<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2251 to 2265.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/resources/deity-response-to-rti-on-decisions-of-crac"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/down-to-earth-latha-jishnu-dinsa-sachan-moyna-january-15-2013-clash-of-the-cyber-worlds"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/panel-discussion-on-e-commerce-at-nlsiu"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/livemint-january-4-2013-sanjukta-sharma-cool-jobs"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/mobile-india-2013"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-times-of-india-january-3-2014-sruthijit-kk-indian-govt-websites-gold-mine-for-cybercriminals"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/rightsidenews-rebecca-bowe-january-1-2013"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/mining-the-web-collective"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/times-of-india-december-31-2012-javed-anwer-and-rukmini-shrinivasan-the-year-social-media-came-of-age-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-hindu-december-31-2012-op-ed-a-note-of-dissent-on-cash-transfers-and-uid"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/livemint-december-27-2012-surabhi-agarwal-un-agrees-to-review-agencies-governing-internet"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/times-of-india-december-22-2012-kim-arora-no-fear-of-losing-internet-freedom-till-jan-15"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/state-surveillance-human-rights-camp-summary"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/times-of-india-december-29-2012-delhi-gang-rape"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/december-2012-bulletin"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/resources/deity-response-to-rti-on-decisions-of-crac">
    <title>Response to RTI on Decisions of the Cyber Regulation Advisory Committee</title>
    <link>https://cis-india.org/internet-governance/resources/deity-response-to-rti-on-decisions-of-crac</link>
    <description>
        &lt;b&gt;The Department of Electronics &amp; Information Technology, Ministry of Communications &amp; Information Technology responded to a right to information (RTI) application filed by Saket Bisani on behalf of the Centre for Internet &amp; Society on July 13, 2012 through notification No. 14(110)/2012-ESD, dated October 3, 2010.&lt;/b&gt;
        &lt;p class="Bodytext21" style="text-align: center; "&gt;&lt;b&gt;No. 14(110)/2012-ESD&lt;/b&gt;&lt;br /&gt;M/o Communiciations &amp;amp; Information Technology &lt;br /&gt; Department of Electronics &amp;amp; Information Technology &lt;br /&gt; Electronics Niketan, 6, CGO Complex &lt;br /&gt; New Delhi-110003&lt;/p&gt;
&lt;p class="Heading11" style="text-align: right; "&gt;&lt;b&gt;Dated:3.10.2012&lt;/b&gt;&lt;/p&gt;
&lt;p class="Heading11" style="text-align: center; "&gt;&lt;b&gt;Subject: RTI application received from Shri Saket Biswani&lt;/b&gt;&lt;/p&gt;
&lt;p class="Bodytext21" style="text-align: justify; "&gt;With reference to your RTI application dated 13.7.12 requesting for the following information.&lt;/p&gt;
&lt;p class="Bodytext21"&gt;&lt;span&gt;Question&lt;/span&gt;&lt;/p&gt;
&lt;p class="Bodytext21" style="text-align: justify; "&gt;a) Please provide me a list of the dates of each meeting of the CRAC held from October 18, 2000 till July 13, 2012?&lt;/p&gt;
&lt;p class="Bodytext21" style="text-align: justify; "&gt;b) Please provide me copies of the minutes of every meeting held by the Cyber Regulation Advisory Committee from October 18, 2000 till July 13, 2012.&lt;/p&gt;
&lt;p class="Bodytext21" style="text-align: justify; "&gt;c) Provide me the list of all policy decisions that the CRAC has advised the Central Government on under section 88(3) (a) of the Information Technology.&lt;/p&gt;
&lt;p class="Bodytext21" style="text-align: justify; "&gt;d) Provide me a list of all policy decisions that the CRAC has advised the Central Government on under section 88(3)(a) of the Information Technology Act, 2000.&lt;/p&gt;
&lt;p class="Bodytext21" style="text-align: justify; "&gt;The information as received from the custodian of the information is placed below:&lt;/p&gt;
&lt;p class="Bodytext21"&gt;&lt;span&gt;Answer&lt;/span&gt;&lt;/p&gt;
&lt;p class="Bodytext21"&gt;a) The meetings of CRAC were held on 6&lt;sup&gt;th&lt;/sup&gt; March, 2001 and 17-18 March, 2001.&lt;/p&gt;
&lt;p class="Bodytext21"&gt;b) Minutes of these two meetings of CRAC are attached.&lt;/p&gt;
&lt;p class="Bodytext21"&gt;c) No such advice was given by CRAC to DeitY under section 88(3)(a).&lt;/p&gt;
&lt;p class="Bodytext21"&gt;d) Information is attached.&lt;/p&gt;
&lt;p class="Bodytext21" style="text-align: right; "&gt;&lt;img src="https://cis-india.org/home-images/Sign.png" alt="Kaushik Signature" class="image-inline" title="Kaushik Signature" /&gt;&lt;/p&gt;
&lt;p class="Bodytext21" style="text-align: right; "&gt;(A.K. Kaushik) &lt;br /&gt;Additional Director &amp;amp; CPIO &lt;br /&gt;(E-Security &amp;amp; Cyber Laws)&lt;/p&gt;
&lt;p align="left" class="Bodytext21"&gt;To: Shri Saket Bisani&lt;br /&gt; No. 194, 2&lt;sup&gt;nd&lt;/sup&gt; 'C' Cross, &lt;br /&gt;Domlur 2&lt;sup&gt;nd&lt;/sup&gt; Stage &lt;br /&gt;Bangalore-560 071&lt;/p&gt;
&lt;p class="Bodytext1" style="text-align: justify; "&gt;&lt;b&gt;Minutes of the First Meeting of the Cyber Regulation Advisory Committee (CRAC) held on March 6, 2001, at Electronics Niketan,&lt;/b&gt;&lt;b&gt; &lt;/b&gt;&lt;b&gt;under&lt;/b&gt;&lt;b&gt; the Chairmanship of Hon’ble Minister* (IT) Shri Pramod Mahajan.&lt;/b&gt;&lt;/p&gt;
&lt;p class="Bodytext31" style="text-align: center; "&gt;(&lt;i&gt;List of Participants enclosed as Annexure-A&lt;/i&gt;)&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;The chairman welcomed the participants to the First Meeting of the Committee. In his opening remarks he hoped that the Committee would play a constructive role in the implementation of the Information Technology Act.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;While introducing the Agenda (circulated ahead of the meeting), Controller of Certifying Authorities (CCA) made a short presentation on proposed "Regulation.; under section 89 of the IT Act" consisting of 18 proposed Regulations, Smart Card as token carrying Keys, and various suggested Amendments to the IT ACT 2000.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;During the ensuing discussions, participants sought some time to study and collate associated inputs from their respective colleagues/specialists before offering any concrete suggestions/recommendations. Chairman agreed to the suggestions and postponed the meeting to 11:00 AM on the March 17, 2001 at the same venue. Based on the recommendation of Secretary (IT), members were requested to forward their inputs, if any, through e-mail within a weeks time to the following:&lt;/li&gt;
&lt;/ol&gt; 
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;span&gt;For Regulations wider section 89 of IT Act&lt;/span&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;For amendments to IT Act 2000&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Shri K.N. Gupta (CCA) &lt;br /&gt;Room No. 4006,&lt;br /&gt;Electronics Niketan&lt;br /&gt;6 CGO Complex&lt;br /&gt;New Delhi 110003&lt;br /&gt;e-mail:&lt;a class="mail-link" href="mailto:kgupta@mit.gov.in"&gt;kgupta@mit.gov.in&lt;/a&gt;&lt;br /&gt;Tele: 436 3073&lt;br /&gt;Fax: 439 5982&lt;br /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Shri A.B. Saha (Member Secretary)&lt;br /&gt;Room No. 2055,&lt;br /&gt;Electronics Niketan&lt;br /&gt;6 CGO Complex&lt;br /&gt;New Delhi 110003&lt;br /&gt;e-mail:&lt;a class="mail-link" href="mailto:saha@mit.gov.in"&gt;saha@mit.gov.in&lt;/a&gt;&lt;br /&gt;Tele: 436 0958&lt;br /&gt;Fax: 436 2924&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: center; "&gt;Meeting ended with a vote of thanks to the Chair.&lt;span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Minutes of the Second Meeting of the Cyber Regulation Advisory Committee (CRAC) held on 17-18 March, 2001 at Electronics Niketan, New Delhi under the Chairmanship of Hon'ble Minister (IT), Shri Pramod Mahajan.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: center; "&gt;(&lt;i&gt;List of Participants enclosed as Annexure-A&lt;/i&gt;)&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;The chairman welcomed the participants to the second meeting of the Committee to consider further the draft regulations proposed by the Controller of Certifying Authority (CCA).        '    " ~&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;During the ensuing discussions, following general recommendations/decisions were arrived at governing the overall formulation of the regulations that are necessary to bring about infrastructure facilitating activities envisaged under the IT Act 2000:&lt;/li&gt;
&lt;/ol&gt;
&lt;p class="Bodytext1" style="text-align: justify; "&gt;a)  Any regulation to be framed by the Controller draws its authority only from Section 89(2) of the Act. Moreover,    such regulations should complement the Rules already framed under the Section 87 of the Act.&lt;/p&gt;
&lt;p class="Bodytext1" style="text-align: justify; "&gt;b) To keep pace with the changing technology and standards, CCA may publicly notify/modify necessary specifications of technology, standards and procedures at regular interval (say, January of every year). Moreover, to adhere to the "principles of minimal governance", if any particular necessity emerges for inclusion of newer manifestations of any existing standard/technology/procedure, Controller should respond within ninety (90) days after receiving any specific request in writing, failing which it will deemed to have obtained his concurrence.&lt;/p&gt;
&lt;p class="Bodytext1" style="text-align: justify; "&gt;c) The commercial practices/interests may form the essential pedestal for the certification process. Aspects of cross-certification may preferably be left to the purview of the concerned market forces. However, the necessary interoperability will essentially be "market-driven" and not "authority-driven". This will also ensure that formulated rules and regulations stay in tune with market realities.&lt;/p&gt;
&lt;p class="Bodytext1" style="text-align: justify; "&gt;d) Strict adherence to open standards should be ensured to avoid emergence of monopoly of any kind.&lt;/p&gt;
&lt;p class="Bodytext1" style="text-align: justify; "&gt;e) Considering cost sensitiveness of the requisite digital signature certificate, families of technologies varying in convenience, reliability, availability, robustness, etc. may be allowed to inter-operate. However, CCA may undertake public awareness campaign to promote desirable best practices from time to time.&lt;/p&gt;
&lt;p class="Bodytext1" style="text-align: justify; "&gt;f)  The minimal regulations facilitating activities envisaged in the Act is desirable. Some of the proposed provisions can also be ensured in the form of "terms &amp;amp; conditions" governing the operations of Certifying Authorities.&lt;/p&gt;
&lt;p class="Bodytext1" style="text-align: justify; "&gt;g)   Emergence of guidelines governing smooth functioning may be better left to publications brought out by industry associations, public-minded professionals etc. Formulating rules and regulations in these regards should be minimal.&lt;/p&gt;
&lt;p class="Bodytext1" style="text-align: justify; "&gt;3. After framing the draft compilation of the requisite regulations in accordance with the conventional legal form in terms of content as well as structure with the assistance of the Ministry of Law, the regulations may be brought to the Ministry of Information Technology for approval.&lt;/p&gt;
&lt;p class="Bodytext1" style="text-align: justify; "&gt;4 The Committee considered the 18 regulations proposed in Agenda Item No.1 and the statement reproduced below contains the decision taken against each proposal.&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;SI&lt;/th&gt;&lt;th&gt;Item&lt;/th&gt;&lt;th&gt;Conclusions &lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1&lt;/td&gt;
&lt;td&gt;Regulation 1&lt;br /&gt;Standardising on two key-pairs for PKI in the country.&lt;br /&gt;Key-pair generation for subscribers by CAs.&lt;/td&gt;
&lt;td&gt;Regulation not required. &lt;br /&gt;Encryption Key pair not part of the IT Act. &lt;br /&gt;Already covered under Rule 3, 4 &amp;amp; 5 of notified CA Rules.&lt;br /&gt;Subscriber should be at liberty to bring his key pair that CA may verify before acceptance. (Section 40 of the Act)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2&lt;/td&gt;
&lt;td&gt;Regulation 2&lt;br /&gt;Encryption key-pair of subscribers to be maintained by CAs in a database and made available to enforcement and law agencies under directions of the Controller.&lt;/td&gt;
&lt;td&gt;Regulation not required.&lt;br /&gt;IT Act is silent regarding encryption.&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3&lt;/td&gt;
&lt;td&gt;Regulation 3&lt;br /&gt;Disclosure Record of CA.&lt;/td&gt;
&lt;td&gt;Disclosure may be done every six months. &lt;br /&gt;Necessary format for disclosure may be notified from time to time. (Para 2(f) above)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4&lt;/td&gt;
&lt;td&gt;Regulation 4&lt;br /&gt;Encryption Key Pair of CA to be made available to the Controller.&lt;/td&gt;
&lt;td&gt;Regulation not required in accordance to conclusions against 1 &amp;amp; 2 above.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5&lt;/td&gt;
&lt;td&gt;Regulation 5&lt;br /&gt;Cross-Certification with foreign CAs.&lt;/td&gt;
&lt;td&gt;As per recommendation 2(c) above.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;6&lt;/td&gt;
&lt;td&gt;Regulation 6&lt;br /&gt;Terms and Conditions subject to which license shall be issued by the Controller to the prospective CAs.&lt;/td&gt;
&lt;td&gt;Can be merged with regulation 11.&lt;br /&gt;As per the recommendation mentioned in 2(c) above.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;7&lt;/td&gt;
&lt;td&gt;Regulation 7&lt;br /&gt;Standards that may be considered for different activities associated with the CAs functions including standardization of contents of the Certificates to be issued by CAs and standardization of the Certificate Revocation List.&lt;/td&gt;
&lt;td&gt;As per the recommendation 2(b) above.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;8&lt;/td&gt;
&lt;td&gt;Regulation 8&lt;br /&gt;Information to be made publicly available by a CA on its website.&lt;br /&gt;Notice of suspension or revocation of license.&lt;/td&gt;
&lt;td&gt;CA must harness all form of networks and other practical media, and not only Internet, for disclosure to its subscriber and other interested parties.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;9&lt;/td&gt;
&lt;td&gt;Regulation 9&lt;br /&gt;Standardisation of Certificate Practice Statement.&lt;/td&gt;
&lt;td&gt;Agreed.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10&lt;/td&gt;
&lt;td&gt;Regulation 10&lt;br /&gt;Compromise of subscribers Digital Signature Key-Pair&lt;/td&gt;
&lt;td&gt;Agreed.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11&lt;/td&gt;
&lt;td&gt;Regulation 11 &lt;br /&gt; Description of classes of Certificates.&lt;/td&gt;
&lt;td&gt;Shall be merged with regulation 6 above. &lt;br /&gt;In addition to 3 classes of certificates as identified by international bodies, the regulation should be open to additional classes of certificates, if required.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12&lt;/td&gt;
&lt;td&gt;Regulation 12 &lt;br /&gt;Cross-Certification of CAs.&lt;/td&gt;
&lt;td&gt;It should be market-driven. (Recommendation 2(c) above).&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13&lt;/td&gt;
&lt;td&gt;Regulation 13&lt;br /&gt;Incorporation of Controllers Public Key Certificate as the "root” in all web browsers in the country.&lt;/td&gt;
&lt;td&gt;Regulation not required.&lt;br /&gt;Need for integrating Controller's root key in&lt;br /&gt;the browsers may not be feasible.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14&lt;/td&gt;
&lt;td&gt;Regulation 14&lt;br /&gt;Minimum key length for CAs and subscribers.&lt;/td&gt;
&lt;td&gt;Agreed for the provision of 1024 bits for subscriber/end-user and 2048 bits for CAs key pair.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15&lt;/td&gt;
&lt;td&gt;Regulation 15&lt;br /&gt;Audit of applicants to include manpower audit as well.&lt;br /&gt;Liability of CAs towards subscribers on account of their negligence.&lt;/td&gt;
&lt;td&gt;Regulation not required.&lt;br /&gt;Audit provision has already been covered&lt;br /&gt;under Rule 31 of CA rules notified by MIT.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;16&lt;/td&gt;
&lt;td&gt;Regulation 16&lt;br /&gt;Storage of Key-Pairs of CAs. &lt;br /&gt;Distribution of Key-Pairs / Certificates of subscribers by CAs.&lt;/td&gt;
&lt;td&gt;Not to be regulated. &lt;br /&gt;Recommendation 2(e) above shall be followed.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;17&lt;/td&gt;
&lt;td&gt;Regulation 17&lt;br /&gt;Documents to be submitted to the Controller along with the application for obtaining license to operate as CA.&lt;/td&gt;
&lt;td&gt;Already covered under rule 10 of CA rules notified by MIT. Any additional information can be sought through the recourse of public notices from time to time.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;18&lt;/td&gt;
&lt;td&gt;Regulation 18&lt;br /&gt;Upon acceptance of PKC by a subscriber, the PKC shall be published by the CA as required under the IT Act for access by the subscribers and relying parties.&lt;br /&gt;The CA will ensure the transmission of PKC and CRLs to the National Repository to be maintained by the Controller.&lt;/td&gt;
&lt;td&gt;Agreed.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p class="Bodytext1" style="text-align: center; "&gt;Meeting ended with a vote of thanks to the Chair.&lt;/p&gt;
&lt;hr /&gt;
&lt;p align="right" class="Bodytext1"&gt;&lt;span style="text-decoration: underline;"&gt;&lt;span&gt;Annexure - A&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p class="Bodytext1" style="text-align: left; "&gt;&lt;span&gt;First sitting of the second meeting of the “Cyber Regulation Advisory Committee” held on 17th March 2001 to consider adjourned agenda of the first meeting held on 6ft March 2001&lt;/span&gt;&lt;/p&gt;
&lt;p class="Bodytext1" style="text-align: center; "&gt;&lt;span&gt;&lt;i&gt;&lt;span style="text-decoration: underline;"&gt;List of Participants&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Sh Pramod Mahajan, Minister, Information Technology                  - Chairman&lt;/li&gt;
&lt;li&gt;Sh.S.C Jain , Secretary, Legislative Department&lt;/li&gt;
&lt;li&gt;Sh Vinay Kohli, Secretary, Ministry of Information Technology&lt;/li&gt;
&lt;li&gt;Sh. N. Parameswaran, DDG(LR), Department of Telecommunications&lt;/li&gt;
&lt;li&gt;Dr. Jaimini Bhagwati, Ministry of Finance&lt;/li&gt;
&lt;li&gt;Maj.Gen. M. G. Datar, Addl.D.G, IT, Army HQ, Ministry of Defence&lt;/li&gt;
&lt;li&gt;Sh Mukesh Mittal, Dy Secy, Ministry of Home Affairs&lt;/li&gt;
&lt;li&gt;Sh T A Khan, Sr. Dir, NIC, Ministry of Commerce&lt;/li&gt;
&lt;li&gt;Sh. K.R Ganapathy,CGM-IC,RBI&lt;/li&gt;
&lt;/ol&gt;
&lt;p align="left" class="Bodytext1"&gt;10. Sh.S.R-Mittal,Adviser,DIT, Reserve Bank of India&lt;/p&gt;
&lt;p align="left" class="Bodytext1"&gt;11. Sh Dewang Mehta, President, NASSCOM&lt;/p&gt;
&lt;p align="left" class="Bodytext1"&gt;12. Sh Amitabh Singhal, President, Internet Service Providers Association&lt;/p&gt;
&lt;p align="left" class="Bodytext1"&gt;13. Sh LN Behra, DIG, Director, Central Bureau of Investigation&lt;/p&gt;
&lt;p align="left" class="Bodytext1"&gt;14. Sh K N Gupta, Controller of Certifying Authority&lt;/p&gt;
&lt;p align="left" class="Bodytext1"&gt;15. Sh. Qamar Ahmed. Addl.C.P/Crime, DG Police by rotation from the States&lt;/p&gt;
&lt;p align="left" class="Bodytext1"&gt;16. Prof. R S Sirohi. I1T Delhi, Director, IIT Delhi&lt;/p&gt;
&lt;p align="left" class="Bodytext1"&gt;17. Sh.Sanjay Dhawan, ExecDirector,KPMG, Representing CII&lt;/p&gt;
&lt;p align="left" class="Bodytext1"&gt;18. Sh. M.A.J.Jeyaseelan, Secretary, FICCI&lt;/p&gt;
&lt;p align="left" class="Bodytext1"&gt;19. Sh. Subimal Bhattacharjee, Vice President ARGUS, Representing ASSOCHAM&lt;/p&gt;
&lt;p align="left" class="Bodytext1"&gt;20.  Sh A B Saha, Senior Director, Ministry of IT                        - Member Convener&lt;/p&gt;
&lt;p align="left" class="Bodytext1"&gt; &lt;/p&gt;
&lt;p class="Bodytext1" style="text-align: left; "&gt;&lt;span&gt;First sitting of  the second meeting of the “Cyber Regulation Advisory Committee” held on  18th March 2001 to consider adjourned agenda of the first meeting held  on 6ft March 2001&lt;/span&gt;&lt;/p&gt;
&lt;p class="Bodytext1" style="text-align: center; "&gt;&lt;span&gt;&lt;i&gt;&lt;span style="text-decoration: underline;"&gt;List of Participants&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Sh Pramod Mahajan, Minister, Information Technology                  - Chairman&lt;/li&gt;
&lt;li&gt;Sh.N.L. Meenu, Jt. Secretary, Legislative Department&lt;/li&gt;
&lt;li&gt;Sh Vinay Kohli, Secretary, Ministry of Information Technology&lt;/li&gt;
&lt;li&gt;Sh. N. Parameswaran, DDG(LR), Department of Telecommunications&lt;/li&gt;
&lt;li&gt;Dr. Jaimoni Bhagwati, Ministry of Finance&lt;/li&gt;
&lt;li&gt;Maj.Gen. M G Datar, Ministry of Defence&lt;/li&gt;
&lt;li&gt;Sh Mukesh Mittal, Dy Secy, Ministry of Home Affairs&lt;/li&gt;
&lt;li&gt;Sh T A Khan, Sr. Dir, NIC, Ministry of Commerce&lt;/li&gt;
&lt;li&gt;Sh. K.R Ganapathy,CGM-IC,RBI&lt;/li&gt;
&lt;/ol&gt;
&lt;p align="left" class="Bodytext1"&gt;10.  Sh Dewang Mehta, President, NASSCOM&lt;/p&gt;
&lt;p align="left" class="Bodytext1"&gt;11.  Sh Amitabh Singhal, President, Internet Service Providers Association&lt;/p&gt;
&lt;p align="left" class="Bodytext1"&gt;12. Sh LN Behra, DIG, Director, Central Bureau of Investigation&lt;/p&gt;
&lt;p align="left" class="Bodytext1"&gt;13. Sh K N Gupta, Controller of Certifying Authority&lt;/p&gt;
&lt;p align="left" class="Bodytext1"&gt;14. Sh. Dinesh Bhatt, Dy. Police Commissioner, Delhi&lt;/p&gt;
&lt;p align="left" class="Bodytext1"&gt;15. Prof. R S Sirohi. I1T Delhi, Director, IIT Delhi&lt;/p&gt;
&lt;p align="left" class="Bodytext1"&gt;16. Sh.Sanjay Dhawan, ExecDirector,KPMG, Representing CII&lt;/p&gt;
&lt;p align="left" class="Bodytext1"&gt;17. Sh. M.A.J.Jeyaseelan, Secretary, FICCI&lt;/p&gt;
&lt;p align="left" class="Bodytext1"&gt;18. Sh. Subimal Bhattacharjee, Vice President ARGUS, Representing ASSOCHAM&lt;/p&gt;
&lt;p align="left" class="Bodytext1"&gt;19.  Sh A B Saha, Senior Director, Ministry of IT                        - Member Convener&lt;/p&gt;
&lt;div id="_mcePaste"&gt;
&lt;div&gt;&lt;/div&gt;
&lt;span&gt; &lt;/span&gt; &lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/resources/deity-response-to-rti-on-decisions-of-crac'&gt;https://cis-india.org/internet-governance/resources/deity-response-to-rti-on-decisions-of-crac&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-01-09T15:26:26Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/down-to-earth-latha-jishnu-dinsa-sachan-moyna-january-15-2013-clash-of-the-cyber-worlds">
    <title>Clash of the cyberworlds </title>
    <link>https://cis-india.org/news/down-to-earth-latha-jishnu-dinsa-sachan-moyna-january-15-2013-clash-of-the-cyber-worlds</link>
    <description>
