<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 101 to 106.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/telecom/knowledge-repository-on-internet-access/institute-on-internet-and-society-event-report"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/digital-natives/blog/hivos-knowledge-programme-june-14-2013-nishant-shah-whose-change-is-it-anyway"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-welcomes-standing-committee-report-on-it-rules"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/analyzing-latest-list-of-blocked-urls-by-dot"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/five-faqs-on-amended-itrs"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/breaking-down-section-66-a-of-the-it-act"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/telecom/knowledge-repository-on-internet-access/institute-on-internet-and-society-event-report">
    <title>Institute on Internet &amp; Society: Event Report</title>
    <link>https://cis-india.org/telecom/knowledge-repository-on-internet-access/institute-on-internet-and-society-event-report</link>
    <description>
        &lt;b&gt;The Institute on Internet and Society organized by the Centre for Internet and Society (CIS) with grant supported by the Ford Foundation took place from June 8 to 14, 2013 at the Golden Palms Resort in Bangalore.&lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;A total of 20 participants spent the seven days in a residential institute, learning about the fundamental technologies of the Internet and topics on which CIS has expertise on such as Accessibility, Openness, Privacy, Digital Natives and Internet Governance.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The participants belonged to various stakeholder groups and it provided a common forum (first of its kind in India) to discuss and share ideas. Twenty-four expert speakers from various domains came to share their knowledge and speak about their work, so as to encourage activity in the field and supply resources from which participants could learn to increase their accessibility, range and funding possibilities, as well as network with the speakers and amongst themselves.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The Institute has triggered a&amp;nbsp; number of follow-up events — those that the participants organized themselves with the help of CIS staff, including Crypto Parties in Bangalore, Delhi and Mumbai, that taught netizens to keep their online communication private. In addition to that, the CIS Access2Knowledge (A2K) team could rope in eight new Wikipedians who will contribute to Wikipedia in Indic languages.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The day wise talks and activities that took place are listed below:&lt;/p&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify;"&gt;Day 1: June 8, 2013&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;The seven day residential Institute began on Saturday, the 8th of June with a warm welcome by Dr. Ravina Aggarwal and Dr. Nirmita Narasimhan. They outlined the purpose of the residential institute and briefly went over the topics which would get covered over the week long duration. This was followed by each of the participants introducing themselves briefly and also stating their expectations from the Institute, why they were attending the same and what they hope to get at the end.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Session 1: History of the Internet&lt;/h3&gt;
&lt;p&gt;(by Pranesh Prakash and Bernadette Längle)&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/Pranesh.png/@@images/539b71f7-111a-4700-a90b-17cbdb5589bc.png" alt="" class="image-inline" title="Pranesh Prakash" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Above is a picture of Pranesh Prakash &lt;br /&gt;speaking about the History of the Internet during &lt;br /&gt;the first session on Day 1.&lt;/em&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify;"&gt;The Institute proceedings kicked off with the first session, &lt;strong&gt;History of the Internet&lt;/strong&gt; by Pranesh Prakash and Bernadette Längle. Participants learned where the Internet originally came from and how it is organized, as well as different technologies surrounding the Internet. Pranesh Prakash and Bernadette Längle set the start point of the Internet in the late 50's when the Russians send the first satellite in space (Sputnik) and the US founded the DARPA(&lt;em&gt;Defense Advanced Research Projects Agency&lt;/em&gt;), a research agency that was tasked with creating new technologies for military use. DARPA is credited with development of many technologies which have had a major effect on the world, including computer networking, as well as NLS, which was both the first hypertext system, and an important precursor to the contemporary ubiquitous graphical user interface (GUI). A few years later the first four computers were connected to a network.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;After the Network Control Protocol (NCP, later replaced by the TCP/IP)  was invented in 1970, the first applications were made: email  (connecting people), telnet (connecting computers) and the file  transport protocol (FTP) (connecting information) — all of these are  still in use today. Participants were surprised to learn that the Web,  most commonly used today, known to be invented by one single person in  the 90's, actually existed for a long time prior to the '90s.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/p4iFqDnhNZI" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;h3 style="text-align: justify;"&gt;Session 2: Domestic Bodies and Mechanisms&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;(by Pranesh Prakash)&lt;br /&gt;After lunch, Pranesh Prakash led the second session about Domestic Bodies and Mechanisms and he started with some of the problems associated with the Domestic Regulatory Bodies:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Lack of coherence and consistency in Internet related policies&lt;/li&gt;
&lt;li&gt;Rather than co-operating, the different agencies compete with each other.&lt;/li&gt;
&lt;li&gt;Communication with the public is of different degrees and openness of different agencies varies.&lt;/li&gt;&lt;/ol&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;Department of Electronics and Information Technology (DEITY), is one of the most important public agencies &amp;amp; the CERT-in focuses on issues like malware and content regulation. There is also the STQC (Standard Setting and Quality Setting Body).&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The work of these organizations is to govern the Internet, bring about better privacy policies and ensure freedom of speech.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Other governing bodies include DOT (Department of Telecommunications) which governs the telecom and internet policies of India. In India, certain content regulation takes place under a notification as part of the IT Act, 2003.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;TRAI (Telecom Regulatory Authority of India) also looks into the tariff, interconnections and quality of telecom sector, spectrum regulation and so on.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The USOF (Universal Service Obligation Fund) seeks to provide funds for setting up telecom services in rural areas.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Ministry of Information and Broadcasting (MIB) has been extending copyright restrictions to online publications.&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; VIDEO&lt;br /&gt;&lt;/h3&gt;
&lt;iframe src="//www.youtube.com/embed/e0VlI12fODE" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;h3&gt;Session 3: Emerging trends in Internet usage in India&lt;/h3&gt;
&lt;p&gt;(by Nandini C and Vir Kamal Chopra)&lt;br /&gt;&lt;strong&gt;Emerging Trends in Internet Usage with specific focus on BSNL offerings&lt;/strong&gt; (by Vir Kamal Chopra)&lt;br /&gt;Some of the salient points discussed were:&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;In 1995, the VSNL provided internet in 4 metros of India, by 1998 DOT had provided internet in 42 cities.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Some of the facilities internet provides include Tele-education, Tele-medicine, mobile banking, payment of bills via mobile internet, etc.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; BSNL has got maximum broadband market share in India.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Present Scenario, there are 900 million mobiles in India, 430 million wireless connections with capability to access data.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; The total broadband connections are 15 million in country, 10 million provided by BSNL.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Total internet users are 120 million with a growth rate of 30%.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Public access is not only about network intermediaries but about info-mediaries who understand internet.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; BSNL lost Rs 18,000 crores from 3G license.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; 2G to 3G shifting is not seamless and leads to lot of packet loss, and 3G coverage is not as extensive as 2G. Thus 3G is not efficient however; the government has made a lot of money from selling 3G licenses.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Future trends include technology trends for internet access, optical fiber technologies, fiber to the curb, fibre to the home, metro Ethernet, etc. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Internet has created an online Public sphere.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; In 2000 Parliament passed the Information Technology Act 2000 and the dot.com boom is seen.&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Making internet access meaningful in the Indian Context&lt;/strong&gt; (by Nandini.C) &lt;br /&gt;(&lt;a class="external-link" href="http://internet-institute.in/repository/womens-access-to-the-internet"&gt;Click to see the presentation slides&lt;/a&gt;)&lt;br /&gt;Some of the salient points discussed were: &lt;br /&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt; &lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;Status of internet access today sees&amp;nbsp;low level of overall penetration of internet, high rate of household mobile penetration and&amp;nbsp;huge rural-urban divide in internet access.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Relationship b/w women and internet in India&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; 8.4% of women in India have access to internet in India and 43% of women using internet in India perceived it as being an important part of their life.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Some area of concerns include ensuring adequate access of internet for the women, entrenched patriarchies, contextual relevance, the imaginary of ‘public access’.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The importance of an existing strong social support network, ITC itself cannot open up economic/social empowerment opportunities for women&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; ICT-enabled micro-enterprises may also force the burden of double work on women, who undertake both productive activities for the micro-enterprise and re/productive activities for the household.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; The Internet today has created an online public sphere.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Countering the threat of online violence.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Censorship and content regulation.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Women’s rights and the spaces of internet governance.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Arbitrary censorship and self-regulation by the corporate and slide towards an illusory freedom; state is used as a bogeyman by corporate to create an online culture that is suitable to the corporate values.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;iframe src="http://www.youtube.com/embed/CUaGZh5nNR4" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;div id="_mcePaste" style="text-align: justify;"&gt;&lt;strong&gt;﻿Activity&lt;/strong&gt;&lt;br /&gt;Day 1 featured an interesting activity called the Creative Handshake. The goal of the game was to teach the participants the concept of "Handshake" in Internet terms and why it is important to make sure that integrity of data transferred is maintained.&lt;/div&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify;"&gt;Day 2: June 9, 2013&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;The focus of the second day was more on the nuts and bolts behind the working of the Internet by Dr. Nadeem Akhtar, Wireless Technologies and a case-study in Air Jaldi by Michael Ginguld, Collaborative Knowledge base building by Vishnu Vardhan and Affordable Devices on the Internet by Ravikiran Annaswamy.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The salient points of each of the talks are listed below.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Session 1: How Internet Works&lt;/h3&gt;
&lt;p&gt;(by Nadeem Akhtar)&lt;br /&gt;&lt;a class="external-link" href="http://internet-institute.in/repository/how-internet-works"&gt;Click to read the presentation slides&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Internet structure and hierarchy:&lt;br /&gt;
&lt;ol&gt;
&lt;li style="text-align: justify;"&gt;Data Networks comprise of set of nodes, connected by transmission links, for exchange of data between nodes. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Some of the key principles which underpin data networks include digital transmission, multiplexing and data forwarding/routing.&lt;/li&gt;&lt;/ol&gt;
&lt;/li&gt;
&lt;li&gt;Data networks through ownership include public and private networks.&lt;/li&gt;
&lt;li&gt;Data networks through coverage include local area networks (small area), metro area networks (may comprise of a city) and wide area networks (wide geographic area across cities).&lt;/li&gt;
&lt;li&gt;Protocols include:&lt;br /&gt;
&lt;ol&gt;
&lt;li style="text-align: justify;"&gt;Open systems interconnection (OSI) model divides a communication system into smaller parts. Each part is referred to as a layer. Similar communication functions are grouped into logical layers.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;OSI model defines the different stages that data must go through to travel from one device to another over a network &amp;amp; this enables a modular approach towards developing complex system functionality i.e. functionality at layer X does not depend on how layer Y is implemented.&lt;/li&gt;&lt;/ol&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Nadeem.png" alt="" class="image-inline" title="Nadeem Akhtar" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;em&gt;Above is a picture of Dr. Nadeem Akhtar speaking on the working of the internet on Day 2&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/li&gt;
&lt;li&gt;Internet networks or connections.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Internet backbone refers to the principal data routes between large, strategically interconnected networks and core routers on the internet and these data routes are hosted by commercial, government, academic and other high-capacity network centers, the internet exchange points and network access points. The internet back bone is decentralized.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Transit Service - Passing information from small ISP to large ISP.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Peering Service - The passing of information between two similar ISP’s os similar size to let network traffic pass.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Three levels of network Tier1, Tier2 and Tier 3. TATA Company is the only Tier 1 Indian Company.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Backhaul- Transport Links which connects access edge networks with the ‘core’ network. The transmitters have to be mounted on a high level. &lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/8skb7ykF9jI" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;h3&gt;Session 2: Wireless Technologies&lt;/h3&gt;
&lt;p&gt;(by Michael Ginguld)&lt;br /&gt;&lt;a class="external-link" href="http://prezi.com/tjaiatxtz1ch/walking-on-the-wireless-side/"&gt;Click to read the presentation slides&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;We are surrounded by electromagnetic radiation&lt;/li&gt;
&lt;li&gt;All about transmission waves and there are both advantages and disadvantages of the same:&lt;br /&gt;
&lt;ol&gt;
&lt;li style="text-align: justify;"&gt;Pros: higher reach for lower price, overcomes topographic challenges, lower maintenance, less to damage/lose&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Cons: limited resources, maintenance (energy), physical limitations to transfer rates.&lt;/li&gt;&lt;/ol&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Satellite/VSAT is a very small aperture tech: a small satellite dish that connects to a geo-static satellite.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Strength: globally usable, can connect from anywhere.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Weakness: signal problems, relatively high installation charge, upstream connection is lower than the downstream, transmitter on satellite is extremely expensive, hence limitation on transmission capacity of the satellite.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; VSATs are not scalable. It is a dead-end tech for usages where data transmission volume is expected to grow.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; 2G Technology for mobile connection.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Limitation in transfer of data, due to technology and encryption limitations but great availability and reasonable price.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;3G Technology has a problem in India; low uptake, leading to low investment, leading to low speed, leading to low uptake. The technology allows for high-speed data transfer but the market condition in India still does not make adequate infrastructural support feasible.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;4G license auction.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;A company bought the country-wide 4G license in the auction. Mukesh Ambani bought the company after some days.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The present legislation does not allow for VoIP-based Telco operation but that is expected to change soon.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Wifi technology is wireless technology. It is low cost wireless transfer of data.&amp;nbsp; The Public dissemination of the ranges in which data transfer using the WiFi protocol can take place.&amp;nbsp; It was made public in India in January 2005.&lt;br /&gt;
&lt;ol&gt;
