<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 81 to 95.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/raw/digital-activism-in-asia-reader"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/data-lives-of-humanities-text"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/sadaf-khan-data-bleeding-everywhere-a-story-of-period-trackers"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comments-draft-rules"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/zara-rahman-can-data-ever-know-who-we-really-are"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/digital-natives/dnbook1"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/big-data-reproductive-health-india-mcts"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/between-the-stirrup-and-the-ground-relocating-digital-activism"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/bahujan-digital-publishing-infrastructures"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/digital-humanities/routledge-inter-asia-cultural-studies-volume-15-issue-2-nishant-shah-asia-in-the-edges"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/publications/pupfip/why-no-pupfip"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/arguments-against-software-patents"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/histories-of-the-internet/blogs/archives-and-access/archives-and-access"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/anushree-gupta-ladies-log-women-safety-risk-transfer-ridehailing"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/copyright-bill-analysis"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/raw/digital-activism-in-asia-reader">
    <title> Digital Activism in Asia Reader</title>
    <link>https://cis-india.org/raw/digital-activism-in-asia-reader</link>
    <description>
        &lt;b&gt;The digital turn might as well be marked as an Asian turn. From flash-mobs in Taiwan to feminist mobilisations in India, from hybrid media strategies of Syrian activists to cultural protests in Thailand, we see the emergence of political acts that transform the citizen from being a beneficiary of change to becoming an agent of change. In co-shaping these changes, what the digital shall be used for, and what its consequences will be, are both up for speculation and negotiation. Digital Activism in Asia marks a particular shift where these questions are no longer being refracted through the ICT4D logic, or the West’s attempts to save Asia from itself, but shaped by multiplicity, unevenness, and urgencies of digital sites and users in Asia. It is our great pleasure to present the Digital Activism in Asia Reader.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;The Book&lt;/h2&gt;
&lt;p&gt;The Reader took shape over two workshops with a diverse range of participants, including activists, change-makers, and scholars, organised by the Researchers at Work (RAW) programme in June 2014 and March 2015. During the first workshop, the participants identified the authors, topics, and writings that should be included/featured in the reader, based upon their relevance in the grounded practices of the participants, who came from various Asian countries. The second workshop involved open discussions regarding how the selected readings should be annotated, from key further questions to strategies of introducing them, followed by development of the annotations by the participants of the workshop. The full list of contributors, annotators, and editors is mentioned at the end of the book.&lt;/p&gt;
&lt;p&gt;We are grateful to the &lt;a href="http://meson.press/about/" target="_blank"&gt;Meson Press&lt;/a&gt; for its generous and patience support throughout the development process of the book.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Please download, read, and share this open-access book from the Meson Press &lt;a href="http://meson.press/wp-content/uploads/2015/08/9783957960511-Digital-Activism-Asia-Reader.pdf" target="_blank"&gt;website&lt;/a&gt;.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The Reader has been edited by Nishant Shah, P.P. Sneha, and Sumandro Chattapadhyay, with support from Anirudh Sridhar, Denisse Albornoz, and Verena Getahun.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Excerpt from the Foreword&lt;/h2&gt;
&lt;p&gt;Compiling this Reader on Digital Activism in Asia is fraught with compelling challenges, because each of the key terms in the formulation of the title is sub-ject to multiple interpretations and fierce contestations. The construction of ‘Asia’ as a region, has its historical roots in processes of colonial technologies of cartography and navigation. Asia was both, a measured entity, mapped for resources to be exploited, and also a measure of the world, promising anorientation to the Western World’s own turbulent encounters. As Chen Kuan-Hsing points out in his definitive history of the region, Asia gets re-imagined as­ a­ ‘method’ in cold-war conflicts, becoming the territory to be assimilated through exports of different ideologies and cultural purports. Asia does not have its own sense of being­ a­region. The transactions, interactions, flows and exchanges between different countries and regions in Asia have been so entirely mediated by powers of colonisation that the region remains divided and reticent in its imagination of itself. However, by the turn of the 21st century, Asia has seen­ a­ new awakening. It finds­ a­ regional identity, which, surprisingly did not emerge from its consolidating presence in global economics or in globalised structures of trade and commerce. Instead, it finds­ a­ presence, for itself, through a series of crises of governance, of social order, of political rights, and of cultural productions, that binds it together in unprecedented ways.&lt;/p&gt;
&lt;p&gt;The digital turn might as well be marked as an Asian turn, because with the new networks of connectivity, with Asian countries marking themselves as informatics hubs, working through a circulated logic of migrant labour and dis-tributed resources, there came a sense of immediacy, proximity, and urgencythat continues to shape the Asian imagination in a new way. In the last decade or so, the rapid changes that have emerged, creating multiple registers of modernity, identity, and community in different parts of Asia, accelerated by a­ seamless exchange of ideas, commodities, cultures, and people have created a new sense of the region as emerging through co-presence rather than competition and conflict. Simultaneously, the emergence of global capitals of information, labour and cultural export, have created new reference points by which the region creates its identities and networks that are no longer subject to the tyranny of Western hegemony...&lt;/p&gt;
&lt;p&gt;While the digital remains crucial to this shaping of contemporary Asia, both in sustaining the developmental agenda that most of the countries espouse, and in opening up an inward looking gaze of statecraft and social organisation, the digital itself remains an ineffable concept. Largely because the digital is like­ a­ blackbox that conflates multiple registers of meaning and layers of life, it becomes important to unengineer it and see what it enables and hides. The economic presence of the digital is perhaps the most visible in telling the story of Asia in the now. Beginning with the dramatic development of Singapore as the centre of informatics governance and the emergence of a range of cities from Shanghai to Manilla and Bangalore to Tehran, there has been an accelerated narrative of economic growth and accumulation of capital that is often the global face of the Asian turn. However, this economic reordering is not a practice in isolation. It brings with it, a range of social stirrings that seek to overthrow traditional structures of oppression, corruption, control, and injustice that have often remained hidden in the closed borders of Asian countries. However, the digital marks a particular shift where these questions are no longer being excavated by the ICT4D logic, of the West’s attempts to save Asia from itself. These are questions that emerge from the ground, as more people interact with progressive and liberal politics and aspire not only for higher purchase powers but a better quality of rights. The digital turn has opened up a range of social and political rights based discourses, practices, and movements, where populations are holding their governments and countries responsible, accountable, and culpable in the face of personal and collective loss and injustice...&lt;/p&gt;
&lt;p&gt;In the face of this multiplicity of digital sites and usages that are reconfiguring Asia, it is obvious then, that the very nature of what constitutes activism is changing as well. Organised civil society presence in Asia has often had a strong role in shaping modern nation states, but more often than not these processes were defined in the same vocabulary as that of the powers that they were fighting against.­ Marked by­ a­ strong sense of developmentalism and often working in complement to the state rather than keeping a check on the state’s activities, traditional activism in Asia has often suffered from the incapacity to scale and the inability to find alternatives to the state-defined scripts of development, growth and progress. In countries where literacy rates have been low, these movements also suffer from being conceived in philosophical and linguistic sophistry that escapes the common citizen and remains the playground of the few who have privileges afforded to them by class and region. Digital Activism, however, seems to have broken this language barrier, both internally and externally, allowing for new visualities enabled by ubiquitous computing to bring various stakeholders into the fray... At the same time, the digital itself has introduced new problems and concerns that are often glossed over, in the enthralling tale of progress. Concerns around digital divide, invasive practices of personal data gathering, the nexus of markets and governments that install the citizen/consumer in precarious conditions, and the re-emergence of organised conservative politics are also a part of the digital turn. Activism has had to focus not only on digital as a tool, but digital also as a site of protest and resistance...&lt;/p&gt;
&lt;p&gt;The Reader does not offer an index of the momentous emergence with the growth of the digital or a chronological account of how digital activism in Asia has grown and shaped the region. Instead, the Reader attempts a crowd-sourced  compilation that presents critical tools, organisations, theoretical concepts, political analyses, illustrative case-studies and annotations, that an emerging network of changemakers in Asia have identified as important in their own practices within their own contexts.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/digital-activism-in-asia-reader'&gt;https://cis-india.org/raw/digital-activism-in-asia-reader&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Activism</dc:subject>
    
    
        <dc:subject>Digital Activism in Asia Reader</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Net Cultures</dc:subject>
    
    
        <dc:subject>Publications</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2015-10-24T14:36:44Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/data-lives-of-humanities-text">
    <title>Data Lives of Humanities Text</title>
    <link>https://cis-india.org/raw/data-lives-of-humanities-text</link>
    <description>
        &lt;b&gt;The ‘computational turn’ in the humanities has brought with it several questions and challenges for traditional ways of engaging with the ‘text’ as an object of enquiry.  The prevalence of data-driven scholarship in the humanities offers several challenges to traditional forms of work and practice, with regard to theory, tools, and methods. In the context of the digital, ‘text’ acquires new forms and meanings, especially with practices such as distant reading. Drawing upon excerpts from an earlier study on digital humanities in India, this essay discusses how data in the humanities is not a new phenomenon; concerns about the ‘datafication’ of humanities, now seen prominently in digital humanities and related fields is actually reflective of a longer conflict about the inherited separation between humanities and technology. It looks at how ‘data’ in the humanities has become a new object of enquiry as a result of several changes in the media landscape in the past few decades. These include large-scale digitalization and availability of  corpora of materials (digitized and born-digital) in an array of formats and across varied platforms, thus leading to also a steady prevalence of the use of computational methods in working with and studying cultural artifacts today. This essay also explores how reading ‘text as data’ helps understand the role of data in the making of humanities texts and redefines traditional ideas of textuality, reading, and the reader.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;This essay by Puthiya Purayil Sneha was published in &lt;em&gt;Lives of Data: Essays on Computational Cultures from India&lt;/em&gt; (2020) edited by Sandeep Mertia, with a Foreword by Ravi Sundaram as part of the Series on Theory on Demand by Institute of Network Cultures, Amsterdam.&lt;/h4&gt;
&lt;h4&gt;Read the open access book &lt;a href="https://networkcultures.org/blog/publication/lives-of-data-essays-on-computational-cultures-from-india/" target="_blank"&gt;here&lt;/a&gt;.&lt;/h4&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/data-lives-of-humanities-text'&gt;https://cis-india.org/raw/data-lives-of-humanities-text&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sneha-pp</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Publications</dc:subject>
    
    
        <dc:subject>Digital Humanities</dc:subject>
    

   <dc:date>2020-12-23T13:07:43Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/sadaf-khan-data-bleeding-everywhere-a-story-of-period-trackers">
    <title>Data bleeding everywhere: a story of period trackers</title>
    <link>https://cis-india.org/raw/sadaf-khan-data-bleeding-everywhere-a-story-of-period-trackers</link>
    <description>
        &lt;b&gt;This is an excerpt from an essay by Sadaf Khan, written for and published as part of the Bodies of Evidence collection of Deep Dives. The Bodies of Evidence collection, edited by Bishakha Datta and Richa Kaul Padte, is a collaboration between Point of View and the Centre for Internet and Society, undertaken as part of the Big Data for Development Network supported by International Development Research Centre, Canada.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Please read the full essay on Deep Dives: &lt;a href="https://deepdives.in/data-bleeding-everywhere-a-story-of-period-trackers-8766dc6a1e00" target="_blank"&gt;Data bleeding everywhere: a story of period trackers&lt;/a&gt;&lt;/h4&gt;
&lt;h4&gt;Sadaf Khan: &lt;a href="http://mediamatters.pk/the-team/" target="_blank"&gt;Media Matters for Democracy&lt;/a&gt; and &lt;a href="https://twitter.com/nuqsh" target="_blank"&gt;Twitter&lt;/a&gt;&lt;/h4&gt;
&lt;hr /&gt;
&lt;p&gt;...By now there are a number of questions buzzing around my head, most of them unasked. Are users comfortable with so much of their data being collected? Are there really algorithms that string together all this data into medically-relevant trends? How reliable can these trends be when usage is erratic? Are period tracking apps pioneering, fundamental elements of a future where medical aid is digital and reliable data is inevitably linked to the provision of medical services? And if so, are privacy and health soon to become conflicting rights?&lt;/p&gt;
&lt;p&gt;I also want to find out how users understand data collection and privacy before giving apps consent to utilize their data and information as they will. Hareem says she gives apps informed consent. ‘If my data becomes a part of the statistics aiding medical research, why not? There is no harm in it. I am getting a good service, and if my data helps create a better understanding as a part of a larger statistical pool, they are welcome to use it.’&lt;/p&gt;
&lt;p&gt;But is she really sure that this information will be used only as anonymised data for medical research? ‘Look at the kind of information that is being collected,’ she answers. ‘Dates, mood, consistency of mucus, basal temperature. What kind of use does one have for this data?’&lt;/p&gt;
&lt;p&gt;Naila, in turn, says: ‘Honestly, I have never really thought about what happens to the data the application collects. Obviously I enter detailed information about my cycle and my moods and my sex life. But a), my account is under a fake name and b), even if it wasn’t, who would have any use for stuff like when my period starts and ends and what my mood or digestive system is like at any given moment?’&lt;/p&gt;
&lt;p&gt;In fact, this sentiment is shared among all the women interviewed for this piece — what use would anyone have for this data?&lt;/p&gt;
&lt;p&gt;As users, we often imagine our own data as anonymised within a huge dataset. But as users, we don’t have enough information about how our data is being used — or will be used in future. The open and at times vague language of a platform’s terms and conditions allows menstrual apps to use data in ways that I may not know of. Some apps continue to hold customer data even after an account is deleted. Even though I may technically ‘agree’ to the terms and conditions, is this fully informed consent?&lt;/p&gt;
&lt;p&gt;One of the big concerns around this kind of medical information being collected is the potential for collaborations with big pharmaceuticals and other health service providers. With apps sitting on a goldmine of users’ fertility and health information, health service providers might mine their data for potential consumers and reach out directly to them. While this is like any targeted marketing campaign, the fact that the advertiser is likely to be offering medical services to women suffering from infertility and are at their most vulnerable, raises totally different ethical concerns.&lt;/p&gt;
&lt;p&gt;And these apps and their businesses might grow in directions that users haven’t taken into consideration. Take Ovia’s health feature for companies to buy premium services for their employees. While the gesture is packaged as a goodwill one, it also means that an employer has access to extremely private and intimate medical information about their women employees. And while the data set is anonymised, it is still possible to figure out the identity of users based on specific information. For example, how many women in any company are pregnant at any given time?...&lt;/p&gt;
&lt;p&gt;Pregnant a year after my miscarriage, I initially downloaded multiple apps in a bid to find a good fit. I don’t know which one of these was in communication with Facebook. But almost immediately, my Facebook timeline started becoming littered with ads for baby stuff — clothes, shoes bibs, prams, cribs, ointments for stretch marks, maternity wear, the works.&lt;/p&gt;
&lt;p&gt;It makes me think of those old school clockwork-style videos. You drop a ball and off it goes: making dominos fall, knocking over pots and pans, setting in motion absurd, synchronized mechanisms. Similarly, I drop my data and watch it hurtle into my life, on to other platforms, off to vendors. Maybe to stalkers? To employers? Who knows.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/sadaf-khan-data-bleeding-everywhere-a-story-of-period-trackers'&gt;https://cis-india.org/raw/sadaf-khan-data-bleeding-everywhere-a-story-of-period-trackers&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Bodies of Evidence</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Publications</dc:subject>
    
    
        <dc:subject>BD4D</dc:subject>
    
    
        <dc:subject>Big Data for Development</dc:subject>
    

   <dc:date>2019-12-06T05:03:09Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comments-draft-rules">
    <title>Comments on the Draft Rules under the Information Technology Act</title>
    <link>https://cis-india.org/internet-governance/blog/comments-draft-rules</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society commissioned an advocate, Ananth Padmanabhan, to produce a comment on the Draft Rules that have been published by the government under the Information Technology Act.  In his comments, Mr. Padmanabhan highlights the problems with each of the rules and presents specific recommendations on how they can be improved.  These comments were sent to the Department of Information and Technology.&lt;/b&gt;
        
