerrilla warfare in the shape of distributed denial of service attacks and hacking of government websites.&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;p&gt;&lt;img class="wp-image-376597 size-full" height="176" src="http://www.firstpost.com/wp-content/uploads/2012/07/Anonymous_AP_NEW.jpg" title="Anonymous_AP_NEW_13JULY" width="235" /&gt;&lt;/p&gt;
&lt;p style="text-align: center; "&gt;Anonymous must be more than just a hacker group: AP&lt;/p&gt;
&lt;/th&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;A lot of these efforts have found popular interest and media attention, but they haven’t always found a solid ground for negotiation and dialogue with the policy makers and legislators designing this information regime. However, after the first off-line mobilisation of protests by Anonymous in India, the government has had to face the fact that the clicktivist users are not going to remain passive, merely venting their discontent on their blogs and social networking spaces.&lt;/p&gt;
&lt;p&gt;With the sustained and systemic attacks on government, public and  corporate websites, revealing sensitive information and taking down web  resources the new hackers have shown that they mean business. In a  recent attack, Anonymous hacked the Tamil Nadu police’s websites and  revealed information about the complaints people have made and the  actions taken on them.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;They leaked the document under their Twitter handle ‘opindia_revenge’ to show the police inaction. The documents have redacted some information but it has also revealed personally identified data about the people involved, without taking into consideration that it might affect the people involved in the cases adversely. Acts like these have the cybercrime bureau now tracking down the attackers and taking the help of Internet Service Providers and other intermediaries to punish those responsible.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What the outcomes of this battle are going to be, will eventually change the ways in which our digital publics shape up. Given the lack of resistance that ISPs have shown in the past, when pressed for private information on suspicious users, the chances are that we might soon have a public spectacles of hacker-criminals. Looking at the past bungles in this arena, one also hopes that it will not be yet another instance of mixed up administration leading to wrong and misplaced prosecution.&lt;br /&gt;&lt;br /&gt;But more than anything else, one hopes that the attackers, who have seen their protests as a part of their civic action and right to protest and demonstrate, have been wise enough to protect themselves because they are going to be tracked and tried as criminals if they are caught.&lt;br /&gt;&lt;br /&gt;Much can be said about the nature of civic hacking, and much has already been said, heralding them as code warriors and berating them as a public nuisance. But in all that cacophony, we might need to separate the ideology (constitutional rights, free speech and expression) from the tactics (DDoS, hacking, parking on websites) and see what interests they eventually serve.&lt;br /&gt;&lt;br /&gt;Because even as my heart sings with these sounds of protests, there is a growing alarm that these seemingly radical guerrilla warfare might actually be more counter-productive than helpful to the cause of building an open and inclusive internet.&lt;br /&gt;&lt;br /&gt;Over the last years, many civil society and citizen collectives have realised that policies and regulation are more a dialogue than open warfare. Polarising ourselves on an axis of ‘good versus bad’, at the end of the day, only leads to more regulation and draconian measures because it makes the state feel under threat. Considerable energy has gone into building a culture of public policy consultations and dialogue that allows for different stakeholders to work towards a collective future of the internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And so we come back to the question of whose interest gets served in the spate of these attacks? This is the same question that haunts us when we hear about our favourite political parties taking to destroying public property and blocking public infrastructure. It is the question that resurfaces when you realise that you might agree with the politics but the tactics are actually harming what you think is important.&lt;br /&gt;&lt;br /&gt;In the case of the Anonymous attacks, it unfortunately seems more bravado and aspiration to radical heroism than a sustained and strategic set of interventions. With this particular act they seemed to have not only hurt the people on whose behalf they are fighting, but also given the government more reasons and plausible excuses to exercise more regulation and control over the digital technologies.&lt;br /&gt;&lt;br /&gt;The attacks are a bold move to put the questions of censorship into public discourse, and force the state to acknowledge the problems with its governance. But it would be great to see if we can build on these energies and momentum and lead to a more sustained engagement with the political questions at stake, so at to construct a larger movement to protect our rights to free speech and expression that is beyond the world of ad-hoc hacking and random acts of protest.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/internet-censorship'&gt;https://cis-india.org/internet-governance/internet-censorship&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-08-06T06:56:50Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/indian-draft-dna-profiling-act">
    <title>Overview and Concerns Regarding the Indian Draft DNA Profiling Act</title>
    <link>https://cis-india.org/internet-governance/indian-draft-dna-profiling-act</link>
    <description>
        &lt;b&gt;The Indian Code of Criminal Procedure was amended in 2005 to enable the collection of a host of medical details from accused persons upon their arrest.  Section 53 of the Cr.PC provides that upon arrest, an accused person may be subjected to a medical examination if there are “reasonable grounds for believing” that such examination will afford evidence as to the crime.
&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The scope of this examination was expanded in 2005 to include “the examination of blood, blood-stains, semen, swabs in case of sexual offences, sputum and sweat, hair samples and finger nail clippings by the use of modern and scientific techniques including DNA profiling and such other tests which the registered medical practitioner thinks necessary in a particular case.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In Thogorani Alias K. Damayanti v. State of Orissa and Ors, 2004 Cri. LJ 4003 (Ori), the Orissa High Court affirmed the legality of ordering a DNA test in criminal cases to ascertain the involvement of persons accused. Refusal to cooperate would result in an adverse inference drawn against the accused.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After weighing the privacy concerns involved, the court laid down the following considerations as relevant before the DNA test could be ordered: “(i) the extent to which the accused may have participated in the commission of the crime; (ii) the gravity of the offence and the circumstances in which it is committed; (iii) age, physical and mental health of the accused to the extent they are known; (iv) whether there are less intrusive and practical ways of collecting evidence tending to confirm or disprove the involvement of the accused in the crime; (v) the reasons, if any, for the accused for refusing consent.” Id.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In brief, the 2007 draft DNA Profiling Bill (hereinafter “Bill”) pending before parliament attempts to create an ambitious centralized DNA bank that would store DNA records of virtually anyone who comes within any proximity to the criminal justice system. Specifically, records are maintained of suspects, offenders, missing persons and “volunteers.” The schedule to the Bill contains an expansive list of both civil and criminal cases where DNA data can be collected including cases of abortion, paternity suits and organ transplant. In all fairness, the Bill contains provisions limiting access to and use of information contained in the database, and provides for the deletion of a person’s DNA profile upon their acquittal.&lt;/p&gt;
&lt;h2&gt;2007 Draft DNA Profiling Bill&lt;/h2&gt;
&lt;h3&gt;Preamble (§ 1)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Section 1 of the Bill sets out the broad policy objectives of its drafters. The most telling portion of § 1 states: “[DNA analysis] makes it possible to determine whether the source of origin of one body substance is identical to that of another, and further to establish the biological relationship, if any, between two individuals, living or dead without any doubt.” Bill, § 1 (emphasis added). Although it later makes mention of potential harms resulting from governmental misuse of genetic information technology, it is evident that the policy animating the Bill presupposes the objective infallibility of genetic analysis. This patent mistruth underpins the policy rationale for the Bill, and as such casts a long shadow over its substantive provisions. At the very least, it tells the reader (and perhaps one day the court) to broadly interpret the Bill’s language to favor DNA analysis as the privileged solution to investigational and prosecutorial needs.&lt;/p&gt;
&lt;h3&gt;Definitions (§ 2)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A number of the Bill’s definitions are overbroad, further expanding the scope of its later provisions. The “crime scene index” is defined to include “DNA profiles from forensic material found . . . on or within the body of any person, on anything, or at any place, associated with the commission of a specified offence.” Id., § 2(1)(vii) et seq. A “specified offence” is defined as any of a number of more serious crimes, “or any other offence specified in the Schedule [to the Bill].” The so-called “Schedule,” tucked neatly on page 34 of the Bill’s 35 pages, lists a hodgepodge of various crimes from rape, to “offences relating to dowry,” defamation, and “unnatural 3 offenses.”&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt; Taken together, the government is empowered to conduct genetic testing on almost anyone in any way connected with even minor infractions of the criminal law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Furthermore, the crucial term “suspect” is defined as anyone “suspected of having committed an offence.” Id., § 2(1)(xxxvi). By intentionally leaving out the qualifier “specified,” the drafters’ intent is plain: to sweep within the Bill’s breadth all persons suspected of any crime whatsoever. And, accordingly, the Bill defines the “suspects index” to include “DNA profiles derived from forensic material lawfully taken from suspects.” Id., § 2(1)(xxxvix). It is hard to imagine anybody of subsequent regulation that could adequately circumscribe this manifest affront to personal privacy and bodily integrity.&lt;/p&gt;
&lt;h3&gt;DNA Profiling Board (§§3 to 13)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The DNA Profiling Board (hereinafter “Board”) is responsible for administering and overseeing the Indian DNA database. §3 et seq. Among its several enumerated powers, the Board is charged with “recommend[ing] privacy protection statutes, regulations and practices relating to access to, or use of stored DNA samples or DNA analyses,” as well as “mak[ing] specific recommendations to . . . ensure the appropriate use and dissemination of DNA information [and] take any other necessary steps require to be taken to protect privacy.” §13(1)(xv) to (xvi). This provision is in lieu of any substantive principle limiting the scope of the legislation, which the bill otherwise lacks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is a significant omission. As expressed in the preamble, the stated purpose of the Bill is “to enhance protection of people in the society and [the] administration of justice.” §1. Taken alone, this expresses only the government’s interest in the legislation, suggesting an ambiguously wide scope for its provisions. A substantive concept of individual privacy is required to counterbalance the interests of the government and provide protections for the equally vital privacy interests of the individual. As such, a limiting privacy principle should be included alongside the expressing in §1 of the government’s security interest. Without it, the Board will effectively have carte blanche with regard to what privacy protections are—or are not—adopted.&lt;/p&gt;
&lt;h3&gt;Approval of Laboratories (§§14 to 18)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Sections 14 to 18 provide for the approval by the DNA Profiling Board of DNA laboratories that will process and analyze genetic material for eventual inclusion on the DNA database. Under §14, all laboratories must be approved in writing prior to processing or analyzing any genetic material. However, a conflicting provision appears in the next section, §15(2), which permits DNA laboratories in existence at the time the legislation is enacted to process or analyze DNA samples immediately, without first obtaining approval.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Either an oversight on the part of the drafters, or the product of overly-vague language, the result is that established genetic laboratories—including whatever genetic material or profiles they may already have for whatever reason—are in effect “grandfathered” into the system. The only review of these laboratories is the post hoc approval of the laboratory by the DNA profiling board. The potential for abuse and error that this conflict of provisions would be best addressed in keeping with the rule articulated in §14, i.e. correcting the language of §15(2) that allows for laboratories to be “grandfathered” into the system.&lt;/p&gt;
&lt;h3&gt;Standards, Obligations of DNA Laboratory (§§19 to 28)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Chapter V, which concerns the obligations of and the standards to be observed by approved DNA laboratories, lacks adequate administrative provisions. For example, §22 requires that labs ensure “adequate security” to minimize contamination without providing for accountability in the event of contamination. Similarly, §28 provides for audits of DNA laboratories only, withholding from similar scrutiny of the DNA Profiling Board itself.&lt;/p&gt;
&lt;h3&gt;National DNA Database (§§33 to 37)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In addition on one national DNA database, the Bill sanctions the several Indian states to maintain their own DNA databases, provided these state-level databases forward copies of their content to the national database. Id., § 33(3). The national database is envisioned to comprise several sub-databases, each to contain the genetic information of a subset of persons/samples, namely: (1) unidentified crime scene samples, (2) samples taken from suspects, (3) samples taken from persons convicted or currently subject to prosecution for “subject offences,” (4) samples associated with missing persons, (5) samples taken from unidentified bodies, (6) samples taken from “volunteers,”&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt; and finally (7) samples taken for reasons “as may be specified by regulations. Id., § 33(4) et seq. Putting to one side the breadth of persons subject to inclusion under subcategories (1) through (6), subsection (7) appears on its face to be a “catch all” provision, leaving one only to guess at the circumstances under which its specificities may be promulgated. Id.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A close reading of § 33(6) strongly suggests that the agency &lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt;conducting conducting the forensic analyses and populating the DNA database shall retain the DNA samples thereafter. This section reads in relevant part:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The DNA Data Bank shall contain . . . the following information, namely: (i) in the case of a profile in the offenders index, the identity of the person from whose body substance or body substances the profile was derived, and (ii) in case of all other profiles, the case reference number of the investigation associated with the body substance or body substances from which the profile was derived. Id., § 33(6).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rather than choose to link the DNA profile data to a specific offender or case, the drafters of the Bill instead like the “body substance or body substances” with that specific offender or case. Whether sloppy drafting or clever nuance, this provision elides the DNA profile with the DNA sample, injecting unneeded—and potentially harmful—ambiguity into the proposed law.&lt;/p&gt;
&lt;h3&gt;Confidentiality, Access to DNA Profiles, Samples, and Records (§§ 38-44)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Further compounding this ambiguity, § 36 entitled “Access to Information” opens the door to much more than DNA profiles alone being kept on the government database. In all three of its subsections it purports to govern access to “the information” contained in the database, not “the DNA profiles” contained in the database. Id., § 36(1) et seq. Subsection 2 employs even broader language, covering “the information in the offenders’ index pertaining to a convict.” Id. Taken at face value, this provision of the Bill suggests that any and all sort of “information . . . pertaining to a convict” that might be derived from his or her DNA can be stored on the database. Even if prudential oversight provisions elsewhere in the Bill suggests a tightly-controlled techno-forensic apparatus, the overbroad construction of provisions such as §§ 33 and 36 raise significant questions about the wisdom of enacting the text in this form.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Two further provisions regarding access to the database warrant close scrutiny. First, §§ 39 and 40 purport to confer upon the police direct access to all of the information contained in the national DNA database. While administratively expedient, this arrangement opens up the possibility for misuse. A more prudent system would place the Board (or some administrative subordinate portion thereof) between the police and the content of the DNA database, with the latter having to make specific and particular requests to the former. This would minimize the risks inherent in the more expansive model of database access the bill currently envisions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Second, and more concerning, § 41 permits the Data Bank Manager to grant access to the database to “any person or class of persons that the Data Bank Manager considers appropriate.” This is a sweeping provision. It vests in one individual the ability to permit almost anyone access to the DNA database—without administrative review or oversight of any kind. Taken together with the general lack of administrative safeguards in the bill, § 41 again places the government’s interest in investigating crime far above individual privacy rights.&lt;/p&gt;
&lt;h3&gt;Omissions&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Most notably, the bill specifically excludes a private cause of action for the unlawful collection of DNA, or for the unlawful storage of private information on the national DNA database. Nor does the bill grant an individual right to review one’s personal data contained on the database. Without these two key features, there is effectively no check against the unlawful collection, analysis, and storage of private genetic information on the database.&lt;/p&gt;
&lt;h3&gt;Best Practices Analysis&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Collection of DNA&lt;/b&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;With consent: only for a specific investigation (e.g. from a victim or for elimination purposes). Volunteers should not have information entered on a database&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;No provision&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Without consent: only from persons suspected of a crime for which DNA evidence is directly relevant i.e. a crime scene sample exists or is likely to exist. Or, broader categories?&lt;/td&gt;
&lt;td&gt;No provision&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Requirement for an order by a court? Or allowed in other circumstances?&lt;/td&gt;
&lt;td&gt;No provision&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Samples collected by police officers, or only medical professionals? Must take place in a secure location i.e. not on the street etc.&lt;/td&gt;
&lt;td&gt;No provision&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Provision of information for all persons from whom DNA is taken&lt;/td&gt;
&lt;td&gt;No provision&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Crime scenes should be promptly examined if DNA evidence is likely to be relevant, and quality assurance procedures must protect against contamination of evidence&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;No provision; regulated at discretion of DNA Profiling Board&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;b&gt;Analysis of DNA&lt;/b&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Should take place only in laboratories with quality assurance&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Regulated at discretion of DNA Profiling Board&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Laboratories should be independent of police&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;No provision; regulated at discretion of DNA Profiling Board&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Profiling standards must be sufficient to minimise false matches occurring by chance. This must take account of increased likelihood of false matches in transboundary searches, and with relatives.&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;No provision; regulated at discretion of DNA Profiling Board&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;b&gt;Storage of DNA&lt;/b&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Data from convicted persons should be separate from others e.g. missing persons’ databases&lt;/td&gt;
&lt;td&gt;Unclear&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Access to databases and samples must be restricted and there must be an independent and transparent system of governance, with regular information published e.g. annual reports, minutes of oversight meetings&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Access to database at discretion of DNA Data Bank Manager&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Personal identification information should not be sent with samples to laboratories&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;No provision; regulated at discretion of DNA Profiling Board&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Any transfer of data e.g. from police station to lab or database, must be secure&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;No provision; regulated at discretion of DNA Profiling Board&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;b&gt;User Samples and Data&lt;/b&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Research uses should be restricted to anonymised verification of database performance (e.g. checking false matches etc.). Third party access to data for such purposes should be allowed, provided public information on research projects is published. There should be an ethics board.&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;No provision&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Research uses for other purposes e.g. health research, behavioural research should not be allowed.&lt;/td&gt;
&lt;td&gt;No provision&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Uses should be restricted by law to solving crimes or identifying dead bodies/body parts. Identification of a person is not an acceptable use. Missing persons databases (if they exist) should be separate from police databases.&lt;/td&gt;
