The Centre for Internet and Society
https://cis-india.org
These are the search results for the query, showing results 171 to 185.
Submitted Comments on the Telangana State Open Data Policy 2016
https://cis-india.org/openness/comments-on-the-telangana-state-open-data-policy-2016
<b>Last month, the Information Technology, Electronics & Communications Department of the Government of Telangana released the first public draft of the Telangana State Open Data Policy 2016, and sought comments from various stakeholders in the state and outside. The draft policy not only aims to facilitate and provide a framework for proactive disclosure of data created by the state government agencies, but also identify the need for integrating such a mandate within the information systems operated by these agencies as well. CIS is grateful to be invited to submit its detailed comments on the same. The submission was drafted by Anubha Sinha and Sumandro Chattapadhyay.</b>
<p> </p>
<p><strong>Download the submitted document: <a href="http://cis-india.org/openness/files/cis-telangana-state-open-data-policy-v-1-submission/at_download/file">PDF</a>.</strong></p>
<hr />
<h3><strong>1. Preliminary</strong></h3>
<p><strong>1.1.</strong> This submission presents comments and recommendations by the Centre for Internet and Society (“CIS”) <strong>[1]</strong> on the proposed draft of the Telangana Open Data Policy 2016 (“the draft policy”). This submission is based on Version 1 of the draft policy shared by the Information Technology, Electronics & Communications Department, Government of Telangana (“the ITE&C Department”).</p>
<p><strong>1.2.</strong> CIS commends the ITE&C Department for its generous efforts at seeking inputs from various stakeholders to draft an open data policy for the state of Telangana. CIS is thankful for this opportunity to provide a clause-by-clause submission.</p>
<h3><strong>2. The Centre for Internet and Society</strong></h3>
<p><strong>2.1.</strong> The Centre for Internet and Society, CIS, is a non-profit organisation that undertakes interdisciplinary research on internet and digital technologies from policy and academic perspectives. The areas of focus include digital accessibility for persons with diverse abilities, access to knowledge, intellectual property rights, openness (including open data, free and open source software, open standards, open access, open educational resources, and open video), internet governance, telecommunication reform, digital privacy, and cyber-security. The academic research at CIS seeks to understand the reconfiguration of social processes and structures through the internet and digital media technologies, and vice versa.</p>
<p>2.2. This submission is consistent with CIS’ commitment to safeguarding general public interest, and the interests and rights of various stakeholders involved. The comments in this submission aim to further the principle of citizens’ right to information, instituting openness-by-default in governmental activities, and to realise the various kinds of public goods that can emerge from greater availability of open (government) data. The submission is limited to those clauses that most directly have an impact on these principles.</p>
<h3><strong>3. Comments and Recommendations</strong></h3>
<p><em>This section presents comments and recommendations directed at the draft policy as a whole, and in certain places, directed at specific clauses of the draft policy.</em></p>
<h3>3.1. Defining the Scope of the Policy in the Preamble</h3>
<p><strong>3.1.1.</strong> CIS observes and appreciates that the ITE&C Department has identified the open data policy as a catalyst for, and as dependent upon, a larger transformation of the information systems implemented in the state, to specifically ensure that these information systems.</p>
<p><strong>3.1.2.</strong> CIS commends the endeavour of the draft policy to share data in open and machine-readable standards. To further this, it will be useful for the preamble to explicitly mandate proactive disclosure in both human-readable and machine-readable formats, using open standards, and under open license(s).</p>
<p><strong>3.1.3.</strong> CIS recommends that the draft policy state the scope of the policy at the outset, i.e. in the Preamble section of the document. This will provide greater clarity to the stakeholders who are trying to ascertain applicability of the draft policy to their data.</p>
<p><strong>3.1.4.</strong> CIS commends the crucial mandate of creating data inventory within every state government ministry / department. We further recommend that the draft policy also expressly states the need to make these inventories publicly accessible.</p>
<p><strong>3.1.5.</strong> CIS commends the draft policy’s aim to build a process to engage with data users for better outcomes. We suggest that the draft policy also enumerates the “outcomes” of such engagement, in order to provide more clarity. We recommend that these “outcomes” include greater public supply of open government data in an effective, well-documented, timely, and responsible manner.</p>
<p><strong>3.1.6.</strong> Further, CIS suggests that the draft policy define “information centric and customer centric data” to provide more clarity to the document, as well as its scope and objectives.</p>
<h3>3.2. Provide Legal and Policy References</h3>
<p><strong>3.2.1.</strong> Strengthening transparency, predictability, and legal certainty of rules benefits all stakeholders. Thus, as far as possible, terms in the draft policy should use pre-existing legal definitions. In case of ambiguities arising after the implementation of the policy, consistency in definitions will also lead to greater interpretive certainty. It must be noted that good quality public policies which promote legal certainty, lead to better implementation.</p>
<p><strong>3.2.2.</strong> CIS observes that the draft policy re-defines various terms in Section 4 that have already been defined in National Data Sharing and Accessibility Policy (“NDSAP”) 2012 <strong>[2]</strong>, the Right to Information 2005 (“RTI Act”) <strong>[3]</strong>, and IT (Reasonable security practices and procedures and sensitive personal data or information) Rules 2011 <strong>[4]</strong>. We strongly recommend that the draft policy uses the pre-existing definitions in these acts, rules, and policies.</p>
<p><strong>3.2.3.</strong> Further, CIS observes that while certain sections accurately reflect definitions and parts from other acts, rules and policies, such sections are not referenced back to the latter. These sections include, but are not limited to: Sections 3, 7, 8, 4 (definitions of Data set, Data Archive, Negative list, Sensitive Personal data). We strongly recommend that accurate legal references be added to the draft policy after careful study of the language used.</p>
<h3>3.3. Need for More Focused Objective Statement</h3>
<p><strong>3.3.1.</strong> While the draft policy has a very comprehensive statement of its objectives, including "<em>all issues related to data in terms of the available scope of sharing and accessing spatial and non-spatial data under broad frameworks of standards and interoperability</em>," it may consider offering a more focused statement of its key objective, which is to provide a policy framework for proactive disclosure of government data by the various agencies of the Government of Telangana.</p>
<p><strong>3.3.2.</strong> Further, the objective statement must clearly state that the policy enables publication of data created by the agencies of the Government of Telangana, and/or by private agencies working in partnership with public agencies, using public funds as open data (that is, using open standards, and under open license). The present version of the objective statement mentions "<em>sharing</em>" and "<em>accessing</em>" the data concerned under "<em>broad frameworks of standards and interoperability</em>" but does not make it clear if such shared data will be available in open standards, under open licenses, and for royalty-free adaptation and redistribution by the users concerned.</p>
<h3>3.4. Suggestions related to the Definitions</h3>
<p><strong>3.4.1.</strong> The term “Data” has not been defined in accordance with NDSAP 2012. We suggest that the definition provided in NDSAP is followed so as to ensure legal compatibility.</p>
<p><strong>3.4.2.</strong> The term “Sensitive Personal Data” seems to have been defined on the basis of the definition provided in the IT (Reasonable security practices and procedures and sensitive personal data or information) Rules 2011. Please add direct reference so as to make this clear. We further suggest that the term “Personal Information”, also defined in the same IT Rules, is also included and referred to in the draft policy, so that not only Sensitive Personal Data is barred from disclosure under this policy, but also Personal Information (that is "<em>any information that relates to a natural person, which, either directly or indirectly, in combination with other information available or likely to be available with a body corporate, is capable of identifying such person</em>") <strong>[5]</strong>.</p>
<p><strong>3.4.3.</strong> The term “Negative List” is defined in a manner that allows the state government ministries and agencies to identify which data are to be considered as non-shareable without any reference to an existing policy framework that list acceptable grounds for such identification. The term must be defined more restrictively, as this definition can allow an agency to avoid disclosure of data that may not be legally justifiable as non-shareable or sensitive. Thus, we recommend a more limited definition which may draw upon the RTI Act 2005, and specifically consider the factors mentioned in Sections 8 and 9 of the Act as the (only) set of acceptable reasons for non-disclosure of government data.</p>
<p><strong>3.4.4.</strong> The terms “Shareable Data” and “Sensitive Data” are used in several places in the draft policy but are not defined in Section 4. Both these terms are defined in NDSAP 2012. We suggest that both these terms be listed in Section 4, in accordance with the respective definitions provided in NDSAP 2012.</p>
<p><strong>3.4.5.</strong> The terms “Data Archive”, “Data Acquisition”, “Raw Data”, “Standards-Compliant Applications”, and “Unique Data” are defined in Section 4, but none of these terms appear elsewhere in the draft policy. We suggest that these terms are either better integrated into the document, or may not be defined at all.</p>
<h3>3.5. Rename Section 6 to Focus on Implementation of the Policy</h3>
<p><strong>3.5.1.</strong> Though the Section 6 is named as “Shareable Data”, it instead categorically lists down how the policy is to be implemented. This is a very welcome step, but the Section title should reflect this purpose of the Section.</p>
<p><strong>3.5.2.</strong> The decision proposed in the draft policy to make it mandatory for "<em>each funding organization</em>" to "<em>highlight data sharing policy as preamble in its RFPs as well as Project proposal formats</em>" is much appreciated and commendable. For a clearer and wider applicability of this measure, we recommend that this responsibility should apply to all state government agencies, including agencies where the state government enjoys significant stake, and all public-private partnerships entered into by the state government agencies, and not only to "<em>funding organizations</em>" (a term that has also not been defined in the draft policy).</p>
<p><strong>3.5.3.</strong> While the Section details out various measures and steps of implementation of the policy, it does not clarify which agency and/or committee would have the authority and responsibility to coordinate, monitor, facilitate, and ensure these measures and steps. Not only governmental representatives but also non-governmental representatives may be considered for such a committee.</p>
<h3>3.6. Host All Open Government Data in the State Portal</h3>
<p><strong>3.6.1.</strong> We observe that the Section 6 indicates that , the designated domain for the open government data portal for the state of Telangana, will only store metadata related to the proactive disclosed data sets but not the data sets themselves. This is further clarified in Section 10. We strongly urge the ITE&C Department to reconsider this decision to not to store the actual open data sets in the state open government data portal itself but in the departmental portals. A central archive of the open data assets, hosted by the state open government data portal, will allow for more effective and streamlined management of the open data assets concerned, including their systematic backing-up, better security and integrity, permanent and unique disclosure, and rule-driven updation. This would also reduce the burden upon all the government agencies, especially those that do not have a substantial IT team, to run independent department-specific open data portals.</p>
<h3>3.7. Reconsider the Section on Data Classification</h3>
<p><strong>3.7.1.</strong> While it is clear that the Section 7 on Data Classification follows the classification of various data sets created, managed, and/or hosted by government agencies offered in the NDSAP 2012, it is not very clear what role this classification plays in functioning and implementation of the draft policy. While Open Access and Registered Access data may both be considered as open government data that is to be proactively disclosed by the state government agencies via the state open government data portal, the Restricted Access data overlaps with the kinds of data already included in the Negative List defined in the draft policy (and elsewhere, like the RTI Act 2005). Further, the final sentence in this Section ensures that all data users provide appropriate attribution of the source(s) of the data set concerned, which (though is an important statement) should not be part of this Section on Data Classification. We suggest reconsideration of inclusion of this Section.</p>
<h3>3.8. Reconsider the Section on Technology for Sharing and Access</h3>
<p><strong>3.8.1.</strong> While it is clear that the Section 8 on Technology for Sharing and Access is adapted from the Section 9 of the NDSAP 2012, the text in this Section seems to be not fully compatible with other statements in this draft policy. For example, the Section states that "<em>[t]his integrated repository will hold data of current and historical nature and this repository over a period of time will also encompass data generated by various State Government departments</em>." However, the draft policy states in Section 10 that "<em>data.telangana.gov.in will only have the metadata and data itself will be accessed from the portals of the departments</em>."</p>
<p><strong>3.8.2.</strong> We strongly urge the ITE&C Department to revise this Section through close discussion with the NDSAP Project Management Unit, National Informatics Centre, which is the technical team responsible for developing and managing the portal, since the present version of this Section lists the original feature set of the portal as envisioned in 2012 but does not reflect the most recent feature set that has been already implemented in the portal concerned.</p>
<h3>3.9. Current Legal Framework (Section 9) should List to Relevant Acts, Rules, Policies, and Guidelines</h3>
<p><strong>3.9.1.</strong> CIS observes that the draft policy attempts to lay out the applicable legal framework in Section 2 and 9 of the draft policy, and submits that the legal framework is incomplete and recommends that the draft policy lists all the following relevant acts, rules, policies and guidelines:</p>
<ol type="A">
<li>National Data Sharing and Accessibility Policy, 2012<br /><br /></li>
<li>Right to Information Act, 2005<br /><br /></li>
<li>Information Technology Act, 2002<br /><br /></li>
<li>Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011.<br /></li></ol>
<p><strong>3.9.2.</strong> CIS submits that apart from the policies mentioned above, the implementation of the draft policy is intricately linked to concepts of "open standards," "open source software," "open API," and "right to information." These concepts are governed by specific acts and policies, and are applicable to government owned data, as follows:</p>
<ol type="A">
<li><strong>Adoption of Open Standards:</strong> CIS observes that the draft policy draws on the importance of building information systems for interoperability and greater information accessibility. Interoperability is achieved by appropriate implementation of open standards. Thus, CIS submits that the Policy on Open Standards for e-Governance <strong>[6]</strong> which establishes the guidelines for usage of open standards to ensure seamless interoperability, and the Implementation Guidelines of the National Data Sharing and Accessibility Policy, 2012 <strong>[7]</strong> should be mentioned in the draft policy.<br /><br /></li>
<li><strong>Adoption of Open Source Software:</strong> The Policy on Adoption of Open Source Software for Government of India states that the "<em>Government of India shall endeavour to adopt Open Source Software in all e-Governance systems implemented by various Government organizations, as a preferred option in comparison to Closed Source Software</em> <strong>[8]</strong>." As the draft policy proposed to guide the development of information systems to share open data is being developed and implemented both by the Government of Telangana and by other agencies (academic, commercial, and otherwise), it must include an explicit reference and embracing of this mandate for adoption of Open Source Software, for reasons of reducing expenses, avoiding vendor lock-ins, re-usability of software components, enabling public accountability, and greater security of software systems.<br /><br /></li>
<li><strong>Implementation of Open APIs:</strong> CIS observes that the draft policy refers to Standard compliant applications in Section 4. CIS suggests that final version of the policy refer to and operationalise the Policy on Open Application Programming Interfaces (APIs) for Government of India <strong>[9]</strong>. This will ensure that the openly available data is available to the public, as well as to all the government agencies, in a structured digital format that is easy to consume and use on one hand, and is available for various forms of value addition and innovation on the other. Refer to Official Secrets Act, 1923: The Official Secrets Act penalises a person if he/she "<em>obtains, collects, records or publishes or communicates to other person any secret official code or password, or any sketch, plan, model, article or note or other document or information which is calculated to be or might be or is intended to be, directly or indirectly, useful to an enemy for which relates to a matter the disclosure of which is likely to affect the sovereignty and integrity of India, the security of the State or friendly relations with foreign States</em> <strong>[10]</strong>." CIS submits that this Act should be referred to in this context of ensuring non-publication of the aforementioned data.<br /></li></ol>
<h3>3.10. Mandate a Participatory Process for Developing the Implementation Guidelines</h3>
<p><strong>3.10.1.</strong> We highly appreciate and welcome the fact that the draft policy emphasises rapid operationalisation of the policy by mandating that the ITE&C Department will prepare a detailed implementation guideline within 6 months of the notification of this policy, and all state government departments will publish at least 5 high value datasets within the next three months. Just as an addition to this mandate, we would like to propose that it can be suggested that the ITE&C Department undertakes a participatory process, with contributions from both government agencies and non-government actors, to develop this implementation guideline document. We believe that opening up government data in an effective and sustainable manner, for most government agencies, involves a systematic change in how the agency undertakes day-to-day data management practices. Hence, to develop productive and practical implementation guidelines, the ITE&C Department needs to gather insights from the other state government agencies regarding their existing data (and metadata) management practices <strong>[11]</strong>. Further, participation of the non-government actors in this process is crucial to ensure that the implementation guidelines appropriately identify the high value data sets, that is data sets that should be published on a priority basis.</p>
<h3>3.11. Defer the Decision about Roles of Data Owners, Generators, and Controllers</h3>
<p><strong>3.11.1.</strong> As the draft policy does not specifically define the terms “Data Owners”, “Data Generators”, and “Data Controllers”, and the Section 11 only briefly describes some of the roles of these types of actors, we suggest removal of this discussion and the decision regarding the specific roles and functions of the Data Owners / Generators / Controllers from the draft policy itself. It will be perhaps more appropriate and effective to define these terms, as well as their roles and functions, in the implementation guidelines to be prepared by the ITE&C Department after the notification of the open data policy, since these terms relate directly to the final designing of the implementation process.</p>
<p><strong>3.12.</strong> CIS is grateful to the ITE&C Department for this opportunity to provide comments, and would be honoured to provide further assistance on the matter.</p>
<h3><strong>Endnotes</strong></h3>
<p><strong>[1]</strong> See: <a href="http://cis-india.org/" target="_blank">http://cis-india.org/</a>.</p>
<p><strong>[2]</strong> See: <a href="http://data.gov.in/sites/default/files/NDSAP.pdf" target="_blank">http://data.gov.in/sites/default/files/NDSAP.pdf</a>.</p>
<p><strong>[3]</strong> See: <a href="http://rti.gov.in/webactrti.htm" target="_blank">http://rti.gov.in/webactrti.htm</a>.</p>
<p><strong>[4]</strong> See: <a href="http://meity.gov.in/sites/upload_files/dit/files/GSR313E_10511(1).pdf" target="_blank">http://meity.gov.in/sites/upload_files/dit/files/GSR313E_10511(1).pdf</a>.</p>
<p><strong>[5]</strong> See Section 2 (1) (i) of IT (Reasonable security practices and procedures and sensitive personal data or information) Rules 2011.</p>
<p><strong>[6]</strong> See: <a href="https://egovstandards.gov.in/sites/default/files/Published%20Documents/Policy_on_Open_Standards_for_e-Governance.pdf" target="_blank">https://egovstandards.gov.in/sites/default/files/Published%20Documents/Policy_on_Open_Standards_for_e-Governance.pdf</a>.</p>
<p><strong>[7]</strong> See: <a href="https://data.gov.in/sites/default/files/NDSAP_Implementation_Guidelines_2.2.pdf" target="_blank">https://data.gov.in/sites/default/files/NDSAP_Implementation_Guidelines_2.2.pdf</a>.</p>
<p><strong>[8]</strong> See: <a href="http://deity.gov.in/sites/upload_files/dit/files/policy_on_adoption_of_oss.pdf" target="_blank">http://deity.gov.in/sites/upload_files/dit/files/policy_on_adoption_of_oss.pdf</a>.</p>
<p><strong>[9]</strong> See: <a href="http://deity.gov.in/sites/upload_files/dit/files/Open_APIs_19May2015.pdf" target="_blank">http://deity.gov.in/sites/upload_files/dit/files/Open_APIs_19May2015.pdf</a>.</p>
<p><strong>[10]</strong> See: <a href="http://www.archive.india.gov.in/allimpfrms/allacts/3314.pdf" target="_blank">http://www.archive.india.gov.in/allimpfrms/allacts/3314.pdf</a>, Sections 2 (2) and 3 (1) (c).</p>
<p><strong>[11]</strong> A similar process was undertaken by the IT Department of the Government of Sikkim when developing the implementation guideline document. The ITE&C Department may consider discussing the matter with the said department to exchange relevant learnings.</p>
<p> </p>
<p>
For more details visit <a href='https://cis-india.org/openness/comments-on-the-telangana-state-open-data-policy-2016'>https://cis-india.org/openness/comments-on-the-telangana-state-open-data-policy-2016</a>
</p>
No publishersumandroOpen DataOpen Government DataFeaturedPoliciesOpennessHomepage2016-09-01T05:49:51ZBlog EntryInstitute for Internet & Society 2014, Pune
https://cis-india.org/telecom/blog/institute-for-internet-society-2014-pune
<b>Last month, activists, journalists, researchers, and members of civil society came together at the 2014 Institute for Internet & Society in Pune, which was hosted by CIS and funded by the Ford Foundation. The Institute was a week long, in which participants heard from speakers from various backgrounds on issues arising out of the intersection of internet and society, such as intellectual property, freedom of expression, and accessibility, to name a few. Below is an official reporting summarizing sessions that took place.</b>
<p style="text-align: center; "><iframe frameborder="0" height="500" src="http://www.slideflickr.com/iframe/J3JYk2bm" width="700"></iframe></p>
<p> </p>
<p> </p>
<h1></h1>
<h1></h1>
<h1>Day One</h1>
<p>February 11, 2014</p>
<table class="listing">
<tbody>
<tr>
<td>
<p><b>Time</b></p>
</td>
<td>
<p><b>Detail</b></p>
</td>
</tr>
<tr>
<td>
<p align="center" style="text-align: center; ">9.30 a.m. – 9.40 a.m.</p>
</td>
<td>
<p>Introduction: Sunil Abraham, <i>Executive Director Centre for Internet and Society</i><i> </i></p>
</td>
</tr>
<tr>
<td>10.00 a.m. – 10.15 a.m.<br /></td>
<td>
<p>Introduction of Participants</p>
</td>
</tr>
<tr>
<td>10.15 a.m. – 12.00 p.m.</td>
<td>
<p>Internet Governance and Privacy: Sunil Abraham</p>
</td>
</tr>
<tr>
<td>
<p align="center" style="text-align: center; ">12.00 p.m. – 12.30 p.m.</p>
</td>
<td>
<p>Tea-break</p>
</td>
</tr>
<tr>
<td>
<p align="center" style="text-align: center; ">12.30 p.m. – 1.00 p.m.</p>
</td>
<td>
<p>Keynote: Bishakha Datta, <i>Filmmaker and Activist, and Board Member, Wikimedia Foundation</i></p>
</td>
</tr>
<tr>
<td>
<p align="center" style="text-align: center; ">1.00 p.m. – 2.00 p.m.</p>
</td>
<td>
<p>Lunch</p>
</td>
</tr>
<tr>
<td>
<p align="center" style="text-align: center; ">1.30 p.m. – 3.00 p.m.</p>
</td>
<td>
<p>Participant Presentations<i> </i></p>
</td>
</tr>
<tr>
<td>
<p align="center" style="text-align: center; ">3.00 p.m. – 3.15 p.m.</p>
</td>
<td>
<p>Tea Break</p>
</td>
</tr>
<tr>
<td>
<p align="center" style="text-align: center; ">3.15 p.m. – 4.45 p.m.</p>
</td>
<td>
<p>Histories, Bodies and Debates around the Internet: Nishant Shah, <i>Director-Research, CIS</i></p>
</td>
</tr>
</tbody>
</table>
<p style="text-align: justify; ">This year’s Internet Institute, hosted by the Centre for Internet & Society (CIS), kicked off in Pune to put a start to a week of learnings and discussions surrounding internet usage and its implications on individuals of society. Twenty two attendees from all over India attended this year, from backgrounds of activism, journalism, research and advocacy work.</p>
<p style="text-align: justify; ">Attendees were welcomed by<b> Dr. Ravina Aggarwal</b>, Program Officer for Media Rights & Access at the Ford Foundation, the event’s sponsor, who started off the day by introducing the Foundation’s initiatives in pursuit of bridging the digital divide by addressing issues of internet connectivity.</p>
<table class="invisible">
<thead>
<tr>
<th><img src="https://cis-india.org/home-images/DSC_0050.JPG/image_preview" title="Pune_Sunil" height="243" width="367" alt="Pune_Sunil" class="image-inline image-inline" /><br /></th>
<td>
<p style="text-align: justify; "><b>Internet Governance & Privacy</b>, Sunil Abraham <br />The Institute’s first session was led by <b>Sunil Abraham</b>, Executive Director of CIS, and engaged with issues of internet governance and privacy with reference to four stories: 1) a dispute between tweeters from the US and those in South Africa over the use of hashtag <a href="http://www.thoughtleader.co.za/khayadlanga/2009/11/05/yesterday-a-short-lived-war-broke-out-between-america-and-south-africa/comment-page-1/">#thingsdarkiesays</a>, which is said not to be as racially derogatory as it is in the US; 2) Facebook’s contested policies on <a href="http://www.zdnet.com/blog/facebook/facebook-clarifies-breastfeeding-photo-policy/8791">photos featuring users breastfeeding</a>, 3) a lawsuit between <a href="http://www.theguardian.com/environment/2010/jul/26/tata-sue-greenpeace-turtle-game">Tata and Greenpeace</a> over the organization’s use of Tata’s logo in a video game created for public criticism of their environmentally-degrading practices, and lastly, 4) the case of <a href="http://en.wikipedia.org/wiki/Savita_Bhabhi">Savita Bhabhi</a>, an Indian pornographic cartoon character which had been banned by India’s High Court and which had served as a landmark case in expanding the statutory laws for what is considered to be pornographic.</p>
</td>
</tr>
</thead>
<tbody>
</tbody>
</table>
<p style="text-align: justify; ">Each of these stories has one major thing in common: due to their nature of taking place over the internet, they are not confined to one geographic location and in turn, are addressed at the international level. The way by which an issue as such is to be addressed cuts across State policies and internet intermediary bodies to create quite a messy case in trying to determine who is at fault. Such complexity illustrates how challenging internet governance can be within today’s society that is no longer restricted to national or geographic boundaries.</p>
<p style="text-align: justify; ">Sunil also goes on in explaining the relationship between privacy, transparency, and power, summing it up in a simple formula; <b>privacy protection s</b>hould have a <i>reverse</i> relationship to <b>power</b>—the more the power, the less the privacy one should be entitled to. On the contrary, a <i>direct correlation</i> goes for <b>power</b> and <b>transparency</b>—the more the power, the more transparent a body should be. Instead of thinking about these concepts as a dichotomy, Sunil suggests to see them as absolute rights in themselves—instrumental in policies and necessary to address power imbalances.</p>
<p style="text-align: justify; "><b>The Web We Want</b>, Bishakha Datta<br />The Institute’s kickoff was also joined by Indian filmmaker and activist, <b>Bishakha Datta</b>, who had delivered the keynote address. Bishakha bridged together notions of freedom of speech, surveillance, and accessibility, while introducing campaigns that work to create an open and universally accessible web, such as the <a href="https://webwewant.org/">Web We Want</a> and <a href="http://www.sexualityanddisability.org/">Sexuality and Disability</a>. Bishakha stresses how the internet as a space has altered how we experience societal constructs, which can be easily exhibited in how individuals experience Facebook in the occurrence of a death, for example. Bishakha initiated discussion among participants by posing questions such as, “what is our expectation of privacy in this brave new world?” and “what is the society we want?” to encompass the need to think of privacy in a new way with the coming of the endless possibilities the internet brings with it.</p>
<p style="text-align: justify; "><b>Histories, Bodies and Debates around the Internet</b>, Nishant Shah<br />CIS Research Director, <b>Nishant Shah</b>, led a session examining internet as a technology more broadly, and our understandings of it in relation to the human body. Nishant proposes the idea that history is a form of technology, as well as time, itself, for which our understanding only comes into being with the aid of technologies of measurement. Although we are inclined to separate technology from the self, Nishant challenges this notion while suggesting that technology is very integral to being human, and defines a “cyborg” as someone who is very intimate with technology. In this way, we are all cyborgs. While making reference to several literary pieces, including Haraway’s <i>Cyborg: Human, Animus, Technology</i>; Kevin Warwick’s <i>Living Cyborg</i>; and Watt’s small world theory, Nishant challenges participants’ previous notions of how one is to understand technology in relation to oneself, as well as the networks we find ourselves implicated within.</p>
<p style="text-align: justify; ">Also brought forth by Nishant, was the fact that the internet as a technology has become integral to our identities, making <i>us</i> accessible (rather than us solely making the technology accessible) through online forms of documentation. This digital phenomenon in which we tend to document what we know and experience as a means of legitimizing it can be summed in the modern version of an old fable: “If a tree falls in a lonely forest, and nobody tweets it, has it fallen?”</p>
<p style="text-align: justify; ">Nishant refers to several case studies in which the use of online technologies has created a sense of an extension of the self and one’s personal space; which can then be subject to violation as one can be in the physical form, and to the same emotional and psychological effect—as illustrated within the 1993 occurrence referred to as “<a href="http://en.wikipedia.org/wiki/A_Rape_in_Cyberspace">A Rape in Cyberspace</a>.”</p>
<p style="text-align: justify; "><b>Attendee Participation</b><br />Participants remained engaged and enthusiastic for the duration of the day, bringing forth their personal expertise and experiences. Several participants presented their own research initiatives, which looked at issues women face as journalists and as portrayed by the media; amateur pornography without the consent of the woman; study findings on the understandings of symptoms of internet addiction; as well as studies looking at how students engage with college confession pages on Facebook.</p>
<div></div>
<hr />
<h1>Day Two</h1>
<p>February 12, 2014</p>
<table class="listing">
<tbody>
<tr>
<td>
<p><b>Time</b></p>
</td>
<td>
<p><b>Detail</b></p>
</td>
</tr>
<tr>
<td>
<p align="center" style="text-align: center; ">9.30 a.m. – 11.00 a.m.</p>
</td>
<td>
<p>Wireless Technology: Ravikiran Annaswamy, <i>CEO and Co-founder at Teritree Technologies</i></p>
</td>
</tr>
<tr>
<td>
<p align="center" style="text-align: center; ">11.00 a.m. – 11.15 a.m.</p>
</td>
<td>
<p>Tea-break</p>
</td>
</tr>
<tr>
<td>
<p align="center" style="text-align: center; ">11.15 a.m. – 12.45 p.m.</p>
</td>
<td>
<p>Wired Technology: Ravikiran Annaswamy</p>
</td>
</tr>
<tr>
<td>
<p align="center" style="text-align: center; ">12.45 p.m. – 1.30 p.m.</p>
</td>
<td>
<p>Lunch</p>
</td>
</tr>
<tr>
<td>
<p align="center" style="text-align: center; ">1.30 p.m. – 3.00 p.m.</p>
</td>
<td>
<p>Network, Threats and Securing Yourself: Kingsley John, <i>Independent Consultant</i></p>
</td>
</tr>
<tr>
<td>
<p align="center" style="text-align: center; ">3.00 p.m. – 3.15 p.m.</p>
</td>
<td>
<p>Tea Break</p>
</td>
</tr>
<tr>
<td>
<p align="center" style="text-align: center; ">3.15 p.m. – 4.45 p.m.</p>
</td>
<td>
<p>Practical Lab: Kingsley John</p>
</td>
</tr>
<tr>
<td>
<p align="center" style="text-align: center; ">4.45 p.m. – 5.00 p.m.</p>
</td>
<td>
<p>Wrap-up: Sunil Abraham</p>
</td>
</tr>
</tbody>
</table>
<table class="invisible">
<thead>
<tr>
<td>
<p style="text-align: justify; ">Day Two of the Institute entailed a more technical orientation to “internet & society” across sessions. Participants listened to speakers introduce concepts related to wired and wireless internet connectivity devices and their networks, along with the network of internet users and how one may secure him or herself while “online.”</p>
<p style="text-align: justify; "><b>Wireless & Wired Technology</b>, Ravikiran Annaswamy<br />Senior industry practitioner, <b>Ravikiran Annaswamy</b> had aimed to enable the Institute’s participants to “understand the depth and omnipresent of telecom networks” that we find ourselves implicated within. Ravikiran went through the basics of these networks—including fixed line-, mobile-, IP-, and Next Generation IP-networks—as well as the technical structuring of wired and wireless broadband. Many participants found this session to be particularly enriching as their projects aimed to provide increased access to internet connectivity to marginalized areas in India, and had been without the know-how to go about it.</p>
</td>
<th><img src="https://cis-india.org/home-images/5.JPG/image_preview" alt="Pune_Participants" class="image-inline image-inline" title="Pune_Participants" /><br /></th>
</tr>
</thead>
<tbody>
</tbody>
</table>
<p style="text-align: justify; "><b>Network, Threats and Securing Yourself</b>, Kinglsey John<br />An instructional session on how to protect oneself was given by <b>Kingsley John</b>, beginning with a lesson on IP Addresses—what they are and the different generations of such, and how IP addresses fit into a broader internet network. Following, Kingsley demonstrated and explained <a href="http://www.slideshare.net/lupucosmin/encrypting-emails-using-kleopatra-pgp">email encryption through the use of software, Kleopatra</a>, and how it may be used to generate keys to <a href="http://thehackernews.com/2014/01/PGP-encryption-Thunderbird-Enigmail_12.html">encrypt emails through Thunderbird mail client</a>.</p>
<p style="text-align: justify; "><b>Evening Discussion</b></p>
<p style="text-align: justify; ">A handful of participants voluntarily partook in an evening discussion, looking at the role of big players in the global internet network, such as Google and Facebook, how they collect and utilize users’ data, and what sorts of measures can be taken to minimize the collecting of such. Due to the widely varying backgrounds of interest among participants, those coming from this technical orientation towards the internet were able to inform their peers on relevant information and types of software that may be found useful related to minimizing one’s online presence.</p>
<hr />
<h1>Day Three</h1>
<p style="text-align: justify; ">February 13, 2014</p>
<table class="listing">
<tbody>
<tr>
<td>
<p><b>Time</b></p>
</td>
<td>
<p><b>Detail</b></p>
</td>
</tr>
<tr>
<td>
<p>9.30 a.m. – 11.00 a.m.</p>
</td>
<td>
<p>Free Software: Prof. G. Nagarjuna, <i>Chairperson, Free Software Foundation</i></p>
</td>
</tr>
<tr>
<td>
<p>11.00 a.m. – 11.15 a.m.</p>
</td>
<td>
<p>Tea-break</p>
</td>
</tr>
<tr>
<td>
<p align="center" style="text-align: center; ">11.15 a.m. – 12.45 p.m.</p>
</td>
<td>
<p>Open Data: Nisha Thompson, <i>Independent Consultant</i></p>
</td>
</tr>
<tr>
<td>
<p>12.45 p.m. – 1.30 p.m.</p>
</td>
<td>
<p>Lunch</p>
</td>
</tr>
<tr>
<td>
<p align="center" style="text-align: center; ">1.30 p.m. – 3.00 p.m.</p>
</td>
<td>
<p>Freedom of Expression: Bhairav Acharya, <i>Advocate and Adviser, Centre for Internet and Society</i></p>
</td>
</tr>
<tr>
<td>
<p align="center" style="text-align: center; ">3.00 p.m. – 3.15 p.m.</p>
</td>
<td>
<p>Tea-break</p>
</td>
</tr>
<tr>
<td>
<p align="center" style="text-align: center; ">3.15 p.m. – 4.45 p.m.</p>
</td>
<td>
<p>Copyright: Nehaa Chaudhari, <i>Program Officer, Centre for Internet and Society</i></p>
</td>
</tr>
</tbody>
</table>
<p style="text-align: justify; ">The third day of the Internet Institute incorporated themes presented by speakers ranging from free software, to freedom of expression, to copyright.</p>
<p style="text-align: justify; "><b>Free Software</b>, Prof. G. Nagarjuna<br />Chairman on the Board of Directors for the Free Software Foundation of India, <b>Professor G. Nagarjuna</b> shared with the Institute’s participants his personal expertise on <b>software freedom</b>. Nagarjuna mapped for us the network of concepts related to software freedom, beginning with the origins of the <b>copyleft movement</b>, and also touching upon the art of hacking, the <b>open source movement</b>, and what role software freedom plays in an interconnected world.</p>
<p style="text-align: justify; ">Nagarjuna looks at the free software movement as a political movement in the digital space highlighting the <a href="http://www.gnu.org/philosophy/free-sw.html">user’s freedoms</a> associated to the use, distribution, and modification of software for the greater good for all. This is said to distinguish this movement from that of Open Source—a technical and more practical development-oriented movement. The free software movement is not set out to compromise the fundamental issues for the sake of being practical and in that sense, ubiquitous. Instead, its objective is “not to make everybody <i>use</i> the software, but to have them understand <i>why</i> they are using the software,” so that they may become “authentic citizens that can also resonate <i>why </i>they’re doing what they’re doing. We want them to understand the ethical and political aspects of doing so,” Nagarjuna says.</p>
<p style="text-align: justify; "><b>Open Data</b>, Nisha Thompson<br />Participants learned from <b>Nisha Thompson</b> on Open Data; what it is, its benefits, and how it is involved in central government initiatives and policy, as well as civil society groups—generally for uses such as serving as evidence for decision making and accountability. Nisha explored challenges concerning the use of open data, such as those pertaining to privacy, legitimacy, copyright, and interoperability. The group looked at the <a href="http://www.indiawaterportal.org/">India Water Portal</a> as a case study, which makes accessible more than 300 water-related datasets already available in the public space for use from anything from sanitation and agriculture to climate change.</p>
<p style="text-align: justify; "><b>Freedom of Expression</b>, Bhairav Acharya<br /><b>Bhairav Acharya</b>, a constitutional lawyer, traced the development of the freedom of speech and expression in India. Beginning with a conceptual understanding of censorship and the practice of censorship by the state, society, and the individual herself, Bhairav examines the limits traditionally placed by a nation-state on the right to free speech.</p>
<p style="text-align: justify; ">In India, modern free speech and censorship law was first formulated by the colonial British government, which broadly imported the common law to India. However, the colonial state also yielded to the religious and communitarian sensitivities of its subjects, resulting in a continuing close link between communalism and free speech in India today. After Independence, the post-colonial Indian state carried forward Raj censorship, but tweaked it to serve to a nation-building and developmental agenda. Nation-building and nationalism are centrifugal forces that attempt to construct a homogenous 'mainstream'; voices from the margins of this mainstream (the geographical, ethnic, and religious peripheries) and of the marginalised within the mainstream (the poor and disadvantaged), are censored.</p>
<p style="text-align: justify; ">Within this narrative, Bhairav located and explained the evolution of the law relating to press censorship, defamation, obscenity, and contempt of court. Free speech law applies equally online. Broadly, censorship on the internet must survive the same constitutional scrutiny that is applied to offline censorship; but, as technology develops, the law must innovate.</p>
<p style="text-align: justify; "><b>Copyright</b>, Nehaa Chaudhari<br />CIS Programme Officer, <b>Nehaa Chaudhari</b> examined the concept of Copyright as an intellectual property right in discussing its fundamentals, purpose and origins, and Copyright’s intersection with the internet. Nehaa also explained the different exceptions to Copyright, along with its alternatives, such as opposing intellectual property protection regimes, including the Creative Commons and Copyleft. Within this session, Nehaa also introduced several cases in which Copyright came into play with the use of the internet, including Hunter Moore’s “<a href="http://en.wikipedia.org/wiki/Is_Anyone_Up%3F">Is Anyone Up</a>?” website, which had showcased pornographic pictures obtained by submission bringing rise to the phenomenon of “revenge porn.” Instances as such blur the lines of what is commonly referred to as intellectual property, and what specific requirements enables one to own the rights to such.</p>
<hr />
<h1>Day Four</h1>
<p>February 14, 2014</p>
<table class="listing">
<tbody>
<tr>
<td>
<p><b>Time</b></p>
</td>
<td>
<p><b>Detail</b></p>
</td>
</tr>
<tr>
<td>
<p align="center" style="text-align: center; ">9.30 a.m. – 11.00 a.m.</p>
</td>
<td>
<p>E-Accessibility and Inclusion: Prashant Naik, <i>Union Bank</i></p>
</td>
</tr>
<tr>
<td>
<p align="center" style="text-align: center; ">11.00 a.m. – 11.15 a.m.</p>
</td>
<td>
<p>Tea-break</p>
</td>
</tr>
<tr>
<td>
<p align="center" style="text-align: center; ">11.15 a.m. – 12.45 p.m.</p>
</td>
<td>
<p>Patents: Nehaa Chaudhari</p>
</td>
</tr>
<tr>
<td>
<p align="center" style="text-align: center; ">12.45 p.m. – 1.30 p.m.</p>
</td>
<td>
<p>Lunch</p>
</td>
</tr>
<tr>
<td>
<p align="center" style="text-align: center; ">1.30 p.m. – 2.00 p.m.</p>
</td>
<td>
<p>Fieldwork Assignment</p>
</td>
</tr>
</tbody>
</table>
<table class="invisible">
<thead>
<tr>
<th><img src="https://cis-india.org/home-images/DSC_0053.JPG/image_preview" alt="Pune_Rohini" class="image-inline" title="Pune_Rohini" /><br /></th>
<td style="text-align: justify; ">
<p style="text-align: justify; ">Day Four of the Internet Institute introduced concepts of eAccessibilty and Inclusion on the internet for persons with disabilities, along with patents as an intellectual property right. Participants were also assigned a fieldwork exercise as a hands-on activity in which they were to employ what they’ve learned to initiate conversation with individuals in public spaces and collect primary data while doing so.</p>
<p style="text-align: justify; "><b>eAccessibility and Inclusion</b>, Prashant Naik</p>
<b>Prashant Naik</b> started off the day with his session on E-Accessibility and Inclusion. Prashant illustrated the importance of accessibility and what is meant by the term. Participants learned of assistive technologies for different disability types and how to create more accessible word and PDF documents, as well as web pages for users. Prashant demonstrated to participants what it is like to use a computer as a visually impaired individual, which provided for an enriching experience.</td>
</tr>
</thead>
<tbody>
</tbody>
</table>
<p style="text-align: justify; "><b>Patents</b>, Nehaa Chaudhari<b><br />Nehaa Chaudhari </b>led a second session at the Internet Institute on intellectual property rights—this one looking at patents particularly and their role within statutory law. Nehaa traced the historical origins of patents before examining the fundamentals of them, and addresses the questions, “Why have patents? And is the present system working for everyone?” Nehaa also introduced notions of the Commons along with the Anticommons, and perspectives within the debate around software patents, as well as different means by which the law can address the exploitation of patents or “patent thickets”—such as through patent pools or compulsory licensing.</p>
<p style="text-align: justify; "><b>Fieldwork Assignment</b>, Groupwork<br />Participants were split into groups and required to carry out a mini fieldwork assignment in approaching individuals in varying public spaces in Pune in attempts to collect primary data. Questions asked to individuals were to be devised by the group, so long as they pertained to themes examined within the Internet Institute. Areas visited by groups included the Pune Central Mall, MG Road, and FC Road.</p>
<hr />
<h1>Day Five</h1>
<p>February 15, 2014</p>
<table class="listing">
<tbody>
<tr>
<td>
<p><b>Time</b></p>
</td>
<td>
<p><b>Detail</b></p>
</td>
</tr>
<tr>
<td>
<p>9.30 a.m. – 11.00 a.m.</p>
</td>
<td>
<p>E-Governance: Manu Srivastav, <i>Vice President, eGovernments Foundation</i></p>
</td>
</tr>
<tr>
<td>
<p>11.00 a.m. – 11.15 a.m.</p>
</td>
<td>
<p>Tea-break</p>
</td>
</tr>
<tr>
<td>
<p align="center" style="text-align: center; ">11.15 a.m. – 12.45 p.m.</p>
</td>
<td>
<p>Market Concerns: Payal Malik, <i>Economic Adviser, Competition Commission of India</i></p>
</td>
</tr>
<tr>
<td>
<p>12.45 p.m. – 1.30 p.m.</p>
</td>
<td>
<p>Lunch</p>
</td>
</tr>
<tr>
<td>
<p align="center" style="text-align: center; ">1.30 p.m. – 3.00 p.m.</p>
</td>
<td>
<p>Digital Natives: Nishant Shah</p>
</td>
</tr>
<tr>
<td>
<p align="center" style="text-align: center; ">3.00 p.m. – 3.15 p.m.</p>
</td>
<td>
<p>Tea-break</p>
</td>
</tr>
<tr>
<td>
<p align="center" style="text-align: center; ">3.15 p.m. – 4.45 p.m.</p>
</td>
<td>
<p>Fieldwork Presentations</p>
</td>
</tr>
</tbody>
</table>
<table class="invisible">
<thead>
<tr>
<td>
<p style="text-align: justify; ">Day Five of the Internet Institute brought with it sessions related to themes of e-governance, market concerns of telecommunications, and so called “Digital Natives.”</p>
<p style="text-align: justify; "><b>eGovernance</b>, Manu Srivastava<br />Vice President of the eGovernments Foundation, <b>Manu Srivastava</b> led a session on eGovernance—the utilization of the internet as a means of delivering government services communicating with citizens, businesses, and members of government. Manu examined the complexities of the eGovernance and barriers to implementation of eGovernance initiatives. Within discussion, participants examined the nuanced relationship between the government and citizens with the incorporation of other governing bodies in an eGovernance system, as well as new spaces for corruption to take place.</p>
</td>
<th><img src="https://cis-india.org/home-images/19.JPG/image_preview" alt="Pune_Chatting" class="image-inline image-inline" title="Pune_Chatting" /><br /></th>
</tr>
</thead>
<tbody>
</tbody>
</table>
<p style="text-align: justify; "><b>Market Concerns</b>, Payal Malik<br /><b>Payal Malik</b>, Advisor of the Economics Division of the Competition Commission of India shared her knowledge on market concerns of the telecommunications industry, and exclaimed the importance of competition issues in such an industry as a tool to create greater good for a greater number of people. She demonstrated this importance by stating that affordability as a product of increased access can only be possible once there is enough investment, which generally only happens in a competitive market. In this way, we must set the conditions to make competition possible, as a tool to achieve certain objectives. Payal also demonstrated the economic benefits of telecommunications by stating that for every 10% increase in broadband penetration, increase in GDP of 1.3%. She also examined the broadband ecosystem in India and touched upon future possibilities of increased broadband penetration, such as for formers and the education sector.</p>
<p style="text-align: justify; "><b>Digital Natives</b>, Nishant Shah<br /><b>Nishant Shah</b> shed some light on one of the areas that the Centre for Internet & Society looks at within their research scope, this being the “<a href="https://cis-india.org/digital-natives">Digital Native</a>.” As referred to by Nishant, the Digital Native is not to categorize a specific type of internet user, but can be said for simply any person who is performing a digital action, while doing away with this false dichotomy of age, location, and geography.</p>
<p style="text-align: justify; ">Nishant examines varying case studies in which “the digital is empowering natives to not merely be benefactors of change, but agents of change,” from the <a href="http://blog.blanknoise.org/2012/07/i-never-ask-for-it.html">Blank Noise Project</a>’s “I NEVER Ask for it…” campaign in efforts to rethink sexual violence, to <a href="http://www.wherethehellismatt.com/">Matt Harding</a>’s foolish dancing with groups of individuals from all over the world.</p>
<p style="text-align: justify; ">As occurrences in the digital realm, however, these often political expressions may be rewritten by the network when picked up as a growing phenomenon, in order to make it accessible to online consumers by the masses. In doing so, the expression is removed from its political context and is presented in the form of nothing more than a fad. For this reason, Nishant stresses the need to become aware of the potential of the internet in becoming an “echo-chamber”—in which forms of expression are amplified and mimicked, resulting in a restructuring of the dynamics surrounding the subject—whether it be videos of <a href="http://en.wikipedia.org/wiki/Back_Dorm_Boys">boys lipsyncing to Backstreet Boys</a> in their dorm room going viral, or a strong and malicious movement to punish the Chinese girl who had taken a video of her heinously and wickedly killing a kitten after locating her using the <a href="http://en.wikipedia.org/wiki/Human_flesh_search_engine">Human Flesh Search Engine</a>.<b><br /></b></p>
<p><b>Fieldwork Presentations</b>, Groupwork</p>
<p style="text-align: justify; ">To end off the day, participant groups presented findings collated from the prior evening’s fieldwork exercise, in which they were to ask strangers in various public places of Pune questions pertaining to themes looked at from within this year’s Institute. Participants were divided into four groups and visited Pune’s FC Road, Mahatma Gandhi Road, and Central Mall.</p>
<p style="text-align: justify; ">Groups found that the majority of those interviews primarily accessed the phone via the mobile. There was also a common weariness of using the internet and concern for one’s privacy while doing so, especially with uploading photos to Facebook and online financial transactions. People were also generally concerned about using cyber cafes for fear of one’s accounts being hacked. Generally people suspected that so long as conversations are “private” (i.e. in one’s Facebook inbox), so too are they secure. Just as well, those interviewed shared a sense of security with the use of a password.</p>
<hr />
<h1>Day Six</h1>
<p>February 16, 2014</p>
<table class="listing">
<tbody>
<tr>
<td>
<p><b>Time</b></p>
</td>
<td>
<p><b>Detail</b></p>
</td>
</tr>
<tr>
<td>
<p align="center" style="text-align: center; ">9.30 a.m. – 11.00 a.m.</p>
</td>
<td>
<p>Wikipedia: Dr. Abhijeet Safai</p>
</td>
</tr>
<tr>
<td>
<p align="center" style="text-align: center; ">11.00 a.m. – 11.15 a.m.</p>
</td>
<td>
<p>Tea-break</p>
</td>
</tr>
<tr>
<td>
<p align="center" style="text-align: center; ">11.15 a.m. – 12.45 p.m.</p>
</td>
<td>
<p>Open Access: Muthu Madhan (TBC)</p>
</td>
</tr>
<tr>
<td>
<p align="center" style="text-align: center; ">12.45 p.m. – 1.30 p.m.</p>
</td>
<td>
<p>Lunch</p>
</td>
</tr>
<tr>
<td>
<p align="center" style="text-align: center; ">1.30 p.m. – 3.00 p.m.</p>
</td>
<td>
<p>Case Studies Groupwork</p>
</td>
</tr>
<tr>
<td>
<p align="center" style="text-align: center; ">3.00 p.m. – 3.15 p.m.</p>
</td>
<td>
<p>Tea-break</p>
</td>
</tr>
<tr>
<td>
<p align="center" style="text-align: center; ">3.15 p.m. – 4.45 p.m.</p>
</td>
<td>
<p>Case Studies Presentations</p>
</td>
</tr>
</tbody>
</table>
<p style="text-align: justify; ">As the Institute came closer to its end, participants got the opportunity to hear from speakers on topics pertaining the Wikipedia editing in addition to Open Access to scholarly literature. Participants also worked together in groups to examine specific case studies referenced in previous sessions, and then presented their conclusions.</p>