        &lt;b&gt;In an increasingly digital world, the issue of Internet freedom and governance has become hugely contested. Censorship and denial of access occur across the political spectrum of nations, even in liberal democracies. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;The article by Latha Jishnu, Dinsa Sachan and Moyna was published in &lt;a class="external-link" href="http://www.downtoearth.org.in/content/clash-cyberworlds?page=0,0"&gt;Down to Earth magazine's January 15, 2013 issue&lt;/a&gt;. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In run-up to the just-concluded World Conference on International Telecommunications in Dubai, there was a frenzied campaign to ensure that governments kept their hands off the Internet. It was feared the International Telecommunications Union, a UN body, was aiming to take control of the Internet. That hasn’t happened. But the outcome in Dubai has highlighted once again the double speak on freedom by countries that claim to espouse it and by corporations interested in protecting their interests, says Latha Jishnu, who warns that the major threat to the Internet freedom comes from the wide-ranging surveillance measures that all governments are quietly adopting. Dinsa Sachan speaks to institutions and officials to highlight the primacy of cyber security for nations, while Moyna tracks landmark cases that will have a bearing on how free the Net remains in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For months now a little-known UN agency, the International Telecommunication Union (ITU), has been looming large in cyberspace, portrayed as an evil force plotting to take over the Internet and threatening to destroy its freedom by rewriting archaic regulations. ITU, set up in 1865, is primarily a technical body that administers a 24-year-old treaty, International Telecommunication Regulations (ITRs), which are basic principles that govern the technical architecture of the global communication system.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/ITU.png" alt="ITU" class="image-inline" title="ITU" /&gt;&lt;/th&gt;
&lt;td style="text-align: justify; "&gt;How did the 193-nation ITU, which regulates radio spectrum, assigns satellite orbits and generally works to improve telecom infrastructure in the developing world, turn into everyone’s favourite monster in the digital world? The provocation was ITU’s World Conference on International Telecommunications (WCIT) in Dubai, where ITRs were proposed to be revised. Leaked documents of the proposals made to ITU had shown that statist countries like Russia and China, known for their crackdown on Internet freedom, had put forward proposals to regulate digital “crime” and “security” aspects that are currently not regulated at the global level for want of consensus on balancing enforcement with protection of individual rights. &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Other proposals were about technical coordination and the setting up of  standards that enable all the devices, networks and software across the  Internet to communicate and connect with one another. Although ITU  secretary general Hamadoun I Touré had emphasised that the Dubai WCIT  was primarily attempting to chart “a globally agreed-upon roadmap that  offers future connectivity to all, and ensures sufficient communications  capacity to cope with the exponential growth in voice, video and data”,  there was widespread scepticism among developed countries.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;&lt;span&gt;Online subversion in India&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;AT the seventh annual meeting of the Internet Governance  Forum in Baku, Azerbaijan, last November, Minister for Communications  and Information Technology Kapil Sibal was a star turn. He made an  elevating speech about the need to put in place a “collaborative,  consultative, inclusive and consensual” system for dealing with policies  involving the Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India, with 125 million Internet users—a number that “is  likely to grow to about half a billion over the next few years”—would be  a key player in the cyberworld of tomorrow, he promised.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to the minister, Internet governance was an  oxymoron because the concept of governance was for dealing with the  physical world and had no relevance in cyberspace. These were high  sounding words that crashed against the reality of India’s paranoia over  online subversion.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For starters, Sibal flew into a media blitz over Google’s  transparency Report which ranked India second globally in accessing  private details of its citizens. Even if it was a far second behind the  US, it was an embarrassing revelation for the government which appears  to have been rather enthusiastic in seeking information on the users of  its various services. Such user data would include social networking  profiles, complete gmail accounts and search terms used. In the first  half of 2012, India made 2,319 requests related to 3,467 users compared  with 7,969 requests by the US. Globally, Google clocked a total of  20,938 requests for user data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A few days down the line there was a public explosion  over the arrest of two young women in Palghar, near Mumbai, for posting a  prosaic comment on Facebook over Bal Thackeray’s death. Thanks to the  deliberately vague wording of Section 66A of the IT Act, such arrests  have become common and Rajya Sabha devoted a whole afternoon to discuss  the impugned legislation and seek its withdrawal. Sibal’s response has  been to issue guidelines on the use of this Section which civil society  organisations say will do nothing to sort out matters.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Then there are the IT (Intermediaries Guidelines) Rules,  2011, issued under Section 79 of the IT Act, which have been used  indiscriminately by business interests to shut down websites, resulting  in unbridled censorship of the Internet time and again. Although a  motion for its annulment was moved in Parliament by Rajya Sabha member P  Rajeeve, it was withdrawn after Sibal promised to talk to all  stakeholders. A host of MPs have termed the rules a violation of right  to freedom of speech besides going against the laws of natural justice.  The promised meeting of stakeholders has not yielded any results and  censorship on grounds of possible online piracy continues. In this  regard, India is more restrained than the US which has pulled down huge  numbers of domains on the ground they were violating intellectual  property by selling pirated goods.&lt;/p&gt;
&lt;p style="text-align: center; "&gt;&lt;img src="https://cis-india.org/home-images/userdata.png" alt="User Data" class="image-inline" title="User Data" /&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Western global powers, behemoth Internet companies, private telecom corporations and almost the entire pack of civil liberties organisations came together in a frenzied campaign to ensure that ITU kept its hands off the Internet. Massive online petitions were launched, backed by Internet companies such as search engine Google and social networking service Facebook. The Internet, they said, should not become an ITU remit because it would change the multi-stakeholder approach, which currently marks the way the Internet is governed, and replace it with government control that would curb digital freedom. Not only did the US administration oppose the revision of ITRs, the US Congress also passed a rare unanimous resolution against the WCIT proposals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the end, it was an anti-climax: nothing much came of these proposals. Although WCIT was marked by high drama—a walkout by the US and six European countries, a show of hands on a contested but innocuous resolution and an unexpected vote—the “final acts” (&lt;a href="http://www.itu.int/en/wcit-12/Documents/final-acts-wcit-12.pdf"&gt;http://www.itu.int/en/wcit-12/Documents/final-acts-wcit-12.pdf&lt;/a&gt;) or the changes in ITRs make no mention of the I word. Not once. The 30-page document states at the outset that “these regulations do not address the content-related aspects of telecommunications” —an indirect reference to the Internet.&lt;/p&gt;
&lt;table class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/32_20130115.jpg" alt="World Internet Usage" class="image-inline" title="World Internet Usage" /&gt;&lt;/th&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;Ultimately, it was a triumph of the US-led position even if 89 of the 144 eligible countries signed it. Most of the developed countries refused to sign it. Nor, unexpectedly, did India, and thereby hangs a curious tale. Officials who were privy to the negotiations told Down To Earth that India was all set to sign the new ITRs when its delegation got last-minute instructions from Delhi not to endorse them. “It was unexpected and a let-down for India and our global allies,” confesses an official of the Ministry of Communications &amp;amp; IT. “There was nothing in the final document that we had objections to.” According to the grapevine, Minister for Communications and Information Technology Kapil Sibal was facing pressure from two sides: the US Administration and domestically from civil society, Internet service providers and the private telecom players who had objected to India’s proposals on ITRs. The US is known to be keeping a close eye on what India decides to do on the new treaty which it can still ratify.&lt;/p&gt;
&lt;p&gt;In the Dubai treaty, the only ITR that does impinge on the Net is (Article 5B) on unsolicited bulk electronic communications or spam. But even here, what it merely states is that member-states should endeavour to take necessary measures to prevent the “propagation of unsolicited bulk electronic communications and minimize its impact on international telecommunication services.”&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;In many ways, what took place during the hectic days before and during the December 3-14 WCIT was in a broad sense a replay of the Cold War scenario of the good (freedom-loving countries) versus evil (authoritarian or autocratic regimes), although alliance may have shifted in the two blocs. What is clear is that a larger geopolitical fight is playing out with the Internet as disputed terrain. American analysts themselves have pointed out that the “US got most of what it wanted. But then it refused to sign the document and left in a huff.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even the innocuous Article 5A, which calls on members “to ensure the security and robustness of international telecommunication networks”, was interpreted by US delegation head Terry Kramer as a means that could be used by some governments to curb free speech!&lt;br /&gt;&lt;br /&gt;As an outraged Saudi delegate said, “It is unacceptable that one party to the conference gets everything they want and everybody else must make concessions. And after having made many concessions, we are then asked to suppress the language which was agreed to. I think that that is dangerous. We are on a slippery slope.” The final outcome: all the contentious issues were relegated to resolutions, which have no legal basis.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indeed, the US has managed to get its way on most issues: protecting the mammoth profits of its Internet companies and ensuring that control of the Internet address system, now done by a group based in the US, will not be shared with other ITU members. And, the likes of Google (2011 profit: $37.9 billion) and Facebook will not have to pay telecom companies for use of their networks to deliver content.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Challenges of securing cyberworld&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;E-commerce in India, where every tenth person is online, is on the rise—and, consequently, crime on the Internet. In 2011, the country’s nodal agency for handling cyber crime, Indian Computer Emergency Response Team, tackled 13,301 incidences of security breach. The incidents ran the gamut from website intrusions, phishing to network probing and virus attacks. Further, in 2009, 2010, 2011 and 2012 (until October), there were 201, 303, 308 and 294 cyber attacks respectively on sites owned by the Indian government. Most notably, hacker group Anonymous defaced the website of Union Minister of Communications and Information Technology, Kapil Sibal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To beef up cyber security, the Union ministry plans to pump in Rs 45 crore in 2012-13. It also put up a draft cyber security policy for public comments in 2011. Currently, cases involving cyber security and crime are handled under the IT Act of 2000 (Amendment 2008) and the Indian Penal Code.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But will the government go about its business of securing the Net in a responsible manner? There is scepticism. Section 69 of the Act gives any government agency the right to “intercept, monitor or decrypt” information online. Chinmayi Arun, assistant professor of law at National Law University in Delhi, said at the Internet Governance Conference held at FICCI in October that crimes like defamation are not on the same page as cyber terrorism, and “we have to question whether they warranty invasion of privacy”. She added that the workings of the surveillance system has to be made more open to build public trust.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash, policy director at Centre for Internet and Society (CIS) in Bengaluru, draws attention to a fundamental flaw in the section. “Government is allowed to wire tap under the Telegraph Act, 1885. But the Act lays out specific guidelines for such an action. For example, you can only tap phones in the case of a ‘public emergency’ or ‘public safety’ situation. The IT Act does not put such limitations on interception of information,” he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Cyber security and ITU&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A few months prior to the controversial World Conference on International Telecommunications in Dubai, countries, including Russia and Arab states, had proposed measures that would, through International Telecommunication Union (ITU), grant disproportional power to countries to control the Internet in the name of security measures. Several proposals, most notably those of India and Arab States, explicitly stated in the proposed Article 5A that countries should be able to “undertake appropriate measures, individually or in cooperation with other Member States” to tackle issues relating to “confidence and security of telecommunications/ICTs”. It raised alarm among civil society. US-based think tank Center for Democracy and Technology (CDT) said in its report dated September, 2012, that cyber security does not fall under the ambit of International Telecom Regulations, and some countries would misuse such privileges for “intrusive or repressive measures”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The proposal by African member states recommended that nations should “harmonise their laws” on data retention. In other words, intermediaries would have to retain public data for a long period so that governments can access it whenever they please. With regard to this, CDT noted, “Not only do national laws on data retention vary greatly, but there is ongoing controversy about whether governments should impose data retention mandates at all.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A clause in the Arab proposal on routing said, “A Member State has the right to know how its traffic is routed.” Currently, the way Internet works, senders and recipients do not know how data between their computers travels or is routed. However, enabling countries to have control over routing has its dangers. CDT notes, “(This) would simply not work and could fundamentally disrupt the operation of the Internet.” Internet traffic travels over an IP network. While travelling, it is fragmented into small packets. Packets generally take a different path across interconnected networks in many different countries before reaching the recipient’s computer. CDT notes providing routing information to countries would require “extensive network engineering changes, not only creating huge new costs, but also threatening the performance benefits and network efficiency of the current system”. Although routing was not part of India’s proposal, Ram Narain, deputy director general at the department of telecommunications, told Down To Earth it was one of the country’s concerns.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, to civil society’s partial relief, such draconian cyber security clauses were not adopted in the new itr treaty. Two clauses added to the treaty, Article 5A and 5B, address some cyber security concerns. Titled “Security and robustness of networks”, Article 5A urges countries to “individually and collectively endeavour to ensure the security and robustness of international telecommunication networks”. Article 5B talks about keeping tabs on spam.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prasanth Sugathan, senior advocate with Software Freedom Law Centre, an international network of lawyers, says while he would have preferred that the two clauses were kept out of the new treaty, they do not seem harmful. “They are a much toned down version of what Arab states and Russia had suggested,” he says.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;This is one reason India, Brazil and other democracies from the developing world also want a change in ITRs. They want the Internet behemoths to pay for access to their markets so that such revenues can be used to build their own Internet infrastructure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the furious debate on keeping the Net free of international control even hawk-eyed civil society organisations prefer to ignore the monetary aspects of Net control. Some analysts believe that maintaining the status quo is not so much about protecting the values of the Internet as about safeguarding interests, both monetary and hegemonistic. Such an assessment may not be wide of the mark if one joins the dots. Google, says a Bloomberg report of December 10, “avoided about $2 billion in worldwide income taxes in 2011 by shifting $9.8 billion in revenues into a Bermuda shell company, almost double the total from three years before”. It also said that the French, Italian, British and Australian governments are probing Google’s tax avoidance in its borderless operations.&lt;/p&gt;
&lt;table class="vertical listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Top10Internet.png" alt="Top 10 Internet" class="image-inline" title="Top 10 Internet" /&gt;&lt;/th&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;What is clear, however, is that a number of countries for reasons springing from different motivations, appear determined to undermine America’s control of the outfits that now define how the Internet works. Although the US maintains that ICANN (Internet Corporation for Assigned Names and Numbers) is a private, non-profit corporation, it is overseen by the US Commerce Department. According to People’s Daily, what the US spouts about Net freedom is so much humbug. In an August 2012 report, the leading Chinese daily claimed the US “controls and owns all cyberspaces in the world, and other countries can only lease Internet addresses and domain names from the US, leading to American hegemonic monopoly over the world’s Internet”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It also highlighted a fact that has slipped below the radar. During the Iraq invasion, the US government asked ICANN to terminate services to Iraq’s top-level domain name “.iq” and thereafter all websites with the domain name “.iq” disappeared overnight. It charges the US with having “taken advantage of its control over the Internet to launch an invisible war against disobedient countries and to intimidate and threaten other countries”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While this may be true, the irony is that China, with its great firewall of censorship, is in no shape to position itself as a champion of freedom. Like other authoritarian countries, it will do everything to police the Net and control it.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;The right of countries and peoples to access the Net was highlighted in Dubai when some African countries raised the issue of US control of the global Internet. Some of these, such as Sudan, have long been complaining about Washington’s sanctions that entail denial of Internet services. ITU officials point out that Resolution 69, first passed in the 2008 meeting, invoked again in 2010 and dusted off once again for the WCIT negotiations, invoked “human rights” to argue for “non-discriminatory access to modern telecom/ ICT facilities, services and applications”. Says Paul Conneally, head of Communications &amp;amp; Partnership Promotion at ITU, “The real target of these resolutions are US sanctions imposed on nations that are deemed bad actors. These sanctions mean that people in those countries—not just the government, mind you, but everyone, innocent and guilty alike—are denied access to Internet services such as Google, Sourceforge, domain name registrars such as GoDaddy, software and services from Oracle, Windows Live Messenger, etc.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The catalogue of Sudan’s complaints shows at least 27 instances in 2012 when companies from Google to Microsoft and Paypal to Oracle cut off their services to the African country. This might explain why major companies would be opposed to the resolution on a right to access Internet services. Such a right would allow countries to use ITRs to compel them to provide services they might otherwise have preferred not to. But so far all such sanctions appear to have been a decision of the US Administration.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The problem of the digital divide, in fact, did not get the headlines it should have. Africa accounts for just 7 per cent of the 2.4 billion people who use the Net worldwide and penetration in the region is just 15.6 per cent of the population. Compare this with North America where over 78 per cent are linked to the digital world and Touré’s logic about the ITU’s mandate appears reasonable.&lt;/p&gt;