&lt;td style="text-align: left; "&gt;Ambiguous provisions suggest much wider scope&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Familial searching should be restricted e.g. ordered by a court? Or not used? Or regulated for use in special cases?&lt;/td&gt;
&lt;td&gt;No provision&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;b&gt;Destruction of DNA and Linked Datas&lt;/b&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;DNA samples should be destroyed once the DNA profiles needed for identification purposes have been obtained from them, allowing for sufficient time for quality assurance, e.g. six months&lt;/td&gt;
&lt;td&gt;DNA samples are retained&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;An automatic removals process is required for deletion of data from innocent persons. This must take place within a reasonable time of acquittal etc.&lt;/td&gt;
&lt;td&gt;No provision&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;There should be limits on retention of DNA profiles from persons convicted of minor crimes&lt;/td&gt;
&lt;td&gt;No provision&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;There should be an appeals process against retention of data&lt;/td&gt;
&lt;td&gt;No provision&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Linked data on other databases (e.g. police record of arrest, fingerprints) should be deleted at the same time as DNA database records&lt;/td&gt;
&lt;td&gt;No provision&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Crime scene DNA evidence should be retained for as long as a reinvestigation might be needed (including to address miscarriages of justice)&lt;/td&gt;
&lt;td&gt;DNA evidence permitted to be retained indefinitely&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;b&gt;Use in Court&lt;/b&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Individuals must have a right to have a second sample taken from them and reanalysed as a check&lt;/td&gt;
&lt;td&gt;No provision&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Individuals must have a right to obtain re-analysis of crime scene forensic evidence in the event of appeal&lt;/td&gt;
&lt;td&gt;No provision&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Expert evidence and statistics must not misrepresent the role and value of the DNA evidence in relation to the crime&lt;/td&gt;
&lt;td&gt;No provision&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;b&gt;Other&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Relevant safeguards must be proscribed by law and there should be appropriate penalties for abuse&lt;/td&gt;
&lt;td&gt;No provision&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Impacts on children and other vulnerable persons (e.g. mentally ill) must be considered&lt;/td&gt;
&lt;td&gt;No provision&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Potential for racial bias must be minimised&lt;/td&gt;
&lt;td&gt;No provision&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. No examples are given as to which unnatural offences are intended, leaving the reader wondering. Perhaps a DNA test of witchcraft?&lt;br /&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. Section 15(2) does mandate that such laboratories petition the DNA Profiling Board for approval within six months after the legislation is enacted.&lt;br /&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;].Per § (2)(1)(xxxxiii) of the Definitions, a “volunteer” is “a person who volunteers to undergo a DNA procedure.” The definition does not require that the “volunteer” be informed of the nature, purpose, or possible consequences of his generosity; nor is any such requirement specified elsewhere in the Bill.&lt;br /&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;].Or, as is laid out in great detail in §§ 14-32, at the privately-contracted forensics laboratory.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Note: § is a symbol for 'section'.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/indian-draft-dna-profiling-act'&gt;https://cis-india.org/internet-governance/indian-draft-dna-profiling-act&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>GeneWatch UK &amp; the Council for Responsible Genetics, US</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-07-11T11:30:38Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/all-night-for-hackers">
    <title>An all-nighter for hackers</title>
    <link>https://cis-india.org/news/all-night-for-hackers</link>
    <description>
        &lt;b&gt;Tech event management firm HasGeek is back with its Hacknight for hackers and developers willing to burn the proverbial midnight oil writing some competitive code.&lt;/b&gt;
        &lt;p class="body"&gt;&lt;b&gt;An all-nighter for hackers&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Tech event management firm HasGeek is back with its Hacknight for hackers and developers willing to burn the proverbial midnight oil writing some competitive code.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The Hacknight will be held between July 14 and 15, from 2 p.m. to 8 a.m. at the Centre for Internet and Society (CIS), in Bangalore, and simultaneously in Pune, at AmiWorks.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The Data Hacknight was open to geeks, enthusiasts, designers, mathematicians and statisticians to work with different datasets on projects ranging from discovering unknown patterns in data to representing data in various visual forms. This event was being held in the run-up to a larger conference on big data, analytics and applications called The Fifth Elephant.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The Hacknight was also open to individuals who want to work with tools such as R, Pig, Excel or even Hadoop to discover the possibilities and challenges of working with data, a release from HasGeek stated.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;To register for the Hacknight, visit http://beta.hacknight.in/fifthelephant/bangalore2012&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Yahoo sets up Grid Computing Lab&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Yahoo India’s Research and Development wing and the Indian Institute of Technology, Madras announced the launch of a Grid Computing Lab set up by the Internet major on the institute campus.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;This cluster of high-end servers at the lab would allow researchers to access Web-scale data and conduct research on big data and cloud computing systems, a release from Yahoo stated. The lab would focus on this emerging field and encourage more researchers to take up research in the field, as well as process and analyse huge volumes of structured and unstructured data which, to date, has been limited due to significant cost barriers in getting large computing systems operational.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;D. Janakiram, Department of Computer Science, IIT-Madras, said in a release: “This opens up a new arena of exciting opportunities for our students. We are hopeful such partnerships will allow students to conduct truly breakthrough work on cloud computing and data storage systems, ultimately leading to Web innovations coming to the marketplace.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;World Class Award for iGate&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;iGATE, an integrated technology and operations company, announced that it has won the ‘World Class Award’ under the ‘large service organisations’ category at the Global Performance Excellence Awards (GPEA).&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The awards were administered by the Asia Pacific Quality Organisation, a non-profit group, a release from iGate stated. Ravi Mani, senior vice-president, Organisational Excellence Group, iGATE, said the award was a testimony to the persistent effort the teams have put in to achieve the high-quality standards and processes at iGATE.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Cloud and growth: a survey&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Over the last two years, the public cloud market in India has rapidly evolved with focus on software and payments as a service, a survey by Zinnov, a consulting firm, has found.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;A study titled ‘Public Cloud Opportunity in India’ found that the overall Indian market for cloud (both public and private) grew steadily in 2011. The Software as a Service (SaaS) market, largely dominated by email, collaboration tools and enterprise resource products grew by 46 per cent, a release on the survey stated.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The public cloud market was expected to grow 55 per cent in the near future and become a default choice for new IT investments, especially in the small and medium businesses segment, the study observed.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://www.thehindu.com/sci-tech/technology/article3613800.ece"&gt;published&lt;/a&gt; in the Hindu on July 11, 2012&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/all-night-for-hackers'&gt;https://cis-india.org/news/all-night-for-hackers&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-08-06T10:59:09Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/medical-privacy-conference-report">
    <title>Privacy Matters — Medical Privacy</title>
    <link>https://cis-india.org/internet-governance/blog/medical-privacy-conference-report</link>
    <description>
        &lt;b&gt;On June 30, 2012, Privacy India in partnership with the Indian Network for People living with HIV/AIDS, Centre for Internet &amp; Society, IDRC, Society in Action Group, with support from London-based Privacy International, held a public discussion on "Medical Privacy" at the Yashwantrao Chavan Academy of Development Administration.&lt;/b&gt;
        &lt;p&gt;The conversation brought together a cross section of citizens, lawyers, activists, researchers, academia and students.&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/copy_of_Prashant.jpg/@@images/4d8d4b4b-c2f1-47ed-8f8c-9799ff12f46c.jpeg" alt="Prashant Iyengar" class="image-inline" title="Prashant Iyengar" /&gt;&lt;br /&gt;&lt;/th&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;Prashant Iyengar, Assistant Professor, Jindal Law University, opened the conference with an explanation of Privacy India’s mandate to raise awareness, spark civil action and promote democratic dialogue around privacy challenges and violations in India. He summarized the series of ten consultations previously organized across India:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy/privacy-nujsconference-summary" class="external-link"&gt;Identity &amp;amp; Privacy&lt;/a&gt;, Kolkata, January 23, 2011&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy/privacy-conferencebanglaore" class="external-link"&gt;Internet &amp;amp; Privacy&lt;/a&gt;, Bangalore, February 5, 2011 &lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy/privacy-matters-report-from-ahmedabad" class="external-link"&gt;National Security &amp;amp; Privacy&lt;/a&gt;, Ahmedabad,  March 26, 2011&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy/privacy-guwahati-report" class="external-link"&gt;Transparency &amp;amp; Privacy&lt;/a&gt;, Guwahati, June 23, 2011&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/privacy-chennai-report.pdf/view" class="external-link"&gt;Telecommunication &amp;amp; Privacy&lt;/a&gt;, Chennai, August 6, 2011&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/privacy-matters-analyzing-the-right-to-privacy-bill" class="external-link"&gt;Analyzing the Right to Privacy Bill&lt;/a&gt;, Mumbai, January 21, 2012&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/high-level-privacy-conclave" class="external-link"&gt;The High Level Privacy Conclave&lt;/a&gt;, New      Delhi, February 3, 2012&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/all-india-privacy-delhi-report" class="external-link"&gt;The All India Privacy Symposium&lt;/a&gt;, New      Delhi, February 4, 2012&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/events/freedom-of-expression-privacy-roundtable-discussion-goa-june-2nd" class="external-link"&gt;Freedom of Expression &amp;amp; Privacy&lt;/a&gt;, Goa, June 2, 2012&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/securing-e-governance" class="external-link"&gt;Securing e-Governance&lt;/a&gt;, Ahmedabad, June 16, 2012&lt;/li&gt;
&lt;/ol&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: center; "&gt;&lt;img src="https://cis-india.org/home-images/copy2_of_P1.jpg/@@images/23b13d9b-7bb5-4b45-8647-f62ec9cc93f3.jpeg" alt="Participants 1" class="image-inline" title="Participants 1" /&gt;&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Elonnai Hickok, a member of Privacy India, introduced the draft book Privacy in India: A Policy Guide that Privacy India has been compiling.  Focusing on the draft chapter, Medical Privacy, she provided examples of legislation and policy containing safeguards to privacy such as Medical Council of India's Code of Ethics Regulations 2002, and pointed out legislation with missing safeguards such as in the Mental Health Act of 1987. Additionally, she gave many examples of projects being implemented in India that impact health privacy including Save the Baby Girl Project, the Mother and Child Tracking System, the UID, and a cloud based system known as Health Hiway.  &lt;br /&gt;&lt;/td&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/elonnai.jpg/@@images/aec795c5-4de3-471e-a0c8-1e8f5e8ded00.jpeg" alt="" class="image-inline" title="" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Medical Privacy in India&lt;/h3&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Dharmesh.jpg/@@images/150413aa-a1f4-4f26-a0da-ec2703a2cd55.jpeg" alt="Dharmesh" class="image-inline" title="Dharmesh" /&gt;&lt;/th&gt;
&lt;td style="text-align: justify; "&gt;Dr. Dharmesh Lal, MBBS, DHA, MD, DNB, DVLDP, Officiating Dean, IIHMR, Delhi, discussed the correlation between medical privacy and confidentiality. Medical Privacy involves the confidentiality of patient-provider encounters, along with the secrecy and security of information memorialized in physical, electronic and graphic records created as a consequence of patient-provider encounters.  Confidentiality involves restricting information to persons belonging to a set of specifically authorized recipients.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;He went on to explain that limited financial resources in public hospitals often preclude the separate examination of one patient at a time. “In Government hospitals, large numbers of patients congregate in the doctors office,” he says. Privacy is also related to a patient's financial status and decreases as one goes down the socio-economic ladder.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Additionally, he described the privacy concerns that arise due to infrastructural constraints. India's healthcare infrastructure has not kept up with the development of government health initiatives. For examples, the Janani Suraksha Yojana (JSY) initiative was launched in 2005, under the National Rural Health Mission (NRHM). JSY was implemented with the objective of reducing maternal and neo-natal mortality by promoting institutional delivery among the Poor Pregnant Woman. Financial incentives were provided to mothers. There was a phenomenal increase of institutional delivery. However, there was no proportional increase in infrastructure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He called for a change in medical education, administration and management, stating, “Privacy protection has to be established as a core value that connects organizational culture. Alarmingly, medical curriculum in India does not have formal component on medical privacy, significant curriculum reforms in undergraduate medical teaching is necessary.&lt;/p&gt;
&lt;h3&gt;Medical Privacy- Legal Aspects&lt;/h3&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;Mr. Pandit, Advocate, Pandit law Office, discussed the Hippocratic oath, which includes the duty of the caregiver to ‘keep secret’ and ‘never reveal’ ‘all that may come to my knowledge’. In other words, right to medical privacy has to be balanced with right to healthy life of another whose right will be affected unless such information is disclosed to her/him.&lt;/p&gt;
&lt;p&gt;He described the code of conduct prescribed by Indian Medical Council to its members, as a guideline to be followed is intended to preserve protect and uphold dignity of profession. Physicians should merit the confidence of patients entrusted to their care, rendering to each a full measure of service &amp;amp; devotion.&lt;/p&gt;
&lt;/td&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Pandit.jpg/@@images/c68199fc-dab6-42cc-9ba1-2d942cfad778.jpeg" alt="Pandit" class="image-inline" title="Pandit" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Referring to the Dr.Tokugha Yepthomi  Vs  Appollo Hospital Enterprises Ltd &amp;amp; Anr. III case, he described the Supreme Court’s verdict on the ‘Right to Life’.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span class="visualHighlight"&gt;The “Right to life” would positively include the right to be told that a person, with whom she was proposed to be married, was a victim of deadly disease, which was sexually communicable, since right of life includes right to lead a healthy life. Moreover where there is a clash of two fundamental rights, The RIGHT which would advance the public morality or public interest, would alone be enforced through the process of Court.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He concluded by asserting that there is considerable force in the argument that there is a need for a comprehensive legislation to protect the interest of poor patients and ordinary citizens who cannot afford to initiate a protracted legal battle to protect their medical privacy.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Supreme Court views on Medical Negligence&lt;/h3&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Elumalai.jpg/@@images/38c11e51-0761-4836-8833-080912e23911.jpeg" alt="Elumalai" class="image-inline" title="Elumalai" /&gt;&lt;/th&gt;
&lt;td style="text-align: justify; "&gt;Professor K. Elumalai, Director, School of law, IGNOU, provided numerous Supreme Court verdicts on medical negligence cases. He summarized the cases and discussed their salient features. He discussed the manner in which a Medical professional can be prosecuted for medical negligence under criminal law. It must be shown that the accused did something or failed to do something which in the given facts and circumstances, no medical professional in his ordinary senses and prudence would have done or failed to do.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Confidentiality and privacy in medical Settigs vis-a-vis PLHIV&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Ms. Nitu Sanadhya, Senior Legal Officer, Lawyers Collective, HIV/ AIDS Unit, stressed the importance of a rights-based approach and integrationist legal response to the HIV epidemic. When legislations or policies discriminate or isolate persons living with HIV, for example, through mandatory testing and breach of confidentiality, it drives the epidemic underground.&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;In India, there is no comprehensive law on HIV. In 2007, the National Aids Control Organization (NACO) released the Operational Guidelines for Integrated Counseling and Testing Centres. She described the salient features of the guideline especially focusing on the privacy provisions. She described the various situations that permit a health practitioner to disclose the HIV status of a patient to a partner and/ or third party.&lt;/p&gt;
&lt;p&gt;Discriminatory practices that arise out of a breach or confidentiality or privacy violation include stigmatization, denial of access to treatment, loss of employment, etc.&lt;/p&gt;
&lt;/td&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Nitu.jpg/@@images/235021e0-9b01-4d15-83d0-419729cc88ef.jpeg" alt="Nitu" class="image-inline" title="Nitu" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Under the RTI Act, A person’s HIV status is confidential and is protected in law and can only be disclosed to a third person in limited circumstances. The RTI Act specifically exempts the disclosure of personal information which is not of public interest; information which would cause an unwarranted invasion of privacy; and information which has been received in a fiduciary capacity. Therefore, The RTI Act 2005 cannot be used to obtain a person’s HIV report.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Privacy in Practice&lt;/h3&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/anand.jpg/@@images/fe79aa7d-fc55-48fe-97a8-b1cb7d555c39.jpeg" alt="Anand" class="image-inline" title="Anand" /&gt;&lt;/p&gt;
&lt;/th&gt;
&lt;td style="text-align: justify; "&gt;Dr. Anand Philip, Personal Physician at NationWide Primary Healthcare Service Pvt. Ltd., drew from his personal experiences. During his presentation he emphasized how privacy is important, but it is clear that privacy does not happen the way it is theorized by. In fact there are many dichotomies in what we believe privacy is and how it is used. He pointed out that we often take for granted why privacy matters and where it comes from. He discussed how without patient autonomy and patient dignity, privacy cannot &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;be upheld. Yet, one sees a constant breach of people’s dignities in the medical system. Some people rationalize this violation of dignity by explaining that in  India, doctors are used to people who have nothing and thus, dignity is  not important. Yet, he argued, dignity is something that is inherent.  The lack of dignity practiced in India's medical system shows a problem  with how we are trained. Giving an example of how dignity is breached in  India, Dr. Philip referred to two people being treated on the same table. He pointed out that the physical aspects of privacy are non-existent. For example, the WHO recommends five feet between beds, but typically two or three feet exist between hospital beds. Furthermore, there are often no curtains in hospitals. He then moved from physical privacy to information physical. In a hospital information flows in all directions, it is not a controlled environment and the patient does not choose who sees his/her information – the hospital decided. Dr. Philip then talked about training. The health care system encompasses a larger team of people from doctors to sweepers. Training is only given to clinical staff. Thus other aspects such as the Indian culture, infrastructure, and training all impact how privacy is carried out in the medical field.   In conclusion Dr. Philip re-stated that privacy is a byproduct of autonomy and dignity. He noted that offering a patient dignity was a critical step that must be taken by service providers. Closing his presentation, he challenged the audience with the following questions:  Considering how autonomy is not important, how do we reach people with the idea? Since physical privacy is key to other forms of privacy, how do we take it more seriously? What can we do about the medical team's approach to privacy?&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Best Practices of Medical Privacy in Various Health Settings&lt;/h3&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/sriram.jpg/@@images/40bc6ebe-4ba2-45f2-9bef-abbabd77e3e1.jpeg" alt="Sriram" class="image-inline" title="Sriram" /&gt;&lt;/p&gt;
&lt;/th&gt;