<p style="text-align: justify; "><b>Wikipedia</b>, Dr. Abhijeet Safai<br />The Institute was joined by Medical Officer of Clinical Research at Pune’s Symbiosis Centre of Health Care, <b>Dr. Abhijeet Safai</b>, who led a session on Wikipedia. Having edited over 3700 Wikipedia articles, Dr. Abhijeet was able to bring forth his expertise and familiarity in editing Wikipedia to participants so that they would be able to do the same. Introduced within this session were Wikipedia’s different fundamental pillars and codes of conducts to be complied with by all contributors, along with different features and components of Wikipedia articles that one should be aware of when contributing, such as how to cite sources and discuss the contents of an article with other contributors.</p>
<p style="text-align: justify; "><b>Open Access</b>, Muthu Madhan<br /><b>Muthu Madhan</b> joined the Internet Institute while speaking on Open Access (OA) to scholarly literature. Within his session, Muthu examined the historical context within which the scholarly journal had arisen and how the idea of Open Access began within this space. The presence of Open Access in India and other developing nations was also examined in this session, and the concept of Open Data, introduced.</p>
<p style="text-align: justify; "><b>Case Studies</b>, Groupworks</p>
<table class="invisible">
<tbody>
<tr>
<td><img src="https://cis-india.org/home-images/11.JPG/image_preview" alt="Pune_Group2" class="image-inline image-inline" title="Pune_Group2" /><br /></td>
<td><img src="https://cis-india.org/home-images/8.JPG/image_preview" alt="Pune_Group" class="image-inline image-inline" title="Pune_Group" /><br /></td>
</tr>
</tbody>
</table>
<p style="text-align: justify; ">Participants were split up into groups and assigned particular case studies looked at briefly in previous sessions. Case studies included <a href="http://siditty.blogspot.in/2009/11/things-darkies-say.html"><i>#thingsdarkiessay</i></a><i>,</i> a once trending Twitter hashtag in South Africa which had offended many Americans for its use of “darkie” as a derogatory term; the literary novel, <a href="http://en.wikipedia.org/wiki/The_Hindus:_An_Alternative_History"><i>The Hindus</i></a>, which offers an alternative narrative of Hindu history had been banned in India for obscenity; a case in which several users’ avatars had been controlled by another in a virtual community and forced to perform sexual acts, referred to as <a href="http://en.wikipedia.org/wiki/A_Rape_in_Cyberspace"><i>A Rape Happened in Cyber Space</i></a>; and lastly, a pornographic submission website, <a href="http://en.wikipedia.org/wiki/Is_Anyone_Up%3F">Is Anyone Up?</a>, for which content was largely derived from “revenge porn.” Each group then presented on the various perspectives surrounding the issue at hand.<b><br /></b></p>
<p style="text-align: justify; "><b>The Cyborg</b>, Nishant Shah<br />Nishant Shah led an off-agenda session in the evening looking more closely at the notion of the human cyborg. Nishant deconstructs humanity’s relationship to technology, in suggesting that we “think of the human as <i>produced</i> with the technologies… not who <i>produces</i> technology.” Nishant explores the Digital Native as an attained identity for those who, because of technology, restructure and reinvent his or her environment—offline as well as online. Among other ideas shared, Nishant refers to works by Haraway on the human cyborg in illustrating our dependency on technology and our need to care for these technologies we depend on.</p>
<hr />
<h1>Day Seven</h1>
<p>February 17, 2014</p>
<table class="listing">
<tbody>
<tr>
<td>
<p><b>Time</b></p>
</td>
<td>
<p><b>Detail</b></p>
</td>
</tr>
<tr>
<td>
<p align="center" style="text-align: center; ">9.30 a.m. – 11.00 a.m.</p>
</td>
<td>
<p>Internet Activism: Laura Stein, <i>Associate Professor, University of Texas </i>and <i>Fulbright Fellow<br /></i></p>
</td>
</tr>
<tr>
<td>
<p align="center" style="text-align: center; ">11.00 a.m. – 11.15 a.m.</p>
</td>
<td>
<p>Tea-break</p>
</td>
</tr>
<tr>
<td>
<p align="center" style="text-align: center; ">11.15 a.m. – 12.45 p.m.</p>
</td>
<td>
<p>Domestic and International Bodies: Chinmayi Arun, <i>Research Director<br /></i></p>
</td>
</tr>
<tr>
<td>
<p align="center" style="text-align: center; ">12.45 p.m. – 1.30 p.m.</p>
</td>
<td>
<p>Lunch</p>
</td>
</tr>
<tr>
<td>
<p align="center" style="text-align: center; ">1.30 p.m. – 3.00 p.m.</p>
</td>
<td>
<p>Participant Presentations</p>
</td>
</tr>
<tr>
<td>
<p align="center" style="text-align: center; ">3.00 p.m. – 3.15 p.m.</p>
</td>
<td>
<p>Tea-break</p>
</td>
</tr>
<tr>
<td>
<p align="center" style="text-align: center; ">3.15 p.m. – 4.45 p.m.</p>
</td>
<td>
<p>Hot Question Challenge</p>
</td>
</tr>
</tbody>
</table>
<p style="text-align: justify; "><b> </b>The last day of the week-long Internet Institute examined concepts of Internet Activism and Domestic and International Bodies. Some participants led presentations on topics of personal familiarity, before a final wrap-up exercise, calling upon individuals to share any new formulations resulting from the Institute.</p>
<p style="text-align: justify; "><b>Internet Activism</b>, Laura Stein</p>
<table class="invisible">
<tbody>
<tr>
<td><img src="https://cis-india.org/home-images/17.JPG/image_preview" alt="Pune_Laura" class="image-inline image-inline" title="Pune_Laura" /><br /></td>
<td style="text-align: justify; ">Associate Professor from the University of Texas, <b>Laura Stein</b>, spoke on activism on the internet. Laura examined some grassroots organizations and movements taking place on the online and the benefits that the internet brings in facilitating their impact, such as its associated low costs, accessibility and possibility for anonymity. Despite the positive effects catalyzed by the internet, Laura stresses that the “laying field is still unequal, and movements are not simply transformed by technology.” Some of the websites exemplifying online activism that were examined within this session includes the <a href="http://www.itgetsbetter.org/">It Gets Better Project</a>, which aims to give hope to LGBT youth facing harassment, and the national election watch by the <a href="http://adrindia.org/">Association for Democratic Reforms</a>. Additionally, Laura spoke on public communication policy, comparing that of the US and India, and how this area of policy may influence media content and practice.</td>
</tr>
</tbody>
</table>
<p style="text-align: justify; "><b>Domestic and International Bodies</b>, Chinmayi Arun<br />As the Internet Institute’s final speaker, Research Director for Communication Governance at National Law University<i> </i>,<b> Chinmayi Arun</b>, explores the network of factors that affect one’s behavior on the internet—these including: social norms, the law, the markets, and architecture. In referring to Lawrence Lessig’s <a href="http://en.wikipedia.org/wiki/Pathetic_dot_theory">pathetic dot theory</a>, Chinmayi illustrates how individual’s—the pathetic dots in question—are functions of the interactions of these factors, and in this sense, regulated, and stresses the essential need to understand the system, in order to effectively change the dynamics within it. It is worth noting that not all pathetic dots are equal, and Google’s dot, for example, will be drastically bigger than a single user’s, having more leveraging power within the network of internet bodies. Also demonstrated, is the fact that we must acknowledge the need for regulation by the law to some extent, otherwise, the internet would be a black box where anything goes, putting one’s security at risk of violation.</p>
<p style="text-align: justify; "><b>Hot Question Challenge</b><br />The very last exercise of the Institute entailed participants asking each other questions on demand, relating back to different themes looked at within the last week. Participants had the chance, here, to bridge together concepts across sessions, as well as formulate their own opinions, while posing questions to others that they, themselves, were still curious about.</p>
<p style="text-align: justify; "><img src="https://cis-india.org/home-images/DSC_0371.JPG/image_large" alt="Pune_Everyone" class="image-inline image-inline" title="Pune_Everyone" /></p>
<p>
For more details visit <a href='https://cis-india.org/telecom/blog/institute-for-internet-society-2014-pune'>https://cis-india.org/telecom/blog/institute-for-internet-society-2014-pune</a>
</p>
No publishersamanthaAccess to KnowledgeDigital NativesTelecomResearchers at WorkWikipediaAccessibilityInternet GovernanceFeaturedWikimediaOpennessHomepage2014-04-07T11:31:23ZBlog EntryMultimedia Storytellers: Panel Discussion
https://cis-india.org/digital-natives/making-change/multimedia-storytellers
<b>This post brings three storytellers together to find points of intersection between their methods. The format will be that of a panel discussion and it features: Arjun Srivathsa from Pocket Science India, Ameen Haque from the Storywallahs, and Ajay Dasgupta from The Kahani Project. They discuss technology, interpretation and action in storytelling. </b>
<pre>CHANGE-MAKERS: Arjun Srivathsa, Ameen Haque and Ajay Dasgupta
ORGANIZATIONS:Pocket Science India, The Storywallahs and The Kahani Project
METHOD OF CHANGE: Storytelling</pre>
<p align="justify">Over the last couple of weeks, I had the privilege of interviewing three storytellers. What struck me the most, besides from their fascinating ideas about storytelling, was how many of their ideas overlapped. As much as I would love to sit all of them in the same room and enjoy the fireworks, there are a number of logistical constraints that shut my storyteller reunion daydreams down; so for this post, I decided to be a self-appointed liaison between you and them. I will mimic this discussion by putting my conversations with them side by side, in the format of a panel discussion. Their interaction will have to happen in the realm of your imagination.</p>
<p align="justify">The questionnaire I used for my interviews was open-ended. I was curious to hear what they wanted to share about their work, as opposed to filtering and steering the conversation in a certain direction; so I let them take their own turn. While I clearly inquired about the relationship between storytelling and making change, it was fascinating to see each storyteller reach the question of ‘social impact' through different channels; testimony of the influence of their education and professional backgrounds in their work.</p>
<p align="justify">If I were to bring them together, the topic of the discussion would be: '<strong>Technology, Interpretation and Action in Storytelling</strong>'. We briefly discussed mediation and semiotics<strong><a name="fr1" href="#fn1">[1]</a></strong> in the <a href="https://cis-india.org/digital-natives/making-change/storytelling-performance#pre-production">Pre-Production</a> section of the <a href="https://cis-india.org/digital-natives/making-change/storytelling-performance">Storytelling as Performance</a> post. We mentioned then:</p>
<p align="justify" class="callout"><em>"mediums are combined to enhance the visibility of the message and the power of the experience of stories. [...] Each medium: video, audio, text, music, etc.- becomes “a new literate space” or “symbolic tool” storytellers use to portray narratives about the self, community and society (Hull, 2006)”</em></p>
<em>
</em>
<p align="justify">These thoughts were triggered by the work of the French philosopher, <a href="http://plato.stanford.edu/entries/ricoeur/">Paul Ricoeur</a>, who considers our self-identity a result of sign mediation and interpretation. Other themes in his work include: discourse and action, temporality, narrative and identity; also useful and relevant when exploring how storytelling and reality intersect. For example, how does building a narrative develop into a discourse that mirrors our context and existence? How does the medium chosen to carry this narrative define the language system of our discourse? Finally, let’s not forget this discussion is happening amid the digital question: how does the mediation of digital technologies enable or constrain our narratives of change?</p>
<p align="justify">Against this background, I would like to propose a discussion around five points of intersection that came up organically* during my conversations with them.</p>
<blockquote>
<p>a)<strong> The power of storytelling</strong>: <br />What makes it a powerful vehicle of communication? How does this practice break from more traditional strategies of information dissemination?</p>
<p>b) <strong>Storytelling as a vehicle to make change: <br /></strong>How does the practice of storytelling intervene in the social imagination of its audience? Is it the experience or the content of stories what drives the message of change forward? Where does change happen: at the value, behavioral, community or macro level?</p>
<p>c)<strong> The role of technology in storytelling:</strong> <br />What is the part technology plays in storytelling vis-a-vis traditional storytelling? Is it a static infrastructure or does it shape the force and direction of the story? How does technology influence and impact their work</p>
<p>d) <strong>Translating awareness to action through stories: </strong><br />Can you guarantee the ideas and values imbued by the story will translate into action in the public space?</p>
<p>e)<strong> Influence of stories on citizenship and political participation:</strong> <br />Can the power of stories be leveraged to instill a sense of responsibility in the audience?</p>
<p align="justify" class="discreet">* With the exception of Arjun Srivathsa, who addressed these points in a conference I attended. He later responded to a questionnaire in which I inquired about the intersections specifically.</p>
</blockquote>
<h2 align="justify">Introductions<br /></h2>
<p align="justify">We first have <strong>Arjun Srivathsa</strong>. He has a Masters in Wildlife Biology and Conservation and currently works as a Research Associate for the Centre for Wildlife Studies (CWS India). In tandem, he started Pocket Science India, an initiative that combines wildlife science with art and cartoons to promote conservation in India and disseminate information from scientific journal articles. He aims to bridge the gap between the work of scientists and people using art and humour.</p>
<p class="callout">
<strong>Arjun:</strong> I find the world of science and scientists very cool. Finding new things, discovering and inventing ways to understand the world better is an awesome way of life. I chose a career in science for this reason, second only to my love for nature and wildlife. But the essence of science, according to me, is not just to discover, but also to communicate. Even though wildlife research in India has progressed massively in the past few decades, the only notion people have is that of exaggerated scenes from television documentaries. When I discovered that most of the work by Indian scientists on wildlife and conservation of India is making no difference to people (mostly because they are unaware), I decided to use the easiest way to bridge the gap: through humour and art.</p>
<p align="justify">Second speaker<strong> </strong>is<strong> Ameen Haque</strong> from <a href="http://www.thestorywallahs.com/">The Storywallahs</a>. In what he calls his past life, he worked for 18 years in Advertising and Brand Strategy Consulting. Ameen also has a background in theatre and now works as as storyteller for The Storywallahs.</p>
<p align="center"><iframe src="//www.youtube.com/embed/F8U5HAI-0TI" frameborder="0" height="315" width="420">&amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;lt;/center&amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;gt;</iframe></p>
<p align="justify">Finally, we have <strong>Ajay Dasgupta</strong>, the founder of <a href="http://thekahaniproject.org/">The Kahani Project</a>, who also has a background in theatre and believes listening to stories is a fundamental right of children. His team works to capture stories in audio format and make them accessible.</p>
<iframe src="https://w.soundcloud.com/player/?url=https%3A//api.soundcloud.com/tracks/144633144&color=00aabb&auto_play=false&hide_related=false&show_artwork=true" frameborder="no" scrolling="no" height="166" width="100%"></iframe>
<p>I will now invite them to share their thoughts on the points described above. Each panelist will respond to the questions using<strong> a different medium</strong>: Arjun will comment with text and images, Ameen will comment with video and Ajay will comment using audiobytes. The idea is for each storyteller to use the medium and language they use for their own storytelling: cartoons, body language and audio respectively, as we explore how this choice mediates how they conceptualize change. I will act as a moderator and comment on common themes in the light of Paul Ricoeur’s characteristics of narratives.</p>
<h2>1. The Power of Storytelling<br /></h2>
<h3>What makes it a powerful vehicle of communication?</h3>
<p> </p>
<h2></h2>
<div class="pullquote"><span id="docs-internal-guid-10dcb36e-642b-76be-1e09-54a2a3103a5c">“narrative attains full significance when it becomes a condition of temporal existence” Time and Narrative<br /></span></div>
<div><span id="docs-internal-guid-10dcb36e-642b-76be-1e09-54a2a3103a5c"></span></div>
<p align="justify">The first characteristic of narratives according to Ricoeur is:<strong> the ability to bring independent elements and episodes together into a plot within a specific context and time</strong>. The relationship between time and narrative is addressed by the philosopher in his work <em>'Oneself as Another</em>,' in which he frames narratives as the most 'faithful articulations of human time'. This leads to an understanding of time as a framework where we can locate unique events and patterns, trajectories and sequences. Our three storytellers comment on how stories are an effective mean to communicate information, and how this information resonates because it can be located in the frame of our human existence.</p>
<p class="callout">
<strong>Arjun:</strong> Storytelling really is the nascence of any communication technique. As kids we were all told stories with bees and birds, which spoke and thought. The moral life lessons and similar “information” were served to us on these fascinating platters.</p>
<div align="center"> <img src="https://cis-india.org/home-images/1524964_614398581930298_1037858013_n.jpg/image_preview" alt="Pocket Science 1" class="image-inline image-inline" title="Pocket Science 1" /></div>
<div align="center">
<div align="center"><span id="fbPhotoSnowliftCaption" class="fbPhotosPhotoCaption"><span class="hasCaption"><em>Dugongs are closely related to whales and dolphins. They are peaceful mammals that swim around gracefully and feed on sea grass. <br />They are categorized as “VULNERABLE” because there are not too many of them left in the world. </em>
</span></span></div>
<span id="fbPhotoSnowliftCaption" class="fbPhotosPhotoCaption"><span class="hasCaption">
<p align="center">Find full cartoon <a href="https://www.facebook.com/photo.php?fbid=614398581930298&set=a.614397888597034.1073741836.609687355734754&type=1&theater">here</a></p>
</span></span></div>
<p class="callout">At some point in life, we all seem to stop appreciating the power of storytelling. Plain reporting of information has been done to death. Even an amazing discovery written as a formal report will fail to excite audience. It is time we all get back to appreciating stories. They sell. Movies generally do better than documentaries don’t they?</p>
<p align="justify"><strong>Ameen:</strong></p>
<p align="center"><iframe src="//www.youtube.com/embed/Q5fphRoT-2k" frameborder="0" height="315" width="420"></iframe></p>
<p align="justify"> </p>
<p><strong>Ajay:</strong></p>
<p align="center"><iframe src="https://w.soundcloud.com/player/?url=https%3A//api.soundcloud.com/tracks/144633135&color=00aabb&auto_play=false&hide_related=false&show_artwork=true" frameborder="no" scrolling="no" height="166" width="100%"></iframe></p>
<h2>2. Storytelling as a vehicle to make change</h2>
<h3> How and where does change happen?</h3>
<p> </p>
<div class="pullquote">“All action is in principle interaction [...] change happens through interaction, as others are also encouraged to change” From Text to Action</div>
<p style="text-align: justify;" dir="ltr">The second characteristic of narratives is how the <strong>episodes in our narratives involve contingencies that will be shaped and reformulated through the development of the story</strong>. The narratives are constructed in such a way that induce us to imagine possible events in the future and how we would act in said circumstances. This characteristic is supported by Ricoeur's understanding of the <a href="http://plato.stanford.edu/entries/ricoeur/#3.2">'self' as an 'agent'</a>, who can act and influence causation by taking initiative or interfering<strong><a name="fr1" href="#fn1">[2]</a></strong> in the story. Even if the listener cannot necessarily influence the outcome of the story (unless it is participatory storytelling), it triggers thoughts about its capability to act and its ability to change future realities, as he imagines himself n the situation of its characters. This out-of-body experience is what turns story into experience.</p>
<p style="text-align: justify;" dir="ltr">Our storytellers comment on how stories can influence and activate our agency and enable listeners to act towards creating change.</p>
<p class="callout"><strong>Arjun: </strong>Of course! Like I said, it is easier to influence people when you are not being preachy. Storytelling sidesteps the moral high ground that change makers are often blamed to occupy and takes a pleasantly shrewd path, as silly as it may sound.</p>
<table class="plain">
<thead>
<tr>
<th>
<div align="center"><img src="https://cis-india.org/home-images/PS.jpg/image_preview" alt="Pocket Science 4" class="image-inline image-inline" title="Pocket Science 4" /></div>
</th>
<th>
<div align="center"><img src="https://cis-india.org/home-images/PSI2.jpg/image_preview" alt="PSI2" class="image-inline image-inline" title="PSI2" /></div>
</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<em> </em><em><span id="fbPhotoSnowliftCaption" class="fbPhotosPhotoCaption"><span class="hasCaption">#2:
Increase in wildlife tourism has been brought about by the increasing
population of the ‘Tourist’. This species is easy to recognize (see
figure). The species has created an ecosystem of its own. It eats any
kind of high or low profile food. Lives in resorts. Seeks charismatic
animals like the tiger. Its daily activity involves excessive use of its
camera. This species facilitates wildlife tourism </span></span></em></td>
<td><span id="fbPhotoSnowliftCaption" class="fbPhotosPhotoCaption"><span class="hasCaption"></span></span><em>#9: Wildlife tourism is an excellent way to
expose people of India and abroad to its rich natural heritage [...] We
definitely need to regulate the number of tourists to avoid crowding in
the forests, but we also need to educate tourists, especially the
first-timers, about wildlife and its conservation. The tourist can be an important tool in conservation –
let’s not let it go waste!</em>"<br /></td>
</tr>
</tbody>
</table>
<p align="center">Find full cartoon <a href="https://www.facebook.com/photo.php?fbid=609780439058779&set=pb.609687355734754.-2207520000.1396426793.&type=3&theater">here</a>.</p>
<p align="justify" class="callout">To the question of where we locate change, it depends on what this change is. Through my work, I often target <strong>individuals and smaller communities</strong> (say students, villagers etc.). I don't necessarily grab my paintbrush and declare that I will change the world. My idea of change is a tailored, targeted and therefore an efficient influence on individuals.</p>
<p align="justify"><strong>Ameen:</strong></p>
<p align="center"><iframe src="//www.youtube.com/embed/GJpeQMltaT4" frameborder="0" height="315" width="420"></iframe></p>
<p align="justify"><strong>Ajay:</strong></p>
<iframe src="https://w.soundcloud.com/player/?url=https%3A//api.soundcloud.com/tracks/144633137&color=00aabb&auto_play=false&hide_related=false&show_artwork=true" frameborder="no" scrolling="no" height="166" width="100%"></iframe>
<h2><br /></h2>
<h2>3. The role of technology in storytelling</h2>
<h3>How does technology influence and impact your work?</h3>
<p> </p>
<p style="text-align: justify;" dir="ltr">Ricoeur’s thoughts on the relationship between text and action, makes us reconsider how we think about ‘<em>text</em>’ and how this reading can be applied to technology. According to him, the distinction between text and action is not at the linguistic, but at the discursive level. This is how he differentiates language from discourse:</p>
<table class="plain">
<thead>
<tr>
<th><br /></th>
<th>Language<br /></th>
<th>Discourse<br /></th>
</tr>
</thead>
<tbody>
<tr>
<td>Structure</td>
<td>A system: timeless and static<br /></td>
<td>Located at a given time and moment<br /></td>
</tr>
<tr>
<td>Composition</td>
<td>A sequence of signs<br /></td>
<td>A sequence of events that describe, claim and represent the world<br /></td>
</tr>
<tr>
<td>Meaning</td>
<td>Refers to signs<br /></td>
<td>Refers to the world<br /></td>
</tr>
<tr>
<td>Communication</td>
<td>Provides codes for communication. <br />Necessary but not sufficient<br /></td>
<td>Communicates</td>
</tr>
</tbody>
</table>
<p align="justify">Using these working definitions, we can understand the medium as <strong>a language:</strong> a system that provides us with signs and codes for communication. A creative use of language and mediums will hence, enable us to create narratives and produce meaning (which will be generated and negotiated by the audience). Technology is in this case our language, and how each storyteller uses it determines new ways to create meaning: experiences, connections and associations with and within their stories. We now ask them if/how the use of this 'language' mediates and impacts their work.</p>
<p align="justify" class="callout"><strong>Arjun:</strong> Technology is the best facilitator in the realm of my science-art-communication. I depend on it extensively, to first educate myself. Then to create artwork (computer, tablet, smartphone). And then eventually I depend heavily on social media to broadcast my work. I will definitely credit the power of technology for fostering and enabling effective communication.</p>
<div align="center"><img src="https://cis-india.org/home-images/PSI3.jpg/image_preview" alt="PSI3" class="image-inline image-inline" title="PSI3" /></div>
<p align="center"><em># 11: The story of Ajoba was carried far and wide in newspapers, television news and the internet</em>. Find full cartoon <a href="https://www.facebook.com/photo.php?fbid=610114332358723&set=pb.609687355734754.-2207520000.1396426793.&type=3&theater">here</a>.</p>
<p align="justify" class="callout">In my capacity, I feel most confident targeting students and urban youth. But thanks to the power of social media, putting my work out there has grabbed the attention of change-makers who are capable of things that is beyond my scope. This has led to collaborations through which the reach has become wider. Teachers use my art work in their classes, some organisations are using it in forest department buildings to educate visitors, some local groups have translated my work into regional languages.</p>
<p align="justify"><strong>Ameen:</strong></p>
<p align="center"><iframe src="//www.youtube.com/embed/25EAnt1yi94" frameborder="0" height="315" width="420"></iframe></p>
<p align="justify"><strong>Ajay:</strong></p>
<iframe src="https://w.soundcloud.com/player/?url=https%3A//api.soundcloud.com/tracks/144633141&color=00aabb&auto_play=false&hide_related=false&show_artwork=true" frameborder="no" scrolling="no" height="166" width="100%"></iframe>
<h2><br /></h2>
<h2>4. Translating awareness into action through stories<br /></h2>
<h3>Can you guarantee the ideas and values imbued by the story translate into action in the public space?</h3>
<p> </p>
<div class="pullquote"> “what must be the nature of action...if it is to be read in terms of change in the world?” From Text to Action</div>
<p id="docs-internal-guid-10dcb36e-6935-a65e-1136-120c46ff2174" style="text-align: justify;" dir="ltr">So far they have told us about the power and content of stories. However, we have yet to find out what is it in stories that make listeners translate fiction into real life action. Ricoeur's final characteristic of narratives points us in the direction of empathy and interpretation.</p>
<p style="text-align: justify;" dir="ltr">Like discourse, action is open to interpretation. He posits t<strong>hat characters of our stories rise to the status of ‘persons’ when we evaluate their actions, including their doings and sufferings</strong>. This ethical verdict determines the identity of the character in the eyes of the audience (above any other physical or emotional characteristics) and this is what ultimately adds meaning to the events of the story, as it inspires the audience to emulate or reject this behavior through their actions.</p>
<p style="text-align: justify;" dir="ltr">We asked our storytellers their thoughts on how to translate stories' messages into meaningful action, or if it was even possible to guarantee this transition to begin with:</p>
<p align="justify" class="callout"><strong>Arjun:</strong> I don’t [know]. One never does, I feel. But a lot of good awareness programs have made me change little things in my life. The people or groups who initiated those campaigns don't know of this, do they? This is somewhat similar. I believe that even if ONE person in the thousand who view my work gets influenced into making little changes, then it was worth my time and effort.</p>
<p align="justify"><strong>Ameen:</strong></p>
<p align="center"><iframe src="//www.youtube.com/embed/neFe7kj8dIc" frameborder="0" height="315" width="420"></iframe></p>
<p align="left"><strong><br /></strong></p>
<p align="left"><strong>Ajay: </strong>(Ajay commented on the impact of stories while we were discussing how to gauge the impact of his work. In our first conversation he said:<em> "Change is happening but there are no tests that can measure it and quantify it.</em>" and he elaborates on this idea below:)</p>
<iframe src="https://w.soundcloud.com/player/?url=https%3A//api.soundcloud.com/tracks/144633138&color=00aabb&auto_play=false&hide_related=false&show_artwork=true" frameborder="no" scrolling="no" height="166" width="100%"></iframe>
<p align="left"> </p>
<h2 align="left">5. Influence of stories on citizenship and political participation<br /></h2>
<h3>Can the power of stories be leveraged to instill a sense of responsibility in the audience?</h3>
<div class="pullquote"><br />"You can only achieve power in common by including the opinions of as many people as possible in the discourse"</div>
<p align="justify"> </p>
<p align="justify">Finally, as stated in the brief of the project on methods for change, we are also interested in defining how political participation should be manifested in the public space. Ricoeur frames political action as a result of discourse and political deliberation.For a brief discussion of the relationship between storytelling and our political identity visit <a href="https://cis-india.org/digital-natives/making-change/storytelling-performance-2">Part 2 of Storytelling as Performance</a>.)</p>
<p align="justify">This last section captures the storytellers' point of view on how stories may affect our sense of citizenship and political responsibility.</p>
<p align="left" class="callout"><strong>Arjun</strong>: We are living in a society which is becoming increasingly insensitive and arrogant. There seems to be no time to stop and see the big picture: what are we doing? are our demands and lifestyles sustainable? Is the future generation secure? Impacts of our actions on the natural world.</p>
<table class="plain">
<tbody>
<tr>
<td><img src="https://cis-india.org/home-images/1511040_609776472392509_490391694_n.jpg/image_preview" alt="Pocket Science 2" class="image-inline image-inline" title="Pocket Science 2" /></td>
<td><img src="https://cis-india.org/home-images/copy_of_1533944_609777242392432_1081033930_n.jpg/image_preview" alt="Pocket Science 3" class="image-inline image-inline" title="Pocket Science 3" /></td>
</tr>
<tr>
<td> <span id="fbPhotoSnowliftCaption" class="fbPhotosPhotoCaption"><span class="hasCaption">#1: Most of us love seafood. And why shouldn't we? It tops the charts as some of the most delicious delicacies in the world! It so happens that we rarely think about what goes on
“behind-the-scenes” and take many things for granted. The story behind
how food reaches your plate is quite a scary one!</span></span></td>
<td> <span id="fbPhotoSnowliftCaption" class="fbPhotosPhotoCaption"><span class="hasCaption">#12: So next time you feel like a getting a seafood dinner, do it with some perspective.</span></span></td>
</tr>
</tbody>
</table>
<div align="center">Find full cartoon <a href="https://www.facebook.com/media/set/?set=a.609776052392551.1073741831.609687355734754&type=1">here</a></div>
<strong>Ameen:</strong>
<p> </p>
<p align="center"><iframe src="//www.youtube.com/embed/lO0y0QZ3vhQ" frameborder="0" height="315" width="420"></iframe></p>
<p> </p>
<p><strong>Ajay</strong>:</p>
<iframe src="https://w.soundcloud.com/player/?url=https%3A//api.soundcloud.com/tracks/144633136&color=00aabb&auto_play=false&hide_related=false&show_artwork=true" frameborder="no" scrolling="no" height="166" width="100%"></iframe>
<p> </p>
<h2>Closing Remarks</h2>
<p align="justify">I hope you enjoyed reading, watching and listening these three wonderful storytellers share their ideas on technology, interpretation and action. The question that remains unresolved is whether the effect of the story is shaped by the use of technology or not. At the end of the day it is the interpretation of stories -more than what it is said and how it is being said- what will determine the sustainability of these intents for change. The answers of our storytellers reinforce the notion that technology is a system, a language, a medium that transports our messages and intentions, but that inherently lacks the ability to provide guarantees for action and sway users into a lifestyle of responsible citizenship the second they pull out from their cartoon, screen or mp3.</p>
<p> The box below includes a quick run through the main ideas discussed throughout the post:</p>
<blockquote>
<p>1. <strong>On the power of storytelling: </strong></p>
<ul><li>Arjun argues that storytelling is the origin of all communication techniques, and this makes it extremely attractive for the public. <br /></li><li>Both Ajay and Ameen bring up the ability to influence behavior, shape the minds of people and transmit experiences, values and beliefs.</li><li>Both also brought up how dominant religions, ideologies, markets governments use storytelling to build movements and sustain their support</li><li>Finally Ajay comments on the issue of access: stories are powerful yet only a small share of stories are being told Hence, the need for this method to become more pervasive.</li></ul>
<br />
<p>2. <strong>Storytelling as a vehicle for change:</strong><br />Each storyteller locates change in different yet complementary spaces:</p>
<ul><li>Arjun believes it must occur at the community level and hence the approach (stories) must be tailored and targeted in order to achieve an effective influence. His approach to change is very contextual.</li><li>Ameen locates it at the behavioral level; in our ability to make decisions and choices. His approach to change is based on how we use information from stories to interact with our surroundings.</li><li>Ajay locates it at the value level: He believes stories should influence us to adjust our values and only then, we will shape our behavior accordingly.</li></ul>
<br />
<p><strong>3. Role of technology:<br /></strong>We approached technology as a 'text' and as a 'language' that creates new possibilities for meaning and interpretation.</p>
<ul><li>For Arjun and Ajay, technology enabled them to connect with other organizations and increased possibilities for partnerships and collaborations. </li></ul>
<ul><li>The three of them believe technology is an accelerator of the journey of stories and that it enables them to reach a larger audience.</li><li>Ameen argued that each medium requires different fluencies, and that the language of each medium should be adapted for the story. For example, a story will be told in different ways if using body language, video, audio, etc. He uses the example of the <a href="https://cis-india.org/digital-natives/making-change/Twitter">Twitter adaption of the Mahabharata.</a><br /></li><li>Ajay closes by noting that although technology enables, it cannot replace the storyteller. <br /></li></ul>
<br />
<p><strong>4. Translating awareness into action</strong></p>
<ul><li>Arjun and Ameen comment on the power of effectively and positively influencing <em>one</em> person. They believe the impact will exponentially spread and grow through that person's network or community.</li><li>Arjun believes you can guarantee it will turn into action.</li><li>Ameen believes you need to move them and inspire them through your characters to the point they feel they can be the hero of that story and act accordingly.</li><li>Ajay takes a more pragmatic approach towards action and shares some of the activities The Kahani Project uses to complement his storytelling sessions, such as: story-thons, story-booths and interactive storytelling, where they engage the audience in the production of their own stories.</li></ul>
<br />
<p><strong>5. Impact of storytelling on citizenship and political participation</strong></p>
<ul><li>Arun and Ajay believe this will come as a result of self-reflection and an evaluation of our impact in the world.</li><li>Ameen believes effective stories transmit the 'responsibility of action' through rhetoric. He uses the example of the popularity of India Against Corruption movement.</li><li>Ajay believes storytelling is a humanizing force that has the power of healing. He recommends institutions should utilize this method to spread confidence and inclusion among society and particularly with excluded groups. <br /></li></ul>
</blockquote>
<h2>Footnotes</h2>
<p align="justify">[<a href="https://cis-india.org/digital-natives/making-change/multimedia-storytellers#fr1" name="fn1">1</a>] Semiotics is defined as the study of signs and symbols and their use or interpretation. It is the study of making meaning and is essential to understand communication processes. While we will not look at any specific semiotics theory, we will focus on how stories create meaning through different signs and mediums, and how this meaning can be leveraged for making change.<br /><br />[<a name="fn1" href="#fr1">2</a>] Refer to Stanford Encyclopedia of Philosophy’s <a href="http://plato.stanford.edu/entries/ricoeur/">page on Paul Ricoeur</a> and the section on ‘Selves and Agents’ to learn more about how action is mediated by causation, interference and intervention. Some interesting thoughts that inspired the above post</p>
<p dir="ltr">“What must be the nature of the world … if human beings are able to introduce changes into it?. Ricoeur adopts the analysis of interference or intervention that G. H. von Wright gives in Explanation and Understanding, and shows that for there to be interference, there must be both: an ongoing anterior established order or course of things and a human doing that somehow intervenes in and disturbs that order. Moreover, interference is always purposeful. Hence an interference is not merely ascribable to an agent. It is also imputable to the agent as the one whose purpose motivates the interference.”</p>
<p>
“The second crucial question about action is “What must be the nature of action … if it is to be read in terms of a change in the world?” Ricoeur argues that every action involves initiative, i.e., “an intervention of the agent of action into the course of the world, an intervention that effectively causes changes in the world” (Oneself as Another, 109, translation modified). Initiative requires a bodily agent possessing specific capabilities and vulnerabilities who inhabits some concrete worldly situation.”</p>
<h2>Sources:</h2>
<p> </p>
<p>Dauenhauer, Bernard and Pellauer, David, "Paul Ricoeur", <em>The Stanford Encyclopedia of Philosophy </em> (Winter 2012 Edition), Edward N. Zalta (ed.),
URL = <http://plato.stanford.edu/archives/win2012/entries/ricoeur/>.</p>
<p> </p>
<p>
For more details visit <a href='https://cis-india.org/digital-natives/making-change/multimedia-storytellers'>https://cis-india.org/digital-natives/making-change/multimedia-storytellers</a>
</p>
No publisherdenisseMaking ChangeNet CulturesResearchFeaturedResearchers at Work2015-10-24T14:26:51ZBlog EntryReport of the Group of Experts on Privacy vs. The Leaked 2014 Privacy Bill
https://cis-india.org/internet-governance/blog/report-of-group-of-experts-on-privacy-vs-leaked-2014-privacy-bill
<b>Following our previous post comparing the leaked 2014 Privacy Bill with the leaked 2011 Privacy Bill, this post will compare the recommendations provided in the Report of the Group of Experts on Privacy by the Justice AP Shah Committee to the text of the leaked 2014 Privacy Bill. Below is an analysis of recommendations from the Report that are incorporated in the text of the Bill, and recommendations in the Report that are not incorporated in the text of the Bill. </b>
<h2>Recommendations in the Report of the Group of Experts on Privacy that are Incorporated in the 2014 Privacy Bill</h2>
<h3>Constitutional Right to Privacy</h3>
<p style="text-align: justify; ">The Report of the Group of Experts on Privacy recommends that any privacy legislation for India specify the constitutional basis of a right to privacy. The 2014 Privacy Bill has done this, locating the Right to Privacy in Article 21 of the Constitution of India.</p>
<h3 style="text-align: justify; ">Nine National Privacy Principles</h3>
<p style="text-align: justify; ">The Report of the Group of Experts on Privacy recommends that nine National Privacy Principles be adopted and applied to harmonize existing legislation and practices. The 2014 Privacy Bill also adopts nine National Privacy Principles. Though these principles differ slightly from the National Privacy Principles recommended in the Report, they are broadly the same, and importantly will apply to all existing and evolving practices, regulations and legislations of the Government that have or will have an impact on the privacy of any individual. Presently, the 2014 Privacy Bill locates the nine National Privacy Principles in an Annex to the Bill, but also incorporates the principles in more detail in sections relating to personal data. An analysis of the principles as compared in the Report and the Bill is below:</p>
<ul>
<li style="text-align: justify; "><b>Notice</b>: The principle of notice as recommended by the Report of the Group of Experts on Privacy<b> </b>differs from the principle of notice in the 2014 Privacy Bill. According to the notice principle in the Report, a data controller shall give sample to understand notice of its information practices to all individuals, in clear and concise language, before any personal information is collected from them. Such notices should include: (during collection) What personal information is being collected; Purposes for which personal information is being collected; Uses of collected personal information; Whether or not personal information may be disclosed to third persons; Security safeguards established by the data controller in relation to the personal information; Processes available to data subjects to access and correct their own personal information; Contact details of the privacy officers and SRO ombudsmen for filing complaints. (Other Notices) Data breaches must be notified to affected individuals and the commissioner when applicable. Individuals must be notified of any legal access to their personal information after the purposes of the access have been met. Individuals must be notified of changes in the data controller’s privacy policy. Any other information deemed necessary by the appropriate authority in the interest of the privacy of data subjects. <br /><br />In contrast, the 2014 Privacy Bill requires that all the data controllers provide adequate and appropriate notice of their information practices in a form that is easily understood by all intended recipients. In addition to this principle as listed in an annex, the Bill requires that on initial collection data controllers provide notice of what personal data is being collected and the legitimate purpose for which the personal data is being collected. If the purpose for which the personal data changes, data controllers must provide data subjects with a further notice that would include the use to which the personal data shall be put, whether or not the personal data will be disclosed to at third person and, if so, the identity of such person if the personal data being collected is intended to be transferred outside India and the reasons for doing so; how such transfer helps in achieving the legitimate purpose; and whether the country to which such data is transferred has suitable legislation to provide for adequate protection and privacy of the data; the security and safeguards established by the data controller in relation to the personal data; the processes available to a data subject to access and correct his personal data; the recourse open to a data subject, if he has any complaints in respect of collection or processing of the personal data and the procedure relating thereto; the name, address and contact particulars of the data controller and all persons who will be processing the personal data on behalf of the data controller. Additionally, if a breach of data takes place data controllers must inform the affected data subject that lost or stolen; accessed or acquired by any person not authorized to do so; damaged, deleted or destroyed; processed, re-identified or disclosed in an unauthorized manner.<br /><br />Though the 2014 Privacy Bill requires a more comprehensive notice to be issued if the purpose for the use of personal data changes, it does not specify (as recommended by the Group of Experts on Privacy) that notice of changes to a data controller’s privacy policy be issued.</li>
</ul>
<ul>
<li style="text-align: justify; "><b>Choice and Consent</b>: The principle of choice and consent in the 2014 Privacy Bill is similar to the principle in the Report of the Group of Experts on privacy in that it requires that all data subjects be provided with a choice to provide or not to provide personal data and that data subject will have the option of withdrawing consent at any time. Though not a part of the specific principle on ‘choice and consent’ listed in the annex the 2014 Privacy Bill also contains provisions that address mandatory collection of information which require, as recommended by the Report of the Group of Experts, that the information is anonymoized. Furthermore, the 2014 Privacy Bill provides individuals an opt-in or opt-out choice with respect to the provision of personal data. <br /><br />Different from as recommended in the principle in the Report of the Group of Experts on Privacy, the 2014 Privacy Bill does not specify that in exception cases when it is not possible to provide a service with choice and consent, then choice and consent will not be required.</li>
</ul>
<ul>
<li style="text-align: justify; "><b>Collection Limitation:</b> The principle of collection limitation as recommended in the Report of the Group of Experts on Privacy and the principle of collection limitation in the Annex of the 2014 Privacy Bill are similar in that both require that only data that is necessary to achieve an identified purpose be collected. As recommended in the Report of the Group of Experts on Privacy, the 2014 Privacy Bill also requires that notice be provided prior to collection and content taken. </li>
</ul>
<ul>
<li style="text-align: justify; "><b>Purpose Limitation</b>: Though the principle of Purpose Limitation are similar in the Report of the Group of Experts on Privacy and the 2014 Privacy Bill as they both require personal data to be used only for the purposes for which it was collected and that the data must be destroyed after the purposes have been served, the 2014 Privacy Bill does not specify that information collected by a data controller must be adequate and relevant for the purposes for which they are processed. The 2014 Privacy Bill also incorporates elements from the principle of Purpose Limitation as defined by the Report of the Group of Experts in other parts of the Bill. For example, the 2014 Bill requires that notice be provided to the individual if there is a change in purpose for the use of the personal information, and designates a section on retention of personal data. </li>
</ul>
<ul>
<li><b>Access and Correction</b>: The principle of Access and Correction in the 2014 Privacy Bill reflects the principle of Access and Correction in the Report of the Group of Experts (though not verbatim). Importantly, the 2014 Privacy Bill incorporates the recommendation from the Report of the Group of Experts on Privacy that prohibits access to personal data if it will affect the privacy rights of another individual. </li>
</ul>
<ul>
<li style="text-align: justify; "><b>Disclosure of Information: </b>The principle of ‘Disclosure of Information’ in the Privacy Bill 2014 is similar to the principle of ‘Disclosure of Information’ as recommended in the Report of the Group of Experts on Privacy (though not verbatim). As recommended this principle requires that personal data be disclosed to third parties only if informed consent has been taken from the individual and the third party is bound the adhere to all relevant and applicable privacy principles.</li>
</ul>
<ul>
<li style="text-align: justify; "><b>Security:</b> The principle of security in the 2014 Privacy Bill reflects the principle of Security recommended in the Report of the Group of Experts on Privacy and requires that personal data be secured through reasonable security safeguards against unauthorized access, destruction, use, modification, de-anonymization or unauthorized disclosure.</li>
</ul>
<ul>
<li style="text-align: justify; "><b>Openness:</b> The principle of Openness in the 2014 Privacy Protection Bill is similar to the principle of Openness recommended in the Report of the Group of Experts on Privacy in that it requires data controllers to make available to all individuals in an intelligible form, using clear and plain language, the practices, procedures, and policies, and systems that are in place to ensure compliance with the privacy principles. The principle in the 2014 Privacy Bill differs from the recommendation in the Report of the Group of Experts on Privacy in that it does not require data controllers to take necessary steps to implement practices, policies, and procedures in a manner proportional to the scale, scope, and sensitivity to the data they collect. </li>
</ul>
<ul>
<li style="text-align: justify; "><b>Accountability:</b> The principle of Accountability in the 2014 Privacy Bill is similar to the principle of Accountability as recommended in the Report of the Group of Experts as both require that the data controller is accountable for compliance with the national Privacy Principles. </li>
</ul>
<p style="text-align: justify; "><b>Application to interception and access, video and audio recording, personal identifiers, bodily and genetic material</b>: The Privacy Bill 2014 incorporates the recommendations from the Report of the Group of Experts on Privacy and specifies the way in which the National Privacy Principles will apply to the interception and access of communications, video and audio recording, and personal identifiers. But the 2014 Privacy Bill does not specify the application of the National Privacy Principles to bodily and genetic material (though this information is included in the definition of sensitive personal information).</p>
<p style="text-align: justify; ">With respect to the installation and operation of video recording equipment in a public space, the 2014 Privacy Bill requires that video recording equipment may only be used in accordance with a prescribed procedure and for a legitimate purpose that is proportionate to the objective for which it was installed. Furthermore, individuals cannot use video recording equipment for the purpose of identifying an individual, monitoring his personal particulars, or revealing in public his personal information. The provisions in the Bill that speak to storage, processing, retention, security, and disclosure of personal data apply to the installation and use of video recording equipment. As a note the 2014 Privacy Bill carves out an exception for law enforcement and government intelligence agencies in the interest of the sovereignty, integrity, security or the strategic, scientific or economic interest of India. <br /><br />With respect to the application of the National Privacy Principles to the interception of communications, the 2014 Privacy Bill lays down a regime for the interception of communications and specifies that the principles of notice, choice, consent, access and correction, and openness will apply to the interception of communications when authorised. <br /><br />With respect to Personal Identifiers, the 2014 Privacy Bill notes that the principles of notice, choice, and consent will not apply to the collection of personal identifiers by the government. Additionally, the government will not be obliged to use any personal identifier only for the limited purpose for which the personal identifier was collected, provided that the use is in conformance with the other National Privacy Principles.</p>
<h3 style="text-align: justify; ">Additional Protection for Sensitive Personal Data</h3>
<p style="text-align: justify; ">The <b>Report of the Group of Experts on Privacy</b> broadly recommends that sensitive personal data be afforded additional protection and existing definitions of sensitive personal data should be harmonised. The <b>2014 Privacy Bill</b> incorporates these recommendations by defining sensitive personal data as data relating to physical and mental health including medical history, biometric, bodily or genetic information; criminal convictions; password, banking credit and financial data; narco analysis or polygraph test data, sexual orientation. The 2014 Privacy Bill also requires authorization from the Data Protection Authority for the collection and processing of sensitive personal data and defines circumstances of when this authorization would not be required including: collection or processing of such data is authorized by any other law for the time being in force; such data has already been made public as a result of steps taken by the data subject; collection and processing of such data is made in connection with any legal proceedings by an order of the competent court; such data relating to physical or mental health or medical history of an individual is collected and processed by a medical professional, if such collection and processing is necessary for medical care and health of that individual; such data relating to biometrics, bodily or genetic material, physical or mental health, prior criminal convictions or financial credit history is processed by the employer of an individual for the purpose of and in connection with the employment of that individual; such data relating to physical or mental health or medical history is collected an processed by an insurance company, if such processing is necessary for the purpose of and in connection with the insurance policy of that individual; such data relating to criminal conviction, biometrics and genetic is processed and collected by law enforcement agencies; such data regarding credit, banking and financial details of an individual is processed by a specific user under the Credit Information Companies (Regulation) Act, 2005; such data is processed by schools or other education institutions in connection with imparting of education to an individual; such data is collected or processed by the government Intelligence agencies in the interest of the sovereignty, integrity, security or the strategic, scientific or economic interest of India, the authority has, by a general or specified order permitted the processing of such data for specific purpose and is limited to the extent of such permission. The 2014 Privacy Bill also prohibits additional transactions from being performed using sensitive personal information unless free consent was obtained for such transaction.</p>