&lt;h2&gt;&lt;em&gt;Comments on the Draft Rules under the Information Technology Act as Amended by the Information Technology (Amendment) Act, 2008&lt;/em&gt;&lt;/h2&gt;
&lt;p&gt;&lt;em&gt;&lt;strong&gt;Submitted by the Centre for Internet and Society, Bangalore&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;&lt;strong&gt;Prepared by Ananth Padmanabhan, Advocate in the Madras High Court&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;
&lt;h2&gt;Interception, Monitoring and Decryption&lt;/h2&gt;
&lt;h3&gt;Section 69&lt;/h3&gt;
&lt;p&gt;The section says:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;Where the Central Government or a State Government or any of its officer specially authorised by the Central Government or the State Government, as the case may be, in this behalf may, if satisfied that it is necessary or expedient so to do in the interest of the sovereignty or integrity of India, defence of India, security of the State, friendly relations with foreign States or public order or for preventing incitement to the commission of any cognizable offence relating to above or for investigation of any offence, it may subject to the provisions of sub-section (2), for reasons to be recorded in writing, by order, direct any agency of the appropriate Government to intercept, monitor or decrypt or cause to be intercepted or monitored or decrypted any information generated, transmitted, received or stored in any computer resource. &lt;/li&gt;&lt;li&gt;The procedure and safeguards subject to which such interception or monitoring or decryption may be carried out, shall be such as may be prescribed.&lt;/li&gt;&lt;li&gt;The subscriber or intermediary or any person in-charge of the computer resource shall, when called upon by any agency referred to in sub-section (1), extend all facilities and technical assistance to-&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; (a) provide access to or secure access to the computer resource
generating transmitting, receiving or storing such information; or&lt;/p&gt;
&lt;p&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; (b) intercept, monitor, or decrypt the information, as the case may be; or&lt;/p&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; (c) provide information stored in computer resource.
&lt;ol&gt;&lt;li&gt;The subscriber or intermediary or any person who fails to assist the agency referred to in sub-section (3) shall be punished with imprisonment for a term which may extend to seven years and shall also be liable to fine. &lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Recommendation #1&lt;/strong&gt;&lt;br /&gt;Section 69(3) should be amended and the following proviso be inserted:&lt;/p&gt;
&lt;p class="callout"&gt;Provided that only those intermediaries with respect to any information or computer resource that is sought to be monitored, intercepted or decrypted, shall be subject to the obligations contained in this sub-section, who are, in the opinion of the appropriate authority, prima facie in control of such transmission of the information or computer resource. The nexus between the intermediary and the information or the computer resource that is sought to be intercepted, monitored or decrypted should be clearly indicated in the direction referred to in sub-section (1) of this section.&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Reasons for the Recommendation &lt;/strong&gt;&lt;br /&gt;In the case of any information or computer resource, there may be more than one intermediary who is associated with such information. This is because “intermediary” is defined in section 2(w) of the amended Act as,&lt;/p&gt;
&lt;p class="callout"&gt;“with respect to any electronic record means any person who on behalf of another person receives, stores or transmits that record or provides any service with respect to that record, including telecom service providers, network service providers, internet service providers, webhosting service providers, search engines, online payment sites, online-auction sites, online-market places and cyber cafes”.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;The State or Central Government should not be given wide-ranging powers to enforce cooperation on the part of any such intermediary without there being a clear nexus between the information that is sought to be decrypted or monitored by the competent authority, and the control that any particular intermediary may have over such information.&lt;/p&gt;
&lt;p&gt;To give an illustration, merely because some information may have been posted on an online portal, the computer resources in the office of the portal should not be monitored unless the portal has some concrete control over the nature of information posted in it. This has to be stipulated in the order of the Central or State Government which authorizes interception of the intermediary.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Recommendation #2&lt;/strong&gt;&lt;br /&gt;Section 69(4) should be repealed.&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Reasons for the Recommendation&lt;/strong&gt;&lt;br /&gt;The closest parallels to Section 69 of the Act are the provisions in the Telegraph Rules which were brought in after the decision in PUCL v. Union of India, (1997) 1 SCC 301, famously known as the telephone tapping case.&lt;/p&gt;
&lt;p&gt;Section 69(4) fixes tremendous liability on the intermediary for non-cooperation. This is violative of Article 14.&amp;nbsp; Similar provisions in the Indian Penal Code and Code of Criminal Procedure, which demand cooperation from members of the public as regards production of documents, letters etc., and impose punishment for non-cooperation on their part, impose a maximum punishment of one month. It is bewildering why the punishment is 7 years imprisonment for an intermediary, when the only point of distinction between an intermediary under the IT Act and a member of the public under the IPC and CrPC is the difference in the media which contains the information.&lt;/p&gt;
&lt;p&gt;Section 69(3) is akin to the duty cast upon members of the public to extend cooperation under Section 39 of the Code of Criminal Procedure by way of providing information as to commission of any offence, or the duty, when a summons is issued by the Court or the police, to produce documents under Sections 91 and 92 of the Code of Criminal Procedure. The maximum punishment for non-cooperation prescribed by the Indian Penal Code for omission to cooperate or wilful breach of summons is only a month under Sections 175 and 176 of the Indian Penal Code. Even the maximum punishment for furnishing false information to the police is only six months under Section 177 of the IPC. When this is the case with production of documents required for the purpose of trial or inquiry, it is wholly arbitrary to impose a punishment of six years in the case of intermediaries who do not extend cooperation for providing access to a computer resource which is merely apprehended as being a threat to national security etc. A mere apprehension, however reasonable it may be, should not be used to pin down a liability of such extreme nature on the intermediary.&lt;/p&gt;
&lt;p&gt;This would also amount to a violation of Articles 19(1)(a) as well as 19(1)(g) of the Constitution, not to mention Article 20(3). To give an example, much of the information received from confidential sources by members of the press would be stored in computer resources. By coercing them, through the 7 year imprisonment threat, to allow access to this computer resource and thereby part with this information, the State is directly infringing on their right under Article 19(1)(a).&amp;nbsp; Furthermore, if the “subscriber” is the accused, then section 69(4) goes against Article 20(3) by forcing the accused to bear witness against himself.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Draft Rules under Section 69 &lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Rule 3&lt;/strong&gt;&lt;br /&gt;Directions for interception or monitoring or decryption of any information generated, transmitted, received or stored in any computer resource under sub- section (2) of section 69 of the Information Technology (Amendment) Act, 2008 (hereinafter referred to as the said Act) shall not be issued except by an order made by the concerned competent authority who is Union Home Secretary in case of Government of India; the Secretary in-charge of Home Department in a State Government or Union Territory as the case may be. In unavoidable circumstances, such order may be made by an officer, not below the rank of a Joint Secretary to the Government of India, who has been duly authorised by the Union Home Secretary or by an officer equivalent to rank of Joint Secretary to Government of India duly authorised by the Secretary in-charge of Home Department in the State Government or Union Territory, as the case may be:&lt;/p&gt;
&lt;p&gt;Provided that in emergency cases – &lt;br /&gt;(i) in remote areas, where obtaining of prior directions for interception or monitoring or decryption of information is not feasible; or &lt;br /&gt;(ii) for operational reasons, where obtaining of prior directions for interception or monitoring or decryption of any information generated, transmitted, received or stored in any computer resource is not feasible;&lt;/p&gt;
&lt;p&gt;the required interception or monitoring or decryption of any information generated, transmitted, received or stored in any computer resource shall be carried out with the prior approval of the Head or the second senior most officer of the Security and Law Enforcement Agencies (hereinafter referred to as the said Security Agencies) at the Central Level and the officers authorised in this behalf, not below the rank of Inspector General of Police or an officer of equivalent rank, at the State and Union Territory level. The concerned competent authority, however, shall be informed of such interceptions or monitoring or decryption by the approving authority within three working days and that such interceptions or monitoring or decryption shall be got confirmed by the concerned competent authority within a period of seven working days. If the confirmation from the concerned competent authority is not received within the stipulated seven working days, such interception or monitoring or decryption shall cease and the same information shall not be intercepted or monitored or decrypted thereafter without the prior approval of the concerned competent authority, as the case may be.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Recommendation #3&lt;/strong&gt;&lt;br /&gt;In Rule 3, the following proviso may be inserted:&lt;/p&gt;
&lt;p class="callout"&gt;“Provided that in the event of cooperation by any intermediary being required for the purpose of interception, monitoring or decryption of such information as is referred to in this Rule, prior permission from a Supervisory Committee headed by a retired Judge of the Supreme Court or the High Courts shall be obtained before seeking to enforce the Order mentioned in this Rule against such intermediary.”&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Reasons for the Recommendation &lt;/strong&gt;&lt;br /&gt;Section 69 and the draft rules suffer from absence of essential procedural safeguards. This has come in due to the blanket emulation of the Telegraph Rules. Additional safeguards should have been prescribed to ensure that the intermediary is put to minimum hardship when carrying on the monitoring or being granted access to a computer resource. Those are akin to a raid, in the sense that it can stop an online e-commerce portal from carrying out operations for a day or even more, thus affecting their revenue. It is therefore recommended that in any situation where cooperation from the intermediary is sought, prior judicial approval has to be taken. The Central or State Government cannot be the sole authority in such cases.&lt;/p&gt;
&lt;p&gt;Furthermore, since access to the computer resource is required, an executive order should not suffice, and a search warrant or an equivalent which results from a judicial application of the mind (by the Supervisory Committee, for instance) should be required.&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Recommendation #4&lt;/strong&gt;&lt;br /&gt;The following should be inserted after the last line in Rule 22:&lt;/p&gt;
&lt;p class="callout"&gt;The Review Committee shall also have the power to award compensation to the intermediary in cases where the intermediary has suffered loss or damage due to the actions of the competent authority while implementing the order issued under Rule 3.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Reasons for the Recommendation&lt;/strong&gt;&lt;br /&gt;The Review Committee should be given the power to award compensation to the loss suffered by the intermediary in cases where the police use equipment or software for monitoring/decryption that causes damage to the intermediary’s computer resources / networks. The Review Committee should also be given the power to award compensation in the case of monitoring directions which are later found to be frivolous or even worse, borne out of mala fide considerations. These provisions will act as a disincentive against the abuse of power contained in Section 69.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Blocking of Access to Information&lt;/h2&gt;
&lt;h3&gt;Section 69A&lt;/h3&gt;
&lt;p&gt;The section provides for blocking of websites if the government is satisfied that it is in the interests of the purposes enlisted in the section. It also provides for penalty of up to seven years for intermediaries who fail to comply with the directions under this section. &lt;br /&gt;The rules under this section describe the procedure which have to be followed barring which the review committee may, after due examination of the procedural defects, order an unblocking of the website.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Section 69A(3)&lt;/strong&gt;&lt;br /&gt;The intermediary who fails to comply with the direction issued under sub-section (1) shall be punished with an imprisonment for a term which may extend to seven years and also be liable to fine.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Recommendation #5&lt;/strong&gt;&lt;br /&gt;The penalty for intermediaries must be lessened.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Reasons for Recommendations &lt;/strong&gt;&lt;br /&gt;The penal provision in this section which prescribes up to seven years imprisonment and a fine on an intermediary who fails to comply with the directions so issued is also excessively harsh. Considering the fact that various mechanisms are available to escape the blocking of websites, the intermediaries must be given enough time and space to administer the block effectively and strict application of the penal provisions must be avoided in bona fide cases.&lt;/p&gt;
&lt;p&gt;The criticism about Section 69 and the draft rules in so far as intermediary liability is concerned, will also apply mutatis mutandis to these rules as well as Section 69A.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Draft Rules under Section 69A&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Rule 22: Review Committee&lt;/strong&gt;&lt;br /&gt;The Review Committee shall meet at least once in two months and record its findings whether the directions issued under Rule (16) are in accordance with the provisions of sub-section (2) of section 69A of the Act. When the Review Committee is of the opinion that the directions are not in accordance with the provisions referred to above, it may set aside the directions and order for unblocking of said information generated, transmitted, received, stored or hosted in a computer resource for public access.&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Recommendation #6&lt;/strong&gt;&lt;br /&gt;A permanent Review Committee should be specially for the purposes of examining procedural lapses.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Reasons for Recommendation &lt;/strong&gt;&lt;br /&gt;Rule 22 provides for a review committee which shall meet a minimum of once in every two months and order for the unblocking of a site of due procedures have not been followed. This would mean that if a site is blocked, there could take up to two months for a procedural lapse to be corrected and it to be unblocked. Even a writ filed against the policing agencies for unfair blocking would probably take around the same time. Also, it could well be the case that the review committee will be overborne by cases and may fall short of time to inquire into each. Therefore, it is recommended that a permanent Review Committee be set up which will monitor procedural lapses and ensure that there is no blocking in the first place before all the due procedural requirements are met. &lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;h2&gt;Monitoring and Collection of Traffic Data&lt;/h2&gt;
&lt;h3&gt;Draft Rules under Section 69B&lt;/h3&gt;
&lt;p&gt;The section provides for monitoring of computer networks or resources if the Central Government is satisfied that conditions so mentioned are satisfied.&lt;/p&gt;
&lt;p&gt;The rules provide for the manner in which the monitoring will be done, the process by which the directions for the same will be issued and the liabilities of the intermediaries and monitoring officers with respect to confidentiality of the information so monitored.&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Grounds for Monitoring &lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;Rule 4&lt;/strong&gt;&lt;br /&gt;The competent authority may issue directions for monitoring and collection of traffic data or information generated, transmitted, received or stored in any computer resource for any or all of the following purposes related to cyber security:&lt;br /&gt;(a) forecasting of imminent cyber incidents;&lt;br /&gt;(b) monitoring network application with traffic data or information on computer resource;&lt;br /&gt;(c) identification and determination of viruses/computer contaminant;&lt;br /&gt;(d) tracking cyber security breaches or cyber security incidents;&lt;br /&gt;(e) tracking computer resource breaching cyber security or spreading virus/computer contaminants;&lt;br /&gt;(f) identifying or tracking of any person who has contravened, or is suspected of having contravened or being likely to contravene cyber security;&lt;br /&gt;(g) undertaking forensic of the concerned computer resource as a part of investigation or internal audit of information security practices in the computer resource;&lt;br /&gt;(h) accessing a stored information for enforcement of any provisions of the laws relating to cyber security for the time being in force;&lt;br /&gt;(i) any other matter relating to cyber security.&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Rule 6&lt;/strong&gt;&lt;br /&gt;No direction for monitoring and collection of traffic data or information generated, transmitted, received or stored in any computer resource shall be given for purposes other than those specified in Rule (4).&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Recommendation #7&lt;/strong&gt;&lt;br /&gt;Clauses (a), (b), (c), and (i) of Rule 4 must be repealed.&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Reasons for Recommendations &lt;/strong&gt;&lt;br /&gt;The term “cyber incident” has not been defined, and “cyber security” has been provided a circular definition.&amp;nbsp; Rule 6 clearly states that no direction for monitoring and collection of traffic data or information generated, transmitted, received or stored in any computer resource shall be given for purposes other than those specified in Rule 4. Therefore, it may prima facie appear that the government is trying to lay down clear and strict safeguards when it comes to monitoring at the expense of a citizens' privacy. However, Rule 4(i) allows the government to monitor if it is satisfied that it is “any matter related to cyber security”. This may well play as a ‘catch all’ clause to legalise any kind of monitoring and collection and therefore defeats the purported intention of Rule 6 of safeguarding citizen’s interests against arbitrary and groundless intrusion of privacy. Also, the question of degree of liability of the intermediaries or persons in charge of the computer resources for leak of secret and confidential information remains unanswered. &lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Rule 24: Disclosure of monitored data &lt;/strong&gt;&lt;br /&gt;Any monitoring or collection of traffic data or information in computer resource by the employee of an intermediary or person in-charge of computer resource or a person duly authorised by the intermediary, undertaken in course of his duty relating to the services provided by that intermediary, shall not be unlawful, if such activities are reasonably necessary for the discharge his duties as per the prevailing industry practices, in connection with :&lt;br /&gt;(vi) Accessing or analysing information from a computer resource for the purpose of tracing a computer resource or any person who has contravened, or is suspected of having contravened or being likely to contravene, any provision of the Act that is likely to have an adverse impact on the services provided by the intermediary.&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Recommendation #8&lt;/strong&gt;&lt;br /&gt;Safeguards must be introduced with respect to exercise of powers conferred by Rule 24(vi).&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Reasons for Recommendations &lt;/strong&gt;&lt;br /&gt;Rule 24(vi) provides for access, collection and monitoring of information from a computer resource for the purposes of tracing another computer resource which has or is likely to contravened provisions of the Act and this is likely to have an adverse impact on the services provided by the intermediary. Analysis of a computer resource may reveal extremely confidential and important data, the compromise of which may cause losses worth millions. Therefore, the burden of proof for such an intrusion of privacy of the computer resource, which is first used to track another computer resource which is likely to contravene the Act, should be heavy. Also, this violation of privacy should be weighed against the benefits accruing to the intermediary. The framing of sub rules under this clearly specifying the same is recommended.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;The disclosure of sensitive information by a monitoring agency for purposes of ‘general trends’ and ‘general analysis of cyber information’ is uncalled for as it dissipates information among lesser bodies that are not governed by sufficient safeguards and this could result in outright violation of citizen’s privacy.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Manner of Functioning of CERT-In&lt;/h2&gt;
&lt;h3&gt;Draft Rules under Section 70B(5)&lt;/h3&gt;
&lt;p&gt;Section 70B provides for an Indian Computer Emergency Response Team (CERT-In) which shall serve as a national agency for performing duties as prescribed by clause 4 of this section in accordance to the rules as prescribed.&lt;br /&gt;The rules provide for CERT-In’s authority, composition of advisory committee, constituency, functions and responsibilities, services, stakeholders, policies and procedures, modus operandi, disclosure of information and measures to deal with non compliance of orders so issued. However, there are a few issues which need to be addressed as under:&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Definitions&lt;/strong&gt;&lt;br /&gt;In these Rules, unless the context otherwise requires, “Cyber security incident” means any real or suspected adverse event in relation to cyber security that violates an explicit or implied security policy resulting in unauthorized access, denial of service/ disruption, unauthorized use of a computer resource for processing or storage of information or changes to data, information without authorization.&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Recommendation #9&lt;/strong&gt;&lt;br /&gt;The words ‘or implied’’ must be excluded from rule 2(g) which defines ‘cyber security incident’, and the term ‘security policy’ must be qualified to state what security policy is being referred to.&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Reasons for Recommendation&lt;/strong&gt;&lt;br /&gt;“Cyber security incident” means any real or suspected adverse event in relation to cyber security that violates an explicit or implied security policy resulting in unauthorized access, denial of service/disruption, unauthorized use of a computer resource for processing or storage of information or changes to data, information without authorization.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;Thus, the section defines any circumstance where an explicit or implied security policy is contravened as a ‘cyber security incident’. Without clearly stating what the security policy is, an inquiry into its contravention is against an individual’s civil rights. If an individual’s actions are to be restricted for reasons of security, then the restrictions must be expressly defined and such restrictions cannot be said to be implied.&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Rule 13(4): Disclosure of Information &lt;/strong&gt;&lt;br /&gt;Save as provided in sub-rules (1), (2), (3) of rule 13, it may be necessary or expedient to so to do, for CERT-In to disclose all relevant information to the stakeholders, in the interest of sovereignty or integrity of India, defence of India, security of the State, friendly relations with foreign States or public order or for preventing incitement to the commission of an offence relating to cognizable offence or enhancing cyber security in the country.&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Recommendation #10&lt;/strong&gt;&lt;br /&gt;Burden of necessity for disclosure of information should be made heavier.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Reasons for the Recommendation&lt;/strong&gt;&lt;br /&gt;Rule 13(4) allows the disclosure of information by CERT-In in the interests of ‘enhancing cyber security’. This enhancement however needs to be weighed against the detriment caused to the individual and the burden of proof must be on the CERT-In to show that this was the only way of achieving the required.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Rule 19: Protection for actions taken in Good Faith &lt;/strong&gt;&lt;br /&gt;All actions of CERT-In and its staff acting on behalf of CERT-In are taken in good faith in fulfillment of its mandated roles and functions, in pursuance of the provisions of the Act or any rule, regulations or orders made thereunder. CERT-In and its staff acting on behalf of CERT-In shall not be held responsible for any unintended fallout of their actions.&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Recommendation #11&lt;/strong&gt;&lt;br /&gt;CERT-In should be made liable for their negligent action and no presumption of good faith should be as such provided for.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Reasons for the Recommendation &lt;/strong&gt;&lt;br /&gt;Rule 19 provides for the protection of CERT-In members for the actions taken in ‘good faith’. It defines such actions as ‘unintended fallouts’. Clearly, if information has been called for and the same is highly confidential, then this rule bars the remedy for any leak of the same due to the negligence of the CERT-In members. This is clearly not permissible as an agency that calls for delicate information should also be held responsible for mishandling the same, intentionally or negligently.&amp;nbsp; Good faith can be established if the need arises, and no presumption as to good faith needs to be provided.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Draft Rules under Section 52&lt;/h3&gt;
&lt;p&gt;These rules, entitled the “Cyber Appellate Tribunal (Salary, Allowances and Other Terms and Conditions of Service of Chairperson and Members) Rules, 2009” are meant to prescribe the framework for the independent and smooth functioning of the Cyber Appellate Tribunal. This is so because of the specific functions entrusted to this Appellate Tribunal. Under the IT Act, 2000 as amended by the IT (Amendment) Act, 2008, this Tribunal has the power to entertain appeals against orders passed by the adjudicating officer under Section 47.&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Recommendation #12&lt;/strong&gt;&lt;br /&gt;Amend qualifications Information Technology (Qualification and Experience of Adjudicating Officers and Manner of Holding Enquiry) Rules, 2003, to require judicial training and experience.&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Reasons for the Recommendation&lt;/strong&gt;&lt;br /&gt;It is submitted that an examination of these rules governing the Appellate Tribunal cannot be made independent of the powers and qualifications of Adjudicating Officers who are the original authority to decide on contravention of provisions in the IT Act dealing with damage to computer system and failure to furnish information. Even as per the Information Technology (Qualification and Experience of Adjudicating Officers and Manner of Holding Enquiry) Rules, 2003, persons who did not possess judicial experience and training, such as those holding the post of Director in the Central Government, were qualified to perform functions under Section 46 and decide whether there has been unauthorized access to a computer system. This involves appreciation of evidence and is not a merely administrative function that could be carried on by any person who has basic knowledge of information technology.&lt;/p&gt;
&lt;p&gt;Viewed from this angle, the qualifications of the Cyber Appellate Tribunal members should have been made much tighter as per the new draft rules. The above rules when read with Section 50 of the IT Act, as amended in 2008, do not say anything about the qualification of the technical members apart from the fact that such person shall not be appointed as a Member, unless he is, or has been, in the service of the Central Government or a State Government, and has held the post of Additional Secretary or Joint Secretary or any equivalent post. Though special knowledge of, and professional experience in, information technology, telecommunication, industry, management or consumer affairs, has been prescribed in the Act as a requirement for any technical member.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Draft Rules under Section 54&lt;/h3&gt;
&lt;p&gt;These Rules do not suffer any defect and provide for a fair and reasonable enquiry in so far as allegations made against the Chairperson or the members of the Cyber Appellate Tribunal are concerned.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Penal Provisions&lt;/h2&gt;
&lt;h3&gt;Section 66A&lt;/h3&gt;
&lt;p&gt;Any person who sends, by means of a computer resource or a communication device,&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; (a) any information that is grossly offensive or has menacing character; or&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; (b) any information which he knows to be false, but for the purpose of causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred or ill will, persistently by making use of such computer resource or a communication device,&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; (c) any electronic mail or electronic mail message for the purpose of causing annoyance or inconvenience or to deceive or to mislead the addressee or recipient about the origin of such messages,&lt;br /&gt;shall be punishable with imprisonment for a term which may extend to three years and with fine.&lt;br /&gt;Sec. 32 of the 2008 Act inserts Sec. 66A which provides for penal measures for mala fide use of electronic resources to send information detrimental to the receiver. For the section to be attracted the ‘information’ needs to be grossly offensive, menacing, etc. and the sender needs to have known it to be false.&lt;/p&gt;
&lt;p&gt;While the intention of the section – to prevent activities such as spam-sending – might be sound and even desirable, there is still a strong argument to be made that words is submitted that the use of words such as ‘annoyance’ and ‘inconvenience’ (in s.66A(c)) are highly problematic.&amp;nbsp; Further, something can be grossly offensive without touching upon any of the conditions laid down in Article 19(2).&amp;nbsp; Without satisfying the conditions of Article 19(2), this provision would be ultra vires the Constitution.&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Recommendation #13&lt;/strong&gt;&lt;br /&gt;The section should be amended and words which lead to ambiguity must be excluded.&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Reasons for the Recommendation &lt;/strong&gt;&lt;br /&gt;A clearer phrasing as to what exactly could convey ‘ill will’ or cause annoyance in the electronic forms needs to be clarified. It is possible in some electronic forms for the receiver to know the content of the information. In such circumstances, if such a possibility is ignored and annoyance does occur, is the sender still liable? Keeping in mind the complexity of use of electronic modes of transmitting information, it can be said that several such conditions arise which the section has vaguely covered. Therefore, a stricter and more clinical approach is necessary.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Recommendation #14&lt;/strong&gt;&lt;br /&gt;A proviso should be inserted to this section providing for specific exceptions to the offence contained in this section for reasons such as fair comment, truth, criticism of actions of public officials etc.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Reasons for the Recommendation &lt;/strong&gt;&lt;br /&gt;The major problem with Section 66A lies in clause (c) as per which any electronic mail or electronic mail message sent with the purpose of causing annoyance or inconvenience is covered within the ambit of offensive messages. This does not pay heed to the fact that even a valid and true criticism of the actions of an individual, when brought to his notice, can amount to annoyance. Indeed, it may be brought to his attention with the sole purpose of causing annoyance to him. When interpreting the Information Technology Act, it is to be kept in mind that the offences created under this Act should not go beyond those prescribed in the Indian Penal Code except where there is a wholly new activity or conduct, such as hacking for instance, which is sought to be criminalized.&lt;/p&gt;
&lt;p&gt;Offensive messages have been criminalized in the Indian Penal Code subject to the conditions specified in Chapter XXII being present. It is not an offence to verbally insult or annoy someone without anything more being done such as a threat to commit an offence, etc. When this is the case with verbal communications, there is no reason to make an exception for those made through the electronic medium and bring any electronic mail or message sent with the purpose of causing annoyance or inconvenience within the purview of an offensive message.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Section 66F&lt;/h3&gt;
&lt;p&gt;The definition of cyber-terrorism under this provision is too wide and can cover several activities which are not actually of a “terrorist” character. &lt;br /&gt;Section 66F(1)(B) is particularly harsh and goes much beyond acts of “terrorism” to include various other activities within its purview. As per this provision, &lt;br /&gt;“[w]hoever knowingly or intentionally penetrates or accesses a computer resource without authorisation or exceeding authorised access, and by means of such conduct obtains access to information, data or computer database that is restricted for reasons for the security of the State or foreign relations, or any restricted information, data or computer database, with reasons to believe that such information, data or computer database so obtained may be used to cause or is likely to cause injury to the interests of the sovereignty and integrity of India, the security of the State, friendly relations with foreign States, public order, decency or morality, or in relation to contempt of court, defamation or incitement to an offence, or to the advantage of any foreign nation, group of individuals or otherwise, commits the offence of cyber terrorism.”&lt;/p&gt;
&lt;p&gt;This provision suffers from several defects and hence ought to be repealed.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Recommendation #15&lt;/strong&gt;&lt;br /&gt;Section 66F(1)(B) has to be repealed or suitably amended to water down the excessively harsh operation of this provision. The restrictive nature of the information that is unauthorisedly accessed must be confined to those that are restricted on grounds of security of the State or foreign relations. The use to which such information may be put should again be confined to injury to the interests of the sovereignty and integrity of India, the security of the State, friendly relations with foreign States, or public order. A mere advantage to a foreign nation cannot render the act of unauthorized access one of cyber-terrorism as long as such advantage is not injurious or harmful in any manner to the interests of the sovereignty and integrity of India, the security of the State, friendly relations with foreign States, or public order. A mens rea requirement should also be introduced whereby mere knowledge that the information which is unauthorisedly accessed can be put to such uses as given in this provision should not suffice for the unauthorised access to amount to cyber-terrorism. The unauthorised access should be with the intention to put such information to this use. The amended provision would read as follows:&lt;/p&gt;
&lt;p class="callout"&gt;“[w]hoever knowingly or intentionally penetrates or accesses a computer resource without authorisation or exceeding authorised access, and by means of such conduct obtains access to information, data or computer database that is restricted for reasons for the security of the State or foreign relations, with the intention that such information, data or computer database so obtained may be used to cause injury to the interests of the sovereignty and integrity of India, the security of the State, friendly relations with foreign States, or public order, commits the offence of cyber terrorism.”&lt;/p&gt;
&lt;p class="callout"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Reasons for the Recommendation &lt;/strong&gt;&lt;br /&gt;The ambit of this provision goes much beyond information, data or computer database which is restricted only on grounds of security of the State or foreign relations and extends to “any restricted information, data or computer database”. This expression covers any government file which is marked as confidential or saved in a computer used exclusively by the government. It also covers any file saved in a computer exclusively used by a private corporation or enterprise. Even the use to which such information can be put need not be confined to those that cause or are likely to cause injury to the interests of the sovereignty and integrity of India, the security of the State, or friendly relations with foreign States. Information or data which is defamatory, amounting to contempt of court, or against decency / morality, are all covered within the scope of this provision. This goes way beyond the idea of a terrorist activity and poses serious questions.&amp;nbsp; While there is no one globally accepted definition of cyberterrorism, it is tough to conceive of slander as a terrorist activity.&lt;/p&gt;
&lt;p&gt;To give an illustration, if a journalist managed to unauthorisedly break into a restricted database, even one owned by a private corporation, and stumbled upon information that is defamatory in character, he would have committed an act of “cyber-terrorism.” Various kinds of information pertaining to corruption in the judiciary may be precluded from being unauthorisedly accessed on the ground that such information may be put to use for committing contempt of court. Any person who gains such access would again qualify as a cyber-terrorist. The factual situations are numerous where this provision can be put to gross misuse with the ulterior motive of muzzling dissent or freezing access to information that may be restricted in nature but nonetheless have a bearing on probity in public life etc. It is therefore imperative that this provision may be toned down as recommended above. &lt;br /&gt;&lt;br /&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comments-draft-rules'&gt;https://cis-india.org/internet-governance/blog/comments-draft-rules&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Encryption</dc:subject>
    