&lt;li&gt;Limitations: needs line of sight, limit to data transfer.&lt;/li&gt;
&lt;li&gt;Strength: cheap, de-licensed spectrum usage, easily deployable. &lt;/li&gt;&lt;/ol&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; 2G spectrum, 3G spectrum and now 4G spectrum all are part of the wireless technology.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Air Jaldi started in Dharamshala; building wifi connection spanning campuses.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Three types of consumer categories: (1) no coverage, (2) under-served, and (3) ‘deserving clients’. #2 is the most common group. #3 are people who should be served but cannot pay fully for the service, hence are cross-subsidised by group #2.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Deployed and managed by local staff, trained by AirJaldi.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Customer premise equipment: Rs. 3-4k.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; User charges: Rs 975 per month for 512 kbps, Rs 1500 per month for 1 mbps.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Content: by and large, AirJaldi brings infrastructure on which content can ride on, teams with various content providers (like e-learning, rural BPOs, local e-banking etc) for the content side. The biggest drivers are local BPO, banking and retail. The next big driver coming up is entertainment.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; WiMax includes 4g spectrum. &lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/btd4MqOSRe0" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;h3 style="text-align: justify;"&gt;Session 3: Building Knowledge Bases and Platform via Mass Collaboration on the Internet&lt;/h3&gt;
&lt;p&gt;&lt;a class="external-link" href="http://commons.wikimedia.org/wiki/File:Building_Knowledge_Bases_and_Platforms_via_Mass_Collaboration_on_the_Internet.pdf"&gt;Click to read the presentation slides&lt;/a&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify;"&gt;
&lt;p&gt;The session started off with some physical activity in the form of "Kasa Kasa Warte, Chan Chan Warte" to break off the lunch induced sleep and a mental activity where the participants were divided into two groups and both the groups were asked to collect information on "Water". One group was left to itself while the other had some expert inputs from Vishnu Vardhan on how to collaborate and organize the data. After the activity, both teams presented the information that they had collected on "Water".&lt;/p&gt;
&lt;p&gt;The benefits of collaborative authoring such as "everyone's voice  is heard", "various inputs leading to a multi-dimensional thinking" etc  were evident as against a single dimensional thought process that was  seen from the group that was un-assisted.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/Participant.png/@@images/0bd8de0e-6e85-4100-80c7-070dd046fabf.png" alt="" class="image-inline" title="Participants" /&gt;&lt;br /&gt;&lt;em&gt;Given above is a picture of the participants involved in a group activity&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt; &lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Salient points discussed during the presentation:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt; &lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;The Concept of Knowledge today is not something of modern phenomena, but it is something which has been existent since print culture was developed.&amp;nbsp; Print technology shapes what we consider as knowledge, and hence as knowledge platform &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Techno-sociality of knowledge production&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The Concept of Knowledge today is not something of modern phenomena, but it is something which has been existent since print culture was developed.&amp;nbsp; Print technology shapes what we consider as knowledge, and hence as knowledge platform &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Techno-sociality of knowledge production&lt;br /&gt;Examples of knowledge platforms:&lt;br /&gt;
&lt;ol&gt;
&lt;li&gt;Baidu baike &lt;/li&gt;
&lt;li&gt; English wikipedia &lt;/li&gt;
&lt;li&gt; Hudong &lt;/li&gt;
&lt;li&gt;Catawiki &lt;/li&gt;
&lt;li&gt;Wikieducator &lt;/li&gt;
&lt;li&gt;Open street map &lt;/li&gt;
&lt;li&gt;Pad.ma &lt;/li&gt;
&lt;li&gt; Sahapedia &lt;/li&gt;
&lt;li&gt; Internet archive &lt;/li&gt;
&lt;li&gt; Jstor &lt;/li&gt;
&lt;li&gt; Dsal &lt;/li&gt;
&lt;li&gt; Dli&lt;/li&gt;&lt;/ol&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; In 1994 Cunningham developed the ‘Wiki Wiki Web’ also known as the ‘Ward Wiki’. Basically it is a knowledge platform.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Internet since then has been used for dissemination of information especially in the education sector. Digital Archived have developed over the years which provide information across various platforms like Wikipedia.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; The spread of the internet has made possible the building of knowledge bases by seamless and mass collaboration. &lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt; Generic challenges for Wikipedia&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Quality, relevance, consistency of knowledge &lt;/li&gt;
&lt;li&gt;Suitable motivation of the contributors&lt;/li&gt;
&lt;li&gt;Another issue is the scalability&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Some of the problems faced by Indian Wikipedian pages:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;Technical infrastructure for Indian languages &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Typing in the regional language &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;OCR: complexity of Indian language scripts&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Various other technical troubles like browser compatibility, font display, etc., which deter new users&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Dearth of quality content available in digital format&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Different standards/formats/generations (gov.in/DLI)&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Relative lack of research/academic standards, which is transferred on to Indic wikipedias. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Lack of knowledge sharing culture.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Building a mass knowledge platform is the need of the hour.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The platform should be user friendly, easily available and adoptable; offline outreach is key to effective use of online platforms.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The programme&amp;nbsp; should have feedback loop key, behavior statistics data, reinvent and replicate the programme, multi-channel awareness, ‘user connect’ programmes.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The people should communicate knowledge sharing objectives, make knowledge sharing fun, appoint ambassadors; virtual volunteer community building looks simple but its complex and leads to failure.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/2cM7CZ2hMeg" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;h3&gt;Session: 4 Affordable Devices to access the Internet&lt;/h3&gt;
&lt;p&gt;(by Ravikiran Annaswamy)&lt;br /&gt;&lt;a class="external-link" href="http://internet-institute.in/repository/MeetMobileInternet.pdf"&gt;Click to read the presentation slides&lt;/a&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/Ravikiran.png" alt="" class="image-inline" title="Ravikiran Annaswamy" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;em&gt;Given above is a picture of the speaker Ravikiran Annaswamy giving a demo of the low cost Akash tablet&lt;/em&gt;.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Overview of Affordable Mobile Phones such as Lava Iris, Karbonn A1, Nokia Asha, etc.&lt;/li&gt;
&lt;li&gt;Overview of Affordable Tablets such as Aakash, Ubislate, Karbonn Smart A34, etc.&lt;/li&gt;
&lt;li&gt; The number of Internet users in India is expected to nearly triple from 125 million in 2011 to 330 million by 2016, says a report by Boston Consulting Group.&lt;/li&gt;
&lt;li&gt; How Internet Penetration impacts society.&lt;/li&gt;
&lt;li&gt; Demo of the devices.&lt;/li&gt;
&lt;li&gt; Need for Mobile Internet&lt;/li&gt;
&lt;li&gt; Sugata Mitra &amp;amp; Arvind Eye Care examples.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/TUcbcFaX-v4" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;hr /&gt;
&lt;h2&gt;Day 3: June 10, 2013&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;The third day of the Institute focussed on Wired means of accessing the Internet, the technology involved followed by an assignment time where the participants were introduced to 2 topics and asked to work on an assignment. This was followed by a site visit in the afternoon to MapUnity. &lt;strong&gt;MapUnity&lt;/strong&gt; develops technology to tackle social problems and&amp;nbsp;development challenges. Their GIS, MIS and mobile technologies are&amp;nbsp;used mostly by government departments and civil society&amp;nbsp; organisations and in the R&amp;amp;D initiatives of commercial ventures.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Session 1: Wired Access Technology&lt;/h3&gt;
&lt;p&gt;(by Dr. Nadeem Akhtar)&lt;br /&gt;&lt;a class="external-link" href="http://internet-institute.in/repository/wired-access-nadeem-akhtar"&gt;Click to read the presentation slides&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Some of the salient points discussed were:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Wired and Wireless&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;Wired:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Separate communication channel for each users&lt;/li&gt;
&lt;li&gt; Low signal attenuation&lt;/li&gt;
&lt;li&gt; No interference&lt;/li&gt;
&lt;li&gt; Fixed point-of-attachment&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Wireless:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; Shared medium of communication&lt;/li&gt;
&lt;li&gt; Signal is attenuated by a number of factors&lt;/li&gt;
&lt;li&gt; Interference between adjacent channels&lt;/li&gt;
&lt;li&gt; Points-of-attachment can be changed on-the-fly&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Ethernet:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt; A family of computer networking technologies for LANs which was Invented in 1973 and commercially introduced in 1980.&amp;nbsp; The systems communicating over ethernet divide a stream o data into individual packets called frames. Each frame contains source and destination addresses and error-checking data so that damaged data can be detected and re-transmitted.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Ethernet, by definition, is a broadcast protocol&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Any signal can be received by all hosts&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Switching enables individual hosts to communicate&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Digital subscriber line (DSL):&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt; DSL uses existing telephone lines to transport data to internet subscribers and the term xDSL is used to refer to a number of similar yet competing forms of DSL technologies which includes ADSL, SDSL, HDSL, HDSL-2, G.SHDL, IDSL, and VDSL.&amp;nbsp; DSL service is delivered simultaneously with wired telephone service on the same telephone line and this is possible because DSL uses higher frequency bands for data.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Asymmetric DSL (ADSL):&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; ADSL is the most commonly installed technology and an&amp;nbsp;ADSL tech can provide maximum downstream speeds of up to 8 mbps.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Modem and router:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; Modem is specific to a technology&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Modem is de/modulator, it takes bits coming from one protocol/technology, demodulates it (converts it into original data), and re-modulated the original data to another protocol/technology.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Router allows creation of a local area network, allowing multiple devices to connect to the network and access internet together through the router. It has very high bitrate DSL (VDSL) and goes up to 52 mbps downstream and 16 mbps upstream. The length of the physical connection is limited to 300 meters and the second generation VDSL (CDSL2) provides data rates up to 100 mbps simultaneously in both direction, but maximum available bit rate is still achieved about 300 meters.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Cable:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt; Cable broadband uses existing CATV infrastructure to provide high-access internet access; uses channels specifically reserved for data transfer&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Support simultaneous access to broadband and TV programs&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Cable access tech is built for one-way transmission; hence some congestion takes place for bi-way data transfer, leading to much lower upstream connection relative to downstream connection for data.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Fiber:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt; It is a generic term for any broadband network architecture using optical fiber; fiber to the neighborhood; fiber to the curb;&amp;nbsp; the street cabinet is much closer to the user’s premises, typically within 300m, thus allowing ethernet or radio-based connection to the final users; fiber to the basement; fiber to the home (BSNL already providing); fiber to the desktop&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Passive optical networks (PON)&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Advantages of fiber:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; Immunity to electromagnetic interference.&lt;/li&gt;
&lt;li&gt; Provides very high data rates at long distances.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; When network links run over several 1000s of meters (e.g., metro area networks), fiber significantly outperforms copper.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Replacing at least part of these links with fiber shortens the remaining copper segments and allows them to run much faster.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; The data rate of a fiber link is typically limited by the terminal equipment rather than the fiber itself.&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Assignment&lt;/strong&gt;&lt;br /&gt;Participants were given two options for an assignment to work on in the coming days and they could choose either one.&lt;/p&gt;
&lt;p&gt;Assignment A&lt;br /&gt;The Universal Service Obligation Fund of India has put out a Call for Proposals under two schemes:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Mobile Connectivity and ICT related livelihood skills for womens’ SHGs (&lt;a href="http://www.usof.gov.in/usof-cms/pdf21may/Concept_Paper.pdf%29"&gt;http://www.usof.gov.in/usof-cms/pdf21may/Concept_Paper.pdf)&lt;/a&gt;, and&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;Access to ICTs and ICT enabled services for persons with disabilities in rural India. (&lt;a href="http://www.usof.gov.in/usof-cms/usofsub/Concept%20paper_USOF%20Scheme_PwDs_A.G.Gulati.pdf"&gt;http://www.usof.gov.in/usof-cms/usofsub/Concept%20paper_USOF%20Scheme_PwDs_A.G.Gulati.pdf&lt;/a&gt;)&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;Your NGO is committed to the task of facilitating access to the Internet&amp;nbsp;for women/ persons with disabilities in rural parts of Kerala and wishes to submit a proposal/ project idea in partnership with a service provider to the USOF.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Assignment B&lt;strong&gt;&lt;br /&gt;You&lt;/strong&gt; are a member of the ancient tribe of Meithis residing in Manipur. Over the years, there is a strong feeling in your community that although the Government has rolled out projects to connect the rural areas throughout India, these have not been successful for your tribe and there is still even a lack of basic fixed telephony, let alone mobile and broadband services. You have hence come to the conclusion that there is a need for focused efforts to target such communities as yours and have decided to submit a concept note to the USOF requesting that ‘ethnic and rural tribal communities’ be specifically included within the mandate of the USOF’s activities by defining them as an ‘underserved community’.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Raveena.png" alt="" class="image-inline" title="Participants in Discussion" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;em&gt;Given above is a picture of the participants engaged in a discussion.&lt;/em&gt; &lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt; &lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Field Trip - Destination: MapUnity.&lt;/strong&gt; &lt;strong&gt;&lt;br /&gt;MapUnity&lt;/strong&gt; develops technology to tackle social problems and development challenges. Their GIS, MIS and mobile technologies are&amp;nbsp;used&amp;nbsp;mostly by government departments and civil society&amp;nbsp;organisations, and&amp;nbsp;in the R&amp;amp;D initiatives of commercial ventures. MapUnity presented their product offerings to the participants.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="http://blip.tv/play/AYOT%2BQwA.html?p=1" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;&lt;embed type="application/x-shockwave-flash" src="http://a.blip.tv/api.swf#AYOT+QwA" style="display:none"&gt;&lt;/embed&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify;"&gt;Day 4: June 11, 2013&lt;/h2&gt;
&lt;h3&gt;Session 1: Universal Access&lt;/h3&gt;
&lt;p&gt;(by Archana Gulati)&lt;br /&gt;&lt;a class="external-link" href="http://internet-institute.in/repository/UniversalServiceConceptsandPractices_Archana.G.Gulati.pdf"&gt;Click to read the presentation slides&lt;/a&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/Archana.png/@@images/a1f18756-20b4-4732-b032-502b59078819.png" alt="" class="image-inline" title="Archana" /&gt;&lt;br /&gt;&lt;br /&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Given above is a picture of Archana Gulati speaking on Universal Access&lt;/em&gt;.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify;"&gt;Tuesday revolved around questions of access and openness. The day kicked off with Archana Gulati, a policy expert in access to ICTs for people with disabilities talking on &lt;strong&gt;Universal Access&lt;/strong&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt; &lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Ms. Gulati stressed the importance of ICTs for social development. ICTs are a necessary aid in development structures including education, health and increased citizen participation in national affairs &amp;amp; they provide crucial knowledge inputs into productive activities. However, even with the Telecom boom, there still exists an access gap in India, which cannot be covered by commercially viable systems.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