&lt;td style="text-align: justify; "&gt;Sriram Lakshmanan, Head Information Security, UnitedHealth Group Information Systems, spoke about the US health-care market touching on medicare, medicaid, employer-sponsored insurance, and individual insurance plans.  He also commented on the EU regime pointing out that most of the laws in the EU have a long list of identifiers indicating when your information counts as being compromised. Canada PIPEDA, is very strict and protects health privacy. In his opinion, the IT Act caters to many aspects of privacy. He also touched upon the eight OECD Privacy Principles and &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;how they can be adopted for the Indian scenario. A few of the principles  included collection limitation principle, data quality principle,  purpose specification principle, use limitation principle. For example,  if health information for treating malaria is collected, than that  information should only be used for that purpose.  Closing his  presentation, he noted that most of the technologies that we use today  for health run on IT, and thus can be used to compromise individual or  hospital wide information.&lt;/p&gt;
&lt;h3&gt;Epidemics and Privacy&lt;/h3&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Dr. Rajib Dasgupta, Assistant Professor, Center of Social Medicine and  Community Heath at Jawaharlal Nehru University, examined conflicts of  issues of privacy, confidentiality and the role of the state in the  context of epidemics and the provisions within the Epidemic Diseases  Act. Epidemics are population-level events in contrast to illnesses that  only involve individuals; therein lies the uniqueness of the  intersection between medical privacy and public health ethics. The state  has unique responsibilities to detect, diagnose, manage and control  epidemics. This has local/regional and international ramifications. Also  linked to these are limits to the powers, rights of individuals and the  extent to which such rights may need to be suspended. &lt;br /&gt;&lt;/td&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Rajib.jpg/@@images/ae57a014-d5c2-45db-b7e6-2222c4ca6fd9.jpeg" alt="Rajib" class="image-inline" title="Rajib" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;The exercise of  actions within the Act is not necessarily bereft of  infringement of  privacy and overt discrimination. Certain diseases, as  indeed  limitations imposed by the state, have elements of stigma that  further  confound the fuzziness of this debate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When an epidemic occurs, the need for privacy in the mind of the individual goes down, as they are concerned solely with receiving treatment. He also pointed out that there are contradictory elements during epidemics. For instance an area might not want to be named as having an outbreak of a disease, but at the same time individuals will line up outside hospitals for treatment, exposing the fact that they have the disease. He also spoke about how steps taken to address epidemics can invade privacy. For example, during the SARS outbreak, it was the practice to put the patient in an infectious disease hospital. This was invasive to personal privacy as it created stigma and discrimination. Closing his presentation he explained how the conventional notions of privacy do not necessary hold in the case of epidemics because it is an emergency outbreak. Thus, protocol is established on a case-to-case basis. Despite this he believes that it is possible and valuable to protect privacy in cases of epidemics.&lt;/p&gt;
&lt;h3&gt;HIV/ AIDS and Privacy&lt;/h3&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/KKAbraham.jpg/@@images/a9c63ec9-da24-42e0-98fd-67c8e50fe9f9.jpeg" alt="KK Abraham" class="image-inline" title="KK Abraham" /&gt;&lt;/th&gt;
&lt;td style="text-align: justify; "&gt;KK Abraham, President of Indian Network for People Living with HIV/AIDS, described how privacy could be understood as a luxury, in some cases it can be understood as a right, and in other cases it is understood of responsibility. Regarding HIV patients, Mr. Abraham emphasized the need for privacy to be understood as a right.  Mr. Abraham also pointed out that as trends are changing in India, and more services are becoming available, that this is the right time to talk about privacy. Closing his presentation Mr. Abraham called for a greater understanding of patients' privacy needs and the negative effect of stigma. &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;HIPPA with reference to Applicability to Patient Privacy and Clinical Data Confidentiality in India&lt;/h3&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Dr. Lavanian Dorairaj, MD, CEO at HCIT Consultants, described how IT is a  powerful tool for health care, despite the fact that health care has  been hesitant to use IT. He explained that IT can help reduce errors in  health care; it can help increase accessibility of patient data, improve  diagnosis, treatment, and prognosis. Healthcare IT has great advantages  but needs to be handled with great responsibility. He also pointed out  that IT can lead to privacy violations if inappropriate access to  patient records takes place. He argued that though India has recognized  the need for privacy, it still needs to find a way to implement privacy protections and police the implementation of the guidelines.  Drawing on examples from HIPPA, he argued that India would benefit from establishing privacy standards and security standards for health information. He explained further that HIPPA is a flexible rule, which obligates relevant entities to comply. The Rule is designed to be flexible. Entities regulated by the rules are obligated to comply. &lt;br /&gt;&lt;/td&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Lavanian.jpg/@@images/48425cbf-6de0-4c8c-8c41-dbad961c4970.jpeg" alt="Lavanian" class="image-inline" title="Lavanian" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/copy_of_P2.jpg/@@images/38e6121e-f6aa-4dfc-9b8c-0e9965a3d6d7.jpeg" title="Participants 2" height="234" width="220" alt="Participants 2" class="image-inline" /&gt;&lt;/th&gt;&lt;th&gt;&lt;img src="https://cis-india.org/home-images/copy_of_P3.jpg/@@images/27159bd7-e77b-4e98-bb8d-1d00d678441e.jpeg" alt="Participants 3" class="image-inline" title="Participants 3" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/copy_of_P4.jpg" alt="Participants 4" class="image-inline" title="Participants 4" /&gt;&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/P6.jpg/@@images/5983cfd4-b1be-499c-81ba-bf3339493879.jpeg" title="Participants 6" height="336" width="382" alt="Participants 6" class="image-inline" /&gt;&lt;/th&gt;&lt;th&gt;&lt;img src="https://cis-india.org/home-images/P7.jpg" alt="Participants 7" class="image-inline" title="Participants 7" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: center; "&gt;&lt;img src="https://cis-india.org/home-images/P5.jpg/@@images/4831ad29-740b-4334-9155-5603a21605ad.jpeg" alt="Participants 5" class="image-inline" title="Participants 5" /&gt;&lt;/p&gt;
&lt;p style="text-align: center; "&gt;&lt;img src="https://cis-india.org/home-images/P8.jpg" alt="Participants 8" class="image-inline" title="Participants 8" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/p9.jpg" title="Logos" height="72" width="697" alt="Logos" class="image-inline" /&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;Presentations&lt;/h2&gt;
&lt;p&gt;Click to &lt;a href="https://cis-india.org/internet-governance/presentation-files" class="internal-link"&gt;download&lt;/a&gt; the presentation files. [Zip files, 2184 Kb]&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/medical-privacy-conference-report'&gt;https://cis-india.org/internet-governance/blog/medical-privacy-conference-report&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>natasha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-07-10T13:41:26Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/march-2012-bulletin">
    <title>March 2012 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/march-2012-bulletin</link>
    <description>
        &lt;b&gt;In this month we announced the new clusters from Researchers at Work: Locating the Mobile, Interface Intimacies and Habits of Living. &lt;/b&gt;
        &lt;h2 style="text-align: justify; "&gt;Research&lt;/h2&gt;
&lt;h3 style="text-align: justify; "&gt;New series from RAW, new Clusters now Online!&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;From 2012 to 2015, the RAW series will build research clusters in the field of Digital Humanities. The Digital will be used as a way of unpacking the debates in humanities and social sciences and look at the new frameworks, concepts and ideas that emerge in our engagement with the digital. We hope to build knowledge networks and production of new knowledge around questions of body, governance and cultural production in the digital times that we live in. Spearheaded by experts in the field of science, technology, society and culture the clusters aim to produce and document new conversations and debates that shape the contours of Digital Humanities in Asia. &lt;a href="https://cis-india.org/raw/digital-humanities/digital-humanities-main/blogs/locating-mobile/locating-the-mobile" target="_blank"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/raw/digital-humanities/digital-humanities-main/blogs/locating-mobile/locating-the-mobile" target="_blank"&gt;Locating the Mobile: An      Ethnographic Investigation into Locative Media in Melbourne, Bangalore and      Shanghai&lt;/a&gt;&lt;br /&gt;Larissa Hjorth (RMIT University, Melbourne), Genevieve Bell (Intel, Shanghai)&lt;br /&gt;As yet we know little about the impact locative media is having, and will have upon people’s livelihoods and identity, or on public policy around privacy, identity, security and cultural production. Discourse in the field has opened up questions of art, innovation and experimentation. But there is a dearth of nuanced research on locative media that provides in-depth, contextual accounts of its socio-cultural and political dimensions. Not much work has been conducted into locative media as it migrates from art to the ‘messy’ area of everyday. The project seeks to address this knowledge gap by studying locative media in Bangalore, Melbourne and Shanghai.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/raw/digital-humanities/digital-humanities-main/blogs/interface-intimacies/interface-intimacies" target="_blank"&gt;Interface Intimacies&lt;/a&gt;&lt;br /&gt;Audrey Yue (Melbourne University) and Namita Malhotra (ALF)&lt;br /&gt;Users of technologies often express their engagement with technologies in affective terms. The interfaces that we see all around us constantly deflect our attention, emotions and desires on to different surfaces, creating flattened universes with the promises of deep immersion. Digging deep into interfaces, to examine peoples’ relationships with the digital interfaces around them the research cluster examines: What are the affective relationships that people have with their interfaces? What goes into anthropomorphising an interface? What are the larger politics of labour, performance and ownership that surround interface design? What are the ways in which people simulate presence and connections through their interfaces? How is the human presumed in computer-human interface design? What aesthetic and political moves are we witnessing with the rise of interface mediated publics? What and who is made opaque when interfaces become transparent? When interfaces get distributed, what are the possibilities and potential for art, theory and practice to move into new forms of politics?&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/raw/digital-humanities/blogs/habits-of-living/habits-of-living" target="_blank"&gt;Habits of Living: Global      Networks, Local Affects&lt;/a&gt;&lt;br /&gt;Wendy Chun (Professor, Brown University), Kelly Dobson, (Chair, Digital + Media, RISD, Providence), Matthew Fuller, David Gee (Reader in Digital Media, Center for Cultural Studies, Goldsmiths College, University of London) and Eivind Rossaak, (Associate Professor, Department of Research, National Library of Norway, Oslo).&lt;br /&gt;This is a global collaborative project to renew the conceptual power of networks. It concentrates on changing the habits of living. The Department of Modern Culture and Media at Brown University will be an important locus. Habits are crucial to understanding networks not simply as broad organizational structures but also as structures created through constant actions that are both voluntary and involuntary.&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify; "&gt;Digital Natives&lt;/h2&gt;
&lt;h3 style="text-align: justify; "&gt;Video Contest&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/digital-natives/vote-for-digital-natives" target="_blank"&gt;Who’s the Everyday Digital      Native? A global video contest finds the answer!&lt;/a&gt;&lt;br /&gt; CIS and Hivos are excited to announce the top five videos. The finalists      will each win EUR 500. According to Nishant Shah, the 12 video proposals      show that the everyday digital native does not wake up in the morning and      think, ‘today I will change the world’. Yet, in their everyday lives, when      they see the possibility of producing a change in their immediate      environments, they turn to the digital to find networks that can start a      change.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Public Lectures&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/digital-natives/d-coding-digital-natives" target="_blank"&gt;D:Coding Digital Natives&lt;/a&gt; (Nishant Shah, University of California, Los Angeles, March 9, 2012)&lt;br /&gt;"In the last three years of revolutions we have also now witnessed this extraordinary thing where lot of promises were made of different kinds of revolution but which never materialised in terms of what they intended to. Citizen action happens but it doesn’t lead into anything concrete." The lecture is featured in &lt;a href="http://www.youtube.com/watch?v=YvY__z3jN7M" target="_blank"&gt;YouTube&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/digital-natives-and-the-myth-of-revolution" target="_blank"&gt;Digital Natives and the      Myth of the Revolution: Questioning the Radical Potential of Citizen Action&lt;/a&gt; (Nishant Shah, Annenberg School of Communication, University of South      California, March 8, 2012): Nishant Shah made a presentation on      'Questioning the Radical Potential for Citizen Action'.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/ignite-talks" target="_blank"&gt;5 Challenges for the Future      of Learning: Digital Natives and How We Shall Teach Them&lt;/a&gt; (Digital Media and Learning Conference on Beyond Education Technologies,      Wyndham Parc 55 Hotel, San Francisco, March 1, 2012). Nishant Shah gave a      ignite talk.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/questioning-the-radical-potential-of-citizen-action" target="_blank"&gt;Digital Natives and the      Myth of the Revolution: Questioning the Radical Potential of Citizen      Action&lt;/a&gt; (UC Santa Cruz, Monday, March 5, 2012). Nishant Shah      gave a lecture. The lecture focused more on the India against Corruption      case-study rather than the theoretical framework to understanding      revolutions.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Column in Indian Express&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/digital-natives/pathways/pinning-the-badge" target="_blank"&gt;Pinning the Badge&lt;/a&gt;&lt;br /&gt;Nishant Shah, March 18, 2012&lt;br /&gt;In a world of competition, badging provides a holistic way of grading and learning, where individual talents are realized and the knowledge of the group is used. A peer-2-peer system of badging, which enables learners to be critically aware not only of their own interaction with knowledge but also recognises the ways in which larger communities of knowledge — including the peers and teachers — opens up an extraordinary way of thinking about education.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Book Review...A Few Excerpts&lt;a href="https://cis-india.org/digital-natives/media-coverage/an-experiment-in-social-engineering" target="_blank"&gt;&lt;/a&gt;&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/digital-natives/media-coverage/an-experiment-in-social-engineering" target="_blank"&gt;An Experiment in Social      Engineering: The Cultural Context of an Avatar&lt;/a&gt;&lt;i&gt;&lt;br /&gt;‘Engineering a cyber twin’ is an attempt to inventory the ontological features of an avatar... Ansher’s essay… eschews a simplistic binary of offline/online, preferring to focus on the domain of interaction between the two ‘personae’ of the same self&lt;/i&gt;.&lt;br /&gt;Pramod K. Nayar reviews Nilofar Shamim Ansher’s essay ‘Engineering a Cyber Twin’ from Digital Alternatives with a Cause? Book One: To Be.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify; "&gt;Accessibility&lt;/h2&gt;
&lt;h3 style="text-align: justify; "&gt;Analysis&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/accessibility/analysis-of-comments" target="_blank"&gt;Analysis of Comments by WBU      &amp;amp; IPA&lt;/a&gt;&lt;br /&gt;Rahul Cherian provides an analysis of the comments by the World Blind Union and the International Publishers Association after the 23rd session of the Standing Committee of Copyright and Related Rights.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Event Organised&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/accessibility/itu-tutorial-delhi" target="_blank"&gt;ITU Tutorial on Audiovisual      Media Accessibility&lt;/a&gt; (India International Centre, New Delhi,      March 14 to 15, 2012): At the invitation of the Centre for Internet and Society,      in cooperation with the ITU-APT Foundation of India, International      Telecommunication Union organized a two-day Tutorial on Audio Visual Media      Accessibility. The Tutorial was preceded by the fourth meeting of the      Focus Group on Audio Visual Media Accessibility on March 13, 2012. Sunil      Abraham participated in the event and was the Master of Ceremony on Day 1,      March 14, 2012.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify; "&gt;Access to Knowledge&lt;/h2&gt;
&lt;h3 style="text-align: justify; "&gt;Op-ed in Economic Times&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/a2k/patented-games" target="_blank"&gt;Patented Games&lt;/a&gt;, Sunil Abraham, March 8, 2012&lt;br /&gt;Some prefer Steve Jobs, patron saint of perfection, others prefer Nicholas Negroponte, messiah of the masses. While Mr. Jobs may be guilty of contributing to the digital divide, Mr. Negroponte may have contributed to bridging it with his innovation: the One Laptop per Child, also known as the $100 laptop or XO.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Events Participated&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/consumers-international-meeting-2012" target="_blank"&gt;Consumers International      Global Meeting 2012&lt;/a&gt; (Kuala Lumpur, March 8 and 9, 2012):      Pranesh Prakash participated in the global meeting organised by Consumers      International and spoke on UN Consumer Guidelines. Robin Brown, Tobias      Schönwetter and Guilherme Varella were the other speakers in the session.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/a2k/freedom-of-expression-and-ipr-meeting" target="_blank"&gt;Expert Meeting on Freedom      of Expression and Intellectual Property Rights&lt;/a&gt; (London,      November 18, 2011): The meeting was organized by ARTICLE 19. Nineteen      international scholars, experts and human rights activists met to explore      the antagonistic relationship between Intellectual Property (IP) and the      rights to freedom of expression and information. Pranesh Prakash was one      of the participants.&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify; "&gt;Openness&lt;/h2&gt;
&lt;h3 style="text-align: justify; "&gt;Events Organised&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;span&gt;&lt;a href="https://cis-india.org/openness/open-data-camp" target="_blank"&gt;Open DataCamp — 2012&lt;/a&gt;&lt;/span&gt; (Google, Old Madras Road, Bangalore, March 24,      2012): This was a one-day unconference for people working with data from      various sectors to come together and share their projects and ideas. It      was organised by the DataMeet group. Pranesh Prakash participated in the      event. Google, India Water Portal, Gramener, Microsoft Research, Akshara      Foundation, DataMeet, HasGeek and CIS were the sponsors.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/openness/free-arduino-workshop" target="_blank"&gt;Free Arduino Workshop (For Beginners)&lt;/a&gt;:      (CIS, Bangalore, March 3, 2012). The workshop drew participants such as      interaction designers, artists and those enthusiastic to get started with      creative projects but didn’t have prior experience with electronics. About      20 people participated in the workshop.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Events Participated&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/water-data-consultation" target="_blank"&gt;Water Data Consultation&lt;/a&gt; (Evoma Hotel,      Bangalore, March 23, 2012). Pranesh Prakash spoke on Policy Issues and      Developments around Open Data. The event was organized by Arghyam.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify; "&gt;Internet Governance&lt;/h2&gt;
&lt;h3 style="text-align: justify; "&gt;Column in FirstPost&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/facebook-stalker-is-not-real-problem" target="_blank"&gt;Why your Facebook Stalker      is Not the Real Problem&lt;/a&gt;, Nishant Shah, March 20, 2012:We live in networked conditions. This is a statement that can now be taken at face-value, and immediately explains our highly connected, inter-meshed environments…We need to start looking at larger invasive policies exercises by the different invisible actors like the ISP, ICT ministries, corporate policies, design choices and architecture of interception that sustain the networks we so gladly embrace.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Blog Entries&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;span&gt;&lt;a href="https://cis-india.org/internet-governance/blog/statutory-motion-against-intermediary-guidelines-rules" target="_blank"&gt;Statutory Motion against      Intermediary Guidelines Rules&lt;/a&gt;&lt;/span&gt;, Pranesh Prakash:A &lt;a href="http://164.100.47.5/newsite/bulletin2/Bull_No.aspx?number=49472" target="_blank"&gt;motion to annul&lt;/a&gt; the &lt;a href="https://cis-india.org/internet-governance/resources/intermediary-guidelines-rules" target="_blank"&gt;Intermediary Guidelines Rules&lt;/a&gt; was moved on March 23, 2012, by &lt;a href="http://india.gov.in/govt/rajyasabhampbiodata.php?mpcode=2106" target="_blank"&gt;Shri P. Rajeeve&lt;/a&gt;, CPI (M) MP in the Rajya Sabha from Thrissur, Kerala. We are very glad that Shri Rajeeve has moved this motion, and we hope that it gets adopted in the Lok Sabha as well, and that the Rules get defeated, notes Pranesh Prakash.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Events Organised&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;India Explores the Balance Points between Freedom of Expression, Privacy, National Security and Law Enforcement (New Delhi, March 5, 2012). Sunil Abraham participated in this closed-door meeting jointly organised with the Global Network Initiative. Issues relating to freedom of expression and privacy were discussed in the meeting. &lt;/li&gt;
&lt;li&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1627&amp;amp;qid=160620" target="_blank"&gt;Climate Change and Controversy Mapping&lt;/a&gt; (Indian Institute of Science, Bangalore, March 19 to 21, 2012). The Devechia Centre for Climate Change, the Indian Institute of Science and CIS organized a three-day workshop with Professor Bruno Latour. Doctorate students doing empirical work in various types of ecological crisis participated in the event and experimented with some of the digital tools and methods developed within the "mapping controversies" consortium.&lt;/li&gt;