    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Publications</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2011-09-21T06:13:42Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/zara-rahman-can-data-ever-know-who-we-really-are">
    <title>Can data ever know who we really are?</title>
    <link>https://cis-india.org/raw/zara-rahman-can-data-ever-know-who-we-really-are</link>
    <description>
        &lt;b&gt;This is an excerpt from an essay by Zara Rahman, written for and published as part of the Bodies of Evidence collection of Deep Dives. The Bodies of Evidence collection, edited by Bishakha Datta and Richa Kaul Padte, is a collaboration between Point of View and the Centre for Internet and Society, undertaken as part of the Big Data for Development Network supported by International Development Research Centre, Canada.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Please read the full essay on Deep Dives: &lt;a href="https://deepdives.in/can-data-ever-know-who-we-really-are-a0dbfb5a87a0" target="_blank"&gt;Can data ever know who we really are?&lt;/a&gt;&lt;/h4&gt;
&lt;h4&gt;Zara Rahman:  &lt;a href="https://www.theengineroom.org/people/zara-rahman/" target="_blank"&gt;The Engine Room&lt;/a&gt;, &lt;a href="https://zararah.net/" target="_blank"&gt;Website&lt;/a&gt;, and &lt;a href="https://twitter.com/zararah" target="_blank"&gt;Twitter&lt;/a&gt;&lt;/h4&gt;
&lt;hr /&gt;
&lt;blockquote&gt;If I didn’t define myself for myself, I would be crunched into other people’s fantasies for me and eaten alive.&lt;br /&gt;&lt;em&gt;– &lt;a href="https://www.blackpast.org/african-american-history/1982-audre-lorde-learning-60s/" target="_blank"&gt;Audre Lorde&lt;/a&gt;&lt;/em&gt;&lt;/blockquote&gt;
&lt;p&gt;The proliferation of digital data and the technologies that allow us to gather that data can be used in another way too — to allow us to define for ourselves who we are, and what we are.&lt;/p&gt;
&lt;p&gt;Amidst a growing political climate of fear, mistrust and competition for resources, activists and advocates working in areas that are stigmatised within their societies often need data to ‘prove’ that what they are working on matters. One way of doing this is by gathering data through crowdsourcing. Crowdsourced data isn’t ‘representative’, as statisticians say, but gathering data through unofficial means can be a valuable asset for advocates. For example, &lt;a href="http://readytoreport.in/" target="_blank"&gt;data collating the experiences of women&lt;/a&gt; who have reported incidents of sexual violence to the police in India, can then be used to advocate for better police responses, and to inform women of their rights. Deservedly or not, quantifiable data takes precedence over personal histories and lived experience in getting the much-desired currency of attention.&lt;/p&gt;
&lt;p&gt;And used right, quantifiable data — whether it’s crowdsourced or not — can also be a powerful tool for advocates. Now, we can use quantifiable data to prove beyond a question of a doubt that disabled people, queer people, people from lower castes, face intersecting discrimination, prejudice, and systemic injustices in their lives. It’s an unnecessary repetition in a way, because anybody from those communities could have told reams upon reams of stories about discrimination — all without any need for counting.&lt;/p&gt;
&lt;p&gt;Regardless, to play within this increasingly digitised system, we need to repeat what we’ve been saying in a new, digitally-legible way. And to do that, we need to collect data from people who have often only ever been de-humanised as data subjects.&lt;/p&gt;
&lt;p&gt;Artist and educator Mimi Onuoha writes about &lt;a href="https://points.datasociety.net/the-point-of-collection-8ee44ad7c2fa#.y0xtfxi2p" target="_blank"&gt;the challenges that arise while collecting such data&lt;/a&gt;, from acknowledging the humans behind that collection to understanding that missing data points might tell just as much of a story as the data that has been collected. She outlines how digital data means that we have to (intentionally or not) make certain choices about what we value. And the collection of this data means making human choices solid, and often (though not always) making these choices illegible to others.&lt;/p&gt;
&lt;p&gt;We speak of black boxes when it comes to &lt;a href="https://www.propublica.org/article/breaking-the-black-box-what-facebook-knows-about-you" target="_blank"&gt;the mystery choices that algorithms make&lt;/a&gt;, but the same could be said of the many human decisions that are made in categorising data too, whether that be choosing to limit the gender drop-down field to just ‘male/female’ as with Fitbits, or a variety of apps incorrectly assuming that all people who menstruate &lt;a href="https://medium.com/@maggied/i-tried-tracking-my-period-and-it-was-even-worse-than-i-could-have-imagined-bb46f869f45" target="_blank"&gt;also want to know about their ‘fertile window’&lt;/a&gt;. In large systems with many humans and machines at work, we have no way of interrogating why a category was merged or not, of understanding why certain anomalies were ignored rather than incorporated, or of questioning why certain assumptions were made.&lt;/p&gt;
&lt;p&gt;The only thing we can do is to acknowledge these limitations, and try to use those very systems to our advantage, building our own alternatives or workarounds, collecting our own data, and using the data that is out there to tell the stories that matter to us.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/zara-rahman-can-data-ever-know-who-we-really-are'&gt;https://cis-india.org/raw/zara-rahman-can-data-ever-know-who-we-really-are&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Bodies of Evidence</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Data Systems</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Publications</dc:subject>
    
    
        <dc:subject>BD4D</dc:subject>
    
    
        <dc:subject>Big Data for Development</dc:subject>
    

   <dc:date>2019-12-06T05:02:53Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/digital-natives/dnbook1">
    <title>Book 1: To Be, Digital AlterNatives with a Cause?</title>
    <link>https://cis-india.org/digital-natives/dnbook1</link>
    <description>
        &lt;b&gt;In this first book of the Digital AlterNatives with a Cause? Collection, we concentrate on what it means to be a Digital Native. Within popular scholarship and discourse, it is presumed that digital natives are born digital. Ranging from Mark Prensky’s original conception of the identity which marked all people born after 1980 as Digital Natives to John Palfrey and Urs Gasser’s more nuanced understanding of specific young people in certain parts of the world as ‘Born Digital’, there remains a presumption that the young peoples’ relationship with technology is automatic and natural. In particular, the idea of being ‘born digital’ signifies that there are people who, at a visceral, unlearned level, respond to digital technologies. This idea of being born digital hides the complex mechanics of infrastructure, access, affordability, learning, education, language, gender, etc. that play a significant role in determining who gets to become a digital native and how s/he achieves it. In this book, we explore what it means to be a digital native in  emerging information societies. The different contributions in this book posit what it means to be a digital native in different parts of the world. However, none of the contribution accepts the name ‘Digital Native’ as a given. Instead, the different authors demonstrate how there can be no one singular definition of a Digital Native. In fact, they show how, contextualised, historical, socially embedded, politically nuanced understanding of people’s interaction with technology provide a better insight into how one becomes a digital native.&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/digital-natives/dnbook1'&gt;https://cis-india.org/digital-natives/dnbook1&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>RAW Publications</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Publications</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    

   <dc:date>2015-05-15T12:08:32Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/big-data-reproductive-health-india-mcts">
    <title>Big Data and Reproductive Health in India: A Case Study of the Mother and Child Tracking System</title>
    <link>https://cis-india.org/raw/big-data-reproductive-health-india-mcts</link>
    <description>
        &lt;b&gt;In this case study undertaken as part of the Big Data for Development (BD4D) network, Ambika Tandon evaluates the Mother and Child Tracking System (MCTS) as data-driven initiative in reproductive health at the national level in India. The study also assesses the potential of MCTS to contribute towards the big data landscape on reproductive health in the country, as the Indian state’s imagination of health informatics moves towards big data.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Case study: &lt;a href="https://github.com/cis-india/website/raw/master/bd4d/CIS_CaseStudy_AT_BigDataReproductiveHealthMCTS.pdf" target="_blank"&gt;Download&lt;/a&gt; (PDF)&lt;/h4&gt;
&lt;hr /&gt;
&lt;h3&gt;Introduction&lt;/h3&gt;
&lt;p&gt;The reproductive health information ecosystem in India comprises of a range of different databases across state and national levels. These collect data through a combination of manual and digital tools. Two national-level databases have been launched by the Ministry of Health and Family Welfare - the Health Management Information System (HMIS) in 2008, and the MCTS in 2009. 4 The MCTS focuses on collecting data on maternal and child health. It was instituted due to reported gaps in the HMIS, which records monthly data across health programmes including reproductive health. There are several other state-level initiatives on reproductive health data that have either been subsumed into, or run in
parallel with, the MCTS.&lt;/p&gt;
&lt;p&gt;With this case study, we aim to evaluate the MCTS as data-driven initiative in reproductive health at the national level. It will also assess its potential to contribute towards the big data landscape on reproductive health in the country, as the Indian state’s imagination of health informatics moves towards big data. The methodology for the case study involved a desk-based review of existing literature on the use of health information systems globally, as well as analysis of government reports, journal articles, media coverage, policy documents, and other material on the MCTS.&lt;/p&gt;
&lt;p&gt;The first section of this report details the theoretical framing of the case study, drawing on the feminist critique of reproductive data systems. The second section maps the current landscape of reproductive health data produced by the state in India, with a focus on data flows, and barriers to data collection and analysis at the local and national level. The case of abortion data is used to further the argument of flawed data collection systems at the
national level. Section three briefly discusses the state’s imagination of reproductive health policy and the role of data systems through a discussion on the National Health Policy, 2017 and the National Health Stack, 2018. Finally, we make some policy recommendations and identify directions for future research, taking into account the ongoing shift towards big data globally to democratise reproductive healthcare.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/big-data-reproductive-health-india-mcts'&gt;https://cis-india.org/raw/big-data-reproductive-health-india-mcts&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>ambika</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Data Systems</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Reproductive and Child Health</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Publications</dc:subject>
    
    
        <dc:subject>BD4D</dc:subject>
    
    
        <dc:subject>Healthcare</dc:subject>
    
    
        <dc:subject>Big Data for Development</dc:subject>
    

   <dc:date>2019-12-06T04:57:55Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/between-the-stirrup-and-the-ground-relocating-digital-activism">
    <title>Between the Stirrup and the Ground: Relocating Digital Activism</title>
    <link>https://cis-india.org/raw/between-the-stirrup-and-the-ground-relocating-digital-activism</link>
    <description>
        &lt;b&gt;In this peer reviewed research paper, Nishant Shah and Fieke Jansen draws on a research project that focuses on understanding new technology, mediated identities, and their relationship with processes of change in their immediate and extended environments in emerging information societies in the global south. It suggests that endemic to understanding digital activism is the need to look at the recalibrated relationships between the state and the citizens through the prism of technology and agency. The paper was published in Democracy &amp; Society, a publication of the Center for Democracy and Civil Society, Volume 8, Issue 2, Summer 2011.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;&lt;em&gt;Cross-posted from &lt;a class="external-link" href="http://www.democracyandsociety.com/blog/wp-content/uploads/2011/08/CDACS-DS-15-v3-fnl.pdf"&gt;Democracy and Society&lt;/a&gt;&lt;/em&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;Introduction&lt;/h2&gt;
&lt;p&gt;The first decade of the 21st century has witnessed the simultaneous growth of the Internet and digital technologies on the&amp;nbsp;one hand and political protests and mobilization on the other. As a result, some stakeholders attribute magical powers of&amp;nbsp;social change and political transformation to these technologies.&lt;/p&gt;
&lt;p&gt;In the post-Wikileaks world, governments try to censor the use of and access to information technologies in order to&amp;nbsp;maintain the status quo (Domscheit-Berg 2011). With the expansion of markets, technology multinationals and service providers are trying to strike a delicate balance between ethics and profits. Civil Society Organizations for their part, are&amp;nbsp;seeking to counterbalance censorship and exploitation of the citizens’ rights.&amp;nbsp;Within discourse and practice, there remains&amp;nbsp;a dialectic between hope and despair:&amp;nbsp;Hope that these technologies will&amp;nbsp;change the world, and despair that we do not have any sustainable replicable models&amp;nbsp;of technology-driven transformation despite four decades of intervention in&amp;nbsp;the 6eld of information and communication&amp;nbsp;technology (ICT).&lt;/p&gt;
&lt;p&gt;This paper suggests that this dialectic&amp;nbsp;is fruitless and results from too strong of&amp;nbsp;a concentration on the functional role&amp;nbsp;of technology. The&amp;nbsp;lack of vocabulary to map and articulate the transitions that digital technologies bring to our earlier understanding of the&amp;nbsp;state-market-citizen relationship, as well as our failure to understand technology as a paradigm that defines the domains&amp;nbsp;of life, labour, and language, amplify this knowledge gap.&lt;/p&gt;
&lt;p&gt;This paper draws on a research project that focuses on&amp;nbsp;understanding new technology, mediated identities, and&amp;nbsp;their relationship with processes of change in their immediate&amp;nbsp;and extended environments in emerging information&amp;nbsp;societies in the global south (Shah 2009). We suggest that&amp;nbsp;endemic to understanding digital activism is the need to&amp;nbsp;look at the recalibrated relationships between the state and&amp;nbsp;the citizens through the prism of technology and agency.&lt;/p&gt;
&lt;h2&gt;Context&lt;/h2&gt;
&lt;p&gt;It is appropriate, perhaps, to begin a paper on digital activism, with a discussion of analogue activism[&lt;a href="#1"&gt;1&lt;/a&gt;]&amp;nbsp;(Morozov 2010).&amp;nbsp;In the recent revolutions and protests from Tunisia&amp;nbsp;to Egypt and Iran to Kryzygystan, much attention has been&amp;nbsp;given to the role of new media in organizing, orchestrating,&amp;nbsp;performing, and shaping the larger public psyche and the&amp;nbsp;new horizons of progressive governments. Global media&amp;nbsp;has dubbed several of them as ‘Twitter Revolutions” and&amp;nbsp;“Facebook Protests” because these technologies played an&amp;nbsp;important role in the production of :ash-mobs, which,&amp;nbsp;because of their visibility and numbers, became the face of&amp;nbsp;the political protests in di)erent countries. Political scientists&amp;nbsp;as well as technology experts have been trying to figure out&amp;nbsp;what the role of Twitter and Facebook was in these processes&amp;nbsp;of social transformation. Activists are trying to determine&amp;nbsp;whether it is possible to produce replicable upscalable models&amp;nbsp;that can be transplanted to other geo-political contexts to&amp;nbsp;achieve similar results,[&lt;a href="#2"&gt;2&lt;/a&gt;]&amp;nbsp;as well as how the realm of political action now needs to accommodate these developments.&lt;/p&gt;
&lt;p&gt;Cyber-utopians have heralded this particular phenomenon&amp;nbsp;of digital activists mobilizing in almost unprecedented&amp;nbsp;numbers as a hopeful sign that resonates the early 20th century&amp;nbsp;rhetoric of a Socialist Revolution (West and Raman&amp;nbsp;2009). (ey see this as a symptom of the power that ordinary&amp;nbsp;citizens wield and the ways in which their voices&amp;nbsp;can be ampli6ed, augmented, and consolidated using the&amp;nbsp;pervasive computing environments in which we now live.&lt;/p&gt;
&lt;p&gt;In a celebratory tone, without examining either the complex&amp;nbsp;assemblages of media and government practices and policies&amp;nbsp;that are implicated in these processes, they naively attribute&amp;nbsp;these protests to digital technologies.&lt;/p&gt;
&lt;p&gt;Cyber-cynics, conversely, insist that these technologies&amp;nbsp;are just means and tools that give voice to the seething anger,&amp;nbsp;hurt, and grief that these communities have harboured for&amp;nbsp;many years under tyrannical governments and authoritarian&amp;nbsp;regimes. They insist that digital technologies played no&amp;nbsp;role in these events — they would have occurred anyway,&amp;nbsp;given the right catalysts — and that this overemphasis on&amp;nbsp;technology detracts from greater historical legacies, movements,&amp;nbsp;and the courage and efforts of the people involved.&lt;/p&gt;
&lt;p&gt;While these debates continue to ensue between zealots&amp;nbsp;on conflicting sides, there are some things that remain&amp;nbsp;constant in both positions: presumptions of what it means&amp;nbsp;to be political, a narrow imagination of human-technology&amp;nbsp;relationships, and a historically deterministic view of socio-political&amp;nbsp;movements. While the objects and processes under&amp;nbsp;scrutiny are new and unprecedented, the vocabulary, conceptual&amp;nbsp;tools, knowledge frameworks, and critical perspectives&amp;nbsp;remain unaltered. They attempt to articulate a rapidly changing&amp;nbsp;world in a manner that accommodates these changes.&amp;nbsp;Traditional approaches that produce a simplified triangulation&amp;nbsp;of the state, market and civil society, with historically&amp;nbsp;specified roles, inform these discourses, “where the state is&amp;nbsp;the rule-maker, civil society the do-gooder and watchdog,&amp;nbsp;and the private sector the enemy or hero depending on one’s&amp;nbsp;ideological stand” (Knorringa 2008, 8).&lt;/p&gt;
&lt;p&gt;Within the more diffuse world realities, where the roles&amp;nbsp;for each sector are not only blurred but also often shared,&amp;nbsp;things work differently. Especially when we introduce technology,&amp;nbsp;we realize that the centralized structural entities&amp;nbsp;operate in and are better understood through a distributed,&amp;nbsp;multiple avatar model. For example, within public-private&amp;nbsp;partnerships, which are new units of governance in emerging&amp;nbsp;post-capitalist societies, the market often takes up protostatist&amp;nbsp;qualities, while the state works as the beneficiary rather&amp;nbsp;than the arbitrator of public delivery systems. In technology-state&amp;nbsp;conflicts, like the well-known case of Google’s conflict&amp;nbsp;with China (Drummond 2010), technology service providers&amp;nbsp;and companies have actually emerged as the vanguards of&amp;nbsp;citizens’ rights against states that seek to curb them.&lt;/p&gt;
&lt;p&gt;Similarly, civil society and citizens are divided around&amp;nbsp;the question of access to technology. The techno-publics&amp;nbsp;are often exclusive and make certain analogue forms of&amp;nbsp;citizenships obsolete. While there is a euphoria about the&amp;nbsp;emergence of a multitude of voices online from otherwise&amp;nbsp;closed societies, it is important to remember that these voices&amp;nbsp;are mediated by the market and the state, and often have to&amp;nbsp;negotiate with strong capillaries of power in order to gain&amp;nbsp;the visibility and legitimacy for themselves. Additionally,&amp;nbsp;the recalibration in the state-market-citizen triad means&amp;nbsp;that there is certain disconnect from history which makes&amp;nbsp;interventions and systemic social change that much more difficult.&lt;/p&gt;
&lt;h2&gt;Snapshots&lt;/h2&gt;
&lt;p&gt;We draw from our observations in the “Digital Natives with a Cause?”[&lt;a href="#3"&gt;3&lt;/a&gt;]&amp;nbsp;research program, which brought together over&amp;nbsp;65 young people working with digital technologies towards&amp;nbsp;social change, and around 40 multi-sector stakeholders in&amp;nbsp;the field to decode practices in order to gain a more nuanced&amp;nbsp;understanding of the relationships between technology and&amp;nbsp;politics.&lt;/p&gt;
&lt;p&gt;The first case study is from Taiwan, where the traditionally&amp;nbsp;accepted uni-linear idea of senders-intermediaries-passive&amp;nbsp;receivers is challenged by adopting a digital information&amp;nbsp;architecture model for a physical campaign.[&lt;a href="#4"&gt;4&lt;/a&gt;]&amp;nbsp;The story not&amp;nbsp;only provides insight into these blurred boundaries and&amp;nbsp;roles, but also offers an understanding of the new realm of&amp;nbsp;political intervention and processes of social transformation.&lt;/p&gt;
&lt;p&gt;As YiPing Tsou (2010) from the Soft Revolt project in Taipei&amp;nbsp;explains, "I have realised how the Web has not only virtually&amp;nbsp;reprogrammed the way we think, talk, act and interact&amp;nbsp;with the work but also reformatted our understanding of&amp;nbsp;everyday life surrounded by all sorts of digital technologies."&lt;/p&gt;
&lt;p&gt;Tsou’s own work stemmed from her critical doubt of&amp;nbsp;the dominant institutions and structures in her immediate&amp;nbsp;surroundings. Fighting the hyper-territorial rhetoric of the&amp;nbsp;Internet, she deployed digital technologies to engage with&amp;nbsp;her geo-political contexts. Along with two team members,&amp;nbsp;she started the project to question and critique the rampant&amp;nbsp;consumerism, which has emerged as the state and market&amp;nbsp;in Taiwan collude to build more pervasive marketing infrastructure&amp;nbsp;instead of investing in better public delivery&amp;nbsp;systems. The project adopted a gaming aesthetic where the&amp;nbsp;team produced barcodes, which when applied to existing&amp;nbsp;products in malls and super markets, produced random&amp;nbsp;pieces of poetry at the check-out counters instead of the&amp;nbsp;price details that are expected. The project challenged the&amp;nbsp;universal language of barcodes and mobilized large groups&amp;nbsp;of people to spread these barcodes and create spaces of&amp;nbsp;confusion, transient data doubles, and alternative ways of&amp;nbsp;reading within globalized capitalist consumption spaces. The project also demonstrates how access to new forms of&amp;nbsp;technology also leads to new information roles, creating&amp;nbsp;novel forms of participation leading to interventions towards&amp;nbsp;social transformation.&lt;/p&gt;
&lt;p&gt;Nonkululeko Godana (2010) from South Africa does&amp;nbsp;not think of herself as an activist in any traditional form.&amp;nbsp;She calls herself a storyteller and talks of how technologies&amp;nbsp;can amplify and shape the ability to tell stories. Drawing&amp;nbsp;from her own context, she narrates the story of a horrific&amp;nbsp;rape that happened to a young victim in a school campus&amp;nbsp;and how the local and national population mobilized itself&amp;nbsp;to seek justice for her. For Godana, the most spectacular&amp;nbsp;thing that digital technologies of information and communication&amp;nbsp;offer is the ability for these stories to travel in&amp;nbsp;unexpected ways. Indeed, these stories grow as they are&amp;nbsp;told. They morph, distort, transmute, and take new avatars,&amp;nbsp;changing with each telling, but managing to help the message leap across borders, boundaries, and life-styles. She&amp;nbsp;looks at storytelling as something that is innate to human&amp;nbsp;beings who are creatures of information, and suggests that&amp;nbsp;what causes revolution, what brings people together, what&amp;nbsp;allows people to unify in the face of strife and struggle is&amp;nbsp;the need to tell a story, the enchantment of hearing one,&amp;nbsp;and the passion to spread it further so that even when the&amp;nbsp;technologies die, the signal still lives, the message keeps on&amp;nbsp;passing. As Clay Shirky, in his analysis of the first recorded&amp;nbsp;political :ash-mob in Phillipines in 2001, suggests, "social&amp;nbsp;media’s real potential lies in supporting civil society and the&amp;nbsp;public sphere — which will produce change over years and&amp;nbsp;decades, not weeks or months."&lt;/p&gt;
&lt;h2&gt;Propositions&lt;/h2&gt;
&lt;p&gt;These two stories are just a taste of many such narratives that&amp;nbsp;abound the field of technology based social transformation&amp;nbsp;and activism. In most cases, traditional lenses will not recognize&amp;nbsp;these processes, which are transient and short-lived&amp;nbsp;as having political consequence. When transformative value&amp;nbsp;is ascribed to them, they are brought to bear the immense&amp;nbsp;pressure of sustainability and scalability which might not be&amp;nbsp;in the nature of the intervention. Moreover, as we have seen&amp;nbsp;in these two cases, as well as in numerous others, the younger&amp;nbsp;generation — these new groups of people using social media&amp;nbsp;for political change, often called digital natives, slacktivists,&amp;nbsp;or digital activists — renounce the earlier legacy of political&amp;nbsp;action. They prefer to stay in this emergent undefined&amp;nbsp;zone where they would not want an identity as a political&amp;nbsp;person but would still make interventions and engage with&amp;nbsp;questions of justice, equity, democracy, and access, using the&amp;nbsp;new tools at their disposal to negotiate with their immediate&amp;nbsp;socio-cultural and geo-political contexts.&lt;/p&gt;
&lt;p&gt;In their everyday lives, Digital Natives are in different&amp;nbsp;sectors of employment and sections of society. They can be&amp;nbsp;students, activists, government officials, professionals, artists,&amp;nbsp;or regular citizens who spend their time online often in&amp;nbsp;circuits of leisure, entertainment and self-gratification. However,&amp;nbsp;it is their intimate relationship with these processes,&amp;nbsp;which is often deemed as ‘frivolous’ that enables them, in&amp;nbsp;times of crises, to mobilize huge human and infrastructural&amp;nbsp;resources to make immediate interventions.&lt;/p&gt;
&lt;p&gt;It is our proposition that it is time to start thinking about&amp;nbsp;digital activism as a tenuous process, which might often hide&amp;nbsp;itself in capillaries of non-cause related actions but can be&amp;nbsp;materialized through the use of digital networks and platforms&amp;nbsp;when it is needed. Similarly, a digital activist does not&amp;nbsp;necessarily have to be a full-time ideology spouting zealot,&amp;nbsp;but can be a person who, because of intimate relationships&amp;nbsp;with technologized forms of communication, interaction,&amp;nbsp;networking, and mobilization, is able to transform him/&amp;nbsp;herself as an agent of change and attain a central position&amp;nbsp;(which is also transitory and not eternal) in processes of&amp;nbsp;social movement. Such a lens allows us to revisit our existing&amp;nbsp;ideas of what it means to be political, what the new landscapes&amp;nbsp;of political action are, how we account for processes&amp;nbsp;of social change, and who the people are that emerge as&amp;nbsp;agents of change in our rapidly digitizing world.&lt;/p&gt;
&lt;h3&gt;About the Authors&lt;/h3&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;NISHANT SHAH is&amp;nbsp;Director-Research at the Bangalore based Centre for Internet and Society. He is one of the lead researchers for the&amp;nbsp;“Digital Natives with a Cause?” knowledge programme and has interests in questions of digital identity, inclusion and social change.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;FIEKE JANSEN&amp;nbsp;is based at the Humanist Institute for Development Cooperation (Hivos).&amp;nbsp;She is the knowledge officer for the Digital Natives with a Cause? knowledge programme and her areas of &lt;/span&gt;&lt;span class="Apple-style-span"&gt;interest are the role of digital technologies in social change processes.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span class="Apple-style-span"&gt;References&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;Domscheit-Berg, Daniel. 2011. &lt;em&gt;Inside Wikileaks: My Time with Julian Assange&amp;nbsp;at the World’s Most Dangerous Website&lt;/em&gt;. New York: Crown Publishers.&lt;/p&gt;
&lt;p&gt;Drummond, David. 2010. “A New Approach to China.” Available at: http://&amp;nbsp;googleblog.blogspot.com/2010/01/new-approach-to-china.html.&lt;/p&gt;
&lt;p&gt;Godana, Nonkululeko. 2011. “Change is Yelling: Are you Listening?”&amp;nbsp;&lt;em&gt;Digital Natives Position Papers&lt;/em&gt;. Hivos and the Centre for Internet and&amp;nbsp;Society publications. Available at: http://www.hivos.net/content/download/&amp;nbsp;40567/260946/file/Position%20Papers.pdf. Retrieved: February 3,&amp;nbsp;2011.&lt;/p&gt;
&lt;p&gt;Knorringa, Peter. 2010. A Balancing Act — Private Actors in Development,&amp;nbsp;Inaugural Lecture ISS. Available at: http://www.iss.nl/News/Inaugural-Lecture-Professor-Peter-Knorringa. Retrieved: February 3, 2011.&lt;/p&gt;
&lt;p&gt;Morozov, Evgeny. 2011. &lt;em&gt;The Net Delusion: The Dark Side of Internet Freedom&lt;/em&gt;.&amp;nbsp;New York: Public Affairs.&lt;/p&gt;
&lt;p&gt;Shirky, Clay. 2011. “The Political power of Social Media: Technology, the&amp;nbsp;Public Sphere, and Political Change.” &lt;em&gt;Foreign Affairs&lt;/em&gt; 90, (1); p. 28-41.&lt;/p&gt;
&lt;p&gt;Shah, Nishant and Sunil Abraham. 2009. “Digital Natives with a Cause.”&amp;nbsp;Hivos Knowledge Programme. Hivos and the Centre for Internet and Society&amp;nbsp;publications. Available at: http://cis-india.org/research/dn-report. Retrieved:&amp;nbsp;February 3, 2011.&lt;/p&gt;
&lt;p&gt;Tsou, YiPing. 2010. “(Re)formatting Social Transformation in the Age of&amp;nbsp;Digital Representation: On the Relationship of Technologies and Social&amp;nbsp;Transformation”, &lt;em&gt;Digital Natives Position Papers&lt;/em&gt;. Hivos and the Centre&amp;nbsp;for Internet and Society publications. Available at: http://www.hivos.net/&amp;nbsp;content/download/40567/260946/file/Position%20Papers.pdf. Retrieved:&amp;nbsp;February 3, 2011.&lt;/p&gt;
&lt;p&gt;West, Harry and Parvathi Raman. 2009. &lt;em&gt;Enduring Socialism: Exploration&amp;nbsp;of Revolution and Transformation, Restoration and Continuation&lt;/em&gt;. London:&amp;nbsp;Berghahn Books.&lt;/p&gt;
&lt;h2&gt;&lt;span class="Apple-style-span"&gt;End Notes&lt;/span&gt;&lt;/h2&gt;
&lt;p class="discreet"&gt;&lt;a name="1"&gt;[1]&lt;/a&gt; Morozov looks at how ‘Digital Activism’ often feeds the very structures&amp;nbsp;against we protest, with information that can prove to be counter productive&amp;nbsp;to the efforts. The digital is still not ‘public’ in its ownership and a complex assemblage of service providers, media houses and governments often lead to a betrayal of sensitive information which was earlier protected in the use&amp;nbsp;of analogue technologies of resistance.&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="1"&gt; &lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="2"&gt;[2]&lt;/a&gt; Following the revolutions in Egypt, China, worried that the model might be appropriated by its own citizens against China’s authoritarian regimes, decided to block “Jan25” and mentions of Egypt from Twitter like websites. More can be read here: &lt;a href="http://yro.slashdot.org/story/11/01/29/2110227/China-Blocks-Egypt-On-Twitter-Like-Site"&gt;http://yro.slashdot.org/story/11/01/29/2110227/China-Blocks-Egypt-On-Twitter-Like-Site&lt;/a&gt;.&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="3"&gt;[3]&lt;/a&gt; More information about the programme can be found &lt;a href="http://www.hivos.net/Hivos-Knowledge-Programme/Themes/Digital-Natives-with-a-Cause"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="4"&gt;[4]&lt;/a&gt; Models of digital communication and networking have always imagined that the models would be valid only for the digital environments. Hence, the physical world still engages only with the one-to-many broadcast model, where the central authorities produce knowledge which is disseminated to the passive receivers who operate only as receptacles of information rather than bearers of knowledge. To challenge this requires a re-orientation of existing models and developing ways of translating the peer-to-peer structure in the physical world.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/between-the-stirrup-and-the-ground-relocating-digital-activism'&gt;https://cis-india.org/raw/between-the-stirrup-and-the-ground-relocating-digital-activism&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Activism</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Net Cultures</dc:subject>
    