&lt;table class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;&lt;span&gt;When Apple censors the drone war&lt;/span&gt;&lt;/b&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;NETIZENS know that the Internet suffers from the  depredations of government, hackers and viruses. But not many are aware  that companies are as prone to taking legitimate stuff off the Net on  the flimsiest grounds. In the case of Apple it could have been misplaced  patriotism or plain business sense that prompted it to block an app  which monitors drone strike locations in November last year.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img align="left" alt="image" class="standalone-image" height="279" src="http://www.downtoearth.org.in/dte/userfiles/images/36_20130115.jpg" width="141" /&gt;The  App Store rejected the product, calling it “objectionable and crude”.  Drones+ (see photo) is an application that simply adds a location to a  map every time a drone strike is reported in the media and added to a  database maintained by the UK’s Bureau of Investigative Journalism. Josh  Begley, a graduate student at New York University, who developed the  app, says it shows no visuals of war or classified information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;All it does is to keep its users informed about when and  where drone attacks are taking place in Pakistan and Afghanistan. “This  is behavior I would expect of a company in a repressive country like  China, not an iconic American company in the heart of Silicon Valley,”  says a petition to the company CEO. Did Apple’s censorship have anything  to do with the fact that it received huge contracts from the Pentagon?  US legislators have joined the protests against Apple.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The most brazen act of corporate censorship occurred in  August 2012 with NASA’s livestream coverage of the Curiosity rover’s  landing on Mars in the space agency’s $2.5 billion mission. A news  agency, Scripps, coolly claimed as its own the public domain video  posted on NASA’s official YouTube channel that documented the epic  landing (see our opening visuals). “This video contains content from  Scripps Local News, who has blocked it on copyright grounds. Sorry about  that,” said a message on NASA’s blackened screen. So much for the  strict US laws aimed at curbing online piracy!&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Touré noted that the revised ITRs would see greater transparency in global roaming charges, lead to “more investment in broadband infrastructure” and help those with disabilities. But he was hopeful that the new treaty signed in Dubai would make it possible for the 4.5 billion people still offline to be connected. “When all these people come online, we hope they will have enough infrastructure and connectivity so that traffic will continue to flow freely,” Touré said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But should ITU govern the Net? Not in its entirety, according to experts. For one, ITU until the Dubai meeting was far from being transparent and does not allow participation of civil society or other stakeholders in its negotiations unless they are part of the official delegation of the member-states. In fact, even critics of the current system, who think the system is lopsided and hypocritical, believe ITU needs to reform itself and confine to the carrier/infrastructure layer of the Internet. Nor should it get into laying down standards which is done by Internet Engineering Task Force (IETF) and the naming and numbering that is managed by ICANN.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But Conneally counters this by asking what would happen if the US decided to deny domain name root zone to Iran because of its bad human rights record. “Suppose it ordered Verisign to remove .IR from the DNS root and make it non-functional. Would we want ICANN/the Internet governance regime to be used as a political/strategic tool to reform Iran? What happens to global interoperability when the core infrastructure gets used in that way?”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Who then should ensure that the Internet is run in a free and open manner? Should it be the Internet Governance Forum (IGF)? But IGF is to be an open consultative forum that cannot by itself govern. It brings in participation for any or all Internet-related policy processes but it by itself was never supposed to do policy or governance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Parminder Jeet Singh, executive director of ItforChange, says whoever governs is the government for that purpose. “This truism is significant in the present context, because there is an attempt by those who really control/ govern the Internet at present, largely through illegitimate and often surreptitious ways, to confuse issues around Internet governance in all ways possible, including through abuse of established language and political principles and concepts.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ITforChange is a Bengaluru institution working on information society theory and practice, especially from the standpoint of equity, social justice and gender equality, and it is that perspective which informs Singh’s suggestions. “What we need are safeguards as, for instance, with media regulation. The Internet, of course, is much more than media. It is today one of the most important factors that can and will influence distribution of economic, social and political power. Without regulation it will always be that those who currently dominate it will take away the biggest pie.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;&lt;span&gt;Surveillance club&lt;/span&gt;&lt;/b&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;Eight Indian companies are among the 700 members of  European Telecommunications Standards Institute. The group works with  government and law enforcement agencies to integrate surveillance  capabilities into communications infrastructure. It also hosts regular  meetings on lawful interception&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt; Wipro Technologies &lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt; Associate Service Providers&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;•  HCL Technologies Limited&lt;/td&gt;
&lt;td&gt;• Associate Consultancy for Co./Partnership&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;• Accenture Services Pvt Ltd&lt;/td&gt;
&lt;td&gt;• Observers&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;• CEWiT&lt;/td&gt;
&lt;td&gt;• Associate Research Body&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;• Saankhya Labs Pvt Ltd&lt;/td&gt;
&lt;td&gt;• Associate Manufacturers&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;• Sasken Communication&lt;/td&gt;
&lt;td&gt;• Associate Manufacturers&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;• Technologies&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;• SmartPlay Technologies&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Associate Consultancy for Co./Partnership&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;• TEJAS NETWORKS LTD&lt;/td&gt;
&lt;td&gt;• Associate Manufacturers&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Other critics of the current system concede that bringing governments on board, especially authoritarian and statist powers which the digital world threatens, would give them perverse incentives to control it. But this threat should be met not by insisting that the Internet needs no governance or regulation, but by safeguards that ensure equitable access and benefits, Singh stresses.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the jury is out on the question whether the new ITRs will make any material difference to the way, and if at all, the Net will come under added government oversight and intervention, developments elsewhere show that ITU is not the main threat to digital freedom.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The irony is that while cyber security is contentious in ITU, other international organisations, such as the UN Office on Drugs and Crime (UNODC) and a clutch of influential telecom industry associations, are pushing for surveillance programmes that ensure policing of a high order with sophisticated infrastructure to monitor online communications. A host of countries already have such systems in place and are pressuring countries like India to fall in line.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A UNODC report, titled ‘The use of the Internet for terrorist purposes’, has detailed how countries can and should use new technology for online surveillance—all in the name of anti-terrorism. The report discusses sensitive issues such as blocking websites and using spyware to bypass encryption and also urges countries to cooperate on an agreed framework for data retention.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the same time, powerful industry bodies, such as ATIS (Alliance for Telecommunications Industry Solutions) and the European Telecommunications Standards Institute (ETSI), are reported to be working with government and law enforcement agencies to integrate surveillance capabilities into communications infrastructure, according to Future Tense, a project which looks at emerging technologies and how these affect society, policy and culture. It says India is under pressure from another industry organisation, the Telecommunications Industry Association (TIA), “to adopt global standards for surveillance”, calling on the country’s government to create a “centralized monitoring system” and “install state-of-the-art legal intercept equipment”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;TIA is a Washington-based trade group which brings together companies such as Nokia, Siemens Networks and Verizon Wireless, and is focused on issues related to electronic surveillance and is developing standards for intercepting VOIP and data retention alongside with ETSI and ATIS. At least seven Indian companies are members of ETSI, which is said to hold international meetings on data interception thrice a year.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Add to this chilling list the International Chamber of Commerce. It is reported to be seeking the establishment of surveillance centre hubs of several countries to help governments intercept communications and obtain data that is stored in cloud servers in foreign jurisdictions. Given this backdrop why are the US and its cohorts creating a ruckus on ITRs?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It would also mean that by focusing on ITRs and ITU as a major threat to Internet freedom civil society may be jousting at windmills.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Malice and freedom of speech&lt;/h2&gt;
&lt;p&gt;&lt;i&gt;Two suits highlight the challenge of treading between the two&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Among the many legal cases in India related to the use and misuse of the world wide web, two stand out for involving web giants and provoking sharp reaction. These are the cases registered in Delhi district courts in December 2011, objecting to chunks of content—portraying prominent political figures and religious places among others in a certain light—hosted on websites. One was filed by a Delhi journalist, Vinai Rai, requesting the court to press criminal charges against 21 web agencies, including Google, Facebook and Yahoo! India. The other, filed by a social activist, M A A Qasmi, was a civil suit requesting action against 22 web agencies. Both mentioned that the content on the websites was inflammatory, threat to national integrity, unacceptable, and created enmity, hatred and communal discord.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img alt="Source: Google Transparency Report" height="233" src="http://www.downtoearth.org.in/dte/userfiles/images/37_20130115.jpg" title="Source: Google Transparency Report" width="457" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A year on, tangible impact has not been much. The number of accused in the civil case has come down to seven web agencies and in the criminal case the government is yet to issue summons to the companies concerned (see ‘The case so far’). However, these litigations are seen as landmarks in the recent history of the Internet and its interaction with societies and governments. The cases—especially off-the-record comments by the judiciary suggesting blanket ban and pre-screening of all content—provoked a debate on the freedom of expression and Indian cyber laws.&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The case so far &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;JANUARY 13, 2012:&lt;/b&gt; Delhi High Court dismisses petition by Google and Facebook asking to be absolved of criminal charges filed in district court&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;JANUARY 20:&lt;/b&gt; High Court asks for reply from Delhi Police in response to plea by Yahoo! India challenging district court summons&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;FEBRUARY 16:&lt;/b&gt; Court refuses to stay proceedings against Facebook and Google but allows them to be  represented by counsel&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;MARCH:&lt;/b&gt; Court dismisses  criminal charges against Yahoo! India  and Microsoft but says the charges  can be revived if new evidence comes  to light. Sets aside summons&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Malicious content exists on the web and may even need to be taken down, but the laws used to remove malicious content can also be used to curb political speech, thus, infringing on the right to freedom of expression, says Prasanth Sugathan, senior advocate with Software Freedom Law Centre, an international network of lawyers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some like Pranesh Prakash of non-profit Centre for Internet and Society believe the IT Rules are at odds with the IT Act and give powers for censorship. He explains that the IT Act, 2000, provides for protection of intermediaries; web browsers, social networking sites and websites cannot be held responsible for what a third party publishes on their forums—“similar to the way in which we cannot sue a telephone agency or a post office for someone else making use of these platforms to harass or defame another person”. But the IT rules of 2011 watered down this protection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Supreme Court advocate and cyber law expert Pavan Duggal explains how. The Act states once a complaint is made against certain content, the web agency hosting it must notify the person who put up the content, verify the content and judge whether it needs to be removed. But the rules state that once the web agency is notified it must remove the content within 36 hours or it could be prosecuted for not acting on the complaint. The rules have gone beyond the Act’s scope, especially vis-a-vis privacy and data protection, leaving no scope for hearing out the accused, he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The disjunct between the Act and the rules is being contested in  various spheres, including Parliament. But there is a bright side too.  Duggal believes the cases have brought pertinent issues, like free  speech and privacy concerns, into the public domain. Ramanjeet Chima,  policy adviser for Google, says freedom of expression is paramount for  Google but the recognition of local sentiments is also being given equal  weightage.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Senior advocate Sidharth Luthra, who was representing Facebook in the  Delhi High Court, wonders whether the existing Indian laws are in tune  with the ever-changing online world. Unwilling to comment on the case,  he says the law is limited in its scope, while technology is not.  Refusing to comment on the cases, the Google adviser emphasised the need  to use the existing provisions of big web agencies to address  grievances regarding content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Internet “is not the wild wild west”; all content, users and  viewers can be traced, Duggal cautions. Since the Internet can impact  political issues government is increasingly looking for ways to control  it. “There is no ideal solution but it is evident that some monitoring  and regulation are required, and in all parts of the world all regimes  are in the process of addressing this,” he says.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/down-to-earth-latha-jishnu-dinsa-sachan-moyna-january-15-2013-clash-of-the-cyber-worlds'&gt;https://cis-india.org/news/down-to-earth-latha-jishnu-dinsa-sachan-moyna-january-15-2013-clash-of-the-cyber-worlds&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2013-01-15T06:57:48Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/panel-discussion-on-e-commerce-at-nlsiu">
    <title>Panel Discussion on E-Commerce at NLSIU</title>
    <link>https://cis-india.org/news/panel-discussion-on-e-commerce-at-nlsiu</link>
    <description>
        &lt;b&gt;Pranesh Prakash was a panelist at this event held at the National Law School of India University on January 7, 2013.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Suswagata Roy &lt;a class="external-link" href="http://www.coolage.in/2013/01/19/panel-discussion-on-e-commerce-at-nlsiu/"&gt;posted a report of this event&lt;/a&gt; in Cool Age on January 19, 2013.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;E-Commerce in India has brought about a revolution and has changed the way businesses are conducted. In a short period of time, E-Commerce has seen tremendous growth and has been able to generate a market for itself. This definitely seems to be just the beginning and a bright future awaits it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Given that E-Commerce is a hot topic and has already given rise to some  pertinent legal issues, the Law and Technology Committee of National Law  School of India University held a panel discussion on the same on 7&lt;sup&gt;th&lt;/sup&gt; Jan, 2013 at 4 PM in the Training Centre, NLSIU Campus. The Panel,  which consisted of Mr. Stephen Mathias (Partner, Kochhar and Co.), Mr.  Pranesh Prakash (Policy Director, Centre for Internet and Society) and  Mr. N. Vijayashankar (founder Chairman of Digital Society Foundation),  focused on three issues in order to bring forth their key points.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The issues that were highlighted through the discussion were:&lt;br /&gt; &lt;br /&gt; &lt;b&gt;1.&lt;/b&gt; &lt;b&gt;E-Commerce and Privacy&lt;/b&gt;: Privacy and  the internet has been an important issue with which the legal community  has been grappling for a long time. There are no specific legislations  in India which protect privacy especially in relation to the internet.  Protecting private and confidential information of the users is a  primary concern of E-Commerce websites which also highlights the related  issue of data protection. The customers' financial information is in  special need of protection. While dealing with this issue questions like  who is responsible for such protection, what data can be shared and  what usage will it be put to use will have to be looked at? While  dealing with privacy how the government will create a balance between  protecting confidential information and providing information to the  regulators to ensure no sham transactions, money laundering and tax  evasion is being carried on needs to be addressed.&lt;br /&gt; &lt;br /&gt; &lt;b&gt;2.&lt;/b&gt; &lt;b&gt;E-Commerce and its compatibility with other laws: the need for a separate Act:&lt;/b&gt;E-Commerce  has definitely given rise to a new form of transaction. Thus, related  laws such as law of contracts, law of evidence, taxation will all have  to evolve to accommodate the new form of legal dealing. Contracts will  have to evolve to validate such online transactions while law of  evidence will have to evolve in order to sustain disputes based on such  transactions. Many pertinent questions relating to intellectual property  rights also arise especially in the area of copyrights. While minor  amendments have been made to the Indian Evidence Act and to the  Information Technology Act, they are not sufficient to handle this  advanced method of conducting business. Moreover, the Information  Technology Act is an enabling Act and this complicates matters even  more. These issues give rise to the obvious question of needing a  separate Act to regulate E-Commerce. An E-Commerce bill was drafted in  1998 which has never been given any attention and which may not be  relevant anymore after the changes that technology has undergone over  more than a decade.&lt;br /&gt; &lt;br /&gt; &lt;b&gt;3.&lt;/b&gt; &lt;b&gt;E-Commerce and Cyber Crimes&lt;/b&gt;:  E-Commerce has opened new avenues of dealing with consumers in the  virtual world and thus, has opened new modes of proliferation of cyber  crimes. It has resulted in an increased need to secure the laws in  relation to fraud prevention, money laundering and phishing. It is  imperative to look at the cyber laws in India and whether they are  sufficient to deal with such issues in the wake of E-Commerce. How  should the law deal with such issues and what regulatory compliances are  required for E-Commerce websites in order to deal with these issues?&lt;br /&gt; &lt;br /&gt; Thus, though E-Commerce is on the rise and is a welcome way of  conducting business and has entranced many consumers, its effective  utilizations and growth is viable only if a sturdy legal framework is in  place. The panel discussion brought forth such issues and discussed the  solutions for the same.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/panel-discussion-on-e-commerce-at-nlsiu'&gt;https://cis-india.org/news/panel-discussion-on-e-commerce-at-nlsiu&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-02-03T10:37:05Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/livemint-january-4-2013-sanjukta-sharma-cool-jobs">
    <title>Cool Jobs | Parmesh Shahani, Head, Godrej India Culture Lab</title>
    <link>https://cis-india.org/news/livemint-january-4-2013-sanjukta-sharma-cool-jobs</link>
    <description>
        &lt;b&gt;The man behind Mumbai’s most original ideas space on being a cross-pollinator &lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The following interview was &lt;a class="external-link" href="http://www.livemint.com/Leisure/ZRt3AxEo6ZC0qqxfbpPkLJ/Cool-Jobs--Parmesh-Shahani-Head-Godrej-India-Culture-Lab.html"&gt;published in LiveMint&lt;/a&gt; on January 4, 2013.&lt;/p&gt;
&lt;hr /&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Parmesh621x414.jpg" alt="Parmesh" class="image-inline" title="Parmesh" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Vikhroli catalyst &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Parmesh%20Shahani"&gt;Parmesh Shahani&lt;/a&gt;&lt;/span&gt;, a former editorial director of &lt;i&gt;Verve&lt;/i&gt; magazine, thought up the Godrej India Culture Lab, a cultural ideas  platform, after becoming a TED Fellow in 2009, realizing then that  Mumbai, or India, has no space that encourages cross-pollination of  ideas around contemporary society, anthropology and culture.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Shahani, the author of &lt;i&gt;Gay Bombay: Globalization, Love And (Be)Longing in Contemporary India, &lt;/i&gt;has earlier managed research for Massachusetts Institute of Technology (MIT) think tank related to media convergence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ever  since Godrej’s Nisa Godrej took up his idea, the Godrej India Culture  Lab has hosted a conference called Urban (Re)imagination—which it  launched in 2011—talks by Japanese architect Tadao Ando, and MIT  economist Abhijit Banerjee, film screenings and book readings on themes  as diverse as Calcutta jazz and &lt;i&gt;jugaad&lt;/i&gt;. Shahani says he works on weekends and looks forward to Monday mornings. Edited excerpts from an interview:&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What exactly does your work involve?&lt;/b&gt;&lt;br /&gt;My  work involves identifying interesting people and ideas and then  connecting them to each other—either through public talks, conferences,  salons or other means of interaction. There are certain themes I am  interested in exploring, such as what it means to be modern and Indian  today, what it means to be young or urban, and to be connected through  technology. My work often feeds directly into the larger Godrej group  efforts. We have a campaign called Godrej LOUD—Live Out Ur Dreams—on MBA  campuses across India with excellent results.&lt;/p&gt;
&lt;div class="p"&gt;&lt;/div&gt;
&lt;div class="p"&gt;&lt;b&gt;What is the best part of your job?&lt;/b&gt;&lt;/div&gt;