<h3 style="text-align: justify; ">Privacy Officers</h3>
<p style="text-align: justify; ">The Report of the Group of Experts on Privacy recommends that Privacy Officers be established at the organizational level for overseeing the processing of personal data and compliance with the Act. This recommendation has been incorporated in the 2014 Privacy Bill, which establishes Privacy Officers at the organizational level.</p>
<h3 style="text-align: justify; ">Co-regulatory Framework</h3>
<p style="text-align: justify; ">The Report of the Group of Experts on Privacy recommends that a system of co-regulation be established, where industry levels self regulatory organizations develop privacy norms, which are in turn approved and enforced by the Privacy Commissioner. The 2014 Privacy Bill puts in place a similar co-regulatory framework where industry level self regulatory organizations can develop norms which will be turned into regulations and enforced by the Data Protection Authority. If a sector does not develop norms, the Data Protection Authority can develop norms for the specific sector.</p>
<h2 style="text-align: justify; ">Recommendations in the Report that are not in the Bill</h2>
<h3>Scope</h3>
<p style="text-align: justify; ">The Report of the Group of Experts on Privacy recommends that the scope of any privacy framework extends to all individuals, all data processed in India, and all data originating from India. The 2014 Privacy Bill differs from these recommendations by extending the right to privacy to all residents of India, while remaining silent on whether or not the scope of the legislation extends to all data processed in India and all data originating in India. Despite this, the 2014 Bill does specify that any organization that processes or deals with data of an Indian resident, but does not have a place of business within India, must establish a ‘representative resident’ in India who will be responsible for compliance with the Act.</p>
<h3 style="text-align: justify; ">Exceptions</h3>
<p>The Report of the Group of Experts recommends the following as exceptions to the right to privacy:</p>
<ol>
<li>National security</li>
<li>Public order</li>
<li>Disclosure in the public interest </li>
<li>Prevention, detection, investigation, and prosecution of criminal offenses </li>
<li>Protection of the individual and rights and freedoms of others </li>
</ol>
<p>The Report further clarifies that any exception must be qualified and measured against the principles of proportionality, legality, and necessary in a democratic state.</p>
<p style="text-align: justify; ">The Privacy Bill 2014 reflects only the exception of “protection of the individual rights and freedoms of others”. The exceptions as defined in the 2014 Bill are:</p>
<ol>
<li>Sovereignty, integrity or security of India or</li>
<li>Strategic, scientific or economic interest of India; or</li>
<li>Preventing incitement to the commission of any offence; or</li>
<li>Prevention of public disorder; or</li>
<li>The investigation of any crime; or</li>
<li>Protection of rights and freedoms others; or</li>
<li>Friendly relations with foreign states; or</li>
<li>Any other legitimate purpose mentioned in this Act.</li>
</ol>
<p style="text-align: justify; ">Instead of qualifying these exceptions with the principles of proportionality, legality, and necessary in a democratic state – as recommended in the Report of Group of Experts on Privacy, the 2014 Privacy Bill qualifies that any restriction must be adequate and not excessive to the objectives it aims to achieve.</p>
<h3 style="text-align: justify; ">Constitution of Infringement of Privacy</h3>
<p style="text-align: justify; ">The Report of the Group of Experts on Privacy specifies that the publication of personal data for artistic and journalistic purposes in the public interest, disclosure under the Right to Information Act, 2005, and the use of personal data for household purposes should not constitute an infringement of privacy. In contrast the 2014 Privacy Bill specifies that the processing of personal data by an individual purely for his personal or household use, the disclosure of information under the provisions of the Right to information Act, 2005, and any other action specifically exempted under the Act will not constitute an infringement of privacy.</p>
<h3 style="text-align: justify; ">The Data Protection Authority</h3>
<p style="text-align: justify; ">The Report of the Group of Experts on Privacy recommends the establishment of Privacy Commissioners (and places emphasis on Privacy Commissioner rather than Data Protection Authority) at the Central and Regional level. The Privacy Commissioner should be of a rank no lower than a retired Supreme Court Judge at the Central level and a retired High Court Judge at the regional level. The privacy commissioner should have the power to receive and investigate class action complaints and investigative powers of the commissioner should include the power to examine and call for documents, examine witnesses, and take a case to court if necessary. The Commissioner should be able to investigate data controllers on receiving complaints or suo moto, and can order privacy impact assessments. Organizations should not be able to appeal fines levied by the Privacy Commissioner, but individuals can appeal a decision of the Privacy Commissioner to the court. The Commissioner should also have broad oversight with respect to interception/access, audio & video recordings, use of personal identifiers, and the use of bodily or genetic material. The Privacy Commissioner will also have the responsibility of approving codes of conduct developed by the industry level SRO’s.</p>
<p style="text-align: justify; ">Differing from the recommendations in the Report of the Group of Experts on Privacy, the 2014 Privacy Bill establishes a Data Protection Authority (as opposed to a Privacy Commissioner) at the Central level. Instead of creating regional Data Protection Authorities, the 2014 Privacy Bill allows for the Central Government to decide where other offices of the Data Protection Authority will be located. Furthermore, the 2014 Privacy Bill does not specify a qualification for the Data Protection Authority and instead establishes a selection committee to choose and appoint a Data Protection Authority. This committee is comprised of a Cabinet Secretary, Secretary to the Department of Personnel and Training, Secretary to the Department of Electronics and Information Technology, and two experts of eminence from relevant fields that will be nominated by the Central Government.</p>
<p style="text-align: justify; ">The 2014 Privacy Bill does not specify that fines ordered by the Data Protection Authority will be binding for organizations, but does allow individuals to appeal decisions of the Data Protection Authority to the Appellate Tribunal. Differing from the recommendations in the Report of the Group of Experts on Privacy, the 2014 Privacy Bill gives the Data Protection Authority the power to call upon any data controller at any time to furnish in writing information or explanation relating to its affairs, and receive and investigate complaints about alleged violations of privacy of individuals in respect of matters covered under this Act, conduct investigations and issue appropriate orders or directions to the parties concerned. Furthermore, the 2014 Privacy Bill does not specify that the Data Protection Authority will carry out privacy impact assessments, but the Authority can conduct audits of any or all personal data controlled by a data controller, can investigate data breaches, investigate in complaint received, and adjudicate on a dispute arising between data controllers or data subjects and data controllers. Unlike the recommendations in the Report of the Group of Experts on Privacy, it does not seem that the Data Protection Authority will play an overseeing role with respect to interception, the use of video recording equipment, personal identifiers, and the use of bodily and genetic material.</p>
<h3 style="text-align: justify; ">Tribunal and System of Complaints</h3>
<p style="text-align: justify; ">Differing from the recommendation in the Report of the Group of Experts on Privacy, which specified that a Tribunal should not be established as under the Information Technology Act as there is the risk that the institutions will not have the capacity to rule on a broad right to privacy, the 2014 Privacy Bill does establish a Tribunal under the Information Technology Act. The Report of the Group of Experts on Privacy also recommended that complaints be taken to the district level, high level, and Supreme Court – whereas the 2014 Privacy Bill allows individuals to appeal decisions from the Tribunal only to a High Court. Similar to the recommendations of the Report of the Group of Experts, the 2014 Privacy Bill has in place Alternative Dispute Resolution mechanisms at the level of the industry self regulatory organization. The 2014 Privacy Bill also specifies that individuals can seek civil remedies and leaves the issuance of compensation for privacy harm to be from a Court. Unlike the recommendations in the Report of the Group of Experts on Privacy, the 2014 Privacy Bill does not specify that the Data Protection Authority will be able to take a case to the court.</p>
<h3 style="text-align: justify; ">Penalties and Offenses</h3>
<p style="text-align: justify; ">The Report of the Group of Experts on Privacy did not provide specific recommendations for types of offences and penalties, but did suggest that offenses similar to those spelled out in the UK Data Protection Act and Australian Privacy Act be adopted – namely non-compliance with the privacy principles, unlawful collection, processing, sharing/disclosure, access, and use of personal data, and obstruction of the privacy commissioner. The 2014 Privacy Bill does create offenses for the unlawful collection, processing, sharing/disclosure, access, and use of personal data, but does not create offenses for obstruction of the privacy commissioner or broad non-compliance with the privacy principles.</p>
<h3 style="text-align: justify; ">Conclusion</h3>
<p style="text-align: justify; ">The Centre for Internet and Society welcomes the similarities between the recommendations in the Report of the Group of Experts on Privacy and the leaked 2014 Privacy Bill, but would recommend that on areas where there are differences, particularly in the scope of the Privacy Bill and the powers and functions of the Data Protection Authority, the 2014 Bill be brought in line with the recommendations from the Report of the Group of Experts on Privacy.</p>
<p style="text-align: justify; ">In the upcoming post, we will be comparing the text of the leaked 2014 Privacy Bill to international best practices and standards.</p>
<ul>
</ul>
<hr />
<p><b>References</b></p>
<ol>
<li><a href="https://cis-india.org/internet-governance/blog/leaked-privacy-bill-2014-v-2011/" class="external-link">Leaked Privacy Bill: 2014 vs. 2011 </a></li>
<li><a class="external-link" href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf">Report of the Group of Experts on Privacy</a></li>
</ol>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/blog/report-of-group-of-experts-on-privacy-vs-leaked-2014-privacy-bill'>https://cis-india.org/internet-governance/blog/report-of-group-of-experts-on-privacy-vs-leaked-2014-privacy-bill</a>
</p>
No publisherelonnaiFeaturedInternet GovernancePrivacy2014-04-14T06:10:20ZBlog EntryBanking Policy Guide
https://cis-india.org/internet-governance/blog/banking-policy-guide
<b>To gain a practical perspective on the existing banking practices and policies in India in this project, an empirical study of five separate and diverse banks has been conducted. The forms, policy documents, and other relevant and available documents of these banks have been analysed in this project.</b>
<p style="text-align: justify; ">These documents were obtained from the websites of the respective banks, and wherever they were lacking, from the branches of the banks themselves. Attempts were made to obtain any information required for the project that was not available on the website or in the forms from the officers of the respective banks.</p>
<p style="text-align: justify; ">The State Banks of India (hereinafter ‘SBI’), Central Bank of India (hereinafter ‘CBI’), ICICI Bank (hereinafter ‘ICICI’), IndusInd Bank (hereinafter ‘IndusInd’) and Standard Chartered Bank (hereinafter ‘SCB’) are the banks chosen for this project. As mentioned, these banks have been chosen to ensure a diverse sample pool. SBI is an Indian public multinational bank, CBI is an Indian public bank and it is not multinational, ICICI is an Indian private and multinational bank, IndusInd is an Indian private bank which isn’t multinational, and SCB is a British bank operating in India.</p>
<p style="text-align: justify; ">The forms and other documents of each of the banks have been compared against a template of twenty nine questions created from the nine principles given in <a class="external-link" href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf">Justice A.P. Shah Group of Experts’ Report on Privacy</a>.</p>
<p style="text-align: justify; ">The two services provided by these banks that have been analysed are Opening an Account and Taking out a Personal Loan. This comparison has been done keeping in mind the obligations of the banks under the Master Circular and the KYC Norms detailed in it, Code of Conduct, and the Rules under Section 43A of the IT Act. Attempts have been made to clarify the basis of the response as much as possible. An analysis of the obligations of the banks is present below, along with an explanation of the relevance of various parts of the two services that are analysed.</p>
<hr />
<p style="text-align: justify; ">Click to download:</p>
<ol>
<li><a href="https://cis-india.org/internet-governance/blog/banking-policy-guide.pdf" class="internal-link">Banking Policy Guide</a></li>
<li><a href="https://cis-india.org/internet-governance/blog/banking-policy-guide.xlsx" class="internal-link">Banking Practices</a></li>
</ol>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/blog/banking-policy-guide'>https://cis-india.org/internet-governance/blog/banking-policy-guide</a>
</p>
No publisherKartik ChawlaBankingFeaturedInternet GovernancePrivacy2015-01-22T14:54:57ZBlog EntryPatent Valuation and License Fee Determination in Context of Patent Pools
https://cis-india.org/a2k/blogs/patent-valuation-and-license-fee-determination-in-context-of-patent-pools
<b>The focus of this research paper is on an extremely limited though important aspect of patent pools — that of patent valuation and license fee determination. It is important to bear in mind that the concept of patent valuation and license fee determination as it exists independently is modified when it is applied in context of patent pools. </b>
<h2 class="WordSection1">I. Introduction</h2>
<p class="WordSection1" style="text-align: justify; ">A patent pool is essentially “An agreement between two or more patent owners to aggregate (pool) their patents and to license them to one another or third parties. Pools usually offer standard licensing terms to licensees and allocate a portion of the licensing fees (royalties) to patent owners according to a pre-set formula or procedure.<a href="#fn1" name="fr1">[1] </a></p>
<p class="MsoNormal" style="text-align:justify; ">A patent pool particularly faces intense scrutiny by way of competition/ antitrust law and each step of structuring of a patent pool has to be done keeping the prevalent norms of antitrust law in context. This article merely brushes with the antitrust aspect, as a discussion on that topic is beyond the scope of this particular article. However, suffice is to say that like other aspects of structuring of a patent pool, patent valuation and licensing fee determination is also subject to antitrust law concerns.</p>
<p class="MsoNormal" style="text-align:justify; ">Part II of this research paper is a discussion as regards factors which determine patent value in context of a patent pool. Similarly, Part III is a discussion as regards factors that determine license fee in context of a patent pool. Thereafter, Part IV discusses the methods which are applied for patent valuation and license fee determination. A number of these methods are independent evaluation methods and hence their dynamics when applied in context of patent pools may need to be altered in light of the discussion in Parts II and III. Part V discusses certain aspects of actual patent pools in the technological field to better understand the principles which have been discussed in Parts II-IV. Finally, Part VI concludes this research paper.</p>
<h2 class="MsoNormal" style="text-align: justify; ">II. Determination of Patent Value in a Patent Pool</h2>
<p class="MsoNormal" style="text-align: justify; ">One of the prominent pillars of a patent pool is an appropriate patent valuation process. Patent valuation is a difficult and subjective task.<a href="#_ftn3" name="_ftnref3"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[2]</span></span></span></a> Moreover, the result of a patent valuation independently outside of a pool might be quite different from when it is part of a pool transaction. A “pool regularizes the valuation of individual patents - making, as the United States Supreme Court put it, ‘a division of royalties according to the value attributed by the parties to their respective patent claims’”.<a href="#_ftn4" name="_ftnref4"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[3]</span></span></span></a> However, this value attribution process is not an arbitrary one but incredibly dynamic, and constantly evolving. This difficulty is furthered by the fact that the term “patent value” itself is subject to interpretation. Patent value essentially comprises of the economic benefit that the patent can bestow.<a href="#_ftn5" name="_ftnref5"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[4]</span></span></span></a></p>
<p class="MsoNormal" style="text-align:justify; ">A number of factors as discuss hereinafter determine the value of a patent. It is not necessary though that all the factors would come into play in context of every exercise of valuation of a patent in a pool. The factors determining patent value can be largely classified into a discussion as regards the types of patents in a patent pool in context of their relative importance and other complementary factors which further affect such importance.</p>
<h3 class="MsoNormal" style="text-align: justify; ">A. Categories of Patents in a Patent Pool</h3>
<p class="MsoNormal" style="text-align:justify; ">Patents in a pool can be classified based on their necessity and quality. Thus, arises the concept of essential and non-essential patents and strong and weak patents.<i><span> </span></i></p>
<p class="MsoNormal" style="text-align:justify; "><b><i><span><span> </span></span></i>Essential and Non-Essential Patents<br /></b>As the terms indicate, essential patents are those which are imperative for the success of pool creation and thus naturally have considerably more value. Non-essential patents on the other hand are patents which though not imperative may bring efficiency advantages to the pool. However, what exactly comprises an essential patent is a subjective and constantly evolving definition determined by each patent pool according to its commercial needs and capabilities. For example, the number of patents in the MPEG-2 pool, all of which are declared to be essential to the MPEG-2 standard, increased from 27 in 1997 to more than 900 in 2010.<a href="#_ftn6" name="_ftnref6"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[5]</span></span></span></a></p>
<p class="MsoNormal" style="text-align:justify; ">Essential patents naturally have more economic value than non-essential patents.<a href="#_ftn7" name="_ftnref7"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[6]</span></span></span></a> “A pool that includes non-essential patents can increase prices for some consumers, while decreasing prices for other consumers.”<a href="#_ftn8" name="_ftnref8"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[7]</span></span></span></a> Also, inclusion of inessential patents can raise potential concerns about foreclosure of alternative technologies and higher royalties for some licenses than would have occurred if these patents were excluded from the pool.<a href="#_ftn9" name="_ftnref9"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[8]</span></span></span></a> These concerns though should be balanced against the costs of excluding potentially essential patents from the pool.<a href="#_ftn10" name="_ftnref10"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[9]</span></span></span></a> Such concerns were raised in context of the DVD 3C patent pool.<a href="#_ftn11" name="_ftnref11"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[10]</span></span></span></a> Thus, it has to be decided on a case by case scenario as to whether the patent pool will include only essential patents or both essential as well as non-essential patents.</p>
<p class="MsoNormal" style="text-align:justify; ">“<span>Whether a patent pool improves a market’s transactional efficiency depends on the competitive characteristics of the patents included within the pool’s offering.”<a href="#_ftn12" name="_ftnref12"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[11]</span></span></span></a> Properly demarcating all required patents for a technology is important during patent pool formation. Otherwise it may create a “hold out” problem where a patent owner will “hold out” for higher royalties, “knowing that the manufacturer has individually negotiated for and already acquired the rest of the necessary … patent licenses, and that the value of all those licenses depends on obtaining a license to its own patent.”<a href="#_ftn13" name="_ftnref13"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[12]</span></span></span></a> </span>Essentiality of a patent can be determined based on certain characteristics of patents:</p>
<p style="text-align: justify; ">a. Blocking Patents<br />Blocking patents comprise of improvement patents on an existing technology. Thus, the improvement patent is deemed to be “subservient” to the earlier, “dominant’ patent”<a href="#_ftn14" name="_ftnref14"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[13]</span></span></span></a> and the subservient and dominant patents are said to block one another.<a href="#_ftn15" name="_ftnref15"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[14]</span></span></span></a> This is so because, the subservient patent cannot be exploited without infringing upon the dominant patent.<a href="#_ftn16" name="_ftnref16"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[15]</span></span></span></a> Likewise, the dominant patent cannot be developed in the improved embodiment without permission from the subservient patentee.<a href="#_ftn17" name="_ftnref17"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[16]</span></span></span></a> For example, the Wright brothers patents for aeroplane wings were improved upon by Glenn Curtiss and Alexander Graham Bell by using a set of wing flaps, or ailerons. The Curtiss patent, however, was found to infringe upon the Wright patent. As a result, Curtiss had no legal right to make, use, or sell his ailerons without a license from the Wright brothers, and the Wright brothers had no legal right to make, use, or sell Curtiss's commercially successful form of the stabilizing device. Their patents mutually infringed and blocked one another and they had to form a patent pool.<a href="#_ftn18" name="_ftnref18"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[17]</span></span></span></a> Similarly, public key encryption method was devised and patented at Stanford University, and licensed to Cylink. Soon thereafter, a team of scientists at the Massachusetts Institute of Technology developed and patented an algorithm, and licensed its use to RSA. The RSA algorithm was successfully commercialized and became an industry standard. Cylink and RSA constituted blocking rival patents and the issue was resolved by formation of a patent pool.<a href="#_ftn19" name="_ftnref19"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[18]</span></span></span></a></p>
<p class="MsoNormal" style="text-align:justify; ">b. Complementary Patents<br />Complementary patents cover technologies that are largely lacking or inefficient absent a license to a separate patented product.<a href="#_ftn20" name="_ftnref20"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[19]</span></span></span></a> They occur as a consequence of independent invention. Thus, value of <span>complementary patents increases when combined with a separate patented invention;</span> they act synergistically, each increasing the value of the other.<a href="#_ftn21" name="_ftnref21"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[20]</span></span></span></a> “Two products or technologies are complements if an increase in the price of one of them reduces the demand for the other.”<a href="#_ftn22" name="_ftnref22"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[21]</span></span></span></a> For example, production of a light bulb requires patent rights to both the vacuum bulb as well as the filament.<a href="#_ftn23" name="_ftnref23"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[22]</span></span></span></a> A patent pool that only contains complementary patents may have substantial market power if the pool does not face competition from alternative or substitutable technology.<a href="#_ftn24" name="_ftnref24"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[23]</span></span></span></a> This though, could lead to the occurrence of royally stacking i.e. double-marginalization, which can occur when firms sell or license complementary products or technologies and demand is sensitive to price.<a href="#_ftn25" name="_ftnref25"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[24]</span></span></span></a> It refers to the addition of successive mark-ups by suppliers in a vertical relationship.<a href="#_ftn26" name="_ftnref26"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[25]</span></span></span></a></p>
<div class="WordSection1">c. Competing Patents</div>
<p class="MsoNormal" style="text-align:justify; ">Competing patents result when there exist totally novel products or processes that provide market substitutes for patented goods, or when inventors sufficiently modify existing patented goods so that the original patent is deemed “invented around” and not infringed.<a href="#_ftn27" name="_ftnref27"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[26]</span></span></span></a> “Two products or technologies are substitutes if an increase in the price of one of them increases the demand for the other.”<a href="#_ftn28" name="_ftnref28"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[27]</span></span></span></a> A patent pool may obtain market power by obtaining control over substitutable patents too.<a href="#_ftn29" name="_ftnref29"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[28]</span></span></span></a> An individual who acquires the rights to a competing patent eliminates or significantly lessens his need for competing patents within or outside of the pool.<a href="#_ftn30" name="_ftnref30"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[29]</span></span></span></a> Thus, the value of a pool consisting of competing patents increases with acquisition of substitute patents.<a href="#_ftn31" name="_ftnref31"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[30]</span></span></span></a></p>
<p style="text-align: justify; "><b>Strong and Weak Patents<br /></b>A patent pool can comprise of strong as well as weak patents. The value accorded to the patents would naturally be in accordance with its “strength.” “‘Low patent quality’ is shorthand for such problems as overlapping claims, inappropriately broad claims, slow patent prosecution, and patents on obvious inventions.”<a href="#_ftn32" name="_ftnref32"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[31]</span></span></span></a> Patents are “probabilistic rights”<a href="#_ftn33" name="_ftnref33"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[32]</span></span></span></a> Their scope and extent often remains probabilistic until their claim determination which may often be done only upon adjudication. Similarly in situations of a patent flood,<a href="#_ftn34" name="_ftnref34"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[33]</span></span></span></a> the overall quality of patents may become lower.<a href="#_ftn35" name="_ftnref35"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[34]</span></span></span></a> The additional protection of the pool affords a weak patent enforcement rights that it may not have secured standing alone.<a href="#_ftn36" name="_ftnref36"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[35]</span></span></span></a> Thus, even weak and invalid patents become important and can be used to exclude competitors, for example for litigation threats.<a href="#_ftn37" name="_ftnref37"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[36]</span></span></span></a></p>
<p class="MsoNormal" style="text-align:justify; ">Some patent pools contain explicit agreements to support weak patents, such as covenants not to challenge patents, joint defense agreements, and allocation of patent rights to parties who are best able to defend them.<a href="#_ftn38" name="_ftnref38"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[37]</span></span></span></a> Some patent pools achieve a similar effect not by explicit agreements, but by creating an institutional environment where patentees find that it is mutually advantageous to recognize each other’s patents.<a href="#_ftn39" name="_ftnref39"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[38]</span></span></span></a></p>
<h3>B. Other Factors Determining Patent Value in Context of Patent Pool</h3>
<p>Besides the patents themselves, other complementary criteria impact on patent value. These comprise of the holistic environment in which the patents subsist, as discussed hereinafter.</p>
<p class="MsoNormal" style="text-align:justify; "><b>Subject matter of Invention<br /></b>“Value is highly dependent upon the subject matter of the invention.”<a href="#_ftn40" name="_ftnref40"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[39]</span></span></span></a> Certain subject matter fields or innovations do not have sufficient commercial importance or market demand to warrant investments.</p>
<p class="MsoNormal" style="text-align:justify; "><b>Scope of Invention<br /></b>A particular subject where there is extensive minefield of patents already in existence is less likely to have considerable patent value due to the limited patent scope as opposed to a field where patents are relatively lacking and there is possibility of a broader patent scope.<b> </b>Analogously, “value of a patent is derived from an ability to preclude others from practicing the unique innovation described by the words of the patent’s claims.”<a href="#_ftn41" name="_ftnref41"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[40]</span></span></span></a> “Generalizing, a patent employing broad claim language is typically more valuable than a patent of narrowly written claims in the same technology arena.”<a href="#_ftn42" name="_ftnref42"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[41]</span></span></span></a></p>
<p class="MsoNormal" style="text-align:justify; "><b>Size of Patent Pool<br /></b>The size of a patent pool i.e. the number of its members and their patents is an important facet in determining the value of patents involved. Greater the number more are the governance issues as well as royalty determination issues, which in turn affect the valuation of the patents. This though does not imply that pools should be of a specific size, only that their size should meet efficiency demands.</p>
<p class="MsoNormal" style="text-align:justify; "><b>Value of Patent Pool<br /></b>The patents under the purview of a patent pool determine the pool’s value which in turn determines the value of the patents within as well as out of the pool. Value of a patent pool may be limited if certain holders of essential patents are not members.<a href="#_ftn43" name="_ftnref43"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[42]</span></span></span></a> This may occur due to various reasons such as if it was perceived that the patent may have more value as an independent entity, or due to strategic interests, or choice of joining different pools.<a href="#_ftn44" name="_ftnref44"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[43]</span></span></span></a> Correspondingly, if the patent pool does not contain all the patents it cannot curtail royalty stacking issues for the users. For example, Alcatel-Lucent pursued infringement claims for patents that it alleged covered the MPEG-2 standard and were not in the pool.<a href="#_ftn45" name="_ftnref45"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[44]</span></span></span></a></p>
<p class="MsoNormal" style="text-align:justify; ">While it is evident that collecting all necessary patents where the end product or standards is determined is extremely difficult, it becomes considerably more difficult where there is no predetermined or identifiable end-product.<a href="#_ftn46" name="_ftnref46"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[45]</span></span></span></a></p>
<p class="MsoNormal" style="text-align:justify; "><b><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>Patent Portfolio</span></span></span><br /></b>Certain academic studies are of the opinion that “the real value of patents lies not in their individual significance, but instead in their aggregation into a patent portfolio: a strategic collection of distinct-but-related individual patents that, when combined, confer an array of important advantages upon the portfolio holder.”<a href="#_ftn47" name="_ftnref47"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[46]</span></span></span></a> This theory has been applied to explain the patent paradox where the patent intensity, i.e. patents obtained per research and development dollar has risen dramatically even as the expected value of individual patents has diminished.<a href="#_ftn48" name="_ftnref48"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[47]</span></span></span></a> Thus, greater the control of an entity over a portfolio of patents, more would be its negotiation power in context of valuation.</p>
<p class="MsoNormal" style="text-align:justify; "><b>Signaling<br /></b>It has been opined that the value of patents inheres not so much in the exclusivity they confer upon inventors, but rather in their ability to serve as credible signals.<a href="#_ftn49" name="_ftnref49"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[48]</span></span></span></a> Firms use patents to credibly convey information about the invention to the market who otherwise might not be willing to expend the costs necessary to obtain the information.<a href="#_ftn50" name="_ftnref50"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[49]</span></span></span></a></p>
<p class="MsoNormal" style="text-align:justify; "><span> </span></p>
<p class="MsoNormal" style="text-align:justify; "><b><i> </i>Defensive Aspect<br /></b>Patent value is also ascertained based on its use to serve as an insurance, whereby competing firms use them as “bargaining chips” to negotiate and secure certain niches in the marketplace.<a href="#_ftn51" name="_ftnref51"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[50]</span></span></span></a> This is so especially from the negotiation as well as the litigation viewpoint.</p>
<p class="MsoNormal" style="text-align:justify; "><b>Valuation Dynamics<br /></b>In context of certain subject matters, inability of the patents to be valued or possibility of dynamic changes in value creates problems in structuring the patent pool, or it might lead to issues of according over-value or under-value. For example, in the process of biological research, where hypotheses are often adjusted and experimentation continually refined, it is impossible to anticipate the particular value of a given research tool for an investigative procedure.<a href="#_ftn52" name="_ftnref52"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[51]</span></span></span></a> Similarly, in context of the Human Genome Sciences, the patent for the gene that encodes CCR5 protein, was likely not valued very highly, because of unsurity of its utility, which changed when independent research established its importance in the fight against HIV.<a href="#_ftn53" name="_ftnref53"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[52]</span></span></span></a></p>
<h3 class="MsoNormal" style="text-align: justify; ">C. Role of Independent Evaluator</h3>
<p class="MsoNormal" style="text-align:justify; ">Often, independent experts in the relevant technology are employed for patent valuation purposes. Their role includes the responsibility of providing a mechanism for determining the market value of each participating patent for the purpose of setting appropriate royalty rates within the patent pool.<a href="#_ftn54" name="_ftnref54"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[53]</span></span></span></a> Also, they would evaluate the current state of the art and determine which patents are essential and which aren’t.<a href="#_ftn55" name="_ftnref55"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[54]</span></span></span></a> An evaluator’s is a continuing responsibility throughout the existence of the duration of the patent pool to monitor developments in the field so as to ensure each patent’s essentiality and incorporate additional patents if necessary.<a href="#_ftn56" name="_ftnref56"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[55]</span></span></span></a> Concerns though have been expressed as regards the expert’s ability and impartiality<span>.</span><a href="#_ftn57" name="_ftnref57"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[56]</span></span></span></a></p>
<h2><span><span class="MsoFootnoteReference"><span>III. Determination of License Fee for a Patent Pool</span></span></span></h2>
<p class="MsoNormal" style="text-align:justify; "><span>Theorists, have suggested criteria to gauge viability of patent pools.<a href="#_ftn58" name="_ftnref58"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[57]</span></span></span></a> The various elements involved in structuring of a patent pool do not function in a vacuum. Each has an impact on the other and ultimately they determine in totum, the licensing fees.</span></p>
<h3><span>A. Pool Dynamics</span></h3>
<p class="MsoNormal" style="text-align:justify; ">The factors catalyzing pool creation impact on the licensing fee that is set. A patent pool may primarily be structured due to government influence,<a href="#_ftn59" name="_ftnref59"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[58]</span></span></span></a> court influence,<a href="#_ftn60" name="_ftnref60"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[59]</span></span></span></a> commercial and business perspective,<a href="#_ftn61" name="_ftnref61"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[60]</span></span></span></a> to achieve or pursuant to standard setting,<a href="#_ftn62" name="_ftnref62"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[61]</span></span></span></a> and social objectives.<a href="#_ftn63" name="_ftnref63"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[62]</span></span></span></a> Accordingly, riders may be placed on creation of the pool and setting of licensing fees.</p>
<p class="MsoNormal" style="text-align:justify; ">Analogously, members comprising the patent pool affect royalty determinations. Different perspectives can be observed in commercial entities as opposed to research entities or voluntary organizations. Similarly, the negotiation capabilities are different for established commercial conglomerates as opposed to entrepreneurs, or smaller entities.<a href="#_ftn64" name="_ftnref64"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[63]</span></span></span></a> Similarly, patent pools may distinguish between patent contributing licensees and mere licensees in fixing royalty rates.<a href="#_ftn65" name="_ftnref65"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[64]</span></span></span></a></p>
<p class="MsoNormal" style="text-align:justify; ">Furthermore, pool governance as well as nature of the pool would have an impact on royalty determination. Pools can essentially be of two types based on regulation of members or licensing- open and closed.<a href="#_ftn66" name="_ftnref66"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[65]</span></span></span></a> Correspondingly, the patent holders themselves may have different perspectives or expectations of their rights.</p>
<p class="MsoNormal" style="text-align:justify; ">The negotiating entity too has an impact on royalty determination. “Agreements between the members of the patent pool and third parties can be established directly through patentees and licensees or indirectly through an entity specifically created to administer the pool.”<a href="#_ftn67" name="_ftnref67"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[66]</span></span></span></a> There are a considerable number of business models involved in context of a patent pool that define the parameters of the relationship between what are primarily classified as IP creators and IP consumers.<a href="#_ftn68" name="_ftnref68"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[67]</span></span></span></a> These dynamics have considerably altered with the strong and prolific emergence of IP intermediaries; they in turn affect the royalty rate negotiations.<a href="#_ftn69" name="_ftnref69"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[68]</span></span></span></a></p>
<h3 class="MsoNormal" style="text-align: justify; ">B. Negotiation Dynamics</h3>
<p class="MsoNormal" style="text-align:justify; ">License negotiations involve complicated factors, such as uncertain outcomes, asymmetric information about the values of technologies and the contributions of licensees to a technology's value, the credibility of disagreements, differential bargaining power and skill, and the individual circumstances of licensors and licensees.<a href="#_ftn70" name="_ftnref70"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[69]</span></span></span></a> Royalty determination depends on “the bargaining skills of patentees, their licensing objectives, the qualities of their patents, opportunity costs that patentees may have if they choose not to license their patents, the likelihood of injunctions, and the methods that courts apply to calculate infringement damages.”<span class="MsoFootnoteReference"> <a href="#_ftn71" name="_ftnref71"><span class="MsoFootnoteReference"><span>[70]</span></span></a></span> Pool members act strategically to maximize their share of the pool’s revenues.<a href="#_ftn72" name="_ftnref72"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[71]</span></span></span></a> “The defining characteristic of patent ownership has been described as the right to extract royalties ‘as high as [one] can negotiate with the leverage’ of exclusivity.”<a href="#_ftn73" name="_ftnref73"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[72]</span></span></span></a> <span>“The patent holder can ask for a high starting price; the potential infringer can counter by pointing to potential substitute technologies; and ultimately the process should yield a price that accurately reflects the marginal advantages of the patented technology.”<a href="#_ftn74" name="_ftnref74"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[73]</span></span></span></a> </span>Again, negotiation strategies include deploying a number of tactics by corporates to whittle down an independent inventor’s patience and his price, thus reducing the licensing fee from the desired amount.<a href="#_ftn75" name="_ftnref75"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[74]</span></span></span></a> <span>Correspondingly, there is no average length of time or amount of money needed for successfully creating a patent pool; it depends on the number of members involved in the negotiations and their commitment and willingness to negotiate an appropriate price.<a href="#_ftn76" name="_ftnref76"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[75]</span></span></span></a></span></p>
<p class="MsoNormal" style="text-align:justify; ">Timing of the license negotiation too has an impact on determination of the royalty scheme. Licensing can occur in two primary settings: ex ante licensing, i.e. prior to pool formation; and ex post, i.e. post pool formation. In ex ante licensing, the manufacturer has a choice to alter existing products to incorporate the patented features, and can thus perform a rational cost-benefit analysis prior to making any product alterations.<a href="#_ftn77" name="_ftnref77"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[76]</span></span></span></a> Analogously, a holdout who demands royalties prior to the final organization of the pool can only demand a royalty that reflects the additional value that his new patent adds to the collection.<a href="#_ftn78" name="_ftnref78"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[77]</span></span></span></a> If he demands more than this value, the pool will work around the holdout’s patent by adopting a different standard, adjusting the patent pool to cover slightly different technology, or dissolving itself.<a href="#_ftn79" name="_ftnref79"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[78]</span></span></span></a> In ex post licensing, on the other hand, a holdout is in a stronger negotiating position, and can demand not only the marginal value of his patent, but also the switching costs that would be incurred if the established standard or licensing regime were limited by a court injunction.<a href="#_ftn80" name="_ftnref80"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[79]</span></span></span></a> Complicating this situation are <span>licenses that are granted ex ante but negotiated ex post.</span></p>
<p class="MsoNormal" style="text-align:justify; ">Furthermore, patent pools are generally voluntary collaborations; however, it is also possible to compel parties to join the pool or risk losing revenue from a large segment of the industry.<a href="#_ftn81" name="_ftnref81"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[80]</span></span></span></a> Depending on the situation, the negotiation dynamics and hence the royalty scheme would be affected.</p>
<p class="MsoNormal" style="text-align:justify; ">Rules governing damages for patent infringement also affect patentees’ decision to join a pool or to license independently, as the threat of injunctive relief can provide a patentee with bargaining power that can be disproportional to the number of patents he owns.<a href="#_ftn82" name="_ftnref82"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[81]</span></span></span></a></p>
<h3 class="MsoNormal" style="text-align: justify; ">C. Terms of License</h3>
<p class="MsoNormal" style="text-align:justify; ">The terms of the license considerably influence royalty determination. These include, nature of licensed products,<a href="#_ftn83" name="_ftnref83"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[82]</span></span></span></a> character of license- whether exclusive or non-exclusive,<a href="#_ftn84" name="_ftnref84"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[83]</span></span></span></a> granting clause, geographic scope of the license, field of use governed by the license, provision of sublicensing, grantback provisions, future usage governance, non-assertion clauses, reach-through provisions, termination clause, and licensee’s ability to challenge patents in the pool.</p>
<p class="MsoNormal" style="text-align:justify; ">Included herein too would be the treatment of after-acquired patents, which in turn can be classified into two types: (1) improvement patents based on a patented technology licensed by another member of the patent pool; and (2) patents unrelated to patented technologies licensed to the members of the patent pool.<a href="#_ftn85" name="_ftnref85"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[84]</span></span></span></a></p>
<p class="MsoNormal" style="text-align:justify; ">License governance in context of graduated and progressive licensing would also influence royalty determination. This would include “provisions for pool members to license their patents without licensing all the patents in a pool”<a href="#_ftn86" name="_ftnref86"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[85]</span></span></span></a> And the freedom “to license their patents bilaterally, i.e., outside of the pool structure.”<a href="#_ftn87" name="_ftnref87"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[86]</span></span></span></a></p>
<h2 class="MsoNormal" style="text-align: justify; ">IV. Methods for Patent Valuation and License Fee Determination</h2>
<p class="MsoNormal" style="text-align:justify; ">There are three basic methods of valuation: the cost method,<a href="#_ftn88" name="_ftnref88"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[87]</span></span></span></a> the market method,<a href="#_ftn89" name="_ftnref89"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[88]</span></span></span></a> and the income method.<a href="#_ftn90" name="_ftnref90"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[89]</span></span></span></a> In context of patent valuation, these methods find varied expressions. “A truly accurate assessment of patent value requires intensive legal and technical evaluation of individual patents.”<a href="#_ftn91" name="_ftnref91"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[90]</span></span></span></a> The economics literature, however, has also proposed several proxies for patent value based on objective and readily available information.<a href="#_ftn92" name="_ftnref92"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[91]</span></span></span></a></p>
<p class="MsoNormal" style="text-align:justify; ">In context of patent pools the dynamics of patent valuation methods is altered and they need to be viewed through the prism of factors discussed in Part II. This doesn’t imply that approaches to objective patent valuation are not relevant.<a href="#_ftn93" name="_ftnref93"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[92]</span></span></span></a> “However, such valuation approaches focus only on characteristics of patents at the time of issue and neglect to consider what happens afterwards.”<a href="#_ftn94" name="_ftnref94"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[93]</span></span></span></a> <span>“Technology developments or price fluctuations, among many factors, may alter the relationship between two patents … In turn, this may decrease the value of any static analysis conducted by experts.”</span><a href="#_ftn95" name="_ftnref95"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[94]</span></span></span></a><span> </span></p>
<p class="MsoNormal" style="text-align:justify; ">Determination of the licensing fee of a patent pool is based on the joint affect of certain transactions. Again, as with patent valuation, so also with licensing fee determination, in context of patent pools, the factors discussed in Part III need to be given heed. The transactions influencing licensing fee determination essentially comprise of valuation of the patent, which in turn is used to set a royalty rate pertaining to allocation of various fees received by licensing of the pool patents. Thus, royalty payment is comprised of two components: a royalty rate and a royalty base, upon which the rate is applied.<a href="#_ftn96" name="_ftnref96"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[95]</span></span></span></span></a></p>
<h3 class="MsoNormal" style="text-align: justify; ">A. Determining an Appropriate Royalty Base</h3>
<p class="MsoNormal" style="text-align:justify; ">The scope of the royalty base can be determined in two principal ways- apportionment and entire market value rule.</p>
<p class="MsoNormal" style="text-align:justify; ">The apportionment principle implies that when a patent reads on the entirety of an infringing product, the royalty base should be the total value of the sales (or use) of that product.<a href="#_ftn97" name="_ftnref97"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[96]</span></span></span></a> When the patent at issue covers only a component of the infringing product, the value of the sales or uses of that item must be apportioned between the patented invention and the remaining unpatented components.<a href="#_ftn98" name="_ftnref98"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[97]</span></span></span></a> Thus, the principle aims at allocating awards in proportion to contribution, and is not based on any value attributable to the infringer’s or third parties’ inventions.<a href="#_ftn99" name="_ftnref99"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[98]</span></span></span></a> Thus, essentially, a licensor garners a royalty fee in proportion to the number of infringed patents owned by him.</p>
<p class="MsoNormal" style="text-align:justify; ">The entire market value rule, recognizes that the economic value added to a product by a patented component may be greater than the value of the component alone.<a href="#_ftn100" name="_ftnref100"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[99]</span></span></span></a> Thus, this rule focuses on whether the patented component drives demand for the entire product, and if it is so, then the patentee may treat all revenue from the infringing product as an appropriate royalty base.<a href="#_ftn101" name="_ftnref101"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[100]</span></span></span></a></p>
<h3 class="WordSection1">B. Setting Royalty Rates</h3>
<p class="MsoNormal" style="text-align:justify; ">Royalty rates are typically a percentage rate and thus reflects the proportion of the base value that the patented technology contributes.<a href="#_ftn102" name="_ftnref102"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[101]</span></span></span></a> Various approaches have emerged in determining royalty rates; these could be adapted in context of patent pools.</p>