    
        <dc:subject>Publications</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2015-10-25T05:58:59Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/bahujan-digital-publishing-infrastructures">
    <title>Bahujan Digital Publishing Infrastructures</title>
    <link>https://cis-india.org/raw/bahujan-digital-publishing-infrastructures</link>
    <description>
        &lt;b&gt;In this study, we look at alternative Bahujan digital publishing as sites where Bahujans can claim media representation and how a vision of an anti-caste internet is emerging through these publishing practices.&lt;/b&gt;
        
&lt;p&gt;Formal knowledge production, media, and technology in India are dominated and hegemonised by elite oppressor castes (the Savarnas). The exclusion of the caste-oppressed majority (the Bahujans) from mass media systematically erases their narratives, histories, and opportunities present to them.&lt;/p&gt;
&lt;p&gt;We study how, despite systemic challenges, Bahujan publication spaces have emerged across digital media as sites of intersectional discourse on caste, using new media such as blogs, visual art, memes, YouTube channels, infographics, podcasts, etc. Further, we look at how this has exposed casteism buried under the ‘casteless’ facade of digital technologies, which are rife with issues of caste-based hate speech, poor moderation, algorithmic bias, and inadequate platform governance. For this, we draw on qualitative interviews with ten Bahujan publishing projects across social media.&lt;/p&gt;
&lt;p&gt;Through a caste-critical lens, we look at motivations, infrastructural needs, editorial processes, audience engagement, other challenges, and the future vision for these publishing projects. We discuss questions of identity, community, hate speech, platform censorship, mental health, and self-care that emerge in online anti-caste publishing. Finally, we try to articulate an emerging vision of an anti-caste internet.&lt;/p&gt;
&lt;p&gt;We explore the following questions through our research:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Why do Bahujans start publishing?&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;What are the infrastructures of Bahujan publishing? &lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Who engages with anti-caste content?&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;What resistance do Bahujan publishers face?&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;How do Bahujan publishers view mainstream progressive movements?&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;How do Bahujan publishers think about the future of the internet?&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;span style="text-align: start; float: none;"&gt;The key takeaways from our research are:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Publishing is a socio-technical response&lt;/strong&gt; Digital Bahujan publishers have largely started in response to shifting political landscapes within India, where caste oppression, while increasingly invisibilised, has only strengthened. Bahujan publishing uses digital tools to challenge caste oppression, fostering anti-caste discourse and community building despite limited resources and systemic barriers.&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Publishing is a community effort&lt;/strong&gt; Bahujan publishing exists primarily within online anti-caste communities. Anti-caste communities help each other navigate resource constraints to raise funds, build safe spaces to provide critical mental health support, provide safety from hate speech, and build resistance and resilience together.&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Caste mediates publishing infrastructure&lt;/strong&gt; Caste hierarchies restrict resources and opportunities for Bahujan publishers, who often precariously self-fund their work. Meanwhile, media circles and the funding ecosystem are dominated by savarnas, who gatekeep their resources and knowledge from Bahujan publishers.&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Online Casteism is enabled by Platforms&lt;/strong&gt; Social media platforms have failed to address rampant caste-based hate speech effectively, leaving Bahujan publishers to manage the hate speech on their own. This takes a severe toll on the publisher’s mental and emotional health, especially hurting Bahujan publishers from smaller towns, women, and queer folks.&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;The future of &lt;/strong&gt;Anticaste &lt;strong&gt;publishing is uncertain&lt;/strong&gt; The reach of Bahujan publishers varies wildly and unexplainably, which makes it difficult for them to rely on social media for audiences and monetisation. Bahujan publishers face a triple whammy: algorithms that suppress anti-caste content, social media platforms moving away from political content, and contentious legislation that censors independent political content. &lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;The future of Anticaste publishing is on independent platforms&lt;/strong&gt; Bahujan publishers desire platform sovereignty—to own and control their own platforms and to be able to control what they put out and how it reaches their audiences—and a vision of the internet that works towards the annihilation of castes, both online and offline.&lt;/li&gt;&lt;/ul&gt;
&lt;hr /&gt;
&lt;p&gt;Read the full report &lt;a href="https://cis-india.org/raw/files/dba-report.pdf" class="external-link"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/bahujan-digital-publishing-infrastructures'&gt;https://cis-india.org/raw/bahujan-digital-publishing-infrastructures&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Yatharth</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Cultures</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Publications</dc:subject>
    
    
        <dc:subject>Caste</dc:subject>
    

   <dc:date>2025-01-20T10:48:39Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/digital-humanities/routledge-inter-asia-cultural-studies-volume-15-issue-2-nishant-shah-asia-in-the-edges">
    <title>Asia in the Edges: A Narrative Account of the Inter-Asia Cultural Studies Summer School in Bangalore</title>
    <link>https://cis-india.org/raw/digital-humanities/routledge-inter-asia-cultural-studies-volume-15-issue-2-nishant-shah-asia-in-the-edges</link>
    <description>
        &lt;b&gt;The Inter-Asia Cultural Studies Summer School is a Biennial event that invites Masters and PhD students from around Asia to participate in conversations around developing and building an Inter-Asia Cultural Studies thought process. Hosted by the Inter-Asia Cultural Studies Society along with the Consortium of universities and research centres that constitute it, the Summer School is committed to bringing together a wide discourse that spans geography, disciplines, political affiliations and cultural practices for and from researchers who are interested in developing Inter-Asia as a mode of developing local, contextual and relevant knowledge practices. &lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;This is the narrative account of the experiments and ideas that shaped  the second Summer School, “The Asian Edge” which was hosted in  Bangalore, India, in 2012. The peer reviewed article was &lt;a class="external-link" href="http://dx.doi.org/10.1080/14649373.2014.911462"&gt;published in Inter-Asia Cultural Studies&lt;/a&gt; Journal, Volume 15, Issue 2, on July 3, 2014. &lt;a href="https://cis-india.org/raw/digital-humanities/asia-in-the-edges.pdf" class="external-link"&gt;Click to download the file&lt;/a&gt;. (PDF, 95 Kb)&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;At the heart of the Inter-Asia Cultural Studies (IACS) project has been a pedagogic impulse that seeks to train young students and scholars in critical ways of thinking about questions of the contemporary. The ambition of developing an “Asian way of thinking” is not merely a response to the hegemony of North-Western theory in thought and research, especially in Social Sciences and Humanities. It is also a way by which new knowledge is developed and shared between different locations in Asia, to get a more embedded sense of the social, the political and the cultural in the region. Apart from building a widespread network of researchers, activists, academics and artists who have generated the most comprehensive and critical insights into developing ontological and teleological relationships with Asia, there have always been attempts made to integrate students into the network’s activities. From student pre-conferences that invited students to build intellectual dialogues, to subsidies and fellowships offered to allow students to travel from their different institutions across Asia, various initiatives have inspired and facilitated the first encounter with Asia for a number of young researchers who might have lived in Asian countries but not been trained to understand the context of what it means to be in Asia. Over time, through different structures, such as the institutionalisation of the &lt;em&gt;Inter-Asia Cultural Studies&lt;/em&gt; Journal and the growth of the eponymous conference, the IACS has already expanded the scope of its activities, involving new interlocutors and locations in which to grow the environment of critical academic and research discourse.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Building upon the expertise and networks of scholarship developed for over a decade, the IACS Society initiated the biennial Inter-Asia Cultural Studies Summer School, in order to engage younger scholars and students with some of the key questions that have been discussed and contested in the cultural studies discourse in Asia. The IACS Summer School that began in 2010 in Seoul, is a travelling school that moves to different countries, drawing upon local energies, resources and debates to acquaint students with the critical discourse as well as the experience of difference that marks Asia as a continent. The summer school in 2012 was hosted jointly by the Centre for the Study of Culture and Society and the Centre for Internet and Society in Bangalore, India, in collaboration with the Centre for Contemporary Studies at the Indian Institute of Sciences.&lt;a name="fr1" href="#fn1"&gt;[1] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;For a snapshot of the Summer School, see Table 1 below:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Table 1. The 2012 Inter-Asia cultural studies summer school: a snapshot&lt;/strong&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;The Asian Edge&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;Core course: Methodologies for Cultural Studies in Asia (2–11 August, 2012)&lt;br /&gt;Optional courses&lt;br /&gt;The Digital Subject / Technology, Culture and the Body (13–16 August, 2012)&lt;br /&gt;Language of Instruction: EnglishHomepage: &lt;a class="external-link" href="http://culturalstudies.asia/?page_id=86"&gt;http://culturalstudies.asia/?page_id=86&lt;/a&gt;&lt;br /&gt;Organisers: Centre for the Study of Culture and Society, Bangalore; The Centre for Internet &amp;amp; Society, Bangalore&lt;br /&gt;Host: Centre for Contemporary Studies, Indian Institute of Sciences, Bangalore&lt;br /&gt;Co-organisers: Consortium of Inter-Asia Cultural Studies Consortium Institutions; Institute of East Asian Studies, Sungkonghoe University, Korea&lt;br /&gt;Course Coordinators: Nitya Vasudevan &amp;amp; Nishant Shah&lt;br /&gt;Number of Students: 35 students from 12 Asian countries&lt;br /&gt;Number of Faculty: 17 from 5 Asian countries&lt;a name="fr2" href="#fn2"&gt;[2] &lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3 style="text-align: justify;"&gt;Plotting Edges: The Rationale&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The second summer school, hosted in August 2012, with the support of the Inter Asia Cultural Studies Consortium and the Institute of East Asian Studies, was entitled “The Asian Edge.” We decided to stay with the metaphor of the Edge because it allowed us to experiment, both conceptually and in process, with new modes of engagement, interaction, knowledge production and pedagogy. The idea of an Asian Edge was interesting because it signalled a de-bordering of Asia. The Edge is also an inroad into that which might have remained invisible or inscrutable to those outside of it. The imagination of an Asian Edge brings in both the imaginations of geography as well as the notion of extensions, where Asia, especially in this hyper-real and geo-territorial age does not remain contained within the national boundaries. Within the Inter-Asia discourse, there has been a rich theorisation around what constitutes Asia and what are the ways in which we can reconstruct our Asianness that do not fall in the easy “Asian Studies” mode of being defined by the West as the ontological reference point. Chen Kuan-Hsing’s (2010) argument in &lt;em&gt;Asia as Method&lt;/em&gt;, where he argues that Asia is a construct that emerged out of the Cold War and needs to be deconstructed and unpacked in order to understand the different instances and manifestations of India, have captured these dialogues quite comprehensively. Similarly, Ashish Rajadhyaksha’s (2009) landmark work &lt;em&gt;Indian Cinema in the time of Celluloid &lt;/em&gt;marks how questions of nationalism, modernity, governance and technology have been peculiarly and particularly tied to cultural objects and industries such as cinema, not only in negotiations with the post-colonial encounters of India with its erstwhile colonial masters but also with the different locations and imaginations of India. Chua Beng-Huat (2000) in Consumption in Asia similarly points at the ways in which Asia works at different levels of materiality and symbolism, creating communities, connections and commerce in unprecedented ways, not only within Orientalist imagination but in Asia’s own imagination of itself. The Asian Edge was also a way of introducing new thematic interventions in the Inter-Asia Cultural Studies discourse. While the IACS project has invited and initiated some of the most diverse and rich conversations around cultural production—ranging from creative industries to cultural politics; from cultural objects to flows of consumption and distribution—we haven’t yet managed to shift the debates into the realm of the digital. The emergence of digital technologies has transformed a lot of our vocabulary and conceptual framework, but we haven’t been able to translate all our concerns into the fast-paced changes that the digital ICTs are ushering into Asia.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;With this summer school, we wanted to introduce the digital and the technological as a central trope of understanding our existing and emerging research within inter-Asia cultural studies. And the edge, borrowing from the Network theories that have their grounds in Computing, Actor-Network modelling and ICT4D discourse, gives us another way of thinking about Asia. As the computing theorist Duncan Watts (1999) points out in his model of our universe as a “small world”, the edge, within networks is not merely the containing limit. It is not the boundary or the end but actually the space of interaction, communication and exchange. An edge is the route that traffic takes as it moves from one node to another. Edges are hence tenuous, they emerge and, with repetition, become stronger, but they also die and extend, morph and mutate, thus constantly changing the contours of the network. The ambition was to refuse the separation of technology from the Cultural Studies discourse, introducing what Tejaswini Niranjana in her work on Indian Language education and pedagogy calls “Integration” (Niranjana et al. 2010) rather than “interdisciplinarity”. It was also to provide a different historical trajectory to technology studies, what science and technology historians Kavita Philip, Lily Irani, and P. Dourish (2010) call “Postcolonial Computing.”&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The Asian Edge then became a space where we could consolidate the knowledge and key insights from the Inter-Asia Cultural Studies discourse, but could also open it up to new research, new modes of engagement, and new questions that need the historicity and also the points of departure. These ambitions had a direct impact on both the structure of the Summer School as well as the processes that were subsequently designed&lt;br /&gt;to implement it.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;The core course: methodologies for cultural studies in Asia&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The Inter-Asia Summer School in Bangalore thus had some distinct ambitions, which were reflected in its structure. While it wanted to reflect the rich heritage of scholarship that has been produced through the decade-long interventions, and give the participating students a chance to engage with these intellectual stalwarts of Asia, it also wanted to reflect some of the more cuttingedge and future-looking work that is also a part of the movement’s younger scholars. Hence, instead of going with the traditional model where the pedagogues teach their own text, explaining the nuances and intricacies of their work, we decided to stage a dialogue between the existing scholarship and emerging work. The curriculum for the summer school was designed by Dr Tejaswini Niranjana, Dr Wang Xiaoming and Nitya Vasudevan, to form the first Inter- Asia Cultural studies reader, reflecting the various trends and debates around different themes that have occurred in the movement. The reader, which served as a basic textbook for the summer school, and has plans to be bilingual (English and Mandarin Chinese), introduced historical thought, critical interventions and conceptual frameworks drawn from different locations within Asia. The reader not only incorporated the scholars whose work has shaped the Inter-Asia cultural studies movement but also the formative modern thought that has been central to the social, cultural and political theorisation in Asia.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;However, instead of inviting the scholars whose work has been central to the Inter-Asia Cultural Studies thought, the instructors for the courses were younger critical scholars who are building upon, responding to and entering into a dialogue with the work prescribed in the curriculum. The pedagogy, hence, instead of becoming a “lecture” that synthesises earlier work, became a threeway dialogue, where the students and the instructors were responding to common texts, not only in trying to understand them but also in the context of their own work and interests. Moreover, each session was co-taught, by instructors from different disciplines, locations and geographies, to show how the same body of work can be approached through different entry points and pushed into different directions. The classroom hours, thus became a “workshop” space where the students and the faculty were engaging in a dialogue that sought to make the historical debates relevant to the discussions in the contemporary world. They also showed how the older questions persist across time and space, and that they need to be engaged with in order to make sense of the world around us.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Additionally, the Summer School classroom was designed as a space for collaborative pedagogy. The morning discussions around texts from the readers were followed by students presenting their work as a response to the texts prescribed for the day. Taking up a pecha-kucha format, it invited students to introduce themselves, their work, their context and their interventions and to open everything up for response and dialogue. The ambition was to build a community of intellectual support and interest, so that the students not only forge an affective bond but also a sense of collaboration and commonality in the work that they are already pushing in their existing research initiatives. The faculty for the day, along with some of the senior scholars also attended these presentations and helped tie in some of the earlier questions that might have emerged in the class, to the new material that was being introduced in the space.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;While this dialogue around new research was fruitful, we also were aware that there is a huge value in getting the students to interact with some of the more formative scholars whose work was prescribed in the curriculum. Hence, alongside the classrooms, we also hosted three salons that brought some of the significant scholars from the Inter-Asia movement into a dialogue with each other, as well as into a conversation with local intellectuals and activists. The first salon, organised at the artist collaborator 1 Shanthi Road, saw Chen Kuan-Hsing and Tejaswini Niranjana, discussing the impulse of the Inter-Asia movement. Charting the history, the different trajectories and the ways in which it has grown, both through friendships and networks, and intellectual interventions and collaborations, the conversation gave an entrypoint to younger scholars in understanding the politics and the motivation of this thought journey. The second salon, organised at the Alternative Law Forum, had Ding Naifei (Taiwan) and Firdaus Azim (Bangladesh) in conversation with legal sexuality and human rights activists Siddharth Narrain and Arvind Narrain (India) to unpack the politics of rights, sexuality, modernity and identity in different parts of Asia. The third salon, hosted at the Centre for Internet &amp;amp; Society, saw Ashish Rajadhyaksha (India) in conversation with Stephen Chan (Hong Kong) looking at questions of infrastructure, sustainability and the new role that research has to play in non-university and non-academic spaces and networks. The salons were designed to be informal settings for conversations and socialising, giving the summer school students access to the senior faculty outside of the classroom setting.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The summer school also wanted to ensure that the students were introduced to the materiality and the texture of the local, to understand the different layers of modernity and habitation that the IT City of Bangalore has to offer. Hence a local tour, charting the growth of Bangalore from a sleepy education centre to the burgeoning IT City that it has become, guided by curator and artist Suresh Jairam, was included as a part of the teaching. The four-hour walking tour laid bare the different contestations and layers of an IT city in India, showing the liminal markets, local cultures of production, and the ways in which they need to be factored into our images and imaginations of modernity and the IT City. Along with these, there were student parties arranged in different local clubs and institutions of Bangalore, to offer informal spaces of socialising for the students but also to give them a glimpse of what public spaces and cultures of being social might look like in a city such as Bangalore.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The summer school found a new richness because two of the days were twinned with a workshop on Culture Industries, supported by the Japan Foundation, which became a pedagogic space for the summer school participants. The students had a new focus introduced to their work and a chance to meet other scholars and activists in the field from Asia, who presented their work as part of the Summer School. The creative industries workshop also afforded a chance for students to form new connections and collaborations with projects and research initiatives that were being discussed in that forum.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;These different components were thus designed and put together as a part of the core course for the Inter-Asia Summer School in Bangalore. Each component had a specific vision and was designed to offer different spaces of learning, pedagogy and interaction for everybody included. The core course was an overview of the diversity and exchange that are parts of the Inter-Asia movement. The course ended with a “booksprint” model where the students, inspired by the conversations at the summer school, were given a day to submit written work that would capture their own learning and growth in the process. The submissions could take the form of an academic essay, a sketch towards a research essay, a blog entry summarising key events from a particular conversation, or a narrative summary of the key points in their own research and how it relates to the conversations at the Summer School. While the core course was compulsory for all the participants, the Summer School also offered two optional elective courses, which the students could opt for after the core course was concluded. The optional courses were designed to introduce students to work and debates that had not yet emerged centrally in the Inter-Asia debates, but were part of their current conversations.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;New nodes: Optional courses: the digital subject/technology, culture and the body&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The optional courses, which lasted for four days, were a way of introducing the students to some new core debates that are emerging in the Cultural Studies discourse. The courses were designed to specifically concentrate on how the older questions and frameworks are being reworked with the emergence of digital technologies, thus helping students to consolidate their own work and also engage with research initiatives across different parts of Asia.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The first optional course, entitled “The Digital Subject,” was coordinated by Nishant Shah and had lectures by Ashish Rajadhyaksha and Lawrence Liang. It proposed to account for the drastic changes in the relationships between the State, the Citizen and the Markets with the rise of digital technologies in the twenty-first century. The course proposed that as globalisation consolidates itself in Asia, we see changes in the patterns of governance, of state operation, of citizen engagement and civic action. We are in the midst of major revolutions in the Middle East and North Africa, powered by digital social change, some headed by cyber-utopians specialising in Web 2.0 and Social media. Phrases such as “Twitter Revolutions” and “Facebook Protests” have become very common.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Instead of concentrating only on the newness of technology-mediated change, there is a need to engage with the changing landscape of political subjectivity and engagement through a reintegration of science and technology studies with cultural studies and social sciences. The course thus posited certain questions that need to be addressed, within the domain of cultural studies, around the digital: what does a digital subject look like? What are the futures of existing socio-cultural rights based movements? How do digital technologies produce new interfaces for interaction and mobilisation? How do we develop integrated science-technologysociety approaches to understand our technology-mediated contemporary and futures?&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Through a series of seminars, workshops, film screening, lectures, and fieldtrips, the course challenged the students not only to look at new objects of the digital but also to ask new questions of the old, inspired by the new methods and frameworks that the digital technologies are opening up for us.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The second optional course entitled “Technology, Culture and the Body” was coordinated by Nita Vasudevan and had Audrey Yue, Ding Naifei, Tejaswini Niranjana, Wing-Kwong Wong, and Hsing-Wen Chang as instructors. The course began with a hypothesis that, at this moment in history, we seem to be embedded in what Heidegger calls “the frenziedness of technology.” Hence, now more than ever, it is important that we try to understand how the gendered body relates to technology, and what this means for the domain of the cultural. For instance, what are the freedoms that technology is said to offer this body? What are these freedoms posed in opposition to? How do we understand technological practice contextually, both historically and in the contemporary? Is it possible to have a notion of the body that is outside technology, and a notion of technology that is outside cultural practice?&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The course called for a move away from the idea of technology as a tool used by the human body, or the idea of technology as mere prosthesis or extension, to map the different ways of understanding the relationship&lt;br /&gt;between culture, technology and the body, specifically in the Asian context. It will involve examining practices, cultural formations and understandings that have emerged within various locations in Asia. The course engaged the students in closereadings of key events and texts, hosted workshops to present and critique their own work, and think of collaborative pathways towards future distributed research and pedagogic initiatives that can emerge within the Inter-Asia space.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Both courses had additional assignments that included close-reading of texts, practical field work, critical reflection and collaborative projects completed during the span of the course.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Tying things up: key learnings&lt;/h3&gt;
&lt;p&gt;The Second Inter-Asia Cultural Studies Summer School was an ambitious structure, and while there were logistical hiccups in the implementation, there were some key learning aspects that need to be highlighted.&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify;"&gt;&lt;em&gt;Working with tensions&lt;/em&gt;. Asia is not a homogeneous unified entity. There are several geo-political tensions that mark the relationships between different countries in Asia. While the academic protocol and individual interest in learning more can help negotiate these tensions, these tensions do play out in different linguistic, cultural and emotional unintelligibility, which becomes part of the pedagogic moment in the Inter-Asia classroom. Orienting the instructors to these tensions, and trying to build a collaborative environment where the students appreciate these tensions and learn to communicate with each other and engage with the different contexts is extremely valuable. In the summer school, we had students helping each other with translation, providing new contexts and critiques for each other’s work, and learning how to engage with the palpable difference of somebody from a different country. These tensions can sometimes slow the content and discussions in the classrooms, but taking it up as a collective challenge (rather than just thinking of it as a logistical problem where students not fluent in English need to be given tools of translation) made for a productive and rich learning environment.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;em&gt;Ownership of community structures&lt;/em&gt;. When young scholars from different parts of the world are thrown together for such an intense period of time, it is inevitable that there will be bonds of friendship and belonging that grow. We had debated about whether we should invest in doing online community building by creating platforms, discussion boards and other structures that accompany digital outreach and coordination. However, apart from the initial centralization for applications and programming, we eventually decided to make the participants owners of these activities.’ to give a better sense of the ‘digital structures of community building’. And it was fascinating to see how they formed social networks, blogs, Tumblrs and other spaces of conversation among themselves, making these spaces more vibrant and diverse, thus leading to conversations beyond the summer school.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;em&gt;Infrastructure of participation&lt;/em&gt;. The Summer School was an extremely subsidised event thanks to the generous support of the Inter-Asia Cultural Studies Consortium, the Institute of East Asian Studies and the Indian Institute of Sciences, who helped in significantly reducing the costs of registration. The availability of travel fellowships, subsidies, scholarships, and an infrastructure of access cannot be emphasised enough in our experience. Owing to the subsidised costs, the living conditions and the logistics were not optimal. And while the students were extremely cooperative and accommodating with the glitches, we realised that better living conditions and amenities, especially for young students who are travelling to a different country for the first time, are as important as the classroom and the intellectual thought and design. Finding more resources to ease the conditions of travel and living will help build richer conversations inside and outside the classrooms. Sustained efforts to find more funding for a space for the IACS summer school need to be continued.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;em&gt;Selection processes&lt;/em&gt;. It was wanted to promote the Inter-Asia movement and hence a first preference was given to students who applied for the summer school through an open call for application. The students were asked to have references from people who have been a part of the movement, and also to send in a brief essay describing their expectations from the summer school. We were scouting for students—given that the numbers we could accept were limited—who were involved in not only learning but also in contributing to the social and political thought of the Inter-Asia movement. We also encouraged students who might not have been a part of a formal education system but are considering further education. Instead of building a homogeneous student base, there was an attempt made to find different kinds of students, from different locations, at different places in their own research work, and with different disciplines and modes of engagement. Scholarships and travel aid were offered to students who we thought deserved to be a part of the summer school but did not have access to university resources for participation. The diversity helped bring a more comprehensive compendium of skills and methods to the table.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Integration and relevance. Younger students often find it difficult to deal with historically formative texts from other contexts because they do not see how this responds to their context or is relevant to their work in contemporary times. Efforts at integrating the different cultures, showing the different trajectories of thought and research within Asia, and at locating the older texts in the context of modern-day research were hugely rewarding and more attempts need to be made to continue this process of making the historical archive of the Inter-Asia Cultural Studies Movement relevant and critical in new research.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Planning the futures. The participants had all indicated that post the Summer School, they would be excited to see what future avenues for participation there could be. With this summer school, we hadn’t looked at modes of sustained engagement with the participants. While they did take the initiative to communicate with each other, the momentum that was generated because of these discussions could not be captured in its entirety because we did not have any formal structures and processes to continue the engagement. Especially if the IACS summer schools are some sort of an orientation into the IACS movement, then there should be more systemic thought given to how those interested in engaging with the questions can do so, through their own academic and institutional locations, but also through different kinds of support structures that continue the conversations and exchange that begin at the Summer School.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;em&gt;Synergy with the local&lt;/em&gt;. For us, as well as for the students, the synergy with the local movements, activists, artists and research was fruitful and productive. One of the values of a travelling summer school is that every summer school can take up a particular theme that is locally relevant and weave it into the summer school. For Bangalore, it made logical sense for us to bring questions of Digital Technologies and Identity/Bodies into the course. Even within the core course, there was an effort to integrate these as key questions that open up new terrains of thought and research within Inter-Asia cultural studies. The optional courses, which were introduced for the first time, were exciting and generated a lot of interest and engagement from the participants. Attempts at creating these kinds of synergies need to be supported along with new and experimental modes of pedagogy and learning.&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;The Second Inter-Asia Cultural Studies Summer School was a great opportunity to harness the potentials of the incredibly rich and diverse network that the IACS movement has built up over more than a decade. For us, it also became a playground where, inspired by the hacker culture and DIY movements that dot the landscape of Bangalore, we experimented with different forms of learning and knowledge production. Involving the students as stakeholders in the process, engaging with them as peers, making them responsible for collaborative learning, and creating spaces of participation and socialisation helped us circumvent many of the problems of language and cultural diversity that might have otherwise crippled the entire process. Pushing these modes of interaction and integration, while also creating an environment of trust, reciprocity and goodwill, is probably even more important than the curriculum and teaching, because these interactions create new nodes and connections, with each student and his/her interaction creating new edges that will hopefully shape and contribute to the contours of critical thought and intervention in Asia.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;References&lt;/h3&gt;
&lt;ol&gt;
&lt;li style="text-align: justify;"&gt;Chen, Kuan-Hsing. 2010. &lt;em&gt;Asia as Method: Toward Deimperialization&lt;/em&gt;. Durham and London: Duke University Press.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Chua, Beng-Huat, ed. 2000. &lt;em&gt;Consumption in Asia: Lifestyle and Identities&lt;/em&gt;. London: Routledge.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Philip, Kavita, Lily Irani, and P. Dourish. 2010. “Postcolonial Computing: A Tactical Survey.” &lt;em&gt;Science Technology Human Values&lt;/em&gt; 37 (1): 3–29.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Rajadhyaksha, Ashish. 2009. &lt;em&gt;Indian Cinema in the time of Celluloid: From Bollywood to the Emergency&lt;/em&gt;. New Delhi: Combined Academic Publications.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Niranjana, Tejaswini, et al. 2010. &lt;em&gt;Strengthening Community Engagement of Higher Education Institutions&lt;/em&gt;. Bangalore: Centre for the Study of Culture and Society.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Watts, Duncan. 1999. “Networks, Dynamics, and the Small-World Phenomenon.” &lt;em&gt;AJS&lt;/em&gt; 105 (2): 493–527.&lt;/li&gt;&lt;/ol&gt;
&lt;h3&gt;Author's Biography&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Nishant Shah is the Director of Research at the Bangalore-based Centre for Internet &amp;amp; Society, an International Tandem Partner at the Hybrid Publishing Lab, Leuphana University, and a Knowledge Partner with Hivos, in The Hague. He is the editor of the four-volume anthology Digital AlterNatives with a Cause? and writes regularly for the Indian newspaper The Indian Express and for the Digital Media and Learning Hub at dmlcentral.net. His current areas of interest are Digital Humanities, Digital Activism and Digital Subjectivity.&lt;/p&gt;
&lt;hr /&gt;
&lt;p align="JUSTIFY"&gt;[&lt;a name="fn1" href="#fr1"&gt;1&lt;/a&gt;]. &lt;span class="discreet"&gt;A mammoth project such as the Inter-Asia Summer School requires resources, support and generosity from family, friends, and colleagues that can never be measured or cited in a note. However, there are a few people who need to be mentioned for their incredible spirits and the resources that they extended to us. Dr Raghavendra Gaddakar at the Centre for Contemporary Studies, Indian Institute of Sciences and his entire staff were patient and hospitable hosts, housing the entire summer school for over a fortnight. The faculty, students and staff at the Centre for the Study of Culture and Society (CSCS) Bangalore helped in designing courses, finding venues and organising events that added to the richness of the summer school. Raghu Tankayala and Radhika P, both at CSCS were our rocks through this process, taking up a lion’s share of logistical arrangements. The help of the entire staff at the Centre for Internet and Society, who were there every step, helping with every last detail, and the Executive Director Sunil Abraham who lent us infrastructure and financial support to organise various events and salons, is unparalleled and I know I would have found it impossible to work without the knowledge that they would always be there to watch my back. All the instructors who agreed to join the teaching crew made this summer school what it became (a full list can be found at &lt;a href="https://cis-india.org/internet-governance/iacs-summer-school-2012" class="external-link"&gt;http://cis-india.org/internet-governance/iacs-summer-school-2012&lt;/a&gt;). Both Nitya Vausdevan and I owe a huge amount of gratitude to the IACS society and the Consortium, as well as the stalwarts of the IACS movement who put faith in our vision, and pushed us, supported us, inspired us and helped us to carry out the different things we had planned. The local partners who make our life worth living—friends and colleagues at 1 Shanthi Road and The Alternative Law Forum—have been our rocks and we cannot thank them enough for their support and encouragement. A special thanks to Daniel Goh, who apart from being a faculty member, also helped us put together the website to manage the workflow for the entire project.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn2" href="#fr2"&gt;2&lt;/a&gt;]. &lt;span class="discreet"&gt;A full list of instructors and the prescribed curriculum can be found at &lt;a href="https://cis-india.org/internet-overnance/iacs-summer-school-2012" class="external-link"&gt;http://cis-india.org/internet-overnance/iacs-summer-school-2012&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/digital-humanities/routledge-inter-asia-cultural-studies-volume-15-issue-2-nishant-shah-asia-in-the-edges'&gt;https://cis-india.org/raw/digital-humanities/routledge-inter-asia-cultural-studies-volume-15-issue-2-nishant-shah-asia-in-the-edges&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Knowledge</dc:subject>
    