&lt;div class="p" id="U1904193494415NiD" style="text-align: justify; "&gt;It  doesn’t feel like a job. It feels like a calling, a mission, and is an  incredible adventure. Each day is different—and fun. It enables me to  use all the different aspects of my mind, and tap into my global  networks to focus on how we are looking at the changes taking place in  contemporary India. I love meeting other people who are on the same  mission—the people at Gateway House, India’s first foreign policy think  tank, or the Centre for Internet and Society in Bangalore, or people  like Rikin Gandhi from Digital Green that trains farmers to use cameras  to record their best practices and share it with each other.&lt;/div&gt;
&lt;div class="p" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div class="p"&gt;&lt;/div&gt;
&lt;div class="p"&gt;&lt;b&gt;&lt;br /&gt;What are your challenges and what more do you want to bring into the Lab?&lt;/b&gt;&lt;/div&gt;
&lt;div class="p" id="U19041934944150L" style="text-align: justify; "&gt;At  this moment we are more of a sandbox and catalyst. I’d like us to start  producing original research soon by having full-time experts on board.  We have recorded videos of all our talks of the past two years; they  will go up on our website, which is under development. Finally, I’d like  to attract more audiences to our events and efforts. We’ve already put  our Godrej campus at Vikhroli, Mumbai, on the cultural map of the city.&lt;/div&gt;
&lt;div class="p" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div class="p"&gt;&lt;/div&gt;
&lt;div class="p"&gt;&lt;b&gt;&lt;br /&gt;What has been your favourite project here? &lt;/b&gt;&lt;/div&gt;
&lt;div class="p" id="U1904193494415u0E" style="text-align: justify; "&gt;My favourite project has got to be the recent &lt;i&gt;Museum of Memories&lt;/i&gt; that I curated in an abandoned 60,000 sq. ft Godrej warehouse on 15  December 2012, in collaboration with other city organizations like  Junoon, Visual Disobedience, Brown Paper Bag, as well as loads of  performers, artists and musicians from the city. It was a pop-up one-day  only event with performances, music, theatre, tea, yoga, live art,  graffiti, videos, dance, robots, alternate reality games, and more. The  event bridged different spaces and it will remain very special.&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/livemint-january-4-2013-sanjukta-sharma-cool-jobs'&gt;https://cis-india.org/news/livemint-january-4-2013-sanjukta-sharma-cool-jobs&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-01-17T05:55:47Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/mobile-india-2013">
    <title>Mobile Broadband: Leveraging for Business Transformation </title>
    <link>https://cis-india.org/news/mobile-india-2013</link>
    <description>
        &lt;b&gt; Mobile India 2013 is being held at the Chancery Pavillion, Bangalore on 9 January 2013. Sunil Abraham is speaking at this event.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Mobile India 2013  is the one of the first premier conferences and will be the curtain raiser for Mobile Broadband revolution in the country. It is associated with The Fifth International Conference on COMmunication Systems NETworkS (COMSNETS), the world’s premier international conference on networking and communications technology innovation.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Keynote Speeches&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; Keynote - 1: Prof. Bhaskar Ramamurthi &lt;/b&gt;, Director, IIT     Madras will deliver the joint keynote speech for COMSNETS 2013 and     Mobile India 2013.     &lt;br /&gt; &lt;b&gt; Keynote - 2 : &lt;a href="http://comsnets.org/mobile_session1.html#1"&gt;Sanjay Nayak &lt;/a&gt; &lt;/b&gt;, Chief Executive Officer &amp;amp; Managing Director, Tejas     Networks.&lt;a href="http://www.tejasnetworks.com/"&gt; Tejas Networks&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mobile India 2013 will try to unravel the mysteries in the       following sessions.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Session 1: Enterprises on the move&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;"For a preview, read &lt;a href="http://yourstory.in/2012/12/enterprises-on-the-move/"&gt; http://yourstory.in/2012/12/enterprises-on-the-move/ &lt;/a&gt; "&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Enterprises are exploring ways to leverage the power of smart       devices, the cloud, and broadband to be agile, flexible, and       productive. The IT managers in organizations are challenged to       support variety of devices (viz. BYOD) within the organization, at       the same time providing the required organizational security and       performance support to the employees. This session will deliberate       on the challenges and opportunities of today's networked world for       enterprises on the move.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; Panelists: &lt;a href="http://comsnets.org/mobile_session1_2.html#1"&gt; Ashvin           Vellody &lt;/a&gt;, Director - Management Consulting, KPMG India; &lt;a href="http://comsnets.org/mobile_session1_2.html#2"&gt; Dr. K.K.           Ramakrishnan &lt;/a&gt;, Distinguished Member of the Technical         Staff, AT&amp;amp;T Labs Research, USA; &lt;a href="http://comsnets.org/mobile_session1.html#5"&gt; Puneet           Gupta &lt;/a&gt;, AVP and Head of Mobility Research, Infosys SET         Labs; Sai Pratyush, Head-Enterprise Products, Tata Teleservices;         &lt;a href="http://comsnets.org/mobile_session1.html#4"&gt; E.           Manikandan &lt;/a&gt;, Head-Channels and Alliances, Ramco Systems;         &lt;a href="http://comsnets.org/mobile_session1.html#3"&gt; Umesh           Sachdev &lt;/a&gt;, Co-founder and CEO, Uniphore ; &lt;a href="http://comsnets.org/mobile_session1_3.html#4"&gt; Yathish,           L, N. &lt;/a&gt;, CTO, Huawei Technologies &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; Moderator: &lt;a href="http://comsnets.org/mobile_session1.html#2"&gt; Swami           Krishnan &lt;/a&gt;, VP and Head-Marketing, Sasken Communication         Technologies &lt;/b&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Session 2: Massively Open Online Education&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;"For a preview, read &lt;a href="http://yourstory.in/2012/12/massively-open-online-education/"&gt; http://yourstory.in/2012/12/massively-open-online-education/ &lt;/a&gt;".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Online and Internet based education has permeated in to schools       and colleges today. Massively Open On-line Course (MOOC)       initiatives such as National Programme on Technology Enhanced       Learning (NPTEL) in India and those by leading institutions such       as MIT and Stanford in the US are democratizing education and       making it available globally over the Internet. In India, the       Government has been an early adopter and both academia and       industry have begun taking this initiative further. However,       limited access to wired broadband and computers have restricted       reach for providing online education. Can the ubiquitous mobile       solve this problem? &lt;br /&gt; In this session, experts will deliberate in detail on the       opportunities and challenges in providing education through mobile       networks and wireless devices. Are these scalable and monetizable?       What are the implications for traditional educational       methodologies? What are the transformations this will bring to the       publishing industry?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; Panelists: &lt;a href="http://comsnets.org/mobile_session2.html#3"&gt; Dr. Gautam           Shroff &lt;/a&gt;, VP and Chief Scientist, TCS; &lt;a href="http://comsnets.org/mobile_session2.html#2"&gt;Srikanth B.           Iyer &lt;/a&gt;, COO, Pearson Education Services; &lt;a href="http://comsnets.org/mobile_session2.html#4"&gt; Rohit Kumar &lt;/a&gt;, MD, Elsevier India; Sunil Abraham, Executive Director,         Centre for Internet and Civil Society; &lt;a href="http://comsnets.org/mobile_session1_2.html#3"&gt; Arun           Prabhudesai &lt;/a&gt;, CTO, myopencourses.com &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; Moderator: &lt;a href="http://comsnets.org/mobile_session2.html#1"&gt; Prof. D.           Manjunath &lt;/a&gt;, Professor, IIT Bombay &lt;/b&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Session 3: Innovation Workshop&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;In the concluding session of the day, a workshop on mobile       innovations will be conducted wherein several start-up firms will       show case their unique innovations in the mobile space and share       their experiences on ideation, fund mobilization, monetization       models, and scale-up for sustainability.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; Panelists: &lt;a href="http://www.mintm.com/"&gt; MintM &lt;/a&gt; (&lt;a href="http://comsnets.org/mobile_session3.html#2"&gt; Sachin Garg &lt;/a&gt;, Founder); &lt;a href="http://www.robots-alive.com/"&gt; Robots           Alive &lt;/a&gt;(&lt;a href="http://comsnets.org/mobile_session3.html#3"&gt; Abheek Bose &lt;/a&gt;, Founder); &lt;a href="http://www.twaang.com/"&gt;Twaang &lt;/a&gt; &lt;br /&gt;(&lt;a href="http://comsnets.org/mobile_session3.html#4"&gt; Vishnu           Raned &lt;/a&gt;, Founder);&lt;a href="http://www.janacare.com/"&gt; JanaCare &lt;/a&gt;, (&lt;a href="http://comsnets.org/mobile_session3.html#5"&gt; Sidhant           Jena &lt;/a&gt;, Co-founder), &lt;a href="http://www.astralpad.com/"&gt;AstralPad &lt;/a&gt;(Rahul Singh) &lt;br /&gt; Moderator: &lt;a href="http://comsnets.org/mobile_session3.html#1"&gt; Madanmohan Rao &lt;/a&gt;, Director-Research, &lt;a href="http://comsnets.org/Yourstory.in"&gt; Yourstory.in &lt;/a&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Event Chairs&lt;/h2&gt;
&lt;p&gt;Dr. V. Sridhar (&lt;a class="mail-link" href="mailto:sridhar.varadharajan@sasken.com"&gt;sridhar.varadharajan@sasken.com&lt;/a&gt;), Sasken Communication Technologies, India &lt;br /&gt;S.R. Raja (&lt;a class="mail-link" href="mailto:rajaraghavan.setlur@sasken.com"&gt;rajaraghavan.setlur@sasken.com&lt;/a&gt;)&lt;/p&gt;
&lt;h3&gt;&lt;a href="http://in.eregnow.com/ticketing/register/mobileindia2013"&gt;Register here for Mobile India 2013 &lt;/a&gt;&lt;/h3&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/mobile-india-2013'&gt;https://cis-india.org/news/mobile-india-2013&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-01-15T08:40:21Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-times-of-india-january-3-2014-sruthijit-kk-indian-govt-websites-gold-mine-for-cybercriminals">
    <title>Indian government websites: Gold mine for cybercriminals</title>
    <link>https://cis-india.org/news/the-times-of-india-january-3-2014-sruthijit-kk-indian-govt-websites-gold-mine-for-cybercriminals</link>
    <description>
        &lt;b&gt;If you are a cybercriminal trying to commit identity theft or digitally impersonate a citizen, you have help from the unlikeliest of sources — the Government of India.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Srutijith KK was &lt;a class="external-link" href="http://timesofindia.indiatimes.com/tech/tech-news/internet/Indian-government-websites-Gold-mine-for-cybercriminals/articleshow/28320517.cms"&gt;published in the Times of India&lt;/a&gt; on January 3, 2014. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Various &lt;a href="http://timesofindia.indiatimes.com/topic/government-agencies"&gt;government agencies&lt;/a&gt; have put vast amount of &lt;a href="http://timesofindia.indiatimes.com/topic/personal-information-online"&gt;personal information online&lt;/a&gt;, often with little barrier to access and with hardly any provision to prevent their misuse.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Combine a few of these databases and you have a gold mine of information on India's citizens, including some of its wealthiest residents, whose bank accounts are of special interest to thieves. "If I want to target someone, I now have access to so much detail that shouldn't have been in public. Hackers with good social engineering skills will be able to call a call centre and impersonate a person. And from a stalking perspective, it has implications for not just celebrities, but anybody with a jilted lover, a political rival, and so on," said Binoo Thomas, a digital security expert at McAfee Labs.&lt;br /&gt;&lt;br /&gt;For example, if somebody wants to get personal details of some of India's richest people, he would simply need to click on the LPG transparency links on Indane, Bharat Gas and HP portals and narrow the search to the South Mumbai region. Many gas agencies have their area of service in their names, such as Bandra Gas Agency or Colaba Gas Agency.&lt;br /&gt;&lt;br /&gt;Select one of these gas agencies and you have a list of all the customers, with their consumer number, address and, in many cases, a mobile number. This database is also searchable by name. You can quickly search for any famous surname and be rewarded with a consumer number, residence address and in many cases, a mobile phone number.&lt;br /&gt;&lt;br /&gt;A cursory search gave ET the mobile number and full residential address of the well-known matriarch of a famous business family. A search under the Bandra Gas Agency promptly showed the full residential address of a famous Bollywood actress. Your next stop could be the website of the Election Commission of India, which has asked all state Election Commissions to place the entire voter rolls online.&lt;br /&gt;&lt;br /&gt;The voter roll also has the full residential address, age and gender of a person. A quick search on the MTNL Mumbai directory online will reveal the landline number for a person. With a little bit of luck and time to troll social networks such as Facebook and LinkedIn, a skilled cybercriminal can discern your date of birth and professional details.&lt;br /&gt;&lt;br /&gt;Date of birth, phone number, alternate number and billing address are the details many telephone companies and banks use to determine whether a person calling its customer helpline is indeed who she says she is. This kind of information also allows a hacker to design effective phishing attacks, which lures a person into revealing information such as passwords or credit card numbers. An email that lists accurate personal information appears authoritative and has greater likelihood of being trusted by a recipient.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Thread of identity theft&lt;/b&gt;&lt;br /&gt;This kind of crime has been on the rise. In December, US Department of Justice estimated that $24.7 billion were lost to identity theft in 2012, as 11.5 million Americans found themselves defrauded. Similar data is unavailable for India. "Privacy has become a matter of personal security. As the state has been pushed to function in a more transparent manner, authorities are making the details about us transparent instead! The data protection principles are well evolved all over the world.&lt;br /&gt;&lt;br /&gt;All of these data controllers are in violation of every good principle. We don't need to wait for a law to observe these principles," said Usha Ramanathan, an independent law researcher specialising in privacy, surveillance and related issues. The ministry of rural development, which administers the Mahatma Gandhi National Rural Employment Guarantee Scheme, goes a step further, and places online the bank account numbers and IFSC codes for all its beneficiaries.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;RTI requirements&lt;/b&gt;&lt;br /&gt;The justification for publishing this kind of data online is typically section 4 of the RTI Act, which requires all government departments to proactively publish details of subsidy programmes, including details of the subsidy availed. However, section 8(1) of the same Act says that personal information that invades privacy of an individual need not be published unless an appellate authority decides that a larger public interest is served by it. It's unclear what public interest is served by the publication of full residential address, mobile number or bank accounts by various agencies.&lt;br /&gt;&lt;br /&gt;In some cases, like the MNREGS and the voter rolls, sector-specific laws also apply. "Going by the provisions of the MGNREGA, which mandates proactive disclosures, we keep all processes in the public view... We have not perceived any threat in displaying bank account numbers of wage seekers, most of which have been opened for receiving wages," said R Subrahmanyam, the joint secretary at the ministry of rural development who heads the MNREGA division.&lt;br /&gt;&lt;br /&gt;The petroleum ministry did not respond to an email requesting comment. In an emailed response, Chief Election Commissioner VS Sampath referred to Rule 33 of the Registration of Elector Rules, 1960, to establish that the voter roll was a public document. "Thus it can be seen that Electoral Roll is a public document which is available to the public for inspection. The Commission has, therefore, given instructions to put this public document on the website to facilitate inspection by public. When law stipulates that it is a public document, the public has a right to access it," he said. But no law states that anonymising techniques or relevant barriers to accessing private information should not be deployed.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Legal vacuum&lt;/b&gt;&lt;br /&gt;India does not have an omnibus privacy law that overrides sector specific legislation. According to Sunil Abraham of the Bangalore-based thinktank Centre for Internet and Society, there are some 50 different laws that have a privacy element in India. The Department of Personnel and Training has been working on a draft privacy law for three years now.&lt;br /&gt;&lt;br /&gt;"We need to think of this problem in the light of the privacy law that is being drafted. Traditionally and culturally our view of privacy has been different. A more explicit understanding of the privacy needs of the citizens is certainly welcome. Section 43A of the IT Act has provisions for data protection," said J Satyanarayana, secretary at the department of information technology.&lt;br /&gt;&lt;br /&gt;But 43A applies only to corporations, and government agencies are not bound by it. Apart from the central government agencies, several state government agencies and schemes also collect and store personal information. But no standard protocol binds them in deciding who shall have access and who shall not.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-times-of-india-january-3-2014-sruthijit-kk-indian-govt-websites-gold-mine-for-cybercriminals'&gt;https://cis-india.org/news/the-times-of-india-january-3-2014-sruthijit-kk-indian-govt-websites-gold-mine-for-cybercriminals&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-01-31T06:18:12Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/rightsidenews-rebecca-bowe-january-1-2013">
    <title>2012 in Review: Biometric ID Systems Grew Internationally...and So Did Concerns about Privacy</title>
    <link>https://cis-india.org/news/rightsidenews-rebecca-bowe-january-1-2013</link>
    <description>
        &lt;b&gt;As the year draws to a close, EFF is looking back at the major trends influencing digital rights in 2012 and discussing where we are in the fight for free expression, innovation, fair use, and privacy.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;The blog entry was published in &lt;a class="external-link" href="http://www.rightsidenews.com/2013010131665/us/homeland-security/2012-in-review-biometric-id-systems-grew-internationally-and-so-did-concerns-about-privacy.html"&gt;Right Side News&lt;/a&gt; on January 1, 2013&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Around the world, systems of identification that employ automatic  recognition of individuals’ faces, fingerprints, or irises are gaining  ground. Biometric ID systems are increasingly being deployed at  international border checkpoints, by governments seeking to implement  national ID schemes, and by private-sector actors. Yet as biometric data  is collected from more and more individuals, privacy concerns about the  use of this technology are also attracting attention. Below are several  examples of the year’s most prominent debates around biometrics.&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;FRANCE: In early March, the French National Assembly (&lt;i&gt;Assemblée Nationale&lt;/i&gt;)  passed a law proposing the creation of a new biometric ID card for  French citizens, saying the measure would combat “identity fraud.”  Embedded in the cards would be a compulsory chip containing personal  information such as fingerprints, a photograph, home addresses, height,  and eye color. All of this information would be stored in a central  database. French Senator François Pillet called the initiative &lt;a href="https://www.eff.org/deeplinks/2012/03/french-national-assembly-proposes-new-alarming-biometrics-bill"&gt;a time bomb for civil liberties&lt;/a&gt;.  Near the end of March, however, the French Constitutional Council ruled  that the new law proposing the introduction of a new biometric ID for  French citizens &lt;a href="http://edri.org/edrigram/number10.6/french-biometric-database-unconstitutional"&gt;was unconstitutional&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;MEXICO: Documents obtained by EFF under Mexico’s Transparency and  Access to Information Act show that as of May, nearly 4 million minors  had been enrolled into registries associated with &lt;a href="https://www.eff.org/deeplinks/2012/08/despite-privacy-concerns-mexico-continues-scanning-youth-irises-id-cards"&gt;a new Mexican ID card for youths&lt;/a&gt;.  Billed as a document that can help streamline registration in schools  and health facilities, Mexico’s Personal ID Card for minors comes  embedded with digital records of iris images, fingerprints, a  photograph, and a signature. Despite concerns about privacy implications  raised by organizations such as the Federal Institute for Access to  Public Information, the Mexican government is now poised to launch the  next step of the project - extending the ID cards to adults.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;EUROPEAN UNION: The issue of privacy concerns surrounding biometric  passports in Europe made its way to the European Court of Justice (ECJ),  the highest court in the European Union. In September, the Dutch  Council of State (&lt;i&gt;Raad van State, &lt;/i&gt;the highest Dutch administrative court) &lt;a href="http://www.raadvanstate.nl/pers/persberichten/persbericht/?pressmessage_id=202"&gt;asked&lt;/a&gt; the ECJ to decide if the regulation requiring fingerprints in passports  and travel documents violates citizens’ right to privacy. The case  entered a Dutch court after three Dutch citizens were denied passports,  and another citizen was denied an ID card, for refusing to provide their  fingerprints. The ECJ ruling will play an important role in determining  the legality of including biometrics in passports and travel documents  in the European Union.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;INDIA: The Unique Identity Authority of India (UIDAI) continued collecting fingerprints, facial photographs, and iris scans from Indian residents for its massive unique ID endeavor, known as Aadhaar, which will result in &lt;a href="https://www.eff.org/deeplinks/2012/09/indias-gargantuan-biometric-database-raises-big-questions"&gt;the world’s largest biometric database&lt;/a&gt; and will compile 10 times as much data as all of Facebook.&lt;br /&gt;&lt;br /&gt;The program is moving forward at a rapid clip despite privacy concerns  raised by advocates such as the Centre for Internet and Society in  India, and the Indian Parliament. In addition, &lt;a href="https://cis-india.org/news/are-your-biometric-i-cards-stacked-against-you"&gt;a slew of other government agencies&lt;/a&gt; have moved ahead with biometric collection programs of their own. And  just this past week, Visa and a group of Indian banks unveiled the  “Saral Money” account, which &lt;a href="http://www.finextra.com/News/FullStory.aspx?newsitemid=24379"&gt;links individuals’ Aadhaar numbers with credit card transactions&lt;/a&gt; and introduces a further complication into the privacy concerns inherent in this massive e-government endeavor.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Source: EFF&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/rightsidenews-rebecca-bowe-january-1-2013'&gt;https://cis-india.org/news/rightsidenews-rebecca-bowe-january-1-2013&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-01-17T04:40:00Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/mining-the-web-collective">