 &lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;This 'actual access gap' exists because of geographic (scattered population, low income, low perceived utility of service, lack of commercial/industrial customers, lack of roads, power, difficult terrain, insurgency), economic (urban poor) and social inequality (gender, disabilities) differences. To achieve Universal Access or Universal Service, additional efforts must be made, so as to include these groups. However, Universal Access and Universal Service, while they may imply the same thing, are very different approaches to deal with the problematic access gap.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Universal service, a term coined by Theodore Vail, president of AT&amp;amp;T in 1906, argued that the government should enforce the usage of only one network. This approach suggests a monopolization of the market and goes against the liberal market principle.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Universal access on the other hand suggests cross-subsidizing the low and no profit service areas by high profit service areas. However, this results in the urban population to get over-charged while the rich rural areas benefit from rural subsidizing.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;So how do we enable a fair and inexpensive network to be able to create access for a large number of people equally? &lt;br /&gt;Ms. Archana Gulati went on to introduce the Sanchar Shakti scheme as a contribution to national access in India. It was initiated with the objective of improving rural SHG access skills, knowledge, financial services and markets through mobile connections and involved several stakeholders like NABARD, handset/modem manufacturers, DoT USOF, Mobile VAS Providers, Lead NGOs, Mobile Service Providers.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This scheme shows how important is, for the commercial, private and public sector to work together on obtaining accessibility to ITCs.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Session 2: Free and Open Internet&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;(by Pranesh Prakash) &lt;br /&gt;The following session by Pranesh Prakash on &lt;strong&gt;Free and Open Internet&lt;/strong&gt; showed how the internet can still be a restrictive place which does not allow for internet equality. His talk focussed on the concepts of free and open Internet. Prakash started by stating the Freedom of Speech and Expression Article of the Indian Constitution and in an interactive round it was discussed, how these articles are fundamental for securing other basic human rights. This was demonstrated by an example in which the distribution of food did not proceed equally, as misinformation and restrictions led to an inappropriate hoarding of goods. Therefore, it is important for everyone to have that right. In fact, the Indian constitution formulates Article 19 in a positive way, implying not only everyone should have that right, but that the government must promote the upholding of these rights.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;However, in the case of Article 66a, the law actually caused a problem with freedom of speech in itself, as it penalizes sending false and offensive messages through communication services. This is a massive impediment on free speech, as outsiders decide upon what is offensive and what is false.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The other side of freedom of speech and expression is censorship. Online, the removal of websites and editing of content often happens quietly and obscures the fact that someone or something is being censored. Unlike book burnings in the past, which were always made a big political spectacle, often websites are simply removed without a trace, or one is faced with a 404 error, when trying to access it. Because of the offensive content law, journals and magazines are quick to remove supposedly offensive content, as it seems more difficult to engage in argument with the people claiming offense. The CIS proposed a counter-law to secure for this to happen less, as freedom of speech includes the freedom to receive that speech.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/SGxYxLEA8OY" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;h3 style="text-align: justify;"&gt;Session 3: Openness&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;(by Sunil Abraham)&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p style="text-align: justify;"&gt;Next to ensuring freedom of speech and access, the third session of the  day focussed on Openness in terms of Open Source software. Sunil  Abraham, CIS executive director, stated the importance of free software  and open access of data, as they ensure what he called the four freedoms  of internet usage, namely the freedom to use for any purpose, the  freedom to study, to modify and to share (freely or for a fee).  Proprietary software imposes on these freedoms, as it only has  restrictive use and a strong copyright. However, there are alternatives  that have moderate copyrights, or so-called copy centred perspectives,  or even copyleft, including the above mentioned rights into the terms of  the software usage.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/copy_of_Sunil.png/@@images/92ac30ac-90da-4fcd-a0b2-0469aa2ecc75.png" alt="" class="image-inline" title="Sunil Abraham" /&gt;&lt;br /&gt;&lt;br /&gt;&lt;em&gt;Above is a picture of Sunil Abraham speaking on Openness&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;In alignment with Sunil Abraham’s talk Pranesh Prakash criticized copyright law cutting into accessibility rights, as copyright infringements include translation into other languages, audio versions and also integral parts of education. The key is not to have a "one size fits all" copyright solution, as it is impossible to treat twitter content the same as a blockbuster movie. However, the government of India is doing exactly that and needs to interlink questions of access with copyright law.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/vqv7qai5c-s" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;h3 style="text-align: justify;"&gt;Session 4: Open Content&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;(by Prof. Subbiah Arunachalam)&lt;br /&gt;Prof. Subbiah Arunachalam, who led the next session, discussed &lt;strong&gt;Open Content&lt;/strong&gt;. He had seen during the course of his experience India's poor performance in Science &amp;amp; Technology and outlined the reasons for the same. The lack of access to information essential in scientific research and knowledge production, he said, was the major limiting cause.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/BFJyUTNzYvE" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;h3 style="text-align: justify;"&gt;Session 5: Quick Talk on Copyright Law and Access&lt;/h3&gt;
&lt;p&gt;This short session dealt with implications of copyright law on internet access.&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Activity&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The participants were divided into two groups, and they were asked build as huge a network as possible with their personal belongings and present their creations. The participants had good ideas. One&amp;nbsp;group placed their mobiles and laptops into the network to&amp;nbsp;have them as nodes. The other group implemented the re-routing around&amp;nbsp;censorship.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/nSLy1eRAndQ" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Network.png" alt="" class="image-inline" title="Networking" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;em&gt;Given above is a picture of the participants in an activity making the longest network possible with their personal belongings&lt;/em&gt;.&lt;br /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify;"&gt;Day 5: (June 12, 2013)&lt;/h2&gt;
&lt;h3&gt;Session 1: Privacy on the Internet in India&lt;/h3&gt;
&lt;p&gt;(by Sunil Abraham and Elonnai Hickok)&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://internet-institute.in/repository/privacy-on-the-internet-by-elonnai"&gt;Click to view the presentation slides&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/Elonnai.png" title="Elonnai" height="211" width="317" alt="" class="image-inline" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt; &lt;em&gt;Given above is a picture of Elonnai Hickock speaking about privacy&lt;/em&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify;"&gt;
&lt;p&gt;The following day, June 12th started off with “Privacy” as the theme. The session Privacy on the Internet in India was led by CIS privacy experts Sunil Abraham and Elonnai Hickock.&lt;/p&gt;
&lt;p&gt;In an exchange of anecdotes, it was made clear how there needs to be a certain degree of state surveillance to secure the citizens safety.&lt;/p&gt;
&lt;p&gt;This can happen through off air interception and active or passive cell phone towers that can track mobile devices.&lt;/p&gt;
&lt;p&gt;However, encryption is an important tool to secure one’s own privacy against cyber espionage.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;Some of the salient points discussed were:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; Off-the Air Interception&lt;/li&gt;
&lt;li&gt; Possible to set up active or passive cell phone tower. &lt;/li&gt;
&lt;li&gt; The signal strength will be strong and everyone looks for it.&lt;/li&gt;
&lt;li&gt; Capacity to identify itself as a service provider. &lt;/li&gt;
&lt;li&gt; Interception can begin with encryption Technology today used by security agencies.&lt;/li&gt;
&lt;li&gt; NTRO- national technical Research Org and Outlook &lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/PQWi9hHHSpc" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;h3&gt;Session 2: E-Accessibility&lt;/h3&gt;
&lt;p&gt;(by Nirmita Narasimhan)&lt;br /&gt;&lt;a class="external-link" href="http://internet-institute.in/repository/eAccessibility.pdf"&gt;Click to view the presentation slides&lt;/a&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/copy_of_Eaccessibility.png" alt="" class="image-inline" title="E-accessibility" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;em&gt;Given above is a picture of Dr. Nirmita Narasimhan speaking on e-accessibility&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;The second&lt;strong&gt; &lt;/strong&gt;session was on&lt;strong&gt; “E-Accessibility” &lt;/strong&gt;led by Dr. Nirmita Narasimhan&lt;strong&gt;. &lt;/strong&gt;Some of the salient points discussed were:&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; Problems arising out of disability&lt;/li&gt;
&lt;li&gt; Accessibility-Infrastructure and ICT&lt;/li&gt;
&lt;li&gt; Assistive technologies for PWD’s.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Reasonable accommodation (not available or cannot be and requires extra effort and putting up an accessible copy up) and universal Design (for both for PWD’s and non-PWD’s).&lt;/li&gt;
&lt;li&gt; Web Content Accessibility is operable and easily understandable. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Accessibility standards include; Daisy (6 types of books including audio and text books) is all about marking up the documents. Really a good way to read but is expensive and time consuming, also need Daisy tools and player to make it work.&lt;/li&gt;
&lt;li&gt; In 1808 the first typewriter was developed to help the blind.&lt;/li&gt;
&lt;li&gt; Considerations involved in Web Accessibility &lt;/li&gt;
&lt;li&gt; Overlap b/w mobile accessibility and web accessibility.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Example- Raku Raku phone captured 60% of market share in Japan. It has many assistive features.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Relay Services has a middle man who passes on the message b/w different PWD’s in many countries, but it is not yet available in India.&lt;/li&gt;
&lt;li&gt; PWD’s communicating with customer care – the issues involved. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Accessibility Policy- very few people are adopting accessible technologies. There is a need to have a strong policy. U.K. and U.S. already have strong policies related to accessible and assistive technology for PWD’s.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;strong&gt; Video&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/vI8mixgTgCM" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;h3&gt;Session 3: International Bodies and Mechanisms&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;(by Tulika Pandey and Gaurab Raj Upadhyay)&lt;br /&gt;&lt;strong&gt;Activity&lt;/strong&gt;&lt;br /&gt;Gaurab incorporated an &lt;strong&gt;Activity&lt;/strong&gt; into his talk to enable the students to have a clearer understanding of International Bodies and Mechanisms.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Gaurab.png" alt="" class="image-inline" title="Gaurab" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;em&gt;Given above is a picture of the speaker Gaurab Raj Upadhaya explaining the International Bodies and Mechanisms&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt; &lt;/p&gt;
&lt;p&gt;Some of the salient points discussed during his talk were:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; Definition: “Internet Governance is the development and application by Govt., the private sector and civil society, in their respective roles, of shared principles, norms, rules, decision-making procedures and programmes which shape the evolution and use of internet.”&lt;/li&gt;
&lt;li&gt;It should be multilateral, transparent and democratic&lt;/li&gt;
&lt;li&gt; Enhanced cooperation means to enable govt…&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Technical issues to keep in mind while talking about internet:&lt;br /&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;ol&gt;
&lt;li&gt; Critical internet resources&lt;/li&gt;
&lt;li&gt;Root server locations &lt;/li&gt;
&lt;li&gt; Open Standards (CIS leads the initiative) &lt;/li&gt;
&lt;li&gt; Interoperability &lt;/li&gt;
&lt;li&gt; Search Engines &lt;/li&gt;
&lt;li&gt; Internationalized Domain names (in own script &amp;amp; language) &lt;/li&gt;
&lt;li&gt; Content&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Virtual yet real space&amp;nbsp;and most important question to be understood is that whether, the governance of internet is possible?&lt;/li&gt;
&lt;li&gt; Public Policy- to monitor cross-border data flow, Openness vs Privacy&lt;/li&gt;
&lt;li&gt; India’s Outlook in internet policies-Pillars of Internet which is not fully addressed by the Indian government today. &lt;/li&gt;
&lt;li&gt; Established an Inter- Ministerial Group by including various government departments into the arena.&lt;/li&gt;
&lt;li&gt; Layer 0-7 Names and Numbers&lt;/li&gt;
&lt;li&gt; Layer 8 and above&lt;/li&gt;
&lt;li&gt; Applications and Usage &lt;/li&gt;
&lt;li&gt; Legal business, policy, etc.&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;Session-4: E-Governance&lt;/h3&gt;
&lt;p&gt;(by Tulika Pandey and Sunil Abraham)&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Tulika.png" alt="" class="image-inline" title="Tulika" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;em&gt;Given above is a picture of the speaker Tulika Pandey speaking about e-Governance&lt;/em&gt; &lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;Some of the salient points discussed were:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt; Making policies in India is difficult because the population is huge and implementation at rural level is difficult.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Bombarded by Techno utopians- who believe in technology’s ability to change lives.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Techno determinants- Corruption solved through technology through open government data. More technology is better, the most sophisticated ones are the best are gross misconceptions.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Bhoomi project tried to deal with corruption at village level. Important policy change made all paper work illegal and digitized the land records etc. every action and request will be logged. But this led to creation of new corruption. Bribes were taken even before data was logged!&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; UID Project (Cobra Post Scam) around 20 public sector and 30 private banks were involved in money laundering scams. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt; People who design the systems in Delhi prepare sub-contracts&lt;strong&gt;.&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/strong&gt;VIDEO&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/Le3b-kka5Hs" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;hr /&gt;
&lt;h2&gt;Day 6: (June 13, 2013)&lt;/h2&gt;
&lt;h3&gt;Session 1: Critical Perspectives of the Internet&lt;/h3&gt;