&lt;li&gt;GeekUp with Erica Hagen (CIS, Bangalore, March 1, 2012). HasGeek organized a GeekUp with Erica Hagen of the GroundTruth Initiative. Erica gave a lecture on the theme: "&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1628&amp;amp;qid=160620" target="_blank"&gt;From Information to Empowerment: Unpacking the Equation&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1629&amp;amp;qid=160620" target="_blank"&gt;Cartonama Workshop&lt;/a&gt; (CIS, Bangalore, March 2 and 3, 2012). HasGeek organized a hands-on training for managing and building location based services. Twenty-two participants attended the workshop.&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1630&amp;amp;qid=160620" target="_blank"&gt;Global Censorship Conference&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Events Participated&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Abrams Institute for Freedom of Expression at Yale Law School is holding a conference on global censorship from March 30 to April 1, 2012, at Yale Law School. The programme is sponsored by the Information Society Project at Yale Law School and Thomson Reuters. Rishabh Dara, Google Policy Fellow who worked at CIS office in Bangalore on freedom of expression and internet-related policy issues is participating in the event as a speaker in the panel on Case Studies of Censorship.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1631&amp;amp;qid=160620" target="_blank"&gt;What is Stewardship in Cyberspace?&lt;/a&gt; (Innis Townhall, University of Toronto, Canada, March 18 and 19, 2012): Sunil Abraham was a panelist in the session “Plenary Panel and Discussions” at the second annual Cyber Dialogue.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1632&amp;amp;qid=160620" target="_blank"&gt;Secure IT 2012 — Securing Citizens through Technology&lt;/a&gt; (Claridges, New Delhi, March 1, 2012): The event was co-organised by DST and NSDI, Govt. of India in partnership with Elets Technomedia Pvt. Ltd. Sunil Abraham was a panelist. The &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1632&amp;amp;qid=160620" target="_blank"&gt;video is now online&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1633&amp;amp;qid=160620" target="_blank"&gt;International Conference on Mobile Law&lt;/a&gt; (ASSOCHAM House, New Delhi, March 1, 2012): Pranesh Prakash spoke in the panel on Mobiles - Privacy and Social Media on March 1, 2012.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/data-protection-experts-slam-state-for-sending-mass-smses" target="_blank"&gt;Data protection experts slam state for sending mass SMSes&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Media Coverage&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/data-protection-experts-slam-state-for-sending-mass-smses" target="_blank"&gt;Data protection experts slam state for sending mass SMSes&lt;/a&gt;&lt;br /&gt;"&lt;i&gt;The state government's use of unsolicited SMS a “clear abuse of the powers afforded by elected office... elected representatives would be justified in such measures, and in utilising public funds, in the event of a disaster, or when public order, public health or national security are compromised&lt;/i&gt;."&lt;br /&gt;Sunil Abraham, The Statesman, March 25, 2012.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/open-access-to-govt-data" target="_blank"&gt;Open access to government data on the cards&lt;/a&gt;&lt;br /&gt;"&lt;i&gt;Welcoming the approval for the NDSAP, Pranesh Prakash, said, “None of the criticisms ... CIS had sent in as part of the feedback requested on the draft have been addressed&lt;/i&gt;."&lt;br /&gt;Pranesh Prakash, The Hindu, March 25, 2012.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/facebook-page-mini-resume" target="_blank"&gt;Is your facebook page your mini resume?&lt;/a&gt;&lt;br /&gt;"&lt;i&gt;Background checks are common as some companies deal with sensitive information. So it’s not illegal, but intrusive. I think some power relationships can be abused if they cross the social networking barrier — like a boss-employee and teacher-student relationship&lt;/i&gt;."&lt;br /&gt;Sunil Abraham, IBN Live, March 26, 2012.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/click-play-watch" target="_blank"&gt;Click, Play, Watch&lt;/a&gt;&lt;br /&gt;"&lt;i&gt;Earlier, creative artistes depended on intermediaries like studios, TV channels and theatres to screen their work and connect with viewers. Now, they are looking at the online medium to connect with the audience directly.&lt;/i&gt;"&lt;br /&gt;Sunil Abraham, MidDay, March 18, 2012.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/save-your-voice-2014-a-movement-against-web-censorship" target="_blank"&gt;Save Your Voice — A movement against Web censorship&lt;/a&gt;&lt;br /&gt;"&lt;i&gt;Private sector does not protect the freedom of expression&lt;/i&gt;."&lt;br /&gt;Daily News &amp;amp; Analysis, March 13, 2012.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/big-bet-on-identity" target="_blank"&gt;India’s Big Bet on Identity&lt;/a&gt;&lt;br /&gt;"&lt;i&gt;There are obviously both privacy and security concerns when you’re collecting personal data from more than a billion people. “You can’t change your biometrics,”… so if they become compromised, it’s a difficult problem to fix&lt;/i&gt;."&lt;br /&gt;Ieeespectrum. March 2012 edition.&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify; "&gt;Telecom&lt;/h2&gt;
&lt;h3 style="text-align: justify; "&gt;Columns in Business Standard&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/telecom/2-g-supreme-court-judgement-1" target="_blank"&gt;The 2G Supreme Court      Judgment&lt;/a&gt;&lt;br /&gt;Shyam Ponappa, March 1 and March 4, 2012&lt;br /&gt;The Business Standard published Shyam Ponappa's two-part article deconstructing the assumptions in the Supreme Court's 2G judgment, and suggesting possible ways forward. The first one was published on March 1, 2012, and the second on March 4, 2012.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Blog Entry&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/telecom/convergence-india-2012" target="_blank"&gt;Convergence India 2012&lt;/a&gt;&lt;br /&gt; Yelena Gyulkhandanyan&lt;br /&gt; Yelena attended an event organised by the Exhibitions India Group from      March 21 to 23, 2012. She shares her experiences.&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify; "&gt;About CIS&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;CIS was registered as a society in Bangalore in 2008. As an independent, non-profit research organisation, it runs different policy research programmes such as Accessibility, Access to Knowledge, Openness, Internet Governance, and Telecom. Over the last four years our policy research programmes have resulted in outputs such as the e-Accessibility Policy Handbook for Persons with Disabilities with International Telecommunications Union, and &lt;a href="https://cis-india.org/digital-natives/front-page/blog/dnbook" target="_blank"&gt;Digital Alternatives with a Cause?&lt;/a&gt;, &lt;a href="https://cis-india.org/digital-natives/front-page/blog/position-papers" target="_blank"&gt;Thinkathon Position Papers&lt;/a&gt; and the &lt;a href="https://cis-india.org/digital-natives/front-page/blog/digital-natives-with-a-cause-a-report" target="_blank"&gt;Digital Natives with a Cause? Report&lt;/a&gt; with Hivos. With foreign governments we worked on National Enterprise Architecture and Government Interoperability Framework for Govt. of Iraq; Open Standards Policy for Govt. of Moldova; Free and Open Software Centre of Excellence project plan for Saudi Arabia; eGovernance Strategy Document for Govt. of Tajikistan. With the Government of India we have done policy research for Ministry of Communications &amp;amp; Information Technology, Ministry of Human Resource Development, Ministry of Personnel, Public Grievances and Pensions, Ministry of Social Justice and Empowerment, etc., on &lt;a href="https://cis-india.org/a2k/front-page/blog/wipo-broadcast-treaty-comments-march-2011" target="_blank"&gt;WIPO Treaties&lt;/a&gt;, &lt;a href="https://cis-india.org/a2k/front-page/blog/copyright-bill-analysis" target="_blank"&gt;Copyright Bill&lt;/a&gt;, &lt;a href="https://cis-india.org/openness/front-page/blog/comments-ifeg-phase-1" target="_blank"&gt;Interoperability Framework in eGovernance&lt;/a&gt;, &lt;a href="https://cis-india.org/internet-governance/blog/privacy/privacy-bill-2010" target="_blank"&gt;Privacy Bill&lt;/a&gt;, &lt;a href="https://cis-india.org/internet-governance/front-page/blog/cis-feedback-to-nia-bill" target="_blank"&gt;NIA Bill&lt;/a&gt;, &lt;a href="https://cis-india.org/internet-governance/front-page/front-page/comments-draft-national-policy-on-electronics" target="_blank"&gt;National Policy on Electronics&lt;/a&gt; and &lt;a href="https://cis-india.org/internet-governance/front-page/blog/comments-draft-rules" target="_blank"&gt;IT Act&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS is an accredited NGO at WIPO and has given &lt;a href="https://cis-india.org/a2k/blog/cis-analysis-july2011-treaty-print-disabilities" target="_blank"&gt;policy briefs&lt;/a&gt; to delegations from various countries, our Programme Manager, Nirmita Narasimhan won the &lt;a href="https://cis-india.org/accessibility/blog/national-award" target="_blank"&gt;National Award for Empowerment of Persons with Disabilities&lt;/a&gt; from the Government of India and also received the &lt;a href="https://cis-india.org/news/nirmita-nivh-award" target="_blank"&gt;NIVH Excellence Award&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3 style="text-align: justify; "&gt;Follow us Elsewhere&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Get short, timely messages from us on &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=456&amp;amp;qid=46981" target="_blank"&gt;Twitter&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Join the CIS group on &lt;a href="http://www.facebook.com/#%21/groups/28535315687/" target="_blank"&gt;Facebook&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Visit us at &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=459&amp;amp;qid=46981" target="_blank"&gt;www.cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;CIS is grateful to Kusuma Trust which was founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin, for its core funding and support for most of its projects.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/march-2012-bulletin'&gt;https://cis-india.org/about/newsletters/march-2012-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2012-07-09T07:33:44Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/may-2012-bulletin">
    <title>May 2012 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/may-2012-bulletin</link>
    <description>
        &lt;b&gt;Welcome to the newsletter issue of May 2012! In the current issue, we bring to you updates of our latest research, event reports, videos, and media coverage:
&lt;/b&gt;
        &lt;h2&gt;Access to Knowledge&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Access to Knowledge programme addresses the harms caused to consumers, developing countries, human rights, and creativity/innovation from excessive regimes of copyright, patents, and other such monopolistic rights over knowledge:&lt;/p&gt;
&lt;h3&gt;Copyright Amendment Bill&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/a2k/blog/analysis-copyright-amendment-bill-2012"&gt;Analysis      of the Copyright (Amendment) Bill 2012&lt;/a&gt;&lt;br /&gt;Pranesh Prakash&lt;br /&gt;There are some welcome provisions in the Copyright (Amendment) Bill 2012, and some worrisome provisions. Pranesh Prakash examines five positive changes, four negative ones, and notes the several missed opportunities. The larger concern, though, is that many important issues have not been addressed by these amendments, and how copyright policy is made without evidence and often out of touch with contemporary realities of the digital era. &lt;a href="http://infojustice.org/archives/26243"&gt;The analysis was reposted in infojustice.org on May 25, 2012&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Op-ed in Indian Express&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/a2k/copyright-madness"&gt;Copyright      Madness&lt;/a&gt; (Lawrence Liang and Achal Prabhala, Indian Express, May      22, 2012): India’s Copyright Act allows owners of content the right to      prevent infringement through the use of injunctions, but these injunctions      have to be narrowly construed and applied only to specific instances of      infringement. This is to say, take down the infringing video, not the      whole website, and don’t intimidate the host. When injunctions threaten      freedom of speech and expression, then free speech should necessarily      trump copyright claims — and the courts cannot be used as convenient      shopping forums for maladies that don’t exist.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Call for Participation&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/a2k/global-congress-on-ip-call-for-participation"&gt;2012      Global Congress on Intellectual Property and the Public Interest: Call for      Participation and Save the Date&lt;/a&gt; (FGV Law School, Rio De      Janeiro, Brazil, December 15 – 17, 2012): We invite applications to attend      the Congress, including proposals to chair workshops or deliver a paper or      presentation related to the Congress’s theme.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Event Participated&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/workshop-on-education-and-copyright"&gt;The      International Copyright System and Access to Education: Challenges, New      Access Models and Prospects for New Principles&lt;/a&gt; (Max Planck      Institute, Munich, Germany, May 14 and 15, 2012). The event was organised      by the University of Minnesota and Max Planck Institute. Pranesh Prakash      participated in the event.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;News &amp;amp; Media&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/will-copyright-help-starving-artist"&gt;Will      the Copyright Law Help the Starving Artist?&lt;/a&gt;:(by Margherita      Stancati, Wall Street Journal, May 28, 2012): "The singers and producers      of...unlicensed versions could be jailed under the current India Copyright      Act, which allows even non-commercial copyright infringers to be put      behind bars."&lt;b&gt;&lt;br /&gt;Pranesh Prakash&lt;/b&gt; quoted in the Wall Street Journal.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/did-sibal-just-get-arm-twisted-by-book-publishers"&gt;Did      Sibal just get arm-twisted by book publishers?&lt;/a&gt; (FirstPost, May      25, 2012): Pranesh Prakash’s article on parallel importation of books is      referred in this article.&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;Accessibility&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;India has an estimated 70 million disabled persons who are unable to read printed materials due to some form of physical, sensory, cognitive or other disability. The disabled need accessible content, devices and interfaces facilitated via copyright law and electronic accessibility policies:&lt;/p&gt;
&lt;h3&gt;Blog Entries&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/accessibility/copyright-amendments"&gt;Copyright      Amendments – Empowering the Print Disabled&lt;/a&gt; by Rahul Cherian.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/accessibility/faq-on-copyright-amendment-bill-2012"&gt;An      FAQ on the Copyright Amendment Bill, 2012, for the Benefit of Persons with      Disabilities&lt;/a&gt; by Dr. Sam      Taraporevala and Rahul Cherian.&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;Openness&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The 'Openness' programme critically examines alternatives to existing regimes of intellectual property rights, and transparency and accountability. Under this programme, we study Open Government Data, Open Access to Scholarly Literature, Open Access to Law, Open Content, Open Standards, and Free/Libre/Open Source Software:&lt;/p&gt;
&lt;h3&gt;Article in the Indian Express&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/cancel-the-subscription"&gt;Cancel      the Subscription&lt;/a&gt; (Prof. Subbiah Arunachalam, Indian Express,      May 8, 2012): It has been a slow but steady move to make scholarship      freely available... In India,      though, there appears to be very little enthusiasm among the leaders of      the science establishment. Neither the office of the principal scientific      adviser nor the department of science and technology seems to have shown      any interest in mandating open access to taxpayer-funded research. The      National Knowledge Commission has recommended mandating open access to all      publicly funded research, but it is not clear who will implement the recommendation.      Right now, it is left to individuals to promote open access in India.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Event Organised&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/design-public-delhi-event-report"&gt;Design!PubliC      — Third Conclave in New Delhi&lt;/a&gt; (National Museum, New Delhi,      April 20, 2012): The event was organized by the Center for Knowledge      Societies in collaboration with IBM, the Bill and Melinda Gates      Foundation, Google and the Centre for Internet and Society. Sunil Abraham      was a panelist and spoke in the session on Participation, Collaboration      and Innovation. &lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;Internet Governance&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Internet Governance programme conducts research around the various social, technical, and political underpinnings of global and national Internet governance, and includes online privacy, freedom of speech, and Internet governance mechanisms and processes:&lt;/p&gt;
&lt;h3&gt;Google Policy Fellowship&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/google-policy-fellowship"&gt;Google      Policy Fellowship Programme: Call for Applications&lt;/a&gt;: CIS is      inviting applications for the Google Policy Fellowship programme. Google      is providing a USD 7,500 stipend to the India Fellow, who will be selected      by August 15, 2012. The focus areas for the present fellowship programme      include Access to Knowledge, Openness in India, Freedom of Expression,      Privacy, and Telecom. The duration of the fellowship will be for about ten      weeks starting from August 2012 upto October 2012. CIS will select the      India Fellow. Send in your applications for the position by June 27, 2012.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Events Participated&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/internet-at-liberty-2012"&gt;Internet      at Liberty 2012: Promoting Progress and Freedom&lt;/a&gt; (Newseum,      Pennsylvania Avenue Northwest Washington, D.C., May 23 – 24, 2012): Sunil      Abraham was a speaker in Plenary IV, Debate 3: In a world where nearly      nine out of ten Internet users are not American, what is the responsibility      of United States institutions in promoting internet freedom?&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Meeting      on Internet Governance (Conference Hall No. 4009, Dept. of Electronics      &amp;amp; Information Technology, CGO Complex, New Delhi, May 9, 2012):      Pranesh Prakash participated in this meeting.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Op-ed in Down to Earth&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/beyond-sharing"&gt;Beyond      Sharing: Towards our Digital Futures&lt;/a&gt; (Nishant Shah, Down to      Earth, May 31, 2012): The battle is not about file sharing and a petty      film producer wanting to rake in the box office earnings. It is about the      law’s incapacity to deal with post-analogue practices and processes.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Columns by Nishant Shah&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/open-letter-to-kolaveri-di"&gt;Open      letter to Kolaveri Di makers: How Dare You!&lt;/a&gt; (Nishant Shah,      FirstPost, May 22, 2012): When it comes to piracy, you are sure to have an      opinion. You might either make a virtue out of it, talking about cultural      commons and collaborative conditions of production. Or you might vilify it      as the social fault-line that is destroying the very pillars of commerce      and cultural negotiations.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/private-eye"&gt;The      Private Eye&lt;/a&gt; (Nishant Shah, Indian Express, May 14, 2012): As we      move towards a data-driven future, we need to be more aware of the      different kinds of data sets that we are making public and educate      ourselves about the risks of this disclosure, without being carried away      by the sway of meme-like behaviour and viral trends online.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Video&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/do-it-rules-indirectly-lead-to-censorship-of-internet"&gt;Do      IT Rules 2011 indirectly leads to Censorship of Internet&lt;/a&gt;:      Pranesh Prakash along with Dr. Arvind Gupta, National Convener, BJP IT      Cell and Ms. Mishi Choudhary, Executive Director, SFLC participated in a      panel discussion on censorship of the Internet on May 8, 2012. The      discussion was broadcast on Yuva iTV and featured on &lt;a href="http://www.youtube.com/watch?v=KRIJRhpW-Bc"&gt;YouTube&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Letter&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/letter-for-civil-society-involvement"&gt;Letter for Civil Society Involvement in ITU’s WCIT&lt;/a&gt; (by Center for Democracy and Technology): Academics and civil society groups wrote to the ITU Secretary-General Dr. Hamadoun Touré regarding the lack of opportunity for civil society participation in the World Conference on International Telecommunications process.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Blog Entry&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/open-letter-to-hillary-clinton"&gt;Open letter to Hillary Clinton on Internet freedom&lt;/a&gt; (by Sunil Abraham): This blog entry is based on a presentation made in the Internet at Liberty conference in Washington DC on May 24, 2012.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Media Coverage&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/why-this-blocking"&gt;Why this      blocking di?&lt;/a&gt; (by R Krishna, Daily News &amp;amp; Analysis, May 27,      2012): “&lt;i&gt;Unlike the Calcutta High Court order in March this year, which      specified the 104 websites that should be blocked, a John Doe order      doesn’t mention any specific website. In some cases, the websites are      being blocked without any evidence (of copyright infringement). Courts      need to be informed of what people with John Doe orders are doing. We need      to be specific about what can be blocked and what can’t be.&lt;/i&gt;”&lt;b&gt;&lt;br /&gt;Pranesh Prakash&lt;/b&gt; quoted in Daily News &amp;amp; Analysis&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/withdraw-india-proposal-for-un-committee-on-internet-policy"&gt;Rajeev      Chandrasekhar Urges PM To Withdraw India’s Proposal For UN Committee On      Internet-Policy&lt;/a&gt; (by Anupam Saxena, Medianama, May 16, 2012): An      interview that Medianama had with Pranesh Prakash is cited in this blog      post.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/mps-oppose-curbs-on-internet"&gt;MPs      oppose curbs on internet; Sibal promises discussions&lt;/a&gt; (Times of      India, May 18, 2012): “&lt;i&gt;The IT      minister has promised to hold consultations but the ideal way to do so      would have been to scrap the rules and start from scratch...&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;It's not only about language in these      rules. There is a problem with provisions like the one that empowers      intermediaries to remove content without notifying the user who had      uploaded the content or giving users a chance to explain themselves.&lt;/i&gt;”&lt;b&gt;&lt;br /&gt;Pranesh Prakash&lt;/b&gt; quoted in the Times of India.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/sibal-shoot-down-motion-to-kill-it-rules"&gt;Kapil      Sibal &amp;amp; Co shoot down motion to kill IT Rules: cite terrorism, drugs&lt;/a&gt; (by Prachi Shrivastava, Legally India, May 18, 2012): “&lt;i&gt;Government is not censoring. It has      created a system by which anyone can censor with impunity&lt;/i&gt;.”&lt;b&gt;&lt;br /&gt;Pranesh Prakash&lt;/b&gt; quoted in Legally India.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/vimeo-ban"&gt;Vimeo Ban: More Web Censorship&lt;/a&gt; (by Preetika Rana, Wall Street Journal, May 18, 2012): “&lt;i&gt;Shutting websites merely on the basis      of suspicion amounts to private crackdown on free speech of the web...Why      didn’t the telecom ministry repeal or object to the move, knowing that the      court didn’t spell out the websites to be blocked?&lt;/i&gt;”&lt;br /&gt; &lt;b&gt;Pranesh Prakash &lt;/b&gt;quoted in Wall      Street Journal.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/taming-the-web"&gt;Taming the      Web, are we?&lt;/a&gt; (by Javed Anwer, Economic Times, May 13, 2012):      "&lt;i&gt;During the revolutions in Arab      countries last year, protesters mobilized themselves through Twitter and      Facebook. Then there are Wikileaks and Anonymous. This has made      governments and politicians jittery.&lt;/i&gt;"&lt;b&gt;&lt;br /&gt;Sunil Abraham&lt;/b&gt; quoted in the Economic Times.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/rajya-sabha-nod-to-harsh-it-rules"&gt;Cordon      tightens: Rajya Sabha nod to harsh IT rules&lt;/a&gt; (Anil Sharma and      Aishhwariya Subramanian, Daily News &amp;amp; Analysis, May 18, 2012): "&lt;i&gt;The trouble with Indian government's      proposal to address issues such as network neutrality, privacy and freedom      of expression, is top-down. Unlike other countries where internet policies      have always been developed with consultation with other stakeholders, here      the government imposes its will.&lt;/i&gt;"&lt;b&gt;&lt;br /&gt;Sunil Abraham&lt;/b&gt; quoted in Daily News &amp;amp; Analysis.&lt;br /&gt;"&lt;i&gt;It is an ironical situation where India is not following domestically what it is proposing internationally&lt;/i&gt;."&lt;b&gt; Pranesh Prakash&lt;/b&gt; quoted in the same article in Daily News &amp;amp; Analysis.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/individuals-in-search-of-society"&gt;Empires:      Individuals in Search of Society&lt;/a&gt; (Marc Lafia, Huffington Post, May      18, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/cyber-appellate-tribunal-bengaluru"&gt;Cyber      Appellate Tribunal in Bengaluru&lt;/a&gt; (Deccan Herald, May 9, 2012): “&lt;i&gt;The state IT secretary has passed more      than 80 orders. They include both cases of phishing and orders against      cyber cafes for not adhering to rules under the IT Act. The Adjudicator      has held that ‘section 43 of IT Act is not applicable to a body or      Corporate’, after the amended IT Act came into force in 2008&lt;/i&gt;.”&lt;b&gt; Pranesh Prakash&lt;/b&gt; quoted in the Deccan Herald.&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;Digital Natives&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Digital Natives with a Cause? is a research inquiry that looks at the changing landscape of social change and political participation and the role that young people play through digital and Internet technologies, in emerging information societies. Consolidating knowledge from Asia, Africa and Latin America, it builds a global network of knowledge partners who critically engage with discourse on youth, technology and social change, and look at alternative practices and ideas in the Global South:&lt;/p&gt;