    <title>Mining the Web Collective</title>
    <link>https://cis-india.org/internet-governance/blog/mining-the-web-collective</link>
    <description>
        &lt;b&gt;In March 2012, Dr Bruno Latour and his team from the Sciences Po Media Lab organized a workshop that assembled a selected group of researchers from India to explore methods of Controversy Mapping. It was hosted by Dr J. Srinivasan, Director of the Divecha Centre for Climate Change at the Indian Institute of Science, Bangalore, India.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;While  the context of this workshop focussed on deciphering and mapping  opinions related to academic controversies surrounding climate change,  the very same techniques of deploying digital tools to crawl through  associated content on the websphere, maybe used to map any other  controversy that has been actively influencing public and political  opinion.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;As  one of the participants in the workshop, in an attempt to make my  interpretation as accessible as possible to a wider inter-disciplinary  audience, below is my own assimilation and  extrapolation of the musings  and discussions that entailed. Further I have drawn out limitations and  future directions towards more viable paradigms that augment the  mapping and democratization of public opinion.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  session drew an outset around how new digital tools could aid  researchers by enabling them to quickly see an individual entity’s data  as well as it’s associated aggregates, and register all of this within a  single view in real-time. Contrasting the traditional methods of data  collection through individual surveys, new digital methods can almost  instantaneously bridge the gap between the individual and the collective  and help us answer the question that Latour poses in his most recent  paper that revisits social theory around the Tardean concept of  reciprocally connected ‘monads’ -- &lt;i&gt;''.... is there an alternative to  the common sense version that distinguishes atoms, interactions and  wholes as successive sequences (whatever the order and the timing)? An  alternative that should not oblige the inquirer to change gears from the  micro to the macro levels ..... but remains fully continuous ...''&lt;/i&gt; [Latour et al , 2012].&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Encompassing the Collective&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The  geometric basis of the universe as expressed by Edgar Allan Poe, asserts  that the ‘universe.. is a sphere of which the centre is everywhere and  circumference nowhere’ (Eureka, p 20) This is essentially a  post-Euclidean conception of space, in line with the view of early 20th  century physicist Alexander Friedmann who posits that the ‘universe is  not finite in space, but neither does space have any boundary’ and so  the centre of the universe is relative to every single atom — hence  every single observer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In  many ways, the process of data collection and visualization that was  carried out at the workshop tried at best to mimic this geometric basis  of space. By starting with a single entity (say, mammals) the empiricist  begins with nothing more than a named 'label'. One then extends the  specification of this entity, by populating a list with an increasing  number of elements. This process of 'learning' about an entity is  essentially an infinite process, as many abstract associations maybe  permitted to enter the list. However, the observer stops this iterative  process at a point when he feels that he has enough knowledge to  describe the entity within the (seemingly finite) 'scope' of study. What  we then have is a highly individualized point of view with respect to  one entity that has a view of all it's associated attributes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is  worth noting here that the attributes themselves can be looked at as  individualized entities, and vice versa, from their own view point,  depending on the way in which one navigates, thereby making the map  invertible. For instance while 'egg-laying' maybe one of the attributes  of a 'mammal', if we navigated to define 'egg-laying' to be our starting  entity, it's view point can contain attributes like 'mammals' and  'birds'. This process is entirely different from the bottom up approach  of constructing a general view by combining individual counterparts. In  fact, there is no one general view here, as the picture is an exploded  graph emanating from a single entity's view point, each to it's own  'umwelt'.[Kaveli et al, 2010].&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;(Re)formation of Opinion&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The  formation of a fundamental percept in the human brain, for instance,  during the cognitive activity of reading a text, is in itself a  bottom-up serial process where individual words progressively make up  semantic associations to form a meaningful structure (just as this  sentence), along with contextual association with previously acquired  knowledge. This capacity limit for information processing [Rene and  Ivanoff, 2005] which is a prerequisite for our highly focussed mechanism  of attention is the reason why we cannot capture the entire star map  within a single glance at the night sky.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Somewhere  down this iterative line of observing an entity, and not having access  to all of its attributes in entirety, leads to over-specification and an  entanglement with isolated systems, thereby falling into a local maxima  as opposed to a global solution. This is the basis of opinion formation  and by envisaging it as a 'closed' object it is transformed into a  percept, open to interpretation and often conflicting with another,  thereby resulting in a controversy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of  the objectives of the controversy mapping workshop was to  transform  the 'immutable' percept surrounding a controversy into a  visual map  that all at once registers weblinked attributes surrounding  it, to give  us a possibly emergent and unbiased picture.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Method to the Madness&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The  process of framing of a ‘controversial topic’ and the collation of  massive data and links on the internet that surround the topic could  indeed be a cumbersome task. An informed approach is thus required in  order to achieve a meaningful result.&lt;br /&gt;&lt;br /&gt;Firstly, one needs to  consider reliable sources and means of knowledge production that provide  enough fuel to kindle the analysis of the controversy. One needs to  move on from casual matters of opinion or statements (such as “the  cumulative effects of CFC result in ozone layer depletion”) to  identifying a hypothesis or theory that is being actively contested by  academicians and experts through research and publication. This serves  to outline an important preliminary sketch of the controversy that  exists within the community.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Secondly,  it is essential to remember that specialized researchers do not exist  in self-centered isolation but often operate in tandem with multiple  stakeholders, investors, donors, sponsors and a diverse audience that  they cater to through articles, books, research projects and published  journals. For instance, several theorists who are into the business of  developing a so-called ‘language of critique’ often ensure through  working group meetings that a selected group of researchers are on the  ‘same page’ while using common words to canvass a spearhead towards  prospective calls from popular journals. At other times, one may  perceive a very direct link between mainstream press and cutting-edge  research. This group comprising allies and endorsers are an important  constituent of the mapping process as they provide key points of entry  into the controversy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further,  as more and more data relating to a controversy is accrued, one must  decipher not only how the position of the controversy is being  dynamically shaped over time along with its stakeholders but also be  able to extrapolate how and why its current position of uncertainty might evolve. This would involve identifying potential points of contention that could respark a debate over  an issue that has reached near closure.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Mapping the Controversy around ‘Anthropocene’&lt;/h3&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img class="image-inline" src="../../accessibility/blog/resolveuid/8d81a93d91444d90a178646db01a002f/@@images/image/large" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;The  topic chosen by my group (which consisted of scholars Neesha Dutt,  Muthatha Ramanathan and Prasanna Kolte) was ‘Anthropocene’, a  geo-chronological term that was informally introduced by a Nobel  laureate in the field of atmospheric chemistry, Paul Crutzen, at a  dinner party. ‘Anthropocene’ apparently marks the post industrial period  as a time window that represents the impact that human activities have  had on earth’s ecological systems, thereby affecting climate change. The  widespread acceptance and popularity of the the word has even seen a  move to officially recognize ‘Anthropocene’ as geological unit of time,  complemented by a number of dubious research projects that assume the  ‘anthropocenic’ view of climate change. The tools used were Navicrawler  to populate a massive list of webpages that featured the keyword and  other landing websites that each of the webpages point to. The context  of the websites based on their content were labelled manually and no  native text parsing and analysis was used. An interconnected visual  graph structure was then obtained using Gephi, a software that uses  Force Layout -2 , a graph layout algorithm for network visualization.  [M. Bastian et al, 2009].&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Future Directions&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Including  a layer of geographical representation to the formation and spread of  an opinion is a key direction towards which opinion mining and  controversy mapping is headed. A limiting factor while crawling articles  over the web using currently available digital tools is the inaccurate  representation of geographical source. An article posted in a popular  science blog in India, may actually have its server hosted in California  and this fact may often be abstracted to our crawler.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Furthermore,  apart from  the geographical source of a web article, an interesting  direction would be to employ geo-located public opinion interfaces to  collect a sample set of public opinion related to an issue, across  diverse geographical locations in realtime. This would serve as valuable  layer to overlay onto the controversy web map.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another  constraint of the digital methods referred to here within, is the  medium specific approach that does not look beyond the sample space of  the internet. Listening to and analyzing internet social media dynamics  and combing large data sets to churn out a report is not much of a  challenge. Cross media influences in public and political opinion have  become increasingly clear with television broadcasts and newspaper  reports directly contributing to discussions that happen on internet  forums and websites. Take for instance Blue Fin Labs that started off  within the Cognitive Machines group of MIT Media Lab. Initially known as  the Human Speechome project which used deep machine learning algorithms  to map out relationships between spoken word and context, Blue Fin Labs  now applies the same technique to map internet comments and posts to  corresponding audio-visual stimuli in television broadcasts that caused  those comments to be made on the web.&lt;/p&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify; "&gt;Video&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Data visualization of connecting the social graph to the TV content graph&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="http://www.youtube.com/embed/xEZ2W5-l1Zo" width="320"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;References&lt;/h3&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Cappi,  Alberto (1994). "Edgar Allan Poe's Physical Cosmology". The Quarterly  Journal of the Royal Astronomical Society 35: 177–192&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Castells,  M. (2000). Materials for an exploratory theory of the network society.  British Journal of Sociology Vol. No. 51 Issue No. 1 (January/March  2000).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Edgar Allen Poe (1848) ‘Eureka : A Prose Poem'.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Kull, Kaveli 2010. Umwelt. In: Cobley, Paul (ed.), The Routledge Companion to Semiotics. London: Routledge, 348–349.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Latour,  B. et al 2012 “The Whole is Always Smaller Than It’s Parts A Digital  Test of Gabriel Tarde’s Monads” British Journal of Sociology  (forthcoming)&lt;a href="http://www.bruno-latour.fr/sites/default/files/123-WHOLE-PART-FINAL.pdf"&gt;http://www.bruno-latour.fr/sites/default/files/123-WHOLE-PART-FINAL.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;M.  Bastian, S. Heymann, and M. Jacomy, “Gephi: an open source software for  exploring and manipulating networks,” in International AAAI Conference  on Weblogs and Social Media. Association for the Advancement of  Artificial Intelligence, 2009.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;M. E. J. Newman, “Analysis of weighted networks,” 2004, arxiv:cond-mat/0407503.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Reynolds,  C. W. (1987) Flocks, Herds, and Schools: A Distributed Behavioral  Model, in Computer Graphics, 21(4) (SIGGRAPH '87 Conference Proceedings)  pp. 25-34.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Rene  Marois and Jason Ivanoff, Capacity limits of information processing in  the brain, TRENDS in Cognitive Sciences Vol.9 No.6 June 2005&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;T. M.  J. Fruchterman and E. M. Reingold, “Graph drawing by force-directed  placement,” Softw: Pract. Exper., vol. 21 no. 11, pp. 1129–1164, Nov.  1991.&lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/mining-the-web-collective'&gt;https://cis-india.org/internet-governance/blog/mining-the-web-collective&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sharath</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-01-06T23:48:20Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/times-of-india-december-31-2012-javed-anwer-and-rukmini-shrinivasan-the-year-social-media-came-of-age-in-india">
    <title>The year social media came of age in India</title>
    <link>https://cis-india.org/news/times-of-india-december-31-2012-javed-anwer-and-rukmini-shrinivasan-the-year-social-media-came-of-age-in-india</link>
    <description>
        &lt;b&gt;Sambhavi Saxena, 19, was at Jantar Mantar on December 25 protesting against Nirbhaya's brutal rape when Delhi Police swooped down, rounded her up along with other agitators and took them to the Parliament Street police station. Sambhavi fired tweet after tweet even as she was bundled into a van.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article by Javed Anwer and Rukmini Shrinivasan was &lt;a class="external-link" href="http://timesofindia.indiatimes.com/tech/social-media/The-year-social-media-came-of-age-in-India/articleshow/17824856.cms"&gt;published in the Times of India&lt;/a&gt; on December 31, 2012. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;She went on broadcasting to the world all that was happening around her. "Illegally being held here at Parliament St Police Station Delhi w/ 15 other women. Terrified, pls RT," she tweeted. It worked. In a flash, more than 1,700 people retweeted her SOS. &lt;a href="http://timesofindia.indiatimes.com/topic/Social-media"&gt;Social media&lt;/a&gt; analytics firm Favstar later said the message reached over two lakh people.&lt;br /&gt; &lt;br /&gt; Police later contested many of Sambhavi's claims. Yet, there was no denying it was her voice that was heard. Her tweets triggered a social media frenzy. The media reacted swiftly. Lawyers volunteered, activists landed up at the police station. Celebrities condemned the action. The police stood no chance.&lt;br /&gt; &lt;br /&gt; For the government and keepers of law, it was a PR disaster. They had lost a battle they were accustomed to winning hands down. Now, there was a pesky entity — the public — seeking to change the rules of the game. A teenager armed with a smartphone had used the magic platform called social media to devastating effect, catching the agents of the state flatfooted.&lt;br /&gt; &lt;br /&gt; India might have tasted the power of the smartphone first in 2011 when Anna Hazare's stinging anti-corruption message rode the social media wave. But this year saw social media creating a new phenomenon — the rise of the virtually connected Indian youth — which is likely to redraw the terms of engagement between the state and its urban population.&lt;br /&gt; &lt;br /&gt; &lt;b&gt;The networking tool that's now a weapon&lt;/b&gt;&lt;br /&gt; &lt;br /&gt; Finance minister P Chidambaram recently tried to sum up the phenomenon by likening social media-driven snap protests to a flash-mob phenomenon. "Flash mob is a new phenomenon... sometimes they gather to dance and sing. But sometimes they gather to protest... I don't think we are fully prepared to deal with it." Going by the last fortnight, when the government fumbled in dealing with widespread protests over Nirbhaya, the minister's admission was an understatement. Let alone being "fully prepared", they didn't have a clue.&lt;br /&gt; &lt;br /&gt; The unbridling of the power of the social media was undoubtedly a top, if not no. 1, trend of 2012 in India. In many cases, it set the agenda of public discourse. As in Palghar, where young Shaheen Dhada's Facebook comment on the shutdown of Mumbai after Bal Thackeray's death kicked off a storm, the virtual world triggered several real-world controversies.&lt;br /&gt; &lt;br /&gt; In fits and starts, politicians and the government realized the folly of not joining the fast-unfolding revolution, the exceptions being the Twitter-savvy Shashi Tharoor and Omar Abdullah. The @PMOIndia &lt;a href="http://timesofindia.indiatimes.com/topic/Twitter"&gt;Twitter&lt;/a&gt; handle was born, and today 3.5 lakh people follow it. A host of politicians soon hopped on, realizing the freedom the platform offered for comment on issues, which TV studios didn't.&lt;br /&gt; &lt;br /&gt; For Bollywood celebs and cricketers, it became a great way to keep in touch with fans. But the real power of this irreverent and often insolent medium lay with the young aam admi who used social media fearlessly. They voiced their opinion and unsparingly ridiculed leaders with hashtags like #theekhai, making powerful headlines out of what otherwise would have been just whistling in the air.&lt;br /&gt; &lt;br /&gt; What's the USP of the social media? On this platform, free speech is unhindered. It's a virtual megaphone with a global reach, as the numbers show. Whether it's Twitter or Facebook, India is a huge presence. Facebook has more than 65 million active users here, putting the country among the top five worldwide in terms of users. Twitter, which has 200 million active users globally, doesn't provide country-specific numbers. But SemioCast, a Paris-based research firm, said in a report in July that India had around 18 million Twitter accounts, placing it sixth among the biggest Twitter nations.&lt;br /&gt; &lt;br /&gt; A lot of this social media boom happened in 2012. Research firm SocialBakers estimated in November that the number of Indian Facebook users swelled by 14 million in the past six months. While internet penetration in India is just 11% — three times lower than the global average — around 137million users make the country third biggest in terms of web-connected citizens. Most of these users are urban and young. A Comscore report says 75% of web users here are under-35.&lt;br /&gt; &lt;br /&gt; Unlike youngsters in many other countries, Indians are politically active on the web. A Pew Research study this December established that nearly 45% of Indian web users, most of them from urban areas, connect on social media to discuss politics. Only Arab countries scored higher than India on this account. The numbers are backed by GlobalWebIndex, which noted in a September report that India is the third most socially active country with around 78 points.&lt;br /&gt; &lt;br /&gt; But this unfettered, unfiltered flow of information and messages showed its ugly side as well. The mischievous rumour-mongering in the wake of the Assam riots was a case in point, as MMSs and incendiary text messages triggered an exodus of people belonging to the northeast from Bangalore, Pune, Chennai and Hyderabad.&lt;br /&gt; &lt;br /&gt; Facebook and Twitter started off as friendship and networking tools. But, they have evolved into potent weapons of social mobilization. In a way, India Against Corruption can be credited with starting it in mid-2010. "If you have a worthy cause, social media provides you an unbiased, unfiltered avenue," says Shivendra Chauhan, social media manager for the outfit. "Without it, we wouldn't have got the kind of overwhelming support we received from the youth."&lt;br /&gt; &lt;br /&gt; But Sunil Abraham, executive director of the Bangalore-based Centre for Internet and Society, cautions against being overly technologically deterministic. "Technology doesn't have agency; human beings do. Transferring energy from social media on to the streets isn't something that'll happen every time. It depends on whether the message resonates," he says.&lt;br /&gt; &lt;br /&gt; While the anti-corruption movement ran on a sophisticated social media strategy and campaign, the ongoing anti-rape protests have no single organizer or banner, just a message that resonates, says Abraham. On the other hand, when Anonymous India called for boots on the ground at its protests against internet censorship, the turnout was poor, far lower than the number of hashtags on Twitter would have indicated, he adds.&lt;br /&gt; &lt;br /&gt; Abraham points out there are close linkages between internet, text messages, social media and mainstream media. "These channels leak into each other and the causal connection becomes unclear," he says. Madhuresh Kumar, national coordinator of the National Alliance of People's Movements (NAPM), an umbrella organization of grassroots movements of the marginalized, agrees. "We use social media, not so much to mobilize people to come to our protests, but to mobilize the mainstream media."&lt;br /&gt; &lt;br /&gt; The message determines the power of the medium. If it's something that connects viscerally, like the Nirbhaya protests, its power and reach can be beyond imagination. If it is a more niche message, like an SOS for a dwindling fish species, it will reach a smaller, targeted audience such as environmentalists. But it will reach — unhindered in the palm of your hand.&lt;br /&gt; &lt;br /&gt; Look at it any which way, it is here to stay. So, it's time for the state to learn to deal with the new power of the ordinary citizen.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/times-of-india-december-31-2012-javed-anwer-and-rukmini-shrinivasan-the-year-social-media-came-of-age-in-india'&gt;https://cis-india.org/news/times-of-india-december-31-2012-javed-anwer-and-rukmini-shrinivasan-the-year-social-media-came-of-age-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-12-31T03:33:19Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-hindu-december-31-2012-op-ed-a-note-of-dissent-on-cash-transfers-and-uid">