<p class="MsoNormal" style="text-align:justify; "><b>Rule of Thumb<br /></b>This approach suggests that the licensor should receive 25 percent of the licensee’s gross profit from the licensed technology.<a href="#_ftn103" name="_ftnref103"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[102]</span></span></span></a><sup> </sup>Thus, this rule’s purpose is not the valuation of a technology per se, but rather the apportionment of a technology’s value between the licensor and licensee.<a href="#_ftn104" name="_ftnref104"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[103]</span></span></span></a> The percentage split between the licensor and licensee should be adjusted upwards or downwards to take into account the parties’ respective investment and risk in the licensed technology.<a href="#_ftn105" name="_ftnref105"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[104]</span></span></span></a></p>
<p class="MsoNormal" style="text-align:justify; "><b>Numerical Proportionality<br /></b>According to this approach, royalty entitlement of the holder of patents essential to a standard should be calculated in light of the proportional contribution of that patent owner’s essential patents compared to the total contribution of all other essential patents reading on the standard.<a href="#_ftn106" name="_ftnref106"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[105]</span></span></span></span></a> This method rests on the proposition that every patent is of equal value.<a href="#_ftn107" name="_ftnref107"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[106]</span></span></span></a></p>
<p class="MsoNormal" style="text-align:justify; "><b>Industry Standards / Market or Comparable Technology Method<br /></b>Under this approach, the worth of a patent is determined by examining the royalty rates garnered in similar past transactions.<a href="#_ftn108" name="_ftnref108"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[107]</span></span></span></a></p>
<p style="text-align: justify; "><b>Discounted Cash Flow<br /></b>This approach proposes that patent price can be expressed as the present value of the future stream of economic benefits derived from ownership, which includes projected sales of products (or components) based on the patent over its expected life or any increased share of sales as compared to competitors, net of any capital requirements of production.<a href="#_ftn109" name="_ftnref109"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[108]</span></span></span></span></a> To implement it, one must determine (1) the future cash flows generated by the patent in question and (2) an appropriate discount rate.<a href="#_ftn110" name="_ftnref110"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[109]</span></span></span></a></p>
<p class="MsoNormal" style="text-align:justify; "><b>Ranking<br /></b>This approach compares the intellectual property asset to be valued to comparable intellectual property assets on a subjective or objective scale.<a href="#_ftn111" name="_ftnref111"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[110]</span></span></span></a> There are five components to a ranking method: (i) scoring criteria; (ii) scoring system; (iii) scoring scale; (iv) weighting factors; and (v) decision table; these components are used to calculate a composite score for an asset, which is then compared to the average score for a comparable intellectual property asset to determine the relative value.<a href="#_ftn112" name="_ftnref112"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[111]</span></span></span></a></p>
<p class="MsoNormal" style="text-align:justify; "><b>Cost-based Rate Setting<br /></b>This approach proposes that the patent holder’s cost of obtaining the invention and its patent forms the basis of the royalty rate; a profit margin is simply tacked onto the innovation cost.<a href="#_ftn113" name="_ftnref113"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[112]</span></span></span></span></a></p>
<p class="MsoNormal" style="text-align:justify; "><b>Surrogate Measures<br /></b>Surrogate measures value patents by reference to the patents themselves.<a href="#_ftn114" name="_ftnref114"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[113]</span></span></span></a> They can be largely categorized into: (1) the number of patents issued to a company; (2) payment of patent maintenance fees i.e. patents which are regularly renewed are more valuable; (3) prior art citations i.e. more a patent is cited, more is its value; (4) characteristics of litigated patents i.e. patents which are the subject matter of litigation are more valuable.<a href="#_ftn115" name="_ftnref115"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[114]</span></span></span></a></p>
<p class="MsoNormal" style="text-align:justify; "><b>Disaggregation Methods<br /></b>There are two basic types of disaggregation methods - value disaggregation and income disaggregation.<a href="#_ftn116" name="_ftnref116"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[115]</span></span></span></a> The former apportions some fraction of total value to intellectual property assets by setting the value of intangible assets equal to the value of a firm minus the firm’s monetary and tangible assets from to determine the value of the intangible assets.<a href="#_ftn117" name="_ftnref117"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[116]</span></span></span></a> The latter apportions some fraction of total earnings of a firm, based upon various factors, to intellectual property assets.<a href="#_ftn118" name="_ftnref118"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[117]</span></span></span></a></p>
<p class="MsoNormal" style="text-align:justify; "><b>Option Methods<br /></b>This approach views an investment in intellectual property as an option to develop the intellectual property further, or to abandon the intellectual property, depending upon future technical and market information.<a href="#_ftn119" name="_ftnref119"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[118]</span></span></span></a></p>
<p class="MsoNormal" style="text-align:justify; "><b>Competitive Advantage Valuation (R)<br /></b>The major premise of the CAV method is that intellectual property assets have no inherent value; the value of intellectual property assets resides entirely in the value of the tangible assets which incorporate them.<a href="#_ftn120" name="_ftnref120"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[119]</span></span></span></a> The minor premise of the CAV method is that the value of a given intellectual property asset can best be measured by the competitive advantage which that asset contributes to a product, process, or service.<a href="#_ftn121" name="_ftnref121"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[120]</span></span></span></a> In its most general form, CAV method consists of following six basic steps<a href="#_ftn122" name="_ftnref122"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[121]</span></span></span></a>:</p>
<ol>
<li style="text-align: justify; ">The intellectual property asset to be valued (IPA) is associated with a product and the product’s net present value is calculated.</li>
<li style="text-align: justify; ">The product's net present value is apportioned among tangible assets, intangible advantages and intellectual property assets. (There are three groups of intellectual property assets: technical [utility patents, functional software copyrights and technical trade secrets]; reputational [trademarks, service marks and brand names]; and operational [business method patents and proprietary business processes].</li>
<li style="text-align: justify; ">The product is associated with competition parameters which can be used to compare the product to substitute products and competition parameter weights are calculated. (There are three groups of competition parameters: technical [price and performance], reputational [recognition and impression], and operational [cost and efficiency]. Weights are calculated for each parameter group and for individual parameters within each group).</li>
<li style="text-align: justify; ">The IPA is associated with an individual competition parameter and the IPA's competitive advantage relative to substitute intellectual property assets is calculated. (Substitute intellectual property assets are assets which are incorporated in substitute products and associated with the same competition parameter as the IPA).</li>
<li style="text-align: justify; "><span> </span>The IPA is associated with complementary intellectual property assets and the IPA's competitive advantage relative to complementary intellectual property assets is calculated. (Complementary intellectual property assets are assets which are incorporated in the same product and associated with the same parameter group as the IPA).</li>
<li style="text-align: justify; "><span> </span>The value of the IPA is calculated by apportioning a share of the product's intellectual property asset value to the IPA based upon the IPA's competitive advantage contribution relative to substitute and complementary intellectual property assets. If the IPA is associated with multiple products, the IPA's relative competitive advantage contribution to each product is calculated and these contributions are summed to calculate the total value of the IPA. If the IPA is associated with multiple parameters, the IPA's relative competitive advantage contribution for each parameter is calculated and these contributions are summed to calculate the total value of the IPA.</li>
</ol>
<p><b>Georgia Pacific<br /></b>The fifteen factors enumerated in the Georgia Pacific case, several of which repeat approaches discussed above, are used in royalty rate determination:<a href="#_ftn123" name="_ftnref123"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[122]</span></span></span></a></p>
<ul>
</ul>
<ol>
<li style="text-align: justify; "><span> </span>The royalties received by the patentee for the licensing of the patent in suit, proving or tending to prove an established royalty.</li>
<li style="text-align: justify; "><span> </span>The rates paid by the licensee for the use of other patents comparable to the patent in suit.</li>
<li style="text-align: justify; "><span> </span>The nature and scope of the license, as exclusive or non-exclusive; or as restricted or non-restricted in terms of territory or with respect to whom the manufactured product may be sold.</li>
<li style="text-align: justify; "><span> </span>The licensor’s established policy and marketing program to maintain its patent monopoly by not licensing others to use the invention or by granting licenses under special conditions designed to preserve that monopoly.</li>
<li style="text-align: justify; "><span> </span>The commercial relationship between the licensor and licensee, such as, whether they are competitors in the same territory in the same line of business; or whether they are inventor and promoter.</li>
<li style="text-align: justify; "><span> </span>The effect of selling the patented specialty in promoting sales of other products of the licensee; the existing value of the invention to the licensor as a generator of sales of its non-patented items; and the extent of such derivative or convoyed sales.</li>
<li style="text-align: justify; "><span> </span>The duration of the patent and the term of the license.</li>
<li style="text-align: justify; "><span> </span>The established profitability of the product made under the patent; its commercial success; and its current popularity.</li>
<li style="text-align: justify; "><span> </span> The utility and advantages of the patent property over the old modes or devices, if any, that had been used for working out similar results.</li>
<li style="text-align: justify; "><span> </span>The nature of the patented invention; the character of the commercial embodiment of it as owned and produced by the licensor; and the benefits to those who have used the invention.</li>
<li style="text-align: justify; "><span> </span>The extent to which the infringer has made use of the invention; and any evidence probative of the value of that use.</li>
<li style="text-align: justify; "><span> </span>The portion of the profit or of the selling price that may be customary in the particular business or in comparable businesses to allow for the use of the invention or analogous inventions.</li>
<li style="text-align: justify; "><span> </span>The portion of the realizable profit that should be credited to the invention as distinguished from non-patented elements, the manufacturing process, business risks, or significant features or improvements added by the infringer.</li>
<li style="text-align: justify; "><span> </span>The opinion testimony of qualified experts.</li>
</ol>
<ul>
</ul>
<p class="MsoNormal" style="text-align:justify; "><span> </span>The amount that a licensor (such as the patentee) and a licensee (such as the infringer) would have agreed upon (at the time the infringement began) if both had been reasonably and voluntarily trying to reach an agreement; that is, the amount which a prudent licensee-which desired, as a business proposition, to obtain a license to manufacture and sell a particular article embodying the patented invention-would have been willing to pay as a royalty and yet be able to make a reasonable profit and which amount would have been acceptable by a prudent patentee who was willing to grant a license.</p>
<p class="MsoNormal" style="text-align:justify; ">Academics have prescribed modification to the approach towards these factors analyzing that the relevant questions in calculating a reasonable royalty fall into four basic categories: (1) whether the patentee in fact produces a product in the market; (2) the contribution made by the patented technology compared to the next best alternative; (3) the number and importance of other inputs necessary to make that technology work; and (4) evidence of how the market has actually valued the patent, to the extent it differs from the outcome of (1), (2), and (3).<a href="#_ftn124" name="_ftnref124"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[123]</span></span></span></a></p>
<h2><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>V. Patent Pool Examples<br /></span></span></span></h2>
<p class="MsoNormal" style="text-align:justify; ">The following discussion highlights certain aspects of patent pools from real world examples. These examples are restricted to the technological field. Study of these aspects is of value in understanding the concepts discussed hereinbefore.</p>
<h3 class="MsoNormal" style="text-align: justify; ">A. Manufacturers Aircraft Association (MAA)</h3>
<p class="MsoNormal" style="text-align:justify; ">The MAA was formed in 1917 in U.S.</p>
<p class="MsoNormal" style="text-align:justify; ">Apart from the “foundational” patents of Glenn Curtiss and the Wright Brothers, which had substantial royalty rates, most licensing was conducted on a royalty-free basis, with mutual forbearance from infringement suits as the real payment for the exchange.<a href="#_ftn125" name="_ftnref125"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[124]</span></span></span></a></p>
<p class="MsoNormal" style="text-align:justify; "><span>The MAA was open to anyone who wished to use the Wright-Curtiss designs for a $1000 initiation fee and a licensing fee of $200 per aircraft built; these funds were to be distributed primarily between the Wright and Curtiss interests until each received a sum of $2,000,000 or their key patents expired.<a href="#_ftn126" name="_ftnref126"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[125]</span></span></span></a> </span>MAA retained $ 25 (12.5%) to cover its administrative expenses, $ 135 (67.5%) was paid to the Wright-Martin Aircraft Corporation and $ 40 (20%) was paid to the Curtiss-Burgess Airplane & Motor Corporation.<a href="#_ftn127" name="_ftnref127"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[126]</span></span></span></a></p>
<p class="MsoNormal" style="text-align:justify; ">Patents added to the pool after its formation were divided into two classes- normal patents were licensed into the pool for all to use, with no special royalty payout going to the inventor or firm; exceptional patents earned ongoing royalties, in an amount determined by a formal arbitration procedure.<a href="#_ftn128" name="_ftnref128"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[127]</span></span></span></a></p>
<p class="MsoNormal" style="text-align:justify; "><span>The MAA also included a grant-back provision that applied to after-acquired patents.<a href="#_ftn129" name="_ftnref129"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[128]</span></span></span></a></span></p>
<p class="MsoNormal" style="text-align:justify; ">MAA’s members could license their patents to non-members if the terms were no more favorable than to members and any MAA member could withdraw at any time, but its patents in the pool at the time of withdrawal would remain.<a href="#_ftn130" name="_ftnref130"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[129]</span></span></span></a></p>
<h3><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>B. Moving Picture Experts Group (MPEG)</span></span></span></h3>
<p class="MsoNormal" style="text-align:justify; ">MPEG technology allows for transmission and storage of digital video and audio signals.<span> It was formed by the Trustees of Columbia University, Fujitsu Limited, General Instrument Corp., Lucent Technologies Inc., Matsushita Electric Industrial Co., Ltd., Mitsubishi Electric Corp., Philips Electronics N.C., Scientific Atlanta, Inc., and Sony Corp. in 1997. The patent pool for the MPEG-2 standard is administered by a common license administrator- MPEG-LA</span></p>
<p class="MsoNormal" style="text-align:justify; "><span>MPEG-LA is required to grant licenses to any potential licensees, without discrimination and at a reasonable royalty rate.</span></p>
<p class="MsoNormal" style="text-align:justify; ">MPEG LA offers a portfolio of MPEG-2 systems licenses with a fixed royalty for each licensed mobile MPEG-2 systems signal receiver and a different fixed royalty for all other MPEG-2 systems devices.<a href="#_ftn131" name="_ftnref131"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[130]</span></span></span></a> Additional patents, not included in the portfolio, are available for specific implementations.<a href="#_ftn132" name="_ftnref132"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[131]</span></span></span></a></p>
<p class="MsoNormal" style="text-align:justify; ">The pool offers a standardized five-year license to all prospective licensees.<a href="#_ftn133" name="_ftnref133"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[132]</span></span></span></a> The licensing royalties do not change if patents are added to the portfolio during the five-year licensing period, although the royalty rate may increase by up to 25% in a license renewal.<a href="#_ftn134" name="_ftnref134"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[133]</span></span></span></a> Each patent in the pool is valued equally.<a href="#_ftn135" name="_ftnref135"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[134]</span></span></span></a></p>
<p class="MsoNormal" style="text-align:justify; "><span>The license has a grant-back provision that requires the licensee to grant to the licensor and other portfolio licensees a nonexclusive license, under fair and reasonable terms and conditions, on any essential patent that the licensee has a right to license.<a href="#_ftn136" name="_ftnref136"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[135]</span></span></span></a> </span></p>
<p class="MsoNormal" style="text-align:justify; ">There exists a partial termination right given to licensors, who may request that MPEG-LA terminate the license of that licensor’s IPR to a particular licensee, if that licensee has sued the licensor for infringement of an MPEG-2 essential or “related” patent or refused to license a related patent on fair and reasonable terms.<a href="#_ftn137" name="_ftnref137"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[136]</span></span></span></a></p>
<h3 class="MsoNormal" style="text-align: justify; ">C. DVD</h3>
<p class="MsoNormal" style="text-align:justify; ">Sony, Philips and Pioneer organized the DVD3C patent pool in 1998 <span>for the licensing of patents that are “essential” to comply with the DVD-Video or DVD-ROM standard specifications.</span></p>
<p class="MsoNormal" style="text-align:justify; ">Royalty payments are allocated under guidelines set by the Ground Rules for Royalty</p>
<p class="MsoNormal" style="text-align:justify; ">Allocation rather than on subjective analysis by an expert.<a href="#_ftn138" name="_ftnref138"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[137]</span></span></span></a> The royalty rate in standard licenses is not related to fluctuations in the market price of a licensed product; also, the royalty rate is not computed on a per-patent basis and does not fluctuate as patents are added or removed, therefore, the same royalty rate is payable when using one essential patent as when using several.<a href="#_ftn139" name="_ftnref139"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[138]</span></span></span></a></p>
<p class="MsoNormal" style="text-align:justify; "><span>Hitachi</span><span>, Matsushita, Mitsubishi, Time Warner, Toshiba, and Victor organized the DVD6C patent pool in 1999 again for the licensing of patents that are “essential” to comply with the DVD-Video or DVD-ROM standard specifications.</span></p>
<p class="MsoNormal" style="text-align:justify; ">The DVD6C pool is also governed by the “Ground Rules for Royalty Allocation” guidelines.<a href="#_ftn140" name="_ftnref140"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[139]</span></span></span></a> The royalties are 4% of the net selling price of the product or U.S. $4.00 per product, whichever is higher. Royalties for DVD decoders are 4% of the net selling price of the product or U.S. $1.00 per product, whichever is higher.<a href="#_ftn141" name="_ftnref141"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[140]</span></span></span></a></p>
<p class="MsoNormal" style="text-align:justify; ">The DVD6C agreement contains a grant-back clause, which, requires licensees to grant each of the licensing companies of DVD6C (and their licensees) a non-exclusive license on fair, reasonable and non-discriminatory terms to use any of their patents that are deemed essential for the manufacture, use or sale of DVD Products; this grantback is restricted only to those DVD products actually licensed to the licensee.<a href="#_ftn142" name="_ftnref142"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[141]</span></span></span></a></p>
<h3 class="MsoNormal" style="text-align: justify; ">D. 3G Mobile Telephony</h3>
<p class="MsoNormal" style="text-align: justify; ">The 3G Patent Platform Partnership was formed in 1999. The purpose of the 3G Patent Platform Partnership is to allow for “fair, reasonable, and nondiscriminatory” access to rights essential for implementing the W-CDMA 3GPP standard.<a href="#_ftn143" name="_ftnref143"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[142]</span></span></span></a></p>
<p class="MsoNormal" style="text-align:justify; ">There are three form contracts associated with the Platform: the Framework Agreement, the Standard License, and the Interim License.<a href="#_ftn144" name="_ftnref144"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[143]</span></span></span></a> The Framework Agreement gives each member the choice either to license its essential patents according to the Standard License or to negotiate terms directly with a licensee.<a href="#_ftn145" name="_ftnref145"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[144]</span></span></span></a> The Standard License prescribes standardized royalties for licenses, to be determined by an independent commission.<a href="#_ftn146" name="_ftnref146"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[145]</span></span></span></a> If the patent owner foregoes the Standard License and fails to come to terms in bilateral negotiations, the Interim License comes into effect which has the same royalty terms as the Standard License.<a href="#_ftn147" name="_ftnref147"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[146]</span></span></span></a></p>
<h3 class="WordSection1">E. Bluetooth Special Interest Group (SIG)</h3>
<p class="MsoNormal" style="text-align:justify; ">The Bluetooth SIG was formed in 1997 to provide a technology for interconnection of mobile phones, computers, laptops, printers, PDAs, and other devices via a short-range radio frequency band; SIG oversees the development of Bluetooth standards and its licensing.<a href="#_ftn148" name="_ftnref148"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[147]</span></span></span></a></p>
<p class="MsoNormal" style="text-align:justify; ">SIG’s member companies are divided into three different classes- (1) promoter company, which are intensely engaged in the strategic and technical development of Bluetooth wireless technology; they include Agere, Ericsson, Intel, Lenovo, Microsoft, Motorola, Nokia, and</p>
<p class="MsoNormal" style="text-align:justify; ">Toshiba; (2) associate members, who are licensed to use Bluetooth specifications and trademarks; (3) adopted members, which use published specifications and trademarks, but do not influence the specification process, nor do they have early access to unpublished specifications.<a href="#_ftn149" name="_ftnref149"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[148]</span></span></span></a></p>
<p class="MsoNormal" style="text-align:justify; ">SIG licenses to member companies on a royalty-free basis, but, associate members pay an annual fee based on their company’s annual revenue, with “small” associates (less than $100 million USD/year) paying $7,500 USD/year and “large” associates (more than $100 million USD/year) paying $35,000 USD/year; adopted members are not required to pay an annual fee.<a href="#_ftn150" name="_ftnref150"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[149]</span></span></span></a></p>
<h2><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>VI. Conclusion<br /></span></span></span></h2>
<p class="MsoNormal" style="text-align:justify; ">As is evident, patent valuation and license fee determination are extremely subjective and case based. Moreover, their dynamics alter according to the situation, as in the context of patent pools. This dynamism is furthered by the fact that there are no strict or universal formulas or procedures which can be applied in such determinations. Furthermore, such determinations cannot be made in a vacuum but are subject to the cascading effect of a multitude of factors comprised of the holistic technological environment that may not be just restricted to the innovation in question.</p>
<div>
<hr align="left" size="1" width="100%" />
<div id="ftn2">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref2" name="_ftn2"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[1]</span></span></span></span></a><span> Krista L. Cox, The Medicines Patent Pool: Promoting Access and Innovation for Life-Saving Medicines Through Voluntary Licenses 4 Hastings Sci. & Tech. L.J. 293 (Summer, 2012) citing <i>IGWG Briefing Paper on Patent Pools: Collective Management of Intellectual Property--The Use of Patent Pools to Expand Access to Essential Medical Technologies</i>, Knowledge Ecology International, (June 3, 2007) quoting Robert P. Merges, Institutions for Intellectual Property Transactions: The Case of Patent Pools, in Expanding the Boundaries of Intellectual Property, Innovation Policy for the Knowledge Society 123 (Rochelle Cooper Dreyfuss et al. eds., 2001).</span></p>
</div>
<div id="ftn3">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref3" name="_ftn3"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[2]</span></span></span></span></a><span> Jer Rutton Kavasmaneck v Gharda Chemicals Ltd. and Ors. (Suit No.2932 of 2011; Decided On: 20.03.2012) Bombay H.C. (Intellectual Property Rights (IPRs) including the patent right is valuable right for all the commercial purposes. These intangible assets play important role in any financial assessment of the trade/commercial or the market. It changes from time to time, market to market, person to person based upon the situations. If valuation is always a complex and flexible issue and a matter of discussion and debate in business strategies. The patent valuation involves many described and undescribed elements).</span></p>
</div>
<div id="ftn4">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref4" name="_ftn4"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[3]</span></span></span></span></a><span>Robert P. Merges, Contracting into Liability Rules: Intellectual Property Rights and Collective Rights Organizations 84 Calif. L. Rev. 1293 (October 1996) citing Standard Oil Co. v. United States, 283 U.S. 163, 171 (1931). </span></p>
</div>
<div id="ftn5">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref5" name="_ftn5"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[4]</span></span></span></span></a><span> Michael S. Kramer, Valuation and Assessment of Patents and Patent Portfolios Through Analytical Techniques 6 J. Marshall Rev. Intell. Prop. L. 463 (Spring, 2007). </span></p>
</div>
<div id="ftn6">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref6" name="_ftn6"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[5]</span></span></span></span></a><span> Richard J. Gilbert, Ties That Bind: Policies to Promote (Good) Patent Pools 77 Antitrust L.J. 1 (2010) MPEG LA Business Review Letter from Joel I. Klein, Ass’t Att’y Gen., U.S. Dep’t of Justice, to Garrard R. Beeney, Esq., Sullivan & Cromwell LLP (June 26, 1997), available at http://www.usdoj.gov/atr/public/busreview/215742.pdf; MPEG LA, MPEG-2 Patent Portfolio License Briefing (Aug. 4, 2010).</span></p>
</div>
<div id="ftn7">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref7" name="_ftn7"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[6]</span></span></span></span></a><span> See Kramer, <i>supra</i> n.4 at 463 (essential patents of technical standards are more valuable, on average, than the general population of patents).</span></p>
</div>
<div id="ftn8">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref8" name="_ftn8"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[7]</span></span></span></span></a><span> Gilbert, <i>supra</i> n.5.</span></p>
</div>
<div id="ftn9">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref9" name="_ftn9"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[8]</span></span></span></span></a><span> <i>Id.</i></span></p>
</div>
<div id="ftn10">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref10" name="_ftn10"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[9]</span></span></span></span></a><span> <i>Id.</i> </span></p>
</div>
<div id="ftn11">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref11" name="_ftn11"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[10]</span></span></span></span></a><span> <i>Id.</i>citing DVD 3C Business Review Letter from Joel I. Klein, Ass't Att'y Gen., U.S. Dep't of Justice, to Garrard R. Beeney, Esq., Sullivan & Cromwell LLP (Dec. 16, 1998), available at http://www.usdoj.gov/atr/public/busreview/2121.pdf.</span></p>
</div>
<div id="ftn12">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref12" name="_ftn12"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[11]</span></span></span></span></a><span>R. Justin Koscher, A Patent Pool's White Knight: Individual Licensing Agreements And The Procompetitive Presumption 20 DePaul J. Art Tech. & Intell. Prop. L. 53 (Fall, 2009). </span></p>
</div>
<div id="ftn13">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref13" name="_ftn13"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[12]</span></span></span></span></a><span> Daniel Lin, Research versus Development: Patent Pooling, Innovation And Standardization In The Software Industry 1 J. Marshall Rev. Intell. Prop. L. 274 (2002).</span></p>
</div>
<div id="ftn14">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref14" name="_ftn14"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[13]</span></span></span></span></a><span> Steven C. Carlson, Patent Pools and the Antitrust Dilemma 16 Yale J. on Reg. 359 (Summer, 1999).</span></p>
</div>
<div id="ftn15">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref15" name="_ftn15"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[14]</span></span></span></span></a><span> <i>Id.</i> </span></p>
</div>
<div id="ftn16">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref16" name="_ftn16"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[15]</span></span></span></span></a><span> <i>Id.</i></span></p>
</div>
<div id="ftn17">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref17" name="_ftn17"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[16]</span></span></span></span></a><span> <i>Id.</i></span></p>
</div>
<div id="ftn18">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref18" name="_ftn18"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[17]</span></span></span></span></a><span> <i>Id.</i></span></p>
</div>
<div id="ftn19">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref19" name="_ftn19"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[18]</span></span></span></span></a><span> <i>Id.</i></span></p>
</div>
<div id="ftn20">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref20" name="_ftn20"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[19]</span></span></span></span></a><span> <i>Id.</i> </span></p>
</div>
<div id="ftn21">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref21" name="_ftn21"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[20]</span></span></span></span></a><span> Michael A. Sanzo, Antitrust Law And Patent Misconduct In The Proprietary Drug Industry 39 Vill. L. Rev. 1209 (1994). </span></p>
</div>
<div id="ftn22">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref22" name="_ftn22"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[21]</span></span></span></span></a><span> Gilbert, <i>supra</i> n.5. </span></p>
</div>
<div id="ftn23">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref23" name="_ftn23"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[22]</span></span></span></span></a><span> Carlson, <i>supra</i> n.13. </span></p>
</div>
<div id="ftn24">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref24" name="_ftn24"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[23]</span></span></span></span></a><span> Philip B. Nelson, Patent Pools: An Economic Assessment Of Current Law And Policy 38 Rutgers L. J. 539 (Winter, 2007). </span></p>
</div>
<div id="ftn25">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref25" name="_ftn25"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[24]</span></span></span></span></a><span> Gilbert, <i>supra</i> n.5.</span></p>
</div>
<div id="ftn26">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref26" name="_ftn26"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[25]</span></span></span></span></a><span> <i>Id.</i> </span></p>
</div>
<div id="ftn27">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref27" name="_ftn27"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[26]</span></span></span></span></a><span> Carlson, <i>supra</i> n.13.</span></p>
</div>
<div id="ftn28">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref28" name="_ftn28"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[27]</span></span></span></span></a><span> Gilbert, <i>supra</i> n.5.</span></p>
</div>
<div id="ftn29">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref29" name="_ftn29"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[28]</span></span></span></span></a><span> Nelson, <i>supra</i> n.23.</span></p>
</div>
<div id="ftn30">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref30" name="_ftn30"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[29]</span></span></span></span></a><span> David S. Taylor, The Sinking Of The United States Electronics Industry Within Japanese Patent Pools 26 GW J. Int'l L. & Econ. 181 (1992). </span></p>
</div>
<div id="ftn31">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref31" name="_ftn31"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[30]</span></span></span></span></a><span> <i>Id.</i></span></p>
</div>
<div id="ftn32">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref32" name="_ftn32"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[31]</span></span></span></span></a><span> Michael J. Meurer, Business Method Patents and Patent Floods 8 Wash. U. J.L. & Pol'y 309 (2002).</span></p>
</div>
<div id="ftn33">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref33" name="_ftn33"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[32]</span></span></span></span></a><span> Mark A. Lemley & Carl Shapiro, Frontiers of Intellectual Property: Patent Holdup and Royalty Stacking 85 Tex. L. Rev. 1991 (June, 2007). </span></p>
</div>
<div id="ftn34">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref34" name="_ftn34"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[33]</span></span></span></span></a><span> Meurer, <i>supra</i> n.31 (A patent flood occurs when many inventors apply for patents on similar inventions during an interval of a few years).</span></p>
</div>
<div id="ftn35">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref35" name="_ftn35"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[34]</span></span></span></span></a><span> <i>Id.</i></span></p>
</div>
<div id="ftn36">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref36" name="_ftn36"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[35]</span></span></span></span></a><span> Robert P. Greenspoon and Catherine M. Cottle, Don't Assume A Can Opener: Confronting Patent Economic Theories With Licensing And Enforcement Reality 12 Colum. Sci. & Tech. L. Rev. 194 (2011). </span></p>
</div>
<div id="ftn37">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref37" name="_ftn37"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[36]</span></span></span></span></a><span> Meurer, <i>supra</i> n.31. </span></p>
</div>
<div id="ftn38">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref38" name="_ftn38"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[37]</span></span></span></span></a><span> Gilbert <i>supra</i> n.5 citing the cross-licensing arrangement between the Singer Manufacturing Company and Gegauf, contained provisions by which each of the parties agreed not to bring any infringement action against the other. United States v. Singer Mfg. Co., 374 U.S. 174, 178 (1963).</span></p>
</div>
<div id="ftn39">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref39" name="_ftn39"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[38]</span></span></span></span></a><span> Gilbert <i>supra</i> n.5.</span></p>
</div>
<div id="ftn40">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref40" name="_ftn40"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[39]</span></span></span></span></a><span> Kramer, <i>supra</i> n.4. </span></p>
</div>
<div id="ftn41">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref41" name="_ftn41"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[40]</span></span></span></span></a><span> <i>Id.</i></span></p>
</div>
<div id="ftn42">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref42" name="_ftn42"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[41]</span></span></span></span></a><span> <i>Id.</i></span></p>
</div>
<div id="ftn43">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref43" name="_ftn43"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[42]</span></span></span></span></a><span> Jorge L. Contreras, Standards, Patents, and the National Smart Grid 32 Pace L. Rev. 641 (Summer Issue, 2012). </span></p>
</div>
<div id="ftn44">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref44" name="_ftn44"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[43]</span></span></span></span></a><span> Gilbert, <i>supra</i> n.5 (To the extent that a patent pool successfully lowers total royalties relative to independent licensing, this leaves ‘headroom’ available for an independent licensor outside the pool to charge a high royalty for its patent).</span></p>
</div>
<div id="ftn45">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref45" name="_ftn45"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[44]</span></span></span></span></a><span> <i>Id.</i><i> </i>citing Multimedia Patent Trust v. Microsoft Corp., et al., 525 F. Supp. 2d 1200 (S.D. Cal. 2007). </span></p>
</div>
<div id="ftn46">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref46" name="_ftn46"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[45]</span></span></span></span></a><span> Chase A. Marshall, A Comparative Analysis: Current Solutions To The Anticommons Threat 12 J. High Tech. L. 487 (2012); Damien Geradin and Anne Layne-Farrar, Patent Value Apportionment Rules for Complex, Multi-Patent Products 27 Santa Clara Computer & High Tech. L.J. 763 (2010 / 2011) (the typical semiconductor chip likely involves hundreds, perhaps more, patents. In turn, that chip may be intended for use in a laptop computer, the other components of which involve hundreds, or more, patents. Without knowing how many patents actually read on a product, and how many have holders who will actively seek licensing fees, it can be exceedingly difficult to assign the contributed value to those that are known). </span></p>
</div>
<div id="ftn47">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref47" name="_ftn47"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[46]</span></span></span></span></a><span> Gideon Parchomovsky and R. Polk Wagner, Patent Portfolios 154 U. Pa. L. Rev. 1 (November, 2005); Elizabeth M. Bailey, Gregory K. Leonard and Mario A. Lopez, Making Sense Of “Apportionment” In Patent Damages 12 Colum. Sci. & Tech. L. Rev. 255 (2011) (combining patented technologies typically creates value that is greater than the sum of the parts. For example, patent pools often bring together various technologies that are necessary to create the product in question. The stand-alone value of any one patent in the pool may be low or close to zero unless combined with the other patents in the pool). </span></p>
</div>
<div id="ftn48">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref48" name="_ftn48"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[47]</span></span></span></span></a><span> Parchomovsky and Wagner, <i>supra</i> n.46.</span></p>
</div>
<div id="ftn49">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref49" name="_ftn49"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[48]</span></span></span></span></a><span> <i>Id.</i> </span></p>
</div>
<div id="ftn50">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref50" name="_ftn50"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[49]</span></span></span></span></a><span> <i>Id.</i> </span></p>
</div>
<div id="ftn51">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref51" name="_ftn51"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[50]</span></span></span></span></a><span> <i>Id.</i></span></p>
</div>
<div id="ftn52">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref52" name="_ftn52"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[51]</span></span></span></span></a><span> Scott Iyama, The USPTO's Proposal of a Biological Research Tool Patent Pool Doesn't Hold Water 57 Stan. L. Rev. 1223 (March, 2005). </span></p>
</div>
<div id="ftn53">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref53" name="_ftn53"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[52]</span></span></span></span></a><span> Bradley J. Levang, Evaluating the Use of Patent Pools For Biotechnology: A Refutation to the USPTO White Paper Concerning Biotechnology Patent Pools 19 Santa Clara Computer & High Tech. L.J. 229 (December, 2002). </span></p>
</div>
<div id="ftn54">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref54" name="_ftn54"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[53]</span></span></span></span></a><span> Courtney C. Scala, Making the Jump From Gene Pools to Patent Pools: How Patent Pools Can Facilitate the Development of Pharmacogenomics 41 Conn. L. Rev. 1631 (July, 2009). </span></p>
</div>
<div id="ftn55">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref55" name="_ftn55"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[54]</span></span></span></span></a><span> <i>Id.</i></span></p>
</div>
<div id="ftn56">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref56" name="_ftn56"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[55]</span></span></span></span></a><span> <i>Id.</i></span></p>
</div>
<div id="ftn57">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref57" name="_ftn57"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[56]</span></span></span></span></a><span> R. Justin Koscher, A Patent Pool's White Knight: Individual Licensing Agreements And The Procompetitive Presumption 20 DePaul J. Art Tech. & Intell. Prop. L. 53 (Fall, 2009) citing DVD-6 Business Review Letter from Joel I. Klein, Assistant Attorney General, to Carey R. Ramos, Esq., of Paul, Weiss, Rifkind, Wharton & Garrison (June 10, 1999), available at http://www.usdoj.gov/atr/public/busreview/2485.htm.</span></p>
</div>
<div id="ftn58">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref58" name="_ftn58"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[57]</span></span></span></span></a><span> Alexander Lee, Examining the Viability of Patent Pools for the Growing Nanotechnology Patent Thicket, 3 Nanotechnology L. & Bus. 317 (2006) suggests that to determine the viability of using a patent pool in a market, companies should ponder the following list of nine criteria: (1) product development driven by standards; (2) moderate fragmentation of patent landscape; (3) at least five pool members; (4) each member working on specific subcomponent of a product; (5) willingness of patent holders to negotiate; (6) commitment by members to create the pool; (7) an industry that is in the later stages of product development; (8) certainty of patent ownership; and (9) a patent pool clear of potential antitrust violations.</span></p>
</div>
<div id="ftn59">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref59" name="_ftn59"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[58]</span></span></span></span></a><span> See Gilbert, <i>supra</i> n.5 discussing the Manufacturers Aircraft Association, where the U.S. government used the threat of compulsory licensing to compel the pioneers of the aircraft industry to form a patent pool in 1917. The industry was enmeshed in litigation over the scope and validity of patents, and some patentees, particularly the Wright-Martin Company, were demanding royalties that the government and other aircraft manufacturers deemed excessive. Creation of the Manufacturers Aircraft Association patent pool resolved the litigation chaos. The government negotiated a portfolio license from the pool with a royalty of $ 200 per aircraft, which was a fraction of the royalty that Wright-Martin was demanding for a single patent ($ 1,000 per aircraft). </span></p>
</div>
<div id="ftn60">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref60" name="_ftn60"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[59]</span></span></span></span></a><span> See Carlson, <i>supra</i> n.13 discussing that pool agreements are frequently employed as a means of settling existing litigation, and citing examples including patent pools in the laser eye surgery, and the public key encryption industries;</span></p>
<p class="MsoNormal" style="text-align:justify; "><span>also see Lemley & Shapiro, Frontiers of Intellectual Property, <i>supra</i> n.32 discussing that the average royalty rate granted in all reasonable-royalty cases is 13.13% of the price of the infringing product, which is much higher than that of patent licenses negotiated without litigation.</span></p>
</div>
<div id="ftn61">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref61" name="_ftn61"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[60]</span></span></span></span></a><span> See Greenspoon and Cottle, <i>supra</i> n.35 discussing the value of patents as a form of currency that can be used to further goals unrelated to market creation or entry. Such goals can be to improve a firm's competitive position when trying to acquire start-up funds, to improve negotiating terms when licensing other patents, and to reduce the chance of paying excessive royalties to external patent owners;</span></p>
<p class="MsoNormal" style="text-align:justify; "><span>also see, Gilbert, <i>supra</i> n.5 discussing how different business strategies can cause firms to pool their patents with some firms, but not with others, citing the example of emergence of two pools to license DVD patents as a consequence of differing approaches to industry standards. One explanation offered for the existence of two separate pools is that the two groups could not reach an accord about their respective shares of joint royalty payments. </span></p>
</div>
<div id="ftn62">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref62" name="_ftn62"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[61]</span></span></span></span></a><span> See Gilbert, <i>supra</i> n.5 discussing how some pools license their patents royalty-free or at royalties that are deliberately held below profit-maximizing levels in an effort to promote adoption of new technologies covered by their patents, citing the example of the Bluetooth Special Interest Group and the Multimedia Home Platform. The article also discusses patent pools formed to license patents that are necessary to implement a defined standard, such as MPEG encoding, DVDs, or mobile telephony. </span></p>
</div>
<div id="ftn63">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref63" name="_ftn63"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[62]</span></span></span></span></a><span> See Gilbert, <i>supra</i> n.5 discussing pools that limit royalties to promote social objectives rather than to profit from new products citing examples of companies, universities, and research organizations such as Syngenta- an agricultural technology company, the Public Intellectual Property Resource for Agriculture, the SARS IP Working Group, and the UNITAID pool for AIDS medications.</span></p>
</div>
<div id="ftn64">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref64" name="_ftn64"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[63]</span></span></span></span></a><span> Yuichi Watanabe, Patent Licensing And The Emergence Of A New Patent Market 9 Hous. Bus. & Tax L.J. 445 (2009) (The current state of affairs shows that the patent licensing market strongly favors larger corporations over smaller ones, enabling the larger corporations to reap much of the market opportunities and benefits while limiting them to smaller patentees).</span></p>
</div>
<div id="ftn65">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref65" name="_ftn65"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[64]</span></span></span></span></a><span> Roger B. Andewelt, Practical Problems In Counseling And Litigating: Analysis Of Patent Pools Under The Antitrust Laws 53 Antitrust L.J. 611 (October 11, 1984/October 12, 1984) (Pools typically contain restrictions on those who join the pool by contributing patents and/or those who take licenses under the pooled patents).</span></p>
</div>
<div id="ftn66">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref66" name="_ftn66"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[65]</span></span></span></span></a><span>Chase A. Marshall, A Comparative Analysis: Current Solutions To The Anticommons Threat 12 J. High Tech. L. 487 (2012).</span></p>
</div>
<div id="ftn67">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref67" name="_ftn67"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[66]</span></span></span></span></a><span> Ann Weilbaecher, PSY.D., Diseases Endemic in Developing Countries: How to Incentivize Innovation 18 Ann. Health L. 281 (Summer, 2009).</span></p>
</div>
<div id="ftn68">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref68" name="_ftn68"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[67]</span></span></span></span></a><span> Greenspoon and Cottle, <i>supra</i> n.35 identify five general types of entities that license and enforce patents: (1) Individual inventors with a single patent; (2) Individual serial inventors; (3) Non-Practicing Entities; (4) Operating companies who practice inventions acquired from others; and (5) Operating companies who practice inventions developed in-house.</span></p>
</div>
<div id="ftn69">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref69" name="_ftn69"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[68]</span></span></span></span></a><span> See, Raymond Millien and Ron Laurie, A Survey Of Established & Emerging IP Business Models 9 Sedona Conf. J. 77 (2008) discussing various models, viz. Patent Licensing and Enforcement Companies, Institutional IP Aggregators/Acquisition Funds, IP/Technology Development Companies, Licensing Agents, Litigation Finance/Investment Firms, IP Brokers, IP-Based M&A Advisory Firms, IP Auction Houses, On-Line IP/Technology Exchanges, Clearinghouses, Bulletin Boards, and Innovation Portals, IP-Backed Lending, Royalty Stream Securitization Firms, Patent Rating Software and Valuation Services, University Technology Transfer Intermediaries, IP Transaction Exchanges & Trading Platforms/IP Transaction Best Practices Development Communities, Defensive Patent Pools, Funds and Alliances, Technology/IP Spinout Financing, and Patent-Based Public Stock Indexes.</span></p>
</div>
<div id="ftn70">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref70" name="_ftn70"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[69]</span></span></span></span></a><span> Richard J. Gilbert, Deal or No Deal? Licensing Negotiations In Standard-Setting Organizations 77 Antitrust L.J. 855 (2011).</span></p>
</div>
<div id="ftn71">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref71" name="_ftn71"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[70]</span></span></span></span></a><span> Gilbert, <i>supra</i> n.5 </span></p>
</div>
<div id="ftn72">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref72" name="_ftn72"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[71]</span></span></span></span></a><span> Merges, Contracting into Liability Rules, <i>supra</i> n.3. </span></p>
</div>
<div id="ftn73">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref73" name="_ftn73"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[72]</span></span></span></span></a><span> Alan Devlin, Standard-Setting And The Failure Of Price Competition 65 N.Y.U. Ann. Surv. Am. L. 217 (2009) citing Brulotte v. Thys Co., 379 U.S. 29, 33 (1964). </span></p>
</div>
<div id="ftn74">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref74" name="_ftn74"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[73]</span></span></span></span></a><span>Doug Lichtman, Understanding The Rand Commitment 47 Hous. L. Rev. 1023 (2010). </span></p>
</div>