&lt;h3&gt;Columns by Nishant Shah&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/digital-natives/digitally-analogue"&gt;Digitally      Analogue&lt;/a&gt; (Nishant Shah, Indian Express, May 27, 2012): While      those of us who were not born digital natives — we still remember what an      audio cassette looks like and the smell of screen printing — will      negotiate with the form of our access to cultural objects, it is also time      to realise that being non-digital is no longer an option.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/digital-natives/we-are-cyborgs"&gt;We      Are All Cyborgs&lt;/a&gt; (Nishant Shah, Indian Express, April 29, 2012):      The cyborg reminds us that who we are as human beings is very closely      linked with the technologies we use.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Citizen Action&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/digital-natives/resisting-revolutions"&gt;Resisting      Revolutions: Questioning the Radical Potential of Citizen Action&lt;/a&gt; (Nishant Shah, Development, Volume 55, Issue 2, May 2012): In this peer      reviewed journal article, Nishant Shah looks into the radical claims and      potentials of citizen action that have emerged in the last few years. He      seeks to show how citizen action is not necessarily a radical form of      politics and that we need to make a distinction between Resistances and      Revolutions. It locates resistance as an endemic condition of      governmentality within a State–Citizen–Market relationship and shows how      it often strengthens the status quo rather than radically undermining it.      He examines a campaign against corruption in India to see how the      dissonance between the claims of the future and the practices of the      present is produced in citizen action.&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;Telecom&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;While the potential for growth and returns exist for telecommunications in India, a range of issues need to be addressed. One aspect is more extensive rural coverage and the other is a countrywide access to broadband which is low. Both require effective and efficient use of networks and resources, including spectrum:&lt;/p&gt;
&lt;h3&gt;Course&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/telecom/course/knowledge-and-capacity-around-telecom-policy"&gt;Building Knowledge and Capacity      around Telecommunication Policy in India&lt;/a&gt;: Ford Foundation has      given a grant of $200,000 to CIS to build expertise in the area of      telecommunications in India over a period of two years. The project      involves creating a repository comprising information about      telecommunications related issues and policies and online course materials  designed for a multi-stakeholder      audience, organising interactive public lectures and workshops around the      country to disseminate information on telecom issues and using traditional      and new forms of media to disseminate information to academia, civil      society, policy makers and the general public.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Column in Business Standard&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/telecom/coming-telecom-monopoly"&gt;The Coming Telecom Monopoly&lt;/a&gt; (Shyam Ponappa, Business Standard, May 3, 2012): “The 2G judgment and Trai      spectrum pricing recommendations have led to a policy that makes sense for      only one survivor.”&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Event Organised&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/telecom/ijlt-cis-lecture-series-nlsiu"&gt;3rd IJLT-CIS Lecture Series at NLSIU,      Bangalore&lt;/a&gt; (National Law School of India University, Bangalore,      May 27, 2012): Organised by CIS in association with the Indian Journal of      Law and Technology. Professor Rohan Samarajiva delivered a lecture on      Tariff Regulation in South Asia.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/awesom-contracts-project"&gt;The Awesome Contracts Project&lt;/a&gt; (Geekup @ CIS, May 18, 2012): CIS co-organised the event with Has Geek.      Vivek Durai, co-founder at Awesome Contracts gave a public lecture. Amith      Narayan participated through Skype.&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;About CIS&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;CIS was registered as a society in Bangalore in 2008. As an independent, non-profit research organisation, it runs different policy research programmes such as Accessibility, Access to Knowledge, Openness, Internet Governance, and Telecom. Over the last four years our policy research programmes have resulted in outputs such as the &lt;a href="https://cis-india.org/advocacy/accessibility/blog/e-accessibility-handbook"&gt;e-Accessibility Policy Handbook for Persons with Disabilities&lt;/a&gt; with ITU and G3ict, and &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1644&amp;amp;qid=165304" target="_blank"&gt;Digital Alternatives with a Cause?&lt;/a&gt;, &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1645&amp;amp;qid=165304" target="_blank"&gt;Thinkathon Position Papers&lt;/a&gt; and the &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1646&amp;amp;qid=165304" target="_blank"&gt;Digital Natives with a Cause? Report&lt;/a&gt; with Hivos. With foreign governments we worked on National Enterprise Architecture and Government Interoperability Framework for Govt. of Iraq; Open Standards Policy for Govt. of Moldova; Free and Open Software Centre of Excellence project plan for Saudi Arabia; eGovernance Strategy Document for Govt. of Tajikistan. With the Government of India we have done policy research for Ministry of Communications &amp;amp; Information Technology, Ministry of Human Resource Development, Ministry of Personnel, Public Grievances and Pensions, Ministry of Social Justice and Empowerment, etc., on &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1647&amp;amp;qid=165304" target="_blank"&gt;WIPO Treaties&lt;/a&gt;, &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1648&amp;amp;qid=165304" target="_blank"&gt;Copyright Bill&lt;/a&gt;, &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1649&amp;amp;qid=165304" target="_blank"&gt;Interoperability Framework in eGovernance&lt;/a&gt;, &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1650&amp;amp;qid=165304" target="_blank"&gt;Privacy Bill&lt;/a&gt;, &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1651&amp;amp;qid=165304" target="_blank"&gt;NIA Bill&lt;/a&gt;, &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1652&amp;amp;qid=165304" target="_blank"&gt;National Policy on Electronics&lt;/a&gt; and &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1653&amp;amp;qid=165304" target="_blank"&gt;IT Act&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS is an accredited NGO at WIPO and has given &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1654&amp;amp;qid=165304" target="_blank"&gt;policy briefs&lt;/a&gt; to delegations from various countries, our Programme Manager, Nirmita Narasimhan won the &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1655&amp;amp;qid=165304" target="_blank"&gt;National Award for Empowerment of Persons with Disabilities&lt;/a&gt; from the Government of India and also received the &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1656&amp;amp;qid=165304" target="_blank"&gt;NIVH Excellence Award&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Follow us elsewhere&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Get short, timely messages from us      on Twitter&lt;/li&gt;
&lt;li&gt;Join the CIS group on &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1657&amp;amp;qid=165304" target="_blank"&gt;Facebook&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Visit us at &lt;a href="https://cis-india.org/"&gt;http://cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;i&gt;CIS is grateful to Kusuma Trust which was founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin, for its core funding and support for most of its projects.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/may-2012-bulletin'&gt;https://cis-india.org/about/newsletters/may-2012-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2012-07-07T06:59:29Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/april-2012-bulletin">
    <title>April 2012 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/april-2012-bulletin</link>
    <description>
        &lt;b&gt;In this issue of our newsletter, we bring you updates of our latest research, event reports, videos, news and media coverage during the month of April 2012:&lt;/b&gt;
        &lt;h2&gt;Internet Governance&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Internet Governance programme conducts research around the various social, technical, and political underpinnings of global and national Internet governance, and includes online privacy, freedom of speech, and Internet governance mechanisms and processes:&lt;/p&gt;
&lt;h3&gt;Google Policy Fellowship&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/chilling-effects-on-free-expression-on-internet"&gt;Intermediary      Liability in India: Chilling Effects on Free Expression on the Internet&lt;/a&gt;&lt;br /&gt;Rishabh Dara, Google Policy Fellow&lt;br /&gt;CIS in partnership with Google India conducted the Google Policy Fellowship 2011. This was offered for the first time in Asia Pacific as well as in India. Rishabh Dara was selected as a fellow. He researched upon issues relating to freedom of expression. The results of the paper demonstrate that the ‘Information Technology (Intermediaries Guidelines) Rules 2011’ notified by the Government of India on April 11, 2011 have a chilling effect on free expression.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Announcement&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/cis-joins-gni"&gt;The Centre for Internet &amp;amp; Society Joins the Global Network Initiative&lt;/a&gt;&lt;br /&gt;CIS officially joined the Global Network Initiative. CIS would bring to GNI in-depth expertise on global internet governance as well as online freedom of expression and privacy in India. GNI Executive Director Susan Morgan said “&lt;i&gt;We are delighted to add our first member based in India and welcome CIS’s engagement in support of transparency and accountability in technology&lt;/i&gt;.”&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Op-ed in the Hindu&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/chilling-effects-frozen-words"&gt;Chilling      Effects and Frozen Words&lt;/a&gt; (Lawrence Liang, Hindu, April 30,      2012): “What if the real danger is not that we lose our freedom of speech      and expression but our sense of humour as a nation?...One hopes that our      lawmakers, even if they are averse to reading the Indian Constitution,      will be slightly more open to the poetic licence granted by Kautilya.” &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Columns in the Indian Express&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/idea-of-the-book"&gt;The Idea of the Book&lt;/a&gt; (Nishant Shah, Indian Express, April 8, 2012): “Its future lies in a trans-media format that is ever evolving... The form of the book is going to change as it has over the last 500 years. However, the idea of the book — a receptacle that contains and records collective wisdom, information, ideas, knowledge, experiences and imagination of humankind – is here to stay.”&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/india-broken-internet-law-multistakeholderism"&gt;India's Broken Internet Laws Need a Shot of Multi-stakeholderism&lt;/a&gt; by Pranesh Prakash. (An edited version of this article was published in the Indian Express as &lt;a href="http://www.indianexpress.com/story-print/941491/"&gt;"Practise what you preach"&lt;/a&gt; on Thursday, April 26, 2012.)&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Event Reports&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/all-india-privacy-delhi-report"&gt;The      All India Privacy Symposium&lt;/a&gt; (India International Centre, New      Delhi, February 4, 2012): The symposium was organised around five thematic      panel discussions: privacy and transparency, privacy and e-governance      initiatives, privacy and national security, privacy and banking and health      privacy. Privacy India in partnership with CIS, International Development      Research Centre, Privacy International, Commonwealth Human Rights      Initiative and Society in Action Group organised this event.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/high-level-privacy-report"&gt;The      High Level Privacy Conclave&lt;/a&gt; (Paharpur Business Centre, Nehru      Place Greens, New Delhi, February 3, 2012): The conclave was organised      around two panels: national Security and privacy and internet and privacy.      Malavika Jayaram moderated the first panel discussion on national Security      and privacy. Sunil Abraham moderated the second panel discussion on      internet and privacy. Privacy India in partnership with CIS, International      Development Research Centre, Privacy International, Commonwealth Human      Rights Initiative and Society in Action Group organised this event.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Events Organised&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/resisting-internet-censorship"&gt;Resisting      Internet Censorship: Strategies for Furthering Freedom of Expression in      India&lt;/a&gt; (Bangalore International Centre, TERI Complex, Domlur,      April 21, 2012): CIS co-organised this event with the Foundation for Media      Professionals. Members of Parliament, P. Rajeeve and Rajeev Chandrashekar      and Member of Legislative Council, Karnataka, V.R. Sudarshan participated      in the event.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/talk-by-vasant-gangavane"&gt;Konkan      Corridor Project — A Lecture by Vasant Gangavane&lt;/a&gt; (Ashoka      Innovators for the Public, Bangalore, April 16, 2012): Well known social      worker Vasant Gangavane gave a lecture.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/cybernetic-vehicles"&gt;Braitenberg      Cybernetic Vehicles: Workshop, Film Screening &amp;amp; Discussion&lt;/a&gt; (Metaculture Media Lab, CIS, Bangalore, April 14, 2012): There was a short      presentation about Braitenberg vehicles.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Events Participated&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/giga-conference"&gt;GIGA International      Conference Series - 1&lt;/a&gt; (NALSAR University of Law, Justice City      Campus, Shameerpet, Hyderabad, April 5 and 6, 2012): The Institute of      Global Internet Governance and Advocacy and Department of Electronics and      Information Technology organised the conference. Sunil Abraham gave a      lecture on &lt;i&gt;Digital Natives vs.      Digital Naivety&lt;/i&gt; in the session on Internet Governance &amp;amp; Society.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Expert-Group      on Privacy Issues (New Delhi, April 13 and 14, 2012): The Planning      Commission constituted this expert group under the chairmanship of Justice      AP Shah. Sunil Abraham participated in the first meeting of the sub-group      on privacy issues.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Video&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/privacy-internationals-trip-to-asia"&gt;Privacy      International's Trip to Asia&lt;/a&gt; (by Emma Draper in Privacy      International blog): In February 2012, the Privacy International team      travelled to India, Bangladesh and Hong Kong to meet with local partners      in the region and speak at four conferences they had organized. The team      got a chance to interview its partners in India and Bangladesh on the      privacy issues facing them at the moment. This is captured in a video      about contemporary privacy issues in India and Bangladesh. &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Media Coverage&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/mainstream-vs-social"&gt;It’s      mainstream vs social&lt;/a&gt; (Guest column by Mahima Kaul, Sunday      Guardian, April 30, 2012): “&lt;i&gt;If the      video is judged to be 'obscene', then under s.67 of the Information      Technology Act, 'causing [obscenity] to be transmitted', is also a crime&lt;/i&gt;,”...Sunil      Abraham quoted in the Sunday Guardian.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/from-cyber-india-to-censor-india"&gt;From      Cyber India to Censor India: Groups challenge didactic govt&lt;/a&gt; (by      Satarupa Paul, Sunday Guardian, April 29, 2012): “&lt;i&gt;Instead of a court deciding what makes content illegal, private      intermediaries get to decide. And there is no penalty for anyone abusing      the take-down notice system,&lt;/i&gt;”...Sunil Abraham quoted in the Sunday      Guardian.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/social-media-indian-govt"&gt;Social      Media 1, Indian Government 0&lt;/a&gt; (by Heather Timmons, New York      Times, April 26, 2012): “&lt;i&gt;Because      India does not have a bilateral cyber-crime agreement with the United      States (as the European Union does), getting American companies like      Facebook and Google to take down or investigate the source of content that      offends Indian government officials can be a slow and cumbersome process&lt;/i&gt;,”...Sunil      Abraham quoted in the New York Times. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/private-sector-censors"&gt;Private      sector censors&lt;/a&gt; (by Salil Tripathi, LiveMint, April 25, 2012): “&lt;i&gt;Companies which have no interest in      free speech are now taking these decisions. They have the power to do so      and they are using it without any sense of responsibility&lt;/i&gt;,”...Sunil      Abraham quoted in LiveMint. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/left-may-for-once-be-right"&gt;Views      | Why the Left may for once be right&lt;/a&gt; (by Pramit Bhattacharya,      LiveMint, April 23, 2012): “&lt;i&gt;It has      become much easier in India to ban an e-book than a book&lt;/i&gt;,”...Pranesh      Prakash quoted in LiveMint. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/campaign-against-curbs-on-websites"&gt;Campaign      against curbs on websites gathers steam&lt;/a&gt; (by Arpan Daniel      Varghese, IBN Live, April 23, 2012): “&lt;i&gt;If      a company wants to target your organization’s social media network, they      can keep sending fraudulent emails to you and you will have to keep      deleting it unless you are ready to face litigation or government action.&lt;/i&gt;..Sunil      Abraham quoted in IBN Live.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/anti-net-censorship-echo-in-house"&gt;Expect      anti-net censorship echo in house&lt;/a&gt; (by Arpan Daniel Varghese,      IBN Live, April 25, 2012): “&lt;i&gt;why      should freedom of speech and expression be any different on the Internet?&lt;/i&gt;”...Sunil      Abraham quoted in IBN Live.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/mobilising-support-for-freedom-on-web"&gt;Mobilising      support for freedom on the Web&lt;/a&gt; (by Deepa Kurup Hindu, April 22,      2012): Rishabh Dara’s research published as part of the Google Policy      Fellowship is quoted. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/draconian-it-rules"&gt;MPs      to be taught ‘draconian’ IT Act Rules as India.net support galvanises for      annul motion&lt;/a&gt; (by Prachi Shrivastava, Legally India, April 23,      2012): Prachi has blogged about the Resisting Internet Censorship      co-organised by CIS and the Foundation for Media Professionals in      Bangalore.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/india-arrests-professor-over-cartoon"&gt;India      arrests professor over political cartoon&lt;/a&gt; (by Rama Lakshmi,      Washington Post, April 13, 2012): “&lt;i&gt;The      state’s new-found aversion to non-believers has gone a bit too far&lt;/i&gt;,”...Pranesh      Prakash quoted in Washington Post.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/beauty-blog-creates-furore"&gt;A      beauty’s blog creates furore&lt;/a&gt; (by Lakshmi Krupa, Deccan      Chronicle, April 10, 2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;Digital Natives&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Digital Natives with a Cause? is a research inquiry that looks at the changing landscape of social change and political participation and the role that young people play through digital and Internet technologies, in emerging information societies. Consolidating knowledge from Asia, Africa and Latin America, it builds a global network of knowledge partners who critically engage with discourse on youth, technology and social change, and look at alternative practices and ideas in the Global South:&lt;/p&gt;