    <title>A note of dissent on cash transfers and UID</title>
    <link>https://cis-india.org/news/the-hindu-december-31-2012-op-ed-a-note-of-dissent-on-cash-transfers-and-uid</link>
    <description>
        &lt;b&gt;The following is the text of a note released by 208 scholars, activists and concerned citizens on the United Progressive Alliance government’s plan to introduce cash transfers linked to the Aadhaar (UID) numbers of beneficiaries:&lt;/b&gt;
        &lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;This Op-ed was &lt;a class="external-link" href="http://www.thehindu.com/opinion/op-ed/a-note-of-dissent-on-cash-transfers-and-uid/article4256351.ece"&gt;published in the Hindu&lt;/a&gt; on December 31, 2012. Sunil Abraham was one of the signatories.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;We support cash transfers such as old age pensions, widow pensions, maternity entitlements and scholarships. However, we oppose the government’s plan for accelerated mass conversion of welfare schemes to UID-driven cash transfers. This plan could cause havoc and massive social exclusion. We demand the following:&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;1. &lt;/b&gt;&lt;i&gt;No replacement of food with cash under the Public Distribution System (PDS).&lt;/i&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The PDS is a vital source of economic security and nutrition support for millions of people. It should be expanded and consolidated, not dismantled.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;2. &lt;/b&gt;&lt;i&gt;Immediate enactment of a comprehensive National Food Security Act, including universal PDS.&lt;/i&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Instead of diverting the public’s attention with promises of mass cash transfers before the 2014 elections, the government should redeem its promise to enact a National Food Security Act (NFSA).&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;3.&lt;/b&gt; &lt;i&gt;Cash transfers should not be a substitute for public services.&lt;/i&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;While some cash transfer schemes are useful, they should complement, not be a substitute for the provision of public services such as health care, school education, water supply, basic amenities, and the PDS. These services remain grossly underfunded.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;4.&lt;/b&gt; &lt;i&gt;Expand and improve appropriate cash transfers without waiting for UID.&lt;/i&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;There is no need to wait for UID to expand and improve positive cash transfer schemes such as pensions, scholarships and maternity entitlements. For instance, social security pensions should be increased and universalised.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;5.&lt;/b&gt; &lt;i&gt;No UID enrolment without a legal framework.&lt;/i&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Millions of people are being enrolled for UID without any legal safeguards. The UIDAI’s draft bill has been rejected by a parliamentary standing committee. UID enrolment should be halted until a sound legal framework is in place.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;6.&lt;/b&gt; &lt;i&gt;All UID applications should be voluntary, not compulsory.&lt;/i&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;UID should never be a condition for anyone to access any entitlements or public services. A convenient alternative should always be available.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;7. &lt;/b&gt;&lt;i&gt;UID should be kept out of the PDS, NREGA and other essential entitlement programmes for the time being.&lt;/i&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Essential services are not a suitable field of experimentation for a highly centralised and uncertain technology. Other applications (e.g. to tax evasion) should be tried first.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;List of signatories: &lt;/b&gt;Sunil Abraham, Centre for Internet and Society; Amiya Kumar Bagchi, Vice-Chancellor, Tripura University; Kiran Bhatty, Senior Fellow, Centre for Policy Research; Nikhil Dey, Mazdoor Kisan Shakti Sangathan; Jean Drèze, Visiting Professor, Allahabad University; S.S. Gill, Director General, CRRID, Chandigarh; Reetika Khera, Assistant Professor, Indian Institute of Technology, Delhi; A.K. Shiva Kumar, Economist; Lawrence Liang, Alternative Law Forum; Nivedita Menon, Professor, Jawaharlal Nehru University; R. Nagaraj, Professor, Indira Gandhi Institute of Development Research; Farah Naqvi, Writer and Activist; Dr. K. Srinath Reddy; Shantha Sinha, National Commission for the Protection of Child Rights; M.S. Swaminathan, Member of Parliament, Rajya Sabha; Sharmila Tagore; Vamsi Vakulabharanam, Reader, University of Hyderabad; Bezwada Wilson, Safai Karamchari Andolan and 190 others.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-hindu-december-31-2012-op-ed-a-note-of-dissent-on-cash-transfers-and-uid'&gt;https://cis-india.org/news/the-hindu-december-31-2012-op-ed-a-note-of-dissent-on-cash-transfers-and-uid&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-12-31T03:15:26Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/livemint-december-27-2012-surabhi-agarwal-un-agrees-to-review-agencies-governing-internet">
    <title>UN agrees to review agencies governing Internet</title>
    <link>https://cis-india.org/news/livemint-december-27-2012-surabhi-agarwal-un-agrees-to-review-agencies-governing-internet</link>
    <description>
        &lt;b&gt;Although India’s proposal has been criticized as an effort to control the Net, govt says this will ensure it has more say in policymaking.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article by Surabhi Agarwal was &lt;a class="external-link" href="http://www.livemint.com/Industry/noxrdKdOmZMnXGpXyGzXUO/UN-agrees-to-review-agencies-governing-Internet.html"&gt;published in Livemint on December 27, 2012&lt;/a&gt;. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In the fierce debate on who governs the Internet, the Indian government can claim a small victory of sorts after the UN decided to establish a working group to review the mandate of agencies administering the worldwide network of computers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India last year proposed creating an UN agency, dubbed the Committee on Internet-Related Policies (CIRP), that would decide on issues related to the Internet, including control of resources such as domain names and Internet Protocol (IP) addresses. The Internet Corporation for Assigned Names and Numbers (Icann), a non-governmental organization based in the US, currently administers these.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The US, the UK and Canada refused to sign a new communications treaty proposed at the 3-14 December Dubai conference of the International Telecommunications Union (ITU), which sets global telecom technical standards, on fears that it will give national governments greater control over the Internet and may restrict free speech. India, too, hasn’t signed the pact.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Even though the United Nations has not yet accepted India’s proposal for constituting CIRP, it (the formation of a working group) is a step forward, as now the working group on enhanced cooperation will deliberate on the need for CIRP,” a government official said, requesting anonymity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although India’s proposal has been criticized as an effort to control the Internet, the government has said this will ensure it has a greater say in Internet policymaking.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Commission on Science and Technology for Development, a UN body, has been asked to establish a working group on enhanced cooperation to examine the mandate of the World Summit on the Information Society, which issues non-binding guidelines on the Internet, “through seeking, compiling and reviewing inputs from all member states and all other stakeholders,” according to a 12 December letter from the UN to the Indian government. The working group has been asked to submit its report to the commission in 2014.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Mint &lt;/i&gt;has reviewed a copy of the letter and also India’s response to the UN welcoming the move.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UN’s move reflected India’s growing influence in multilateral policymaking bodies, according to &lt;a href="http://www.livemint.com/Search/Link/Keyword/Rajat%20Kathuria"&gt;Rajat Kathuria&lt;/a&gt;, chief executive and director of Indian Council for Research on International Economic Relations, a think tank.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“India’s increasing clout not only in the WTO (World Trade Organisation) but also in these kinds of forums is fairly obvious,” he said. The country should be able to stand its ground and use its negotiating powers well, he added. “Everybody is looking at India now and it should not be forced into getting into things it doesn’t want to.” Kathuria also agreed with India’s decision to consider in detail the new global telecom pact, which contains a resolution on the Internet, before signing it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We don’t have enough information on the impact of signing this treaty,” Kathuria said. “I agree with what India has done. We need to do our homework and understand clearly what it means.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although the treaty is restricted to telecom standards, it contained a non-binding resolution on the Internet. The treaty stated that its purview doesn’t include content over telecommunications networks or the Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, there have been divergent views on its implications. While some have argued that signing it would mean giving the ITU dominance over Internet governance, others dismiss it as harmless.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“This wasn’t an ITU takeover of the Internet and India’s signing of the treaty will not make it one,” said &lt;a href="http://www.livemint.com/Search/Link/Keyword/Pranesh%20Prakash"&gt;Pranesh Prakash&lt;/a&gt;, policy director at Centre for Internet Studies, a Bangalore-based think tank.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, India’s cautious approach is a good sign, he said. “I hope civil society is consulted before the decision is taken whether to support ITR (International Telecommunication Regulations) and the resolutions which were passed in Dubai.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Critical Internet resources such as domain names and IP addresses are like natural resources and no one country should monetize them or have control over them, said another government official.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It is of utmost importance for India to have a say in the matters of the Internet as the country has huge untapped potential in the area of Internet and technology,” said the official, who too declined to be named.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A white paper on Internet governance by Research and Information System for Developing Countries, chaired by &lt;a href="http://www.livemint.com/Search/Link/Keyword/Shyam%20Saran"&gt;Shyam Saran&lt;/a&gt;, former Indian diplomat, has said the Internet continues to be managed by private entities such as Icann “under contractual arrangements with the US government”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Icann is not controlled by the US government, an official of the Internet administrator said on condition of anonymity. It follows a multi-stakeholder model.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The paper on Internet governance argued against the allegation that India’s proposal of CIRP will lead to government’s control of the Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“India’s proposal for CIRP, a multilateral and multi-stakeholder mechanism, is not intended to control content,” it said. “It does not insist that the governments have the last word in regulating the Internet.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The paper had argued that India should pursue the establishment of a working group on enhanced cooperation, which will pave the way for further consideration of India’s proposal for the establishment of CIRP.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/livemint-december-27-2012-surabhi-agarwal-un-agrees-to-review-agencies-governing-internet'&gt;https://cis-india.org/news/livemint-december-27-2012-surabhi-agarwal-un-agrees-to-review-agencies-governing-internet&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ITU</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-12-31T02:40:20Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/times-of-india-december-22-2012-kim-arora-no-fear-of-losing-internet-freedom-till-jan-15">
    <title>No fear of losing internet freedom till Jan 15: Experts</title>
    <link>https://cis-india.org/news/times-of-india-december-22-2012-kim-arora-no-fear-of-losing-internet-freedom-till-jan-15</link>
    <description>
        &lt;b&gt;There is no need to get scared about losing internet freedom, at least till January 2015.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article by Kim Arora was &lt;a class="external-link" href="http://timesofindia.indiatimes.com/business/india-business/No-fear-of-losing-internet-freedom-till-Jan-15-Experts/articleshow/17711837.cms"&gt;published in the Times of India&lt;/a&gt; on December 22, 2012. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;That's the view of top telecom policy watchers, who closely monitored the World Conference on International Telecommunications (WCIT) of the &lt;a href="http://timesofindia.indiatimes.com/topic/International-Telecommunication-Union"&gt;International Telecommunication Union&lt;/a&gt; (ITU) that ended in uncertainty earlier this month in Dubai.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Policy experts say the changes affecting internet users in India, if any, would be slow and minor with little or no changes existing laws and governments largely retaining their current control. The resolutions are not binding and member-states are free to opt out of it. India is yet to ratify the treaty that lays out a broad framework on international co-operation over telecommunication resources.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ITR (International Telecom Regulations), decided by the &lt;a href="http://timesofindia.indiatimes.com/topic/International-Telecommunication-Union"&gt;ITU&lt;/a&gt; were last updated in 1988 when the internet, as we know it today, did not exist. And the hullabaloo was caused by the proliferation of internet in the intervening years had created a lot of complications and misgiving among nation states. The &lt;a href="http://timesofindia.indiatimes.com/topic/Dubai"&gt;Dubai&lt;/a&gt; conference also included alarmed internet evangelists who feared that the meeting would result in UN control of the internet. But with the US, the UK and several other countries vehemently refusing to sign on the dotted line, most decisions have been withheld till January 2015 when the treaty is expected to be ratified.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/times-of-india-december-22-2012-kim-arora-no-fear-of-losing-internet-freedom-till-jan-15'&gt;https://cis-india.org/news/times-of-india-december-22-2012-kim-arora-no-fear-of-losing-internet-freedom-till-jan-15&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ITU</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-12-31T02:20:31Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/state-surveillance-human-rights-camp-summary">
    <title>State Surveillance and Human Rights Camp: Summary</title>
    <link>https://cis-india.org/internet-governance/blog/state-surveillance-human-rights-camp-summary</link>
    <description>
        &lt;b&gt;On December 13 and 14, 2012, the Electronic Frontier Foundation organized the Surveillance and Human Rights Camp held in Rio de Janeiro, Brazil. The meeting examined trends in surveillance, reasons for state surveillance, surveillance tactics that governments are using, and safeguards that can be put in place to protect against unlawful or disproportionate surveillance.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/i&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The camp also examined different types of data, understanding tools that governments can use to access data, and looked at examples of surveillance measures in different contexts. The camp was divided into plenary sessions and individual participatory workshops, and brought together activists, researchers, and experts from all over the world. Experiences from multiple countries were shared, with an emphasis on the experience of surveillance in Latin America. Among other things, this blog summarizes my understanding of the discussions that took place.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The camp also served as a platform for collaboration on the &lt;i&gt;Draft International Principles on Communications Surveillance and Human Rights&lt;/i&gt;. These principles seek to set an international standard for safeguards to the surveillance of communications that recognizes and upholds human rights, and provide guidance for legislative changes related to communications and communications meta data to ensure that the use of modern communications technology does not violate individual privacy.  The principles were first drafted in October 2012 in Brussels, and are still in draft form. A global consultation is taking place to bring in feedback and perspective on the principles.&lt;/p&gt;
&lt;p&gt;The draft principles were institutionalized for a number of reasons including:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Currently there are no principles      or international best standards specifically prescribing necessary and      important safeguards to surveillance of communication data. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Practices around surveillance of      communications by governments and the technology used by governments is      rapidly changing, while legislation and safeguards protecting individual      communications from illegal or disproportionate surveillance are staying      the same, and thus rapidly becoming outdated. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;New legislation that allows      surveillance through access to communication data that is being proposed      often attempts to give sweeping powers to law enforcement for access to      data across multiple jurisdictions, and mandates extensive cooperation and      assistance from the private sector including extensive data retention      policies, back doors, and built in monitoring capabilities.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Surveillance of communications is      often carried out with few safeguards in place including limited transparency      to the public, and limited forms of appeal or redress for the individual. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;This has placed the individual in a vulnerable position as opaque surveillance of communications is carried out by governments across the world — the abuse of which is unclear. The principles try to address these challenges by establishing standards and safeguards which should be upheld and incorporated into legislation and practices allowing the surveillance of communications.&lt;/p&gt;
&lt;p&gt;A summary of the draft principles is below. As the principles are still a working draft, the most up to date version of the principles can be accessed &lt;a class="external-link" href="http://necessaryandproportionate.net/"&gt;here&lt;/a&gt;&lt;a href="http://necessaryandproportionate.net/"&gt;.&lt;/a&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Summary of the Draft International Principles on Communications Surveillance and Human Rights&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Legality&lt;/b&gt;: Any surveillance of communications undertaken by the government must be codified by statute. &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Legitimate Purpose&lt;/b&gt;: Laws should only allow surveillance of communications for legitimate purposes.&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Necessity&lt;/b&gt;: Laws allowing surveillance of communications should limit such measures to what is demonstrably necessary.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Adequacy&lt;/b&gt;: Surveillance of communications should only be undertaken to the extent that is adequate for fulfilling legitimate and necessary purposes. &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Competent Authority&lt;/b&gt;: Any authorization for surveillance of communications must be made by a competent and independent authority. &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Proportionality&lt;/b&gt;: All measures of surveillance of communications must be specific and proportionate to what is necessary to achieve a specific purpose. &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Due process&lt;/b&gt;: Governments undertaking surveillance of communications must respect and guarantee an individual’s human rights. Any interference with an individual's human rights must be authorized by a law in force.&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;User notification&lt;/b&gt;: Governments undertaking surveillance of communications must allow service providers to notify individuals of any legal access that takes place related to their personal information. &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Transparency about use of government surveillance&lt;/b&gt;: The governments ability to survey communications and the process for surveillance should be transparent to the public. &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Oversight&lt;/b&gt;: Governments must establish an independent oversight mechanism to ensure transparency and accountability of lawful surveillance measures carried out on communications. &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Integrity of communications and systems&lt;/b&gt;: In order to enable service providers to secure communications securely, governments cannot require service providers to build in surveillance or monitoring capabilities.&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Safeguards for international cooperation&lt;/b&gt;: When governments work with other governments across borders to fight crime, the higher/highest standard should apply. &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Safeguards against illegitimate access&lt;/b&gt;: Governments should provide sufficient penalties to dissuade against unwarranted surveillance of communications.  &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Cost of surveillance&lt;/b&gt;: The financial cost of the surveillance on communications should be borne by the government undertaking the surveillance.&lt;/p&gt;