    
        <dc:subject>Inter-Asia Cultural Studies</dc:subject>
    
    
        <dc:subject>Peer Reviewed Article</dc:subject>
    
    
        <dc:subject>Publications</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2015-04-14T12:47:38Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/publications/pupfip/why-no-pupfip">
    <title>Arguments Against the PUPFIP Bill</title>
    <link>https://cis-india.org/a2k/publications/pupfip/why-no-pupfip</link>
    <description>
        &lt;b&gt;The Protection and Utilisation of Public Funded Intellectual Property Bill (PUPFIP Bill) is a new legislation being considered by Parliament, which was introduced in the 2008 winter session of the Rajya Sabha. It is modelled on the American Bayh-Dole Act (University and Small Business Patent Procedures Act) of 1980.  On this page, we explore some of the reasons that the bill is unnecessary, and how it will be harmful if passed.&lt;/b&gt;
        
&lt;h2&gt;Summary&lt;/h2&gt;
&lt;h2 style="text-align: justify;"&gt;&lt;a title="How is the legislation unnecessary?" href="#how-is-the-legislation"&gt;How is the legislation
unnecessary?&lt;/a&gt;&lt;/h2&gt;
&lt;ol&gt;&lt;li&gt;&lt;a title="1) The Indian government
does not have vast reserves of underutilized patents, as the U.S. did
in 1980." href="#1-the-indian-government"&gt;The Indian government does not have vast reserves of underutilized patents, as the U.S. did in 1980.&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a title="2) Technology transfer is very important, but pushing IPRs aggressively is not the best way of ensuring technology transfer." href="#2-technology-transfer-is"&gt;Technology transfer is very important, but pushing IPRs aggressively is not the best way of ensuring technology transfer.&lt;/a&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;p align="justify"&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;&lt;a title="How is the legislation
harmful?" href="#how-is-the-legislation-1"&gt;How is the legislation
harmful?&lt;/a&gt;&lt;/h2&gt;
&lt;ol&gt;&lt;li&gt;&lt;a title="1) It's very foundation
is flawed and unproven: excessive patenting lead to gridlocks and
retard innovation." href="#1-it-s-very"&gt;Excessive patenting lead to
	gridlocks and retards innovation. 
	&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a title="2) The legislation makes
mandatory that which is optional now, and is anyway being followed in
many institutions." href="#2-the-legislation-makes"&gt;The legislation
	makes mandatory that which is optional now, and is anyway being
	followed in many institutions.&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a title="3) Copyright, trademark,
etc., seem to be covered under the definition of public funded
IP." href="#3-copyright-trademark-etc"&gt;Copyright,
	trademark, etc., seem to be covered under the definition of “public
	funded IP”.&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a title="4) It will result in
a form of	double taxation for research, and will increase the consumer cost of
	all products based on publicly-funded..." href="#4-it-will-result"&gt;It will result in
a form of	double taxation for research, and will increase the consumer cost of
	all products based on publicly-funded research.&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a title="5) It could have
unintended consequences of varied kinds, including discouraging
fundamental research as well as discouraging industrial..." href="#5-it-could-have"&gt;It could have
	unintended consequences of varied kinds, including discouraging
	fundamental research as well as discouraging industrial research.&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a title="6) Non-disclosure
	requirements in the Bill restricts the dissemination of research within the academic community, and curtails freedom of..." href="#6-non-disclosure-requirements"&gt;Non-disclosure
	requirements in the Bill restricts the dissemination of research within the academic community, and curtails freedom of speech.&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a title="7) Exclusive licensing enables restriction on the dissemination of
academic research in the marketplace, and increase in cost of products..." href="#7-exclusive-licensing-enables"&gt;Exclusive
	licensing enables restriction on the dissemination of academic research in the marketplace, and increase in cost of products based on public-funded research.&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;p align="justify"&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 align="justify"&gt;&lt;a title="Additional Resources" href="#additional-resources"&gt;Additional resources&lt;/a&gt;&lt;/h2&gt;
&lt;ul&gt;&lt;li&gt;&lt;a title="On the PUPFIP Bill" href="#on-the-pupfip-bill"&gt;On the PUPFIP Bill&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a title="On Bayh-Dole" href="#on-bayh-dole"&gt;On Bayh-Dole&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;h2 align="justify"&gt;&lt;br /&gt;&lt;/h2&gt;
&lt;h2 align="justify"&gt;Arguments&lt;br /&gt;&lt;/h2&gt;
&lt;h2 align="justify"&gt;&lt;a name="how-is-the-legislation"&gt;&lt;/a&gt;How is the legislation unnecessary?&lt;br /&gt;&lt;/h2&gt;
&lt;h3 align="justify"&gt;&lt;a name="1-the-indian-government"&gt;&lt;/a&gt;1) The Indian government
does not have vast reserves of underutilized patents, as the U.S. did
in 1980.&lt;/h3&gt;
&lt;p align="justify"&gt;The idea behind the
Bayh-Dole Act was that the research funded by the government (and
owned, in the US, by the government) was being underutilized. In 1980, over 28,000 unlicensed patents lay with the U.S. government.[1] The Act shifted the title of such works
from the government to the University or small business that
conducted the research, thus allowing them to take out patents on the
research outputs.  In India, under present laws, the researcher(s)
own the rights over their research whether they be government-funded
or not.  Usually, due to employment contracts, the research
institutes already have the right to patent their inventions.  Thus,
currently, there is no need for an enabling legislation in this
regard, as there was in the U.S.&amp;nbsp;&lt;/p&gt;
&lt;p align="justify"&gt;In fact, currently, the Council of
Scientific and Industrial Research (CSIR) has over 5173 patents
(counting both those in force and those under dispute), while only
222 patents are licensed (with 68 of them being under dispute). 
Thus, even with the IP being in the institute's hands, there is a
"problem" situation similar to that which necessitated
Bayh-Dole in the U.S.  Thus, quite contrary to the aims of the Act,
further patenting will only lead to a situation of even more
underutilized patents.&lt;/p&gt;
&lt;p align="justify"&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;a name="2-technology-transfer-is"&gt;&lt;/a&gt;2) Technology transfer is very important, but pushing IPRs aggressively is not the best way of ensuring technology transfer.&lt;/h3&gt;
&lt;p align="justify"&gt;At a recent seminar held at NUJS Kolkata on
the PUPFIP Bill, it was revealed that while IIT-Kharagpur’s
TTO-equivalent (called the Sponsored Research &amp;amp; Industrial
Consultancy division - SRIC) currently handles over Rs.300 crores
through 850 projects, only around Rs. 5-15 crores (exact figures
weren't available) are currently made through its patent
portfolio.[2] &amp;nbsp;Thus patents don't seem, on the face of things, to be the
best way of ensuring technology transfer.&amp;nbsp; Indeed, the oft-cited 28,0000 unlicensed patents held by the U.S. government were composed primarily of patents for which industry had refused to take exclusive licences.[3]&lt;/p&gt;
&lt;p align="justify"&gt;Many contend that one of the most important functions of a patent is to get inventors to disclose their inventions rather than keep them as secrets.&amp;nbsp; This reason for awarding a patent is invalidated if stronger protection is granted to trade secrets (no term limit, for instance) than for patents.&amp;nbsp; Secondly, this reason for granting patents is not valid in case of government-funded research in academia and research
institutes.  The culture of publication and the economy of reputation
are sufficient to ensure disclosure.&amp;nbsp; Even without these intrinsic factors, there grant requirements can necessitate publication.&amp;nbsp; If mere publication is believed to be insufficient, then the government would do well to ask for technology dissemination plans before grants are made.&amp;nbsp; At any rate, monopoly rights in the form of patents are
thoroughly unnecessary.&lt;/p&gt;
&lt;p align="justify"&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;&lt;a name="how-is-the-legislation-1"&gt;&lt;/a&gt;How is the legislation
harmful?&lt;/h2&gt;
&lt;h3 align="justify"&gt;&lt;a name="1-it-s-very"&gt;&lt;/a&gt;1) Excessive patenting lead to gridlocks and
retard innovation.&lt;/h3&gt;
&lt;p align="justify"&gt;It sees protection of IPR
as the sole means of encouraging innovation and driving research to
the doorstep of consumers. The trend around the world is that of
exploring alternative forms of spurring innovation.  Even in India,
CSIR has gone for an innovative "&lt;a class="external-link" href="http://www.osdd.net/"&gt;Open Source Drug Discovery&lt;/a&gt;"
project, which has proven very successful so far.  Furthermore, recent literature shows that excessive
patenting is harming research and innovation by creating gridlocks.[4]&amp;nbsp; If platform technologies and basic research (such as SNP) gets mired in patents, then the transaction costs increase (not only in terms of money, but more importantly in administrative terms).&amp;nbsp; This ends up in research clearances getting blocked, and thus retards innovation.&amp;nbsp; It must be remembered that intellectual property is not only an output, but also an input.&amp;nbsp; The more aggressively the outputs are guarded and prevented from being shared, the more the inputs will be affected.&amp;nbsp; The study of patent thickets and gridlocks has reached such a stage that the U.S. law has been changed to reflect this. Firstly, the Bayh-Dole Act was amended in 2000 to state that the objectives of the Bayh-Dole Act were to be carried out "without unduly encumbering future research and discovery".&amp;nbsp; Now, the courts (in the &lt;em&gt;Bilski&lt;/em&gt; case) have increased the standard of obviousness in patent law (which means that less patents will be granted).&amp;nbsp; Furthermore, the&amp;nbsp; U.S.P.T.O.&amp;nbsp; and the U.S. Senate are currently considering means of overhauling the U.S. patent system, which many fear is close to breaking down due to over-patenting.&amp;nbsp; All these are signs that the footsteps we are seeking to follow are themselves turning back.&lt;/p&gt;
&lt;p align="justify"&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3 align="justify"&gt;&lt;a name="2-the-legislation-makes"&gt;&lt;/a&gt;2) The legislation makes
mandatory that which is optional now, and is anyway being followed in
many institutions.&lt;/h3&gt;
&lt;p align="justify"&gt;While the CSIR labs
pursue patents aggressively, they also run the OSSD project.  The latter
might not be permissible if the Act is passed as it stands.&amp;nbsp; 
Furthermore, this would increase the number of underutilized patents,
which is a problem faced currently by CSIR, which has had an
aggressive patent policy since the 1990s.&amp;nbsp; Unlicensed patents constitute around 93% of CSIR's total patent portfolio.&amp;nbsp; (In contrast, MIT averages
around 50% licensing of patents.)&amp;nbsp; If aggressive patenting is made mandatory, it adds substantially to administrative costs of all institutes which receive any grants from the government.&amp;nbsp; These institutes might not be large enough to merit a dedicated team of professionals to handle&lt;/p&gt;
&lt;p align="justify"&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3 align="justify"&gt;&lt;a name="3-copyright-trademark-etc"&gt;&lt;/a&gt;3) Copyright, trademark,
etc., seem to be covered under the definition of "public funded
IP".&lt;/h3&gt;
&lt;p align="justify"&gt;This leads to a ridiculous need to attempt to commercialise
all government-funded research literature (and the government funds
science research, social sciences, arts, etc.).&amp;nbsp;  Furthermore, while the definition of "public funded IP" includes copyrights, trademarks, etc., yet the substantive provisions seem to only include those forms of IP which have to be registered compulsorily (copyright and trademark don't -- copyright comes into existence when an original work is expressed in a medium, and trademark can come into existence&amp;nbsp; by use).&amp;nbsp; Importantly, seeking to commercialise all copyrighted works of research would hamper
the movement for open access to scholarly literature.&amp;nbsp; The inititative towards open access to scholarly literature is something that National Knowledge Commission has recommended, and is a move that would result in increased dissemination of public-funded research, which seems to be an aim of the PUPFIP Bill as well.&lt;/p&gt;
&lt;p align="justify"&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3 align="justify"&gt;&lt;a name="4-it-will-result"&gt;&lt;/a&gt;4) It will result in
a form of	double taxation for research, and will increase the consumer cost of
	all products based on publicly-funded research.&lt;/h3&gt;
&lt;p align="justify"&gt;This bill would increase the
consumer cost of all products based on publicly-funded research,
because of the additional burden of patent royalties.&amp;nbsp;&lt;/p&gt;
&lt;p align="justify"&gt;Public funds research -&amp;gt; Institute patents research -&amp;gt; Pharma MNC gets exclusive license over research -&amp;gt; Drug reaches market.&lt;/p&gt;
&lt;p align="justify"&gt;Assuming an exclusive licence: Cost of the drug = cost of manufacturing, storage, etc. + &lt;em&gt;mark-up (monopolistic) cost&lt;/em&gt; + &lt;em&gt;cost of licence&lt;/em&gt;.&lt;/p&gt;
&lt;p align="justify"&gt;Thus, in
effect, the public has to pay twice for the research: it pays once to enable the
scientist to conduct the research, and once again in the form of royalties to have that research brought to the marketplace.&amp;nbsp;&lt;/p&gt;
&lt;p align="justify"&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3 align="justify"&gt;&lt;a name="5-it-could-have"&gt;&lt;/a&gt;5) It could have
unintended consequences of varied kinds, including discouraging
fundamental research as well as discouraging industrial research.&lt;/h3&gt;
&lt;p align="justify"&gt;The former could happen since
institutions and individual scientists have a financial incentive to
&lt;a class="external-link" href="http://www.researchoninnovation.org/tiip/archive/2003_5b.htm"&gt;shift their focus away from fundamental research&lt;/a&gt;; the latter,
conversely, because the filings and bureaucracy involved &lt;a class="external-link" href="http://www.spicyip.com/docs/ppt-premnath-pdf.pdf"&gt;could drive
scientists away from reporting or even engaging in industrial
research&lt;/a&gt; [pdf].&amp;nbsp; Faculty and researcher involvement in the business of
licensing is a sub-optimal usage of their talents, and there are
scientists who would rather stay away from business (as is shown by
the intake of former industry-researchers into government-funded labs
such as those of CSIR).&lt;/p&gt;
&lt;p align="justify"&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3 align="justify"&gt;&lt;a name="6-non-disclosure-requirements"&gt;&lt;/a&gt;6) Non-disclosure
	requirements in the Bill restricts the dissemination of research within the academic community, and curtails freedom of speech.&lt;br /&gt;&lt;/h3&gt;
&lt;p align="justify"&gt;This will bring about a shift in science and research which is always done upon others' work.&amp;nbsp; This is why in the U.S., the National Institute of Health (N.I.H.) has sought to ensure (without any legal authority) that it only finances that research that on single nucleotide polymorphism (S.N.P.) which is not patented, and is shared freely amongst scholars.&amp;nbsp; Since this requirement of the N.I.H.'s does not have any legal backing (since it is contradictory to the Bayh-Dole Act), institutions are free to get the grant from N.I.H. and then go ahead and patent their inventions.&lt;/p&gt;
&lt;p align="justify"&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3 align="justify"&gt;&lt;a name="7-exclusive-licensing-enables"&gt;&lt;/a&gt;7) Exclusive licensing enables restriction on the dissemination of
academic research in the marketplace, and increase in cost of products
based on public-funded research.&lt;/h3&gt;
&lt;p&gt;The bill allows for both assignment of licences as well as exclusive licences.&amp;nbsp; Both of these enable monopolistic pricing to be undertaken by the licensee/assignee.&amp;nbsp; There are not even any mechanisms in the Act to ensure, for instance, that a public call is made to ascertain that no parties are willing to consider a non-exclusive licence.&amp;nbsp; Patents are generally said to grant a monopoly right because of the opportunity to recover costs of research and development.&amp;nbsp; When the research is being done by public-funded money, there is no justification for monopoly rights on that research, since there are no excessive costs to recover.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p align="justify"&gt;Footnotes:&lt;/p&gt;
&lt;p align="justify"&gt;[1] See &lt;a class="external-link" href="http://www.plosbiology.org/article/info:doi/10.1371/journal.pbio.0060262"&gt;So et al.&lt;/a&gt; and &lt;a class="external-link" href="http://opensource.mit.edu/papers/Thursby.pdf"&gt;Thursby and Thursby&lt;/a&gt;, quoted in the &lt;a class="external-link" href="http://knowledgecommission.gov.in/downloads/recommendations/LegislationPM.pdf"&gt;National Knowledge Commission's letter to the Prime Minister&lt;/a&gt;.&lt;/p&gt;
&lt;p align="justify"&gt;[2] See Prof. Vivekanandans' presentation "&lt;a class="external-link" href="http://www.spicyip.com/docs/ppt-vivek.pdf"&gt;Patenting and Technology Transfer-the IIT Khargpur Experience&lt;/a&gt;"&lt;/p&gt;
&lt;p align="justify"&gt;[3] See &lt;a class="external-link" href="http://www.plosbiology.org/article/info:doi/10.1371/journal.pbio.0060262"&gt;Anthony So et al., &lt;em&gt;Is Bayh-Dole Good for Developing Countries&lt;/em&gt;, 6 PLoS Biol e262 (2008)&lt;/a&gt;&lt;/p&gt;
[4] See &lt;a class="external-link" href="http://www.sciencemag.org/cgi/content/full/280/5364/698"&gt;Michael A. Heller &amp;amp; Rebecca S. Eisenberg, Can Patents Deter Innovation? The Anticommons in Biomedical Research, 280 Science 698 (1998)&lt;/a&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p align="justify"&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;&lt;a name="additional-resources"&gt;&lt;/a&gt;Additional Resources&lt;/h2&gt;