&lt;p&gt;(by Dr. Nishant Shah)&lt;br /&gt;&lt;a class="external-link" href="http://internet-institute.in/repository/critical-perspectives-of-internet-society-dr-nishant-shah"&gt;Click to view the presentation slides&lt;/a&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify;"&gt;The sixth day of the Institute kicked off with Nishant Shah, director of research at CIS, looking into Critical Perspectives of the Internet.&amp;nbsp; Nishant made a very important distinction between the internet as infrastructure and as social network constructing alternative universes. Nonetheless it was important to stress that technology should not be alienated in the process of this separation but seen as an integral part of it, as the digital is as much part of reality as any other technology and has become essential as a technology of change that it brings about not only in scientific but also in social development. Quoting Michel Foucault, Shah argued that technology becomes influential when it changes life, labour and language, which is why research in the field should involve critical ways of thinking about body, space and community.&lt;/td&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/Nishant.png/@@images/836aa919-b1aa-4e61-86d2-2e4a6e5fc62f.png" alt="" class="image-inline" title="Nishant Shah" /&gt;&lt;br /&gt;&lt;br /&gt; &lt;em&gt;Above is a picture of Dr. Nishant Shah speaking on Critical Perspectives of the Internet.&lt;/em&gt;  &lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;The body perception can be perceived through the way bodily agencies change through technology. Technology does not necessarily taint or corrupt the body, but can also be a way to escape its confines. To put it to a point, we are all born into technology and cannot free ourselves from them, as for example pregnancy already starts with nutritional supplements, regulatory diets and exercise and essentially ends with birth technologies that do not necessarily involve only the digital - we must remember, speech is one of the oldest technologies available today.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/HAnwjxLGA-g" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;h3 style="text-align: justify;"&gt;Session 2: Strategies for Policy Intervention&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;(by Chakshu Roy)&lt;br /&gt;The second session on “Strategies for Policy Intervention” was led by Chakshu Roy. This session dealt with various ways in which policy intervention can be made and the various factors necessary to successfully engage in policy forums.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/B-tiOPu6WaU" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;h3 style="text-align: justify;"&gt;Session 3: Profile of Internet Service Providers&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;(by Satyen Gupta)&lt;br /&gt;&lt;a class="external-link" href="http://internet-institute.in/repository/profile-of-isps-by-satyen-gupta"&gt;Click to view the presentation slides&lt;/a&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/SatyenGupta.png" alt="" class="image-inline" title="Satyen Gupta" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;em&gt;Given above is a picture of Satyen Gupta speaking about Internet Service Providers&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;Satyen Gupta during his talk on “Profile of Internet Service Providers” discussed the nature, offerings and profile of various ISPs in India, their market share and dynamics.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The salient points discussed were:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;National Broadband Plans&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Spectrum Issues “Management”&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Reality check of Indian ISPs&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Broadband Definition &amp;amp; Penetration&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Roadblocks for Broadband in India, Governments Role, Regulation&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Institutional Framework for the Indian Telecom&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Broadband Access in India- Technology-Neutrality&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Satellite based DTH Services offer alternate for the Broadband via Receive Only Internet Service (ROIS)&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Broadband using DTH for Receive-only Internet&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;VSAT has the potential for significant impact on Broadband Penetration in Remote Areas&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Fixed Wireless Access- an important access technology&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Facilitating Radio Spectrum for Broadband Access&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Fiscal measures to reduce the cost of access devices, infrastructure and broadband service&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Reduction in the cost of connectivity&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;National Internet Exchange of India (NIXI) -National Internet Exchange of India (NIXI) has been set up on recommendation of TRAI by DIT, Government of India to ensure that Internet traffic, originating and destined for India, should be routed within India.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Emerging Broadband Services&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Broadband Commission for Digital Development (BCDD)-UN Targets for Universal Broadband,2015&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;NOFN India-Existing Fiber Infrastructure and Coverage by Various Service Providers&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;National Telecom Policy (NTP) 2012- Salient Features&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;State of Internet Services and ISPs in India:&lt;br /&gt;
&lt;ol&gt;
&lt;li&gt;India’s Ranking on Key Broadband Indicators&lt;/li&gt;
&lt;li&gt;Regulator’s Report – Growth of Internet in India&lt;/li&gt;
&lt;li&gt;Internet Subscribers Base &amp;amp; Market share of top 10 ISPs&lt;/li&gt;
&lt;li&gt;Technology trends for Internet/Broadband Access&lt;/li&gt;
&lt;li&gt;Internet/broadband Subscribers for top 10 states&lt;/li&gt;
&lt;li&gt;Tariff Plans for USO funded Broadband&lt;/li&gt;
&lt;li&gt;Contribution of Telcos in Development of Internet Services&lt;/li&gt;
&lt;li&gt;Incumbent’s Role in Growth of Broadband&lt;/li&gt;
&lt;li&gt;Plugging rural missing link- BBNL&lt;/li&gt;&lt;/ol&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Internet Subscribers Base &amp;amp; Market share of top 10 ISPs&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/DOSeo-ASOQ8" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;h3 style="text-align: justify;"&gt;Session 4: Competition in the Market by Helani Galpaya&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Helani Galpaya during her talk on “Competition in the Market” discussed about what competition meant, &lt;em&gt;Herfindahl–Hirschman&lt;/em&gt; Index to measure how competitive a market is, what are the dangers of monopoly markets and the landscape of the Telecom market in India.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Helani.png" alt="" class="image-inline" title="Helani" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;em&gt;Above is a picture of Helani Galpaya speaking about Competition in the Market&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify;"&gt;Day 7: (June 14, 2013)&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;The final day of the Institute focussed on how the Internet can be used to effect change on society – Activism was the theme.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Session 1: Leveraging Internet for activism&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;(by Ananth Guruswamy)&lt;br /&gt;&lt;a class="external-link" href="http://internet-institute.in/repository/LeveragingInternetforActivism.pdf"&gt;Click to read the presentation slides&lt;/a&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/AnanthGuruswamy.png" alt="" class="image-inline" title="Ananth Guruswamy" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;em&gt;Above is a picture of Ananth Guruswamy speaking during the session on leveraging internet for activism&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;Some of the salient points discussed were:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;Digital Activism&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Target Omar Abdullah. It is about an act called Administrative detention Act. One can be detained without act i.e. The Preventive Detention Act. He directly responded to the threat.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Twitter seems to be a place where the political leaders are actually accessible. This kind of access was not possible in day to day life earlier if one was a common man. This phenomenon is developing. Even in Corporate setup writing a mail directly to the CEO seems possible. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Strengths: Wide reach, Freedom of speech, Data collection is made easy, Issues can be tackled swiftly, Global communities, singular identities have lot of power. Eg: 190 Million people stood up against Poverty; this kind of mobilization impossible without internet.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Besides local issues even Global issues are addressed an collection of funds becomes easy. Onion.com once a struggling publication in U.S., but now with a global audience it is thriving and it has a healthy reader base today. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The Earth Hour helps people connect across space and time.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Weakness: More popularity, more attention; Traditional/Real Protest has become rare and a threat; There is no real action beyond internet, threat of movement is low, there is no real commitment involved in digital activism and just one click is enough to make one ‘feel good’.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Opportunities: Recruitment of protestors for real protests. Diff. b/w real and virtual blurred; anything that affects the mind space is real. The intersection is interesting.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Threats: Total removal of privacy, Government intervention in private issues and there could be misinterpretation of people’s thoughts by certain people.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Traditional vs Digital activism: Traditional fails to provide results whereas clicking a button is as easy as wearing a badge.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Facebook activism: ‘Like Buttons’, People moving away from reading emails, a shift towards use of facebook; creates a sense of belongingness which the traditional activism failed to achieve.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;India against Corruption: used mobile phone effectively.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Social Media has changed the way protests happen globally and in India, one example is Twitter. Change.org is a website which gives freedom to anybody to start a petition without any external source; Awaaz.org another such petition website.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Green Peace launched a Green peace X which was a runaway success. YouTube is another platform for the masses. People today are more interested in watching rather than reading.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Pakistan in 2007: “Flash protests”; Free Fraizan Movement on Twitter.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Something to keep in mind regarding while launching a campaign online is to think who the audience is and what we want them to do and how will the campaign help our objectives?&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;How to measure success of a social media campaign?&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Reach&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Engagement- likes, tweets, comments, etc.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Influence&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Attrition Score&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/PXZE7y1qxlo" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;h3 style="text-align: justify;"&gt;Session 2: Internet Access Activism&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;(by Parminder Jeet Singh)&lt;br /&gt;The next session on “INTERNET ACCESS” ACTIVISM by Parminder Jeet Singh dealt with how people can contribute to initiatives for improving internet access amongst masses.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/_zyM3_OiUxM" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;h3&gt;Session 3: Ensuring Access to the Internet&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;(by A.K. Bhargava)&lt;br /&gt;&lt;a class="external-link" href="http://internet-institute.in/repository/BBNLiis.pdf"&gt;Click to view the presentation&lt;/a&gt;&lt;br /&gt;The last session on “Ensuring Access to the Internet” by A.K. Bhargava discussed strategies to enhance access to the Internet in India with special focus on National Optical Fibre Network.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The salient points discussed were:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;-&amp;nbsp;&amp;nbsp;&amp;nbsp; Role of Broadband in Nation Building&lt;br /&gt;-&amp;nbsp;&amp;nbsp;&amp;nbsp; Policy Aspiration of Broadband - How do we meet aspiration?&lt;br /&gt;-&amp;nbsp;&amp;nbsp;&amp;nbsp; Telecom Network Layers‐Gaps in OFC Reach&lt;br /&gt;-&amp;nbsp;&amp;nbsp;&amp;nbsp; BBNL Interconnection&lt;br /&gt;-&amp;nbsp;&amp;nbsp;&amp;nbsp; NOFN - Bridging The Gap&lt;br /&gt;-&amp;nbsp;&amp;nbsp;&amp;nbsp; Digital Knowledge Centres (DKCs)&lt;br /&gt;-&amp;nbsp;&amp;nbsp;&amp;nbsp; Architecture of BBNL&lt;br /&gt;-&amp;nbsp;&amp;nbsp;&amp;nbsp; NOFN Impact&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Societal&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Bridging the digital divide&lt;/li&gt;&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Business&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Job creation, indigenous industry growth&lt;/li&gt;&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Sectoral&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Improved connectivity, data growth&lt;/li&gt;&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Technological&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Differentiators&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/4X3WSn1u3WM" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Speaker Presentation Slides&lt;/strong&gt;&lt;br /&gt;All the presentation aids/slide shows barring a few have been uploaded to the website at &lt;a class="external-link" href="http://internet-institute.in/repository"&gt;http://internet-institute.in/repository&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Presentation of Assignments&lt;/strong&gt;&lt;br /&gt;The participants presented their assignments which were given to them to work on the 3rd day. The participants were presented with Wikipedia T-Shirts as a token of appreciation.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Assignments.png" alt="" class="image-inline" title="Assignments" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;em&gt;Given above is a picture of the participants presenting their assignments&lt;/em&gt; &lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Participant Feedback&lt;/strong&gt;&lt;br /&gt;All participants were asked to fill a "Session Feedback Form" for each of the sessions and also an "Overall Feedback Form". They were also constantly encouraged to come up with suggestions and inputs on how to make the Institute more interesting.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The key findings from the &lt;strong&gt;Quantitative Feedback&lt;/strong&gt; provided are:&lt;br /&gt;(The figures below are averaged scores (out of 5) provided by participants in the Overall Feedback Forms)&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;S.No.&lt;/th&gt;
&lt;th&gt;Parameter&lt;/th&gt;
&lt;th&gt;Score (Out of 5)&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1&lt;/td&gt;
&lt;td&gt;Relevance of Content&lt;/td&gt;
&lt;td style="text-align: right;"&gt;3.6&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right;"&gt;
&lt;td style="text-align: justify;"&gt;2&lt;/td&gt;
&lt;td style="text-align: justify;"&gt;Comprehensiveness of Content&lt;/td&gt;
&lt;td&gt;3.44&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3&lt;/td&gt;
&lt;td&gt;Easy to Understand&lt;/td&gt;
&lt;td style="text-align: right;"&gt;3.55&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4&lt;/td&gt;
&lt;td&gt;Well Paced&lt;/td&gt;
&lt;td style="text-align: right;"&gt;3.33&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5&lt;/td&gt;
&lt;td&gt;Sufficient Breaks&lt;/td&gt;
&lt;td style="text-align: right;"&gt;3&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;6&lt;/td&gt;
&lt;td&gt;Duration of Talks&lt;/td&gt;
&lt;td style="text-align: right;"&gt;3.2&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;7&lt;/td&gt;
&lt;td&gt;Mix between Learning &amp;amp; Activities&lt;/td&gt;
&lt;td style="text-align: right;"&gt;3&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;The key findings from the &lt;strong&gt;Qualitative Feedback&lt;/strong&gt; provided are:&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;S.No.&lt;/th&gt;
&lt;th&gt;Points observed&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1&lt;/td&gt;
&lt;td style="text-align: justify;"&gt;&lt;strong&gt;Presentations&lt;/strong&gt; – Participants felt sessions with accompanying slides/aids were most helpful. Some felt that accompanying notes could also be useful for future reference.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2&lt;/td&gt;
&lt;td style="text-align: justify;"&gt;&lt;strong&gt;Use of Examples/Case Studies&lt;/strong&gt; – Participants felt concepts can be better assimilated if case-studies/examples are used. Some also felt that for the technological advancements discussed, it would have been better had the social/economic impact of the same was discussed too.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3&lt;/td&gt;
&lt;td style="text-align: justify;"&gt;&lt;strong&gt;Implementation Gaps&lt;/strong&gt;– One participant, who is working at the field level in Kolkata had a specific thing to say about the talk about BSNL and its offerings– Although BSNL has so many options available on paper to connect to the Internet, common service centres in West Bengal are mostly run on Tata Indicom’s network even though the board outside says “BSNL” etc. She felt that the reality is far different from what exists on paper.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Interactive sessions&lt;/strong&gt; were most appreciated than speaker led sessions.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5&lt;/td&gt;
&lt;td style="text-align: justify;"&gt;There were many responses to the question “&lt;strong&gt;How will you apply this new information in the future&lt;/strong&gt;” and it is very encouraging.&amp;nbsp; People have given thought to contributing to Wikipedia in their mother tongue, take the knowledge to the field work that they are associated with, continue with their research, change their Internet connections, to help file RTIs, to adopt more open source software, sharing with students, advocacy efforts, etc&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;6&lt;/td&gt;
&lt;td&gt;The responses to the question “&lt;strong&gt;What did you learn from the session/workshop that was new?&lt;/strong&gt;” elicited more responses for the following sessions&lt;br /&gt;
&lt;ol&gt;
&lt;li&gt;Domestic Bodies and Mechanisms&lt;/li&gt;
&lt;li&gt;Case-studies such as Air Jaldi&lt;/li&gt;
&lt;li&gt;Low cost devices in India&lt;/li&gt;
&lt;li&gt;USOF&lt;/li&gt;
&lt;li&gt;Free &amp;amp; Open Internet&lt;/li&gt;
&lt;li&gt;Copyright laws&lt;/li&gt;
&lt;li&gt;Privacy&lt;/li&gt;
&lt;li&gt;Accessibility&lt;/li&gt;
&lt;li&gt;Digital Natives&lt;/li&gt;
&lt;li&gt;ISPs&lt;/li&gt;&lt;/ol&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;7&lt;/td&gt;
&lt;td style="text-align: justify;"&gt;&lt;strong&gt;Field Trip&lt;/strong&gt; – One participant said “&lt;em&gt;One or two of the persons from MapUnity could have made the presentation at the institute venue itself. A visit to an underserved or un-served community with interactions with the people there could also have given a good understanding of on-ground challenges and needs.”&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;8&lt;/td&gt;