<div id="ftn75">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref75" name="_ftn75"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[74]</span></span></span></span></a><span> Peter N. Detkin, Leveling The Patent Playing Field 6 J. Marshall Rev. Intell. Prop. L. 636 (Summer, 2007). </span></p>
</div>
<div id="ftn76">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref76" name="_ftn76"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[75]</span></span></span></span></a><span> Lee, <i>infra</i> n.57. </span></p>
</div>
<div id="ftn77">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref77" name="_ftn77"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[76]</span></span></span></span></a><span> Kelce Wilson, The Four Phases of Patent Usage 40 Cap. U.L. Rev. 679 (Summer, 2012). </span></p>
</div>
<div id="ftn78">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref78" name="_ftn78"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[77]</span></span></span></span></a><span>Gavin D. George, What is Hiding in the Bushes? eBay's Effect on Holdout Behavior in Patent Thickets, 13 Mich. Telecomm. Tech. L. Rev. 557 (2007). </span></p>
</div>
<div id="ftn79">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref79" name="_ftn79"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[78]</span></span></span></span></a><span> <i>Id.</i></span></p>
</div>
<div id="ftn80">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref80" name="_ftn80"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[79]</span></span></span></span></a><span> <i>Id</i></span></p>
</div>
<div id="ftn81">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref81" name="_ftn81"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[80]</span></span></span></span></a><span>Daniel R. Cahoy and Leland Glenna, Private Ordering and Public Energy Innovation Policy 36 Fla. St. U.L. Rev. 415 (Spring, 2009). </span></p>
</div>
<div id="ftn82">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref82" name="_ftn82"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[81]</span></span></span></span></a><span> Gilbert, <i>supra</i> n.5; See for example, Merges, Contracting into Liability Rules, <i>supra</i> n.3 describing how in the airplane cross-licensing agreement, it provides that a board of arbitrators may decide in any case what reward should be paid to individual patent owners and this is based not upon the official determination of patentability by the Patent Office, but upon the unofficial determination of the importance of the invention by a board of arbitrators.</span></p>
</div>
<div id="ftn83">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref83" name="_ftn83"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[82]</span></span></span></span></a><span> See Andewelt, <i>supra</i> n.64 (The scope and variety of patents included vary considerably from pool to pool. Some pools are limited to patents covering a single commercial device. Others contain numerous and diverse patents relating to different devices in different markets).</span></p>
</div>
<div id="ftn84">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref84" name="_ftn84"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[83]</span></span></span></span></a><span> See, Scala, <i>supra</i> n.53 discussing how the non-exclusive character of a license is particularly important for those firms holding patents whose full utility is unascertainable at the time of the formation of the pool.</span></p>
</div>
<div id="ftn85">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref85" name="_ftn85"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[84]</span></span></span></span></a><span> Dustin R. Szakalski, Progress In The Aircraft Industry And The Role Of Patent Pools And Cross-Licensing Agreements 2011 UCLA J.L. & Tech. 1 (Spring 2011). </span></p>
</div>
<div id="ftn86">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref86" name="_ftn86"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[85]</span></span></span></span></a><span> Ed Levy, et. al, Patent Pools And Genomics: Navigating A Course To Open Science? 16 B.U. J. SCI. & TECH. L. 75 (Winter, 2010). </span></p>
</div>
<div id="ftn87">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref87" name="_ftn87"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[86]</span></span></span></span></a><span> <i>Id.</i></span></p>
</div>
<div id="ftn88">
<p class="MsoFootnoteText" style="text-align:justify; "><a href="#_ftnref88" name="_ftn88"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[87]</span></span></span></a> Ted Hagelin, Technology and Legal Practice Symposium Issue: Valuation of Intellectual Property Assets: An Overview 52 Syracuse L. Rev. 1133 (2002) (The cost method of valuation measures the value of an asset by the cost to replace the asset with an identical or equivalent asset. The assumption underlying the cost method of valuation is that the cost to purchase or develop a new asset is commensurate with the economic value that the asset can provide during its life).</p>
</div>
<div id="ftn89">
<p class="MsoFootnoteText" style="text-align:justify; "><a href="#_ftnref89" name="_ftn89"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[88]</span></span></span></a> <i>Id.</i><i> </i>(The market method values an asset based upon comparable transactions between unrelated parties).</p>
</div>
<div id="ftn90">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref90" name="_ftn90"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[89]</span></span></span></span></a><span> <i>Id.</i> (The income method values an asset based upon the present value of the net economic benefit (net future income stream) expected to be received over the life of the asset).</span></p>
</div>
<div id="ftn91">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref91" name="_ftn91"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[90]</span></span></span></span></a><span> Sannu K. Shrestha, Trolls Or Market-Makers? An Empirical Analysis Of Nonpracticing Entities 110 Colum. L. Rev. 114 (January, 2010). </span></p>
</div>
<div id="ftn92">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref92" name="_ftn92"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[91]</span></span></span></span></a><i><span>Id.</span></i><span> </span></p>
</div>
<div id="ftn93">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref93" name="_ftn93"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[92]</span></span></span></span></a><span>Colleen V. Chien, From Arms Race to Marketplace: The Complex Patent Ecosystem and Its Implications for the Patent System 62 Hastings L.J. 297 (December, 2010). </span></p>
</div>
<div id="ftn94">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref94" name="_ftn94"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[93]</span></span></span></span></a><span> <i>Id.</i> </span></p>
</div>
<div id="ftn95">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref95" name="_ftn95"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[94]</span></span></span></span></a><span>R. Justin Koscher, A Patent Pool's White Knight: Individual Licensing Agreements And The Procompetitive Presumption 20 DePaul J. Art Tech. & Intell. Prop. L. 53 (Fall, 2009). </span></p>
</div>
<div id="ftn96">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref96" name="_ftn96"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[95]</span></span></span></span></a><span> Geradin and Layne-Farrar, <i>supra</i> n.45. </span></p>
</div>
<div id="ftn97">
<p class="MsoFootnoteText" style="text-align:justify; "><a href="#_ftnref97" name="_ftn97"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[96]</span></span></span></a> <i>Id.</i></p>
</div>
<div id="ftn98">
<p class="MsoFootnoteText" style="text-align:justify; "><a href="#_ftnref98" name="_ftn98"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[97]</span></span></span></a> <i>Id.</i></p>
</div>
<div id="ftn99">
<p class="MsoFootnoteText" style="text-align:justify; "><a href="#_ftnref99" name="_ftn99"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[98]</span></span></span></a> <i>Id.</i></p>
</div>
<div id="ftn100">
<p class="MsoFootnoteText" style="text-align:justify; "><a href="#_ftnref100" name="_ftn100"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[99]</span></span></span></a> <i>Id.</i></p>
</div>
<div id="ftn101">
<p class="MsoFootnoteText" style="text-align:justify; "><a href="#_ftnref101" name="_ftn101"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[100]</span></span></span></a> <i>Id.</i></p>
</div>
<div id="ftn102">
<p class="MsoFootnoteText" style="text-align:justify; "><a href="#_ftnref102" name="_ftn102"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[101]</span></span></span></a> <i>Id.</i></p>
</div>
<div id="ftn103">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref103" name="_ftn103"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[102]</span></span></span></span></a><span> Hagelin, <i>supra</i> n.87; also see, Geradin and Layne-Farrar, <i>supra</i> n.45.</span></p>
</div>
<div id="ftn104">
<p class="MsoFootnoteText" style="text-align:justify; "><a href="#_ftnref104" name="_ftn104"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[103]</span></span></span></a> <i>Id.</i></p>
</div>
<div id="ftn105">
<p class="MsoFootnoteText" style="text-align:justify; "><a href="#_ftnref105" name="_ftn105"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[104]</span></span></span></a> <i>Id.</i></p>
</div>
<div id="ftn106">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref106" name="_ftn106"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[105]</span></span></span></span></a><span> Geradin and Layne-Farrar, <i>supra</i> n.45. </span></p>
</div>
<div id="ftn107">
<p class="MsoFootnoteText" style="text-align:justify; "><a href="#_ftnref107" name="_ftn107"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[106]</span></span></span></a> <i>Id.</i></p>
</div>
<div id="ftn108">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref108" name="_ftn108"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[107]</span></span></span></span></a><span> Hagelin, <i>supra</i> n.87; also see, Geradin and Layne-Farrar, <i>supra</i> n.45.</span></p>
</div>
<div id="ftn109">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref109" name="_ftn109"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[108]</span></span></span></span></a><span> Geradin and Layne-Farrar, <i>supra</i> n.45. </span></p>
</div>
<div id="ftn110">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref110" name="_ftn110"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[109]</span></span></span></span></a><span> Malcolm T. "Ty" Meeks & Charles A. Eldering, PhD, Patent Valuation: Aren’t We Forgetting Something? Making the Case for Claims Analysis in Patent Valuation by Proposing a Patent Valuation Method and a Patent-Specific Discount Rate Using the CAPM 9 Nw. J. Tech. & Intell. Prop. 194 (Fall, 2010).</span></p>
</div>
<div id="ftn111">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref111" name="_ftn111"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[110]</span></span></span></span></a><span> Hagelin, <i>supra</i> n.87.</span></p>
</div>
<div id="ftn112">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref112" name="_ftn112"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[111]</span></span></span></span></a><span> <i>Id.</i></span></p>
</div>
<div id="ftn113">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref113" name="_ftn113"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[112]</span></span></span></span></a><span> Geradin and Layne-Farrar, <i>supra</i> n.45. </span></p>
</div>
<div id="ftn114">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref114" name="_ftn114"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[113]</span></span></span></span></a><span> Hagelin, <i>supra</i> n.87.</span></p>
</div>
<div id="ftn115">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref115" name="_ftn115"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[114]</span></span></span></span></a><span> <i>Id.</i>; Meeks & Eldering, <i>supra</i> n.109.</span></p>
</div>
<div id="ftn116">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref116" name="_ftn116"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[115]</span></span></span></span></a><span> Hagelin, <i>supra</i> n.87. </span></p>
</div>
<div id="ftn117">
<p class="MsoFootnoteText" style="text-align:justify; "><a href="#_ftnref117" name="_ftn117"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[116]</span></span></span></a> <i>Id.</i></p>
</div>
<div id="ftn118">
<p class="MsoFootnoteText" style="text-align:justify; "><a href="#_ftnref118" name="_ftn118"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[117]</span></span></span></a> <i>Id.</i></p>
</div>
<div id="ftn119">
<p class="MsoFootnoteText" style="text-align:justify; "><a href="#_ftnref119" name="_ftn119"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[118]</span></span></span></a> <i>Id.</i></p>
</div>
<div id="ftn120">
<p class="MsoFootnoteText" style="text-align:justify; "><a href="#_ftnref120" name="_ftn120"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[119]</span></span></span></a> <i>Id.</i></p>
</div>
<div id="ftn121">
<p class="MsoFootnoteText" style="text-align:justify; "><a href="#_ftnref121" name="_ftn121"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[120]</span></span></span></a> <i>Id.</i></p>
</div>
<div id="ftn122">
<p class="MsoFootnoteText" style="text-align:justify; "><a href="#_ftnref122" name="_ftn122"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[121]</span></span></span></a> <i>Id.</i></p>
</div>
<div id="ftn123">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref123" name="_ftn123"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[122]</span></span></span></span></a><span> Georgia-Pacific Corp. v. U.S. Plywood Corp., 318 F. Supp. 1116 (S.D.N.Y. 1970). </span></p>
</div>
<div id="ftn124">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref124" name="_ftn124"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[123]</span></span></span></span></a><span> Daralyn J. Durie and Mark A. Lemley, A Structured Approach To Calculating Reasonable Royalties 14 Lewis & Clark L. Rev. 627 (Summer, 2010). </span></p>
</div>
<div id="ftn125">
<p class="MsoFootnoteText" style="text-align:justify; "><a href="#_ftnref125" name="_ftn125"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[124]</span></span></span></a> Merges, Contracting into Liability Rules, <i>supra</i> n.3.</p>
</div>
<div id="ftn126">
<p class="MsoFootnoteText" style="text-align:justify; "><a href="#_ftnref126" name="_ftn126"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[125]</span></span></span></a> Michael Mattioli, Communities Of Innovation 106 Nw. U.L. Rev. 103 (Winter, 2012).</p>
</div>
<div id="ftn127">
<p class="MsoFootnoteText" style="text-align:justify; "><a href="#_ftnref127" name="_ftn127"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[126]</span></span></span></a> Szakalski, <i>supra</i> n.84.</p>
</div>
<div id="ftn128">
<p class="MsoFootnoteText" style="text-align:justify; "><a href="#_ftnref128" name="_ftn128"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[127]</span></span></span></a> Merges, Contracting into Liability Rules, <i>supra</i> n.3.</p>
</div>
<div id="ftn129">
<p class="MsoFootnoteText" style="text-align:justify; "><a href="#_ftnref129" name="_ftn129"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[128]</span></span></span></a> Mattioli, <i>supra</i> n.125.</p>
</div>
<div id="ftn130">
<p class="MsoFootnoteText" style="text-align:justify; "><a href="#_ftnref130" name="_ftn130"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[129]</span></span></span></a> Szakalski, <i>supra</i> n.84.</p>
</div>
<div id="ftn131">
<p class="MsoFootnoteText" style="text-align:justify; "><a href="#_ftnref131" name="_ftn131"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[130]</span></span></span></a> Gilbert, <i>supra</i> n.5.</p>
</div>
<div id="ftn132">
<p class="MsoFootnoteText" style="text-align:justify; "><a href="#_ftnref132" name="_ftn132"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[131]</span></span></span></a> Carlson, <i>supra</i> n.13.</p>
</div>
<div id="ftn133">
<p class="MsoFootnoteText" style="text-align:justify; "><a href="#_ftnref133" name="_ftn133"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[132]</span></span></span></a> <i>Id.</i></p>
</div>
<div id="ftn134">
<p class="MsoFootnoteText" style="text-align:justify; "><a href="#_ftnref134" name="_ftn134"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[133]</span></span></span></a> <i>Id.</i></p>
</div>
<div id="ftn135">
<p class="MsoFootnoteText" style="text-align:justify; "><a href="#_ftnref135" name="_ftn135"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[134]</span></span></span></a> <i>Id.</i></p>
</div>
<div id="ftn136">
<p class="MsoFootnoteText"><a href="#_ftnref136" name="_ftn136"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[135]</span></span></span></a> Lin, <i>supra</i> n.12.</p>
</div>
<div id="ftn137">
<p class="MsoFootnoteText" style="text-align:justify; "><a href="#_ftnref137" name="_ftn137"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[136]</span></span></span></a> Dorothy Gill Raymond, Benefits and Risks Of Patent Pooling For Standard-Setting Organizations 16 Antitrust ABA 41 (Summer, 2002).</p>
</div>
<div id="ftn138">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref138" name="_ftn138"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[137]</span></span></span></span></a><span> David Serafino, Survey of Patent Pools Demonstrates Variety of Purposes and Management Structures, KEI Research Note 2007:6, Knowledge Ecology International, 4 June 2007.</span></p>
</div>
<div id="ftn139">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref139" name="_ftn139"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[138]</span></span></span></span></a><span> <i>Id.</i> </span></p>
</div>
<div id="ftn140">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref140" name="_ftn140"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[139]</span></span></span></span></a><span> <i>Id.</i></span></p>
</div>
<div id="ftn141">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref141" name="_ftn141"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[140]</span></span></span></span></a><span> <i>Id.</i></span></p>
</div>
<div id="ftn142">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref142" name="_ftn142"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[141]</span></span></span></span></a><span> <i>Id.</i></span></p>
</div>
<div id="ftn143">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref143" name="_ftn143"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[142]</span></span></span></span></a><span> <i>Id.</i></span></p>
</div>
<div id="ftn144">
<p class="MsoFootnoteText" style="text-align:justify; "><a href="#_ftnref144" name="_ftn144"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[143]</span></span></span></a> Michael R. Franzinger, Latent Dangers in a Patent Pool: The European Commission's Approval of the 3G Wireless Technology Licensing Agreements 91 Calif. L. Rev. 1693 (December, 2003).</p>
</div>
<div id="ftn145">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref145" name="_ftn145"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[144]</span></span></span></span></a><span> <i>Id.</i></span></p>
</div>
<div id="ftn146">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref146" name="_ftn146"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[145]</span></span></span></span></a><span> <i>Id.</i></span></p>
</div>
<div id="ftn147">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref147" name="_ftn147"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[146]</span></span></span></span></a><span> <i>Id.</i></span></p>
</div>
<div id="ftn148">
<p class="MsoNormal" style="text-align:justify; "><a href="#_ftnref148" name="_ftn148"><span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span>[147]</span></span></span></span></a><span> David Serafino, Survey of Patent Pools Demonstrates Variety of Purposes and Management Structures, KEI Research Note 2007:6, Knowledge Ecology International, 4 June 2007.</span></p>
</div>
<div id="ftn149">
<p class="MsoFootnoteText" style="text-align:justify; "><a href="#_ftnref149" name="_ftn149"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[148]</span></span></span></a> <i>Id.</i></p>
</div>
<div id="ftn150">
<p class="MsoFootnoteText" style="text-align:justify; "><a href="#_ftnref150" name="_ftn150"><span class="MsoFootnoteReference"><span class="MsoFootnoteReference"><span>[149]</span></span></span></a> <i>Id.</i></p>
</div>
</div>
<p>
For more details visit <a href='https://cis-india.org/a2k/blogs/patent-valuation-and-license-fee-determination-in-context-of-patent-pools'>https://cis-india.org/a2k/blogs/patent-valuation-and-license-fee-determination-in-context-of-patent-pools</a>
</p>
No publishervikrantFeaturedPatentsAccess to KnowledgePervasive Technologies2014-07-09T09:46:16ZBlog EntryGrounds for Compulsory Patent Licensing in United States, Canada, China, and India
https://cis-india.org/a2k/blogs/grounds-for-compulsory-patent-licensing-in-us-canada-china-and-india
<b>The research paper seeks to answer questions about the grounds of compulsory licensing in international treaties with specific examples from America and Asia. The grounds for granting compulsory licenses, jurisdictional comparison of compulsory licensing, etc., are examined. </b>
<p style="text-align: justify; ">Holding ownership to a patented invention means one has certain exclusive rights: a) the right to decide who may use the invention during the time of protection; b) the right to give licenses to other parties to use the invention on mutually agreed terms; and, c) the right to sell and transfer ownership of the patent to someone else<a href="#_ftn1" name="_ftnref1">[1]</a>. Once this patent expires, the invention would enter the public domain to be shared freely<a href="#_ftn2" name="_ftnref2">[2]</a>.</p>
<p style="text-align: justify; ">However, given certain conditions, a <i>compulsory license </i>can be granted, in which “authorization [is] given by national authority to a person without or against the consent of the titleholder, for the exploitation of a subject matter protected by a patent or other intellectual property rights” <a href="#_ftn3" name="_ftnref3">[3]</a>.</p>
<p style="text-align: justify; ">Compulsory licensing has been most contentiously applied for patented pharmaceutical companies who are often looking to recoup research and development costs. Proponents of this instrument are now also growing amongst advocates for climate change mitigation technologies <a href="#_ftn4" name="_ftnref4">[4]</a>. The Pervasive Technologies: Access to Knowledge in the Marketplace project is broadly assessing access to knowledge through sub-100 dollar devices. The accessibility of these critical technologies, and subsequent access to knowledge, information, and culture through these devices may be implicated by this policy lever<a href="#_ftn5" name="_ftnref5">[5]</a></p>
<p>Thus, this paper seeks to answer the following questions:</p>
<ol>
<li> What are the grounds for compulsory licensing set in international treaties?</li>
<li>How does Canada, United States (i.e. North America), India, and China (i.e. Asia) provide for compulsory licensing within its national laws? </li>
</ol>
<p style="text-align: justify; ">This will be done through first providing an overview of the relevant international treaties to understand the compulsory licensing framework which signatory nations must follow. Then, utilizing Correa (1999)'s study as a foundation, an analysis of the text within the four aforementioned's codified laws will be assessed to understand all the possible grounds compulsory licensing can be provided. This paper will conclude by summarizing any significant distinctions across the four jurisdictions.</p>
<p style="text-align: justify; "><b>Compulsory Patent Licensing in International Law and Regional Trade Agreements</b><br /><span>Paris Convention for the Protection of Industrial Property (1883)</span> <a href="#_ftn6" name="_ftnref6">[6]</a><br />Article 5(2) of the Paris Convention provides each country with the right to "grant compulsory licenses to prevent abuses which might result form the exercise of exclusive rights conferred by the patent… " United States, Canada, China, and India are four of the 175 contracting parties to this convention <a href="#_ftn7" name="_ftnref7">[7]</a>. This can only be done after 4 years of applying for the patent, or 3 years from the date in which the patent was granted. This means, a sufficient amount of time must have elapsed to allow the rights holder to exploit the invention.</p>
<p><b> </b></p>
<p style="text-align: justify; "><span>North American Free Trade Agreement (1994)<a href="#_ftn8" name="_ftnref8"><span>[8]</span></a></span><br />Article 1704 in NAFTA provides that "appropriate measures" can be taken to control abusive or anticompetitive practices. The United States and Canada have utilized this ground of anti-competition to grant numerous compulsory licenses. <br /> <br /> Article 1709 notes that there must not be a discrimination of technology – patents may only be revoked when the grant has not remedied lack of exploitation, and that the use of the patent adheres to certain criteria.</p>
<p style="text-align: justify; ">In 1993, Canada repealed the compulsory licensing regulations from its Patent Law to comply with the international TRIPS and NAFTA treaties.</p>
<p style="text-align: justify; "><span>Trade Related Aspects of Intellectual Property Rights (1994)</span> <a href="#_ftn9" name="_ftnref9">[9]</a><br />All members of the World Trade Organization is provided the right to use compulsory licenses via Article 31 <i>Other Use Without Authorization of the Right Holder </i>within the Trade Related Aspects of Intellectual Property Rights (TRIPs) agreement<i>. </i> This Article stipulates 12 procedural provisions: compulsory licensing should be granted on 'individual merits'<a href="#_ftn10" name="_ftnref10">[10]</a>, must have shown prior effort to obtain authorization under reasonable commercial terms <a href="#_ftn11" name="_ftnref11">[11]</a>, must be non-exclusive<a href="#_ftn12" name="_ftnref12">[12]</a>, adequate renumeration must be provided<a href="#_ftn13" name="_ftnref13">[13]</a>, and the license must be terminated as soon as the circumstances for which it was granted cease to exist<a href="#_ftn14" name="_ftnref14">[14]</a>.</p>
<p style="text-align: justify; ">Suggested, but not obligatory grounds for which compulsory licensing could be granted under the TRIPs agreement are a) emergency and extreme urgency, b) anticompetitive practices, c) public non-commercial use, and the d) use of dependent patents<a href="#_ftn15" name="_ftnref15">[15]</a>.</p>
<p style="text-align: justify; "><span>Doha Declaration on the TRIPS Agreement and Public Health (2001)</span><br />The Doha Declaration is a clarification of the earlier TRIPS agreement in response to some countries' public health concerns due to obstacles to accessing patented medicines.<a href="#_ftn16" name="_ftnref16">[16]</a></p>
<p style="text-align: justify; ">Paragraph 4 of the Doha Declaration expressly allows Members to take measures to protect public health, while paragraph 5b states that "each Member has the right to grant compulsory licenses and the freedom to determine the grounds upon which such licenses are granted". Freedom of each country to define the terms of their intellectual property rights is also further reiterated.</p>
<p style="text-align: justify; "><b>Grounds for granting compulsory licenses</b><br />Correa (1999) in his paper <i>Intellectual Property Rights and the Use of Compulsory License: Options for Developing Countries</i> outlines eight common grounds which provided the framework for this comparative analysis between the jurisdictions of the United States, Canada, India, and China. Through analyzing the codified law on compulsory licensing, a few other grounds were added to the list.</p>
<p style="text-align: justify; "><span>Refusal to deal</span><br />In principle, the patent owner has an exclusive right to determine whether or not to issue a license to a third party. However, if under reasonable terms, one still refuses to issue a license, national courts may interpret this as an abuse of patent rights, resulting in lack of availability of the product and commercial development. In the United States, this is often raised as an anticompetitive issue.</p>
<p style="text-align: justify; "><span>Non-working and inadequate supply</span><br />The "working obligation" was initially understood as the industrial use of an invention, which according to Article 31 of the TRIPs Agreement required working 'predominantly' for local markets. However, many countries have defined 'working' to include <b>commercial use </b>of the invention, in which importation of a product would suffice<a href="#_ftn17" name="_ftnref17">[17]</a>.</p>
<p style="text-align: justify; "><span>Public interest</span><br />The public interest needs to be balanced with individuals' rights, and it is the responsibility of the courts or administration in each respective country to determine this. Thus, what actually constitutes as "public interest" varies depending on time and jurisdiction. For example, countries with limited industrial development could consider a compulsory patent to develop its national industries as for public interest <a href="#_ftn18" name="_ftnref18">[18]</a>. Accessibility of a product at the lowest price have been argued to be in public interest, but some courts have ruled this to be invalid<a href="#_ftn19" name="_ftnref19">[19]</a></p>
<p style="text-align: justify; "><span>Anticompetitive practices</span><br />A patent is essentially a temporary monopoly meant to provide an economic reward for the inventor's work, as well as additional incentive to continue producing<a href="#_ftn20" name="_ftnref20">[20]</a>. However, excessive monopolization through unlawful or unfair practices, such as when a patent is overly broad, acquiring and accumulating patent portfolios, and subsequent patent trolling are some acts that be considered anticompetitive patent practices<a href="#_ftn21" name="_ftnref21">[21]</a>. Compulsory licenses have also been granted through this ground under anti-monopoly, antitrust, and competition laws.</p>
<p style="text-align: justify; "><span>Governmental use</span><br />Each country's government decides what is to be considered as governmental use. Occasionally synonymous to government use has also been <i>public, non-commercial use</i>, or as suggested by the TRIPs agreement, for the purposes of national emergency or urgency. This is assuming the government is acting on behalf of public interest; given its lack of an international standardized definition, this ground can be utilized and interpreted in other ways.</p>
<p style="text-align: justify; "><span>Facilitate use of dependent patents</span><br />When a new invention (dependent invention) cannot be developed without infringing on the license of an existing patented invention, (principle invention) a compulsory licensing can be granted to facilitate innovation. This ensures the patents of principle inventions would not block technical progress. The TRIPs agreement expressly allows this, provided reasonable compensation is articulated. In some jurisdictions, cross-licensing, (which involves a licensing agreement between two parties to exploit each other's intellectual property<a href="#_ftn22" name="_ftnref22">[22]</a>) can be negotiated to resolve this issue.</p>
<p style="text-align: justify; "><span>Compulsory licenses for medicines</span><br />Numerous countries have issued licenses for increased accessibility to food and medicine. Prior to the Doha Round, TRIPs prohibited this, as Article 27 states "national laws cannot discriminate in exercise of patent rights on the basis of field of technology". However, the Doha Declaration addressed this, allowing pharmaceuticals to have increased accessibility (via pricing, production, and importation) for the sake of public health.</p>
<p style="text-align: justify; "><span>Exclusive Grant Back or Coercive Package Licensing</span><br />A grant back can be agreed upon when there is an expectation of an improvement on the licensed technology through increased superiority or method <a href="#_ftn23" name="_ftnref23">[23]</a>. This allows the licensee to commercialize an improved product without having to file for another patent<a href="#_ftn24" name="_ftnref24">[24]</a>. Exclusive grant back provides the licensor the exclusive right to use or sublicense improvements, while licensee retains non-exclusive right to practice the improvements.<a href="#_ftn25" name="_ftnref25">[25]</a> Grant-backs, particularly exclusive ones are sometimes deemed as anticompetitive.</p>
<p style="text-align: justify; ">A package license, otherwise known as patent pools is used when the licensing of more than one patent is necessary to commercialize an invention <a href="#_ftn26" name="_ftnref26">[26]</a> Coercive package licensing can occur when the licensing of other patents within the package is forceful and unnecessary. The defining and interpretation of 'coercion' ultimately depends on each country's respective authorities. <span> </span></p>
<p style="text-align: justify; "><span>Hindrance from Importation of Abroad<a href="#_ftn27" name="_ftnref27"><span>[27]</span></a></span><br />This ground may fall under non-working, but is unique in that it notes a state's ability to grant compulsory license on behalf of a foreign-owned patent. Yang (2012) cites that this as one of the most controversial aspects of compulsory patent licensing, as countries may feel undermined when another state can grant compulsory licenses that are against their own interests<a href="#_ftn28" name="_ftnref28">[28]</a>.</p>
<p style="text-align: justify; "><b>Jurisdictional comparison of Compulsory Licensing</b><br />The following table was developed as an exercise to review compulsory licensing within the jurisdictions of the United States, Canada, India, and China. Utilizing Correa (1999)'s findings as a skeletal framework, the four aforementioned countries' codified patent laws were used to determine the grounds for compulsory licensing. The main compairson was done through analyzing the specific text within the laws of the four jurisdiction – one approach to treaty and law interpretation<a href="#_ftn29" name="_ftnref29">[29]</a> However, for those countries that were lacking general provisions on compulsory licensing (i.e. United States, and eventually Canada in 1993<a href="#_ftn30" name="_ftnref30">[30]</a>), there was a need to expand to a more comprehensive approach and look through other codified laws beyond patents and intellectual property, as well as through case law to see if the mentioned grounds have been used to provide for compulsory licenses<a href="#_ftn31" name="_ftnref31">[31]</a>.</p>
<table class="listing">
<tbody>
<tr>
<td colspan="2">
<p><b>Grounds</b></p>
</td>
<td>
<p><b>Countries</b></p>
</td>
<td colspan="2">
<p><b>Law</b></p>
</td>
</tr>
<tr>
<td colspan="2" rowspan="4">
<p>Refusal to deal and/or abuses of patentees' exclusive rights</p>
</td>
<td>
<p>U.S</p>
</td>
<td colspan="2">
<p style="text-align: justify; ">n/a in codified law…refusal to deal is an essential element of intellectual property rights…but can lead to anti-competition in which Antitrust laws can be used</p>
</td>
</tr>
<tr>
<td>
<p>Canada</p>
</td>
<td colspan="2">
<p style="text-align: justify; ">Patent Law - Abuse of Rights 65.2(d): <i>"<b>if by reason of refusal of patentee to grant</b> a license or licenses on reasonable terms…</i></p>
<p><i> </i></p>
</td>
</tr>
<tr>
<td>
<p>India</p>
</td>
<td colspan="2">
<p style="text-align: justify; ">Patent Act 1970 S.4(d) <b><i>"Refusal to deal"</i></b> <i> includes any agreement which restricts, or is likely to restrict, by any method the persons or classes of persons to whom goods are sold or from whom goods are bought </i></p>
<p><i> </i></p>
<p style="text-align: justify; ">Patent Act, 1970 S. 84.7(a) " <i> If by reason of refusal…ii) demand for the patented article <b>has not been met to an adequate extent or on reasonable terms</b>; or iii) </i> <i> a market for the patented article manufactured in India is n<b>ot being supplied or developed</b>; or iv) the establishment or <b>development of commercial activities in India is not prejudiced</b> </i></p>
<p><b><i> </i></b></p>
<p style="text-align: justify; ">Patent Act 1970 S.84 (6) " <i> …Controller shall take into account, - i) nature of invention, the time which has elapsed since the sealing of the patent and the measures already taken by the patentee or any licensee to make full use of the invention; iv) ..whether applicant has made efforts to obtain a license from the patentee on reasonable terms conditions, and such efforts have not been successful within a reasonable period <b>*period not ordinarily exceeding a period of six months*</b> as the Controller may deem fit </i></p>
<p><i> </i></p>
</td>
</tr>
<tr>
<td>
<p>China</p>
</td>
<td colspan="2">
<p style="text-align: justify; ">Patent Law of the People's Republic of China - Article 48 (1): " <i> When it has been 3 years since the date the patent right is granted, and four years since the date the patent application is submitted, the patentee, <b>without legitimate reasons,</b> fails to have the patent exploited or fully exploited" </i></p>
<p><i> </i></p>
</td>
</tr>
<tr>
<td colspan="2" rowspan="4">
<p>Non-working and inadequate supply</p>
<p><b> </b></p>
</td>
<td>
<p>U.S.</p>
</td>
<td colspan="2">
<p>n/a</p>
</td>
</tr>
<tr>
<td>
<p>Canada</p>
</td>
<td colspan="2">
<p style="text-align: justify; ">Patent Act 1935: s.65 a): "… <i> is <b>capable of being worked within Canada</b> <b>but is not being worked within Canada on a commercial scale</b>, and no satisfactory reason can be given for that <b>non-working</b>…" </i></p>
<p><b>REPEALED in 1993 due to NAFTA and TRIPS </b></p>
<p><b> </b></p>
</td>
</tr>
<tr>
<td>
<p>India</p>
</td>
<td colspan="2">
<p style="text-align: justify; ">Patents Act, 1970 S. 84 (1): " <i> At any time after expiration of 3 years from the date of the grant of a patent, any person interested may make an application… b)…not available to the public at a reasonably affordable price, or c) that the patented invention is <b>not available to the public at a reasonably affordable price</b> </i></p>
<p><b><i> </i></b></p>
<p style="text-align: justify; ">Patent Act 1970 S.84(2): "…<i>reasonable requirements of the public</i>.. <i>not satisfied or that the patented invention <b>is not worked in the territory of India</b>, </i></p>
<p><b><i> </i></b></p>
<p style="text-align: justify; "><i> Patent Act, 1970 S. 84.7(a) "If by reason of refusal…ii) demand for the patented article has not been met to an adequate extent or on reasonable terms; or iii) a market for the patented article manufactured in India is <b>not being supplied or developed</b>; or iv) the <b>establishment or development of commercial activities in India is not prejudiced</b> </i></p>
<p><i> </i></p>
<p style="text-align: justify; ">Patent Act, 1970 S. 84.7(d): " <i> If the patented invention is <b> not being worked in the territory of India on a commercial scale to an adequate extent, or is not being so worked to the fullest extent that is reasonably practicable </b> </i></p>
<p><b><i> </i></b></p>
</td>
</tr>
<tr>
<td>
<p>China</p>
</td>
<td colspan="2">
<p style="text-align: justify; ">Measures for Compulsory licensing of Patent Implementation (2012) - Ch 2 Art. 5: <i> "<b>If without good reason not implemented or fully implemented</b>, their licensing patent within 3 years from the date of grant of patent right..and 4 years from the date of filing patent" </i></p>
</td>
</tr>
<tr>
<td colspan="2">
<p>Public interest:</p>
<p><b> </b></p>
</td>
<td>
<p>U.S.</p>
</td>
<td colspan="2">
<p style="text-align: justify; ">"...no general provision allowing authorities to override patents in the larger public interest” <a href="#_ftn32" name="_ftnref32">[32]</a></p>
<p style="text-align: justify; ">Bayh-Dole Act of 1980 - allow government to exercise "march in" rights with regard to government funded research results that universities might otherwise patent</p>
<p style="text-align: justify; ">But US has granted compulsory licenses when felt public interest was at stake (Atomic Energy Act and Clean Air Act 1970, Federal Non-Nuclear Energy Research and Development Act 1973)</p>
</td>
</tr>
<tr>
<td>
<p>Canada</p>
</td>
<td colspan="3">
<p style="text-align: justify; ">Patent Law - Abuse of Rights 65.2(d): <i> "if by reason of refusal of patentee to grant a license or licenses on reasonable terms… <b>in public interest that license/licenses should be granted</b>" </i></p>
<p><b><i> </i></b></p>
<p>Patent Act S. 39. (3) License under patent relating to food: " <i> I<b>n the case of any patent…of food</b>…shall grant to any person applying…Commissioner shall have regard to the desirability of <b>making the food available to the public</b> at the lowest possible price consistent with giving to the inventor due reward for the research leading to the invention" <br /> </i> <b>REPEALED in 1993 due to NAFTA and TRIPS</b></p>
<p><b> </b></p>
</td>
<td></td>
</tr>
<tr>
<td>
<p>India</p>
</td>
<td colspan="3">
<p style="text-align: justify; ">Patent Act 1970, S. 84<i> (2)…<b>not available to the public </b>at a reasonably affordable price</i></p>
<p><i> </i></p>
<p style="text-align: justify; ">Patent Act 1970 S. 84 (6) " <i> …Controller shall take into account, ii) the ability of the applicant to work the invention<b> to the public advantage </b> </i></p>
<p><i> </i></p>
<p style="text-align: justify; ">Patent Act, 1970 - S. 92 Special provision for compulsory licenses on notifications by Central Government-(1): " <i> If Central Government is satisfied… <b>circumstances of national emergency or in circumstances of extreme urgency, or in case of public non commercial use</b>... </i></p>
<p><i> </i></p>
</td>
<td></td>
</tr>
<tr>
<td>
<p>China</p>
</td>
<td colspan="3">
<p style="text-align: justify; ">Patent Law - Article 49: " <i>Where a <b>national emergency or any extraordinary state of affairs occurs, or public interests so require…"</b></i></p>
<p style="text-align: justify; ">Measures for Compulsory Licensing of Patent Implementation - Article 6: <i>If <b>emergency or irregular event of the state</b>…<b>or for purposes of public interest</b></i></p>
<p><i> </i></p>
</td>
<td></td>
</tr>
<tr>
<td colspan="2" rowspan="2">
<p>Anti-competitive practices</p>
</td>
<td>
<p>U.S.</p>
</td>
<td colspan="2">
<p style="text-align: justify; ">Antitrust & Trade Law: Sherman Act 15 U.S. C.S. 2 - Monopolizing trade a felony; penalty: " <i> Every person who shall monopolize, or <b>a</b>t<b>tempt to monopolize…any part of trade or commerce </b>among several States, or with foreign nations…<b>deemed guilty of a felony, and conviction</b>.." </i></p>
<p><i> </i></p>
</td>
</tr>
<tr>
<td>
<p>Canada</p>
</td>
<td colspan="2">
<p style="text-align: justify; ">Competition Act (S. 32 RSC 1985): " <i> …where use has been made of exclusive rights and privileges conferred by one or more patents for invention…(a) <b> limit unduly the facilities for transporting, producing, manufacturing, supplying</b>…may be a subject of trade or commerce, (b) <b>restrain or injure, unduly, trade or commerce</b>…(c) <b>prevent, limit, or lessen, unduly, the manufacture or production</b>…or <b>unreasonably enhance the price</b> thereof, or (d) <b>prevent or lessen, unduly, competition in</b>… </i></p>
<p><i> </i></p>
</td>
</tr>
<tr>
<td>
<p>India</p>
</td>
<td colspan="3">
<p style="text-align: justify; ">India Patent Law Chapter 90 (1.ix) <i> Terms and Conditions of compulsory licenses… granted to <b>remedy a practice determined after judicial or administrative process to be anticompetitive</b>… </i></p>
</td>
<td></td>
</tr>
<tr>
<td>
<p>China</p>
</td>
<td colspan="3">
<p style="text-align: justify; ">Measures for Compulsory Licensing of Patent Implementation, 2012 - Article 11: " <i>…that actions of patent holder in exercising patent right…deemed to be <b>monopolistic actions"</b></i></p>
<p style="text-align: justify; ">Patent Law of the People's Republic of China - Article 48 (2): " <i> …patentee's exercise of the patent right is in accordance with law, confirmed as <b>monopoly and its negative impact on competition needs to be eliminated or reduced"</b> </i></p>
</td>
<td></td>
</tr>
<tr>
<td colspan="2" rowspan="3">
<p>Governmental use</p>
</td>
<td>
<p>United States</p>
</td>
<td colspan="2">
<p style="text-align: justify; ">28 United States Code 1498: " <i> …<b>when used or manufactured by or for the United States without license of the owner</b>…remedy shall be..Claims for recovery of his reasonable and entire compensation for such use and manufacture…" ie. </i> Government does not have to seek license or negotiate for use, and the only appeal for patent owner is compensation <i> </i></p>
<p><i> </i></p>
</td>
</tr>
<tr>
<td>
<p>Canada</p>
</td>
<td colspan="2">
<p style="text-align: justify; ">Under the 1993 and 1994 amendments to the Patent Act of 1985, section 19.1: <i> "the Commissioner may, <b> on application by the Government of Canada or the government of a province, authorize the use of a patented invention by that government </b> ." </i></p>
<p><i> </i></p>
</td>
</tr>
<tr>
<td>
<p>India</p>
</td>
<td colspan="2">
<p style="text-align: justify; ">Patent Act, 1970 - S.<i> </i>100 Power of Central Government to use inventions for purposes of Government (1): <i> "…at any time…the Central Government and any person authorized in writing… <b>may use the invention for the purposes of Government</b> in accordance with provisions of this chapter" </i></p>
<p style="text-align: justify; ">Patent Act, 1970 S. 100 Power of Central Government to use inventions for purposes of Government (2): " <i> Where an invention has, before priority date of relevant claim, been duly recorded in a document, or tested or tried, by or on behalf of the Government or Government undertaking… <b> any use of the invention by the Central Government or any person authorized in writing by it for the purposes of Government may be made free of any royalty or other renumeration to the patentee </b> " </i></p>
<p style="text-align: justify; ">Patent Act, 1970 S. 100 P<b>ower of Central Government to use inventions for purposes of Government</b> (6): " <i> The right to make, use, exercise, and vend an invention for<b> the purposes of Government </b>under sub-section (1) shall include the right to sell on noncommercial basis, and person c <b>laiming through..as if Central Government or authorized were the patentee of the invention </b> </i></p>
<p><i> </i></p>
</td>
</tr>
<tr>
<td>
<p>China</p>
</td>
<td colspan="3">
<p style="text-align: justify; ">Patent Law of PRC Art. 14: <i> "If an invention<b> patent of a State-owned enterprise or institution is o</b>f <b>great significance to national or public interests</b>, upon approval by State Council.. </i></p>
<p style="text-align: justify; ">Patent Law PRC Article 49: " <i> Where a <b>national emergency or any extraordinary state of affairs occurs…</b>patent administration department <b>under the State council may grant a compulsory license</b> for exploitation of an inanition patent or utility model patent" </i></p>
<p><i> </i></p>
<p style="text-align: justify; ">Patent Law PRC Article 14: “ <i> If an invention patent of a State-owned enterprise or institution is o <b>f great significance to national or public interests, upon approval by the State Council, </b>the relevant competent department under the State Council ...<b>may decide to have the patent widely applied within an approved scope </b>and allow the designated units to exploit the patent, and the <b>said units shall pay royalties to the patentee in accordance with the regulations of the State.</b> </i></p>
</td>
<td></td>
</tr>
<tr>
<td colspan="2" rowspan="4">
<p>Facilitate use of dependent patents</p>
</td>
<td>
<p>United States</p>
</td>
<td colspan="2">
<p>N/A - U.S. Does has not formally codified a general provision for Compulsory licensing of Dependent Patents <a href="#_ftn33" name="_ftnref33">[33]</a></p>
</td>
</tr>
<tr>
<td>
<p>Canada</p>
</td>
<td colspan="2">
<p>N/A</p>
</td>
</tr>
<tr>
<td>
<p>India</p>
</td>
<td colspan="2">
<p style="text-align: justify; ">Patent Act 1970 - Section 88 Power of Controller in Granting Compulsory licenses (3): <i> …if Controller satisfied that the applicant cannot efficiently or satisfactorily work the license granted to him <b> under those patents without infringing the other patents held by the patentee, and if those patents involve important technical advancement of considerable economic significance </b> …may direct grant of a license… </i></p>
<p><i> </i></p>
</td>
</tr>
<tr>
<td>
<p>China</p>
</td>
<td colspan="2">
<p style="text-align: justify; ">Patent Law - Ch 6 Art 51: " <i> If an invention/utility model…<b>represents major technological advancement of remarkable economic significance</b>, compared with an earlier invention or utility model for which the patent right has already been obtained, and <b> exploitation of former relies on exploitation of latter</b>…may grant it a compulsory license to exploit..." </i></p>
<p><i> </i></p>
</td>
</tr>
<tr>
<td colspan="2" rowspan="2">
<p>Compulsory licenses for medicines</p>
</td>
<td>
<p>United States</p>
</td>
<td colspan="2">
<p>N/A but has threatened Bayer for compulsory licensing of Ciproflaxin medicine who subsequently dropped their prices drastically <a href="#_ftn34" name="_ftnref34">[34]</a></p>
</td>
</tr>
<tr>
<td>
<p>Canada</p>
</td>
<td colspan="2">
<p style="text-align: justify; ">Bill C-9 Amendment to Food and Drugs Act, 2004: "…pharmaceutical products intended for export in accordance with that WTO General Council decision…to comply with…sold on domestic market"</p>
<p style="text-align: justify; ">Patent Act (4) License under patent relating to medicine - " <i>..intended or capable of being <b>used for the preparation of production of medicine</b>…Commissioner shall grant..</i></p>
<p><b>REPEALED in 1993 due to NAFTA and TRIPS</b></p>
<p><b> </b></p>
</td>
</tr>
<tr>
<td>
<p>India</p>
</td>
<td colspan="3">
<p style="text-align: justify; ">Patent Act 1970 Section 92.A Compulsory license for export of patent pharmaceutical products in certain exceptional circumstances: " <i> …shall be <b> available for manufacture and export of patented pharmaceutical products <a href="#_ftn35" name="_ftnref35"><b>[35]</b></a> </b> to any country having insufficient or no manufacturing capacity in the pharmaceutical sector for the concerned product to address public health problems…" </i></p>
<p style="text-align: justify; ">Patent Act, 1970 Section 83.(d): <i> "General principles applicable to working of patented inventions… <b>do not impede protection of public health and nutrition… </b> </i></p>
</td>
<td></td>
</tr>
<tr>
<td>
<p>China</p>
</td>
<td colspan="3">
<p style="text-align: justify; ">Patent Law of PRC: Article 50: " <i> For the benefit of <b>public health…</b>grant compulsory license for <b>manufacture of the drug, </b>for which a patent right has been obtained, and for its <b>export to the countries or regions that conform to the provisions…" </b> </i></p>
<p style="text-align: justify; ">Measures for Compulsory Licensing of Patent Implementation, 2012 - Ch 2 Art 7: " <i> For <b>purposes of public health</b>…able to implement petition for compulsory licensing…for <b>manufacture of patented medicines..and expor</b>t of, to following countries/regions: </i></p>
<p><i>1) The most underdeveloped countries/regions; </i></p>
<p><i>2) Developed/developing members of the WTO </i></p>
<p><i> </i></p>
</td>
<td></td>
</tr>
<tr>
<td colspan="2" rowspan="4">
<p>Exclusive grant-back and Coercive package licensing<span> </span></p>
<p><span> </span></p>
</td>
<td>
<p>U.S.</p>
</td>
<td colspan="2">
<p style="text-align: justify; ">Legal in the past – granted in Transparent Wrap Machine Corp v Stokes & Smith Co. but discouraged... interpreted by Rule of Reason doctrine which is an interpretation of Sherman Antitrust (Anti-competition) Act<a href="#_ftn36" name="_ftnref36">[36]</a></p>
<p>Now Department Of Justice from 2007 has said must be non-exclusive under its Antitrust laws <a href="#_ftn37" name="_ftnref37">[37]</a></p>
</td>
</tr>
<tr>
<td>
<p>Canada</p>
</td>
<td colspan="2">
<p>N/A</p>
</td>
</tr>
<tr>
<td>
<p>India</p>
</td>
<td colspan="2">
<p style="text-align: justify; ">Patent Act, 1970 Section 84 (7.c): <i> …Reasonable requirements of the public shall be deemed not to have been satisfied <a href="#_ftn38" name="_ftnref38"><b>[38]</b></a> - c) if the patentee imposes a condition upon the grant of license under the patent to provide <b>exclusive grant back</b>, prevention to challenges to validity of patent, or <b>coercive package licensing </b> </i></p>
<p><b><i> </i></b></p>
</td>
</tr>
<tr>
<td>
<p>China</p>
</td>
<td colspan="2">
<p><i> </i></p>
<p><i>N/A</i></p>
<p><i> </i></p>
</td>
</tr>
<tr>
<td colspan="2" rowspan="3">
<p>Hindered by importation from abroad</p>
</td>
<td>
<p>U.S.</p>
</td>
<td colspan="2">
<p><i> </i></p>
<p><i>N/A</i></p>
<p><i> </i></p>
</td>
</tr>
<tr>
<td>
<p>Canada</p>
</td>
<td colspan="2">
<p><i> </i></p>
<p><i>N/A</i></p>
<p><i> </i></p>
</td>
</tr>
<tr>
<td>
<p>India</p>
</td>
<td colspan="2">
<p style="text-align: justify; ">Patent Act, 1970 Section 84 (7.e): " <i> if the working of the patented invention in the territory of India on a commercial scale is <b>being prevented or hindered by the importation from abroad of the patented article by</b>…i) patentee..ii) persons purchasing…iii) other persons not taking proceedings for infringement </i></p>
</td>
</tr>
<tr>
<td>
<p>China</p>
</td>
<td colspan="3">
<p><i> </i></p>
<p><i>N/A</i></p>
<p><i> </i></p>
</td>
<td></td>
</tr>
<tr>
<td><br /></td>
<td><br /></td>
<td><br /></td>
<td><br /></td>
<td><br /></td>
</tr>
</tbody>
</table>
<p style="text-align: justify; "><b>Summary of Cross-Jurisdictional Comparison</b><br />As mentioned previously, this comparison necessitated an expansion into codified law outside of compulsory licensing and patent law into case law, since the United States had never written a general provision for compulsory licensing, and Canada had repealed theirs in 1993 upon the signing of the NAFTA and TRIPS agreement. For Canada, compulsory licenses (CLs) continued to be granted following the repeal through the Foods and Drugs Act, as well as the Competition Act. Despite United States' lack of general provisions, Knowledge Ecology International claims it is the world's leader in the use of CLs, yet hypocritical to developing countries' requests for affordable patented pharmaceuticals.<a href="#_ftn39" name="_ftnref39">[39]</a></p>