&lt;h3&gt;Public Lecture&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/ignite-talks"&gt;5 Challenges for the      Future of Learning: Digital Natives and How We Shall Teach Them&lt;/a&gt; (Wyndham Parc 55 Hotel, San Francisco, California, March 1, 2012): Nishant      Shah gave a ignite talk. The video is now online.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Book Review...a few excerpts&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/digital-natives/media-coverage/immigrants-not-natives"&gt;Immigrants      not Natives&lt;/a&gt;: “&lt;i&gt;‘To Be’,      ‘To Think’, ‘To Act’ and ‘To Connect’ provides many fascinating and      thought-provoking insights into the possibilities for reflection, action      and interaction&lt;/i&gt;,”... Sally Wyatt, eHumanities Group, Royal Netherlands      Academy of Arts &amp;amp; Sciences/Maastricht University.&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;Accessibility&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;India has an estimated 70 million disabled persons who are unable to read printed materials due to some form of physical, sensory, cognitive or other disability. The disabled need accessible content, devices and interfaces facilitated via copyright law and electronic accessibility policies:&lt;/p&gt;
&lt;h3&gt;Event Report&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/accessibility/itu-tutorial-event-report"&gt;ITU      Tutorial on Audiovisual Media Accessibility&lt;/a&gt; (India      International Centre, New Delhi, March 14 – 15, 2012): CIS in cooperation      with the ITU-APT Foundation of India organised a two-day tutorial on      Audio-Visual Media Accessibility. Sunil Abraham was the Master of Ceremony      on Day 1. Ravi Shanker, Administrator, Universal Service Obligation Fund,      Dr. Govind, CEO, National Internet Exchange of India, Swaran Lata,      Director and Head of Department, TDIL Programme, DIT, R.N. Jha, Deputy      Director General (International Relations), Department of      Telecommunications and Archana Gulati, Financial Advisor, National      Disaster Management Authority participated in this event.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;New Fellow at CIS&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/about/people/people/fellow"&gt;Rahul      Cherian joins CIS&lt;/a&gt;: Disability policy activist, lawyer and      co-founder of Inclusive Planet, Rahul Cherian has joined CIS as a Fellow.      Rahul will be working on disability policy reform and advocacy. &lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;Access to Knowledge&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Access to Knowledge programme addresses the harms caused to consumers, developing countries, human rights, and creativity/innovation from excessive regimes of copyright, patents, and other such monopolistic rights over knowledge:&lt;/p&gt;
&lt;h3&gt;New Event&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/a2k/global-congress-on-ip"&gt;2012      Global Congress on Intellectual Property and the Public Interest&lt;/a&gt; (FGV Law School, Rio De Janeiro, Brazil, December 15 – 17, 2012): We are      pleased to announce the Second Global Congress on Intellectual Property      and the Public Interest. The theme for this year’s Congress will be      “Setting the positive agenda in motion,” and will have a special focus on      developments and opportunities in the so-called “BRICS” group of emerging      economies. &lt;a href="https://cis-india.org/a2k/global-congress-on-ip-call-for-participation"&gt;CIS      is one of the six members of the Global Congress Planning Committee&lt;/a&gt;..&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;News &amp;amp; Media Coverage&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/hacking-modding-making"&gt;Hacking,      Modding &amp;amp; Making&lt;/a&gt; (by Brendan Shanahan): “&lt;i&gt;If something has been made      technologically possible, we cannot make it illegal and hope that everyone      will now pretend that this is no longer technologically possible...We      can't have the government checking everyone's iPod and laptop. The better      move is to change the model&lt;/i&gt;,”...Sunil Abraham quoted in GQ.&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;Openness&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The 'Openness' programme critically examines alternatives to existing regimes of intellectual property rights, and transparency and accountability. Under this programme, we study Open Government Data, Open Access to Scholarly Literature, Open Access to Law, Open Content, Open Standards, and Free/Libre/Open Source Software:&lt;/p&gt;
&lt;h3&gt;Event Reports and Video&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/arduino-workshop-report"&gt;Arduino      Workshop at CIS&lt;/a&gt; (CIS, Bangalore, March 3, 2012). Video is now      online.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/hejje-2014-together-with-kannada-technology-2"&gt;Hejje      — Together with Kannada &amp;amp; Technology&lt;/a&gt; (Bangalore, January      22, 2012): The event marked the first step to bring everyone working in      Kannada in the IT field to brainstorm the ideas for future steps, and      create a space for technological collaboration in Kannada. CIS      co-organised the event with Sanchaya.net, Vishwakannada.com and Chanda      Pustaka. &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Events Organised&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/open-government-partnership-brasilia-bangalore-meetup"&gt;Bangalore      Meet-up for the Open Government Partnership Brasilia&lt;/a&gt; (CIS,      Bangalore, April 17, 2012): Ananya Panda and Pranesh Prakash participated      in the first annual meeting of Open Government Partnership remotely.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/design-public-delhi"&gt;Design!PubliC      – Event in Delhi&lt;/a&gt; (New Delhi, April 19 and 20, 2012): The event      was co-organised by Centre for Knowledge Societies in partnership with      IBM, Bill &amp;amp; Melinda Gates Foundation, Google, HeadStart, India@75,      LiveMint and CIS.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/international-space-apps-challenge"&gt;International      Space Apps Challenge&lt;/a&gt; (CIS, Bangalore, April 21 and 22, 2012):      An international codeathon-style event took place in seven continents, CIS      organised the event in Bangalore.&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;Telecom&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;While the potential for growth and returns exist for telecommunications in India, a range of issues need to be addressed. One aspect is more extensive rural coverage and the other is a countrywide access to broadband which is low. Both require effective and efficient use of networks and resources, including spectrum:&lt;/p&gt;
&lt;h3&gt;Column in Business Standard&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/telecom/build-comprehensive-ecosystems"&gt;China 3: Build Comprehensive Ecosystems&lt;/a&gt; (Shyam Ponappa, Business Standard, April 5, 2012): “Failures in      electricity, transport and broadband have common strands. China's approach      offers a possible alternative.”&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;About CIS&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;CIS was registered as a society in Bangalore in 2008. As an independent, non-profit research organisation, it runs different policy research programmes such as Accessibility, Access to Knowledge, Openness, Internet Governance, and Telecom. Over the last four years our policy research programmes have resulted in outputs such as the e-Accessibility Policy Handbook for Persons with Disabilities with International Telecommunications Union, and &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1644&amp;amp;qid=165304" target="_blank"&gt;Digital Alternatives with a Cause?&lt;/a&gt;, &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1645&amp;amp;qid=165304" target="_blank"&gt;Thinkathon Position Papers&lt;/a&gt; and the &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1646&amp;amp;qid=165304" target="_blank"&gt;Digital Natives with a Cause? Report&lt;/a&gt; with Hivos. With foreign governments we worked on National Enterprise Architecture and Government Interoperability Framework for Govt. of Iraq; Open Standards Policy for Govt. of Moldova; Free and Open Software Centre of Excellence project plan for Saudi Arabia; eGovernance Strategy Document for Govt. of Tajikistan. With the Government of India we have done policy research for Ministry of Communications &amp;amp; Information Technology, Ministry of Human Resource Development, Ministry of Personnel, Public Grievances and Pensions, Ministry of Social Justice and Empowerment, etc., on &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1647&amp;amp;qid=165304" target="_blank"&gt;WIPO Treaties&lt;/a&gt;, &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1648&amp;amp;qid=165304" target="_blank"&gt;Copyright Bill&lt;/a&gt;, &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1649&amp;amp;qid=165304" target="_blank"&gt;Interoperability Framework in eGovernance&lt;/a&gt;, &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1650&amp;amp;qid=165304" target="_blank"&gt;Privacy Bill&lt;/a&gt;, &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1651&amp;amp;qid=165304" target="_blank"&gt;NIA Bill&lt;/a&gt;, &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1652&amp;amp;qid=165304" target="_blank"&gt;National Policy on Electronics&lt;/a&gt; and &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1653&amp;amp;qid=165304" target="_blank"&gt;IT Act&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS is an accredited NGO at WIPO and has given &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1654&amp;amp;qid=165304" target="_blank"&gt;policy briefs&lt;/a&gt; to delegations from various countries, our Programme Manager, Nirmita Narasimhan won the &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1655&amp;amp;qid=165304" target="_blank"&gt;National Award for Empowerment of Persons with Disabilities&lt;/a&gt; from the Government of India and also received the &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1656&amp;amp;qid=165304" target="_blank"&gt;NIVH Excellence Award&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Follow us elsewhere&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Get short, timely messages from us      on Twitter&lt;/li&gt;
&lt;li&gt;Join the CIS group on &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1657&amp;amp;qid=165304" target="_blank"&gt;Facebook&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Visit us at www.cis-india.org&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;CIS is grateful to Kusuma Trust which was founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin, for its core funding and support for most of its projects.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/april-2012-bulletin'&gt;https://cis-india.org/about/newsletters/april-2012-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2012-07-07T06:26:40Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/feb-2012-bulletin">
    <title>February 2012 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/feb-2012-bulletin</link>
    <description>
        &lt;b&gt;Welcome to the Centre for Internet and Society newsletter! In this issue we bring you the updates of our research, events, media coverage and videos of the events organized by us during the month of February 2012!&lt;/b&gt;
        &lt;h2 style="text-align: justify; "&gt;&lt;b&gt;Accessibility&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Around 70 million disabled persons in India are unable to participate in information societies as lack of compliance with accessibility standards make interfaces impossible to use, and retrograde copyright and patent policies make it impossible to access knowledge. Accessibility is denied in banking services, web and mobile interfaces, etc. Material for the disabled therefore needs to be converted into accessible formats. The programme has resulted in outputs such as &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1497&amp;amp;qid=150688" target="_blank"&gt;Web Accessibility Policy Making&lt;/a&gt;, &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1498&amp;amp;qid=150688" target="_blank"&gt;Making Mobile Phones and Services Accessible for Persons with Disabilities&lt;/a&gt;, &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1499&amp;amp;qid=150688" target="_blank"&gt;Accessibility Policy Making: An International Perspective&lt;/a&gt;, &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1500&amp;amp;qid=150688" target="_blank"&gt;e-Accessibility Policy Handbook for Persons with Disabilities&lt;/a&gt;, &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1501&amp;amp;qid=150688" target="_blank"&gt;Universal Service for Persons with Disabilities: A Global Survey of Policy Interventions and Good Practices&lt;/a&gt;, etc.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Featured Research&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1497&amp;amp;qid=150688" target="_blank"&gt;Web Accessibility Policy Making: An International Perspective&lt;/a&gt;: G3ict and the Centre for Internet and Society are pleased to announce the publication of a new, improved edition of the Web Accessibility Policy Making: An International Perspective. The report published in cooperation with the Hans Foundation provides an updated synopsis of the many policies that governments have implemented around the world to ensure that the Internet and websites are accessible to persons with disabilities.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Event&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1502&amp;amp;qid=150688" target="_blank"&gt;ITU Tutorial on Audiovisual Media Accessibility&lt;/a&gt; (India International Centre,New Delhi, March 14 to 15, 2012): At the invitation of the Centre for Internet and Society, in cooperation with the ITU-APT Foundation of India, International Telecommunication Union is organizing a two-day Tutorial on Audio Visual Media Accessibility. The Tutorial will be preceded by the fourth meeting of the Focus Group on Audio Visual Media Accessibility on March 13, 2012. The meeting will take place in the same venue and will be hosted by the Centre for Internet and Society in cooperation with the ITU-APT Foundation of India. &lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;b&gt;Access to Knowledge&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;With the emergence of digital technologies and the unprecedented growth of the Internet and other related technologies, intellectual property rights (IPRs) the questions of ownership and control of information have become crucial. The programme focuses on the inequitable distribution of IPR, royalty, outflows, and beneficiaries of intellectual property regimes, the lack of balance in current IPR regimes [local, national and international] between consumer rights and IPR-owners’/corporation’s rights. The programme has produced analyses such as &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1503&amp;amp;qid=150688" target="_blank"&gt;WIPO Treaty for the Print Disabled&lt;/a&gt;, &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1504&amp;amp;qid=150688" target="_blank"&gt;WIPO Broadcast Treaty&lt;/a&gt;, &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1505&amp;amp;qid=150688" target="_blank"&gt;Copyright Amendment Bill&lt;/a&gt; and &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1506&amp;amp;qid=150688" target="_blank"&gt;Parallel Importation of Books&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Blog Entry&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1507&amp;amp;qid=150688" target="_blank"&gt;Analysis of Copyright Expansion in the India-EU FTA&lt;/a&gt; (July 2010) by Snehashish Ghosh.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Video&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Recently, the Centre for Internet and Society organised a public lecture in its office, the video is now online.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1508&amp;amp;qid=150688" target="_blank"&gt;Gandhi, Freedom, and the Dilemmas of Copyright&lt;/a&gt;: (Centre for Internet and Society, Bangalore, January 30, 2012). Prof. Shyamkrishna Balganesh from the University of Pennsylvania gave a lecture on Gandhi, Freedom, and the Dilemmas of Copyright.&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;b&gt;Openness&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The advent of the Internet has radically defined what it means to be open and collaborative. Even the Internet is built upon open standards and free/libre/open source software. The broad rubric of the ‘Openness’ programme focuses to provide evidence based research that will help inform policy and practice of the local, national, regional, bilateral and international policies and practices around Open Government Data, Open Access to Scholarly Literature, Open Access to Law, Open Content, Open Video, Open Standards and Free/Libre/Open Source Software. The programme has resulted in reports such as &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1509&amp;amp;qid=150688" target="_blank"&gt;Open Government Data Study&lt;/a&gt;, &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1510&amp;amp;qid=150688" target="_blank"&gt;Online Video Environment in India&lt;/a&gt;, a reader on the Wikipedia titled &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1511&amp;amp;qid=150688" target="_blank"&gt;Critical Point of View: A Wikipedia Reader&lt;/a&gt; and a film titled &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1512&amp;amp;qid=150688" target="_blank"&gt;People are Knowledge – Experimenting with Oral Citations on Wikipedia&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Comments&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1513&amp;amp;qid=150688" target="_blank"&gt;&lt;/a&gt;&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1513&amp;amp;qid=150688" target="_blank"&gt;Comments on Technical Standards for Interoperability Framework for E-Governance in India&lt;/a&gt; (Phase II), submitted to the e-Governance Standards Division.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Event Report&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1514&amp;amp;qid=150688" target="_blank"&gt;&lt;/a&gt;&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1514&amp;amp;qid=150688" target="_blank"&gt;Francis Bags EPT Award for Open Access in Developing World&lt;/a&gt;, (Sambasivan Auditorium, MS Swaminathan Research Foundation, Chennai, February 14, 2012). The award function was organized by the Electronic Publishing Trust for Development and the Centre for Internet and Society. Prof. Subbiah Arunachalam gave the welcome address. &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1515&amp;amp;qid=150688" target="_blank"&gt;View the video of the award function&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Interview&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1516&amp;amp;qid=150688" target="_blank"&gt;&lt;/a&gt;&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1516&amp;amp;qid=150688" target="_blank"&gt;An Interview with Dr. Francis Jayakanth&lt;/a&gt;: The Centre for Internet and Society conducted an email interview with Dr. Francis Jayakanth, recipient of the inaugural EPT Award for Open Access in Developing World.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Events&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1517&amp;amp;qid=150688" target="_blank"&gt;&lt;/a&gt;&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1517&amp;amp;qid=150688" target="_blank"&gt;Free Arduino Workshop (For Beginners)&lt;/a&gt;: (Centre for Internet and Society,Bangalore, March 3, 2012). The Centre for Internet and Society organised the Arduino workshop in Bangalore.&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;b&gt;Internet Governance&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Governments and private corporations are engaging in human rights violations online. Many different rights are impacted by internet governance policy changes. The growing phenomenon of illegal electronic surveillance by state and non-state actors and censorship of speech online are some specific problems that the Internet Governance programme seeks to address by providing evidence based research that will help inform policy and practice of the local, national, regional, bilateral and international privacy regime in the interests of the public in sectors key to information societies with a particular focus on information technology, privacy and freedom of expression. The programme has resulted in outputs such as &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1518&amp;amp;qid=150688" target="_blank"&gt;Banking&lt;/a&gt;, &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1519&amp;amp;qid=150688" target="_blank"&gt;Telecommunications&lt;/a&gt;, &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1520&amp;amp;qid=150688" target="_blank"&gt;Consumer Protection&lt;/a&gt;, &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1521&amp;amp;qid=150688" target="_blank"&gt;IT Act&lt;/a&gt;, &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1522&amp;amp;qid=150688" target="_blank"&gt;Limitations&lt;/a&gt;, &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1523&amp;amp;qid=150688" target="_blank"&gt;Copyright&lt;/a&gt;, &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1524&amp;amp;qid=150688" target="_blank"&gt;Internet Protocol&lt;/a&gt;, &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1525&amp;amp;qid=150688" target="_blank"&gt;Media&lt;/a&gt;, &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1526&amp;amp;qid=150688" target="_blank"&gt;Sexual Minorities&lt;/a&gt;, &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1527&amp;amp;qid=150688" target="_blank"&gt;UID&lt;/a&gt; and policy submissions such as, &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1528&amp;amp;qid=150688" target="_blank"&gt;NIA Bill&lt;/a&gt;, &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1529&amp;amp;qid=150688" target="_blank"&gt;IT Act&lt;/a&gt;, &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1530&amp;amp;qid=150688" target="_blank"&gt;National Policy on Electronics&lt;/a&gt;, &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1531&amp;amp;qid=150688" target="_blank"&gt;Cyber Café Rules&lt;/a&gt;, &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1532&amp;amp;qid=150688" target="_blank"&gt;Security Practices Rules&lt;/a&gt;, and &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1533&amp;amp;qid=150688" target="_blank"&gt;Intermediary Due Diligence Rules&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Featured Research&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Privacy India in partnership with Privacy International, UK, the Centre for Internet and Society, Bangalore, and Society in Action Group, Gurgaon is pleased to bring you the draft chapters of its book on Privacy in India. These include the Country Report, Telecommunication and Internet Privacy, E-Governance Identity and Privacy, Finance and Privacy, Health and Privacy, Transparency and Privacy. The chapters are an &lt;b&gt;early draft&lt;/b&gt; which is in the process of being reviewed and updated. We greatly appreciate your comments and feedback:&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1534&amp;amp;qid=150688" target="_blank"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1534&amp;amp;qid=150688" target="_blank"&gt;Privacy in India — An Early Draft&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Media Coverage&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1535&amp;amp;qid=150688" target="_blank"&gt;&lt;/a&gt;&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1535&amp;amp;qid=150688" target="_blank"&gt;Personal Data, Public Profile&lt;/a&gt;: “Whether we like it or not, we live in a world that is rapidly being Googlised”, writes Nishant Shah in the Financial Express, February 13, 2012.