&lt;td style="text-align: justify;"&gt;&lt;strong&gt;Follow-up Session&lt;/strong&gt; –One participant had ideas about having a follow-up session “&lt;em&gt;A follow-up call [webinar?] after 6 months to see if any of these concepts were useful would be an interesting exercise to take up”&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;9&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Assignment – &lt;/strong&gt;Participants felt that the assignments were good but they needed more time to work on the same.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Other Feedback:&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;The food and the facilities were enjoyed and appreciated by all.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The remote location of the Golden Palms Resort was a concern for most of the participants.&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Participation Certificates&lt;/strong&gt;&lt;br /&gt;Participation Certificates (template shown below) have been mailed to all the participants in the third week of July 2013.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Certificate.png" alt="" class="image-inline" title="Certificate of Participation" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;em&gt;Given above is the certificate declaring the successful completion of the event&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify;"&gt;Institute Expenses&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;A total of Rs. 19, 91,889 (Rupees nineteen lakhs ninety one thousand eight hundred and eighty nine only) was spent towards organizing and conducting the Internet Institute. A breakup of the Institute Expenditures is given below:&lt;/p&gt;
&lt;table class="vertical listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;S.No.&lt;/th&gt;
&lt;th style="text-align: left;"&gt;Type of Expense&lt;/th&gt;
&lt;th style="text-align: left;"&gt;Description&lt;/th&gt;
&lt;th style="text-align: right;"&gt;Total&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1&lt;/td&gt;
&lt;td&gt;Venue – Golden Palms Resort&lt;/td&gt;
&lt;td&gt;Accommodation for participants, speakers and food&lt;/td&gt;
&lt;td style="text-align: right;"&gt;12,91,176&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2&lt;/td&gt;
&lt;td&gt;Travel&lt;/td&gt;
&lt;td&gt;Cost of Air tickets&lt;/td&gt;
&lt;td style="text-align: right;"&gt;2,94,515&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3&lt;/td&gt;
&lt;td&gt;Local Travel&lt;/td&gt;
&lt;td&gt;Airport Pickup/Drop, Local City Travel&lt;/td&gt;
&lt;td style="text-align: right;"&gt;1,41,001&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4&lt;/td&gt;
&lt;td&gt;Gifts &amp;amp; Printing&lt;/td&gt;
&lt;td&gt;Gifts for speakers and ad hoc document printing charges&lt;/td&gt;
&lt;td style="text-align: right;"&gt;24,000&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5&lt;/td&gt;
&lt;td&gt;Infrastructure&lt;/td&gt;
&lt;td&gt;Telephony, Audio, Video, Stage&lt;/td&gt;
&lt;td style="text-align: right;"&gt;1,05,000&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;6&lt;/td&gt;
&lt;td&gt;Participant Bags&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right;"&gt;10,650&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;7&lt;/td&gt;
&lt;td&gt;Reimbursements&lt;/td&gt;
&lt;td&gt;Reimbursements to participants and speakers&lt;/td&gt;
&lt;td style="text-align: right;"&gt;1,25,547&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: center;" colspan="3"&gt;&lt;strong&gt;Total Expenses&lt;/strong&gt;&lt;/td&gt;
&lt;td style="text-align: right;"&gt;19,91,889&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify;"&gt;What the participants had to say&lt;/h3&gt;
&lt;blockquote class="quoted"&gt;Sangh Priya Rahul – “&lt;em&gt;One of my organisation's work is more or less related to empowerment of rural areas so knowledge about USOF will be useful there&lt;/em&gt;&lt;em&gt;.” &lt;/em&gt;(On USOF)&lt;/blockquote&gt;
&lt;blockquote style="text-align: justify;" class="quoted"&gt;Rashmi. M – “&lt;em&gt;Makes me more sensitized towards the disabled people.”&lt;/em&gt; (On e-Accessibility)&lt;/blockquote&gt;
&lt;blockquote style="text-align: justify;" class="quoted"&gt;Preethi Ayyaluswamy – “&lt;em&gt;Would help me in strategically planning for an online campaign” &lt;/em&gt;(On digital activism).&lt;/blockquote&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify;"&gt;Conclusion&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;The Institute was highly engaging and enabled the participants to explore the various facets of Internet &amp;amp; Society. As was evident from the feedback forms, participants had given thought to contributing to Wikipedia in their mother tongue, take the knowledge to the field work that they are associated with, continue with their research, change their Internet connections, help file RTIs, adopt more open source software, sharing with students, advocacy efforts etc. There was a very high level of expertise amongst speakers at the Institute which was apparent from the participatory discussions and a lot of insightful perspectives were brought forth. There was a common consensus amongst all participants that inclusive growth across all dimensions would take efforts from all stakeholders.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;We hope to learn from the findings of this Institute and work towards a better second Institute.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/GroupPhoto.png" alt="" class="image-inline" title="Group Photo of Participants" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;em&gt;Above is a group picture of all the participants and the organizers&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;ul&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;/ul&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/telecom/knowledge-repository-on-internet-access/institute-on-internet-and-society-event-report'&gt;https://cis-india.org/telecom/knowledge-repository-on-internet-access/institute-on-internet-and-society-event-report&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>srividya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Video</dc:subject>
    
    
        <dc:subject>Internet Studies</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2013-10-15T06:48:00Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/digital-natives/blog/hivos-knowledge-programme-june-14-2013-nishant-shah-whose-change-is-it-anyway">
    <title>Whose Change is it Anyway?</title>
    <link>https://cis-india.org/digital-natives/blog/hivos-knowledge-programme-june-14-2013-nishant-shah-whose-change-is-it-anyway</link>
    <description>
        &lt;b&gt;This thought piece is an attempt to reflect critically on existing practices of “making change” and its implications for the future of citizen action in information and network societies. It observes that change is constantly and explicitly invoked at different stages in research, practice, and policy in relation to digital technologies, citizen action, and network societies. &lt;/b&gt;
        
&lt;p&gt;The White Paper by Nishant Shah was &lt;a class="external-link" href="http://www.hivos.net/Hivos-Knowledge-Programme/Themes/Civic-Explorations/Publications/Whose-Change-is-it-anyway"&gt;published by Hivos recently&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;However, we do not have adequate frameworks to address the idea of change. What constitutes change? What are the intentions that make change possible? Who are the actors involved? Whose change is&amp;nbsp; it, anyway?&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Drawing on the Hivos Knowledge Programme and on knowledge frameworks  around youth, technology, and change from the last four years, this  thought piece introduces new ways of defining, locating, and figuring  change. In the process, it also helps understand the role that digital&amp;nbsp;  technologies play in shaping and amplifying our processes and practices  of change, and to understand actors of change who are not necessarily  confined to the category of “citizen”, which seems to be understood as  the de facto agent of change in contemporary social upheavals,&amp;nbsp;  political uprisings, and cultural innovations.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Methodologically, this thought piece attempts to make three discursive  interventions: It locates digital activism in historical trajectories,  positing that digital activism has deep ties to traditional activism,  when it comes to the core political cause. Simultaneously, it recognises  that new modes of political engagement are demanding and producing  novel practices and introducing new actors and stakeholders. It looks at  contemporary digital and network theories, but also draws on older  philosophical lineages to discuss the crises that we seek to address. It  tries to interject these abstractions and theoretical frameworks back  into the field by producing two case studies that show how engagement  with these questions might help us reflect critically on our past  practices and knowledge as well as on visions for and speculations about  the future, and how these shape contemporary network societies. It  builds a theoretical framework based on knowledge gleaned from  conversations, interviews, and on-the-ground action with different  groups and communities in emerging information societies, and integrates  with new critical theory to&amp;nbsp; build an interdisciplinary and accessible  framework that seeks to inform research, development-based  interventions, and policy structures at the intersection of digital  technologies, citizen action, and change by introducing questions around  change into existing discourse.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/digital-natives/blog/whose-change-is-it-anyway.pdf" class="internal-link"&gt;Click to download the full White Paper here&lt;/a&gt; (PDF, 321 Kb)&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/digital-natives/blog/hivos-knowledge-programme-june-14-2013-nishant-shah-whose-change-is-it-anyway'&gt;https://cis-india.org/digital-natives/blog/hivos-knowledge-programme-june-14-2013-nishant-shah-whose-change-is-it-anyway&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Activism</dc:subject>
    
    
        <dc:subject>RAW Publications</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Youth</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Publications</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2015-04-17T10:56:47Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-welcomes-standing-committee-report-on-it-rules">
    <title>CIS Welcomes Standing Committee Report on IT Rules</title>
    <link>https://cis-india.org/internet-governance/blog/cis-welcomes-standing-committee-report-on-it-rules</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society welcomes the report by the Standing Committee on Subordinate Legislation, in which it has lambasted the government and has recommended that the government amend the Rules it passed in April 2011 under section 79 of the Information Technology Act.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://www.prsindia.org/uploads/media/IT%20Rules/IT%20Rules%20Subordinate%20committee%20Report.pdf"&gt;Click to read&lt;/a&gt; the Parliamentary Standing Committee Report on the IT Rules. A modified version was &lt;a class="external-link" href="http://www.ciol.com/ciol/news/185991/cis-welcomes-panels-anti-govt-stand-it-rules"&gt;published in CiOL&lt;/a&gt; on March 27, 2013.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;These rules have been noted by many, including CIS, Software Freedom Law Centre, and Society for Knowledge Commons, and many eminent lawyers, as being unconstitutional. The Standing Committee, noting this, has asked the government to make changes to the Rules to ensure that the fundamental rights to freedom of speech and privacy are safeguarded, and that the principles of natural justice are respected when a person’s  freedom of speech or privacy are curtailed.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Ambiguous and Over-reaching Language&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Standing Committee has noted the inherent ambiguity of words like "blasphemy", "disparaging", etc., which are used in the Intermediary Guidelines Rules, and has pointed out that unclear language can lead to harassment of people as has happened with Section 66A of the IT Act, and can lead to legitimate speech being removed.  Importantly, the Standing Committee recognizes that many categories of speech prohibited by the Intermediary Guidelines Rules are not prohibited by any statute, and hence cannot be prohibited by the government through these Rules.  Accordingly, the Standing Committee has asked the government to ensure "no new category of crimes or  offences is created" by these Rules.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Government Confused Whether Rules Are Mandatory or Advisory&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Standing Committee further notes that there is a discrepancy in the government’s stand that the Intermediary Guidelines Rules are not mandatory, and are only "of advisory nature and self-regulation", and that "it is not mandatory for the Intermediary to disable the information, the rule does not lead to any kind of censorship". The Standing Committee points out the flaw in this, and notes that the language used in the rules is mandatory language (“shall act” within 36 hours). Thus, it rightly notes that there is a "need for clarity on the aforesaid contradiction".  Further, it also notes that there is "there should be safeguards to protect against any abuse", since this is a form of private censorship by intermediaries."&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Evidence Needed Against Foreign Websites&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The government has told the Standing Committee that "foreign websites repeatedly refused to honour our laws", however, it has not provided any proof for this assertion.  The government should make public all evidence that foreign web services are refusing to honour Indian laws, and should encourage a public debate on how we should tackle this problem in light of the global nature of the Internet.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Cyber Cafes Rules Violate Citizens’ Privacy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Standing Committee also pointed out that the Cyber Cafe Rules violated citizens’ right to privacy in requiring that "screens  of the computers installed other than in partitions and  cubicles should face open space of the cyber café".  Unfortunately, the Standing Committee did not consider the privacy argument against retention of extensive and intrusive logs. Under the Cyber Cafe Rules, cyber cafes are required to retain (for a minimum of one year) extensive logs, including that of "history of websites accessed using computer resource at cyber café" in such a manner that each website accessed can be linked to a person. The Committee only considered the argument that this would impose financial burdens on small cybercafes, and rejected that argument.  CIS wishes the Committee had examined the provision on log maintenance on grounds of privacy as well."&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Government’s Half-Truths&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In one response, the government notes that "rules under Section 79 in particular have undergone scrutiny by High Courts in the country. Based on the Rules, the courts have given reliefs to a number of individuals and organizations in the country. No provision of the Rules notified under Sections 43A and 79 of the IT  Act, 2000 have been held &lt;i&gt;ultra vires&lt;/i&gt;."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What the government says is a half-truth.  So far, courts have not struck down any of the IT Rules. But that is because none of the High Court cases in which the vires of the Rules have been challenged has concluded. So it is disingenuous of the government to claim that the Rule have "undergone scrutiny by High Courts".  And in those cases where relief has been granted under the Intermediary Guidelines, the cases have been ex-parte or have been cases where the vires of the Rules have not been challenged.  The government, if it wants to defend the Rules, should point out to any case in which the vires of the Rules have been upheld.  Not a single court till date has declared the Rules to be constitutional when that question was before it.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Lack of Representation of Stakeholders in Policy Formulation&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Lastly, the Standing Committee noted that it is not clear whether the Cyber Regulatory Advisory Committee (CRAC), which is responsible for policy guidance on the IT Act, has "members representing the interests of  principally affected or having special knowledge of the  subject matter as expressly stipulated in Section 88(2) of the  IT Act".  This is a problem that we at CIS also noted in November 2012, when the CRAC was reconstituted after having been defunct for more than a decade.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS hopes that the government finally takes note of the view of legal experts, the Standing Committee on Delegated Legislation, the Parliamentary motion against the Rules, and numerous articles and editorials in the press, and withdraws the Intermediary Guidelines Rules and the Cyber Cafe Rules, and instead replaces them with rules that do not infringe our constitutional rights.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;The Centre for Internet and Society is a non-profit research organization that works on policy issues relating to freedom of expression, privacy, accessibility for persons with disabilities, access to knowledge and IPR reform, and openness, and engages in academic research on digital natives and digital humanities.  It was among the organizations that submitted evidence to the Standing Committee on Subordinate Legislation on the IT Rules&lt;/i&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-welcomes-standing-committee-report-on-it-rules'&gt;https://cis-india.org/internet-governance/blog/cis-welcomes-standing-committee-report-on-it-rules&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2013-04-03T10:54:52Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/analyzing-latest-list-of-blocked-urls-by-dot">
    <title>Analyzing the Latest List of Blocked URLs by Department of Telecommunications (IIPM Edition)</title>
    <link>https://cis-india.org/internet-governance/blog/analyzing-latest-list-of-blocked-urls-by-dot</link>
    <description>
        &lt;b&gt;The Department of Telecommunications (DoT) in its order dated February 14, 2013 has issued directions to the Internet Service Providers (ISPs) to block seventy eight URLs. The block order has been issued as a result of a court order. Snehashish Ghosh does a preliminary analysis of the list of websites blocked as per the DoT order.&lt;/b&gt;
        
&lt;hr /&gt;