&lt;h3&gt;&lt;a name="on-the-pupfip-bill"&gt;&lt;/a&gt;On the PUPFIP Bill&lt;/h3&gt;
&lt;ul&gt;&lt;li&gt;February 5, 2004: &lt;a class="external-link" href="http://www.expresspharmaonline.com/20040205/happenings05.shtml"&gt;NIPER holds parallel session of Indian Science Congress (Express Pharma)&lt;/a&gt; &lt;br /&gt;&lt;/li&gt;&lt;li&gt;October 27, 2006:&amp;nbsp;&lt;a class="external-link" href="http://bayhdole25.org/node/40"&gt;Susan
 Finston, India to Propose New Technology Transfer Legislation 
(Bayh-Dole 25)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;span id="__citationid396739" class="citation"&gt;January 16, 2007: &lt;a class="external-link" href="http://knowledgecommission.gov.in/downloads/recommendations/LegislationPM.pdf"&gt;National Knowledge Commision's Letter to Indian Prime Minister (National Knowledge Commission)&lt;/a&gt; &lt;/span&gt;&lt;/li&gt;&lt;li&gt;April 15, 2007: &lt;a class="external-link" href="http://www.downtoearth.org.in/full6.asp?foldername=20070415&amp;amp;filename=news&amp;amp;sid=23&amp;amp;page=2&amp;amp;sec_id=50"&gt;Archita Bhatta, Proposed IPR law raises concern (Down to Earth)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;May 31, 2007: &lt;a class="external-link" href="http://www.pib.nic.in/release/release.asp?relid=28342"&gt;Science &amp;amp; Technology needs to be core of the economic development says Kapil Sibal (&lt;span class="Apple-style-span"&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="external-link" href="http://www.pib.nic.in/release/release.asp?relid=28342"&gt;PIB Press Release)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;November 13, 2007: &lt;a class="external-link" href="http://www.pib.nic.in/release/rel_print_page.asp?relid=32628"&gt;Government Accords Approval to National Biotechnology Development Strategy (PIB Press Release)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;February 1, 2008: &lt;a class="external-link" href="http://www.sciencemag.org/cgi/content/summary/319/5863/556a"&gt;Yudhijit Bhattacharjee, Indian Government Hopes Bill Will Stimulate Innovation (Science)&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;li&gt;February 19, 2008: Shamnad Basheer, Exporting Bayh Dole to India: Whither Transparency? &lt;a class="external-link" href="http://spicyipindia.blogspot.com/2008/02/exporting-bayh-dole-to-india-whither.html"&gt;(Part 1)&lt;/a&gt; &lt;a class="external-link" href="http://spicyipindia.blogspot.com/2008/02/exporting-bayh-dole-to-india-whither_21.html"&gt;(Part 2)&lt;/a&gt; (SpicyIP)&lt;br /&gt;&lt;/li&gt;&lt;li&gt;March 17, 2008: &lt;a class="external-link" href="http://www.business-standard.com/india/storypage.php?autono=317122"&gt;Kalpana Pathak, Varsities may soon own patent rights (Business Standard)&lt;/a&gt; &lt;br /&gt;&lt;/li&gt;&lt;li&gt;March 17, 2008: &lt;a class="external-link" href="http://www.thehindubusinessline.com/2008/03/17/stories/2008031751080100.htm"&gt;P.T. Jyothi Datta, Public-funded research may pay dividends for scientists (Business Line)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;March 17, 2008: &lt;a class="external-link" href="http://www.iam-magazine.com/blog/Detail.aspx?g=c2472b7c-0f57-4e16-b1ea-389c44c3b4a6"&gt;Joff Wild, India considers Bayh-Dole style legislation (IAM Magazine)&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;April 30, 2008: &lt;a class="external-link" href="http://www.pharmabiz.com/article/detnews.asp?articleid=44083&amp;amp;sectionid=46"&gt;M.K. Unnikrishnan and Pradeepti Nayak, Lessons from Bayh Dole Act and its relevance to India (PharmaBiz)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;July 2008: &lt;a class="external-link" href="http://ssrn.com/abstract=1265343"&gt;Sean M. O'Connor, Historical Context of U.S. Bayh-Dole Act: Implications for Indian Government Funded Research Patent Policy (STEM Newsletter)&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;July 7, 2008: Shamnad Basheer,&amp;nbsp;&lt;a class="external-link" href="http://spicyipindia.blogspot.com/2008/07/mysterious-indian-bayh-dole-bill.html"&gt;Mysterious Indian "Bayh Dole" Bill: SpicyIP Procures a Copy (SpicyIP)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;July 09, 2008: &lt;a class="external-link" href="http://www.business-standard.com/india/storypage.php?autono=328187"&gt;Latha Jishnu, Does India need a Bayh-Dole Act? (Business Standard)&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;September 2008: &lt;a class="external-link" href="http://nopr.niscair.res.in/handle/123456789/2036"&gt;V.C. Vivekanandan, Transplanting Bayh-Dole Act- Issues at Stake Authors (13 Journal of Intell. Prop. 480)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;September 18, 2008: &lt;a class="external-link" href="http://www.scidev.net/en/opinions/indian-patent-bill-let-s-not-be-too-hasty.html"&gt;Shamnad Basheer, Indian Patent Bill: Let's not be too hasty (SciDev.net)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;October 28, 2008: &lt;a class="external-link" href="http://www.plosbiology.org/article/info:doi/10.1371/journal.pbio.0060262"&gt;Anthony So et al., &lt;em&gt;Is Bayh-Dole Good for Developing Countries&lt;/em&gt;, 6 PLoS Biol e262 (2008)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;October 31, 2008: &lt;a class="external-link" href="http://pib.nic.in/release/release.asp?relid=44316"&gt;Cabinet gives approval for Protection and Utilization of Public Funded Intellectual Property Bill, 2008 (&lt;/a&gt;&lt;a class="external-link" href="http://pib.nic.in/release/release.asp?relid=44316"&gt;PIB Press Release)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;November 2008: &lt;a class="external-link" href="http://www.essentialmedicine.org/wordpress/wp-content/uploads/2008/11/uaem-white-paper-on-indian-bd-act.pdf"&gt;Annette Lin et al., The Bayh-Dole Act and Promoting the Transfer of Technology of Publicly Funded-Research (UAEM White Paper on the Proposed Indian Bayh-Dole Analogue)&lt;/a&gt; &lt;br /&gt;&lt;/li&gt;&lt;li&gt;November 1,&amp;nbsp; 2008: &lt;a class="external-link" href="http://www.livemint.com/2008/10/11002336/2008/11/01001052/Not-in-public-interest.html?d=2"&gt;Editorial: Not in Public Interest (Mint)&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;November 12, 2008: &lt;a class="external-link" href="http://www.genomeweb.com/biotechtransferweek/india-mulls-bill-modeled-bayh-dole-critics-claim-it-may-stifle-innovation"&gt;Ben Butkus, As India Mulls Bill Modeled on Bayh-Dole, Critics Claim It May Stifle Innovation (Biotech Transfer Weekly)&lt;/a&gt;&amp;nbsp; &lt;br /&gt;&lt;/li&gt;&lt;li&gt;December 16, 2008: &lt;a class="external-link" href="http://mail.sarai.net/pipermail/commons-law/2008-December/002973.html"&gt;Pranesh Prakash, Indian "Bayh Dole" Bill before Parliament (Commons Law)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;January 23, 2009: &lt;a class="external-link" href="http://www.scidev.net/en/editorials/time-to-rethink-intellectual-property-laws-.html"&gt;Editorial: Time to Rethink Intellectual Property Laws (SciDev.net)&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;March 12, 2009: &lt;a class="external-link" href="http://www.thehindu.com/seta/2009/03/12/stories/2009031250021400.htm"&gt;Feroz Ali Khader, Does Patenting Research Change the Culture of Science? (The Hindu)&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;April 24, 2009: &lt;a class="external-link" href="http://www.indianexpress.com/story-print/450560/"&gt;Sunil Abraham &amp;amp; Pranesh Prakash, Does India Need Its Own Bayh-Dole? (Indian Express)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;September 21, 2009: &lt;a class="external-link" href="http://www.livemint.com/2009/09/20235448/Proposed-patent-Bill-is-flawed.html?h=A1"&gt;C.H. Unnikrishnan, Proposed Patent Bill Is Flawed, Say Experts (Mint)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;September 23, 2009: &lt;a class="external-link" href="http://www.livemint.com/Articles/PrintArticle.aspx?artid=F92B5F6A-A789-11DE-A362-000B5DABF613"&gt;Editorial: An Idea That's A Patent Misfit (Mint)&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;October 2009: &lt;a class="external-link" href="http://ictsd.org/downloads/2009/11/sampat-policy-brief-5.pdf"&gt;Bhaven N. Sampat, The Bayh-Dole Model in Developing Countries: Reflections on the Indian Bill on Publicly Funded Intellectual Property (UNCTAD - ICTSD Policy Brief No. 5)&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;January 2010: &lt;a class="external-link" href="http://www.icrier.org/publication/WorkingPaper244.pdf"&gt;Amit Shovon Ray &amp;amp; Sabyasachi Saha, Patenting Public-Funded Research for Technology Transfer: A Conceptual-Empirical Synthesis of US Evidence and Lessons for India (ICRIER Working Paper No. 244)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;January 2010: &lt;a class="external-link" href="http://nopr.niscair.res.in/bitstream/123456789/7196/1/JIPR%2015%281%29%2019-34.pdf"&gt;Mrinalini Kochupillai, &lt;em&gt;The Protection and Utilization of Public Funded Intellectual Property Bill, 2008: A Critique in the Light of India's Innovation Environment&lt;/em&gt;, 15 J. Intell. Prop. Rights 19 (2010)&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;January 16, 2010: &lt;a class="external-link" href="http://www.financialexpress.com/printer/news/567807/"&gt;Amit Shovon Ray &amp;amp; Sabyasachi Saha, Intellectual Bottlenecks (Financial Express)&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;January 21, 2010: &lt;a class="external-link" href="http://www.business-standard.com/india/news/latha-jishnu-perilsthe-us-model/383179/"&gt;Latha Jishnu, Perils of the US Model (Business Standard)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;January 22, 2010: &lt;a class="external-link" href="http://timesofindia.indiatimes.com/india/Scientists-fume-over-new-patent-bill/articleshow/5486588.cms"&gt;Rema Nagarajan, Scientists Fume Over New Patent Bill (Times of India)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;January 26, 2010: &lt;a class="external-link" href="http://www.livemint.com/2010/01/26202909/The-problem-with-patents.html"&gt;Shamnad Basheer, The Problem with Patents (Mint)&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;February 5, 2010: &lt;a class="external-link" href="http://www.thehindubusinessline.com/2010/02/05/stories/2010020550960900.htm"&gt;Shalini Butani, Public Research May Become More Private (Business Line)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;February 8, 2010: &lt;a class="external-link" href="http://www.livemint.com/2010/02/07225403/Scientists-want-changes-in-inn.html"&gt;Anika Gupta, Scientists Want Changes in Innovation Bill (Mint)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;February 9, 2010: &lt;a class="external-link" href="http://www.livemint.com/Articles/PrintArticle.aspx?artid=AD533A7C-15A2-11DF-A92D-000B5DABF636"&gt;C.H. Unnikrishnan, Parliament Panel Wants Govt Review on Innovation Bill (Mint)&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;February 15, 2010: &lt;a class="external-link" href="http://www.downtoearth.org.in/full6.asp?foldername=20100215&amp;amp;filename=croc&amp;amp;sec_id=10&amp;amp;sid=2"&gt;Leena Menghaney, A Bad Example from the U.S. (Down to Earth)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;February 19, 2010: &lt;a class="external-link" href="http://www.indianexpress.com/story-print/581701/"&gt;Pranesh Prakash, A Patent Conundrum (Indian Express)&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://spicyipindia.blogspot.com/search/label/Bayh%20Dole"&gt;SpicyIP coverage by tag 'Bayh Dole'&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://spicyip.com/ip-resources"&gt;Presentations from NUJS, Kolkata conference on the PUPFIP Bill&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;&lt;a name="on-bayh-dole"&gt;&lt;/a&gt;On Bayh-Dole&lt;/h3&gt;
&lt;strong&gt;Newspapers and Magazines&lt;/strong&gt;
&lt;ul&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.nybooks.com/articles/17244"&gt;Marcia Angell, The Truth About the Drug Companies, New York Review of Books, July 15, 2004&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://money.cnn.com/magazines/fortune/fortune_archive/2005/09/19/8272884/index.htm"&gt;Clifton Leaf, The Law of Unintended Consequences, Fortune Magazine, Sept. 19, 2005&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.economist.com/science/PrinterFriendly.cfm?story_id=5327661"&gt;The Bayh-Dole act's 25th birthday, The Economist, Dec. 20, 2005&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.nytimes.com/2008/09/07/technology/07unbox.html?_r=1&amp;amp;pagewanted=print"&gt;Janet Rae-Dupree, When Academia Puts Profit Ahead of Wonder, N.Y. Times, Sept. 7, 2008&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;strong&gt;Academic Journals&lt;/strong&gt;
&lt;ul&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.btlj.org/data/articles/20_02_02.pdf"&gt;Amy Kapczynski et al., Addressing Global Health Inequities: An Open Licensing Approach for University Innovation, 20 Berkeley Tech. L.J. 1031 (2005) &lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.plosbiology.org/article/info:doi/10.1371/journal.pbio.0060262"&gt;Anthony So et al., &lt;em&gt;Is Bayh-Dole Good for Developing Countries&lt;/em&gt;, 6 PLoS Biol. e262 (2008)&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.law.duke.edu/shell/cite.pl?66+Law+&amp;amp;+Contemp.+Probs.+289+%28WinterSpring+2003%29"&gt;Arti K. Rai &amp;amp; Rebecca S. Eisenberg, &lt;em&gt;Bayh-Dole Reform and the Progress of Biomedicine&lt;/em&gt;, 66 Law &amp;amp; Contemp. Probs. 289 (2003)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;David C. Mowery &amp;amp; Arvids A. Aiedonis, &lt;em&gt;Numbers, Quality, and Entry: How Has the Bayh-Dole Act Affected U.S. University Patenting and Licensing?&lt;/em&gt;, 1 Innovation Pol'y Econ. 187 (2000)&lt;/li&gt;&lt;li&gt;David C. Mowery, et al., &lt;em&gt;Learning to Patent: Institutional Experience, Learning, and the Characteristics of U.S. University Patents After the Bayh-Dole Act, 1981-1992&lt;/em&gt;, 48 Mgmt. Sci. 73 (2002)&lt;/li&gt;&lt;li&gt;Donald Kennedy, &lt;em&gt;Editorial: Enclosing the Research Commons&lt;/em&gt;, 294 Science 2249 (2001)&lt;/li&gt;&lt;li&gt;F.M. Scherer, &lt;em&gt;The Political Economy of Patent Policy Reform in the United States&lt;/em&gt;, 7 Colorado J. Telecomm. High Tech. L. 167 (2009)&lt;/li&gt;&lt;li&gt;Henry Steck, &lt;em&gt;Corporatization of the University: Seeking Conceptual Clarity&lt;/em&gt;, 585 Annals of Am. Acad. Pol. &amp;amp; Soc. Sci. 66 (2003)&lt;/li&gt;&lt;li&gt;Jason Owen-Smith, &lt;em&gt;Trends and Transitions in the Institutional Environment for Public and Private Science&lt;/em&gt;, 49 Higher Educ. 91 (2005)&lt;/li&gt;&lt;li&gt;Jerry G. Thursby &amp;amp; Marie C. Thursby, &lt;em&gt;University Licensing and the Bayh-Dole Act&lt;/em&gt;, 301 Science 1052 (2003)&lt;/li&gt;&lt;li&gt;Jerry G. Thursby &amp;amp; Marie C. Thursby, &lt;em&gt;Who is Selling the Ivory Tower? Sources of Growth in University Licensing&lt;/em&gt;, 48 Mgmt. Sci. 90 (2002)&lt;/li&gt;&lt;li&gt;Josh Lerner,&lt;em&gt; Review of 'Ivory Tower'&lt;/em&gt;, 43 J. Econ. Litt. 510 (2005)&lt;/li&gt;&lt;li&gt;Joshua B. Powers,&lt;em&gt; R&amp;amp;D Funding Source and University Technology Transfer: What is Stimulating Universities to Be More Entrepreneurial?&lt;/em&gt;, 45 Research in Higher Educ. 1 (2004)&lt;/li&gt;&lt;li&gt;Lita Nelsen, &lt;em&gt;The Rise of Intellectual Property Protection in the American University&lt;/em&gt;, 279 Science 1460 (1998)&lt;/li&gt;&lt;li&gt;Marcia Angell &amp;amp; Arnold S. Relman, &lt;em&gt;Patents, Profits &amp;amp; American Medicine: Conflicts of Interest in the Testing &amp;amp; Marketing of New Drugs&lt;/em&gt;, 131 Daedalus 102 (2002)&lt;/li&gt;&lt;li&gt;Maria Jelenik, &lt;em&gt;Review: Two Books on Technology Transfer&lt;/em&gt;, 50 Admin. Sci. Q. 131 (2005) (Review of '&lt;em&gt;Ivory Tower&lt;/em&gt;')&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.sciencemag.org/cgi/content/full/280/5364/698"&gt;Michael
A. Heller &amp;amp; Rebecca S. Eisenberg, Can Patents Deter Innovation? The
Anticommons in Biomedical Research, 280 Science 698 (1998)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Rebecca Henderson, et al., &lt;em&gt;Universities as a Source of Commercia Technology: A Detailed Analsis of University Patenting, 1965-1988&lt;/em&gt;, 80 Rev. Econ. Statistics 119 (1998)&lt;/li&gt;&lt;li&gt;Rebecca S. Eisenberg, &lt;em&gt;Public Research and Private Development: Patents and Technology Transfer in Government-Sponsorded Research&lt;/em&gt;, 82 Virginia L. Rev. 1663 (1996)&lt;/li&gt;&lt;li&gt;Rebecca S. Eisenberg &amp;amp; Richard R. Nelson, &lt;em&gt;Public vs. Proprietary Science: A Fruitful Tension?&lt;/em&gt;, 131 Daedalus 89 (2002)&lt;/li&gt;&lt;li&gt;Richard Jensen &amp;amp; Marie Thursby,&lt;em&gt; Proofs and Prototypes for Sale: The Licensing of University Inventions&lt;/em&gt;, 91 Am. Econ. Rev. 240 (2001)&lt;/li&gt;&lt;li&gt;Roberto Mazzoleni &amp;amp; Richard R. Nelson, &lt;em&gt;Economic Theories about the Benefits and Costs of Patents&lt;/em&gt;, 32 J. Econ. Issues 1031 (1998)&lt;/li&gt;&lt;li&gt;Thomas A. Massaro,&lt;em&gt; Innovation, Technology Transfer, and Patent Policy: The University Contribution&lt;/em&gt;, 82 Virginia L. Rev. 1729 (1996)&lt;/li&gt;&lt;li&gt;Walter W. Powell &amp;amp; Jason Owen-Smith, &lt;em&gt;Universities and the Market for Intellectual Property in the Life Sciences&lt;/em&gt;, 17 J. Pol'y Analysis Mgmt. 253 (1998)&lt;/li&gt;&lt;li&gt;William M. Sage, &lt;em&gt;Funding Fairness: Public Investment, Proprietary Rights and Access to Health Care Technology&lt;/em&gt;, 82 Virginia L. Rev. 1737 (1996)&lt;/li&gt;&lt;li&gt;Zach W. Hall &amp;amp; Christopher Scott, &lt;em&gt;University-Industry Partnership&lt;/em&gt;, 291 Science 553 (2001)&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;strong&gt;Resources&lt;/strong&gt;
&lt;ul&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.researchoninnovation.org/tiip/archive/issue2003_5.htm"&gt;TIIP Newsletter: Patents and University Technology Transfer (2003) &lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.bayhdole25.org"&gt;Bay-Dole 25&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;img src="file:///C:/Users/REBECCA/AppData/Local/Temp/moz-screenshot.png" alt="" /&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/publications/pupfip/why-no-pupfip'&gt;https://cis-india.org/a2k/publications/pupfip/why-no-pupfip&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Bayh-Dole</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Access to Medicine</dc:subject>
    