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1536&amp;amp;qid=150688" target="_blank"&gt;Do we need the Aadhar scheme?&lt;/a&gt;: “Decentralisation and privacy are preconditions for security. Digital signatures don’t require centralised storage and are much more resilient in terms of security”, writes Sunil Abraham in the Business Standard, February 1, 2012.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Event Reports&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1537&amp;amp;qid=150688" target="_blank"&gt;The High Level Privacy Conclave&lt;/a&gt; (Paharpur Business Centre, Nehru Place Greens, New Delhi, February 3, 2012): India is in dire need of privacy law; experts say government is ironically creating huge national security risks in attempts to prevent crime and terrorism. The &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1538&amp;amp;qid=150688" target="_blank"&gt;event was organized&lt;/a&gt; by Privacy India in partnership with the International Development Research Centre, Canada, Privacy International, UK and Society in Action Group, Gurgaon. Sunil Abraham was a Conclave Advisor and the moderator for the session on Internet and Privacy, Malavika Jayaram moderated in the panel on National Security and Privacy, and Elonnai Hickok spoke in the session "The Way Forward".&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1539&amp;amp;qid=150688" target="_blank"&gt;All India Privacy Symposium&lt;/a&gt;: (India International Centre, New Delhi, February 4, 2012): Experts gathered in Delhi for a public symposium on privacy, transparency, e-governance and national security in India. The &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1540&amp;amp;qid=150688" target="_blank"&gt;event was organized&lt;/a&gt; by Privacy India in partnership with the International Development Research Centre, Canada, Privacy International, UK, Commonwealth Human Rights Initiative and Society in Action Group, Gurgaon. The &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1541&amp;amp;qid=150688" target="_blank"&gt;webcast&lt;/a&gt; of the event is online. Sunil Abraham was a Symposium Advisor and moderated in the panel on Privacy and Transparency. Elonnai Hickok gave the welcome address and spoke in the session, “The Way Forward”. Prashant Iyengar was the moderator for the panel on Privacy and Banking. Malavika Jayaram spoke in this panel.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Event Hosted&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;GeekUp with Erica Hagen (Centre for Internet and Society, Bangalore, March 1, 2012). HasGeek organized a GeekUp with Erica Hagen of the GroundTruth Initiative. Erica gave a lecture on the theme: "&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1542&amp;amp;qid=150688" target="_blank"&gt;From Information to Empowerment: Unpacking the Equation&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Blog Entry&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1543&amp;amp;qid=150688" target="_blank"&gt;Unique ID System: Pros and Cons&lt;/a&gt;, by Natasha Vaz.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Other Events&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1544&amp;amp;qid=150688" target="_blank"&gt;Cartonama Workshop&lt;/a&gt; (Centre for Internet and Society, Bangalore, March 2 and 3, 2012). HasGeek organized a hands-on training for managing and building location based services. The Centre for Internet and Society was a partner for this event.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1545&amp;amp;qid=150688" target="_blank"&gt;Climate Change and Controversy Mapping&lt;/a&gt; (Indian Institute of Science, Bangalore, March 19 to 21, 2012). The workshop is being organised in collaboration with the Devechia Centre for Climate Change, Indian Institute of Science, Bangalore. Bruno Latour, Dean for Research at Sciences Po, Paris will speak in this event.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Videos&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;View the videos of some of the recent events organised by us:&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1540&amp;amp;qid=150688" target="_blank"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1540&amp;amp;qid=150688" target="_blank"&gt;All India Privacy Symposium&lt;/a&gt;, (India International Centre, New Delhi, February 4, 2012). Privacy India in partnership with the International Development Research Centre, Canada, Privacy International, UK, Commonwealth Human Rights Initiative, and Society in Action Group, Gurgaon, organized the event.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1546&amp;amp;qid=150688" target="_blank"&gt;Whose Data is it Anyway?&lt;/a&gt;, (Centre for Internet and Society, Bangalore, January 24, 2012). Centre for Internet and Society and Tactical Tech co-organised the second round of discussions of the Exposing Data series. Siddharth Hande and Hapee de Groot spoke in the event.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1547&amp;amp;qid=150688" target="_blank"&gt;Privacy Matters — Analyzing the "Right to Privacy Bill"&lt;/a&gt;, (Indian Institute of Technology, Bombay). Privacy India in partnership with International Development Research Centre, Canada, Indian Institute of Technology, Bombay, the Godrej Culture Lab, Tata Institute of Social Sciences, Mumbai and the Centre for Internet and Society organised this event.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1548&amp;amp;qid=150688" target="_blank"&gt;Free Speech Online in India under Attack?&lt;/a&gt;, (Centre for Internet and Society, Bangalore, December 22, 2011). The event was co-organised with the Internet Democracy Project. Achal Prabhala, Lawrence Liang and Anja Kovacs gave a lecture on freedom of expression online in India.&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;b&gt;Telecom&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The growth in telecommunications in India has been impressive. While the potential for growth and returns exist, a range of issues need to be addressed for this potential to be realized. One aspect is more extensive rural coverage and the second aspect is a countrywide access to broadband which is low at about eight million subscriptions. Both require effective and efficient use of networks and resources, including spectrum. The programme has resulted in reports such as &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1549&amp;amp;qid=150688" target="_blank"&gt;India's untapped potential: Are a billion people losing out because of spectrum?&lt;/a&gt;, &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1550&amp;amp;qid=150688" target="_blank"&gt;India Study Tour - Report: The South African Telecommunications Sector: Poised for Change&lt;/a&gt; and the &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1551&amp;amp;qid=150688" target="_blank"&gt;Unlicensed Spectrum-Policy Brief for Government of India NTP '11&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Featured Research&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1551&amp;amp;qid=150688" target="_blank"&gt;Unlicensed Spectrum-Policy Brief for Government of India NTP '11&lt;/a&gt; by Satyen Gupta, Sunil Abraham and Yelena Gyulkhandanyan: The research paper aims to recommend unlicensed spectrum policy to the Government of India based on recent developments in wireless technology, community needs and international best practices, and seeks to demonstrate the need for and importance of unlicensed spectrum as a medium for inexpensive connectivity in rural/remote areas, as well as catalyzing innovation by being a barrier-free and cost-effective platform for the testing and implementing of new technologies.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Interview&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1552&amp;amp;qid=150688" target="_blank"&gt;An Interview with Stephen Song&lt;/a&gt;: Yelena Gyulkhandanyan interviewed Stephen Song, the founder of Village Telco, an initiative to bring practical and inexpensive communication network infrastructure to rural and remote areas. He spoke about factors that catalyzed the initiative, the benefits of the network, some challenges, and the Mesh Potato.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Job Announcement&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1553&amp;amp;qid=150688" target="_blank"&gt;Content Developers/Trainers&lt;/a&gt;: The Centre for Internet and Society is looking for a content developer/trainer to work on an upcoming project Building Knowledge and Capacity around Telecommunication Policies in India. This is a full-time position. To apply, please email your curriculum vitae along with three writing samples to &lt;a href="mailto:yelena@cis-india.org"&gt;yelena@cis-india.org&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;b&gt;Digital Natives with a Cause?&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Digital Natives with a Cause? is a knowledge programme initiated by the Centre for Internet and Society, India and Hivos, Netherlands. It is a research inquiry that seeks to look at the changing landscape of social change and political participation and the role that young people play through digital and internet technologies, in emerging information societies. The programme has resulted in a four-book collective titled &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1554&amp;amp;qid=150688" target="_blank"&gt;Digital AlterNatives with a Cause?&lt;/a&gt; and reports such as &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1555&amp;amp;qid=150688" target="_blank"&gt;Digital Natives with a Cause? A Report&lt;/a&gt; and &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1556&amp;amp;qid=150688" target="_blank"&gt;Digital Natives with a Cause? Thinkathon: Position Papers&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Events&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1557&amp;amp;qid=150688" target="_blank"&gt;Digital Natives Video Contest&lt;/a&gt;: Twenty-one candidates have been shortlisted, videos will be online soon. Voting begins from March 10, 2012. The Centre for Internet and Society is co-organising the video contest with Hivos, Netherlands.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1558&amp;amp;qid=150688" target="_blank"&gt;Essay Review: Digital AlterNatives with a Cause&lt;/a&gt;: The monthly essay review for the four book collective of Digital AlterNatives with a Cause? was held from February 17 to February 26, 2012. The Centre for Internet and Society co-organized the “Essay Review” with Hivos, Netherlands.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Book Review&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1559&amp;amp;qid=150688" target="_blank"&gt;How to Put Up a Facebook      Resistance&lt;/a&gt;: “&lt;i&gt;The current discussion about Facebook's      timeline is only the tip of the iceberg, a symptom of a larger conflict      that lurks behind it: how much direct marketing are Facebook users willing      to take? How many drastic top-down changes of the user's Facebook      experience are possible unless they understand that their presence on this      site and what they do there is in tension with the company's goals that      provides this digital environment?&lt;/i&gt;”, Oliver Leistert reviews Marc      Stumpel’s essay, "Mapping the Politics of Web 2.0: Facebook      Resistance", in Digital Alternatives with a Cause Book 2: To Think,      pp.24-31.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Newsletter&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1560&amp;amp;qid=150688" target="_blank"&gt;Privacy, Piracy and the      Wiki Way of Web&lt;/a&gt;: “&lt;i&gt;Privacy is about having more control over      the personal information that we have disclosed. As we disclose more      information online, we must ask who might access it and why.&lt;/i&gt;” Nishant      Shah in the Digital Natives Newsletter, volume 9, issue 2.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;News and Media Coverage&lt;/b&gt;&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1561&amp;amp;qid=150688" target="_blank"&gt;What is Stewardship in Cyberspace?&lt;/a&gt;: The second annual Cyber Dialogue forum takes place March 18-19, 2012 in Toronto, Canada. Sunil Abraham is a panelist in the session on Plenary Panel and Discussions.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1562&amp;amp;qid=150688" target="_blank"&gt;Secure IT 2012&lt;/a&gt; — Securing Citizens through Technology: The event was co-organised by DST and NSDI, Govt. of India in partnership with Elets Technomedia Pvt. Ltd. on March 1, 2012 at Claridges in New Delhi. Sunil Abraham was a panelist in the event.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1563&amp;amp;qid=150688" target="_blank"&gt;Digitisation is making e-learning simple&lt;/a&gt;: “&lt;i&gt;Learning should not be restricted to the Internet and interactive classroom sessions but should be made available on mobile phones through audio files as mobile penetration is much higher compared to Internet reach&lt;/i&gt;”, Sunil Abraham in Deccan Herald, February 13, 2012. The article was written by Shayan Ghosh.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1564&amp;amp;qid=150688" target="_blank"&gt;India debates limits to freedom of expression&lt;/a&gt;: “&lt;i&gt;The government’s proposals on Web censorship would kill the vibrancy of the Internet in India&lt;/i&gt;”, Sunil Abraham in the Washington Post, February 13, 2012. The article was written by Simon Denyer.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1565&amp;amp;qid=150688" target="_blank"&gt;Developing location-based services&lt;/a&gt;, Hindu, February 26, 2012.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1566&amp;amp;qid=150688" target="_blank"&gt;Grooming the geek&lt;/a&gt;: “&lt;i&gt;Children have to learn fine motor and social skills; tablets and other technology hinder the development of these skills&lt;/i&gt;”, Sunil Abraham in LiveMint, February 24, 2012. The article was written by Gopal Sathe.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1567&amp;amp;qid=150688" target="_blank"&gt;FUEL Kannada - Workshop on Kannada Computing Terminology&lt;/a&gt;: A two days workshop on the standardization of Kannada computing terminologies was organized on January 28 and 29, 2012 at the Centre for Internet and Society, Bangalore under the FUEL project. The workshop was organised by Sanchaya and sponsored by Red Hat.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1568&amp;amp;qid=150688" target="_blank"&gt;Will open access replace costly commercial publishing models?&lt;/a&gt;: “&lt;i&gt;Most scientists in India are forced to work in a situation of information poverty. Others are unable to access what Indian researchers are doing, leading to low visibility and low use of their work. Thus, Indian work is hardly cited. Both these handicaps can be overcome to a considerable extent if open access is adopted widely, both within and outside the country&lt;/i&gt;”, Subbiah Arunachalam in the Hindu, February 19, 2012. The article was written by Vasudha Venugopal.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1569&amp;amp;qid=150688" target="_blank"&gt;Research papers will be available in public domain&lt;/a&gt;: “&lt;i&gt;A research produced by the Tuberculosis Research Centre in Chennai which would be of great relevance to researchers, say in a university in Maharashtra, may not be even noticed by the scientists there. Both groups receive funds from the same source - Government of India - and yet what one does is not easily accessible to the other. Open Access would bridge that gap and make information available to everyone&lt;/i&gt;”, Subbiah Arunachalam in the Hindu, February 15, 2012. The article was written by Vasudha Venugopal.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1570&amp;amp;qid=150688" target="_blank"&gt;OurSay: how India’s technology is cutting into corruption&lt;/a&gt;: “&lt;i&gt;Print and cinema reflected the views of citizens and informed them of the visions and changes that the country was going through&lt;/i&gt;”, Nishant Shah in Crikey, February 17, 2012. The blog post was written by Gautam Raju, co-founder and creative director, OurSayAustralia.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1571&amp;amp;qid=150688" target="_blank"&gt;India won't censor social media: Telecom Minister&lt;/a&gt;: “&lt;i&gt;Glad that Sibal does not believe in censorship and that companies operating in India should follow local laws.” “But on the other hand he has asked them to evolve new guidelines and actively monitor user content which is not legally sanctioned. This makes him look two-faced&lt;/i&gt;”, Pranesh Prakash in the Tribune. The article written by Salil Panchal was originally published by &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1572&amp;amp;qid=150688" target="_blank"&gt;AFP&lt;/a&gt; and reproduced in the Tribune on February 14, 2012.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1573&amp;amp;qid=150688" target="_blank"&gt;Govt set to gain ‘back-door’ access to corporate email&lt;/a&gt;: “&lt;i&gt;There are no allegations of terrorists using BES or any indication that any of the 5,000 enterprises have any links to terrorists or other banned outfits in India&lt;/i&gt;”, Pranesh Prakash in LiveMint, February 14, 2012. The article was written by Shauvik Ghosh.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1574&amp;amp;qid=150688" target="_blank"&gt;Indian law caught in web&lt;/a&gt;: “&lt;i&gt;The Internet needs regulation but it cannot be treated as a gigantic newspaper or media channel”&lt;/i&gt;, Pranesh Prakash; &lt;i&gt;“In liberal democracies like India and the US, information was taken for granted and not perceived as central to the understanding of society&lt;/i&gt;”, Nishant Shah. Nishant and Pranesh are quoted in an article by Moyna published by Down to Earth magazine.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1575&amp;amp;qid=150688" target="_blank"&gt;Prometheus bound and gagged&lt;/a&gt;: The article by Adarsh Matham was published in the New Indian Express on 20 January 2012. Pranesh Prakash is quoted in this article.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1576&amp;amp;qid=150688" target="_blank"&gt;Internet Curbs&lt;/a&gt;: Sunil Abraham’s article “The Quixotic Fight to Clean Up the Web” which was published in Tehelka is referred to by Rishi Majumder in this article also published in Tehelka, Vol. 9, Issue 07, February 18, 2012.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1577&amp;amp;qid=150688" target="_blank"&gt;Tweeple say it pithily with hash tags&lt;/a&gt;: “&lt;i&gt;Our social networking sites and writing platforms are performances of a certain kind... they allow us to convert our everyday lives into games — with rewards, actions, punishments or rules&lt;/i&gt;”, Nishant Shah in the Hindu, February 11, 2012. The article was written by Deepa Kurup.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1578&amp;amp;qid=150688" target="_blank"&gt;New Bill to decide on individual’s right to privacy&lt;/a&gt;: “&lt;i&gt;Tesco, a major retail chain in England, is now into E-banking… There are numerous examples of such private banking entities sharing customer information with insurance policy firms. These details are often used as markers for the kind of premium that will be set for a person&lt;/i&gt;”, Malavika Jayaram in Tehelka, February 6, 2012.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1579&amp;amp;qid=150688" target="_blank"&gt;A new domain name, but concerns remain the same&lt;/a&gt;: “&lt;i&gt;The rhetoric is that the Internet is global, but we've been seeing [governments say] how this information has to be regulated&lt;/i&gt;”, Nishant Shah in the Hindu, February 5, 2012. The article was written by Karunya Keshav.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1580&amp;amp;qid=150688" target="_blank"&gt;Common man as crusader&lt;/a&gt;: “&lt;i&gt;The movement targeted at the middle-class for whom corruption is a big issue was also the first middle-class movement in a long time.&lt;/i&gt;” Nishant Shah in the Hindustan Times, February 4, 2012.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1581&amp;amp;qid=150688" target="_blank"&gt;5 things you need to know about online privacy policies&lt;/a&gt;: “&lt;i&gt;India needs to have a broad and horizontal law that establishes online privacy as a right. Unlike in European countries, India doesn't have a privacy commissioner who can state the principles, interpret the data and question the online providers&lt;/i&gt;”, Sunil Abraham in the Economic Times on February 6, 2012. The article was written by Indu Nandakumar.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1582&amp;amp;qid=150688" target="_blank"&gt;India needs an independent privacy law, says NGO Privacy India&lt;/a&gt;: “&lt;i&gt;India doesn't have a privacy law, but there are provisions for it in different laws. During the course of the research, we found that the Indian judiciary has not been very strict in overseeing the implementation of the privacy clauses in various laws,&lt;/i&gt;”,&lt;i&gt; &lt;/i&gt;Prashant Iyengar in the Economic Times, February 2, 2012.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/privacy-speech-at-stake-in-cyberspace-1" class="external-link"&gt;Privacy, speech at stake in cyberspace&lt;/a&gt;: “&lt;i&gt;The clampdown on online free speech and the roll-out of a multi-tiered blanket surveillance regime via the draconian IT Act and its associated rules in India is part of a global trend&lt;/i&gt;”, Sunil Abraham in LiveMint, February 3, 2012. The article was written by Leslie D’Monte.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1584&amp;amp;qid=150688" target="_blank"&gt;Freedom of Expression in Community Media and on the Internet Understanding Connections, Finding Common Ground&lt;/a&gt;: A meeting co-organised by the Internet Democracy Project (Delhi) and Maraa (Bangalore) with the support of the Community Radio Forum in New Delhi on 3 February 2012. Pranesh Prakash participated in this event. Anja Kovacs gave the welcome address and spoke in the session on “The Internet and Freedom of Expression.”&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1585&amp;amp;qid=150688" target="_blank"&gt;Google move is not good for netizens, say experts&lt;/a&gt;: “&lt;i&gt;Google is doing what is good for shareholders. This is not positive for netizens&lt;/i&gt;,” Sunil Abraham in the Hindu Business Line, January 31, 2012.&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;Follow us elsewhere&lt;/b&gt;&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Get short, timely messages from us on &lt;a href="http://components/com_civicrm/civicrm/extern/url.php?u=456&amp;amp;qid=46981" target="_blank"&gt;Twitter&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Join the CIS group on &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1586&amp;amp;qid=150688" target="_blank"&gt;Facebook&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Visit us at &lt;a href="http://components/com_civicrm/civicrm/extern/url.php?u=459&amp;amp;qid=46981" target="_blank"&gt;www.cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;CIS is grateful to Kusuma Trust which was founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin, for its core funding and support for most of its projects.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/feb-2012-bulletin'&gt;https://cis-india.org/about/newsletters/feb-2012-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2012-07-09T07:48:11Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/january-2012-bulletin">
    <title>January 2012 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/january-2012-bulletin</link>
    <description>
        &lt;b&gt;Welcome to the Centre for Internet and Society newsletter! In this issue we bring you the updates of our research, events, media coverage and videos of events organized by us during the month of January 2012!&lt;/b&gt;