&lt;p&gt;Medianama has &lt;a class="external-link" href="http://www.medianama.com/wp-content/uploads/blocking-instruction-II-14-Feb-2013.pdf"&gt;published the DoT order&lt;/a&gt;, dated February 14, 2013, on its website.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;What has been blocked?&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The block order contains seventy eight URLs. Seventy three URLs are related to the Indian Institute of Planning and Management (IIPM). &amp;nbsp;The other five URLs contain the term “highcourt”. The order also contains links from reputed news websites and news blogs including The Indian Express, Firstpost, Outlook, Times of India, Economic Times, Kafila and Caravan Magazine, and satire news websites Faking News and Unreal Times. The order also directs blocking of a public notice issued by the University Grants Commission (UGC).&lt;/p&gt;
&lt;p&gt;The block order does not contain links to any social media website. However, some content related to IIPM has been removed but it finds no mention in the block order. Pursuant to which order or direction such content has been removed remains unclear. For example, Google has removed search results for the terms &amp;lt;Fake IIPM&amp;gt; pursuant to Court orders and it carries the following notice:&lt;/p&gt;
&lt;p&gt;&lt;em&gt;"In response to a legal request submitted to Google, we have removed 1 result(s) from this page. If you wish, you may &lt;/em&gt;&lt;a href="http://www.chillingeffects.org/notice.cgi?sID=432099"&gt;&lt;em&gt;read more about the request&lt;/em&gt;&lt;/a&gt;&lt;em&gt; at ChillingEffects.org."&lt;/em&gt;&lt;/p&gt;
&lt;h3&gt;Are there any mistakes in the order?&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The direction issued by the DoT is once again inaccurate and mired with errors. In effect, the DoT has blocked sixty one unique URLs and the block order contains numerous repetitions. By its order the DoT has directed the ISPs to block an entire blog [&lt;a class="external-link" href="http://iipmexposed.blogspot.in"&gt;http://iipmexposed.blogspot.in&lt;/a&gt;] along with URLs to various posts in the same blog.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Reasons for Blocking Websites&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;a href="http://economictimes.indiatimes.com/tech/internet/directed-by-gwalior-court-government-blocks-70-urls-critical-of-iipm/articleshow/18523107.cms"&gt;According to news reports&lt;/a&gt;, the main reason for blocking of websites by the DoT is a Court order issued by a Court in Gwalior. The reason for issuing such a block order might have been a court proceeding with respect to defamation and removal of defamatory content thereof. However, the reasons for blocking of domain names containing the term ‘high court’, which is not at all related to the IIPM Court case&amp;nbsp; is unclear. The DoT by its order has also blocked a link in the website of a internet domain registrar which carried advertisement for the domain name [&lt;a class="external-link" href="http://www.highcourt.com"&gt;www.highcourt.com&lt;/a&gt;].&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Are the blocks legitimate?&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The block order may have been issued by the DoT under Rule 10 of the Information Technology (Procedure and Safeguards for Blocking for Access of Information by Public) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The Court order seems to be an interim injunction in a defamation suit. Generally, Courts exercise utmost caution while granting interim injunction in defamation cases.&amp;nbsp; According to the Bonnard Rule (Bonnard v. Perryman, [1891] 2 Ch 269) in a defamation case, “interim injunction should not be awarded unless a defence of justification by the defendant was certain to fail at trial level.” Moreover, in the case of Woodward and Frasier, Lord Denning noted “that it would be unjust to fetter the freedom of expression, when actually a full trial had not taken place, and that if during trial it is proved that the defendant had defamed the plaintiff, then should they be liable to pay the damages.” &amp;nbsp;&amp;nbsp;The Delhi High Court in &lt;em&gt;&lt;a href="http://www.indiankanoon.org/doc/562656/"&gt;Tata Sons Ltd. v. Green Peace International&lt;/a&gt;&lt;/em&gt; followed the Bonnard Rule and the Lord Denning’s judgements and ruled against the award of interim injunction for removal of defamatory content and stated:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;“The Court notes that the rule in Bonnard is as applicable in regulating grant of injunctions in claims against defamation, as it was when the judgment was rendered more than a century ago. This is because the Courts, the world over, have set a great value to free speech and its salutary catalyzing effect on public debate and discussion on issues that concern people at large. The issue, which the defendant’s game seeks to address, is also one of public concern. The Court cannot also sit in value judgment over the medium (of expression) chosen by the defendant since in a democracy, speech can include forms such as caricature, lampoon, mime parody and other manifestations of wit.”&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Therefore, it appears that the Court order has moved away from the settled principles of law while awarding an interim injunction for blocking of content related to&amp;nbsp; IIPM. It is also interesting to note that in &lt;em&gt;Green Peace International&lt;/em&gt;, the Court also answered the question as to whether there should be different standard for posting or publication of defamatory content on the internet. It was observed by the Court that publication is a comprehensive term, ‘embracing all forms and medium – including the Internet’.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Blocking a Public Notice issued by a Statutory Body of Government of India&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The block order mentions a URL which contains a public notice issued by University Grants Commission (UGC) related to the derecognition of IIPM as a University. The blocking of a public notice issued by the statutory body of the Government of India is unprecedented. A public notice issued by a statutory body is a function of the State. It can only be blocked or removed by a writ order issued by the High Court or the Supreme Court and only if it offends the Constitution. However, so far, ISPs such as BSNL have not enforced the blocking of this URL.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Implementation of the order by the ISPs&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;As pointed out in my previous &lt;a href="https://cis-india.org/internet-governance/analyzing-the-latest-list-of-blocked-sites-communalism-and-rioting-edition-part-ii"&gt;blog post&lt;/a&gt; on blocking of websites, the ISPs have again failed to notify their consumers the reasons for the blocking of the URLs. This lack of transparency in the implementation of the block order has a chilling effect on freedom of speech.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/analyzing-latest-list-of-blocked-urls-by-dot'&gt;https://cis-india.org/internet-governance/blog/analyzing-latest-list-of-blocked-urls-by-dot&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>snehashish</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2013-02-17T07:35:25Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/five-faqs-on-amended-itrs">
    <title>Five Frequently Asked Questions about the Amended ITRs</title>
    <link>https://cis-india.org/internet-governance/blog/five-faqs-on-amended-itrs</link>
    <description>
        &lt;b&gt;This piece discusses the five major questions that have been the subject of debate after the World Conference on International Telecommunications 2012 (WCIT). The politics surrounding the WCIT are not discussed here but it must be kept in mind that they have played a significant role in the outcome of the conference and in some of the debates about it.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Each question is discussed with reference to the text of the treaty, to the minutes of the plenary sessions (which are available via the &lt;a href="http://www.itu.int/en/pages/default.aspx"&gt;ITU website&lt;/a&gt;), a little international law and a few references to other people’s comments on the treaty.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;1. Do the ITRs apply to content on the internet?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article 1.1 (a) has been amended to add the sentence “These Regulations do not address the content-related aspects of telecommunications”. Although some discussions about the &lt;a href="http://www.itu.int/en/wcit-12/Documents/final-acts-wcit-12.pdf"&gt;International Telecommunication Regulations (ITRs)&lt;/a&gt; and content have ignored this altogether, others seem concerned about its interpretation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ITU Secretary General has issued &lt;a href="http://www.itu.int/en/wcit-12/Pages/statement-toure.aspx"&gt;a statement&lt;/a&gt; in which he has clarified that “The new ITR treaty does NOT cover content issues and explicitly states in the first article that content-related issues are not covered by the treaty”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Commentators like &lt;a href="http://tryingtoreason.wordpress.com/2012/12/15/yes-the-new-itrs-do-cover-content-and-the-internet/"&gt;Chuan-Zheng Lee&lt;/a&gt; however, continue to view the treaty with suspicion, on the basis that it is necessary to examine content in order to tell whether it is spam (Lee and &lt;a href="http://globalvoicesonline.org/2013/01/02/wcit-and-its-relationship-to-the-internet-what-lies-ahead/"&gt;Chaparro&lt;/a&gt; differ on this question). However, others like &lt;a href="http://www.nytimes.com/2012/12/15/technology/in-a-huff-a-telling-us-walkout.html?pagewanted=all&amp;amp;_r=0"&gt;Eric Pfanner&lt;/a&gt; have pointed to this paragraph in their skepticism about the US refusal to sign.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Some highlights from the plenary session discussions&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Chairman proposed the addition to Article 1.1(a) at the tenth plenary session. He did this to address concerns that the ITRs text could be interpreted to apply to content on the Internet. The original formulation that he proposed was ‘These regulations do not address and cannot be interpreted as addressing content’. This text was suggested in the middle of an extended discussion on Article 5A.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Many countries were skeptical of this insertion. Sudan argued that content could not be avoided in telecommunication networks “because it will always be in transit.” The United Arab Emirates seemed concerned about international interference in states’ existing regulation of content, and said “maybe we could actually say this in the minutes of the meeting that this regulation should not be interpreted as on alteration to Member States content regulation”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Concerns about what the term ‘content’ means and whether it would apply broadly were raised by more than one country, including Saudi Arabia. For instance, it was argued that the text proposed by the Chairman might interfere with parts of the treaty that require operators to send tariff information correspondence. More than one country that felt that the insertion of this text would impact several parts of the treaty, and that it would be difficult to determine what amounted to dealing with content. The primary issue appeared to be that the term ‘content’ was not defined, and it therefore remained unclear what was being excluded. In response to these concerns, the Chairman withdrew his proposal for the amendment excluding content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, several states then spoke up in favour of the Chairman’s proposal, suggesting that the proposed amendment to Article 1.1 influenced their acceptance of Article 5A (on security and robustness of networks – discussed in detail below). Brazil suggested that an answer to the definitional concerns may be found in the work by Study Group 17, which had a definition available.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Following this, the next day, at the twelfth plenary, the Chairman brought back the Article 1.1 amendment excluding content. He stated explicitly that this amendment might be the way to get Articles 5A and 5B approved. The text he read out was insertion of the words &lt;i&gt;“&lt;/i&gt;to the exclusion of their content”, after ‘’services’ at the end of 1.1A. Interestingly however, the term ‘content’ was never defined.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the next plenary session, Iran raised the objection that this phrase was overbroad, and proposed the following formulation instead: “These Regulations do not address the content-related aspects of telecommunications”. This formulation found its way into the amended ITRs as the treaty stands today.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;2. Does Article 5A on network security legitimize surveillance of Internet content?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article 5A deals with ‘security and robustness of networks’ and requires member states to “individually and collectively endeavour to ensure the security and robustness of international telecommunication networks...”.  This may have given rise to concerns about interpretations that may extend the security of networks to malware or viruses, and therefore to content on the Internet. However, Article 5A has to be read with Article 1.1(a), and therefore must be interpreted such that it does not ‘address the content-related aspects of telecommunications’.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some commentators continue to see Article 5A as problematic. Avri Doria &lt;a href="http://avri.doria.org/post/38641776703/wcit"&gt;has argued&lt;/a&gt; that the use of the word ‘security’ in addition to ‘robustness’ of telecommunication infrastructure suggests that it means Internet security.   However Emma Llansó of the Centre for Democracy and Technology &lt;a href="https://www.cdt.org/blogs/emma-llanso/2012making-sense-wcit-it%E2%80%99s-complicated"&gt;has noted&lt;/a&gt; that the language used in this paragraph is “ far too vague to be interpreted as a requirement or even a recommendation that countries surveil users on their networks in order to maintain security”. Llansó  has suggested that civil society advocates make it clear to countries which attempt to use this article to justify surveillance, that it does not lend itself to such practices.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Some highlights from the plenary session discussions&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article 5A was one of the most controversial parts of the ITRs and was the subject of much debate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On December 11&lt;sup&gt;th&lt;/sup&gt;, in the Chairman’s draft that was being discussed, Article 5A was titled ‘security of networks’, and required members to endeavour to ensure the “security and robustness of international telecommunication networks”.  The Chairman announced that this was the language that came out of Committee 5’s deliberations, and that ‘robustness’ was inserted at the suggestion of CEPT.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Several countries like Poland, Australia, Germany and the United States of America were keen on explicitly stating that Article 5A was confined to the physical or technical infrastructure, and either wanted a clarification that to this effect or use of the term ‘robustness’ instead of security. Many other countries, such as Russia and China, were strongly opposed to this suggestion and insisted that the term security must remain in the document (India was one of the countries that preferred to have the document use the term ‘security’).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was in the course of this disagreement, during the tenth plenary session, that the Chairman suggested his global solution for Article 1.1 – a clarification that this would not apply to content. This solution was contested by several countries, withdrawn and then reinstated (in the eleventh plenary) after many countries explained that their assent to Article 5A was dependant on the existence of the Article 1 clarification about content (see above for details).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There was also some debate about whether Article 5A should use the term ‘robustness’ or the term ‘security’ (eg. The United States clarified that its preference was for the use of ‘resilience and robustness’ rather than security). The Secretary General referred to this disagreement, and said that he was therefore using both terms in the draft. The title of Article 5A was changed, in the eleventh plenary, to use both terms, instead of only referring to security.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;3. Does Article 5B apply to spam content on the Internet? &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The text of the amended treaty talks of ‘unsolicited bulk electronic communications’ and does not use the term ‘spam’[Article 5B says that ‘Members should endeavour to take necessary measures to prevent the propagation of unsolicited bulk electronic communications and minimize its impact on international telecommunication services’].If this phrase is read in isolation, it may certainly be interpreted as being applicable to spam. Commentators like &lt;a href="http://avri.doria.org/tagged/WCIT/page/2"&gt;Avri Doria&lt;/a&gt; have pointed to sources like&lt;a href="http://www.itu.int/osg/csd/intgov/resoultions_2010/PP-10/RESOLUTION_130.pdf"&gt; Resolution 130 of the Plenipotentiary Conference of the International Telecommunication Union&lt;/a&gt; (Guadalajara, 2010) to demonstrate that ‘unsolicited bulk electronic communications’ ordinarily means spam.  However, others like&lt;a href="http://globalvoicesonline.org/2013/01/02/wcit-and-its-relationship-to-the-internet-what-lies-ahead/"&gt; Enrique A. Chaparro&lt;/a&gt; argue that it cannot possibly extend to content on the Internet given the language used in Article 1.1(a). Chapparo has explained, that given the exclusion of content, Article 5B it authorizes anti-spam mechanisms that do not work on content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article 5B, which discusses ‘unsolicited bulk electronic communications’, must be read with Article 1, which is the section on purpose and scope of the ITRS. Article 1.1 (a) specifies that the ITRs “do not address the content-related aspects of telecommunications”. Therefore it may be argued that ‘unsolicited bulk electronic communications’ cannot be read as being applicable to content on the Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, many continue to be concerned about Article 5B’s applicability to spam on the Internet. Although some of them that their fear is that some states may interpret Article 5B as applying to content, despite the contents of Article 1.1(a), many have failed to engage with the issue in the context of Article 1.1(a).