<p style="text-align: justify; ">In general, India and China both have very extensive compulsory licensing laws. China's State Intellectual Property Office even developed additional Measures to account for the execution of compulsory licensing. Despite comprehensive CL provisions, India has had only one compulsory license ever granted in the case of Natco Pharma Ltd v. Bayer Corporation, for the domestic production of cancer-drug Nexavar. <a href="#_ftn40" name="_ftnref40">[40]</a> China has yet to grant any compulsory license, but the new Measures may signify an increasing willingness to do so, or even to be used as a bargaining tool. However, given its goal of developing domestic intellectual property (i.e. China's 5-year plan), it is unlikely that China will grant compulsory licenses in the masses.<a href="#_ftn41" name="_ftnref41">[41]</a> <br /> <br /> In regards to the specific grounds themselves, some grounds noted particular differences per country.</p>
<p style="text-align: justify; ">Under U.S. Intellectual Property Law, <b>refusal to deal</b> is actually is considered a right, thus does not provide for compulsory licensing; depending on the degree however, it could lead to anti-competition<a href="#_ftn42" name="_ftnref42">[42]</a>. According to the Paris Convention, one can only request consideration for a CLs 3 years from the granting of a patent, or 4 years from application, allowing said time for provision of dealing. However, India seems to have a more stringent period of not exceeding a period of six months, while China noted specifically not 'without legitimate reasons'.</p>
<p style="text-align: justify; ">The <b>non-working and inadequate supply </b>was again not present in U.S. Law, yet Canada did include it in its former compulsory licensing provision prior to repeal. Canada had defined 'working' specifically referring to a commercial scale when compulsory licensing was in effect. India's 'working' means being available at a reasonably affordable price, and supplied or developed, through the establishment of commercial activities, worked to the fullest extent that is fully practicable, while China mentioned non-working 'if without good reason, it is not implemented or fully implemented'.</p>
<p style="text-align: justify; ">The United States does not have any provision providing explicitly for <b>public interest. </b>However, under the Bayh-Dole Act, government-funding for research during the economic crisis in the 1970s was granted as long as the inventors agreed to allow petition for 'march-in rights', in which the government or a third party “shall have the right...to require the contractor...to grant a nonexclusive, partially exclusive, or exclusive license” (35 U.S. Code S203(a)) if it meets one of four requirements - one being to “...alleviate health and safety needs which are not reasonably satisfied...” (35 U.S. Code Section 203). Canada's public interest clause had existed, but was repealed. India now states that CLs can be granted to make available to the public “at a reasonably affordable price, to public advantage, and for public non-commercial use”. In China, public interest is provided in conditions of 'national emergency or extraordinary state of affairs, for the purpose of public interest'.</p>
<p style="text-align: justify; ">The United States does however strongly uphold and value competition, and have granted CLs to remedy <b>anticompetitive practices </b>under its Antitrust laws, prohibiting any 'attempt to monopolize any part of trade or commerce'. China also uses the language of 'monopolistic actions' and allows compulsory licensing if its “negative impact on competition needs to be eliminated or reduced.” Canada's Competition Act allows for compulsory licensing if one 'limits unduly, the facilities for transporting, producing, manufacturing... restrain or injure unduly, trade or commercial etc..' .preventing fair competition. India also notes the remedying of anticompetitive acts in its patent laws.</p>
<p style="text-align: justify; "><b>Governmental use </b> in the United States have been granted for use by the Department of Defense and as mentioned previously for the Bayh-Dole Act. However, unlike the other countries of focus, there is no way to appeal a CL for the purposes of government-use. The only way to remedy this as a patent owner is compensation. In Canada, the Commissioner may on application by the Government of Canada or province authorize a CL. Indian patent law also allows CLs for the purposes of the Government, with the explicit possibility of being made free of any royalty or renumeration. It also expressly notes within S103 that one can petition to the Government if this occurs. The Chinese Patent Law notes governmental use through the language of 'great significance to national or public interests', and 'national emergency or extraordinary state of affairs. The possibility of appeal is also expressly noted in Article 58.</p>
<p style="text-align: justify; ">Neither United States or Canada have formally codified any mention of compulsory licensing for the use of <b>dependent patents</b>, though it does exist in the TRIPs agreement they both comply to. In India patent law, CLs is granted through this ground “only if it involves important technical advancement of considerable economic significance, and... only if it cannot be accomplished without infringing other patents.” In China, the law states that if an “invention/utility model represents major technological advancement...compared with earlier invention or utility model...and the exploitation of former relies on exploitation of the latter...”, a compulsory license may be granted.</p>
<p style="text-align: justify; "><b>Compulsory licensing for medicine </b> in the United States again have never been codified, but have been used to encourage Bayer to reduce their prices under the possibility of being issued compulsory liceninsg. Home to many of the pharmaceutical industries who own patents to medicines, the United States has been called hypocritical due to its common lack of providing affordable pharmaceuticals. Canada allows for CLs under the Food and Drugs Act which points to the World Trade Organization guidelines. Prior to the repeal of its compulsory licensing act, Canada also had specific provisions relating to medicines, and was actually the first country to authorize the compulsory licensing of an AIDS drug for Rwanda for export.<a href="#_ftn43" name="_ftnref43">[43]</a> In India, the only compulsory license that has ever been granted was for cancer drug Nexavar. In its compulsory licensing provision, it states that CLs are “available for manufacture and export of patented pharmaceutical products...to any country having insufficient or no manufacturing” abilities. Similar to the TRIPs agreement, it also states that none of the principles should impede the protection of public health and nutrition. China's patent laws state that CLs can be used for the benefit of public health. The Measures for Implementation specifies more specifically which countries and regions are allowed, which includes WTO members, or the 'underdeveloped' nations.</p>
<p style="text-align: justify; ">Only in the Indian Patent Law does it explicitly allow for CL in the event of <b>exclusive grant backs </b>due to anti-competition and/or not being reasonable to the public<b>. </b>On the contrary, the United States actually had allowed exclusive grant back in the Transparent Wrap Machine Corp v Stokes & Smith Co. case<a href="#_ftn44" name="_ftnref44">[44]</a>. However, the FTC now strongly recommends against it as it is considered anticompetitive when a grant-back is exclusive<a href="#_ftn45" name="_ftnref45">[45]</a>. Canada and China does not seem to have this condition in their laws.</p>
<p style="text-align: justify; ">Similarly, only in the Indian patent law does <b>coercive package licensing </b>provide for compulsory licensing. This clause may have implications on standard-essential patent pools when attempting to determine which patents are indeed 'essential', and if they comply with fair, reasonable, and non discriminatory regulations<a href="#_ftn46" name="_ftnref46">[46]</a>. <br /> <br /></p>
<p style="text-align: justify; ">Indian Patent Law also expressly allows for compulsory licensing on the ground that a product is <b>hindered by importation from abroad</b>. It must be proven the lack of accessibility is soley due to the process of it being imported, perhaps affected by natural disasters, socioeconomic reasons, political instability, sanctions, or more – ultimately affecting the cost and availability of this product. <a href="#_ftn47" name="_ftnref47">[47]</a></p>
<p style="text-align: justify; "><b>Conclusion and Further Reflections on Compulsory Licensing</b><br />Ultimately, there seems to be no correlation between the detail and scope of compulsory licensing (and other codified) law, and the number of compulsory licenses granted. However, it must be noted that the Eastern countries of focus in this review have had much less time developing its intellectual property landscape. In addition, the comprehensiveness of India and China's patent laws also reflect the incorporation of valuable lessons learned from poor implementation of other countries.</p>
<p style="text-align: justify; ">The prevalence of broadly defined patents, patent trolling, and the increasing need to navigate patent thickets all act as barriers to innovation and production to a commercial scale in which these technologies can actually be disseminated. The Pervasive Technologies project looks ultimately at bridging the digital divide through providing access to low-cost technology, and subsequently access to information, culture, and knowledge.</p>
<p style="text-align: justify; ">Compulsory licenses can be used to decrease the cost burden of production, and reduce barriers to innovation, ultimately providing greater accessibility to these tools for all of society. The Centre for Internet and Society has proposed and continues to advocate the establishment of patent pools for low-access devices through the use of compulsory licenses to achieve this goal<a href="#_ftn48" name="_ftnref48">[48]</a>.</p>
<div>
<hr align="left" size="1" width="100%" />
<div id="ftn1">
<p style="text-align: justify; "><a href="#_ftnref1" name="_ftn1">[1]</a> WIPO. <i>What Is Intellectual Property</i>. World Intellectual Property Organization, 2012. Print. 5</p>
</div>
<div id="ftn2">
<p><a href="#_ftnref2" name="_ftn2">[2]</a> WIPO, 6</p>
</div>
<div id="ftn3">
<p><a href="#_ftnref3" name="_ftn3">[3]</a> Correa, Carlos M. “Intellectual Property Rights and the.” <i>Trade Related Agenda Development and Equity</i> (1999): 3</p>
</div>
<div id="ftn4">
<p><a href="#_ftnref4" name="_ftn4">[4]</a> Contreras, Jorge L., and Charles R. McManis. “Compulsory Licensing of Intellectual Property: A Viable Policy Lever for Promoting Access to Critical Technologies?” <i> TRIPS and Developing Countries – Towards a New World Order? (Gustavo Ghidini, Rudolph J.R. Peritz & Marco Ricolfi, eds., 2014 (Edward Elgar)) </i> (2014): 112 Print.</p>
</div>
<div id="ftn5">
<p style="text-align: justify; "><a href="#_ftnref5" name="_ftn5">[5]</a> Abraham, Sunil. Letter for Establishment of Patent Pool for Low-Cost Access Devices through Compulsory Licenses. 27 June 2013. Accessed: <a href="https://cis-india.org/a2k/blogs/letter-for-establishment-of-patent-pool-for-low-cost-access-devices"> http://cis-india.org/a2k/blog/letter-for-establishment-of-patent-pool-for-low-cost-access-devices </a></p>
</div>
<div id="ftn6">
<p style="text-align: justify; "><a href="#_ftnref6" name="_ftn6">[6]</a> The Paris Convention is an intellectual property treaty covering industrial property: patents, trademarks, industrial designs, utility models, service marks, trade names, and geographical indicators. <br /> <br /> WIPO. “Summary of the Paris Convention for the Protection of Industrial Property (1883).” <i>World Intellectual Property Organization</i>. Website. <a href="http://www.wipo.int/treaties/en/ip/paris/summary_paris.html">http://www.wipo.int/treaties/en/ip/paris/summary_paris.html</a></p>
</div>
<div id="ftn7">
<p><a href="#_ftnref7" name="_ftn7">[7]</a> WIPO. “WIPO-Administered Treaties: Contracting Parties.” <i>World Intellectual Property Organization</i>. Website. <a href="http://www.wipo.int/treaties/en/ShowResults.jsp?treaty_id=2">http://www.wipo.int/treaties/en/ShowResults.jsp?treaty_id=2</a></p>
</div>
<div id="ftn8">
<p style="text-align: justify; "><a href="#_ftnref8" name="_ftn8">[8]</a> The North American Free Trade Agreement (NAFTA) is the largest free trade agreement in the world, with members Canada, United States, and Mexico. <br /> USTR. “North American Free Trade Agreement (NAFTA).” <i>Office of the United States Representative</i>. Website. <a href="http://www.ustr.gov/trade-agreements/free-trade-agreements/north-american-free-trade-agreement-nafta"> http://www.ustr.gov/trade-agreements/free-trade-agreements/north-american-free-trade-agreement-nafta </a></p>
</div>
<div id="ftn9">
<p style="text-align: justify; "><a href="#_ftnref9" name="_ftn9">[9]</a> The Trade Related Aspects of Intellectual Property RIghts (TRIPS) agreement is a treaty which provides basic intellectual property provisions for international law, and stipulates that members shall be free to determine methods of implementing the provisions, in addition to enact more specific measures provided it coincides with the rest of the agreement. <br /> World Trade Organization. “Agreement on Trade Related Aspects of Intellectual Property Rights, Including Trade in Counterfeit Goods.”<i>WTO Legal Texts - A Summary of the Final Act of the Uruguay Round</i>. Website. <a href="http://www.wto.org/english/docs_e/legal_e/ursum_e.htm#nAgreement">http://www.wto.org/english/docs_e/legal_e/ursum_e.htm#nAgreement</a></p>
</div>
<div id="ftn10">
<p><a href="#_ftnref10" name="_ftn10">[10]</a> TRIPS - Article 31.a)</p>
</div>
<div id="ftn11">
<p><a href="#_ftnref11" name="_ftn11">[11]</a> TRIPS - Article 31.b)</p>
</div>
<div id="ftn12">
<p><a href="#_ftnref12" name="_ftn12">[12]</a> TRIPS - Article 31.b)</p>
</div>
<div id="ftn13">
<p><a href="#_ftnref13" name="_ftn13">[13]</a> TRIPS – Article 31.h)</p>
</div>
<div id="ftn14">
<p><a href="#_ftnref14" name="_ftn14">[14]</a> TRIPS – Article 31.c)</p>
</div>
<div id="ftn15">
<p><a href="#_ftnref15" name="_ftn15">[15]</a> TRIPS – Article 31</p>
</div>
<div id="ftn16">
<p><a href="#_ftnref16" name="_ftn16">[16]</a> fWHO. “The Doha Declaration on the TRIPs Agreement and Public Health.” <i>World Health Organization</i>. <a href="http://www.who.int/medicines/areas/policy/doha_declaration/en/">http://www.who.int/medicines/areas/policy/doha_declaration/en/</a></p>
</div>
<div id="ftn17">
<p><a href="#_ftnref17" name="_ftn17">[17]</a> Correa, 11-12.</p>
</div>
<div id="ftn18">
<p style="text-align: justify; "><a href="#_ftnref18" name="_ftn18">[18]</a> Fauver, Cole M. “Compulsory Patent Licensing in the United States: An Idea Whose Time Has Come.” <i>Northwestern Journal of International Law and Business</i> 8.3 (1988): 666–685. Print. p671</p>
</div>
<div id="ftn19">
<p><a href="#_ftnref19" name="_ftn19">[19]</a> Correa, 13</p>
</div>
<div id="ftn20">
<p><a href="#_ftnref20" name="_ftn20">[20]</a> Ferrell, John. <i>Patent Pro Se: The Entrepreneur’s Guide to Provisional Patent Applications</i>. BayWater Publishing, 2010. Print.</p>
</div>
<div id="ftn21">
<p><a href="#_ftnref21" name="_ftn21">[21]</a> Milchenko, Oleg. “Contemporary Anti-Competetive Practices of Patents Usage.” <i>Journal of International Commercial Law and Technology</i> 8.3 (2013): 1-13. Print.</p>
</div>
<div id="ftn22">
<p><a href="#_ftnref22" name="_ftn22">[22]</a> Shapiro, Carl. “Navigating the Patent Thicket: Cross Licneses, Patent Pools, and Standard Setting.” <i>Innovation Policy and the Economy</i> 1 (2001): 119–150. Print.</p>
</div>
<div id="ftn23">
<p><a href="#_ftnref23" name="_ftn23">[23]</a> McGurk, Thomas B. “The Grant-Back Clause in Your Technology License.” <i>Biodiesel Magazine</i> 17 Jan. 2013.</p>
</div>
<div id="ftn24">
<p><a href="#_ftnref24" name="_ftn24">[24]</a> Origin IP Academy. “Exclusive Grant Back License.” <i>Origiin IP Academy</i> 15 Nov. 2009. Blog. Accessed: <a href="http://origiinipae.blogspot.in/2009/11/exclusive-grant-back-license.html"> http://origiinipae.blogspot.in/2009/11/exclusive-grant-back-license.html </a></p>
</div>
<div id="ftn25">
<p style="text-align: justify; "><a href="#_ftnref25" name="_ftn25">[25]</a> Dykeman, David J. “When Licensing out Patents, Make Sure Improvements Are Granted Back.” <i>Boston Business Journal</i> 8 Mar. 2006. Blog retrieved from: <a href="http://www.bizjournals.com/boston/blog/mass-high-tech/2006/03/when-licensing-out-patents-make-sure.html?page=all"> http://www.bizjournals.com/boston/blog/mass-high-tech/2006/03/when-licensing-out-patents-make-sure.html?page=all </a></p>
</div>
<div id="ftn26">
<p><a href="#_ftnref26" name="_ftn26">[26]</a> Origiin IP Academy. “Coercive Package Licensing.” <i>Origiin IP Academy</i> 11 Nov. 2009. Accessed: <a href="http://origiinipae.blogspot.in/2009/11/coercive-package-licensing.html"> http://origiinipae.blogspot.in/2009/11/coercive-package-licensing.html </a></p>
</div>
<div id="ftn27">
<p style="text-align: justify; "><a href="#_ftnref27" name="_ftn27">[27]</a> Reddy, Prashant. “‘Working’ a Patent under the Indian Patent Act, 970 - Does Importation of a Patented Invention Count?” <i>Spicy IP - Decoding Indian Intellectual Property Law</i>. 22 Apr. 2010. Retrieved: <a href="http://spicyip.com/2010/04/working-patent-under-indian-patent-act.html"> http://spicyip.com/2010/04/working-patent-under-indian-patent-act.html </a></p>
</div>
<div id="ftn28">
<p><a href="#_ftnref28" name="_ftn28">[28]</a> Yang, Deli. “Compulsory Licesning: For Better or for Worse, the Done Deal Lies in the Balance.” <i>Journal of Intellectual Property Rights</i> 17 (2012): 76–81; p80 Print. Global IP Debates</p>
</div>
<div id="ftn29">
<p><a href="#_ftnref29" name="_ftn29">[29]</a> Shaw, Malcom N. <i>International Law 7th Edition</i>. 5th ed. Cambridge University Press, 2003. Print.</p>
</div>
<div id="ftn30">
<p><a href="#_ftnref30" name="_ftn30">[30]</a> Canada had repealed its section on Compulsory Licensing in order to comply with the TRIPS and NAFTA agreements</p>
</div>
<div id="ftn31">
<p><a href="#_ftnref31" name="_ftn31">[31]</a> A more comprehensive approach could be to assess broadly ALL the compulsory licensing cases rather than just a select few ….particularly for United States and Canada...</p>
</div>
<div id="ftn32">
<p><a href="#_ftnref32" name="_ftn32">[32]</a> <a href="http://www.aals.org/documents/2006intprop/JeromeReichmanOutline.pdf"> http://www.aals.org/documents/2006intprop/JeromeReichmanOutline.pdf </a></p>
</div>
<div id="ftn33">
<p style="text-align: justify; "><a href="#_ftnref33" name="_ftn33">[33]</a> Reichman, Jerome. “Compulsory Licensing of Patented Inventions: Comparing United States Law and Practice with Options under the TRIPS Agreement.” Vancouver, Canada: Duke University School of Law, 2006.</p>
</div>
<div id="ftn34">
<p><a href="#_ftnref34" name="_ftn34">[34]</a> Reichman, Jerome H. “Comment: Compulsory Licensing of Patented Pharmaceutical Inventions: Evaluating the Options.” <i>The Journal of Law, Medicine, and Ethics</i> 37.2 (2009): 247–263. Print.</p>
</div>
<div id="ftn35">
<p style="text-align: justify; "><a href="#_ftnref35" name="_ftn35">[35]</a> Pharmaceutical products' means any patented product, or product manufactured through a patented process, of the pharmaceutical sector needed to address public health problems and shall be inclusive of ingredients necessary for their manufacture and diagnostic kits required for their use"</p>
</div>
<div id="ftn36">
<p><a href="#_ftnref36" name="_ftn36">[36]</a> Dratler, Jay. <i>Licensing of Intellectual Property</i>. New York: Law Journal Press, 2005: 7.89 Print.</p>
</div>
<div id="ftn37">
<p><a href="#_ftnref37" name="_ftn37">[37]</a> Miller, Mark E., and David S. Almeling. “DOJ, FTC Redefine Antitrust Rules on Patent Pools.” <i>National Law Journal</i>. 29 Oct. 2007.</p>
</div>
<div id="ftn38">
<p><a href="#_ftnref38" name="_ftn38">[38]</a> Therefore compulsory licensing can be granted given Controller agrees</p>
</div>
<div id="ftn39">
<p><a href="#_ftnref39" name="_ftn39">[39]</a> Raja, Kanaga. “US Leads the World in Use of Compulsory Licenses, Says KEI.” <i>Third World Network</i>. N.p., 18 Mar. 2014.</p>
</div>
<div id="ftn40">
<p><a href="#_ftnref40" name="_ftn40">[40]</a> Bakhru, Rachna. “India Grants First Compulsory Licence under Patents Act.” <i>Intellectual Property Magazine</i> June 2012: 46–47. Print.</p>
</div>
<div id="ftn41">
<p><a href="#_ftnref41" name="_ftn41">[41]</a> Miller Canfield. “China Allows Compulsory Licensing.” <i>Law FIrm of Miller Canfield</i>. Dec. 2012. Retreived: http://www.millercanfield.com/resources-321.html</p>
</div>
<div id="ftn42">
<p style="text-align: justify; "><a href="#_ftnref42" name="_ftn42">[42]</a> Genevaz, Simon. “Against Immunity for Unilateral Refusal to Deal in Intellectual Property: Why Antitrust Law Should Not Distingusih between IP and Other Property Rights.” <i>Berkeley Technology Law Journal</i> 19.2 (2014): 742–784. Print.</p>
</div>
<div id="ftn43">
<p><a href="#_ftnref43" name="_ftn43">[43]</a> World Trade Organization. “Canada Is First to Notify Compulsory License to Export Generic Drug.” <i>WTO | 2007 News Items</i>. N.p., 4 Oct. 2007.</p>
</div>
<div id="ftn44">
<p><a href="#_ftnref44" name="_ftn44">[44]</a> sSchmalbeck, Richard L. “The Validity of Grant-Back Clauses in Patent Licensing Agreements.” <i>University of Chicago Law Review</i> 42 (1975): 733–748.</p>
</div>
<div id="ftn45">
<p><a href="#_ftnref45" name="_ftn45">[45]</a> Miller & Ameling, 2007: 3</p>
</div>
<div id="ftn46">
<p><a href="#_ftnref46" name="_ftn46">[46]</a> Lerner, Josh, and Jean Tirole. “Standard-Essential Patents.” <i>Working Paper</i> 43.</p>
</div>
<div id="ftn47">
<p><a href="#_ftnref47" name="_ftn47">[47]</a> Reddy, 2010</p>
</div>
<div id="ftn48">
<p style="text-align: justify; "><a href="#_ftnref48" name="_ftn48">[48]</a> See Executive Director of CIS' letter to the government here: <a href="https://cis-india.org/a2k/blogs/letter-for-establishment-of-patent-pool-for-low-cost-access-devices"> http://cis-india.org/a2k/blog/letter-for-establishment-of-patent-pool-for-low-cost-access-devices </a></p>
</div>
</div>
<p>
For more details visit <a href='https://cis-india.org/a2k/blogs/grounds-for-compulsory-patent-licensing-in-us-canada-china-and-india'>https://cis-india.org/a2k/blogs/grounds-for-compulsory-patent-licensing-in-us-canada-china-and-india</a>
</p>
No publishermaggieFeaturedAccess to KnowledgePervasive Technologies2014-07-29T08:45:25ZBlog EntrySpy Files 3: WikiLeaks Sheds More Light On The Global Surveillance Industry
https://cis-india.org/internet-governance/blog/spy-files-three
<b>In this article, Maria Xynou looks at WikiLeaks' latest Spy Files and examines the legality of India's surveillance technologies, as well as their potential connection with India's Central Monitoring System (CMS) and implications on human rights. </b>
<p align="JUSTIFY">Last month, WikiLeaks released <span style="text-decoration: underline;"><a href="http://wikileaks.org/spyfiles3.html">“</a><a href="http://wikileaks.org/spyfiles3.html">Spy</a><a href="http://wikileaks.org/spyfiles3.html"> </a><a href="http://wikileaks.org/spyfiles3.html">Files</a><a href="http://wikileaks.org/spyfiles3.html"> 3”</a></span>, a mass exposure of the global surveillance trade and industry. WikiLeaks first released the Spy Files in December 2011, which entail brochures, presentations, marketing videos and technical specifications on the global trade of surveillance technologies. Spy Files 3 supplements this with 294 additional documents from 92 global intelligence contractors.</p>
<h2><b>So what do the latest Spy Files reveal about India?</b></h2>
<p align="JUSTIFY">When we think about India, the first issues that probably come to mind are poverty and corruption, while surveillance appears to be a more “Western” and elitist issue. However, while many other developing countries are excluded from WikiLeaks’ list of surveillance technology companies, <span style="text-decoration: underline;"><a href="http://wikileaks.org/spyfiles3.html#an1">India</a><a href="http://wikileaks.org/spyfiles3.html#an1"> </a><a href="http://wikileaks.org/spyfiles3.html#an1">is</a><a href="http://wikileaks.org/spyfiles3.html#an1"> </a><a href="http://wikileaks.org/spyfiles3.html#an1">once</a><a href="http://wikileaks.org/spyfiles3.html#an1"> </a><a href="http://wikileaks.org/spyfiles3.html#an1">again</a><a href="http://wikileaks.org/spyfiles3.html#an1"> </a><a href="http://wikileaks.org/spyfiles3.html#an1">on</a><a href="http://wikileaks.org/spyfiles3.html#an1"> </a><a href="http://wikileaks.org/spyfiles3.html#an1">the</a><a href="http://wikileaks.org/spyfiles3.html#an1"> </a><a href="http://wikileaks.org/spyfiles3.html#an1">list</a></span> with some of the most controversial spyware.</p>
<h3><b>ISS World Surveillance Trade Shows</b></h3>
<p align="JUSTIFY">The latest Spy Files include a <span style="text-decoration: underline;"><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf">brochure</a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf">of</a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf">the</a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf">ISS</a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf">World</a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"> 2013</a></span> -the so-called “wiretapper’s ball”- which is the world’s largest surveillance trade show. <span style="text-decoration: underline;"><a href="http://www.issworldtraining.com/iss_ap/">This</a><a href="http://www.issworldtraining.com/iss_ap/"> </a><a href="http://www.issworldtraining.com/iss_ap/">years</a><a href="http://www.issworldtraining.com/iss_ap/">’ </a><a href="http://www.issworldtraining.com/iss_ap/">ISS</a><a href="http://www.issworldtraining.com/iss_ap/"> </a><a href="http://www.issworldtraining.com/iss_ap/">World</a><a href="http://www.issworldtraining.com/iss_ap/"> </a><a href="http://www.issworldtraining.com/iss_ap/">Asia</a></span> will take place in Malaysia during the first week of December and law enforcement agencies from around the world will have another opportunity to view and purchase the latest surveillance tech. The<span style="text-decoration: underline;"><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf">leaked</a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf">ISS</a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf">World</a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"> 2013 </a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf">brochure</a></span> entails a list of last years’ global attendees. According to the brochure, 53% of the attendees included law enforcement agencies and individuals from the defense, public safety and interior security sectors, 41% of the attendees were ISS vendors and technology integrators, while only 6% of the attendees were telecom operators and from the private enterprise. The brochure boasts that 4,635 individuals from 110 countries attended the ISS World trade shows last year and that the percentage of attendance is increasing.</p>
<p align="JUSTIFY">The following table lists the <a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"><i><span style="text-decoration: underline;">Indian</span></i></a><span style="text-decoration: underline;"><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf">attendees</a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf">at</a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf">last</a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf">years</a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf">’ </a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf">ISS</a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf">World</a></span>:</p>
<table class="plain">
<tbody>
<tr>
<th>
<p align="JUSTIFY"><span><span><b>Law Enforcement, Defense and Interior Security Attendees</b></span></span></p>
</th><th>
<p align="JUSTIFY"><span><span><b>Telecom Operators and Private Enterprises Attendees</b></span></span></p>
</th><th>
<p align="JUSTIFY"><span><span><b>ISS Vendors and Technology Integrators Attendees</b></span></span></p>
</th>
</tr>
<tr>
<td>
<p align="JUSTIFY"><span><span><span>Andhra Pradesh India Police</span></span></span></p>
</td>
<td>
<p align="JUSTIFY">BT</p>
</td>
<td>
<p align="JUSTIFY"><span><span><span>AGC Networks</span></span></span></p>
</td>
</tr>
<tr>
<td>
<p align="JUSTIFY"><span><span><span>CBI Academy</span></span></span></p>
</td>
<td>
<p align="JUSTIFY"><span><span><span>Cogence Investment Bank</span></span></span></p>
</td>
<td>
<p align="JUSTIFY"><span><span><span>Aqsacom India</span></span></span></p>
</td>
</tr>
<tr>
<td>
<p align="JUSTIFY"><span><span><span>Government of India, Telecom Department</span></span></span></p>
</td>
<td>
<p align="JUSTIFY"><span><span><span>India Reliance Communications</span></span></span></p>
</td>
<td>
<p align="JUSTIFY"><span><span><span>ClearTrail Technologies</span></span></span></p>
</td>
</tr>
<tr>
<td>
<p align="JUSTIFY"><span><span><span>India Cabinet Secretariat</span></span></span></p>
</td>
<td>
<p align="JUSTIFY"><span><span><span>Span Telecom Pvt. Ldt. </span></span></span></p>
</td>
<td>
<p align="JUSTIFY"><span><span><span>Foundation Technologies</span></span></span></p>
</td>
</tr>
<tr>
<td>
<p align="JUSTIFY"><span><span><span>India Centre for Development of Telematics (C-DOT)</span></span></span></p>
</td>
<td></td>
<td>
<p align="JUSTIFY">Kommlabs</p>
</td>
</tr>
<tr>
<td>
<p align="JUSTIFY"><span><span><span>India Chandigarh Police</span></span></span></p>
</td>
<td></td>
<td>
<p align="JUSTIFY"><span><span><span>Paladion Networks</span></span></span></p>
</td>
</tr>
<tr>
<td>
<p align="JUSTIFY"><span><span><span>India Defence Agency</span></span></span></p>
</td>
<td></td>
<td>
<p align="JUSTIFY"><span><span><span>Polaris Wireless</span></span></span></p>
</td>
</tr>
<tr>
<td>
<p align="JUSTIFY"><span><span><span>India General Police</span></span></span></p>
</td>
<td></td>
<td>
<p align="JUSTIFY"><span><span><span>Polixel Security Systems</span></span></span></p>
</td>
</tr>
<tr>
<td>
<p align="JUSTIFY"><span><span><span>India Intelligence Department</span></span></span></p>
</td>
<td></td>
<td>
<p align="JUSTIFY"><span><span><span>Pyramid Cyber Security</span></span></span></p>
</td>
</tr>
<tr>
<td>
<p align="JUSTIFY"><span><span><span>India National Institute of Criminology</span></span></span></p>
</td>
<td></td>
<td>
<p align="JUSTIFY"><span><span><span>Schleicher Group</span></span></span></p>
</td>
</tr>
<tr>
<td>
<p align="JUSTIFY"><span><span><span>India office LOKAYUKTA NCT DELHI</span></span></span></p>
</td>
<td></td>
<td>
<p align="JUSTIFY"><span><span><span>Span Technologies</span></span></span></p>
</td>
</tr>
<tr>
<td>
<p align="JUSTIFY"><span><span><span>India Police Department, A.P.</span></span></span></p>
</td>
<td></td>
<td>
<p align="JUSTIFY"><span><span><span>TATA India</span></span></span></p>
</td>
</tr>
<tr>
<td>
<p align="JUSTIFY"><span><span><span>India Tamil Nadu Police Department</span></span></span></p>
</td>
<td></td>
<td>
<p align="JUSTIFY"><span><span><span>Tata Consultancy Services</span></span></span></p>
</td>
</tr>
<tr>
<td>
<p align="JUSTIFY"><span><span><span>Indian Police Service, Vigilance</span></span></span></p>
</td>
<td></td>
<td>
<p align="JUSTIFY"><span><span><span>Telecommunications India</span></span></span></p>
</td>
</tr>
<tr>
<td>
<p align="JUSTIFY"><span><span><span>Indian Telecommunications Authority</span></span></span></p>
</td>
<td></td>
<td>
<p align="JUSTIFY"><span><span><span>Vehere Interactive</span></span></span></p>
</td>
</tr>
<tr>
<td>
<p align="JUSTIFY"><span><span><span>NTRO India</span></span></span></p>
</td>
<td></td>
<td></td>
</tr>
<tr>
<td>
<p align="JUSTIFY"><span><span><span>SAIC Indian Tamil Nadu Police</span></span></span></p>
</td>
<td></td>
<td></td>
</tr>
</tbody>
</table>
<table class="plain">
<tbody>
<tr>
<th> 17 4 15<br /></th>
</tr>
</tbody>
</table>
<p align="JUSTIFY">According to the above table - which is based on data from the <span style="text-decoration: underline;"><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf">WikiLeaks</a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf">’ </a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf">ISS</a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf">World</a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"> 2013 </a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf">brochure</a></span>- the majority of Indian attendees at last years’ ISS World were from the law enforcement, defense and interior security sectors. 15 Indian companies exhibited and sold their surveillance technologies to law enforcement agencies from around the world and it is notable that India’s popular ISP provider, Reliance Communications, attended the trade show too.</p>
<p align="JUSTIFY">In addition to the ISS World 2013 brochure, the Spy Files 3 entail a detailed brochure of a major Indian surveillance technology company: ClearTrail Technologies.</p>
<h3><b>ClearTrail Technologies</b></h3>
<p align="JUSTIFY"><span style="text-decoration: underline;"><a href="http://www.clear-trail.com/">ClearTrail</a><a href="http://www.clear-trail.com/"> </a><a href="http://www.clear-trail.com/">Technologies</a></span> is an Indian company based in Indore. The document titled <span style="text-decoration: underline;"><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">“</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">Internet</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">Monitoring</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">Suite</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">”</a></span> from ClearTrail Technologies boasts about the company’s mass monitoring, deep packet inspection, COMINT, SIGINT, tactical Internet monitoring, network recording and lawful interception technologies. ClearTrail’s Internet Monitoring Suite includes the following products:</p>
<p align="JUSTIFY"><b>1. ComTrail: Mass Monitoring of IP and Voice Networks</b></p>
<p align="JUSTIFY"><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"><span style="text-decoration: underline;">ComTrail</span></a> is an integrated product suite for centralized interception and monitoring of voice and data networks. It is equipped with an advanced analysis engine for pro-active analysis of thousands of connections and is integrated with various tools, such as Link Analysis, Voice Recognition and Target Location.</p>
<p align="JUSTIFY">ComTrail is deployed within a service provider network and its monitoring function correlates voice and data intercepts across diverse networks to provide a comprehensive intelligence picture. ComTrail supports the capture, record and replay of a variety of Voice and IP communications in pretty much any type of communication, including - but not limited to- Gmail, Yahoo, Hotmail, BlackBerry, ICQ and GSM voice calls.</p>
<p align="JUSTIFY">Additionally, ComTrail intercepts data from any type of network -whether Wireless, packet data, Wire line or VoIP networks- and can decode hundreds of protocols and P2P applications, including HTTP, Instant Messengers, Web-mails, VoIP Calls and MMS.</p>
<p align="JUSTIFY">In short, ComTrail’s key features include the following:</p>
<p align="JUSTIFY">- Equipped to handle millions of communications per day intercepted over high speed STM & Ethernet Links</p>
<p align="JUSTIFY">- Doubles up as Targeted Monitoring System</p>
<p align="JUSTIFY">- On demand data retention, capacity exceeding several years</p>
<p align="JUSTIFY">- Instant Analysis across thousands of Terabytes</p>
<p align="JUSTIFY">- Correlates Identities across multiple networks</p>
<p align="JUSTIFY">- Speaker Recognition and Target Location</p>
<p align="JUSTIFY"><b>2. xTrail: Targeted IP Monitoring</b></p>
<p align="JUSTIFY"><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"><span style="text-decoration: underline;">xTrail</span></a> is a solution for interception, decoding and analysis of high speed data traffic over IP networks and independently monitors ISPs/GPRS and 3G networks. xTrail has been designed in such a way that it can be deployed within minutes and enables law enforcement agencies to intercept and monitor targeted communications without degrading the service quality of the IP network. This product is capable of intercepting all types of networks -including wireline, wireless, cable, VoIP and VSAT networks- and acts as a black box for “record and replay” targeted Internet communications.</p>
<p align="JUSTIFY">Interestingly enough, xTrail can filter based on a “pure keyword”, a URL/Domain with a keyword, an IP address, a mobile number or even with just a user identity, such as an email ID, chat ID or VoIP ID. Furthermore, xTrail can be integrated with link analysis tools and can export data in a digital format which can allegedly be presented in court as evidence.</p>
<p align="JUSTIFY">In short, xTrail’s key features include the following:</p>
<p align="JUSTIFY">- Pure passive probe</p>
<p align="JUSTIFY">- Designed for rapid field operations at ISP/GPRS/Wi-Max/VSAT Network Gateways</p>
<p align="JUSTIFY">- Stand-alone solution for interception, decoding and analysis of multi Gigabit IP traffic</p>
<p align="JUSTIFY">- Portable trolley based for simplified logistics, can easily be deployed and removed from any network location</p>
<p align="JUSTIFY">- Huge data retention, rich analysis interface and tamper proof court evidence</p>
<p align="JUSTIFY">- Easily integrates with any existing centralized monitoring system for extended coverage</p>
<p align="JUSTIFY"><b>3. QuickTrail: Tactical Wi-Fi Monitoring</b></p>
<p align="JUSTIFY">Some of the biggest IP monitoring challenges that law enforcement agencies face include cases when targets operate from public Internet networks and/or use encryption.</p>
<p align="JUSTIFY"><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"><span style="text-decoration: underline;">QuickTrail</span></a> is a device which is designed to gather intelligence from public Internet networks, when a target is operating from a cyber cafe, a hotel, a university campus or a free Wi-Fi zone. In particular, QuickTrail is equipped with multiple monitoring tools and techniques that can help intercept almost any wired, Wi-Fi or hybrid Internet network so that a target communication can be monitored. QuickTrail can be deployed within fractions of seconds to intercept, reconstruct, replay and analyze email, chat, VoIP and other Internet activities of a target. This device supports real time monitoring and wiretapping of Ethernet LANs.</p>
<p align="JUSTIFY">According to ClearTrail’s brochure, QuickTrail is a “all-in-one” device which can intercept secured communications, know passwords with c-Jack attack, alert on activities of a target, support active and passive interception of Wi-Fi and wired LAN and capture, reconstruct and replay. It is noteworthy that QuickTrail can identify a target machine on the basis of an IP address, MAC ID, machine name, activity status and several other parameters. In addition, QuickTrail supports protocol decoding, including HTTP, SMTP, POP3 and HTTPS. This device also enables the remote and central management of field operations at geographically different locations.</p>
<p align="JUSTIFY">In short, QuickTrail’s key features include the following:</p>
<p align="JUSTIFY">- Conveniently housed in a laptop computer</p>
<p align="JUSTIFY">- Intercepts Wi-Fi and wired LANs in five different ways</p>
<p align="JUSTIFY">- Breaks WEP, WPA/WPA2 to rip-off secured Wi-Fi networks</p>
<p align="JUSTIFY">- Deploys spyware into a target’s machine</p>
<p align="JUSTIFY">- Monitor’s Gmail, Yahoo and all other HTTPS-based communications</p>
<p align="JUSTIFY">- Reconstructs webmails, chats, VoIP calls, news groups and social networks</p>
<p align="JUSTIFY"><b>4. mTrail: Off-The-Air Interception</b></p>
<p align="JUSTIFY"><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"><span style="text-decoration: underline;">mTrail</span></a> offers active and passive ‘off-the-air’ interception of GSM 900/1800/1900 Mhz phone calls and data to meet law enforcement surveillance and investigation requirements. The mTrail passive interception system works in the stealth mode so that there is no dependence on the network operator and so that the target is unaware of the interception of its communications.</p>
<p align="JUSTIFY">The mTrail system has the capability to scale from interception of 2 channels (carrier frequencies) to 32 channels. mTrail can be deployed either in a mobile or fixed mode: in the mobile mode the system is able to fit into a briefcase, while in the fixed mode the system fits in a rack-mount industrial grade chassis.</p>
<p align="JUSTIFY">Target location identification is supported by using signal strength, target numbers, such as IMSI, TIMSI, IMEI or MSI SDN, which makes it possible to listen to the conversation on so-called “lawfully intercepted” calls in near real-time, as well as to store all calls. Additionally, mTrail supports the interception of targeted calls from pre-defined suspect lists and the monitoring of SMS and protocol information.</p>
<p align="JUSTIFY">In short, mTrail’s key features include the following:</p>
<p align="JUSTIFY">- Designed for passive interception of GSM communications</p>
<p align="JUSTIFY">- Intercepts Voice and SMS “off-the-air”</p>
<p align="JUSTIFY">- Detects the location of the target</p>
<p align="JUSTIFY">- Can be deployed as a fixed unit or mounted in a surveillance van</p>
<p align="JUSTIFY">- No support required from GSM operator</p>
<p align="JUSTIFY"><b>5. Astra: Remote Monitoring and Infection framework</b></p>
<p align="JUSTIFY"><span style="text-decoration: underline;"><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">“</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">Astra</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">”</a></span> is a remote monitoring and infection framework which incorporates both conventional and proprietary infection methods to ensure bot delivery to the targeted devices. It also offers a varied choice in handling the behavior of bots and ensuring non-traceable payload delivery to the controller.</p>
<p align="JUSTIFY">The conventional methods of infection include physical access to a targeted device by using exposed interfaces, such as a CD-ROM, DVD and USB ports, as well as the use of social media engineering techniques. However, Astra also supports bot deployment <i>without</i> requiring any physical access to the target device.</p>
<p align="JUSTIFY">In particular, Astra can push bot to <i>any</i> targeted machine sharing the <i>same</i> LAN (wired, wi-fi or hybrid). The SEED is a generic bot which can identify a target’s location, log keystrokes, capture screen-shots, capture Mic, listen to Skype calls, capture webcams and search the target’s browsing history. Additionally, the SEED bot can also be remotely activated, deactivated or terminated, as and when required. Astra allegedly provides an un-traceable reporting mechanism that operates without using any proxies, which overrules the possibility of getting traced by the target.</p>
<p align="JUSTIFY">Astra’s key features include the following:</p>
<p align="JUSTIFY">- Proactive intelligence gathering</p>
<p align="JUSTIFY">- End-to-end remote infection and monitoring framework</p>
<p align="JUSTIFY">- Follow the target, beat encryption, listen to in-room conversations, capture keystrokes and screen shots</p>
<p align="JUSTIFY">- Designed for centralized management of thousands of targets</p>
<p align="JUSTIFY">- A wide range of deployment mechanisms to optimize success ration</p>
<p align="JUSTIFY">- Non-traceable, non-detectable delivery mechanism</p>
<p align="JUSTIFY">- Intrusive yet stealthy</p>
<p align="JUSTIFY">- Easy interface for handling most complex tasks</p>
<p align="JUSTIFY">- Successfully tested over the current top 10 anti-virus available in the market</p>
<p align="JUSTIFY">- No third party dependencies</p>
<p align="JUSTIFY">- Free from any back-door intervention</p>
<p align="JUSTIFY"><span style="text-decoration: underline;"><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">ClearTrail</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">Technologies</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">argue</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">that</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">they</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">meet</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">lawful</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">interception</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">regulatory</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">requirements</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"> </a></span>across the globe. In particular, they claim that their products are compliant with <a href="http://www.etsi.org/technologies-clusters/technologies/regulation-legislation"><span style="text-decoration: underline;">ETSI</span></a> and <span style="text-decoration: underline;"><a href="http://cryptome.org/laes/calea-require.pdf">CALEA</a><a href="http://cryptome.org/laes/calea-require.pdf"> </a><a href="http://cryptome.org/laes/calea-require.pdf">regulations</a></span> and that they are efficient to cater to region specific requirements as well.</p>
<p align="JUSTIFY">The latest Spy Files also include data on foreign surveillance technology companies operating in India, such as <span style="text-decoration: underline;"><a href="http://wikileaks.org/spyfiles3.html#an1">Telesoft</a><a href="http://wikileaks.org/spyfiles3.html#an1"> </a><a href="http://wikileaks.org/spyfiles3.html#an1">Technologies</a></span>, <span style="text-decoration: underline;"><a href="http://www.wikileaks.org/spyfiles/docs/AGTINTERNATIONAL-2011-UrbaManaSolu-fr.pdf">AGT</a><a href="http://www.wikileaks.org/spyfiles/docs/AGTINTERNATIONAL-2011-UrbaManaSolu-fr.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/AGTINTERNATIONAL-2011-UrbaManaSolu-fr.pdf">International</a></span> and <span style="text-decoration: underline;"><a href="http://wikileaks.org/spyfiles3.html#an1">Verint</a><a href="http://wikileaks.org/spyfiles3.html#an1"> </a><a href="http://wikileaks.org/spyfiles3.html#an1">Systems</a></span>. In particular, <span style="text-decoration: underline;"><a href="http://verint.com/">Verint</a><a href="http://verint.com/"> </a><a href="http://verint.com/">Systems</a></span> has its headquarters in New York and offices all around the world, including Bangalore in India. Founded in 1994 and run by Dan Bodner, Verint Systems produces a wide range of surveillance technologies, including the following:</p>
<p align="JUSTIFY">- Impact 360 Speech Analytics</p>
<p align="JUSTIFY">- Impact 360 Text Analytics</p>
<p align="JUSTIFY">- Nextiva Video Management Software (VMS)</p>
<p align="JUSTIFY">- Nextiva Physical Security Information Management (PSIM)</p>
<p align="JUSTIFY">- Nextiva Network Video Recorders (NVRs)</p>
<p align="JUSTIFY">- Nextiva Video Business Intelligence (VBI)</p>
<p align="JUSTIFY">- Nextiva Surveillance Analytics</p>
<p align="JUSTIFY">- Nextiva IP cameras</p>
<p align="JUSTIFY">- CYBERVISION Network Security</p>
<p align="JUSTIFY">- ENGAGE suite</p>
<p align="JUSTIFY">- FOCAL-INFO (FOCAL-COLLECT & FOCAL-ANALYTICS)</p>
<p align="JUSTIFY">- RELIANT</p>
<p align="JUSTIFY">- STAR-GATE</p>
<p>- VANTAGE</p>
<p align="JUSTIFY">While <span style="text-decoration: underline;"><a href="http://verint.com/">Verint</a><a href="http://verint.com/"> </a><a href="http://verint.com/">Systems</a></span> claims to be in compliance with ETSI, CALEA and other worldwide lawful interception and standards and regulations, it remains unclear whether such products successfully help law enforcement agencies in tackling crime and terrorism, without violating individuals’ right to privacy and other human rights. After all, <span style="text-decoration: underline;"><a href="http://www.issworldtraining.com/iss_europe/">Verint</a><a href="http://www.issworldtraining.com/iss_europe/"> </a><a href="http://www.issworldtraining.com/iss_europe/">Systems</a><a href="http://www.issworldtraining.com/iss_europe/"> </a><a href="http://www.issworldtraining.com/iss_europe/">has</a><a href="http://www.issworldtraining.com/iss_europe/"> </a><a href="http://www.issworldtraining.com/iss_europe/">participated</a><a href="http://www.issworldtraining.com/iss_europe/"> </a><a href="http://www.issworldtraining.com/iss_europe/">in</a><a href="http://www.issworldtraining.com/iss_europe/"> </a><a href="http://www.issworldtraining.com/iss_europe/">ISS</a><a href="http://www.issworldtraining.com/iss_europe/"> </a><a href="http://www.issworldtraining.com/iss_europe/">World</a><a href="http://www.issworldtraining.com/iss_europe/"> </a><a href="http://www.issworldtraining.com/iss_europe/">Trade</a><a href="http://www.issworldtraining.com/iss_europe/"> </a><a href="http://www.issworldtraining.com/iss_europe/">shows</a></span> which exhibit some of the most controversial spyware in the world, used to target individuals and for mass surveillance.</p>
<h2><b>And what do the latest Spy Files mean for India?</b></h2>
<p align="JUSTIFY">Why is it even important to look at the latest Spy Files? Well, for starters, they reveal data about which Indian law enforcement agencies are interested in surveillance and which companies are interested in selling and/or buying the latest spy gear. And why is any of this important? I can think of three main reasons:</p>
<p align="JUSTIFY">1. The Central Monitoring System (CMS)</p>
<p align="JUSTIFY">2. Is any of this surveillance even legal in India?</p>
<p align="JUSTIFY">3. Can such surveillance result in the violation of human rights?</p>
<h3><b>Spy Files 3...and the Central Monitoring System (CMS)</b></h3>
<p align="JUSTIFY">Following the <a href="http://www.noeman.org/gsm/hindi/71159-26-november-2008-mumbai-terrorist-attacks.html">Mumbai</a><a href="http://www.noeman.org/gsm/hindi/71159-26-november-2008-mumbai-terrorist-attacks.html"> 2008 </a><a href="http://www.noeman.org/gsm/hindi/71159-26-november-2008-mumbai-terrorist-attacks.html">terrorist</a><a href="http://www.noeman.org/gsm/hindi/71159-26-november-2008-mumbai-terrorist-attacks.html"> </a><a href="http://www.noeman.org/gsm/hindi/71159-26-november-2008-mumbai-terrorist-attacks.html">attacks</a>, the Telecom Enforcement, Resource and Monitoring (TREM) cells and the Centre for Development of Telematics (C-DOT) started preparing the <a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system">Central</a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"> </a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system">Monitoring</a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"> </a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system">System</a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"> (</a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system">CMS</a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system">)</a>. As of April 2013, this project is being manned by the Intelligence Bureau, while agencies which are planned to have access to it include the Research & Analysis Wing (RAW) and the Central Bureau of Investigation (CBI). ISP and Telecom operators are required to<b> </b><span>install the gear which enables law enforcement agencies to carry</span> out the Central Monitoring System under the <a href="http://www.dot.gov.in/licensing/access-services">Unified</a><a href="http://www.dot.gov.in/licensing/access-services"> </a><a href="http://www.dot.gov.in/licensing/access-services">Access</a><a href="http://www.dot.gov.in/licensing/access-services"> </a><a href="http://www.dot.gov.in/licensing/access-services">Services</a><a href="http://www.dot.gov.in/licensing/access-services"> (</a><a href="http://www.dot.gov.in/licensing/access-services">UAS</a><a href="http://www.dot.gov.in/licensing/access-services">) </a><a href="http://www.dot.gov.in/licensing/access-services">License</a><a href="http://www.dot.gov.in/licensing/access-services"> </a><a href="http://www.dot.gov.in/licensing/access-services">Agreement</a>.</p>
<p align="JUSTIFY">The Central Monitoring System aims at centrally monitoring all telecommunications and Internet communications in India and its estimated cost is <span style="text-decoration: underline;"><a href="http://www.ciol.com/ciol/news/184770/governments-central-monitoring-system-operational-soon">Rs</a><a href="http://www.ciol.com/ciol/news/184770/governments-central-monitoring-system-operational-soon">. 4 </a><a href="http://www.ciol.com/ciol/news/184770/governments-central-monitoring-system-operational-soon">billion</a></span>. In addition to <span style="text-decoration: underline;"><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system">equipping</a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"> </a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system">government</a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"> </a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system">agencies</a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"> </a></span>with Direct Electronic Provisioning, filters and alerts on the target numbers, the CMS will also enable Call Data Records (CDR) analysis and data mining to identify personal information of the target numbers. The CMS supplements<span style="text-decoration: underline;"><a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"> </a><a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf">regional</a><a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"> </a><a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf">Internet</a><a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"> </a><a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf">Monitoring</a><a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"> </a><a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf">Systems</a><a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf">, </a><a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf">such</a><a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"> </a><a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf">as</a><a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"> </a><a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf">that</a><a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"> </a><a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf">of</a><a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"> </a><a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf">Assam</a></span>, by providing a nationwide monitoring of telecommunications and Internet communications, supposedly to assist law enforcement agencies in tackling crime and terrorism.</p>