        &lt;h2&gt;Digital Natives with a Cause?&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Digital Natives with a Cause? is a knowledge programme initiated by CIS, India and Hivos, Netherlands. It is a research inquiry that seeks to look at the changing landscape of social change and political participation and the role that young people play through digital and internet technologies, in emerging information societies. The major outputs have been a four book collective asking questions about theory and practice around 'digital revolutions' in a post MENA (Middle East - North Africa) world, a position paper, a scouting study and three international workshops.&lt;/p&gt;
&lt;h3&gt;Events Organised&lt;b&gt; &lt;/b&gt; &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1038&amp;amp;qid=140996" target="_blank"&gt;&lt;/a&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1038&amp;amp;qid=140996" target="_blank"&gt;Digital AlterNatives Video Contest: The Everyday Digital Native — To Be, To Think, To Act, To Connect&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1039&amp;amp;qid=140996" target="_blank"&gt;Digital AlterNatives Tweet-a-Review&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;'Digital Natives with a Cause?' project invites readers to review essays from the 'Digital AlterNatives with a Cause', a four-book collective published by Centre for Internet &amp;amp; Society and Hivos.&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h3&gt;Digital AlterNatives: Book Reviews &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1040&amp;amp;qid=140996" target="_blank"&gt;&lt;/a&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1040&amp;amp;qid=140996" target="_blank"&gt;Alternative Approaches to Social Change&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;“&lt;i&gt;Observations about intangible aspects of a movement will keep a research from clinging to activism with a capital A, and start seeing a gradation in the social movement practices. It is constructive and opens the door to analyses of multi-dimensional movements such as the Blank Noise initiative (India). Drawing on methods of identifying new developments to the field of social movement, Maesy examines some aspects of it: the issue, strategy, site of action, and internal mode of organization&lt;/i&gt;.”&lt;br /&gt;&lt;b&gt;Nuraini Juliastuti&lt;/b&gt;, Co-founder, KUNCI Cultural Studies Center&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;Accessibility&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;India has an estimated 70 million disabled persons who are unable to read printed materials due to some form of physical, sensory, cognitive or other disability. This includes persons with blindness, learning disabilities such as dyslexia, cerebral palsy and persons who do not have full control over their limbs. For these people, the material needs to be converted into alternate formats such as Braille, audio or video or electronic formats (text document, word document or PDF) which they can access using assistive technologies. Our key research has focused on a submission to amend the Indian Copyright to the HRD Ministry, publishing a policy handbook on e-accessibility, research on accessible mobile handsets in India and an analysis of the Working Draft of the Rights of Persons with Disabilities Act, 2010.&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h3&gt;Journal Article&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1041&amp;amp;qid=140996" target="_blank"&gt;Technology for Accessibility in Higher Education&lt;/a&gt;, published in the Journal: Enabling Access for Persons with Disabilities to Higher Education and Workplace. Nirmita Narasimhan wrote an article.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Featured Research&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1042&amp;amp;qid=140996" target="_blank"&gt;Making Mobile Phones and Services Accessible&lt;/a&gt;. CIS researched, edited and published this report in partnership with G3ict and ITU. The report contains a foreword, eleven chapters, a bibliography and glossary with contributions from Deepti Bharthur, Nirmita Narasimhan and Axel Leblois.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Upcoming Event&lt;/h3&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1043&amp;amp;qid=140996" target="_blank"&gt;ITU Tutorial on Audiovisual Media Accessibility&lt;/a&gt;, organized by the International Telecommunication Union, India International Centre, 14-15 March 2012. CIS is hosting the meeting. The Tutorial will be preceded by the fourth meeting of the Focus Group on Audio Visual Media Accessibility (FG AVA) on 13 March 2012. This meeting will take place at the same venue and will also be hosted by CIS, in cooperation with the ITU-APT Foundation of India.&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;Access to Knowledge&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Access to Knowledge is a campaign to promote the fundamental principles of justice, freedom, and economic development. It deals with issues like copyrights, patents and trademarks, which are an important part of the digital landscape. We prepared the India report for the Consumers International IP Watchlist, made submission to the HRD Ministry on WIPO Broadcast Treaty, questioned the demonization of pirates, and advocated against laws (such as PUPFIP Bill) that privatize public funded knowledge.&lt;/p&gt;
&lt;h3&gt;Event Organised &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1044&amp;amp;qid=140996" target="_blank"&gt;&lt;/a&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1044&amp;amp;qid=140996" target="_blank"&gt;Gandhi, Freedom, and the Dilemmas of Copyright&lt;/a&gt;: To commemorate Mahatma Gandhi's death anniversary, CIS organised a public lecture. Prof. Shyamkrishna Balganesh of the University of Pennsylvania gave a lecture.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;Openness&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The advent of the Internet has radically defined what it means to be open and collaborative. Even the Internet is built upon open standards and free/libre/open source software. CIS has been committed and actively campaigned for promotion of open standards, open access and free/libre/open source software.&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h3&gt;Workshop Reports &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1045&amp;amp;qid=140996" target="_blank"&gt;&lt;/a&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1045&amp;amp;qid=140996" target="_blank"&gt;Summary of the Minutes of the Workshop on Biodiversity Informatics&lt;/a&gt;, organized by the Western Ghats Portal team to explore the contemporary state of biodiversity informatics at Ashoka Trust for Research in Ecology and Environment (ATREE), Bangalore on 25 November 2011.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1046&amp;amp;qid=140996" target="_blank"&gt;Design!PubliC — Innovation and the Public Interest&lt;/a&gt;: On the 14th of October, 2011, the Center for Knowledge Societies organized the second edition of the Design Public Conclave, a conversation on how innovation can serve the Public Interest. The conclave was held at the National Gallery of Modern Art in Bangalore.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1047&amp;amp;qid=140996" target="_blank"&gt;Report on the 'Open Access to Academic Knowledge' workshop&lt;/a&gt;: On Wednesday the 2nd of November, during Open Access Week, the Indian Institute of Science in conjunction with the Centre for Internet and Society held a workshop on Open Access at the National Centre for Science Information, in Bangalore. We recorded the meeting and published it online.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Event Organised &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1048&amp;amp;qid=140996" target="_blank"&gt;&lt;/a&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1048&amp;amp;qid=140996" target="_blank"&gt;Geekup on Open Data in Bangalore&lt;/a&gt;: Hapee de Groot, Hivos, Netherlands gave a talk on Open Data and its use for citizen engagement.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;h3&gt;Media Coverage&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1049&amp;amp;qid=140996" target="_blank"&gt;Wikipedia turns 11 today&lt;/a&gt;: The Bangalore event, open to all Wikipedia users, contributors and enthusiasts, is being held at the Centre for Internet and Society at Domlur.&lt;br /&gt;The Hindu, 15 January 2012&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;Internet Governance&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Tunis Agenda of the second World Summit on the Information Society has defined internet governance as the development and application by governments, the private sector and civil society, in their respective roles of shared principles, norms, rules, decision-making procedures and programmes that shape the evolution and use of the internet. CIS partnered with Privacy International and Society in Action Group which has produced outputs in banking, telecommunications, consumer rights, etc., submitted open letters to Parliamentary Committee on UID, feedbacks on NIA Bill, and IT Rules.&lt;/p&gt;
&lt;h3&gt;Newspaper / Magazine Articles &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1050&amp;amp;qid=140996" target="_blank"&gt;&lt;/a&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1050&amp;amp;qid=140996" target="_blank"&gt;Keeping it Private&lt;/a&gt;&lt;br /&gt;As we disclose more information online, we must ask who might access it and why, writes Nishant Shah in the Indian Express, 15 January 2012.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1051&amp;amp;qid=140996" target="_blank"&gt;Click to Change&lt;/a&gt;&lt;br /&gt;From organising political protests and flash mobs to uploading their versions of Kolaveri Di, people brought about change with the help of the internet, Nishant Shah, Indian Express, 1 January 2012.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1052&amp;amp;qid=140996" target="_blank"&gt;The Quixotic Fight to Clean up the Web&lt;/a&gt;&lt;br /&gt;The ongoing attempt to pre-screen online content won’t change anything. It will only drive netizens into the arms of criminals, writes Sunil Abraham, Tehelka Magazine, Vol 9, Issue 04, 28 January 2012.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1053&amp;amp;qid=140996" target="_blank"&gt;Sense and Censorship&lt;/a&gt;&lt;br /&gt;The Stop Online Piracy Act (SOPA) and the Protect IP Act (PIPA) bills, at the US House of Representatives and Senate, respectively, appear to enforce property rights, but are, in fact, trade bills, Sunil Abraham in the Indian Express, 20 January 2012.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;b&gt;Interview&lt;/b&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1054&amp;amp;qid=140996" target="_blank"&gt;Our Internet and the Law&lt;/a&gt;&lt;br /&gt;Nishant Shah was interviewed by the BBC Channel 5 (Radio) for its Outriders section. Jamillah Knowles reports this. Listen to the podcast online, BBC Radio, 24 January 2012.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;b&gt;Event Reports&lt;/b&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1055&amp;amp;qid=140996" target="_blank"&gt;Privacy Matters — Analyzing the Right to "Privacy Bill"&lt;/a&gt;&lt;br /&gt;On January 21, 2012 a public conference “Privacy Matters” was held at the Indian Institute of Technology in Mumbai. It was the sixth conference organised in the series of regional consultations held as “Privacy Matters”. The present conference analyzed the Draft Privacy Bill and the participants discussed the challenges and concerns of privacy in India.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1056&amp;amp;qid=140996" target="_blank"&gt;Future of Integrated Science Education in Higher Education in India&lt;/a&gt;&lt;br /&gt;The Higher Education Innovation and Research Application (HEIRA) at the Centre for the Study of Culture and Society (CSCS) and the Centre for Contemporary Studies (CCS) at the Indian Institute of Sciences (IISc) hosted a two day workshop on 2 and 3 January 2012 on the Future of Integrated Science Education in Higher Education in India at the Centre for Contemporary Studies, IISc. Nishant Shah participated in the workshop.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;b&gt;Media Coverage&lt;/b&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1057&amp;amp;qid=140996" target="_blank"&gt;Twitter’s Censorship Move Aimed at Regaining China?&lt;/a&gt;&lt;br /&gt;"&lt;i&gt;The region-specific blocking was already being used on video hosting websites like YouTube and Hulu, where due to the wishes of copyright owners many videos are not available in India. Twitter is extending this technology to its tweets&lt;/i&gt;.”&lt;br /&gt;Pranesh Prakash in International Business Times, 28 January 2012.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/google2019s-privacy-policy-raises-hackles" class="external-link"&gt;Google's privacy policy raises hackles&lt;/a&gt; (Times of India, January 26, 2012)&lt;br /&gt;“&lt;i&gt;Storing data makes it prone to misuse by authorities as well as corporations... I don't want my bakery shop owner to know what kind of medicines I buy from the nearby medical store&lt;/i&gt;.”&lt;br /&gt;Sunil Abraham in the Times of India, 26 January 2012.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1059&amp;amp;qid=140996" target="_blank"&gt;Google to change privacy policy to use personal info of users&lt;/a&gt;&lt;br /&gt;“&lt;i&gt;New changes are not good for a consumer's privacy&lt;/i&gt;.”&lt;br /&gt;Sunil Abraham in Punjab Newsline, 27 January 2012.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/tangled-web" class="external-link"&gt;Tangled Web&lt;/a&gt;&lt;br /&gt;“&lt;i&gt;We did a policy sting operation wherein we sent fraudulent notices to big web sites...in one case where we asked for the removal of three comments, they removed all 13. So there is already a private censorship underway.&lt;/i&gt;”&lt;br /&gt;Sunil Abraham in the Week, 21 January 2012.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1061&amp;amp;qid=140996" target="_blank"&gt;POV: Should user-generated content be monitored?&lt;/a&gt;&lt;br /&gt;“&lt;i&gt;We should not fool ourselves into thinking that private sector companies like Google will defend our fundamental rights. The next Parliament session is the last opportunity for parliamentarians to ask for the revocation of the rules for intermediaries, cyber-cafes and reasonable security practices&lt;/i&gt;.”&lt;br /&gt;Sunil Abraham in afaqs, 19 January 2012.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1062&amp;amp;qid=140996" target="_blank"&gt;Indian Internet Lawsuit Puts Spotlight on Freedom of Expression&lt;/a&gt;&lt;br /&gt;“&lt;i&gt;These rules have the potential to curtail debate and discussion on the net... They allow for all sorts of subjective tests by private parties and we predicted they would have a chilling effect on freedom of expression online&lt;/i&gt;.”&lt;br /&gt;Sunil Abraham in the Voice of America, 19 January 2012.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1063&amp;amp;qid=140996" target="_blank"&gt;India: obscene pics of gods require massive human censorship of Google, Facebook&lt;/a&gt;&lt;br /&gt; “&lt;i&gt;It’s difficult to establish exactly what is anti-religious: for example, the Hindu profession of belief in multiple gods is blasphemous to Muslims, Christians and Jews&lt;/i&gt;.”&lt;br /&gt; Sunil Abraham in ars technica, 14 January 2012.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/is-india-ignoring-its-own-internet-protections" class="external-link"&gt;Is India Ignoring its own Internet Protections? &lt;/a&gt;&lt;br /&gt;“&lt;i&gt;The I.T. Act provides immunity to (Internet companies) and that should be the default starting position&lt;/i&gt;.”&lt;br /&gt;Sunil Abraham in the Wall Street, 16 January 2012.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1065&amp;amp;qid=140996" target="_blank"&gt;India internet: clean-up or censorship?&lt;/a&gt;&lt;br /&gt;Sunil Abraham was quoted in Financial Time’s beyondbrics, 13 January 2012.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1066&amp;amp;qid=140996" target="_blank"&gt;Twists and turns of the SOPA opera&lt;/a&gt;&lt;br /&gt;“&lt;i&gt;In terms of infrastructure, the U.S. controls critical web resources. Contrasting this to the Chinese firewall that blocks content for users within its jurisdiction, the U.S. decision to redirect a link can act as a ‘global block’&lt;/i&gt;.”&lt;br /&gt;Sunil Abraham in the Hindu, 15 January 2012.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1067&amp;amp;qid=140996" target="_blank"&gt;Activists cry foul against Aadhaar&lt;/a&gt;&lt;br /&gt;Sunil Abraham participated in the meet on Aadhaar convened by the Indian Social Action Forum.&lt;br /&gt;The Telegraph, 12 January 2012.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1068&amp;amp;qid=140996" target="_blank"&gt;NGO questions people's privacy in UID scheme&lt;/a&gt;&lt;br /&gt;“&lt;i&gt;The UID project was allowed to march on without any protection being put in place&lt;/i&gt;.”&lt;br /&gt;Sunil Abraham in the Times of India, 11 January 2012.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1069&amp;amp;qid=140996" target="_blank"&gt;Revealed: Bangalore’s Basic Instincts&lt;/a&gt;&lt;br /&gt;“&lt;i&gt;If you look at the Google trend or any other website, Bangalore does not figure among the top 10 cities that surfs for porn. But that does not mean that Bangalore does not surf porn. It only means that we have a very sophisticated surfer with a very specific type.  They don’t go through Google or other websites. They know how to go about it. But whether it affects their personal lives is lot more complicated&lt;/i&gt;.”&lt;br /&gt;Sunil Abraham in the Bangalore Mirror, 8 January 2012.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/facebook-google-face-censorship-in-india" class="external-link"&gt;Facebook, Google face censorship in India&lt;/a&gt;&lt;br /&gt;“&lt;i&gt;Traditional intellectual property rights holders like movie studios, music companies and software vendors are trying to protect their obsolete business models by pushing for the adoption of blanket surveillance and filtering technologies&lt;/i&gt;.”&lt;br /&gt;Sunil Abraham in SmartPlanet, 5 January 2012.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1070&amp;amp;qid=140996" target="_blank"&gt;Trail of the Trolls&lt;/a&gt;&lt;br /&gt;“&lt;i&gt;Trolling provokes a non-productive argument and as of now it is not considered a criminal offence anywhere in the world&lt;/i&gt;.”&lt;br /&gt;The Telegraph, 4 January 2012.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1071&amp;amp;qid=140996" target="_blank"&gt;Constitution of Group of Experts to Deliberate on Privacy Issues&lt;/a&gt;&lt;br /&gt;It has been decided to constitute a Small Group of Experts under the Chairmanship of Justice A.P. Shah, Former Chief Justice, Delhi High Court, to identify the privacy issues and prepare a paper to facilitate authoring the Privacy Bill. Pranesh Prakash is one of the members.&lt;br /&gt;Published by the Planning Commission, New Delhi.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1072&amp;amp;qid=140996" target="_blank"&gt;2011: The year India began to harness social media&lt;/a&gt;&lt;br /&gt;“&lt;i&gt;We saw an increased sharing of digital content whether photos, videos, songs, news or blogs pointing to the Why This Kolaveri Di video, which went viral on YouTube with over 1.3 million views within a week of its release&lt;/i&gt;.”&lt;br /&gt;Nishant Shah in the Sunday Guardian, 1 January 2012.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Blog Posts&lt;/b&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1073&amp;amp;qid=140996" target="_blank"&gt;Section 79 of the Information Technology Act&lt;/a&gt; by Pranesh Prakash&lt;/li&gt;
&lt;li&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1074&amp;amp;qid=140996" target="_blank"&gt;How India Makes E-books Easier to Ban than Books&lt;/a&gt; (And How We Can Change That) by Pranesh Prakash. This was reproduced in &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1075&amp;amp;qid=140996" target="_blank"&gt;Medianama&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;b&gt;Upcoming Events&lt;/b&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1076&amp;amp;qid=140996" target="_blank"&gt;The High Level Privacy Conclave&lt;/a&gt;&lt;br /&gt;Privacy India in partnership with the International Development Research Centre, Canada, Society in Action Group, Gurgaon and Privacy International, UK is organizing the High Level Privacy Conclave at the Paharpur Business Centre, Nehru Place Greens in New Delhi on Friday, 3 February 2012.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1077&amp;amp;qid=140996" target="_blank"&gt;All India Privacy Symposium&lt;/a&gt;&lt;br /&gt;Privacy India in partnership with the International Development Research Centre, Canada, and Society in Action Group, Gurgaon, Privacy International, UK and Commonwealth Human Rights Initiative is organizing the All India Privacy Symposium at the India International Centre, New Delhi on Saturday, 4 February 2012.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;b&gt;Events Organised&lt;/b&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1078&amp;amp;qid=140996" target="_blank"&gt;Workshop on the Standardization of Kannada Computing Terminology&lt;/a&gt;, 28-29 January 2012, Centre for Internet &amp;amp; Society, Bangalore.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1079&amp;amp;qid=140996" target="_blank"&gt;The Curious Case of Whose Data is it Anyway?&lt;/a&gt; The second round of discussions of the Exposing Data Series was co-organized by Tactical Tech and CIS. Siddharth Hande and Hapee de Groot gave lectures.&lt;/li&gt;
&lt;li&gt;"ಕನ್ನಡ ಮತ್ತು ತಂತ್ರಜ್ಞಾನದ ಜೊತೆ ಜೊತೆಗೆ..." organised in TERI, Bangalore, 22 January 2012.&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;Telecom&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The growth in telecommunications in India has been impressive. While the potential for growth and returns exist, a range of issues need to be addressed for this potential to be realized. One aspect is more extensive rural coverage and the second aspect is a countrywide access to broadband which is low at about eight million subscriptions. Both require effective and efficient use of networks and resources, including spectrum. In this connection, Shyam Ponappa continues to write his monthly column for the Business Standard.&lt;/p&gt;
&lt;h3&gt;&lt;b&gt; Article by Shyam Ponappa&lt;/b&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1081&amp;amp;qid=140996" target="_blank"&gt;Reversing India's Downward Trajectory&lt;/a&gt;&lt;br /&gt;The country can regain growth momentum with rate cuts and telecom reforms, writes Shyam Ponappa in this column published in the Business Standard on 5 January 2012.&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h3&gt;&lt;b&gt;Follow us elsewhere&lt;/b&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Get short, timely messages from us on &lt;a href="http://components/com_civicrm/civicrm/extern/url.php?u=456&amp;amp;qid=46981" target="_blank"&gt;Twitter&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Follow CIS on &lt;a href="http://components/com_civicrm/civicrm/extern/url.php?u=457&amp;amp;qid=46981" target="_blank"&gt;identi.ca&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Join the CIS group on &lt;a href="http://components/com_civicrm/civicrm/extern/url.php?u=458&amp;amp;qid=46981" target="_blank"&gt;Facebook&lt;/a&gt;\&lt;/li&gt;
&lt;li&gt;Visit us at &lt;a href="http://components/com_civicrm/civicrm/extern/url.php?u=459&amp;amp;qid=46981" target="_blank"&gt;www.cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;CIS is grateful to Kusuma Trust which was founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin, for its core funding and support for most of its projects.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/january-2012-bulletin'&gt;https://cis-india.org/about/newsletters/january-2012-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2012-07-09T09:36:46Z</dc:date>
   <dc:type>Page</dc:type>
   </item>




</rdf:RDF>