&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Some highlights from the plenary session discussions&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article 5B is inextricably linked with the amendment to Article 1.1. Mexico asked specifically about what the proposed amendment to Article 1.1 would mean for Article 5B: “I’m referring to the item which we’ll deal with later, namely unsolicited bulk electronic communications.  Could that be referred to as content, perhaps?”.  The Chairman responded saying, “This is exactly will solve the second Article 5B, that we are not dealing with content here.  We are dealing with measures to prevent propagation of unsolicited bulk electronic messages”.&lt;sup&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The amendment to Article 1.1 was withdrawn soon after it was introduced. Before it was reintroduced, Sweden said (at the eleventh plenary) that it could not see how Article 5B could apply without looking into the content of messages. The United States agreed with this and went on state that the issue of spam was being addressed at the WTSA level, as well as by other organisations. It argued that the spam issue was better addressed at the technical level than by introducing it in treaty text.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The amendment excluding content was reintroduced during the twelfth plenary. The Chairman explicitly stated that it might be the way to get Articles 5A and 5B approved.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The word ‘spam’ was dropped from the ITRs in the eight plenary, and “unsolicited bulk electronic communications” was used instead.  However, in the eleventh plenary, as they listed their reasons for not signing the newly-amended ITRs, Canada and the United States of America referred to ‘spam’ which suggests that they may have viewed the change as purely semantic.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;4. Does the resolution on Internet Governance indicate that the ITU plans to take over the Internet?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Much controversy has arisen over the plenary resolution ‘to foster an enabling environment for the greater growth of the Internet’. This controversy has arisen partly thanks to the manner in which it was decided to include the resolution, and partly over the text of the resolution. The discussion here focuses on the text of the resolution and then describes the proceedings that have been (correctly) criticized.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The history of this resolution, as &lt;a href="http://www.circleid.com/posts/20121217_wcit_and_internet_governance_harmless_resolution_or_trojan_horse/"&gt;Wolfgang Kleinwächter&lt;/a&gt; has explained, is that it was part of a compromise to appease the countries which were taking positions on the ITU’s role in Internet governance, that were similar to the &lt;a href="http://files.wcitleaks.org/public/Merged%20UAE%20081212.pdf"&gt;controversial Russian proposal&lt;/a&gt;. The controversial suggestions about Internet governance were excluded from the actual treaty and included instead in a non-binding resolution.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The text of the resolution instructs the Secretary General to “to continue to take the necessary steps for ITU to play an active and constructive role in the development of broadband and the multi-stakeholder model of the Internet as expressed in § 35 of the Tunis Agenda”. This paragraph is particularly controversial since of paragraph 35 of the &lt;a href="http://www.itu.int/wsis/docs2/tunis/off/6rev1.html"&gt;Tunis Agenda&lt;/a&gt; says “Policy authority for Internet-related public policy issues is the sovereign right of States. They have rights and responsibilities for international Internet-related public policy issues.” Kleinwächter has pointed out that this selection leaves out later additions that have taken place with progression towards a multi-stakeholder model.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The resolution also resolves to invite member states to “to elaborate on their respective positions on international Internet-related technical, development and public-policy issues within the mandate of ITU at various ITU forums including, inter alia, the World Telecommunication/ICT Policy Forum, the Broadband Commission for Digital Development and ITU study groups”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A little after its introduction, people began expressing concerns such as the &lt;a href="https://www.accessnow.org/blog/2012/12/12/wcit-watch-just-taking-the-temperature-a-late-night-resolution-on-the-inter"&gt;Secretary General may treat the resolution as binding&lt;/a&gt;, While the language may raise cause for concern, it is important to note that resolutions of this nature are not binding and countries are free to opt out of them. Opinions vary about the intentions that have driven the inclusion of this resolution, and what it may mean for the future. However commentators like Milton Mueller have scoffed at these concerns, pointing out that the resolution is harmless and may have been a &lt;a href="http://www.internetgovernance.org/2012/12/13/what-really-happened-in-dubai/"&gt;clever political maneuver&lt;/a&gt; to resolve the basic conflict haunting the WCIT, and that &lt;a href="http://www.internetgovernance.org/2012/12/18/itu-phobia-why-wcit-was-derailed/"&gt;mere discussion of the Internet in the ITU harms no one&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Some highlights from the plenary session discussions&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Egypt and Bulgaria suggested that the resolution refer to paragraph 55 of the Tunis agenda instead of paragraph 35, by inserted the following text “”Recognizing that the existing arrangements for Internet Governance have worked effectively to make the Internet the highly robust, dynamic and geographically diverse medium it is today, with the private sector taking the lead in day-to-day operations and with innovation and value creation at the edges.” The US was also quite insistent on this language (although it did also argue that this was the wrong forum to discuss these issues).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Chairman was willing to include paragraph 55 in addition to paragraph 35 but Saudi Arabia objected to this inclusion. Finland suggested that the resolution should be removed since it was not supported by all the countries present and was therefore against the spirit of consensus. The Secretary General defended the resolution, suggesting both that it was harmless and that since it was a key component of the compromise, eliminating it would threaten the compromise. South Africa and Nigeria supported this stand.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was during this debate that the procedural controversy arose. Late into the night, the Chairman said there was a long list of countries that wished to speak and said “I just wanted to have the feel of the room on who will accept the draft resolution”. He proceeded to have countries indicate whether they would accept the draft resolution or not, and then announced that the majority of the countries in the room were in favour of retaining the resolution. The resolution was then retained. Upon Spain’s raising the question, the Chairman clarified that this was not a vote. The next day, other countries raised the same question and the Chairman, while agreeing that the resolution was adopted on the basis of the ‘taking of temperature’ insisted that it was not a vote so much as an effort to see what majority of the countries wanted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;5. Does the human rights language used in the preamble, especially the part about states’ access to the Internet, threaten the Internet in any way?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The preamble says “Member States affirm their commitment to implement these Regulations in a manner that respects and upholds their human rights obligations”, and “These Regulations recognize the right of access of Member States to international telecommunication services”. The text of the preamble can be used as an interpretation aid since it is recognized as providing context to, and detailing the object and purpose of, a treaty. However if the meaning resulting from this appears to be ambiguous, obscure, absurd or unreasonable, then supplementary means such as the preparatory work for the treaty and the circumstances for its conclusion may also be taken into account.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Therefore anyone who is concerned about the impact of the text inserted in the preamble must (a) identify text within the main treaty that could be interpreted in an undesirable manner using the text in the preamble; and (b) consider preparatory work for the treaty and see whether it supports this worrying interpretation. For example, if there were concerns about countries choosing to interpret the term ‘human rights’ as subordinating political rights to economic rights, it would be important to take note of the Secretary General’s emphasis on the &lt;a href="http://www.un.org/en/documents/udhr/index.shtml"&gt;UDHR&lt;/a&gt; being applicable to all member states.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Initially, only the first insertion about ‘human rights obligations’ was part of the draft treaty. The second insertion, recognizing states’ rights followed after the discussion about human rights language. Some states argued that it was inconsistent to place human rights obligations on states towards their citizens, but to leave out their cross-border obligations. It was immediately after this text was voted into the draft, that the United States, the United Kingdom and other countries refused to sign the ITRs. This particular insertion is phrased as a right of states rather than that of individuals or citizens, which does not align with the language of international human rights. While it may not be strictly accurate to say that human rights have traditionally been individual centric (since collective rights are also recognized in certain contexts), it is certainly very unusual to treat the rights of states or governments as human rights.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Some highlights from the plenary session discussions&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The United States of America and the Netherlands wanted to include language to state explicitly that states’ international human rights obligations are not altered in anyway. This was to clarify that the inclusion of human rights language was not setting the ITU up as a forum in which human rights obligations are debated. Malaysia objected to the use of human rights language in the preamble right at the outset, on the grounds that the ITRs are the wrong place for this, and that the right place is the ITU Constitution. It even pointed to the fact that jurisprudence is ever-evolving, to suggest that the meaning of human rights obligations might change over time. These were the two major perspectives offered towards the beginning of the discussion.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Chairman underlined the fact that the Universal Declaration of Human Rights is already applicable to all UN countries. He argued that reflection of these principles in the ITRs would help build universal public faith in the conference.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first traces of the states’ access rights can be seen in Cuba’s intervention at the ninth plenary – Cuba argued that limiting states’ access to public information networks amounted to infringement of human rights. At the fourteenth plenary, Nigeria proposed on behalf of the African group that the following text be added to the preamble “And recognize the right of access of all Member States to international telecommunication networks and services." Countries like China which had been ambivalent about the human rights language in the preamble, were happy with this move away from an individual-centric understanding of human rights, to one that sees states as representative of people.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The United States was express in its dissent, and said “human rights obligations go to the individual”. Sweden was also not happy with the proposal and argued that it moved away from well-established human rights language that affirmed existing commitments to drafting new human rights language.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was an amended version of the African group proposal that finally found its way into the preamble. It was supported by many countries such as China, Nigeria and Sudan, who took the position that group rights are included within human rights, and that governments represent their citizens and therefore have rights on their behalf. This position was strenuously disputed by states like the USA, Switzerland, United Kingdom and Canada.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/five-faqs-on-amended-itrs'&gt;https://cis-india.org/internet-governance/blog/five-faqs-on-amended-itrs&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>chinmayi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>WCIT</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>ITU</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Information Technology</dc:subject>
    

   <dc:date>2013-01-30T05:36:26Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/breaking-down-section-66-a-of-the-it-act">
    <title>Breaking Down Section 66A of the IT Act</title>
    <link>https://cis-india.org/internet-governance/blog/breaking-down-section-66-a-of-the-it-act</link>
    <description>
        &lt;b&gt;Section 66A of the Information Technology Act, which prescribes 'punishment for sending offensive messages through communication service, etc.'  is widely held by lawyers and legal academics to be unconstitutional. In this post Pranesh Prakash explores why that section is unconstitutional, how it came to be, the state of the law elsewhere, and how we can move forward.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Back in February 2009 (after the IT Amendment Act, 2008 was hurriedly passed on December 22, 2008 by the Lok Sabha, and a day after by the Rajya Sabha&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt; but before it was &lt;a class="external-link" href="http://deity.gov.in/sites/upload_files/dit/files/downloads/itact2000/act301009.pdf"&gt;notified on October 27, 2009&lt;/a&gt;) I had written that &lt;a href="https://cis-india.org/internet-governance/resources/section-66A-information-technology-act" class="external-link"&gt;s.66A&lt;/a&gt; is "patently in &lt;a href="https://cis-india.org/internet-governance/publications/it-act/short-note-on-amendment-act-2008/" class="external-link"&gt;violation of Art. 19(1)(a) of the Constitution of India&lt;/a&gt;":&lt;/p&gt;
&lt;p class="visualClear" style="text-align: justify; "&gt;Section 66A which punishes persons for sending offensive messages is overly broad, and is patently in violation of Art. 19(1)(a) of our Constitution. The fact that some information is "grossly offensive" (s.66A(a)) or that it causes "annoyance" or "inconvenience" while being known to be false (s.66A(c)) cannot be a reason for curbing the freedom of speech unless it is directly related to decency or morality, public order, or defamation (or any of the four other grounds listed in Art. 19(2)). It must be stated here that many argue that John Stuart Mill's harm principle provides a better framework for freedom of expression than Joel Feinberg's offence principle. The latter part of s.66A(c), which talks of deception, is sufficient to combat spam and phishing, and hence the first half, talking of annoyance or inconvenience is not required. Additionally, it would be beneficial if an explanation could be added to s.66A(c) to make clear what "origin" means in that section. Because depending on the construction of that word s.66A(c) can, for instance, unintentionally prevent organisations from using proxy servers, and may prevent a person from using a sender envelope different from the "from" address in an e-mail (a feature that many e-mail providers like Gmail implement to allow people to send mails from their work account while being logged in to their personal account). Furthermore, it may also prevent remailers, tunnelling, and other forms of ensuring anonymity online. This doesn't seem to be what is intended by the legislature, but the section might end up having that effect. This should hence be clarified.&lt;/p&gt;
&lt;p class="visualClear" style="text-align: justify; "&gt;I stand by that analysis. But given that it is quite sparse, in this post I will examine s.66A in detail.&lt;/p&gt;
&lt;p class="visualClear" style="text-align: justify; "&gt;Here's what s. 66A of the IT (Amendment) Act, 2008 states:&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;&lt;b&gt;66A. Punishment for sending offensive messages through communication service, etc.,&lt;br /&gt;&lt;/b&gt;Any person who sends, by means of a computer resource or a communication device,—&lt;br /&gt;(a) any information that is grossly offensive or has menacing character;&lt;br /&gt;(b) any information which he knows to be false, but for the purpose of causing annoyance, inconvenience,     danger, obstruction, insult, injury, criminal intimidation, enmity, hatred, or ill will, persistently by making use of such computer resource or a communication device,&lt;br /&gt;(c) any electronic mail or electronic mail message for the purpose of causing annoyance or inconvenience or to deceive or to mislead the addressee or recipient about the origin of such messages&lt;br /&gt;&lt;br /&gt;shall be punishable with imprisonment for a term which may extend to three years and with fine.&lt;br /&gt;&lt;br /&gt;Explanation: For the purposes of this section, terms "electronic mail" and "electronic mail message" means a message or information created or transmitted or received on a computer, computer system, computer resource or communication device including attachments in text, images, audio, video and any other electronic record, which may be transmitted with the message.&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;A large part of s.66A can be traced back to s.10(2) of the UK's Post Office (Amendment) Act, 1935:&lt;/p&gt;
&lt;p align="JUSTIFY" class="callout"&gt;If any person —&lt;br /&gt;(a)  sends any message by telephone which is grossly offensive or of an indecent, obscene, or menacing character; or&lt;br /&gt;(b) sends any message by telephone, or any telegram, which he knows to be false, for the purpose of causing annoyance, inconvenience, or needless anxiety to any other person; or&lt;br /&gt;(c) persistently makes telephone calls without reasonable cause and for any such purposes as aforesaid;&lt;br /&gt;he shall be liable upon summary conviction to a fine not exceeding ten pounds, or to imprisonment for a term not exceeding one month, or to both such fine and imprisonment.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Section 66A bears a striking resemblance to the three parts of this law from 1935, with clauses (b) and (c) being merged in the Indian law into a single clause (b) of s.66A, with a whole bunch of new "purposes" added. Interestingly, the Indian Post Office Act, 1898, was never amended to add this provision.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The differences between the two are worth exploring.&lt;/p&gt;