    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>PUPFIP</dc:subject>
    
    
        <dc:subject>Patents</dc:subject>
    
    
        <dc:subject>Publications</dc:subject>
    

   <dc:date>2011-09-12T11:03:09Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/arguments-against-software-patents">
    <title>Arguments Against Software Patents in India</title>
    <link>https://cis-india.org/a2k/blogs/arguments-against-software-patents</link>
    <description>
        &lt;b&gt;CIS believes that software patents are harmful for the software industry and for consumers.  In this post, Pranesh Prakash looks at the philosophical, legal and practical reasons for holding such a position in India.  This is a slightly modified version of a presentation made by Pranesh Prakash at the iTechLaw conference in Bangalore on February 5, 2010, as part of a panel discussing software patents in India, the United States, and the European Union.&lt;/b&gt;
        
&lt;p&gt;This blog post is based on a presentation made at the &lt;a href="http://www.itechlaw-india.com/"&gt;iTechLaw conference&lt;/a&gt; held on February 5, 2010.  The audience consisted of lawyers from various corporations and corporate law firms.  As is their wont, most lawyers when dealing with software patents get straight to an analysis of law governing the patenting of computer programmes in India and elsewhere, and seeing whether any loopholes exist and can be exploited to patent software.  It was refreshing to see at least some lawyers actually going into questions of the need for patents to cover computer programs.  In my presentation, I made a multi-pronged case against software patents: (1) philosophical justification against software patents based on the nature of software; (2) legal case against software patents; (3) practical reasons against software patents.&lt;/p&gt;
&lt;h2&gt;Preamble&lt;/h2&gt;
&lt;p&gt;Through these arguments, it is sought to be shown that patentability of software is not some arcane, technical question of law, but is a real issue that affect the continued production of new software and the everyday life of the coder/hacker/software programmer/engineer as well as consumers of software (which is, I may remind you, everywhere from your pacemaker to your phone).  A preamble to the arguments would note that the main question to ask is: &lt;strong&gt;why should we allow for patenting of software&lt;/strong&gt;?  Answering this question will lead us to ask: &lt;strong&gt;who benefits from patenting of software&lt;/strong&gt;.  The conclusion that I come to is that patenting of software helps three categories of people: (1) those large software corporations that already have a large number of software patents; (2) those corporations that do not create software, but only trade in patents / sue on the basis of patents ("patent trolls"); (3) patent lawyers.  How they don't help small and medium enterprises nor society at large (since they deter, rather than further invention) will be borne out by the rest of these arguments, especially the section on practical reasons against software patents.&lt;/p&gt;
&lt;h2&gt;What are Patents?&lt;/h2&gt;
&lt;p&gt;Patents are a twenty-year monopoly granted by the State on any invention.  An invention has to have at least four characteristics: (0) patentable subject matter; (1) novelty (it has to be new); (2) inventive step / non-obviousness (even if new, it should not be obvious); (3) application to industry.  A monopoly over that invention, thus means that if person X has invented something, then I may not use the core parts of that invention ("the essential claims") in my own invention.  This prohibition applies even if I have come upon my invention without having known about X's invention.  (Thus, independent creation is not a defence to patent infringement.  This distinguishes it, for instance, from copyright law in which two people who created the same work independently of each other can both assert copyright.)  Patents cover non-abstract ideas/functionality while copyright covers specific expressions of ideas.  To clarify: imagine I make a drawing of a particular machine and describe the procedure of making it.  Under patent law, no one else can make that particular machine, while under copyright law, no one can copy that drawing.&lt;/p&gt;
&lt;h2&gt;Philosophical Justification Against Software Patents&lt;/h2&gt;
&lt;p&gt;Even without going into the case against patents &lt;em&gt;per se&lt;/em&gt; (lack of independent creation as a defence; lack of 'harm' as a criterion leading to internalization of all positive externalities; lack of effective disclosure and publication; etc.), which has been done much more ably by others like &lt;a href="http://www.researchoninnovation.org/"&gt;Bessen &amp;amp; Meurer&lt;/a&gt; (especially in their book &lt;a href="http://researchoninnovation.org/dopatentswork/"&gt;Patent Failure&lt;/a&gt;) and &lt;a href="http://www.againstmonopoly.org/"&gt;Boldrin &amp;amp; Levine&lt;/a&gt; (in their book &lt;a href="http://levine.sscnet.ucla.edu/general/intellectual/againstnew.htm"&gt;Against Intellectual Monopoly&lt;/a&gt;, the full text of which is available online).&lt;/p&gt;
&lt;p&gt;But there is one essentially philosophical argument against software as subject matter of a patent.  Software/computer programs ("instructions for a computer"), as any software engineer would tell you, are merely &lt;a href="http://en.wikipedia.org/wiki/Algorithm"&gt;algorithms&lt;/a&gt; ("an effective method for solving a problem using a finite sequence of instructions") that are meant to be understood by a computer or a human who knows how to read that code.&lt;/p&gt;
&lt;p&gt;Algorithms are not patentable subject matter, as they are mere expressions of abstract ideas, and not inventions in themselves.  Computer programs, similarly, are abstract ideas.  They only stop being abstract ideas when embodied in a machine or a process in which it is the machine/process that is the essential claim and not the software.  That machine or process being patented would not grant protection to the software itself, but to the whole machine or process.  Thus the abstract part of that machine/process (i.e., the computer program) could be used in any other machine/process, as it it is not the subject matter of the patent.  Importantly, just because software is required to operate some machine would then not mean that the machine itself is not patentable, just that the software cannot be patented in guise of patenting a machine.&lt;/p&gt;
&lt;h2&gt;Legal Case Against Software Patents&lt;/h2&gt;
&lt;p&gt;In India, section 3(k) of the Patent Act reads:&lt;/p&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;(3) The following are not inventions within the meaning of this Act: (k) a mathematical or business method or computer programme (&lt;em&gt;sic&lt;/em&gt;) &lt;em&gt;per se&lt;/em&gt; or algorithms.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;As one can see, computer programs are place in the same category as "mathematical methods", "algorithms", and "business methods", hence giving legal validity to the idea propounded in the previous section that computer programs are a kind of algorithms (just as algorithms are a kind of mathematical method).&lt;/p&gt;
&lt;p&gt;Be that as it may, the best legal minds in India have had to work hard at understanding what exactly "computer programme &lt;em&gt;per se&lt;/em&gt;" means.  They have cited U.S. case law, U.K. case law, E.U. precedents, and sought to arrive at an understanding of how &lt;em&gt;per se&lt;/em&gt; should be understood.  While understanding what &lt;em&gt;per se&lt;/em&gt; means might be a difficult job, it is much easier to see what it does &lt;em&gt;not&lt;/em&gt; mean.  For that, we can look at the 2004 Patent Ordinance that Parliament rejected in 2005.  In that ordinance, sections 3(k) and (ka) read as follows:&lt;/p&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;(3) The following are not inventions within the meaning of this Act: (k) a computer programme &lt;em&gt;per se&lt;/em&gt; other than its technical application to industry or a combination with hardware; (ka) a mathematical method or a business method or algorithms.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Thus, it is clear that the interpretation that "computer programme &lt;em&gt;per se&lt;/em&gt;" excludes "a computer programme that has technical application to industry" and "a computer programme in combination with hardware" is wrong.  By rejecting the 2004 Ordinance wording, Parliament has clearly shown that "technical application to industry" and "combination with hardware" do not make a computer programme patentable subject matter.&lt;/p&gt;
&lt;p&gt;Indeed, what exactly is "technical application to industry"?  &lt;a href="http://wordnetweb.princeton.edu/perl/webwn?s=technical"&gt;"Technical"&lt;/a&gt; has various definitions, and a perusal through those definitions would show that barely any computer program can be said not to relate to a technique, not involve "specialized knowledge of applied arts and sciences" (it is code, after all; not everyone can write good algorithms), or not relate to "a practical subject that is organized according to scientific principles" or is "technological".  Similarly, all software is, &lt;a href="http://wordnetweb.princeton.edu/perl/webwn?s=software"&gt;by definition&lt;/a&gt;, meant to be used in combination with hardware.  Thus, it being used in combination with hardware must not, as argued above, give rise to patentability of otherwise unpatentable subject matter category.&lt;/p&gt;
&lt;p&gt;In 2008, the Patent Office published a new 'Draft Manual Of Patent Practice And Procedure' in which it sought to allow patenting of certain method claims for software inventions (while earlier the Patent Office objected to method claims, allowing only device claims with hardware components).  This Draft Manual was withdrawn from circulation, with Shri N.N. Prasad (then Joint Secretary of DIPP, the department administering the Patent Office) noting that the parts of the Manual on sections 3(d) and 3(k) had generated a lot of controversy, and were &lt;em&gt;ultra vires&lt;/em&gt; the scope of the Manual (which could not override the Patent Act).  He promised that those parts would be dropped and the Manual would be re-written.  A revised draft of the Manual has not yet been released.  Thus the interpretation provided in the Draft Manual (which was based heavily on the interpretation of the U.K. courts) cannot not be relied upon as a basis for arguments in favour of the patentability of software in India.&lt;/p&gt;
&lt;p&gt;In October 2008, CIS helped organize a &lt;a href="https://cis-india.org/advocacy/openness/blog/the-national-public-meeting-on-software-patents"&gt;National Public Meeting on Software Patents&lt;/a&gt; in which Indian academics, industry, scientists, and FOSS enthusiasts all came to the conclusion that software patents are harmful for &lt;a href="https://cis-india.org/openness/software-patents/software-patenting-will-harm-industry-consumer"&gt;both the industry as well as consumers&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;Practical Reasons Against Software Patents&lt;/h2&gt;
&lt;p&gt;This is going to be an attempt at distilling and simplifying some of the main practical arguments against patenting of software.&lt;/p&gt;
&lt;p&gt;There are traditionally &lt;a href="http://www.patenthawk.com/blog/2005/04/patent_economics_part_4_incent.html"&gt;four incentives that the patent system caters to&lt;/a&gt;: (1) incentive to invent; (2) incentive to disclose; (3) incentive to commercialize; and (4) incentive to invent substitutes.  Apart from the last, patenting of software does not really aid any of them.&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;h3&gt;Patent Landmines / Submarine Patents / Patent Gridlocks / No Exception for Independent Creation&lt;/h3&gt;
&lt;p&gt;Given that computer programs are algorithms, having monopolies over such abstract ideas is detrimental to innovation.  Just the metaphors say a lot about software patents: landmines (they cannot be seen/predicted); submarines (they surface out of the blue); gridlocks (because there are so many software patents around the same area of computing, they prevent further innovation in that area, since no program can be written without violating one patent or the other).&lt;/p&gt;
&lt;p&gt;Imagine the madness that would have ensued had patents been granted when computer programming was in its infancy.  Imagine different methods of sorting (quick sort, bubble sort) that are part of Computer Science 101 had been patented.  While those particular instances aren't, similar algorithms, such as data compression algorithms (including the infamous &lt;a href="http://en.wikipedia.org/wiki/LZW"&gt;LZW compression method&lt;/a&gt;), have been granted patents.  Most importantly, even if one codes certain functionality into software independently of the patent holder, that is still violative of the patent.  Computer programs being granted patents makes it extremely difficult to create other computer programs that are based on the same abstract ideas.  Thus incentives # (1) and (3) are not fulfilled, and indeed, they are harmed.  There is no incentive to invent, as one would always be violating one patent or the other.  Given that, there is no incentive to commercialize what one has invented, because of fear of patent infringement suits.&lt;/p&gt;
&lt;p&gt;An apt illustration of this is the current difficulty of choosing a royalty-free video format for HTML 5, as it shows, in practical terms, how difficult it is to create a video format without violating one patent or the other.  While the PNG image format was created to side-step the patent over the LZW compression method used in the GIF image format, bringing Ogg Theora or Dirac (both patent-free video format) to surpass the levels of H.264/MPEG-4 AVC or VC-1 will be very difficult without infringing dozens if not hundreds of software patents.   Chris DiBona of Google, while talking about &lt;a href="http://www.mail-archive.com/whatwg@lists.whatwg.org/msg15476.html"&gt;improving Ogg Theora&lt;/a&gt; as part of its inclusion in HTML 5 specifications said, "Here’s the challenge: Can Theora move forward without infringing on the other video compression patents?"  Just &lt;a href="http://74.125.153.132/search?q=cache:jRnXmHcZCMsJ:www.mpegla.com/Lists/MPEG%2520LA%2520News%2520List/Attachments/140/n_03-11-17_avc.html+http://www.mpegla.com/news/n_03-11-17_avc.html&amp;amp;cd=2&amp;amp;hl=en&amp;amp;ct=clnk&amp;amp;gl=in"&gt;the number of companies and organization that hold patents over H.264&lt;/a&gt; is astounding, and includes: Columbia University, Electronics and Telecommunications Research Institute of Korea (ETRI), France Télécom, Fujitsu, LG Electronics, Matsushita, Mitsubishi, Microsoft, Motorola, Nokia, Philips, Robert Bosch GmbH, Samsung, Sharp, Sony, Toshiba, and Victor Company of Japan (JVC).  As is the amount of royalties to be paid ("[t]he maximum royalty for these rights payable by an Enterprise (company and greater than 50% owned subsidiaries) is $3.5 million per year in 2005-2006, $4.25 million per year in 2007-08 and $5 million per year in 2009-10"; with royalty per unit of a decoder-encoder costing upto USD 0.20.)&lt;/p&gt;
&lt;p&gt;Indeed, even the most diligent companies cannot guard themselves against software patents.  FFII estimates that a very simple online shopping website &lt;a href="http://webshop.ffii.org"&gt;would violate twenty different patents at the very least&lt;/a&gt;. Microsoft recently lost a case against i4i when i4i surfaced with a patent covering custom XML as implemented in MS Office 2003 and MS Office 2007.  As a result Microsoft had to ship patches to its millions of customers, to disable the functionality and bypass that patent.  The manufacturers of BlackBerry, the Canadian company Research in Motion, had to shell out &lt;a href="http://en.wikipedia.org/wiki/NTP,_Inc.#RIM_patent_infringement_litigation"&gt;USD 617 million as settlement&lt;/a&gt; to NTP over wireless push e-mail, as it was otherwise faced with the possibility of the court shutting down the BlackBerry service in the U.S.  This happened despite there being a well-known method of doing so pre-dating the NTP patents.  NTP has also filed cases against AT&amp;amp;T, Sprint Nextel, T-Mobile, Verizon Wireless, and Palm Inc.  &lt;a href="http://copyfight.corante.com/archives/2005/12/15/rimntp_mud_splashes_microsoft.php"&gt;Microsoft was also hit by Visto Corporation&lt;/a&gt; over those same NTP patents, which had been licensed to Visto (a startup).&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;h4&gt;Don't These Cases Show How Software Patents Help Small Companies?&lt;/h4&gt;
&lt;p&gt;The astute reader might be tempted to ask: are not all of these examples of small companies getting their dues from larger companies?  Doesn't all of this show that software patents actually help small and medium enterprises (SMEs)?  The answer to that is: no.  To see why, we need to note the common thread binding i4i, NTP, and Visto.  None of them were, at the time of their lawsuits, actually creating new software, and NTP was an out-and-out "non-practising entity"/"patent holding company" AKA, patent troll.  i4i was in the process of closing shop, and Visto had just started up.  None of these were actually practising the patent.  None of these were producing any other software.  Thus, none of these companies had anything to lose by going after big companies.  In other words, the likes of Microsoft, RIM, Verizon, AT&amp;amp;T, etc., could not file counter-suits of patent infringement, which is normally what happens when SMEs try to assert patent rights against larger corporations.  For every patent that the large corporation violates of the smaller corporation, the smaler corporation would be violating at least ten of the larger corporation's.  Software patents are more helpful for software companies as a tool for cross-licensing rather than as a way of earning royalties.  Even this does not work as a strategy against patent trolls.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Thus, the assertion that was made at the beginning is borne out: software patents help only patent trolls, large corporations that already have large software patent portfolios, and the lawyers who draft these patents and later argue them out in court.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;h3&gt;Term of Patents&lt;/h3&gt;
&lt;p&gt;Twenty years of monopoly rights is outright ludicrous in an industry where the rate of turnover of technology is much faster -- anywhere between two years and five months.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;h3&gt;Software Industry Progressed Greatly Without Patents&lt;/h3&gt;
&lt;p&gt;In India, software patents have never been asserted in courts (even though many have been &lt;a href="https://cis-india.org/advocacy/openness/blog/the-national-public-meeting-on-software-patents"&gt;illegally granted&lt;/a&gt;), yet the software industry in India is growing in leaps and bounds.  Similarly, most of the big (American) giants of the software industry today grew to their stature by using copyright to "protect" their software, and not patents.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;h3&gt;Copyright Exists for Software&lt;/h3&gt;
&lt;p&gt;As noted above, the code/expression of any software is internationally protected by copyright law.  There is no reason to protect the ideas/functionality of that software as well.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;h3&gt;Insufficient Disclosure&lt;/h3&gt;
&lt;p&gt;When ordinary computer programmers cannot understand what a particular software patent covers (which is the overwhelming case), then the patent is of no use.  One of the main incentives of the patent system is to encourage gifted inventors to share their genius with the world.  It is not about gifted inventors paying equally gifted lawyers to obfuscate their inventions into gobbledygook so that other gifted inventors can at best hazard a guess as to precisely what is and is not covered by that patent.  Thus, this incentive (#2) is not fulfilled by the current system of patents either -- not unless there is a major overhaul of the system.  This ties in with the impossibility of ensuring that one is not violating a software patent.  If a reasonably smart software developer (who are often working as individuals, and as part of SMEs) cannot quickly ascertain whether one is violating patents, then there is a huge disincentive against developing software in that area at all.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;h3&gt;Software Patents Work Against Free/Libre/Open Source Software&lt;/h3&gt;
&lt;p&gt;Software patents hinder the development of software and FOSS licences, as the licensee is not allowed to restrict the rights of the sub-licensees over and above the restrictions that the licensee has to observe.  Thus, all patent clearances obtained by the licensee must be passed on to the sub-licensees.  Thus, patented software, though most countries around the world do not recognize them, are generally not included in the default builds of many FOSS operating systems.  This inhabits the general adoption of FOSS, since many of the software patents, even though not enforceable in India, are paid heed to by the software that Indians download, and the MP3 and DivX formats are not enabled by default in standard installations of a Linux OS such as Ubuntu.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;h2&gt;Conclusion&lt;/h2&gt;
&lt;p&gt;Currently, the U.S. patent system is being reviewed at the administrative level, the legislative level, as well as the judicial level.  At the judicial level, the question of business method patents (and, by extension, software patents) is before the Supreme Court of the United States of America in the form of &lt;a href="http://en.wikipedia.org/wiki/Bilski_v._Kappos"&gt;&lt;em&gt;Bilski v. Kappos&lt;/em&gt;&lt;/a&gt;.  Judge Mayer of the Court of Appeals for the Federal Circuit (CAFC, which heard &lt;em&gt;In re Bilksi&lt;/em&gt;) noted that "the patent system has run amok".  The Free Software Foundation submitted a most extensive &lt;a href="http://endsoftpatents.org/amicus-bilski-2009"&gt;&lt;em&gt;amicus curiae&lt;/em&gt; brief&lt;/a&gt; to the U.S. Supreme Court, filled with brilliant analysis of software patents and arguments against the patentability of software that is well worth a read.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/arguments-against-software-patents'&gt;https://cis-india.org/a2k/blogs/arguments-against-software-patents&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Standards</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Software Patents</dc:subject>
    
    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>Publications</dc:subject>
    
    
        <dc:subject>Patents</dc:subject>
    

   <dc:date>2012-03-13T10:43:12Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/histories-of-the-internet/blogs/archives-and-access/archives-and-access">
    <title>Archives and Access</title>
    <link>https://cis-india.org/raw/histories-of-the-internet/blogs/archives-and-access/archives-and-access</link>
    <description>
        &lt;b&gt;The monograph by Aparna Balachandran and Rochelle Pinto, is a material history of the Internet archives. It examines the role of the archivist and the changing relationship between the state and private archives for looking at the politics of subversion, preservation and value of archiving. By examining the Tamil Nadu and Goa state archives, along with the larger public and state archives in the country, the monograph looks at the materiality of archiving, the ambitions and aspirations of an archive, and why it is necessary to preserve archives, not as historical artefacts but as living interactive spaces of memory and remembrance. The findings have direct implications on various government and market impulses to digitise archives and show a clear link between opening up archives and other knowledge sources for breathing life into local and alternative histories.
&lt;/b&gt;
        
&lt;p&gt;&lt;a href="https://cis-india.org/raw/histories-of-the-internet/blogs/archives-and-access/archives-and-access.pdf" class="internal-link" title="Archives and Access"&gt;Download the Monograph&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/histories-of-the-internet/blogs/archives-and-access/archives-and-access'&gt;https://cis-india.org/raw/histories-of-the-internet/blogs/archives-and-access/archives-and-access&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>RAW Publications</dc:subject>
    
    
        <dc:subject>Publications</dc:subject>
    
    
        <dc:subject>Histories of Internet</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Internet Histories</dc:subject>
    