&lt;h3&gt;Types of Data&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The conversations during the camp reviewed a number of practices related to surveillance of communications, and emphasized the importance of establishing the draft principles. Setting the background to various surveillance measures that can be carried out by the government, the different categories of communication data that can be easily accessed by governments and law enforcement were discussed. For example, law enforcement frequently accesses information such as IP address, account name and number, telephone number, transactional records, and location data.  This data can be understood as 'non-content' data or communication data, and in many jurisdictions can easily be accessed by law enforcement/governments, as the requirements for accessing communication data are lower than the requirements for accessing the actual content of communications. For example, in the United States a court order is not needed to access communication data whereas a judicial order is needed to access the content of communications.&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Similarly, in the UK law enforcement can access communication data with authorization from a senior police officer.&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was discussed how it is concerning that communication data can be accessed easily, as it provides a plethora of facts about an individual. Given the sensitivity of communication data and the ability for personal information to be derived from the data, the ease that law enforcement is accessing the data, and the unawareness of the individual about the access- places the privacy of users at risk.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Ways of Accessing Data&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Ways in which governments and law enforcement access information and associated challenges was discussed, both in terms of the legislation that allows for access and the technology that is used for access.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Access and Technology&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In this discussion it was pointed out that in traditional forms of accessing data governments are no longer effective for a number of reasons. For example, in many cases communications and transactions, etc., that take place on the internet are encrypted. The ubiquitous use of encryption means more protection for the individual in everyday use of the internet, but serves as an obstacle to law enforcement and governments, as the content of a message is even more difficult to access. Thus, law enforcement and governments are using technologies like commercial surveillance software, targeted hacking, and malware to survey individuals. The software is sold off the shelf at trade shows by commercial software companies to law enforcement and governments. Though the software has been developed to be a useful tool for governments, it was found that in some cases it has been abused by authoritarian regimes. For example in 2012, it was found that  FinSpy, a computer espionage software made by the British company Gamma Group was being used to target political dissidents by the Government of Bahrain. FinSpy has the ability to capture computer screen shots, record Skype chats, turn on computer cameras and microphones, and log keystrokes.&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In order to intercept communications or block access to sites, governments and ISPs also  rely on the use of deep packet inspection (DPI).&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; Deep packet inspection is a tool traditionally used by internet service providers for effective management of the network. DPI allows for ISP's to monitor and filter data flowing through the network by inspecting the header of a packet of data and the content of the packet.&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; With this information it is possible to read the actual content of packets, and identify the program or service being used.&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;DPI can be used for the detection of viruses, spam, unfair use of bandwidth, and copyright enforcement.  At the same time, DPI can allow for the possibility of unauthorized data mining and real time interception to take place, and can be used to block internet traffic whether it is encrypted or not.&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Governmental requirements for deep packet inspection can in some cases be found in legislation and policy. In other cases it is not clear if it is mandatory for ISP's to provide DPI capabilities, thus the use of DPI by governments is often an opaque area. Recently, the ITU has sought to define an international standard for deep packet inspection known as the "Y.2770" standard. The standard proposes a technical interoperable protocol for deep packet inspection systems, which would be applicable to "application identification, flow identification, and inspected traffic types".&lt;a href="#fn8" name="fr8"&gt;[8]&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Access and Legislation&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The discussions also examined similarities across legislation and policy which allows governments legal access to data. It was pointed out that legislation providing access to different types of data is increasingly becoming outdated, and is unable to distinguish between communications data and personal data. Thus, relevant legislation is often based on inaccurate and outdated assumptions about what information would be useful and what types of safeguards are necessary. For example, it was discussed how US surveillance law has traditionally established safeguards based on assumptions like: surveillance of data on a personal computer is more invasive than access to data stored in the cloud, real-time surveillance is more invasive than access to stored data, surveillance of newer communications is more invasive than surveillance of older communications, etc. These assumptions are no longer valid as information stored in the cloud, surveillance of older communications, and surveillance of stored data can be more invasive than access to newer communications, etc. It was also discussed that increasingly relevant legislation also contains provisions that have generic access standards, unclear authorization processes, and provide broad circumstances in which communication data and content can be accessed. The discussion also examined how governments are beginning to put in place mandatory and extensive data retention plans as tools of surveillance. These data retention mandates highlight the changing role of internet intermediaries including the fact that they are no longer independent from political pressure, and no longer have the ability to easily protect clients from unauthorized surveillance.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. EFF. Mandatory Data Retention: United States. Available at: &lt;a class="external-link" href="https://www.eff.org/issues/mandatory-data-retention/us"&gt;https://www.eff.org/issues/mandatory-data-retention/us&lt;/a&gt;&lt;br /&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;].Espiner, T. Communications Data Bill: Need to Know. ZDNet. June 18th 2012. &lt;a class="external-link" href="http://www.zdnet.com/communications-data-bill-need-to-know-3040155406/"&gt;http://www.zdnet.com/communications-data-bill-need-to-know-3040155406/&lt;/a&gt;&lt;br /&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. Perlroth, M. Software Meant to Fight Crime is Used to Spy on Dissidents. The New York Times. August 30th 2012. Available at: &lt;a class="external-link" href="http://www.nytimes.com/2012/08/31/technology/finspy-software-is-tracking-political-dissidents.html?_r=0"&gt;http://www.nytimes.com/2012/08/31/technology/finspy-software-is-tracking-political-dissidents.html?_r=0&lt;/a&gt;&lt;br /&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. Wawro, A. What is Deep Packet Inspection?. PCWorld. February 1st 2012. Available at: &lt;a class="external-link" href="http://www.pcworld.com/article/249137/what_is_deep_packet_inspection_.html"&gt;http://www.pcworld.com/article/249137/what_is_deep_packet_inspection_.html&lt;/a&gt;&lt;br /&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. Geere, D. How deep packet inspection works. Wired. April 27th 2012. Available at: &lt;a class="external-link" href="http://www.wired.co.uk/news/archive/2012-04/27/how-deep-packet-inspection-works"&gt;http://www.wired.co.uk/news/archive/2012-04/27/how-deep-packet-inspection-works&lt;/a&gt;&lt;br /&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. Kassner. M. Deep Packet Inspection: What You Need to Know. Tech Republic. July 27th 2008. Available at: &lt;a class="external-link" href="http://www.techrepublic.com/blog/networking/deep-packet-inspection-what-you-need-to-know/609"&gt;http://www.techrepublic.com/blog/networking/deep-packet-inspection-what-you-need-to-know/609&lt;/a&gt;&lt;br /&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. Anonyproz. How to Bypass Deep Packet Inspection Devices or ISPs Blocking Open VPN Traffic. Available at: &lt;a class="external-link" href="http://www.anonyproz.com/supportsuite/index.php?_m=knowledgebase&amp;amp;amp;_a=viewarticle&amp;amp;amp;kbarticleid=138"&gt;http://www.anonyproz.com/supportsuite/index.php?_m=knowledgebase&amp;amp;_a=viewarticle&amp;amp;kbarticleid=138&lt;/a&gt;&lt;br /&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;].Chirgwin. R. Revealed: ITU's deep packet snooping standard leaks online: Boring tech doc or Internet eating monster. The Register. December 6th 2012. Available at: &lt;a class="external-link" href="http://www.theregister.co.uk/2012/12/06/dpi_standard_leaked/"&gt;http://www.theregister.co.uk/2012/12/06/dpi_standard_leaked/&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/state-surveillance-human-rights-camp-summary'&gt;https://cis-india.org/internet-governance/blog/state-surveillance-human-rights-camp-summary&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>SAFEGUARDS</dc:subject>
    

   <dc:date>2013-07-12T16:02:51Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/times-of-india-december-29-2012-delhi-gang-rape">
    <title>Delhi gang rape: What Facebook, Twitter expose about govt</title>
    <link>https://cis-india.org/news/times-of-india-december-29-2012-delhi-gang-rape</link>
    <description>
        &lt;b&gt;When constable Subhash Tomar collapsed during the anti-rape agitation in New Delhi, the government was keen to say he suffered injuries inflicted by the protesters. But the administration's version of events was challenged soon on social media, and the mainstream media latched onto the mystery and started pressurising the government to come clean.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://timesofindia.indiatimes.com/tech/social-media/Delhi-gang-rape-What-Facebook-Twitter-expose-about-govt/articleshow/17806247.cms"&gt;published in the Times of India&lt;/a&gt; on December 29, 2012. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="advenueINTEXT"&gt;The Tomar episode, when  &lt;a href="http://timesofindia.indiatimes.com/topic/social-media"&gt;social media&lt;/a&gt; set the agenda and put the government on the back foot, is one more  example of rise of people's power online. The political class in India  has been shaken by the speed and efficiency with which the recent  protests were coordinated. Some of them, like Abhijit Mukherjee, have  ended up putting their foot in their mouth while others like Congress'  youth icon and heir apparent Rahul Gandhi have not even cared to react. &lt;br /&gt;&lt;br /&gt; The reason for Tomar's death is still unclear, but the post-mortem report has attributed it to external injuries. &lt;br /&gt;&lt;br /&gt; "Frankly, right now, we haven't figured out how to deal with this phenomenon," said Congress Party Spokesman Sandeep Dikshit. &lt;br /&gt;&lt;br /&gt; The anti-corruption movement of Anna Hazare, the Occupy Wall Street  movement in the US, and the Arab Spring were all largely organised  through  &lt;a href="http://timesofindia.indiatimes.com/topic/social-networking-sites"&gt;social networking sites&lt;/a&gt;.  Even in neighbouring Pakistan, the raid that killed al-Qaeda chief  Osama bin Laden was first reported on microblogging site Twitter,  further highlighting social media's growing importance as a source of  information. Such is the influence and impact of social media that many  are increasingly referring to it as the "fifth pillar of democracy".&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;Influence bound to grow&lt;span id="advenueINTEXT"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="advenueINTEXT"&gt;India has over 120 million internet users - Twitter has about 16 million and  &lt;a href="http://timesofindia.indiatimes.com/topic/Facebook"&gt;Facebook&lt;/a&gt; over 60 million - but this is still just one-tenth of the population.&lt;/span&gt;&lt;span id="advenueINTEXT"&gt; &lt;/span&gt;&lt;span id="advenueINTEXT"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="advenueINTEXT"&gt;Also, as 3G penetration increases, data becomes accessible on more  feature phones. While about 221 million mobiles were sold in India in  2012, sales are expected to touch 251 million units in 2013, according  to technology market researcher Gartner. With so much of growth still  left to come, the influence of social media is only bound to grow. &lt;br /&gt;&lt;br /&gt; Minister of State for Human Resource Development Shashi Tharoor, one of  the early converts to social media and inveterate tweeter, said the  social media space is a "parallel universe to the mainstream media" and  that stories on these platforms have a "resonance of their own". &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="advenueINTEXT"&gt;"It is a medium that allows big issues to be made out of issues that  mainstream media ignores but politicians cannot," he said. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="advenueINTEXT"&gt;Brand guru Harish Bijoor is of the view that the political class must  pay attention to the information revolution as India is a very young  country in terms of demographics. "The political class appears a  gerontocracy while 54% of the population is below 25 and 70% below 35.  There is a disconnect that must be addressed." &lt;br /&gt;&lt;br /&gt; Kedar Gavane,  director at Internet analytics company ComScore India, said an average  Indian Facebook user has about 300 friends. "That's the kind of reach an  individual and his messages have on social networks," he said. "Twitter  has helped us identify the common man's feelings. For instance, when a  candlelight protest is organised, you get to know what the protesters  are thinking." &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="advenueINTEXT"&gt;But the real question, he said, is whether people  are actually willing to go beyond these platforms. "Whether it can  become the Fifth Estate or not is hard to say because at the end of the  day, this is just a channel for communication." &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="advenueINTEXT"&gt;With the government  struggling for a credible response to the growing influence of social  media, it has often resorted to blocking user accounts and web pages.  The government, which blocked 663 webpages in 2012, asked Indian  Internet service providers to block 16 Twitter accounts, including those  of right-wing leaders and journalists. &lt;br /&gt;&lt;br /&gt; In the first half of  2012, the government made 2,319 requests for information on 3,467 user  accounts of search engine giant Google.  &lt;a href="http://timesofindia.indiatimes.com/topic/Google"&gt;Google&lt;/a&gt; complied with 64% of these. &lt;br /&gt;&lt;br /&gt; While the influence of social media is not lost on those such as  Dikshit, he said the problem is "how to break in with an alternative  view". "It is like a community of people who think the same way and  validate each others' opinions. The number of people who validate your  opinion does not make it the right opinion, but that fine distinction is  getting lost somewhere." &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="advenueINTEXT"&gt;There are others who feel  the role of social media in protests is often exaggerated. "The agency  for change resides first in people and only secondarily in platforms,"  according to Pranesh Prakash, policy director at the Centre for Internet  and Society.&lt;/span&gt;&lt;b&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;(With inputs from Joji Thomas Philip in New Delhi)&lt;/b&gt; &lt;span id="storyendpath"&gt;&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/times-of-india-december-29-2012-delhi-gang-rape'&gt;https://cis-india.org/news/times-of-india-december-29-2012-delhi-gang-rape&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-12-31T01:02:44Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/december-2012-bulletin">
    <title>December 2012 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/december-2012-bulletin</link>
    <description>
        &lt;b&gt;We at the Centre for Internet &amp; Society wish you all a great year ahead. In the December 2012 newsletter, we bring you the draft early chapters of our “National Resource Kit” project for persons with disabilities (covering four southern states); and accessibility-related comments on the Twelfth Five Year Plan; the draft research on pervasive technologies and access to knowledge that we presented at the Global Congress on Intellectual Property and the Public Interest in Brazil; our comments on the privacy implications of including RFID tags in the proposed Rule 138A of the Motor Vehicle Rules, a report on the open access lectures delivered by Prof. Leslie Chan during his tour of India, reports of Wikipedia-related workshops conducted across three cities, and news and media coverage.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;b&gt;Jobs&lt;/b&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;CIS is seeking applications for the posts of &lt;a href="https://cis-india.org/jobs/programme-officer-indian-initiatives"&gt;Programme Officer&lt;/a&gt; (Access to Knowledge — Indic Language Initiatives), &lt;a href="https://cis-india.org/jobs/vacancy-for-developer"&gt;Developer&lt;/a&gt; (NVDA Project), &lt;a href="https://cis-india.org/about/jobs/research-manager"&gt;Research Manager&lt;/a&gt; (Digital Humanities project), and &lt;a href="https://cis-india.org/jobs/programme-officer-access-to-knowledge-and-openness"&gt;Policy&lt;/a&gt; Associate (Access to Knowledge and Openness) and Policy Associate (Internet Governance). To apply send your resume to &lt;a href="mailto:sunil@cis-india.org"&gt;sunil@cis-india.org&lt;/a&gt; and &lt;a href="mailto:pranesh@cis-india.org"&gt;pranesh@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/accessibility"&gt;Accessibility&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;India has an estimated 70 million disabled persons who are unable to read printed materials due to some form of physical, sensory, cognitive or other disability. The disabled need accessible content, devices and interfaces facilitated via copyright law and electronic accessibility policies:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;National Resource Kit for Persons with Disabilities&lt;/b&gt;&lt;br /&gt;CIS received a grant of INR 54,83,200 from the Hans Foundation for Creating a National Kit of Laws, Policies and Programs for Persons with Disabilities on August 16, 2012. Anandhi Vishwanathan from CIS and Shruti Ramakrishnan from the Centre for Law and Policy Research are the researchers presently working for this project. Early draft chapters have been published. Feedback and comments are invited from the readers:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/accessibility/blog/national-resource-kit-tamil-nadu-chapter-call-for-comments"&gt;The Tamil Nadu Chapter&lt;/a&gt; (by Shruti Ramakrishnan, December 30, 2012).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/accessibility/blog/national-resource-kit-karnataka-chapter"&gt;The Karnataka Chapter&lt;/a&gt; (by Shruti Ramakrishnan, December 30, 2012).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/accessibility/blog/national-resource-kerala-chapter-call-for-comments"&gt;The Kerala Chapter&lt;/a&gt; (by Anandi Vishwanathan, December 31, 2012).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/accessibility/blog/national-resource-kit-andhra-pradesh-call-for-comments"&gt;The Andhra Chapter&lt;/a&gt; (by Anandi Vishwanathan, December 31, 2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Feedback&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/accessibility/blog/feedback-on-draft-twelfth-five-year-plan"&gt;Comments and Feedback on the Draft Twelfth Five Year Plan with respect to Persons with Disabilities&lt;/a&gt; (by Rahul Cherian, December 28, 2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Media Coverage&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/ip-watch-catherine-saez-december-18-2012-wipo-to-negotiate-treaty-for-the-blind-in-june"&gt;WIPO To Negotiate Treaty For The Blind In June; ‘Still Some Distance To Travel’&lt;/a&gt; (by Catherine Saez, Intellectual Property Watch, December 18, 2012).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/times-of-india-city-mumbai-madhavi-rajadhyaksha-december-20-2012-disability-groups-in-india-welcome-progress-on-treaty-for-blind-persons"&gt;Disability groups in India welcome progress on treaty for blind persons&lt;/a&gt; (by Madhavi Rajadhyaksha, December 20, 2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Blog Entry&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/accessibility/blog/wipo-to-convene-conference-to-finalise-tvi-next-year"&gt;WIPO to Convene a Diplomatic Conference in Morocco to Finalise TVI&lt;/a&gt; (by Rahul Cherian, December 24, 2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/about/a2k"&gt;Access to Knowledge&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Access to Knowledge programme addresses the harms caused to consumers, developing countries, human rights, and creativity/innovation from excessive regimes of copyright, patents, and other such monopolistic rights over knowledge:&lt;/p&gt;