&lt;h3 align="JUSTIFY"&gt;Term of Punishment&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The first major difference is that the maximum term of imprisonment in the 1935 Act is only one month, compared to three years in s.66A of the IT Act. It seems the Indian government decided to subject the prison term to hyper-inflation to cover for the time. If this had happened for the punishment for, say, criminal defamation, then that would have a jail term of up to 72 years!  The current equivalent laws in the UK are the Communications Act, 2003 (s. 127) and the &lt;a class="external-link" href="http://www.legislation.gov.uk/ukpga/1988/27/section/1"&gt;Malicious Communications Act&lt;/a&gt; 1988 (s.1) for both of which the penalty is up to 6 months' imprisonment or to a maximum fine of £5000 or both. What's surprising is that in the Information Technology (Amendment) Bill of 2006, the penalty for section 66A was up to 2 years, and it was changed on December 16, 2008 through an amendment moved by Mr. A. Raja (the erstwhile Minister of Communications and IT) to 3 years. Given that parts of s.66A(c) resemble nuisance, it is instructive to note the term of punishment in the Indian Penal Code (IPC) for criminal nuisance: a fine of Rs. 200 with no prison term.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;"Sending" vs. "Publishing"&lt;/h3&gt;
&lt;p align="JUSTIFY"&gt;J. Sai Deepak, a lawyer, has made an interesting point that &lt;a class="external-link" href="http://thedemandingmistress.blogspot.in/2012/11/does-section-66a-of-information.html"&gt;the IT Act uses "send" as part of its wording, and not "publish"&lt;/a&gt;. Given that, only messages specifically directed at another would be included. While this is an interesting proposition, it cannot be accepted because: (1) even blog posts are "sent", albeit to the blog servers — s.66A doesn't say who it has to be sent to; (2) in the UK the Communications Act 2003 uses similar language and that, unlike the Malicious Communication Act 1988 which says "sends to another person", has been applied to public posts to Twitter, etc.; (3) The explanation to s.66A(c) explicitly uses the word "transmitted", which is far broader than "send", and it would be difficult to reconcile them unless "send" can encompass sending to the publishing intermediary like Twitter.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Part of the narrowing down of s.66A should definitely focus on making it applicable only to directed communication (as is the case with telephones, and with the UK's Malicious Communication Act), and not be applicable to publishing.&lt;/p&gt;
&lt;h3 align="JUSTIFY"&gt;Section 66A(c)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Section 66A(c) was also inserted through an amendment moved by Mr. Raja on December 16, 2008, which was passed by the Lok Sabha on December 22, 2008, and a day after by the Rajya Sabha. (The version introduced in Parliament in 2006 had only 66A(a) and (b).) This was done in response to the observation by the Standing Committee on Information Technology that there was no provision for spam. Hence it is clear that this is meant as an anti-spam provision. However, the careless phrasing makes it anything but an anti-spam provision. If instead of "for the purpose of causing annoyance or inconvenience or to deceive or to mislead the addressee or recipient about the origin of such messages" it was "for the purpose of causing annoyance and inconvenience and to deceive and to mislead the addressee or recipient about the origin of such messages", it would have been slightly closer to an anti-spam provision, but even then doesn't have the two core characteristics of spam: that it be unsolicited and that it be sent in bulk. (Whether only commercial messages should be regarded as spam is an open question.) That it arise from a duplicitous origin is not a requirement of spam (and in the UK, for instance, that is only an aggravating factor for what is already a fine-able activity).&lt;br /&gt;&lt;br /&gt;Curiously, the definitional problems do not stop there, but extend to the definitions of "electronic mail" and "electronic mail message" in the 'explanation' as well.  Those are so vast that more or less anything communicated electronically is counted as an e-mail, including forms of communication that aren't aimed at particular recipients the way e-mail is.&lt;br /&gt;&lt;br /&gt;Hence, the anti-spam provision does not cover spam, but covers everything else. This provision is certainly unconstitutional.&lt;/p&gt;
&lt;h3 class="visualClear" style="text-align: justify; "&gt;Section 66A(b)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Section 66A(b) has three main elements: (1) that the communication be known to be false; (2) that it be for the purpose of causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred or ill will; (3) that it be communicated persistently. The main problem here is, of course, (2). "Annoyance" and "inconvenience", "insult", "ill will" and "hatred" are very different from "injury", "danger", and "criminal intimidation".  That a lawmaker could feel that punishment for purposes this disparate belonged together in a single clause is quite astounding and without parallel (except in the rest of the IT Act). That's akin to having a single provision providing equal punishment for calling someone a moron ("insult") and threatening to kill someone ("criminal intimidation"). While persistent false communications for the purpose of annoying, insulting, inconveniencing, or causing ill will should not be criminalised (if need be, having it as a civil offence would more than suffice), doing so for the purpose of causing danger or criminal intimidation should. However, the question arises whether you need a separate provision in the IT Act for that. Criminal intimidation is already covered by ss. 503 and 506 of the IPC. Similarly, different kinds of causing danger are taken care of in ss.188, 268, 283, 285, 289, and other provisions. Similarly with the other "purposes" listed there, if, for instance, a provision is needed to penalise hoax bomb threats, then the provision clearly should not be mentioning words like "annoyance", and should not be made "persistent". (At any rate, s. 505(1) of the IPC suffices for hoax bomb threats, so you don't need a separate provision in the IT Act).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I would argue that in its current form this provision is unconstitutional, since there is no countervailing interest in criminalising false and persistent "insults", etc., that will allow those parts of this provision to survive the test of 'reasonableness' under Art.19(2). Furthermore, even bits that survive are largely redundant. While this unconstitutionality could be cured by better, narrower wording, even then one would need to ensure that there is no redundancy due to other provisions in other laws.&lt;/p&gt;
&lt;h3&gt;Section 66A(a)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In s.66A(a), the question immediately arises whether the information that is "grossly offensive" or "menacing" need to be addressed at someone specific and be seen as "grossly offensive" or "menacing" by that person, or be seen by a 'reasonable man' test.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Additionally, the term "grossly offensive" will have to be read in such a heightened manner as to not include merely causing offence.  The one other place where this phrase is used in Indian law is in s.20(b) of the Indian Post Office Act (prohibiting the sending by post of materials of an indecent, obscene, seditious, scurrilous, threatening, or grossly offensive character).  The big difference between s.20(b) of the IPO Act and s.66A of the IT Act is that the former is clearly restricted to one-to-one communication (the way the UK's Malicious Communication Act 1988 is).  Reducing the scope of s.66A to direct communications would make it less prone to challenge.&lt;br /&gt;&lt;br /&gt;Additionally, in order to ensure constitutionality, courts will have to ensure that "grossly offensive" does not simply end up meaning "offensive", and that the maximum punishment is not disproportionately high as it currently is.  Even laws specifically aimed at online bullying, such as the UK's Protection from Harassment Act 1997, can have unintended effects. As George Monbiot notes, the "first three people to be prosecuted under [the Protection from Harassment Act] were all peaceful protesters".&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Constitutional Arguments in Importing Laws from the UK&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The plain fact is that the Indian Constitution is stronger on free speech grounds than the (unwritten) UK Constitution, and the judiciary has wide powers of judicial review of statutes (i.e., the ability of a court to strike down a law passed by Parliament as 'unconstitutional'). Judicial review of statutes does not exist in the UK (with review under its EU obligations being the exception) as they believe that Parliament is supreme, unlike India. Putting those two aspects together, a law that is valid in the UK might well be unconstitutional in India for failing to fall within the eight octagonal walls of the reasonable restrictions allowed under Art.19(2). That raises the question of how they deal with such broad wording in the UK.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Genealogy of UK Law on Sending 'Indecent', 'Menacing', 'Grossly Offensive' Messages&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Quoting from the case of DPP v. Collins [2006] UKHL 40 [6]:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The genealogy of [s. 127(1) of the Communication Act] may be traced back to s.10(2)(a) of the Post Office (Amendment) Act, 1935, which made it an offence to send any message by telephone which is grossly offensive or of an indecent, obscene or menacing character. That subsection was reproduced with no change save of punctuation in s.66(a) of the Post Office Act 1953. It was again reproduced in s.78 of the Post Office Act 1969, save that "by means of a public telecommunication service" was substituted for "by telephone" and "any message" was changed to "a message or other matter". Section 78 was elaborated but substantially repeated in s.49(1)(a) of the British Telecommunications Act 1981 and was re-enacted (save for the substitution of "system" for "service") in s.43(1)(a) of the Telecommunications Act 1984. Section 43(1)(a) was in the same terms as s.127(1)(a) of the 2003 Act, save that it referred to "a public telecommunication system" and not (as in s.127(1)(a)) to a "public electronic communications network". Sections 11(1)(b) of the Post Office Act 1953 and 85(3) of the Postal Services Act 2000 made it an offence to send certain proscribed articles by post.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the above quotation talks about s.127(1) it is equally true about s.127(2) as well. In addition to that, in 1988, the &lt;a class="external-link" href="http://www.legislation.gov.uk/ukpga/1988/27/section/1"&gt;Malicious Communications Act&lt;/a&gt;&lt;a class="external-link" href="http://www.legislation.gov.uk/ukpga/1988/27/section/1"&gt;&lt;/a&gt; (s.1) was passed to prohibit one-to-one harassment along similar lines.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UK's Post Office Act was eclipsed by the Telecommunications Act in 1984, which in turn was replaced in 2003 by the Communications Act. (By contrast, we still stick on to the colonial Indian Post Office Act, 1898.)  Provisions from the 1935 Post Office Act were carried forward into the Telecommunications Act (s.43 on the "improper use of public telecommunication system"), and subsequently into s.127 of the Communications Act ("improper use of public electronic communications network").  Section 127 of the Communications Act states:&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;127. Improper use of public electronic communications network&lt;br /&gt;(1) A person is guilty of an offence if he — &lt;br /&gt;(a) sends by means of a public electronic communications network a message or other matter that is grossly offensive or of an indecent, obscene or menacing character; or&lt;br /&gt;(b) causes any such message or matter to be so sent.&lt;br /&gt;(2) A person is guilty of an offence if, for the purpose of causing annoyance, inconvenience or needless anxiety to another, he —&lt;br /&gt;(a) sends by means of a public electronic communications network, a message that he knows to be false,&lt;br /&gt;(b) causes such a message to be sent; or&lt;br /&gt;(c) persistently makes use of a public electronic communications network.&lt;br /&gt;(3) A person guilty of an offence under this section shall be liable, on summary conviction, to imprisonment for a term not exceeding six months or to a fine not exceeding level 5 on the standard scale, or to both.&lt;br /&gt;(4) Subsections (1) and (2) do not apply to anything done in the course of providing a programme service (within the meaning of the Broadcasting Act 1990 (c. 42)).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Currently in the UK there are calls for repeal of s.127. In a separate blog post I will look at how the UK courts have 'read down' the provisions of s.127 and other similar laws in order to be compliant with the European Convention on Human Rights.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Comparison between S. 66A and Other Statutes&lt;/h3&gt;
&lt;p&gt;Section 144, IPC, 1860&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Power to issue order in urgent cases of nuisance or  apprehended danger&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;...&lt;b&gt;obstruction, annoyance or injury&lt;/b&gt; to any person lawfully employed, or &lt;b&gt;danger &lt;/b&gt;to human life, health or safety,  or a disturbance of the public tranquillity&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Babulal Parate v. State of Maharastra and Ors. [1961 AIR SC 884] (Magistrates order under s. 144 of the Cr. PC, 1973 was in violation of Art.19(1)(a) of the Constitution).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;A special thanks is due to Snehashish Ghosh for compiling the below table.&lt;br /&gt;&lt;/i&gt;&lt;/p&gt;
&lt;table class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Section&lt;/th&gt;&lt;th&gt;Term(s)/phrase(s) used in 66A&lt;/th&gt;&lt;th&gt;Term(s)/ phrase(s) used in similar sections&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Section 66A (heading)&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Punishment for sending offensive messages through communication service, etc&lt;/td&gt;
&lt;td&gt;Section 127, CA, 2003, "Improper use of public electronic communications network"&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Section 66A(a)&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Any person who sends, by means of a computer resource or a communication device&lt;/td&gt;
&lt;td&gt;Section 1(1), MCA 1988, "Any person who sends to another person..."&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Section 66A(a)&lt;/td&gt;
&lt;td&gt;Grossly offensive&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Section 1(1)(a)(i), MCA 1988; &lt;br /&gt;Section 127(1)(a),CA, 2003; &lt;br /&gt;Section 10(2)(a), Post Office (Amendment) Act, 1935*; &lt;br /&gt;Section 43(1)(a), Telecommunications Act 1984*;&lt;br /&gt; Section 20, India Post Act 1898&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Section 66A(a)&lt;/td&gt;
&lt;td&gt;Menacing character&lt;/td&gt;
&lt;td&gt;Section127(1)(a),CA, 2003&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Section 66A(b)&lt;/td&gt;
&lt;td&gt;Any information which he knows to be false&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Section 1(1)(a)(iii), MCA 1988 "information which is false and known or believed to be false by the sender"; &lt;br /&gt;Section 127(2)(a), CA, 2003, "a message that he knows to be false"&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: justify; "&gt;
&lt;td&gt;Section 66A(b)  “purpose of...” &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Causing annoyance&lt;/td&gt;
&lt;td&gt;Section127(2), CA, 2003&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Inconvenience&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Section 127 (2), CA, 2003&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;Danger&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;Insult&lt;/td&gt;
&lt;td&gt;Section 504, IPC, 1860&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;Injury&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Section 44 IPC, 1860, "The word 'injury' denotes any harm whatever illegally caused to any person, in body, mind, reputation or property."&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;Criminal intimidation&lt;/td&gt;
&lt;td&gt;Sections 503 and 505 (2), IPC, 1860&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;Enmity, hatred or ill-will&lt;/td&gt;
&lt;td&gt;Section 153A(1)(a), IPC, 1860&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;Persistently by making use of such computer resource or a communication device&lt;/td&gt;
&lt;td&gt;Section 127(2)(c), CA, 2003, "persistently makes use of a public electronic communications network."&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Section 66A(c)&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Deceive or to mislead&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;-&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;b&gt;Notes&lt;/b&gt;&lt;br /&gt;MCA 1988: &lt;a class="external-link" href="http://www.legislation.gov.uk/ukpga/1988/27/section/1"&gt;Malicious Communications Act&lt;/a&gt; (s.1)&lt;br /&gt;CA: &lt;a class="external-link" href="http://www.legislation.gov.uk/ukpga/2003/21/section/127"&gt;Communications Act 2003&lt;/a&gt; (s.127)&lt;br /&gt;*Replaced by Communications Act 2003&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. The Information Technology (Amendment) Bill, 2008, was one amongst the eight bills that were passed in fifteen minutes on December 16, 2008.&lt;br /&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. Inserted vide Information Technology Amendment Act, 2008.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This was re-posted in &lt;a class="external-link" href="http://www.outlookindia.com/article.aspx?283149"&gt;Outlook &lt;/a&gt;(November 28, 2012)&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/breaking-down-section-66-a-of-the-it-act'&gt;https://cis-india.org/internet-governance/blog/breaking-down-section-66-a-of-the-it-act&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2012-12-14T09:51:17Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