<p align="JUSTIFY">However, data monitored and collected through the CMS will be stored in a<span style="text-decoration: underline;"><a href="http://www.globalpost.com/dispatch/news/regions/asia-pacific/india/130509/india-central-monitoring-system-government-internet-access"> </a><a href="http://www.globalpost.com/dispatch/news/regions/asia-pacific/india/130509/india-central-monitoring-system-government-internet-access">centralised</a><a href="http://www.globalpost.com/dispatch/news/regions/asia-pacific/india/130509/india-central-monitoring-system-government-internet-access"> </a><a href="http://www.globalpost.com/dispatch/news/regions/asia-pacific/india/130509/india-central-monitoring-system-government-internet-access">database</a></span>, which could potentially increase the probability of centralized cyber attacks and thus increase, rather than reduce, threats to national security. Furthermore, some basic rules of statistics indicate that <span style="text-decoration: underline;"><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system">the</a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"> </a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system">bigger</a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"> </a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system">the</a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"> </a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system">amount</a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"> </a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system">of</a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"> </a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system">data</a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system">, </a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system">the</a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"> </a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system">bigger</a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"> </a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system">the</a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"> </a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system">probability</a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"> </a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system">of</a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"> </a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system">an</a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"> </a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system">error</a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"> </a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system">in</a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"> </a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system">matching</a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"> </a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system">profiles</a></span>, which could potentially result in innocent people being charged with crimes they did not commit. And most importantly: the CMS currently lacks adequate legal oversight, which means that it remains unclear how monitored data will be used. The <span style="text-decoration: underline;"><a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf">UAS</a><a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"> </a><a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf">License</a><a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"> </a><a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf">Agreement</a><a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"> </a><a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf">regarding</a><a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"> </a><a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf">the</a><a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"> </a><a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf">CMS</a></span> mandates mass surveillance by requiring ISPs and Telecom operators to enable the monitoring and interception of communications. However, targeted and mass surveillance through the CMS not only raises serious questions around its legality, but also creates the potential for abuse of the right to privacy and other human rights.</p>
<p align="JUSTIFY">Interestingly enough, Indian law enforcement agencies which attended <span style="text-decoration: underline;"><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf">last</a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf">years</a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf">’ </a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf">ISS</a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf">World</a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf">trade</a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf">shows</a></span> are linked to the Central Monitoring System. In particular, last years’ law enforcement, defense and interior security attendees include the Centre for Development of Telematics (C-DOT) and the Department of Telecommunications, both of which prepared the Central Monitoring System. The list of attendees also includes India’s Intelligence Bureau, which is manning the CMS, as well as the <span style="text-decoration: underline;"><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system">agencies</a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"> </a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system">which</a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"> </a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system">will</a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"> </a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system">have</a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"> </a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system">access</a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"> </a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system">to</a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"> </a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system">the</a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"> </a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system">CMS</a></span>: the Central Bureau of Investigation (CBI), the Research and Analysis Wing (RAW), the National Technical Research Organization (NTRO) and various other state police departments and intelligence agencies.</p>
<p align="JUSTIFY">Furthermore, Spy Files 3 entail a <a href="http://wikileaks.org/spyfiles3.html#an1">list</a><a href="http://wikileaks.org/spyfiles3.html#an1"> </a><a href="http://wikileaks.org/spyfiles3.html#an1">of</a><a href="http://wikileaks.org/spyfiles3.html#an1"> </a><a href="http://wikileaks.org/spyfiles3.html#an1">last</a><a href="http://wikileaks.org/spyfiles3.html#an1"> </a><a href="http://wikileaks.org/spyfiles3.html#an1">years</a><a href="http://wikileaks.org/spyfiles3.html#an1">’ </a><a href="http://wikileaks.org/spyfiles3.html#an1">ISS</a><a href="http://wikileaks.org/spyfiles3.html#an1"> </a><a href="http://wikileaks.org/spyfiles3.html#an1">World</a><a href="http://wikileaks.org/spyfiles3.html#an1"> </a><a href="http://wikileaks.org/spyfiles3.html#an1">security</a><a href="http://wikileaks.org/spyfiles3.html#an1"> </a><a href="http://wikileaks.org/spyfiles3.html#an1">company</a><a href="http://wikileaks.org/spyfiles3.html#an1"> </a><a href="http://wikileaks.org/spyfiles3.html#an1">attendees</a>, which includes several Indian companies. Again, interestingly enough, many of these companies may potentially be aiding law enforcement with the technology to carry out the Central Monitoring System. ClearTrail Technologies, in particular, provides <a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">solutions</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">for</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">targeted</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">and</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">mass</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">monitoring</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">of</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">IP</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">and</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">voice</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">networks</a>, as well as remote monitoring and infection frameworks - all of which would potentially be perfect to aid the Central Monitoring System.</p>
<p align="JUSTIFY">In fact, ClearTrail states in its brochure that its <a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">ComTrail</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">product</a> is equipped to handle millions of communications per day, while its <a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">xTrail</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">product</a> can easily be integrated with any existing centralised monitoring system for extended coverage. And if that’s not enough, ClearTrail’s <a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">“</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">Astra</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">” </a>is designed for the centralized management of thousands of targets. While there may not be any concrete proof that ClearTrail is indeed aiding the Centralized Monitoring System, the facts speak for themselves: ClearTrail is an Indian company which sells target and mass monitoring products to law enforcement agencies. The Centralized Monitoring System is currently being implemented. What are the odds that ClearTrail is <i>not </i>equipping the CMS? <span>And what are the odds that such technology is </span><i><span>not</span></i><span> being used for other mass electronic surveillance programmes, such as the Lawful Intercept and Monitoring (LIM)?</span></p>
<h3><b>Spy Files 3...and the legality of India’s surveillance technologies</b></h3>
<p align="JUSTIFY">ClearTrail Technologies’ <a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"><span style="text-decoration: underline;">brochure</span></a> -the only leaked document on Indian surveillance technology by the latest Spy Files- states that the company complies with <a href="http://www.etsi.org/technologies-clusters/technologies/regulation-legislation"><span style="text-decoration: underline;">ETSI</span></a> and <span style="text-decoration: underline;"><a href="http://cryptome.org/laes/calea-require.pdf">CALEA</a><a href="http://cryptome.org/laes/calea-require.pdf"> </a><a href="http://cryptome.org/laes/calea-require.pdf">regulations</a></span>. While it’s clear that the company complies with U.S. and European regulations on the interception of communications to attract more customers in the international market, such regulations don’t really apply <i>within</i> India, which is part of ClearTrail’s market. Notably enough, ClearTrail does not mention any compliance with Indian regulations in its brochure. So let’s have a look at them.</p>
<p align="JUSTIFY">India has five laws which regulate surveillance:</p>
<p align="JUSTIFY">1. The <span style="text-decoration: underline;"><a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf">Indian</a><a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"> </a><a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf">Telegraph</a><a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"> </a><a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf">Act</a></span>, 1885</p>
<p align="JUSTIFY">2. The <span style="text-decoration: underline;"><a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf">Indian</a><a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"> </a><a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf">Post</a><a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"> </a><a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf">Office</a><a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"> </a><a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf">Act</a></span>, 1898</p>
<p align="JUSTIFY">3. The <span style="text-decoration: underline;"><a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf">Indian</a><a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"> </a><a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf">Wireless</a><a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"> </a><a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf">Telegraphy</a><a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"> </a><a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf">Act</a></span>, 1933</p>
<p align="JUSTIFY">4. The <span style="text-decoration: underline;"><a href="http://www.delhidistrictcourts.nic.in/CrPC.htm">Code</a><a href="http://www.delhidistrictcourts.nic.in/CrPC.htm"> </a><a href="http://www.delhidistrictcourts.nic.in/CrPC.htm">of</a><a href="http://www.delhidistrictcourts.nic.in/CrPC.htm"> </a><a href="http://www.delhidistrictcourts.nic.in/CrPC.htm">Criminal</a><a href="http://www.delhidistrictcourts.nic.in/CrPC.htm"> </a><a href="http://www.delhidistrictcourts.nic.in/CrPC.htm">Procedure</a><a href="http://www.delhidistrictcourts.nic.in/CrPC.htm"> (</a><a href="http://www.delhidistrictcourts.nic.in/CrPC.htm">CrPc</a><a href="http://www.delhidistrictcourts.nic.in/CrPC.htm">)</a></span>, 1973: Section 91</p>
<p align="JUSTIFY">5. The <span style="text-decoration: underline;"><a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf">Information</a><a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"> </a><a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf">Technology</a><a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"> (</a><a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf">Amendment</a><a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf">) </a><a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf">Act</a></span>, 2008</p>
<p align="JUSTIFY">The <span style="text-decoration: underline;"><a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf">Indian</a><a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"> </a><a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf">Post</a><a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"> </a><a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf">Offices</a><a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"> </a><a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf">Act</a></span> does not cover electronic communications and the <span style="text-decoration: underline;"><a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf">Indian</a><a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"> </a><a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf">Wireless</a><a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"> </a><a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf">Telegraphy</a><a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"> </a><a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf">Act</a><a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"> </a></span>lacks procedures which would determine if surveillance should be targeted or not. Neither the <span style="text-decoration: underline;"><a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf">Indian</a><a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"> </a><a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf">Telegraph</a><a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"> </a><a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf">Act</a></span> nor the <span style="text-decoration: underline;"><a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf">Information</a><a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"> </a><a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf">Technology</a><a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"> (</a><a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf">Amendment</a><a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf">) </a><a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf">Act</a></span> cover mass surveillance, but are both limited to targeted surveillance. Moreover, targeted interception in India according to these laws requires case-by-case authorization by either the home secretary or the secretary department of information technology. In other words, unauthorized, limitless, mass surveillance is not technically permitted by law in India.</p>
<p align="JUSTIFY">The Indian Telegraph Act mandates that the interception of communications can only be carried out on account of <a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0">a</a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"> </a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0">public</a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"> </a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0">emergency</a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"> </a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0">or</a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"> </a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0">for</a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"> </a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0">public</a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"> </a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0">safety</a>. However, in 2008, the Information Technology Act copied most of the interception provisions of the Indian Telegraph Act, but removed the preconditions of public emergency or public safety, and instead expanded the power of the government to order interception for the “investigation of any offense”.</p>
<p align="JUSTIFY">The interception of Internet communications is mainly covered by the <a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0">2009 </a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0">Rules</a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"> </a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0">under</a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"> </a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0">the</a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"> </a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0">Information</a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"> </a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0">Technology</a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"> </a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0">Act</a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"> 2008 </a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0">and</a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"> </a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0">Sections</a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"> 69 </a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0">and</a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"> 69</a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0">B</a> are particularly noteworthy. According to these Sections, an Intelligence Bureau officer who leaked national secrets may be imprisoned for up to three years, while Section 69 not only allows for the interception of any information transmitted through a computer resource, but also requires that users disclose their encryption keys upon request or face a jail sentence of up to seven years.</p>
<p align="JUSTIFY">While these laws allow for the interception of communications and can be viewed as widely controversial, they do not technically permit the <i>mass</i> surveillance of communications. In other words, ClearTrail’s products, such as <a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"><span style="text-decoration: underline;">ComTrail</span></a>, which enable the mass interception of IP networks, lack legal backing. However, the <span style="text-decoration: underline;"><a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf">Unified</a><a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"> </a><a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf">Access</a><a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"> </a><a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf">Services</a><a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"> (</a><a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf">UAS</a><a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf">) </a><a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf">License</a><a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"> </a><a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf">Agreement</a></span> regarding the Central Monitoring System mandates mass surveillance and requires ISP and Telecom operators to comply.</p>
<p align="JUSTIFY">Through the licenses of the Department of Telecommunications, Internet service providers, cellular providers and telecoms are required to provide the Government of India direct access to all communications data and content <a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0">even</a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"> </a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0">without</a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"> </a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0">a</a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"> </a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0">warrant</a>, which is not permitted under the laws on interception. These licenses also require cellular providers to have ‘bulk encryption’ of less than 40 bits, which means that potentially any person can use off-the-air interception to monitor phone calls. However, such licenses do not regulate the capture of signal strength, target numbers like IMSI, TIMSI, IMEI or MSI SDN, which can be captured through ClearTrail’s <a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"><span style="text-decoration: underline;">mTrail</span></a> product.</p>
<p align="JUSTIFY"><span>More importantly, following <a class="external-link" href="http://www.financialexpress.com/news/states-begin-to-surrender-offair-phone-snooping-equipment/957859">allegations</a> that the National Technical Research Organization (NTRO) had been using off-the-air interception equipment to snoop on politicians in 2011, the Home Ministry issued a directive to ban the possession or use of all off-the-air phone interception gear. As a result, the Indian Government asked the Customs Department to provide an inventory of all all such equipment imported over a ten year period, and it was uncovered that as many as 73,000 pieces of equipment had been imported. Since, the Home Ministry has informed the heads of law enforcement agencies that there has been a <a class="external-link" href="http://m.indianexpress.com/news/state-govts-hand-over-few-offair-phonetapping-sets-to-centre/1185166/">compete ban on use of such equipment</a> and that all those who possess such equipment and fail to inform the Government will face prosecution and imprisonment. In short, ClearTrail's product, mTrail, which undertakes off-the-air phone monitoring is illegal and Indian law enforcement agencies are prohibited from using it. </span></p>
<p align="JUSTIFY">ClearTrail’s <a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">“</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">Astra</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">”</a> product is capable of remote infection and monitoring, which can push bot to any targeted machine sharing the same LAN. While India’s ISP and telecommunications licenses generally provide some regulations, they appear to be inadequate in regulating specific surveillance technologies which have the capability to target machines and remotely monitor them. Such <a href="http://www.dot.gov.in/licensing/access-services"><span style="text-decoration: underline;">licenses</span></a> mandate mass surveillance, but legally, wireless communications are completely unregulated, which raises the question of whether the interception of public Internet networks is allowed. In other words, it is not clear if ClearTrail’s <a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"><span style="text-decoration: underline;">QuickTrail</span></a> is technically legal or not. The <a class="external-link" href="http://www.auspi.in/policies/UASL.pdf">UAS License agreement</a><a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"> </a>mandates mass surveillance, and while the law does not prohibit it, it does not mandate mass surveillance either. This remains a grey area.</p>
<p align="JUSTIFY">The issue of data retention arises from <a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">ClearTrail</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">’</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">s</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">leaked</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">brochure</a>. In particular, ClearTrail states in its brochure that ComTrail - which undertakes mass monitoring of IP and Voice networks - retains data upon request, with a capacity that exceeds several years. xTrail - for targeted IP monitoring - has the ability to retain huge volumes of data which can potentially be used as proof in court. However, India currently lacks privacy legislation which would regulate data retention, which means that data collected by ClearTrail could potentially be stored indefinitely.</p>
<p align="JUSTIFY"><a class="external-link" href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf">Section 7 of the Information Technology (Amendment) Act, 2008</a>, deals with the retention of electronic records. However, this section does not state a particular data retention period, nor who will have authorized access to data during its retention, who can authorize such access, whether retained data can be shared with third parties and, if so, under what conditions. Section 7 of the Information Technology (Amendment) Act, 2008, appears to be incredibly vague and to fail to regulate data retention adequately.</p>
<p align="JUSTIFY">Data retention requirements for service providers are included in the <a href="https://cis-india.org/internet-governance/blog/data-retention-in-india" class="external-link">ISP and UASL licenses</a> and, while they clarify the type of data they retain, they do not specify adequate conditions for data retention. Due to the lack of data protection legislation in India, it remains unclear how long data collected by companies, such as ClearTrail, would be stored for, as well as who would have authorized access to such data during its retention period, whether such data would be shared with third parties and disclosed and if so, under what conditions.</p>
<p align="JUSTIFY">India currently lacks specific regulations for the use of various types of technologies, which makes it unclear whether <span style="text-decoration: underline;"><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">ClearTrail</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">’</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">s</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">spy</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">products</a></span> are technically legal or not. It is clear that ClearTrail’s mass interception products, such as ComTrail, are not legalized - since Indian laws allow for targeted interception- but they are mandated through the <span style="text-decoration: underline;"><a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf">UAS</a><a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"> </a><a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf">License</a><a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"> </a><a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf">agreement</a></span> regarding the Central Monitoring System.</p>
<p align="JUSTIFY">In short, the legality of ClearTrail’s surveillance technologies remains ambiguous. While India’s ISP and telecom licenses and the <a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf">UAS</a><a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"> </a><a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf">License</a><a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"> </a><a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf">Agreement</a> mandate mass surveillance, the laws - particularly the 2009 Information Technology Rules- mandate targeted surveillance and remain silent on the issue of mass surveillance. Technically, this does not constitute mass surveillance legal or illegal, but rather a grey area. Furthermore, while <a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf">India</a><a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf">’</a><a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf">s</a><a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"> </a><a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf">Telegraph</a><a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"> </a><a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf">Act</a>, <a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf">Information</a><a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"> </a><a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf">Technology</a><a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"> </a><a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf">Act</a><a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"> </a>and 2009 Rules allow for the interception, monitoring and decryption of communications and surveillance in general, they do not explicitly regulate the various types of surveillance technologies, but rather attempt to “legalize” them through the blanket term of surveillance.</p>
<p align="JUSTIFY">One thing is clear: India’s license agreements ensure that all ISPs and telecom operators are a part of the surveillance regime. The lack of regulations for India’s surveillance technologies appear to create a grey zone for the expansion of mass surveillance in the country. According to <span style="text-decoration: underline;"><a href="http://www.outlookindia.com/article.aspx?265192">Saikat</a><a href="http://www.outlookindia.com/article.aspx?265192"> </a><a href="http://www.outlookindia.com/article.aspx?265192">Datta</a></span>, an investigative journalist, a senior privacy telecom official stated:</p>
<blockquote class="italized">“<i>Do you really think a private telecom company can stand up to the government or any intelligence agency and cite law if they want to tap someone’s phone?” </i></blockquote>
<p style="text-align: justify; "></p>
<h3><b>Spy Files 3...and human rights in India</b></h3>
<p align="JUSTIFY">The facts speak for themselves. The latest Spy Files confirm that the same agencies involved in the development of the Central Monitoring System (CMS) are also interested in the latest surveillance technology sold in the global market. Spy Files 3 also provide data on one of India’s largest surveillance technology companies, <a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"><span style="text-decoration: underline;">ClearTrail</span></a>, which sells a wide range of surveillance technologies to law enforcement agencies around the world. And Spy Files 3 show us exactly what these technologies can do.</p>
<p align="JUSTIFY">In particular, ClearTrail’s <a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"><span style="text-decoration: underline;">ComTrail</span></a> provides mass monitoring of IP and voice networks, which means that law enforcement agencies using it are capable of intercepting millions of communications every day through Gmail, Yahoo, Hotmail and others, of correlating our identities across networks and of targeting our location. <span style="text-decoration: underline;"><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">xTrail</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"> </a></span>enables law enforcement agencies to monitor us based on our “harmless” metadata, such as our IP address, our mobile number and our email ID. Think our data is secure when using the Internet through a cyber cafe? Well <a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"><span style="text-decoration: underline;">QuickTrail</span></a> proves us wrong, as it’s able to assist law enforcement agencies in monitoring and intercepting our communications even when we are using public Internet networks.</p>
<p align="JUSTIFY">And indeed, carrying a mobile phone is like carrying a GPS device, especially since <a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"><span style="text-decoration: underline;">mTrail</span></a> provides law enforcement with off-the-air interception of mobile communications. Not only can mTrail target our location, listen to our calls and store our data, but it can also undertake passive off-the-air interception and monitor our voice, SMS and protocol information. Interestingly enough, mTrail also intercepts targeted calls from a predefined suspect list. The questions though which arise are: who is a suspect? How do we even know if we are suspects? In the age of the War on Terror, potentially anyone could be a suspect and thus potentially anyone’s mobile communications could be intercepted. After all, mass surveillance dictates that <span style="text-decoration: underline;"><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear">we</a><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"> </a><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear">are</a><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"> </a><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear">all</a><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"> </a><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear">suspicious</a><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"> </a><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear">until</a><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"> </a><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear">proven</a><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"> </a><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear">innocent</a><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear">. </a></span></p>
<p align="JUSTIFY">And if anyone can potentially be a suspect, then potentially anyone can be remotely infected and monitored by <a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"><span style="text-decoration: underline;">Astra</span></a>. Having physical access to a targeted device is a conventional surveillance mean of the past. Today, Astra can <i>remotely</i> push bot to our laptops and listen to our Skype calls, capture our Webcams, search our browsing history, identify our location and much more. And why is any of this concerning? Because contrary to mainstream belief, <span style="text-decoration: underline;"><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear">we</a><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"> </a><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear">should</a><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"> </a><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear">all</a><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"> </a><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear">have</a><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"> </a><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear">something</a><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"> </a><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear">to</a><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"> </a><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear">hide</a><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear">! </a></span></p>
<p align="JUSTIFY"><span style="text-decoration: underline;"><a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html">Privacy</a><a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"> </a><a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html">protects</a><a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"> </a><a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html">us</a><a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"> </a><a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html">from</a><a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"> </a><a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html">abuse</a><a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"> </a><a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html">from</a><a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"> </a><a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html">those</a><a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"> </a><a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html">in</a><a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"> </a><a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html">power</a><a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"> </a></span>and safeguards our individuality and autonomy as human beings. If we are opposed to the idea of the police searching our home without a search warrant, we should be opposed to the idea of our indiscriminate mass surveillance. After all, mass surveillance - especially the type undertaken by <span style="text-decoration: underline;"><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">ClearTrail</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">’</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">s</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">products</a></span> - can potentially result in the access, sharing, disclosure and retention of data much more valuable than that acquired by the police searching our home. Our credit card details, our photos, our acquaintances, our personal thoughts and opinions, and other sensitive personal information can usually be found in our laptops, which potentially can constitute much more incriminating information than that found in our homes.</p>
<p align="JUSTIFY">And most importantly: even if we think that we have nothing to hide, it’s really not up to us to decide: it’s up to data analysts. While we may think that our data is “harmless”, a data analyst linking our data to various other people and search activities we have undertaken might indicate otherwise. Five years ago, <span style="text-decoration: underline;"><a href="http://www.timeshighereducation.co.uk/402844.article">a</a><a href="http://www.timeshighereducation.co.uk/402844.article"> </a><a href="http://www.timeshighereducation.co.uk/402844.article">UK</a><a href="http://www.timeshighereducation.co.uk/402844.article"> </a><a href="http://www.timeshighereducation.co.uk/402844.article">student</a><a href="http://www.timeshighereducation.co.uk/402844.article"> </a><a href="http://www.timeshighereducation.co.uk/402844.article">studying</a><a href="http://www.timeshighereducation.co.uk/402844.article"> </a><a href="http://www.timeshighereducation.co.uk/402844.article">Islamic</a><a href="http://www.timeshighereducation.co.uk/402844.article"> </a><a href="http://www.timeshighereducation.co.uk/402844.article">terrorism</a><a href="http://www.timeshighereducation.co.uk/402844.article"> </a><a href="http://www.timeshighereducation.co.uk/402844.article">for</a><a href="http://www.timeshighereducation.co.uk/402844.article"> </a><a href="http://www.timeshighereducation.co.uk/402844.article">his</a><a href="http://www.timeshighereducation.co.uk/402844.article"> </a><a href="http://www.timeshighereducation.co.uk/402844.article">Masters</a><a href="http://www.timeshighereducation.co.uk/402844.article"> </a><a href="http://www.timeshighereducation.co.uk/402844.article">dissertation</a><a href="http://www.timeshighereducation.co.uk/402844.article"> </a><a href="http://www.timeshighereducation.co.uk/402844.article">was</a><a href="http://www.timeshighereducation.co.uk/402844.article"> </a><a href="http://www.timeshighereducation.co.uk/402844.article">detained</a><a href="http://www.timeshighereducation.co.uk/402844.article"> </a><a href="http://www.timeshighereducation.co.uk/402844.article">for</a><a href="http://www.timeshighereducation.co.uk/402844.article"> </a><a href="http://www.timeshighereducation.co.uk/402844.article">six</a><a href="http://www.timeshighereducation.co.uk/402844.article"> </a><a href="http://www.timeshighereducation.co.uk/402844.article">days</a><a href="http://www.timeshighereducation.co.uk/402844.article">.</a></span> The student may not have been a terrorist, but his data said this: “Young, male, Muslim... who is downloading Al-Qaeda’s training material” - and that was enough for him to get detained. Clearly, the data analysts mining his online activity did not care about the fact that the only reason why he was downloading Al-Qaeda material was for his Masters dissertation. The fact that he was a male Muslim downloading terrorist material was incriminating enough.</p>
<p align="JUSTIFY">This incident reveals several concerning points: The first is that he was clearly already under surveillance, prior to downloading Al-Qaeda’s material. However, given that he did not have a criminal record and was “just a Masters student in the UK”, there does not appear to be any probable cause for his surveillance in the first place. Clearly he was on some suspect list on the premise that he is male and Muslim - which is a discriminative approach. The second point is that after this incident, it is likely that some male Muslims may be more cautious about their online activity - with the fear of being on some suspect list and eventually being prosecuted because their data shows that “they’re a terrorist”. Thus, mass surveillance today appears to also have implications on freedom of expression. The third point is that this incident reveals the extent of mass surveillance, since even a document downloaded by a Masters student is being monitored.</p>
<p align="JUSTIFY">This case proves that innocent people can potentially be under surveillance and prosecuted, as a result of mass, indiscriminate surveillance. Anyone can potentially be a suspect today, and maybe for the wrong reasons. It does not matter if we think our data is “harmless”, but what matters is who is looking at our data, when and why. Every bit of data potentially hides several other bits of information which we are not aware of, but which will be revealed within a data analysis. We should always <span style="text-decoration: underline;"><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear">“</a><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear">have</a><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"> </a><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear">something</a><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"> </a><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear">to</a><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"> </a><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear">hide</a><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear">”</a></span>, as that is the only way to protect us from abuse by those in power.</p>
<p align="JUSTIFY">In the contemporary surveillance state, we are all suspects and mass surveillance technologies, such as the ones sold by <a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"><span style="text-decoration: underline;">ClearTrail</span></a>, can potentially pose major threats to our right to privacy, freedom of expression and other human rights. And probably the main reason for this is because surveillance technologies in India legally fall in a grey area. Thus, it is recommended that law enforcement agencies in India regulate the various types of surveillance technologies in compliance with the <a class="external-link" href="https://en.necessaryandproportionate.org/text">International Principles on Communications Surveillance and Human Rights.</a></p>
<p align="JUSTIFY">Spy Files 3 show us why our human rights are at peril and why we should fight for our right to be free from suspicion.</p>
<p align="JUSTIFY"> </p>
<p align="JUSTIFY">This article was <a class="external-link" href="http://www.medianama.com/2013/11/223-spy-files-3-wikileaks-sheds-more-light-on-the-global-surveillance-industry-cis-india/">cross-posted in Medianama </a>on 6th November 2013.</p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/blog/spy-files-three'>https://cis-india.org/internet-governance/blog/spy-files-three</a>
</p>
No publishermariaPrivacyInternet GovernanceSAFEGUARDSFeaturedHomepage2013-11-14T16:21:00ZBlog EntryThe Fundamental Right to Privacy: An Analysis
https://cis-india.org/internet-governance/blog/the-fundamental-right-to-privacy-an-analysis
<b>Last month’s judgment by the nine judge referral bench was an emphatic endorsement of the the constitutional right to privacy. In the course of a 547 page judgment, the bench affirmed the fundamental nature of the right to privacy reading it into the values of dignity and liberty. In the course of a few short papers, we will dissect the various aspects of the right to privacy as put forth by the nine judge constitutional bench in the Puttaswamy matter. The papers will focus on the sources, structure, scope, breadth, and future of privacy. Here are the first three papers, authored by Amber Sinha and edited by Elonnai Hickok.
</b>
<p> </p>
<h3><strong>The Fundamental Right to Privacy - Part I: Sources</strong></h3>
<p>Much of the debate and discussion in the hearings before the constitutional bench was regarding where in the Constitution a right to privacy may be located. In this paper, we analyse the different provisions and tools of interpretations use by the bench to read a right to privacy in Part III of the Constitution.</p>
<h4>Download: <a href="https://cis-india.org/internet-governance/files/amber-sinha-the-fundamental-right-to-privacy-i-sources-pdf/at_download/file">PDF</a></h4>
<hr />
<h3><strong>The Fundamental Right to Privacy - Part II: Structure</strong></h3>
<p>In the previous paper, we delved into the sources in the Constitution and the interpretive tools used to locate
the right to privacy as a constitutional right. This paper follows it up with an analysis of the structure of the right to privacy as articulated by the bench. We will look at the various facets of privacy which form a part of the fundamental right, the basis for such dimensions and what their implications may be.</p>
<h4>Download: <a href="https://cis-india.org/internet-governance/files/amber-sinha-the-fundamental-right-to-privacy-ii-structure-pdf/at_download/file">PDF</a></h4>
<hr />
<h3><strong>The Fundamental Right to Privacy - Part III: Scope</strong></h3>
<p>While the previous papers dealt with the sources in the Constitution and the interpretive tools used by the bench to locate the right to privacy as a constitutional right, as well as the structure of the right with its various dimensions, this paper will look at the judgment for guidance on principles to determine what the scope of the right of privacy may be.</p>
<h4>Download: <a href="https://cis-india.org/internet-governance/the200b-200bfundamental200b-200bright200b-200bto200b-200bprivacy-200b-200bpart200b-200biii-scope/at_download/file" class="external-link">PDF</a></h4>
<p> </p>
<p> </p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/blog/the-fundamental-right-to-privacy-an-analysis'>https://cis-india.org/internet-governance/blog/the-fundamental-right-to-privacy-an-analysis</a>
</p>
No publisheramberFeaturedHomepageInternet GovernancePrivacy2017-10-04T11:19:46ZBlog EntryTechnology, Social Justice and Higher Education
https://cis-india.org/digital-natives/pathways/blog/higher-education
<b>Since the last two years, we at the Centre for Internet and Society, have been working with the Higher Education Innovation and Research Applications at the Centre for the Study of Culture and Society, on a project called Pathways to Higher Education, supported by the Ford Foundation. </b>
<p>The main aim of the project is to research the state of social diversity and justice in undergraduate colleges in India and encourage students to articulate the axes of discrimination and exclusion which might keep them from interacting and engaging with educational resources and systems in their college environments.</p>
<h3>Peer-to-Peer Technologies<br /></h3>
<p>The entry point into these debates was digital technologies, where
through an introduction to peer-to-peer technologies, digital story
telling through various web based platforms, and a collaborative thought
environment mediated by internet and digital technologies, we
facilitated the students to identify, articulate and address questions
of discrimination, change and the possibility of engaging with these
critically in order to build a better learning environment for
themselves (and their peers) in their own colleges.</p>
<table class="plain">
<tbody>
<tr class="even">
<td><img src="https://cis-india.org/home-images/sies.jpg/image_preview" title="sies " height="266" width="400" alt="sies " class="image-inline image-inline" /></td>
<td>
<div align="left">Each workshop was designed not only to be sensitive to
the specificities of the locations of the colleges, but also to
accommodate for the needs, desires and aspirations of the students
involved. The participants looked at their own personal, family and
community histories, their everyday experiences, their affective modes
of aspiration and desire, and their own circumstances which often
circumscribe them, in order to come up with certain themes that they
thought were relevant and crucial in their own contexts.</div>
<br />
<div align="left"> </div>
</td>
</tr>
</tbody>
</table>
<p>As a follow-up on the workshops, the students developed specific
projects and activities that will help them strengthen their hypotheses
by looking beyond the personal and finding ways by which they can engage
with the larger communities, spreading awareness, building histories
and acquiring skills to successfully bolster their classroom interaction
and learning.</p>
<p><em>The following is a bird’s eye view of the key themes that have emerged in the workshops:</em></p>
<h3>The Costs of Belonging</h3>
<p>Almost unanimously, though articulating it in different ways, the
students looked at different costs of belonging to a space. Sometimes it
was the space of the web, sometimes of the larger educational
institution, sometimes to distinct language groups which do not treat
English as the lingua franca, and sometimes to communities and friend
circles within the college environment.</p>
<p> </p>
<p align="center"><img src="https://cis-india.org/home-images/problem.jpg/image_preview" title="problems" height="365" width="548" alt="problems" class="image-inline image-inline" /></p>
<div align="left">It was particularly insightful for us to understand
that granting access, providing infrastructure or equipping
‘underprivileged’ students with skills is not enough. In fact, it became
apparent that there is a certain policy driven, post-Mandal affirmative
action that has already bridged the infrastructural and access gap in
the educational institutions. The easy availability of computers,
internet access, the ubiquitous cell phone, were all indicators that for
most of the students, it wasn’t a question of affording access. Even
when we were dealing with economically disadvantaged students, there
were a plethora of technology devices they had access to and familiarity
with. Shared resources, public access to digital technologies, and
institutional support towards promoting digital familiarity all played a
significant role in demystifying the digital for them. In many ways,
these students were digital natives if defined through access, because
they had Facebook accounts and browsed Google to find everything they
wanted. Their phone was an extension of their selves and they used it in
creative ways to communicate and connect with their peers.<br /><br />Based
on this, the students are now prepared to work on documenting,
exploring and raising awareness about these questions, to see what the
gating factors are that disallow people with access to still feel
excluded from the power of the digital.<br /><br /></div>
<h3>The Need for Diversity<br /></h3>
<div align="left"><br />
<table class="plain">
<tbody>
<tr>
<td><img src="https://cis-india.org/home-images/others.jpg/image_preview" alt="others" class="image-inline image-inline" title="others" /></td>
<td>It is a telling sign about the state of the Internet in India that every
student presumed that the only way to be really fluent with the digital
web is to be fluent in English. The equation of English being
synonymous with being online was both fascinating and troubling to us.
Of course, a lot of it has to do with India’s own preoccupations, marked
by a postcolonial subjectivity, with English as the language of
modernity and privilege. But it also has to do with the fact that almost
all things digital in India, lack localisation. The digital
technologies and platforms remain almost exclusively in English,
fostered by the fact that input devices (keyboards, for example) and
display interfaces favour English as the language of computing.<br /><br /><br /></td>
</tr>
</tbody>
</table>
</div>
<p>Such an idea might also help in
reducing the distance between those who can fluently navigate the web
through its own language, and those who, through various reasons, find
themselves tentative and intimidated online.</p>
<p>The breakthrough that the
participants had, when they realised that they don’t have to be ‘proper
in English’ while being online – the ability to find local language
resources, fonts, translation machines, and the possibility of
transliterating their local language in the Roman script was a learning
lesson for us.</p>
<h3>Peer-to-Peer (P2P) Learning</h3>
<div align="left">As a part of their orientation to the world of the
digital, especially with the methodologies of the workshops, the
students literally had an overnight epiphany where they could see the
possibilities and potentials of P2P learning. The recognition that they
are not merely recipients of knowledge but also bearers of experience
and contexts which are rich and replete with knowledge, gave them new
insights on how to approach learning and education. Through digital
storytelling, the workshops demonstrated how, in our own stories and
accounts of life, there are many indicators and factors which can help
us engage with the realities of exclusion and injustice.<br /><br />Working
together in groups, not only to excavate knowledge from the outside, as
it were, but also to unearth the knowledge, experience, stories,
emotions that we all carry with ourselves and can serve as valuable
tools to bring to the classroom, is a lesson that all the groups
learned. The idea of a peer also led them to question the established
hierarchies within formal education. What was particularly interesting
was that they did not – as is often the case – translate P2P into DIY
education. They recognised that there are certain knowledge and skill
gaps that they would like experts to address and have incorporated
special trainings with different experts in areas of language,
communication, ethnography, interviews, film making, etc. However, the
methods for these trainings are going to emphasise a more P2P structure
that is different from the regular classroom learning.<br /><br />What would
happen if a teacher is looked at as a peer rather than a superior? How
would they navigate curricula if the scope of their learning was greater
than the curricula? How could they work together to learn from each
other, different ways of learning and understanding? These are some of
the questions that get reflected in their proposed campus activities,
where they are trying to now produce knowledge about their communities,
cities, families, groups and experiences, by conducting surveys,
ethnographies, historical archive work, etc. The digital helps them in
not only disseminating the information they are collecting but also in
re-establishing their relationship with learning and knowledge.<br /><br /><img src="https://cis-india.org/home-images/workshop.jpg/image_preview" title="classroom" height="337" width="509" alt="classroom" class="image-inline image-inline" /><br />
<div align="center"><br />
<div align="left">Ideas like open space dialogues, collaborative
story-telling, mobilising resources for knowledge production, creating
awareness campaigns and interacting with a larger audience through the
digital platforms are now a part of their proposals and promise to show
some creative, innovative and interesting uses of these technologies.