    
        <dc:subject>Archives</dc:subject>
    

   <dc:date>2015-04-17T11:06:20Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/anushree-gupta-ladies-log-women-safety-risk-transfer-ridehailing">
    <title>Anushree Gupta - Ladies ‘Log’: Women’s Safety and Risk Transfer in Ridehailing</title>
    <link>https://cis-india.org/raw/anushree-gupta-ladies-log-women-safety-risk-transfer-ridehailing</link>
    <description>
        &lt;b&gt;Working in the gig-economy has been associated with economic vulnerabilities. However, there are also moral and affective vulnerabilities as workers find their worth measured everyday by their performance of—and at—work and in every interaction and movement. This essay by Anushree Gupta is the third among a series of writings by researchers associated with the 'Mapping Digital Labour in India' project at the CIS, supported by the Azim Premji University, that were published on the Platypus blog of the Committee on the Anthropology of Science, Technology, and Computing (CASTAC). The essay is edited by Noopur Raval, who co-led the project concerned.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Originally published by the &lt;a href="http://blog.castac.org/category/series/indias-gig-work-economy/" target="_blank"&gt;Platypus blog&lt;/a&gt; of CASTAC on August, 1, 2019.&lt;/em&gt;&lt;/p&gt;
&lt;h4&gt;Summary of the essay in Hindi: &lt;a href="https://www.youtube.com/watch?v=ty0a_u9lzCE" target="_blank"&gt;Audio&lt;/a&gt; (YouTube) and &lt;a href="http://blog.castac.org/wp-content/uploads/sites/2/2019/07/Blog-Post-Audio-Transcript-Devanigiri.docx" target="_blank"&gt;Transcript&lt;/a&gt; (text)&lt;/h4&gt;
&lt;hr /&gt;
&lt;p&gt;Mumbai, India’s financial capital, is also often considered one of the safest cities for women in India, especially in contrast with New Delhi which is infamously dubbed as the “rape capital” within the country. Sensationalised incidents of harassment, molestation and rape serve as anecdotal references and warnings to other women who dare to venture out alone even during the daytime. The Delhi government recently proposed a policy for free transport for women in public buses and metro trains with the objective of increasing women’s affordability and access and to ensure safety in public transportation. [1] Despite such measures to increase women’s visibility and claims to public utilities and spaces, women who use public transport have historically suffered groping and stalking on buses and trains, which uphold self-policing and surveillance narratives. The issue of women’s safety in India remains a priority as well as a good rhetorical claim and goal to aspire to, for public and private initiatives. Ironically, the notion of women’s safety is also advanced to increase moral policing and censure women’s access to public spaces, which also perpetuates exclusion of other marginalised citizens (Phadke 2007). Further, and crucially, whose safety is being imagined, prioritized and designed for (which class of women are central to the imagination of the safety discourse) is often a point of contention.&lt;/p&gt;
&lt;p&gt;In this context, ridehailing services offered by Uber and Ola have come to be frequently cited as safer and more reliable options for women to traverse the cityspace, compared to overcrowded buses and trains. Their mobile applications promise accountability and traceability, enforcing safety standards by way of qualified and well-groomed drivers, SOS buttons and location-sharing features. However, it has increasingly become common knowledge that these alternatives are prone to similar, if not worse, categories of crimes against women. While reports of violence against women in cabs have mostly been outside of Mumbai, due to “platform-effects,” such incidents have widespread ramifications for drivers across the country. Cab drivers who operate via cab aggregator platforms have come under heavy scrutiny not only by the corporate and legal infrastructures of aggregator companies but also in the public eye.  On the other hand, platform companies independently, and in partnership with city and state administrations, continue to launch “social impact” initiatives aimed at women’s safety as well as employment (through taxi-driving training). [2] Incidents of violence against women present jarring narratives of risk not only for female passengers but also for the platform-workers, both of whom are responsible for abiding by the constructed notions of safety for women in urban spaces.&lt;/p&gt;
&lt;p&gt;In this post, I explore women’s presence as workers as well as passengers/customers in the ridehailing platform economy, in the context of women’s safety, situating the analysis with a focus on Mumbai. The related discourses around risk for female commuters give rise to various interventions and women-centric services through female-only cab enterprises and training more women drivers to mitigate this risk. Through these, I will think through the figure of the woman in the ridehailing economy in Mumbai and by extension in India.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Platforms in Gendered Cityscapes&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Mumbai’s public transport is comprised of the local train network, BEST buses and auto rickshaws, with the metro being the newest addition to the mix. Unlike in most of India, kaali-peelis (black-yellow cabs) have been a permanent feature of Mumbai’s landscape since the 1950s and, taking a cab is not necessarily a luxury. Against this backdrop, platform companies have sought to make the claims of democratizing public transport and providing safer travel options to women in the city.&lt;/p&gt;
&lt;p&gt;Cab drivers on ridehailing platforms in Mumbai are usually domestic male migrants or Muslim drivers from within and outside the city, who are more often than not overworked and stressed due to the falling incomes and rising debts. It is important to recognise the ‘veiled masculinities’ (Chopra 2006) which labor to service the emergent platform economy and the hierarchies of caste and class which are sustained through their labor. The incongruence between the masculinity of a working class man and the demands of the service economy (Nixon 2009) exacerbates emotional pressures in customer-facing services, which can offer an explanation for angry outbursts and conflicts between drivers and customers.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;img src="https://cis-india.org/CIS_APU_DigitalLabour_PlatypusEssays_AG_01.jpg/image_preview" alt="CIS_APU_DigitalLabour_PlatypusEssays_AG_01" class="image-left image-inline" title="CIS_APU_DigitalLabour_PlatypusEssays_AG_01" /&gt;
&lt;h5&gt;Uber’s ad on a billboard in Mumbai promises earnings of more than Rs. 1 lakh per month. Using a woman’s image illustrates the extent of their potential for transforming lives and livelihoods. &lt;em&gt;Source: Drivers’ Union Telegram Group&lt;/em&gt;.&lt;/h5&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;While Uber and Ola claim that a large number of women drivers work on their platforms, actual experiences of passengers and the male drivers I spoke to, suggested otherwise. Ironically, mass driver-training programs are seen as a quick way to make low-skilled and migrant male workers employable in Indian cities while, despite public-private partnerships to train women, it has been impossible to retain women drivers due to stereotypical perceptions of gender and persistent social stigma. [3] This made the ridehailing passenger woman (upper middle class, affording professional) a stakeholder to design for, while female drivers (but all female workers) appeared as liability for platforms.&lt;/p&gt;
&lt;p&gt;These narratives speak directly to the construction of insecurity and risk for women (Berrington and Jones 2002) on public transport systems as they highlight vulnerabilities due to public exposure of women’s bodies. Pandering to a moral panic standpoint and creating personalised or ‘inside’ safe spaces for women to manage risk (Green and Singleton 2006), these platforms can then be imagined as a boundary-setting exercise. Access to public spaces is encouraged but it is delimited by confining the woman’s body to a singular vehicle in the custody of the cab driver. Autonomy and access afforded by the platform manages to transform women—particularly upper class and upper caste women who can afford these services—into potential customers. Their agency is bounded though by tasking the driver to ferry her across the otherwise hostile cityscape filled with ‘unfriendly bodies’ (Phadke 2013). The production of the city’s gendered space goes hand in hand with the confinement/erasure of female bodies in the public space as they embody patriarchal norms even in a city as ‘progressive’ as Mumbai. As demonstrated by studies mapping the movement of women in the city (Ranade 2007), the spatio-temporal factors lend themselves to creating gendered bodies in order to keep patriarchal norms intact. These norms, as I argue in this post, are detrimental not just to women but also other marginalised sections of the urban population, in this case platform workers.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Terms of Safety&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Male drivers’ social identities as lower class, lower caste individuals do not inspire confidence in the standards of safety boasted by these companies in the eyes of their predominantly upper caste and upper class customer base. Risk to female passengers is further exaggerated due to the closed space in which the service is provided, highlighting the proximity to a potential aggressor by way of these platforms. In specific situations wherein a female passenger is inebriated or is travelling alone at night, drivers report being extra cautious and helpful towards her. Many respondents proudly mention going out of their way to make sure women get home safely, for instance, prolonging waiting time or escorting them to the entrance of their residential buildings or involving the security guard at the gate.&lt;/p&gt;
&lt;p&gt;However, there have also been cases wherein the driver has been under scrutiny either by an overly careful passenger or by the public. One driver reported being surrounded by a crowd at a traffic signal, only to realise that he was being suspected of foul play with the female passenger who had fallen asleep on the backseat of the car. In contrast to their western counterparts, the class differences between drivers and passengers in India exacerbate doubts, fears and insecurities in India which tend to take a caste-purity angle as well. The woman’s body undergoes an exchange of custody in these instances wherein she is deemed incapable of taking care of herself and requires external assistance. Imagining a deterrence effect of ridesharing services (Park et. al 2017) reinforces the logic of guardianship and protectionism for the woman. The risk of carrying her in the vehicle in these situations is borne by the cab driver, operating under a framework of overbearing protectiveness which holds him culpable for any misgivings, assumed or otherwise.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;img src="https://cis-india.org/CIS_APU_DigitalLabour_PlatypusEssays_AG_02.jpg/image_preview" alt="CIS_APU_DigitalLabour_PlatypusEssays_AG_02" class="image-left image-inline" title="CIS_APU_DigitalLabour_PlatypusEssays_AG_02" /&gt;
&lt;h5&gt;Cautionary listicles advise women to not take a cab alone at night, carrying pepper sprays/umbrellas as tools for self-defence, refrain from conversations with drivers or talk continuously on the phone, among other things. The onus of the woman’s safety is either on the individual herself or the driver who is ferrying her. Moreover, the driver is a likely assailant whom the woman should guard against as well. &lt;em&gt;Source: &lt;a href="https://www.hellotravel.com/stories/10-ways-for-women-to-ensure-safety-when-boarding-cab" target="_blank"&gt;HelloTravel&lt;/a&gt;&lt;/em&gt;.&lt;/h5&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Notions of safety and risk are embodied in everyday interactions in urban spaces and mediated by disparate infrastructures of knowledge across distinctions of caste, class and gender. These distinctions define constraints which govern social interactions between actors of these categories. Interactions between lower caste or Muslim men and upper caste/class women are circumscribed by what Tuan (1979) describes as ‘landscapes of fear’. Be it the apprehensions about sharing a ride with a passenger of the opposite sex (Sarriera et. al 2017) or reports of gang-rapes by cab drivers, the boundaries of social conduct are laid out clearly by constructing narratives of risk and safety. The protection of the female body and her sexual safety is not her responsibility alone but that of the society as a whole. The so called preventive measures for rape and violence against women produce the dichotomies of frailty and strength (Campbell 2005) in so far as they project the woman as always at risk with the shadow of a potential assault always looming large.&lt;/p&gt;
&lt;p&gt;When asked about interactions with women as customers or fellow drivers, drivers performed exaggerated respectability for women. The catch in these narratives however was that drivers justified and extended respect only to ‘good’ customers, where a ‘good’ woman was a certain kind of a moral actor.&lt;/p&gt;
&lt;p&gt;Given the prevailing discontent with redressal mechanisms for workers on the platforms, it was not surprising to witness a group of drivers at the Uber Seva Kendra (help centre) in Mumbai, debating whether they should be accepting requests from any female customers at all. Drivers also had to attend mandatory training sessions for ‘good conduct’ with customers wherein they underwent behavioral correction and gender sensitisation lessons. [4] The gendering of the platform economy is baked into these instructions and trainings that reproduce male drivers as figures of safety and constant positive affect.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Gender, Safety, and Enterprise&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;In my fieldwork, I also came across a slew of ventures run by fleet owners and others that sought to service women passengers and employ women drivers exclusively. Claiming to fill in the gaps of inadequate vetting mechanisms in existing platforms, these alternate ventures purportedly smoothened out some anxieties by eliminating the risk of interacting with a man from different socio-economic strata. The premium charged by these companies was telling of the value of safety and affordability of these services for a large section of their intended audience, namely women with higher disposable incomes residing in metropolitan cities.&lt;/p&gt;
&lt;p&gt;On the flipside, these enterprises encouraged women to break stereotypical perceptions about women drivers, also giving a nod to increasing and diversifying opportunities of employment for women. However, these ideas remained attractive only in principle and fizzled out sooner or later as most of these ventures did not succeed. A severe capital crunch due to unsustainable business models, limited funding options and lack of substantial supportive ecosystems for training and upkeep are possible reasons for failure. [5] Even so, the idea of a women-centric service continues to remain valuable because of the promise of safety which is produced through considerations of class, caste, gender and religion (Phadke 2005). Any alternative to avoid interaction with men from a lower class or caste background or from another religion (especially Hindu/Muslim in Mumbai) is welcome in a society which is deeply stratified and entrenched in caste-class systems of religion and economy alike.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Conclusion&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;The pervasiveness of the discourses of safety and risk in the ride hailing space became apparent to me during field research. Respondents indicated a heightened awareness of my gender, referring to me as “madam” and taking measures to ensure my safety. They advised me to use a separate phone to interact with drivers and moderated my interactions with drivers on the Telegram group (run by one of the Unions in Mumbai). Union representatives were also diligent in moderating the group to filter out abusive language as a token of respect for women. My apprehensions in interacting with drivers, most of whom were older men from a lower class/caste community, were also indicative of my social conditioning as an upper class and upper caste woman. Self-policing and boundary setting in both physical and virtual interactions, while necessary to some extent, were often rendered useless as the shifting of risks became apparent to me in my interactions with the drivers.&lt;/p&gt;
&lt;p&gt;In this piece, I have tried to show how gendered norms govern the construction of safety and risk which in turn regulate social interactions. Limiting exposure in a personal cab as opposed to a public bus/train also heightens considerations of intimacy and proximity to a potential aggressor (often from a marginalised sociocultural background). Women-centric cab services mitigate this by promoting the image of the female driver who breaks social norms. However, these services dwindle till they completely disappear due to a capital crunch or insufficient infrastructural support. Patriarchal contexts reaffirm the woman as a risky object by highlighting narratives of vulnerabilities and insecurities in the ridehailing space. Besides the woman, the cab drivers are held accountable for bearing this risk and ensuring her sexual and physical safety. These patriarchal hierarchies of protectionism are sustained by platform workers’ affective labour which lubricate the wheels of the platform economy.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Endnotes&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;[1] &lt;a href="https://www.thehindu.com/news/cities/Delhi/free-rides-for-women-only-the-starting-point-say-activists/article28111938.ece" target="_blank"&gt;https://www.thehindu.com/news/cities/Delhi/free-rides-for-women-only-the-starting-point-say-activists/article28111938.ece&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[2] &lt;a href="https://www.olacabs.com/media/in/press/ola-foundation-launches-drive-to-enable-sustainable-livelihoods-for-500000-women-by-2025" target="_blank"&gt;https://www.olacabs.com/media/in/press/ola-foundation-launches-drive-to-enable-sustainable-livelihoods-for-500000-women-by-2025&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[3] &lt;a href="https://www.buzzfeed.com/soniathomas/girl-power" target="_blank"&gt;https://www.buzzfeed.com/soniathomas/girl-power&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[4] &lt;a href="https://yourstory.com/2018/11/uber-gender-awareness-sensitisation-driver" target="_blank"&gt;https://yourstory.com/2018/11/uber-gender-awareness-sensitisation-driver&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[5] &lt;a href="https://www.livemint.com/Companies/bo4534H8mOWo0oG6VQ0xbM/As-demand-for-womenonly-cab-services-grow-challenges-loom.html" target="_blank"&gt;https://www.livemint.com/Companies/bo4534H8mOWo0oG6VQ0xbM/As-demand-for-womenonly-cab-services-grow-challenges-loom.html&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;References&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Berrington, E. and Jones, H., 2002. Reality vs. myth: Constructions of women’s insecurity. Feminist Media Studies, 2(3), pp.307-323.&lt;/p&gt;
&lt;p&gt;Campbell, A., 2005. Keeping the ‘lady’ safe: The regulation of femininity through crime prevention literature. Critical Criminology, 13(2), pp.119-140.&lt;/p&gt;
&lt;p&gt;Chopra, R., 2006. Invisible men: Masculinity, sexuality, and male domestic Labor. Men and Masculinities, 9(2), pp.152-167.&lt;/p&gt;
&lt;p&gt;Green, E. and Singleton, C., 2006. Risky bodies at leisure: Young women negotiating space and place. Sociology, 40(5), pp.853-871.&lt;/p&gt;
&lt;p&gt;Nixon, D., 2009. I Can’t Put a Smiley Face On’: Working‐Class Masculinity, Emotional Labour and Service Work in the ‘New Economy. Gender, Work &amp;amp; Organization, 16(3), pp.300-322.&lt;/p&gt;
&lt;p&gt;Park, J., Kim, J., Pang, M.S. and Lee, B., 2017. Offender or guardian? An empirical analysis of ride-sharing and sexual assault. An Empirical Analysis of Ride-Sharing and Sexual Assault (April 10, 2017). KAIST College of Business Working Paper Series, (2017-006), pp.18-010.&lt;/p&gt;
&lt;p&gt;Phadke, S., 2005. ‘You Can Be Lonely in a Crowd’ The Production of Safety in Mumbai. Indian Journal of Gender Studies, 12(1), pp.41-62.&lt;/p&gt;
&lt;p&gt;Phadke, S., 2007. Dangerous liaisons: Women and men: Risk and reputation in Mumbai. Economic and Political Weekly, pp.1510-1518.&lt;/p&gt;
&lt;p&gt;Phadke, S., 2013. Unfriendly bodies, hostile cities: Reflections on loitering and gendered public space. Economic and Political Weekly, pp.50-59.&lt;/p&gt;
&lt;p&gt;Ranade, S., 2007. The way she moves: Mapping the everyday production of gender-space. Economic and Political Weekly, pp.1519-1526.&lt;/p&gt;
&lt;p&gt;Raval, N. and Dourish, P., 2016, February. Standing out from the crowd: Emotional labor, body labor, and temporal labor in ridesharing. In Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work &amp;amp; Social Computing (pp. 97-107). ACM.&lt;/p&gt;
&lt;p&gt;Sarriera, J.M., Álvarez, G.E., Blynn, K., Alesbury, A., Scully, T. and Zhao, J., 2017. To share or not to share: Investigating the social aspects of dynamic ridesharing. Transportation Research Record, 2605(1), pp.109-117.&lt;/p&gt;
&lt;p&gt;Tuan, Y.F., 2013. Landscapes of fear. U of Minnesota Press.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/anushree-gupta-ladies-log-women-safety-risk-transfer-ridehailing'&gt;https://cis-india.org/raw/anushree-gupta-ladies-log-women-safety-risk-transfer-ridehailing&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Anushree Gupta</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Labour</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Platform-Work</dc:subject>
    
    
        <dc:subject>Network Economies</dc:subject>
    
    
        <dc:subject>Publications</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Mapping Digital Labour in India</dc:subject>
    

   <dc:date>2020-05-19T06:29:12Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/copyright-bill-analysis">
    <title>Analysis of the Copyright (Amendment) Bill, 2010</title>
    <link>https://cis-india.org/a2k/blogs/copyright-bill-analysis</link>
    <description>
        &lt;b&gt;CIS analyses the Copyright (Amendment) Bill, 2010, from a public interest perspective to sift the good from the bad, and importantly to point out what crucial amendments should be considered but have not been so far.&lt;/b&gt;
        
&lt;p&gt;


	
	
	
	

The full submission that CIS and 21 other civil society organizations made to the Rajya Sabha Standing Committee on HRD (which is studying the Bill) is &lt;a title="Copyright Bill Analysis" class="internal-link" href="http://www.cis-india.org/advocacy/ipr/upload/copyright-bill-submission"&gt;available here&lt;/a&gt;.&amp;nbsp; Given below is the summary of our submissions:&lt;/p&gt;
&lt;h2 class="western"&gt;Existing Copyright Act&lt;/h2&gt;
&lt;p align="JUSTIFY"&gt;The Indian Copyright
Act, 1957 has been designed from the perspective of a developing
country. It has always attempted a balance between various kinds of
interests. It has always sought to ensure that rights of authors of
creative works is carefully promoted alongside the public interest
served by wide availability and usability of that material. For
instance, our Copyright Act has provisions for: &lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p align="JUSTIFY"&gt;compulsory and
	statutory licensing: recognizing its importance in making works
	available, especially making them available at an affordable rate.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="JUSTIFY"&gt;cover versions:
	recognizing that more players lead to a more vibrant music industry.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="JUSTIFY"&gt;widely-worded
	right of fair dealing for private use: recognizing that individual
	use and large-scale commercial misuse are different.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p align="JUSTIFY"&gt;These provisions of
our Act &lt;a class="external-link" href="http://a2knetwork.org/watchlist/report/india"&gt;have been lauded&lt;/a&gt;,&lt;sup&gt;&lt;a class="sdfootnoteanc" name="sdfootnote1anc" href="#sdfootnote1sym"&gt;&lt;/a&gt;&lt;/sup&gt;
and India has been rated as &lt;a class="external-link" href="http://a2knetwork.org/summary-report-2010"&gt;the most balanced copyright system in a
global survey&lt;/a&gt;&lt;sup&gt;&lt;a class="sdfootnoteanc" name="sdfootnote2anc" href="#sdfootnote2sym"&gt;&lt;/a&gt;&lt;/sup&gt;
conducted of over 34 countries by &lt;a class="external-link" href="http://www.consumersinternational.org/"&gt;Consumers International&lt;/a&gt;&lt;sup&gt;&lt;a class="sdfootnoteanc" name="sdfootnote3anc" href="#sdfootnote3sym"&gt;&lt;/a&gt;&lt;/sup&gt;.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The Indian Parliament
has always sought to be responsive to changing technologies by paying
heed to both the democratisation of access as well as the securing of
the interests of copyright holders. This approach needs to be lauded,
and importantly, needs to be maintained.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;br /&gt;&lt;/p&gt;
&lt;h2 class="western"&gt;Proposed Amendments&lt;/h2&gt;
&lt;h3 class="western"&gt;Some positive amendments&lt;/h3&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p align="JUSTIFY"&gt;&lt;strong&gt;Fair
	Dealings, Parallel Importation, Non-commercial Rental&lt;/strong&gt;: All works
	(including sound recordings and cinematograph films) are now covered
	the fair dealings clause (except computer programmes), and a few
	other exceptions; parallel importation is now clearly allowed; and
	non-commercial rental has become a limitation in some cases.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="JUSTIFY"&gt;&lt;strong&gt;Persons with
	disabilities&lt;/strong&gt;: There is finally an attempt at addressing the
	concerns of persons with disabilities.  But the provisions are
	completely useless the way they are currently worded.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="JUSTIFY"&gt;&lt;strong&gt;Public
	Libraries&lt;/strong&gt;: They can now make electronic copies of works they
	own, and some other beneficial changes relating to public libraries.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="JUSTIFY"&gt;&lt;strong&gt;Education&lt;/strong&gt;:
	Some exceptions related to education have been broadened (scope of
	works, &amp;amp; scope of use).&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="JUSTIFY"&gt;&lt;strong&gt;Statutory and
	compulsory licensing&lt;/strong&gt;: Some new statutory licensing provisions
	(including for radio broadcasting) and some streamlining of existing
	compulsory licensing provisions.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="JUSTIFY"&gt;&lt;strong&gt;Copyright
	societies&lt;/strong&gt;: These are now responsible to authors and not owners
	of works.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="JUSTIFY"&gt;&lt;strong&gt;Open
	licences&lt;/strong&gt;: Free and Open Source Software and Open Content
	licensing is now simpler.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="JUSTIFY"&gt;&lt;strong&gt;Partial
	exemption of online intermediaries&lt;/strong&gt;:
	Transient and incidental storage of copyrighted works has
	been excepted, mostly for the benefit of online intermediaries.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="JUSTIFY"&gt;&lt;strong&gt;Performer’s
	rights&lt;/strong&gt;: The general, and confusing, exclusive right that
	performers had to communicate their performance to the public has
	been removed, and instead only the exclusive right to communicate
	sound/video recordings remains.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="JUSTIFY"&gt;&lt;strong&gt;Enforcement&lt;/strong&gt;:
	Provisions on border measures have been made better, and less prone
	to abuse and prevention of legitimate trade.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;h3 class="western"&gt;&lt;br /&gt;&lt;/h3&gt;
&lt;h3 class="western"&gt;Some negative amendments&lt;/h3&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p align="JUSTIFY"&gt;&lt;strong&gt;WCT and WPPT
	compliance&lt;/strong&gt;: India has not signed either of these two treaties,
	which impose TRIPS-plus copyright protection, but without any
	corresponding increase in fair dealing / fair use rights.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="JUSTIFY"&gt;&lt;strong&gt;Increase in
	duration of copyright&lt;/strong&gt;: This will significantly reduce the public
	domain, which India has been arguing for internationally.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="JUSTIFY"&gt;&lt;strong&gt;Technological
	Protection Measures&lt;/strong&gt;: TPMs, which have been shown to be
	anti-consumer in all countries in which they have been introduced,
	are sought to be brought into Indian law.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="JUSTIFY"&gt;&lt;strong&gt;Version
	recordings&lt;/strong&gt;: The amendments make cover version much more
	difficult to produce.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="JUSTIFY"&gt;&lt;strong&gt;Moral rights&lt;/strong&gt;:
	Changes have been made to author’s moral rights (and performer’s
	moral rights have been introduced) but these have been made without
	requisite safeguards.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;h3 class="western"&gt;&lt;br /&gt;&lt;/h3&gt;
&lt;h3 class="western"&gt;Missed opportunities&lt;/h3&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p align="JUSTIFY"&gt;&lt;strong&gt;Government-funded
	works&lt;/strong&gt;: Taxpayers are still not free to use works that were paid
	for by them.  This goes against the direction that India has elected
	to march towards with the Right to Information Act.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="JUSTIFY"&gt;&lt;strong&gt;Copyright
	terms&lt;/strong&gt;: The duration of all copyrights are above the minimum
	required by our international obligations, thus decreasing the
	public domain which is crucial for all scientific and cultural
	progress.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="JUSTIFY"&gt;&lt;strong&gt;Criminal
	provisions&lt;/strong&gt;: Our law still criminalises individual,
	non-commercial copyright infringement.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="JUSTIFY"&gt;&lt;strong&gt;Libraries and
	archives&lt;/strong&gt;: The exceptions for ‘public libraries’ are still
	too narrow in what they perceive as ‘public libraries’.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="JUSTIFY"&gt;&lt;strong&gt;Educational
	exceptions&lt;/strong&gt;: The exceptions for education still do not fully
	embrace distance and digital education.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="JUSTIFY"&gt;&lt;strong&gt;Communication
	to the public&lt;/strong&gt;: No clear definition is given of what constitute a
	‘public’, and no distinction is drawn between commercial and
	non-commercial ‘public’ communication.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="JUSTIFY"&gt;&lt;strong&gt;Internet
	intermediaries&lt;/strong&gt;: More protections are required to be granted to
	Internet intermediaries to ensure that non-market based
	peer-production projects such as Wikipedia, and other forms of
	social media and grassroots innovation are not stifled.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="JUSTIFY"&gt;&lt;strong&gt;Fair dealing
	and fair use&lt;/strong&gt;: We would benefit greatly if, apart from the
	specific exceptions provided for in the Act, more general guidelines
	were also provided as to what do not constitute infringement.  This
	would not take away from the existing exceptions.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p align="JUSTIFY"&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/copyright-bill-analysis'&gt;https://cis-india.org/a2k/blogs/copyright-bill-analysis&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Consumer Rights</dc:subject>
    
    
        <dc:subject>Copyright</dc:subject>
    
    
        <dc:subject>Fair Dealings</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>RTI</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Broadcasting</dc:subject>
    
    
        <dc:subject>Publications</dc:subject>
    
    
        <dc:subject>Submissions</dc:subject>
    
    
        <dc:subject>Technological Protection Measures</dc:subject>
    

   <dc:date>2011-09-21T06:01:54Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