&lt;h3&gt;Event Organised&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/a2k/global-congress-on-ip"&gt;2012 Global Congress on Intellectual Property and the Public Interest&lt;/a&gt; (FGV Law School, Rio de Janeiro, December 15 – 17, 2012). The Second Global Congress on Intellectual Property and the Public Interest was organized by Fundação Getulio Vargas, American University Washington College of Law, Columbia University, Open AIR, and ICSTD. Sunil Abraham and Pranesh Prakash participated in the event. Pranesh was one of the moderators in the Roundtable Discussion on Priority Policy Forums, Research and Analysis Needs and Commitments.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Research for the Global Congress&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;For the 2012 Global Congress on Intellectual Property and Public Interest event, CIS conducted research. Jadine Lannon (based on research by Annapoornima and Rohan George and with help from Yogesh Kumar did research on documentation of phones and their patent, Amba Kak did research on copyright and mobile licensing, Vikrant Vasudev conducted research on patent pools and valuation methods, Hans Varghese Mathews did research on mathematical models of patent pools and Nehaa Chaudhuri did research on analysis of 3Gand 4G patent pools.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/about/newsletters/openness"&gt;Openness&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The 'Openness' programme critically examines alternatives to existing regimes of intellectual property rights, and transparency and accountability. Under this programme, we study Open Government Data, Open Access to Scholarly Literature, Open Access to Law, Open Content, Open Standards, and Free/Libre/Open Source Software:&lt;/p&gt;
&lt;h3&gt;Event Report&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/openness/blog/random-hacks-of-kindness-december-2012-report"&gt;Random Hacks of Kindness Global December 2012 — A Report&lt;/a&gt; (by Yogesh Londhe, December 10, 2012). Event was hosted at CIS office in Bangalore. CIS, Amnesty International India Office, Greenpeace India Office, HasGeek, Yahoo Research &amp;amp; Development and SimpleTechLife sponsored the event held in CIS office in Bangalore on December 1 and 2, 2012.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Events Participated&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;‘&lt;a href="https://cis-india.org/news/i-and-n-partners-meeting-rio"&gt;Information &amp;amp; Networks’ Partners’ Meeting&lt;/a&gt; (organised by International Development Research Centre, Canada in Rio de Janeiro, December 11 – 12, 2013). Sunil Abraham spoke in session on Open Business and IP.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/leslie-chan-gives-five-talks-in-india"&gt;Open Access Champion Leslie Chan Delivers Five Talks in India&lt;/a&gt; (Department of Library &amp;amp; Information Science, University of Kerala, National Institute of Interdisciplinary Science &amp;amp; Technology, CSIR, Indian Institute of Information Technology and Management – Kerala, Manasa Media Centre, Mysore University Library and SDM Institute for Management Development, December 17 – 20, 2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;a href="https://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;Access to Knowledge&lt;/a&gt; (Wikipedia Project)&lt;/b&gt;&lt;br /&gt;Beginning from September 1, 2012, Wikimedia Foundation has &lt;a href="https://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;awarded&lt;/a&gt; CIS a two-year grant of INR 26,000,000 to support and develop free knowledge in India. The &lt;a href="http://meta.wikimedia.org/wiki/Access_To_Knowledge/Team" title="Access To Knowledge/Team"&gt;A2K team&lt;/a&gt; consists of three members based in Delhi: &lt;a href="https://cis-india.org/about/newsletters/people/our-team"&gt;Nitika Tandon&lt;/a&gt;, &lt;a href="https://cis-india.org/about/newsletters/people/our-team"&gt;Subhashish Panigrahi&lt;/a&gt; and &lt;a href="https://cis-india.org/about/newsletters/people/our-team"&gt;Noopur Raval&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;Events Organised&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/wikipedia-workshop-at-nmait"&gt;Wikipedia Workshop at NMAIT&lt;/a&gt; (NMAIT, Karkala Taluk, December 21, 2012, co-organised in association with Metawings Institute).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/wikipedia-workshop-at-srm-chennai"&gt;Wikipedia Workshop at SRM&lt;/a&gt; (SRM University, Chennai, December 17, 2012, co-organised in association with Metawings Institute).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/marathi-wiki-workshop-at-tiss"&gt;Marathi Wiki Workshop at TISS&lt;/a&gt; (Tata Institute of Social Sciences, Mumbai, December 8, 2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Blog Entries&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/non-unicode-iscii-text-can-be-converted-to-unicode"&gt;Non Unicode ISCII Text Can be Converted to Unicode Now!&lt;/a&gt; (by Subhashish Panigrahi, December 19, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/new-avenues"&gt;New Avenues: Media Wiki Groups&lt;/a&gt; (by Noopur Raval, December 28, 2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;News / Media Coverage&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/report-of-odia-wikipedia-workshop-in-iit-kharagpur"&gt;A Report of Odia Wikipedia Workshop at IIT, Kharagpur&lt;/a&gt; (Samaja, Odia daily, Kolkata edition, December 3, 2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Videos&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/events/wikipedia-state-of-tech-talk-by-erik-moeller"&gt;Wikipedia: State of Tech — A Talk by Erik Moeller&lt;/a&gt; (CIS, Bangalore, November 12, 2012). Erik Moeller, Vice President of Engineering and Product Development at the Wikimedia Foundation gave a talk.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/events/art-in-the-open-source-age"&gt;Art in the Open Source Age — A Talk by Gene Kogan&lt;/a&gt; (CIS, Bangalore, November 30, 2012). Gene Kogan, a programmer and digital artist gave a talk.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;HasGeek&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;HasGeek creates discussion spaces for geeks and has organised conferences like the &lt;a href="http://fifthelephant.in/2012/"&gt;Fifth Elephant&lt;/a&gt;, &lt;a href="http://droidcon.in/2011"&gt;Droidcon India 2011&lt;/a&gt;, &lt;a href="http://androidcamp.hasgeek.com/"&gt;Android Camp&lt;/a&gt;, etc. HasGeek is supported by CIS and works out from CIS office in Bengaluru.&lt;/p&gt;
&lt;h3&gt;Upcoming Event&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://metarefresh.in/2013/"&gt;Meta Refresh&lt;/a&gt; (MLR Convention Centre, JP Nagar, Bangalore, February 22 and 23, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/about/internet-governance"&gt;Internet Governance&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Internet Governance programme conducts research around the various social, technical, and political underpinnings of global and national Internet governance, and includes online privacy, freedom of speech, and Internet governance mechanisms and processes:&lt;/p&gt;
&lt;h3&gt;Analysis of Central Motor Vehicle Rules&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/comments-on-motor-vehicle-rules"&gt;Comments on the Proposed Rule 138A of the Central Motor Vehicle Rules, 1989&lt;/a&gt; Concerning Radio Frequency Identification Tags (by Bhairav Acharya, December 3, 2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h3&gt;Columns/Op-eds&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/economic-times-december-2-2012-sunil-abraham-online-censorship"&gt;Online Censorship: How Government should Approach Regulation of Speech&lt;/a&gt; (by Sunil Abraham, Economic Times, December 5, 2012).&lt;/li&gt;
&lt;li&gt;The Worldwide Web of Concerns (by Pranesh Prakash, &lt;a href="https://cis-india.org/internet-governance/blog/deccan-chronicle-pranesh-prakash-december-10-2012-the-worldwide-web-of-concerns"&gt;Deccan Chronicle&lt;/a&gt;, and &lt;a href="https://cis-india.org/internet-governance/blog/asian-age-column-december-10-2012-pranesh-prakash-the-worldwide-web-of-concerns"&gt;Asian Age&lt;/a&gt;, December 10, 2012).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/the-hindu-opinion-lead-december-15-2012-chinmayi-arun-the-trouble-with-hurried-solutions"&gt;The Trouble with Hurried Solutions&lt;/a&gt; (by Chinmayi Arun, The Hindu, December 15, 2012).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indian-express-nishant-shah-december-29-2012-tomorrow-today"&gt;Tomorrow, Today&lt;/a&gt; (Nishant Shah, The Indian Express, December 29, 2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Event Organised&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/events/meeting-of-network-of-internet-and-society-centers"&gt;Meeting of the Network of Internet &amp;amp; Society Centers&lt;/a&gt; (organised by Berkman Center for Internet &amp;amp; Society, Alexander von Humboldt Institute for Internet &amp;amp; Society, Center for Technology &amp;amp; Society, KEIO University SFC, the MIT Media Lab, the MIT Center for Civic Media, NEXA Center for Internet &amp;amp; Society and CIS, Cambridge, Massachusetts, December 6 – 8, 2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Upcoming Events&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/events/dml-conference-2013"&gt;DML Conference 2013&lt;/a&gt; (Sheraton Chicago Hotel &amp;amp; Towers - Chicago, Illinois, March 14 – 16, 2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Events Participated&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/second-international-e-governance-conference-at-baghdad"&gt;Second International e-Governance Conference&lt;/a&gt; (organized by the National Committee for Corporate Governance Electronic Iraq and the United Nations Development Programme, Rashid Hotel, Baghdad, December 2, 2012). Sunil Abraham presented on "Review of the Legal Environment in Iraq for Effective e-Governance".&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/seminar-artist-talks-outresourcing-with-the-transmediale-collective"&gt;Seminar/Artist Talks : "Outresourcing" with the Transmediale Collective&lt;/a&gt; (organised by the Berlin - Transmediale new media collective, December 3, 2012, Bangalore). Sharath Chandra Ram presented a White Paper. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;World Conference on International Telecommunications (organised by ITU, December 3 – 14). Chinmayi Arun participated as a civil society representative.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/internet-driven-developments"&gt;Internet Driven Developments: Structural Changes and Tipping Points&lt;/a&gt; (organised by Berkman Center for Internet &amp;amp; Society, Cambridge, Massachusetts at Harvard University, December 6 – 8, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.eihr.ee/en/annualconference/conference-2012/program/"&gt;Annual Conference on Human Rights 2012&lt;/a&gt; (organised by Estonian Institute of Human Rights and Google). Malavika Jayaram participated as a panelist.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/state-surveillance-and-human-rights-camp"&gt;State Surveillance and Human Rights Camp&lt;/a&gt; (Sheraton Rio Hotel &amp;amp; Resort, Rio, Brazil, December 13 and 14, 2012). Elonnai Hickok made a presentation on MLATS and International Cooperation for Law Enforcement Purposes.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.youtube.com/watch?v=VC9G_tbxI9Y"&gt;Economic Impact of Internet in India&lt;/a&gt; (organised by Aspen Institute India, December 21, 2012). Chinmayi Arun attended this event.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Blog Entries&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/transcripts-of-wcit-2012"&gt;Transcripts from WCIT-12&lt;/a&gt; (by Snehashish Ghosh, December 3, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/section-66-a-information-technology-act-2000-cases"&gt;Section 66-A, Information Technology Act, 2000: Cases&lt;/a&gt; (by Snehashish Ghosh, December 3, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/internet-driven-developments"&gt;Internet-driven Developments — Structural Changes and Tipping Points&lt;/a&gt; (by Elonnai Hickok, December 28, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/state-surveillance-human-rights-camp-summary"&gt;State Surveillance and Human Rights Camp: Summary&lt;/a&gt; (by Elonnai Hickok, December 31, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/mining-the-web-collective"&gt;Mining the Web Collective&lt;/a&gt; (by Sharath Chandra Ram, December 31, 2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Video&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/events/technology-culture-and-events-in-south-east-asia"&gt;Technology Culture and Events in South East Asia — A Presentation by Preetam Rai&lt;/a&gt; (CIS, Bangalore, December 18, 2012). Preetam Rai gave a lecture.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Media Coverage&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/telegraphindia-december-3-2012-gs-mudur-66a-cut-and-paste-job"&gt;66A ‘cut &amp;amp; paste job’&lt;/a&gt; (by GS Mudur, Telegraph, December 3, 2012). Pranesh Prakash and Snehashish Ghosh are quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/livemint-december-6-2012-surabhi-agarwal-ayodhya-trending-on-twitter-sparks-censorship-concerns"&gt;Ayodhya trending on Twitter sparks censorship concerns&lt;/a&gt; (by Surabhi Agarwal, December 6, 2012). Sunil Abraham is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/the-hindu-sci-tech-internet-december-10-2012-vasudha-venugopal-debate-on-section-66a"&gt;Debate on Section 66A rages on&lt;/a&gt; (Vasudha Venugopal, The Hindu, December 10, 2012). Pranesh Prakash is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/times-of-india-india-times-december-13-2012-kim-arora-hacktivists-deface-bsnl-website"&gt;Hacktivists deface BSNL website&lt;/a&gt; (by Kim Arora, The Times of India, December 13, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/livemint-december-16-2012-surabhi-agarwal-govt-likely-to-issue-guidelines-to-clarify-it-rules-soon"&gt;Govt likely to issue guidelines to clarify IT rules soon&lt;/a&gt; (by Surabhi Agarwal, LiveMint, December 16, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/india-today-rahul-jayaram-december-18-2012-the-freedom-of-expression-debate"&gt;The freedom of expression debate: The State must mend fences with The Web&lt;/a&gt; (by Rahul Jayaram, India Today, December 18, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/dna-bangalore-december-19-2012-the-it-act-is-fine-but-its-interpretation-is-not"&gt;‘The IT Act is fine, but its interpretation is not’&lt;/a&gt; (DNA, December 19, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/times-of-india-december-22-2012-kim-arora-no-fear-of-losing-internet-freedom-till-jan-15"&gt;No fear of losing internet freedom till Jan 15: Experts&lt;/a&gt; (by Kim Arora, The Times of India, December 22, 2012). Pranesh Prakash is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/livemint-december-27-2012-surabhi-agarwal-un-agrees-to-review-agencies-governing-internet"&gt;UN agrees to review agencies governing Internet&lt;/a&gt; (by Surabhi Agarwal, LiveMint, December 27, 2012). Pranesh Prakash is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/times-of-india-december-29-2012-delhi-gang-rape"&gt;Delhi gang rape: What Facebook, Twitter expose about govt&lt;/a&gt; (The Times of India, December 31, 2012). Pranesh Prakash is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/the-hindu-december-31-2012-op-ed-a-note-of-dissent-on-cash-transfers-and-uid"&gt;A note of dissent on cash transfers and UID&lt;/a&gt; (The Hindu, December 31, 2012). Sunil Abraham was one of the signatories.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/times-of-india-december-31-2012-javed-anwer-and-rukmini-shrinivasan-the-year-social-media-came-of-age-in-india"&gt;The year social media came of age in India&lt;/a&gt; (by Javed Anwer and Rukmini Shrinivasan, The Times of India, December 31, 2012). Sunil Abraham is quoted.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/about/telecom"&gt;Telecom&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;While the potential for growth and returns exist for telecommunications in India, a range of issues need to be addressed. One aspect is more extensive rural coverage and the other is a countrywide access to broadband which is low. Both require effective and efficient use of networks and resources, including spectrum:&lt;/p&gt;
&lt;h3&gt;Newspaper Column&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/telecom/blog/organizing-india-blogspot-shyam-ponappa-december-11-2012-inflation-control-through-structural-reforms"&gt;Inflation Control Through Structural Reforms&lt;/a&gt; (by Shyam Ponappa, Business Standard, December 11, 2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;a href="https://cis-india.org/about/telecom/telecom-knowledge-repository/knowledge-and-capacity-around-telecom-policy"&gt;Building Knowledge and Capacity around Telecommunication Policy in India&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;Ford Foundation has given a grant of USD 2,00,000 to CIS to build expertise in the area of telecommunications in India. The knowledge repository deals with these modules: Introduction to Telecommunications, Telecommunications Infrastructure and Technologies, Government of India Regulatory Framework for Telecom, Telecommunication and the Market, Universal Access and Accessibility, The International Telecommunications Union and other international bodies, Broadcasting, Emerging Topics and Way Forward. Dr. Surendra Pal, Satya N Gupta, Paranjoy Guha Thakurta, Payal Malik, Dr. Rakesh Mehrotra and Dr. Nadeem Akhtar are the expert reviewers.&lt;/p&gt;
&lt;p&gt;The following are the new outputs:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/telecom/telecom-knowledge-repository/licensing-framework-for-telecom"&gt;Licensing Framework for Telecom: A Historical Overview&lt;/a&gt; (by Snehashish Ghosh, December 31, 2012).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/telecom/telecom-knowledge-repository/market-structure-in-telecom-industry"&gt;Market Structure in the Telecom Industry&lt;/a&gt; (by Snehashish Ghosh, December 31, 2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/about/digital-natives"&gt;Digital Natives&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Digital Natives with a Cause? examines the changing landscape of social change and political participation in light of the role that young people play through digital and Internet technologies, in emerging information societies. Consolidating knowledge from Asia, Africa and Latin America, it builds a global network of knowledge partners who critically engage with discourse on youth, technology and social change, and look at alternative practices and ideas in the Global South:&lt;/p&gt;
&lt;h3&gt;Book Review&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/digital-natives/blog/indian-express-december-8-2012-nishant-shah-not-just-fancy-television"&gt;Not Just Fancy Television&lt;/a&gt; (by Nishant Shah, Indian Express, December 8, 2012): Nishant Shah reviews Ben Hammersley's book "64 Things You Need to Know for Then: How to Face the Digital Future Without Fear ", published by Hodder &amp;amp; Stoughton.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Media Coverage&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/cnn-december-8-2012-oliver-joy-what-does-it-mean-to-be-a-digital-native"&gt;What does it mean to be a digital native?&lt;/a&gt; (by Oliver Joy, CNN, December 8, 2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="http://cis-india.org/about/newsletters/"&gt;About CIS&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;CIS was registered as a society in Bangalore in 2008. As an independent, non-profit research organisation, it runs different policy research programmes such as Accessibility, Access to Knowledge, Openness, Internet Governance, and Telecom. The policy research programmes have resulted in outputs such as the &lt;a href="https://cis-india.org/about/advocacy/accessibility/blog/e-accessibility-handbook"&gt;e-Accessibility Policy Handbook for Persons with Disabilities&lt;/a&gt; with ITU and G3ict, and &lt;a href="https://cis-india.org/about/digital-natives/front-page/blog/dnbook"&gt;Digital Alternatives with a Cause?&lt;/a&gt;, &lt;a href="https://cis-india.org/about/digital-natives/front-page/blog/position-papers"&gt;Thinkathon Position Papers&lt;/a&gt; and the &lt;a href="https://cis-india.org/about/digital-natives/front-page/blog/digital-natives-with-a-cause-a-report"&gt;Digital Natives with a Cause? Report&lt;/a&gt; with Hivos, etc. We conducted policy research for the Ministry of Communications &amp;amp; Information Technology, Ministry of Human Resource Development, Ministry of Personnel, Public Grievances and Pensions, Ministry of Social Justice and Empowerment, etc., on &lt;a href="https://cis-india.org/about/a2k/blog/cis-analysis-july2011-treaty-print-disabilities"&gt;WIPO Treaties&lt;/a&gt;, &lt;a href="https://cis-india.org/about/a2k/blog/analysis-copyright-amendment-bill-2012"&gt;Copyright Bill&lt;/a&gt;, &lt;a href="https://cis-india.org/about/internet-governance/front-page/blog/cis-feedback-to-nia-bill"&gt;NIA Bill&lt;/a&gt;, etc. CIS is accredited as an observer at WIPO, and has given policy briefs to delegations from various countries, our Programme Manager, Nirmita Narasimhan won the &lt;a href="https://cis-india.org/about/accessibility/blog/national-award"&gt;National Award for Empowerment of Persons with Disabilities&lt;/a&gt; from the Government of India and also received the &lt;a href="https://cis-india.org/about/news/nirmita-nivh-award"&gt;NIVH Excellence Award&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Follow us elsewhere&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Get short, timely messages from us on &lt;a href="https://twitter.com/cis_india"&gt;Twitter&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Join the CIS group on &lt;a href="http://www.facebook.com/groups/28535315687/"&gt;Facebook&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Visit us at &lt;a href="https://cis-india.org/"&gt;http://cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Support Us&lt;/b&gt;&lt;br /&gt;Please help us defend consumer / citizen rights on the Internet! Write a cheque in favour of ‘The Centre for Internet and Society’ and mail it to us at No. 194, 2nd ‘C’ Cross, Domlur, 2nd Stage, Bengaluru – 5600 71.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Request for Collaboration&lt;/b&gt;&lt;br /&gt;We invite researchers, practitioners, and theoreticians, both organisationally and as individuals, to collaboratively engage with Internet and society and improve our understanding of this new field. To discuss the research collaborations, write to Sunil Abraham, Executive Director, at &lt;a href="mailto:sunil@cis-india.org"&gt;sunil@cis-india.org&lt;/a&gt; or Nishant Shah, Director – Research, at &lt;a href="mailto:nishant@cis-india.org"&gt;nishant@cis-india.org&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;CIS is grateful to its donors, Wikimedia Foundation, Ford Foundation, Privacy International, UK, Hans Foundation and the Kusuma Trust which was founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin, for its core funding and support for most of its projects.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/december-2012-bulletin'&gt;https://cis-india.org/about/newsletters/december-2012-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2013-01-16T05:15:27Z</dc:date>
   <dc:type>Page</dc:type>
   </item>




</rdf:RDF>