How the teachers would react to such an imagination of the students as
peers within the formal education system, remains to be seen as we
organise a faculty training workshop later in December. <br /><br />These
three large themes find different articulations, interpretations and
executions in different locations. However, they seem to be emerging as
the new forms of social exclusion that we need to take into account. It
is apparent that the role of technologies – both at the level of usage
and of imagination – is crucial in shaping these forms of social
inequities. But the technologies can also facilitate negotiations and
engagements with these concerns by providing new forms of knowledge
production and pedagogy, which can help the students in developing
better learning environments and processes. The Pathways to Higher
Education remains committed to not only documenting these learnings but
also to see how they might be upscaled and integrated into mainstream
learning within higher education in India.</div>
</div>
</div>
<p>
For more details visit <a href='https://cis-india.org/digital-natives/pathways/blog/higher-education'>https://cis-india.org/digital-natives/pathways/blog/higher-education</a>
</p>
No publisherpraskrishnaFeaturedHigher EducationResearchers at WorkDigital Knowledge2015-03-30T14:54:21ZBlog EntryNational Resource Kit : The Kerala Chapter (Call for Comments)
https://cis-india.org/accessibility/blog/national-resource-kerala-chapter-call-for-comments
<b>The National Resource Kit team is pleased to bring you its research on the state of laws, policies and programmes for persons with disabilities in the state of Kerala. </b>
<hr />
<p style="text-align: justify; ">Note: The chapter is an early draft and will undergo subsequent modifications. We welcome comments and feedback from our readers.</p>
<hr />
<h3>Statistics</h3>
<ul>
<li>Capital: Tiruvananthapuram</li>
<li>HDI Rank: 1<sup>st</sup></li>
</ul>
<ul>
<li>Literacy: 1<sup>st</sup> in India with a literacy of 93.91 per cent</li>
</ul>
<ul>
<li>Population:33,387,677 </li>
<li>Population of Persons with Disability: 2.7 per cent. The district of Malappuram has the highest number of persons with disabilities, followed by Thiruvananthapuram and Ernakulam.<a href="#fn1" name="fr1">[1]</a></li>
</ul>
<h3>Ministries and Departments</h3>
<ul>
<li>Department of Social Welfare – responsible for protection of rights of persons with disabilities.</li>
<li style="text-align: justify; ">Directorate of Social Welfare (under Department of Social Welfare) – nodal authority that implements central and state government programmes in Kerala.</li>
</ul>
<h3>Government run Organisations</h3>
<ul>
<li>The Kerala State Handicapped Persons Welfare Corporation</li>
<li>The Commissionerate of Persons with Disabilities</li>
<li>The National Institute of Speech and Hearing</li>
<li>The Central Social Welfare Board</li>
</ul>
<h3>Legal Provisions</h3>
<p style="text-align: justify; ">Kerala does not have a legislation specifically for persons with disabilities in the state but implements the central legislation – the Persons with Disabilities (Equal Opportunities, Protection of Rights and Full Participation) Act 1995. The state also issues various schemes, policies and notifications for persons with disabilities. The Department of Social Welfare has implemented some central and state schemes for persons with disabilities in the state,<a href="#fn2" name="fr2">[2]</a> while some schemes are being implemented by the Kerala State Handicapped Persons Welfare Corporation (KSHPWC).<a href="#fn3" name="fr3">[3]</a> These are listed below under various categories as:</p>
<ul>
<li>Accessibility</li>
<li style="text-align: justify; ">The Department of Local Self Governance vide G.O. (MS) No.41/11/LSGD, Thiruvananthapuram, dated 14/02/2011 have issued rules for housing which also include special provisions for accommodation of the requirements of persons with disabilities. These include provision of ramps, lifts, convenient parking slots and removal of architectural barriers.</li>
<li style="text-align: justify; ">Personal mobility</li>
</ul>
<p class="callout" style="text-align: justify; ">Persons with disabilities with a regular and reasonable income and having to travel regularly on work are given a subsidy of Rs. 2000 linked with bank loan for procuring motorised tricycles / vehicles.<a href="#fn4" name="fr4">[4]</a></p>
<ul>
<li style="text-align: justify; ">KSHPWC supplies aids and appliances every three years to Persons with Disabilities with annual income less than Rs. 60,000 (see note 3). These include: artificial limbs, tricycles, wheelchairs, callipers, crutches, hearing aids, white canes, colostomy bags, etc. The beneficiaries are selected at medical camps held at district, block and panchayat levels.</li>
<li style="text-align: justify; ">Subsidy of Rs.10,000 is provided by KSHPWC to each self-employed young disabled person for procuring motorized tricycle upon applying in the proper format with attested copies of original bill, registration and insurance documents, and photographs (see note 3).</li>
<li style="text-align: justify; ">Education</li>
<li style="text-align: justify; ">Through the Kerala Right of Children to Free and Compulsory Education Rules, 2010, the government provides free and compulsory education for children with disabilities until the age of 18. The rules also provide for inclusive education, special schools for severely disabled children, learning aids and appliances, training for special teachers and vocational training for children with disabilities.</li>
<li style="text-align: justify; ">Three seats are reserved for persons with disabilities in arts and science colleges and engineering colleges, nine seats are reserved in polytechnic colleges, five seats are reserved in ITIs, five per cent seats are reserved in junior technical colleges and 25 per cent seats are reserved for teachers in special schools (see note 4).</li>
</ul>
<ul>
<li style="text-align: justify; ">Scholarships are given to children with disabilities where annual income of parents is less than Rs. 24,000 at Rs. 30 per month for children in classes I – IV and Rs. 45 per month for children in classes V – VIII. For students in higher classes, scholarships are provided for day scholars and residential students with special allowance for readers. In addition to the scholarships, students with orthopaedic impairment are given Rs. 25 per month for maintenance of prosthetic / orthopaedic aids (at the recommendation of the head of the institution) and Rs. 50 per month as transportation allowance (see note 4).</li>
<li style="text-align: justify; ">Children with mental disabilities where the annual income of parents is less than Rs. 24,000 are given scholarships upto the age of 21 at the scale of Rs. 60 per month with dress allowance of Rs. 40 and school requisite allowance (see note 4).</li>
<li style="text-align: justify; ">The government runs two vocational training centres for persons with disabilities at Thiruvananthapuram and Kozhikode (see note 4).</li>
<li style="text-align: justify; ">Students with Disabilities who top their districts in the categories of Orthopaedic disability, speech and hearing impairment, visual impairment and mental retardation; in the SSLC and Higher Secondary exams are awarded <b>Rs. 2,500 each</b>. Awards of <b>Rs. 5000</b> are given to state rank holders in the above categories (see note 3).</li>
<li style="text-align: justify; ">Health: Details of policies / schemes for health unavailable.</li>
<li style="text-align: justify; ">Rehabilitation: The state runs community based rehabilitation programmes and vocational training centres for persons with disabilities (see note 2).</li>
<li style="text-align: justify; ">Employment: The state provides three per cent reservation in classes I, II (videG.O. (RT) No. 291/2012/SWD dated, Thiruvananthapuram 20<sup>th</sup> June 2012)<b>, </b>III and IV (vide G.O. (P)No.20/98/P&ARd dated, Thiruvananthapuram, 14 July, 1998) of state government jobs and PSUs. Three per cent reservation is also provided on part-time contingency posts and one per cent worker class vacancies in the government, corporations and companies are reserved for persons with disabilities (see note 4).</li>
</ul>
<ol>
<li style="text-align: justify; ">An age relaxation of ten years on the upper age limit is provided to persons with disabilities for applying to government jobs. Upto 10 grace marks can be given to persons with disabilities at the discretion of the Public Service Commission for direct recruitment to various posts except those that are specifically excluded (see note 4).</li>
<li style="text-align: justify; ">Persons with disabilities are allowed a special casual leave of 15 days for treating an illness that is directly connected with their disability vide G.O. (P) 249/84/Fin. Dated 9–5–84.</li>
<li style="text-align: justify; ">Loans for self employment are being given to persons with disabilities by banks through KSHPWC for setting up self employment programmes. A subsidy of Rs. 2000 linked with the bank loan is given to each beneficiary (see note 4).</li>
<li style="text-align: justify; ">KSHPWC channelizes loans from the National Handicapped Finance and Development Corporation to Persons with Disabilities at low interest rates for self-employment. Applicants must have at least 40 per cent disability and their family income should not exceed Rs. 3,00,000 for rural and Rs. 5,00,000 for urban applicants (see note 3).</li>
<li style="text-align: justify; ">KSHPWC runs the following commercial units to provide employment to persons with disabilities (see note 4): Sowbhagya Department Store – Thiruvananthapuram, Sowbhagya Department Store – Kozhikode, Sowbhagya Extension Counter, MLA Quarters – Thiruvananthapuram, Photocopier Unit, MLA Quarters – Thiruvananthapuram, and Envelope Making Unit – Thiruvananthapuram.</li>
<li style="text-align: justify; ">KSHPWC together with the Kerala State Lotteries Department implements the scheme through which disabled persons are identified throughout the state for undertaking agency for Lottery tickets and are given financial assistance of Rs. 5,000 for purchase and sale of lottery tickets.</li>
</ol>
<ul>
<li>Social Protection</li>
</ul>
<ol>
<li style="text-align: justify; ">Persons with disabilities in the categories of vision impaired, hearing impaired and orthopaedically disabled whose annual family income does not exceed Rs.3,600 are given a disability pension of Rs.85 per month.</li>
<li style="text-align: justify; ">Conveyance allowance of Rs.100 for vision impaired and locomotor disabled employees of aided schools and government departments and Rs.50 for part time employees are given vide G.O.(P) No. 521/87/Fin, dated 15.6.87.</li>
<li style="text-align: justify; ">Free travel facility is provided to the vision impaired on buses and boats and for the locomotor disabled on buses. Persons with 50 per cent or more locomotor disabilities are given 70 per cent concession on private buses to travel upto 40 kilometres (see note 4). </li>
<li style="text-align: justify; ">A distress relief fund has been created for persons with disabilities vide G.O. (MS) No. 4/95/SWD dated 24/1/95. A maximum amount of Rs. 2000 can be given for a case in a financial year and the amount can be extended to Rs. 8000 in exceptional cases. Persons with disabilities whose annual income does not exceed Rs. 12,000 can claim financial assistance for the following reasons (see note 4): for medical treatment including surgery, disability incurred due to an accident, any other purposes not covered by existing schemes for persons with disabilities, grant by the government under the grant-in-aid to persons with disabilities under the Deendayal Disabled Scheme (see note 2).</li>
<li style="text-align: justify; ">Under the Rajiv One Million Housing Scheme (see note 4), one per cent of the houses constructed for the economically backward class have been reserved for persons with disabilities.</li>
<li style="text-align: justify; ">KSHPWC operates a scheme for children who are below 8 years of age and have 60 per cent or more disability and whose parent’s have an annual income of less than Rs.60,000, the corporation deposits an amount of Rs. 15,000 for boys and Rs.20,000 for girls. The fund under this scheme is released after the child attains the age of 18 years for self-employment or marriage or as per requests after assessing the case. (see note 3).</li>
<li style="text-align: justify; ">A scheme run by the state offers marriage assistance to women with disabilities and to daughters of Persons with Disabilities (see note 2).</li>
<li style="text-align: justify; ">KSHPWC runs an old-age home for persons with disabilities at Parassala (see note 3).</li>
</ol>
<p style="text-align: justify; "> </p>
<ul>
<li>Miscellaneous</li>
</ul>
<p style="text-align: justify; "> </p>
<ol>
<li style="text-align: justify; ">State awards of Rs. 3000 per head are given to outstanding and efficient employees among persons with disabilities (see note 4)</li>
<li style="text-align: justify; ">Persons with disabilities are exempted from professional tax and road tax. They are given an additional income tax exemption of Rs. 5000 (see note 4).</li>
<li style="text-align: justify; ">The state also gives grant-in-aid for voluntary organisations running homes for the disabled and financial assistance for advocates with orthopaedic or visual impairment (see note 2).</li>
</ol>
<h3>Government Orders</h3>
<table class="listing">
<tbody>
<tr>
<th>Category</th><th>Headline</th><th>Issuing Authority</th><th>Number & Date</th><th>Briefs</th>
</tr>
<tr>
<td>Employment</td>
<td>Public Services Reservations for Physically Handicapped Persons – three per cent reservation for Class III and Class IV posts</td>
<td style="text-align: justify; ">Personnel and Administrative Reforms (Advice) Department</td>
<td style="text-align: justify; ">G.O. (P)No.20/98/P&ARD<br />Dated, Thiruvananthapuram, <br />14 July, 1998<br /><br /></td>
<td style="text-align: justify; ">Orders issued for a maximum of 50 appointments each in the categories of subordinate service, last grade service and part-time contingent service being set apart every year for the appointment of persons with disabilities to the public services.</td>
</tr>
<tr>
<td><span>Employment</span> </td>
<td>Reservation of three per cent vacancies in Class I and II posts in Public Services for appointment of physically disabled persons – post of Assistant Engineer (Civil), Public Works Department – eligibility for full participation in the selection process and appointment in respect of certain categories of physically disabled persons – clarified orders</td>
<td>Social Welfare Department</td>
<td>
<p class="MsoNormal" style="text-align:justify; "><span>G.O. (RT) No. 291/2012/SWD.</span></p>
<p class="MsoNormal" style="text-align:justify; "><span>Dated, Thiruvananthapuram 20<sup>th</sup> June 2012</span></p>
</td>
<td style="text-align: justify; ">This order has been issued in clarification to earlier orders issued for identification of posts for Persons with Disabilities.</td>
</tr>
<tr>
<td><span>Building construction</span> </td>
<td><span>Kerala Panchayat Building Rules 2011</span> </td>
<td><span>Local Self Governance Department</span> </td>
<td>
<p class="MsoNormal">G.O. (MS) No.41/11/LSGD Dated, Thiruvananthapuram 14/02/2011.</p>
</td>
<td style="text-align: justify; ">Notification has been issued to regulate building construction. Provides for accessibility and elimination of architectural barriers.</td>
</tr>
</tbody>
</table>
<h3>Special Schools and Vocational Training Centres</h3>
<p></p>
<p></p>
<ul>
<li><span><span><span> </span></span></span><span>Centre for Training and Rehabilitation of the Mentally Retarded, Thiruvananthapuram</span></li>
<li><span>Adarsha Rehabilitation Institute for Spastics and Neurologically Impaired, Kochi</span></li>
<li><span>Asha Niketan, Kozhikode</span></li>
<li><span>Jagathy Government School for the Blind, Thiruvananthapuram</span></li>
<li><span>Jagathy Government BHSS for the Deaf, Thiruvananthapuram</span></li>
<li><span>Kunnamkulam GS for the Blind, Kunnamkulam, Thrissur</span></li>
<li><span>Kunnamkulam GS for the Deaf, Kunnamkulam, Thrissur<br /></span></li>
</ul>
<h3>Non Governmental Organisations for Persons with Disabilities</h3>
<ul>
<li style="text-align: justify; ">National Association of the Blind, Thiruvananthapuram</li>
<li style="text-align: justify; ">Kerala Federation of the Blind, Thiruvananthapuram</li>
<li style="text-align: justify; ">Kerala Institution of the Blind, Thrissur</li>
<li style="text-align: justify; ">All Kerala Association of the Deaf, Thrissur</li>
<li style="text-align: justify; ">Kerala Government Deaf Employees Union</li>
<li style="text-align: justify; ">Association for the Welfare of the Handicapped, Kozhikode</li>
<li style="text-align: justify; ">Kerala State Physically Handicapped Employees Association</li>
</ul>
<ul>
</ul>
<p>
For more details visit <a href='https://cis-india.org/accessibility/blog/national-resource-kerala-chapter-call-for-comments'>https://cis-india.org/accessibility/blog/national-resource-kerala-chapter-call-for-comments</a>
</p>
No publisheranandiFeaturedAccessibility2013-11-07T06:20:04ZBlog EntryDataset: Patent Landscape of Mobile Device Technologies in India
https://cis-india.org/a2k/blogs/dataset-patent-landscape-of-mobile-device-technologies-in-india
<b>Patent landscape of mobile technology patents and patent applications held by 50 companies operating in India. Licensed CC-BY-SA 4.0.</b>
<p><a href="https://cis-india.org/a2k/blogs/cis-mobile-device-patent-landscape" class="internal-link">Dataset: Patent Landscape of Mobile Device Technologies in India</a></p>
<p>This dataset contains a landscape of 23,569 patents and patent applications registered in India and relevant to the domain of mobile technology. These patents and patent applications are held by 50 Indian and non-Indian companies operating in the country. The patent landscape has been released under the Creative Commons-Attribution-Share Alike 4.0 (CC-BY-SA 4.0) License as a part of the ongoing Pervasive Technologies research project.</p>
<p>For the detailed methdology used for drawing up this landscape, read: <a class="external-link" href="http://cis-india.org/a2k/blogs/patent-landscaping-in-the-indian-mobile-device-market">Methodology: Patent Landscaping in the Indian Mobile Device Marketplace</a></p>
<p>A paper titled <a class="external-link" href="http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2756486">"Patents and Mobile Devices in India: An Empirical Survey"</a> published on SSRN in March 2016 presents an analyis of this patent landscape.</p>
<p>For queries regarding the dataset or its reuse, write to <a class="mail-link" href="mailto:rohini@cis-india.org">rohini@cis-india.org</a>.</p>
<h3>Using this dataset:</h3>
<p><b>Assignee:</b> The assignee is one of 50 companies specified in<a class="external-link" href="http://cis-india.org/a2k/blogs/fifty-companies.pdf"> Annexure 4</a> of the methodology document. Where two assignees are mentioned, the patent was transferred from the second assignee to the first on account of sale of the patent, company merger, etc. For example, "Huawei|NEC" indicates that a patent that belonged to NEC was transferred to Huawei.</p>
<p><b>Patent Number:</b> This column contains the patent number in the case of granted patents and the application number in case of patent applications. Patent numbers have been coded in the Thomson Reuters database as IN<6 digit number>B. For example, the patent number 247760 in the Indian Patent Office database is coded as IN247760B in this dataset. The application number is coded as well. However, there is a separate column (Column R) for the application number as given in the Indian Patent Office database.</p>
<p><b>Level 1: </b>Patents and patent applications in the landscape have been categorised into: Body Design, Communication, Connectable Interfaces, Display, Energy Storage, Memory, Operational Blocks, Sensors, Software, and Sound, image and video.</p>
<p><b>Level 2: </b>Almost all categories have further been divided into sub-categories, i.e., Level 2 categories.</p>
<p><b>Infrastructure/ UE: </b>Refers to whether the patent pertains to infrastructure and the user equipment (IUE) or only the user equipment (UE).</p>
<p>
For more details visit <a href='https://cis-india.org/a2k/blogs/dataset-patent-landscape-of-mobile-device-technologies-in-india'>https://cis-india.org/a2k/blogs/dataset-patent-landscape-of-mobile-device-technologies-in-india</a>
</p>
No publisherrohiniFeaturedAccess to KnowledgePervasive Technologies2016-05-03T20:06:43ZBlog EntryCIS - A2K Work Plan: July 2016 - June 2017
https://cis-india.org/a2k/blogs/cis-a2k-work-plan-july-2016-june-2017
<b>One of the key mandates of the Access to Knowledge (A2K) program at the Centre for Internet and Society (CIS) is to work towards catalyzing the growth of the free and open knowledge movement in Indic languages. CIS has been a steward of the Wikimedia movement in India since December 2008. Since September 2012, we at CIS-A2K, have been actively involved in growing the movement in India through (i) a grant received from the Wikimedia Foundation (WMF) for the period September 2012 - June 2014, (ii) the FDC Grant received for the period July 2014 - June 2015 and (iii) the FDC Grant received for the period July 2015 - June 2016. Based on the productive experience of working with various Indic Wikimedia communities, CIS-A2K has developed this work plan for July 2016 to June 2017.</b>
<p>This was originally published on <a class="external-link" href="https://meta.wikimedia.org/wiki/CIS-A2K/Work_plan_July_2016_-_June_2017">Meta-wiki</a> on April 2, 2016.</p>
<hr />
<p style="text-align: justify;">We have revised the work plan template taking into account the changed proposal plan sent out by WMF and in light of the feedback that we have received from FDC assessment during last proposal application. The FDC feedback is taken into account at the level of design, RoI and ensuring quality for all our activities.</p>
<h3 style="text-align: justify;">CIS-A2K responses towards Indic communities concerns</h3>
<p style="text-align: justify;">During the last plan period CIS-A2K received the following complaints, suggestions, and feedback. We have attempted to address the concerns under redesigned CIS-A2K 2.0. This table was first prepared during our progress report for the current grant and A2K would like to acknowledge the learnings derived out of the suggestions and feedback it received during the last plan. Please see the table <strong><a title="Grants:APG/Proposals/2014-2015 round2/The Centre for Internet and Society/Progress report form" href="https://meta.wikimedia.org/wiki/Grants:APG/Proposals/2014-2015_round2/The_Centre_for_Internet_and_Society/Progress_report_form#CIS-A2K_responses_towards_Indic_communities_concerns">here.</a></strong></p>
<h3 style="text-align: justify;"><strong>Background to CIS-A2K Program</strong></h3>
<p style="text-align: justify;"><strong>CIS-A2K is working with the Indic Wikimedia communities since December 2008, when Jimbo Wales came to India and visited Bangalore. In mid-2012 CIS-A2K received a financial grant from the Wikimedia Foundation (WMF) and since then it has been actively involved in growing the Wikimedia and free knowledge movement in India. Following a grant received from WMF for the period September 2012 to June 2014, CIS-A2K received FDC Grant for the periods July 2014 to June 2015 and July 2015 to June 2016. Based on the 41-month experience of working with various Indic Wikimedia communities, CIS-A2K has prepared this year's work plan for July 2016 to June 2017.</strong></p>
<h3 style="text-align: justify;"><strong>Objective</strong></h3>
<p style="text-align: justify;"><strong>CIS-A2K is committed to improve Wikimedia movement in India by supporting Indic Wikimedia communities and working on Wikimedia projects and collaborating with FOSS and other like minded movement partners. It also strives to catalyse the growth of open and free knowledge movement in South Asia and especially in India. Our main objectives are:</strong></p>
<ol style="text-align: justify;">
<li>
<div style="text-align: justify;"><strong>Bringing content under Creative Commons and similar free licenses;</strong></div>
</li>
<li>
<div style="text-align: justify;"><strong>Supporting and empowering Indic Wikimedia communities;</strong></div>
</li>
<li>
<div style="text-align: justify;"><strong>Building and maintaining institutional partnerships in order to support the open knowledge movement and creation of open knowledge resources;</strong></div>
</li>
<li>
<div style="text-align: justify;"><strong>Planning and executing Wikimedia projects with wider community participations and effective consultation;</strong></div>
</li>
<li>
<div style="text-align: justify;"><strong>Fostering and enabling an appropriate legal and technological ecosystem;</strong></div>
</li>
<li>
<div style="text-align: justify;"><strong>Building sustainable communities and grooming potential leaders to represent the communities and projects globally.</strong></div>
</li></ol>
<h3 style="text-align: justify;"><strong>Context</strong></h3>
<p style="text-align: justify;"><strong> </strong></p>
<p style="text-align: justify;">CIS-A2K has focussed on creating sustainable programmes and capacity development for communities in the last few years. CIS-A2K intends to continue its work during the proposed grant period and would continue to focus on the following Indian language Wikimedia projects: Kannada, Konkani, Marathi, Odia, Telugu (Focus Language Areas, FLA). In order to achieve higher RoI, A2K will be including Tulu in its language plan from this plan period.</p>
<p style="text-align: justify;">CIS-A2K will continue to provide general support and service to all other Indian language Wikimedia communities for all Wikimedia projects as necessary and as requested by the communities or individuals from the community through its request page and needs assessment workshops.</p>
<p style="text-align: justify;">Community strengthening initiatives will be prioritised in order to address the poor participation of Wikimedians from Indian sub continent in particular and global south in general. CIS-A2K has rolled out initiatives such as Train the Trainer and MediaWiki training, focused edit-a-thons and GLAM activities.</p>
<p style="text-align: justify;">CIS-A2K and Indian language Wikimedia communities would greatly benefit from collaborating with these initiatives and CIS-A2K during this grant period would attempt to bring these communities closer with a series of interactions, hack-a-thons and training sessions.</p>
<p style="text-align: justify;">Our institutional partnerships have played a very important role in content donation, generation of content, attracting new readers and editors and collaborating opportunities with existing community members. They have provided much needed press coverage towards Indian language Wikimedia projects. The institution partnerships and WEP have been redesigned as per community suggestions.</p>
<h3 style="text-align: justify;">Methodology</h3>
<p style="text-align: justify;">This work plan has been prepared based on an extensive engagement with various Wikimedia movement participants and enthusiasts in India. These include:</p>
<ol style="text-align: justify;">
<li>
<div style="text-align: justify;">Wikimedia community members across all Indic communities: We have talked to a large number of Indic Wikimedia community members and specially community members of our focused language areas;</div>
</li>
<li>
<div style="text-align: justify;">Institutional Partners of CIS-A2K: We have taken feedback and suggestions from our institutional partners regarding the challenges of conducting WEP;</div>
</li>
<li>
<div style="text-align: justify;">Like-minded advocates of free and open knowledge;</div>
</li>
<li>
<div style="text-align: justify;">Surveys and Interviews.</div>
</li></ol>
<h3 style="text-align: justify;">Performance against plans and projected targets</h3>
<p style="text-align: justify;"><strong>Overall</strong></p>
<p style="text-align: justify;"><img src="https://cis-india.org/home-images/w1.jpg" alt="null" class="image-inline" title="w1" /></p>
<p style="text-align: justify;"><strong>Kannada</strong></p>
<p style="text-align: justify;"><img src="https://cis-india.org/home-images/copy_of_w1.jpg" alt="null" class="image-inline" title="w2" /></p>
<p style="text-align: justify;"><strong>Konkani</strong></p>
<p style="text-align: justify;"><img src="https://cis-india.org/home-images/copy2_of_w1.jpg" alt="null" class="image-inline" title="w3" /></p>
<p style="text-align: justify;"><strong>Marathi</strong></p>
<p style="text-align: justify;"><img src="https://cis-india.org/home-images/copy3_of_w1.jpg" alt="null" class="image-inline" title="w4" /></p>
<p style="text-align: justify;"><strong>Odia</strong></p>
<p style="text-align: justify;"><img src="https://cis-india.org/home-images/copy4_of_w1.jpg" alt="null" class="image-inline" title="Odia" /></p>
<p style="text-align: justify;"><strong>Telugu</strong></p>
<p style="text-align: justify;"><img src="https://cis-india.org/home-images/copy6_of_w1.jpg" alt="null" class="image-inline" title="w6" /></p>
<p style="text-align: justify;"><strong>Progress against goals set</strong></p>
<p style="text-align: justify;"><img src="https://cis-india.org/home-images/copy7_of_w1.jpg" alt="null" class="image-inline" title="Progress" /></p>
<h3 style="text-align: justify;">Language Area Work Plans</h3>
<table class="plain">
<tbody>
<tr>
<td style="text-align: justify;">
<p>CIS-A2K has put in significant efforts across four focus language areas Kannada, Konkani, Odia and Telugu during the previous work plans. CIS-A2K proposed and initiated Marathi as a focus language project during the last proposal plan. As A2K's strategy of working with FLA has resulted in community building and sustainable outreach efforts, we intend to work with the nascent Tulu community towards making Tulu Wikipedia live.</p>
<p style="text-align: justify;">The <a title="CIS-A2K/Work plan July 2016 - June 2017/Tulu" href="https://meta.wikimedia.org/wiki/CIS-A2K/Work_plan_July_2016_-_June_2017/Tulu">Tulu Wikipedia</a> plan is a 'minimal cost program' and is not budgeted same as the other FLA. A2K has been able to build a strong community in Mangalore for the Kannada and Konkani Wikimedia projects. Tulu community draws its editor base and institutional support from Mangalore, hence A2K's plans towards Kannada and Konkani Wikimedia projects can also have the added dimension of Tulu Wikipedia incubation activities.</p>
<p style="text-align: justify;">Detailed work-plan for each of these language areas may be seen here (in alphabetical order):</p>
<ul style="text-align: justify;">
<li><a title="CIS-A2K/Work plan July 2016 - June 2017/Kannada" href="https://meta.wikimedia.org/wiki/CIS-A2K/Work_plan_July_2016_-_June_2017/Kannada">Kannada</a></li>
<li><a title="CIS-A2K/Work plan July 2016 - June 2017/Konkani" href="https://meta.wikimedia.org/wiki/CIS-A2K/Work_plan_July_2016_-_June_2017/Konkani">Konkani</a></li>
<li><a title="CIS-A2K/Work plan July 2016 - June 2017/Marathi" href="https://meta.wikimedia.org/wiki/CIS-A2K/Work_plan_July_2016_-_June_2017/Marathi">Marathi</a></li>
<li><a title="CIS-A2K/Work plan July 2016 - June 2017/Odia" href="https://meta.wikimedia.org/wiki/CIS-A2K/Work_plan_July_2016_-_June_2017/Odia">Odia</a></li>
<li><a title="CIS-A2K/Work plan July 2016 - June 2017/Telugu" href="https://meta.wikimedia.org/wiki/CIS-A2K/Work_plan_July_2016_-_June_2017/Telugu">Telugu</a></li></ul>
<p> </p>
</td>
<td>
<p><img src="https://cis-india.org/home-images/copy8_of_w1.jpg/@@images/ab0f737d-8061-40d7-bcad-f3850817771a.jpeg" alt="null" class="image-inline" title="Women's Wikipedia Editathon" /></p>
<p style="text-align: center;">Woman's day editathon at Christ University</p>
</td>
</tr>
</tbody>
</table>
<p style="text-align: justify;"><strong>Some of the key factors that determined the July 2016-June 2017 work plan:</strong></p>
<ol style="text-align: justify;">
<li><strong>Development of Focus Language Area Plan:</strong> A2K's strategy of building a plan along with the consultation of the community and further customised as per the feedback received by communities and FDC Staff have resulted well across five languages. CIS-A2K is pleased to inform that during July 2015-June 2016 it engaged with all the five focus language area plans as it has been able to recruit program officers and program associates for the vacant positions. It is important to note that while we are engaging with Tulu Wikipedia community with intentions of making Tulu Wikipedia live, it is also a 'minimal cost' program. It helps A2K in acheiving higher RoI for monetary resources and optimisation of staff and volunteer expertise.</li>
<li><strong>A2K 2.0 as a response to FDC and Indic Wikimedians' Feedback:</strong> As a learning derived out of FDC, WMF Board and Indic Wikimedians suggestions, CIS-A2K has revised its program structure and composition of work. Please find details of revised divisional of responsibilities of A2K team.</li>
<li><strong>Partnership and networking with institutions and groups:</strong> CIS-A2K has had the privilege of partnering with educational institutions and developmental organisations. These partnerships and collaborations not only resulted in significant quality-content contributions, but also lead to the diversification and expansion of that particular language Wikimedia community. In order to strengthen the communities, increase participation and conduct GLAM activities and attract content donation A2K would look out for possible institutional partnerships.</li>
<li><strong>Providing sustainability and developing leadership skills:</strong> A2K has always worked towards enabling Indian Language Wikimedia communities to achieve sustainability and visibility amongst the global communities. We have been greatly privilege to work with the Focus Language Communities and would like to pass on our learning through collaborations with other language communities, while exiting few of our current FLA programs. Through our skill building initiatives such as Train-the-Trainer, Media Wiki Training and Train-a-Wikipedian A2K has also been able to support growth of a new community of volunteers to support the existing community.</li></ol>
<h3><span id="Community_Strengthening_Initiatives" class="mw-headline">Community Strengthening Initiatives</span></h3>
<p style="text-align: justify;"><span id="Community_Strengthening_Initiatives" class="mw-headline"><strong> </strong></span><span class="mw-headline">CIS-A2K started two community strengthening initiatives— <a title="TTT" class="mw-redirect" href="https://meta.wikimedia.org/wiki/TTT">Train-the-Trainer</a> and <a title="MWTTT" class="mw-redirect" href="https://meta.wikimedia.org/wiki/MWTTT">MediaWiki Training</a> to grow and strengthen the Indic Wikimedia projects and the associated communities, both qualitatively and quantitatively. The earlier iteration of these two programs played an important role in connecting the Indian language Wikimedia communities and fostering multi-lingual projects. This year also CIS-A2K proposes to undertake these two successful community strengthening initiatives. In mid-March 2016, CIS-A2K conducted a 2-day-long nationwide Wikipedia Education Program review workshop that brought students and faculty members from institutions that are running WEP in partnership with CIS-A2K and several important topics such as structural challenges such as academic schedule, institutional interest, faculty buy-in and more importantly response by the students were discussed. This year also CIS-A2K proposes to conduct such a workshop.</span></p>
<h3><span id="Creating_Movement_Resources" class="mw-headline">Creating Movement Resources</span></h3>
<p><span id="Creating_Movement_Resources" class="mw-headline"> </span>CIS-A2K has been creating resources to help Indic Wikimedia communities. All the resources are created after assessing the communities' need assessment and close interactions with many of the active community members.</p>
<p>CIS-A2K proposed to create the following resources (this also include printed resources):</p>
<ul>
<li>Wikipedia editing tutorials</li>
<li>PEG and IEG application handbooks;</li>
<li>Handbook on how apply for various WMF scholarships;</li>
<li>Handbook on best practices for Wiki-events, workshops, meetup, outreach and other programs;</li>
<li>FAQ for content donors –give this job to a law school intern. No need of this handbook to be translated to Indian languages.</li>
<li>Bookmarks creation to increase awareness about Indian Wikimedia Projects;</li></ul>
<h3>General Support and Service to the Movement</h3>
<p style="text-align: justify;">CIS-A2K regularly supports Indic-language Wikimedia communities to conduct workshops, edit-a-thons and events to improve their projects. All these requests are placed at <a title="Talk:CIS-A2K/Requests" href="https://meta.wikimedia.org/wiki/Talk:CIS-A2K/Requests">CIS-A2K request page</a> and fulfilled after extensive community discussion and needs assessment.</p>
<p style="text-align: justify;">Currently CIS-A2K is working on a program named <a title="CIS-A2K/Train-a-Wikipedian" href="https://meta.wikimedia.org/wiki/CIS-A2K/Train-a-Wikipedian">Train-a-Wikipedian</a> (TAW) to identify enthusiastic Indic Wikipedians and train and groom them to develop their editing skills. We'll continue empowering Indic Wikimedia community members through this program.</p>
<h3 style="text-align: justify;">Learning and Evaluation</h3>
<p style="text-align: justify;">Following the <a title="Grants:Learning & Evaluation/Global metrics" href="https://meta.wikimedia.org/wiki/Grants:Learning_%26_Evaluation/Global_metrics">Global metrics</a> and discussions some members of the Wikimedia community, the A2K program had put together some evaluation tools to assess the impact of its work during the last year. We have included some more metrics for evaluation this year.</p>
<p style="text-align: justify;"><strong>Evaluation tools</strong></p>
<dt>Participation</dt>
<ol>
<li>Number of active editors involved</li>
<li>Number of newly registered users</li>
<li>Number of individuals involved</li></ol>
<dl><dt>Content</dt></dl>
<ol>
<li>Number of new images/media added to Wikimedia article pages</li>
<li>Number of new images/media uploaded to Wikimedia Commons</li>
<li>Number of articles added or improved on Wikimedia projects</li>
<li>Number of bytes added to and/or deleted from Wikimedia projects</li></ol>
<h3>Reports</h3>
<p style="text-align: justify;">CIS-A2K will undertake monthly and annually review of our work using the above evaluation tools. CIS-A2K report activities and progress to Wikimedia foundation in monthly meetings.<sup><a href="https://meta.wikimedia.org/wiki/CIS-A2K/Work_plan_July_2016_-_June_2017#cite_note-1">[1]</a></sup> CIS-A2K team will also report the successes and learnings to the Wikimedia India & the Global Community. CIS-A2K team will actively review progress of each language area plan in collaboration with the respective Wikimedia community. Based on this feedback we will undertake mid-course corrections, should there be a need. To summarize following reports will be published in the year of 2016 - 2017:</p>
<ul>
<li>Progress report (for the current grant)</li>
<li>Impact Report (July 2016 - June 2017)</li>
<li>Monthly report to Wikimedia foundation;</li>
<li>Monthly Newsletters</li>
<li>Annual report to CIS</li></ul>
<h3>Monthly Review and Learning Sessions</h3>
<p style="text-align: justify;">Last year we <a title="CIS-A2K/Work plan July 2015 - June 2016" href="https://meta.wikimedia.org/wiki/CIS-A2K/Work_plan_July_2015_-_June_2016#Monthly_review_and_learning_sessions">wrote about</a> conducting monthly review and learning sessions. Currently CIS-A2K is conducting monthly learning sessions to critically reflect on the successes and failures of our work internally. The learnings are shared with Wikimedia Foundation for their feedback and suggestion. We'll continue conducting monthly reviews and learnings and progress will be shared with Wikimedia Foundation. We will try to share the same the Wikimedia India members.</p>
<h3 style="text-align: justify;">Budget</h3>
<p>Please find link to CIS-A2K program budget for proposed grant period July 2016-June 2017 <a title="CIS-A2K/Work plan July 2016 - June 2017/Budget" href="https://meta.wikimedia.org/wiki/CIS-A2K/Work_plan_July_2016_-_June_2017/Budget">here</a></p>
<h3>Feedback</h3>
<p>We appreciate your valuable feedback. However, for the sake of structured engagement by everyone, we request you to consider the following before you share your feedback.</p>
<ul>
<li>For feedback on the overall A2K Work Plan you can write <a title="Talk:CIS-A2K/Work plan July 2016 - June 2017" href="https://meta.wikimedia.org/wiki/Talk:CIS-A2K/Work_plan_July_2016_-_June_2017"><strong>here</strong></a>.</li>
<li>For feedback on respective Language area plans, please write on the discussion page of the respective language plan.</li></ul>
<dl><dd>
<ul>
<li><a title="CIS-A2K/Work plan July 2016 - June 2017/Kannada" href="https://meta.wikimedia.org/wiki/CIS-A2K/Work_plan_July_2016_-_June_2017/Kannada"><strong>Kannada</strong></a> plan (<a title="Talk:CIS-A2K/Work plan July 2016 - June 2017/Kannada" href="https://meta.wikimedia.org/wiki/Talk:CIS-A2K/Work_plan_July_2016_-_June_2017/Kannada"><strong>discussions</strong></a>)</li>
<li><a title="CIS-A2K/Work plan July 2016 - June 2017/Konkani" href="https://meta.wikimedia.org/wiki/CIS-A2K/Work_plan_July_2016_-_June_2017/Konkani"><strong>Konkani</strong></a> plan (<a title="Talk:CIS-A2K/Work plan July 2016 - June 2017/Konkani" href="https://meta.wikimedia.org/wiki/Talk:CIS-A2K/Work_plan_July_2016_-_June_2017/Konkani"><strong>discussions</strong></a></li>
<li><a title="CIS-A2K/Work plan July 2016 - June 2017/Marathi" href="https://meta.wikimedia.org/wiki/CIS-A2K/Work_plan_July_2016_-_June_2017/Marathi"><strong>Marathi</strong></a> plan (<a title="Talk:CIS-A2K/Work plan July 2016 - June 2017/Marathi" href="https://meta.wikimedia.org/wiki/Talk:CIS-A2K/Work_plan_July_2016_-_June_2017/Marathi"><strong>discussions</strong></a>)</li>
<li><a title="CIS-A2K/Work plan July 2016 - June 2017/Odia" href="https://meta.wikimedia.org/wiki/CIS-A2K/Work_plan_July_2016_-_June_2017/Odia"><strong>Odia</strong></a> plan (<a title="Talk:CIS-A2K/Work plan July 2014 - June 2015/Odia" href="https://meta.wikimedia.org/wiki/Talk:CIS-A2K/Work_plan_July_2014_-_June_2015/Odia"><strong>discussions</strong></a>)</li>
<li><a title="CIS-A2K/Work plan July 2016 - June 2017/Telugu" href="https://meta.wikimedia.org/wiki/CIS-A2K/Work_plan_July_2016_-_June_2017/Telugu"><strong>Telugu</strong></a> plan (<a title="Talk:CIS-A2K/Work plan July 2014 - June 2015/Telugu" href="https://meta.wikimedia.org/wiki/Talk:CIS-A2K/Work_plan_July_2014_-_June_2015/Telugu"><strong>discussions</strong></a>)</li></ul>
</dd></dl>
<ul>
<li>Alternatively you could also share your feedback over e-mail at tanveer@cis-india.org. Please use the subject line Feedback on Work Plan.</li>
<li>Should you feel the need to discuss any aspect of the plan before sharing your feedback, please write to us and we can set up a telephone/Skype call.</li></ul>
<p>
For more details visit <a href='https://cis-india.org/a2k/blogs/cis-a2k-work-plan-july-2016-june-2017'>https://cis-india.org/a2k/blogs/cis-a2k-work-plan-july-2016-june-2017</a>
</p>
No publishersunilCIS-A2KAccess to KnowledgeWikimediaWikipediaFeatured2016-04-29T09:36:45ZBlog EntryConsultation on 'National Geospatial Policy' - Notes and Submission
https://cis-india.org/openness/consultation-on-national-geospatial-policy-03022016
<b>The Department of Science and Technology, Government of India, has constituted a National Expert Committee for developing a draft National Geospatial Policy (NGP) to provide appropriate guidelines for collection, analysis, use, and distribution of geospatial information across India, and to assure data availability, accessibility and quality. A pre-drafting consultation meeting for the NGP was organised in Delhi on February 03, 2016. Ms. Anubha Sinha represented CIS at the meeting, and shares her notes.</b>
<p> </p>
<h3>National Geospatial Policy - Pre-Drafting Consultation Meeting</h3>
<p>Keeping in mind the importance of geospatial data in the context of national development, the Department of Science and Technology, Government of India, has constituted a National Expert Committee for developing a draft National Geospatial Policy (NGP). The Committee is Chaired by Major General Dr. R Siva Kumar, former Head of Natural Resources Data Management System (NRDMS) and CEO of National Spatial Data Infrastructure (NSDI), and Dr. Bhoop Singh, Head of NRDMS and NSDI Division at Department of Science and Technology, as Member Secretary. The Policy aims at providing appropriate guidelines for collection, analysis, use, and distribution of geospatial information across India, and to assure data availability, accessibility and quality.</p>
<p>A pre-drafting consultation meeting for the NGP was organised in Delhi by Dr. Valli Manickam, Professor at the Academic Staff College of India, on February 03, 2016, and CIS was invited to take part in it as the only participant from the civil society. The other participants included representatives from the geospatial industry and industry associations (like FICCI and CII), and Ms. Ranjana Kaul, Partner at Dua Associates. Among the drafting committee members, Major General Dr. R Siva Kumar, Dr. Bhoop Singh, Dr. Sandeep Tripathi (IFS), and Wing Commander Satyam Kushwaha were present.</p>
<p> </p>
<h3>National Geospatial Policy - Concept Note</h3>
<p>The purpose of the meeting was to hear the stakeholders' response to a Concept Note on the NGP, circulated prior to the meeting <strong>[1]</strong>. The Note sets out the principles and concerns of the proposed policy, which plans to guarantee geospatial data availability, accessibility, quality and in consonance with the imperatives of national security and intellectual property rights. The applicability of the policy is aimed at:</p>
<blockquote>all geospatial data created, generated and collected using public funds provided by Central and State Governments and International donor organizations, directly or through authorized agencies.</blockquote>
<p>The note suggests establishment of an "empowered body" to ensure proper creation, updates, management, dissemination, and sharing of the data, and management of an online portal for the same. The institutional mechanism to implement the policy will be composed of an Appellate authority / National High Power Implementation Committee, the NGP Implementation Committee, and the NGP Steering Committee.</p>
<p> </p>
<h3>Notes from the Meeting</h3>
<p>The Welcome Address was delivered by Dr. Bhoop Singh (Head of NRDMS and NSDI Division, DST) who informed the participants that the Expert Committee had already met National Security Council and heard their concerns on the policy. The principles on which the proposed policy is to be based were also shared. The policy resulted from an exercise started two years ago to fix quality and accuracy of geospatial data, which was when it was realised that there were significant gaps that need urgent redressal. It was also identified that in previous initiatives to manage geospatial data at the national level, some data-generating organisations had been left behind. The chief concerns for the Expert Committee are 1) tailoring a policy suited to India's unique security issues, 2) avoiding a blanket open policy that may lead to misuse of low resolution data, 3) heeding restrictions on mapping, considering that 43% of landmass was not represented on maps presently (a probable solution was to do feature based mapping), and 4) clarifying government regulation of drone-based mapping. Security concerns were raised frequently throughout the meeting. The Committee also recognised that for development, data sharing should be made more open. The Committee was keen to have the private industry as a partner in generation of geospatial data.</p>
<p>Private industry representatives agreed with the objectives of the policy and were willing to contribute to geospatial data generation. The Expert Committee mulled over the possibility of creating a Public Private Partnership to cater to data generation. The private industry complained about the lack of efforts in popularising geospatial technologies and making the process of tenders more transparent.</p>
<p>There were suggestions to examine the policies of other jurisdictions facing similar internal security threats as India, and delineating the types of data that could be openly shared (for instance, geospatial data from border regions versus non-border regions). Segregation of restricted and open geospatial data can also be done on the basis of its end-application, such as for military and engineering purposes. Participants also requested the creation of a clear Do's and Don'ts guideline. CIS presented a written submission that raised seven key concerns. These are listed in the section below.</p>
<p>On the question of making an open data policy, it was suggested that the committee needs to decide the fundamental approach of the policy first - whether the policy should be based on prohibition and restriction, or focus on identifying and regulating open and free geospatial. The UN General Assembly document on Principles relating to remote sensing of the Earth from space provides an appropriate international point of reference <strong>[2]</strong>.</p>
<p>After listening to the concerns and comments of the stakeholders, the core committee made the following concluding remarks:</p>
<ul><li>Existing policies of government and defence should be mapped out to avoid conflict or overlap with the proposed NGP policy</li>
<li>The sharing of data vests with government agencies and other organisations recommended by them – there needs to be a transparent mechanism for such recommendation based sharing</li>
<li>Industry should come up with self-regulatory mechanisms, do's and don'ts, and code of conduct</li>
<li>Develop a secure mechanism for providing data on sensitive areas (in terms of national security;</li>
<li>Even the defence agencies sometimes cannot access maps due to policies of the National Remote Sensing Centre and other agencies – such inconsistencies need to be fixed</li></ul>
<p>It was announced that the next consultation will occur in a couple of months, and will be open to the public at large, including representatives of industry, defence, and civil society.</p>
<p> </p>
<h3>Key Concerns about the NGP Concept Note</h3>
<p><strong>1. Complete lack of availability of open geospatial data from Indian government agencies:</strong> No government agency in India publish open geospatial data. While maps are often sold, both in printed and in digital form, they are not provided in a machine-readable open format and under an open license. The concept note towards NGP has made strong commitments towards changing this situation. There is an immediate need to participate in the NGP drafting process, with coordination among various civil society actors interested in open geospatial data, to ensure that these principles are carried into and operationalised in the actual NGP document.</p>
<p><strong>2. Need for explicit and comprehensive set of criteria to determine if a set of geospatial data is sensitive for national security reasons:</strong> In formal and informal conversations with various agencies collecting and creating geospatial data in India, the role played by security agencies in blocking proactive and reactive public disclosure of geospatial data, and even intra-governmental sharing of such data, has been highlighted. Addressing this issue requires development of an explicit and comprehensive list of criteria that will establish a clear and rule-based system for identifying if a specific geospatial data set is to be categorised as “shareable” or “non-shareable.”</p>
<p><strong>3. No clarity regarding legal status of citizen/crowd-sourced geospatial data, and initiatives to generate them:</strong> Open user-contributed geospatial data, especially through the OpenStreetMap platform, has emerged as a key driver of the global geospatial services industry. There is a legal ambiguity created by the National Mapping Policy regarding generation of such data in India, which came into focus when Survey of India filed a case against Google for organising a Mapathon contest, which invited Indian users to add metadata about physical and built features through Google Maps platform.1 The NGP needs to expressly provide legal sanction (and perhaps framework) for citizen/crowd-sourcing of geospatial data.</p>
<p><strong>4. Fragmented institutional structure for collection, management, and distribution of different kinds of geospatial data:</strong> Survey of India, Indian Institute of Remote Sensing, and Indian Space Research Organisation are all key government agencies involved in creating and managing geospatial data. Further, Election Commission of India is involved in preparing geospatial data about electoral units and their boundaries. The National Spatial Data Infrastructure was conceptualised to harmonise and centralise the geospatial data management processes, but is yet to be implemented with the backing of a policy or an Act. The NSDI can be institutionalised via the NGP as the national archive, aggregator, and distributor of open geospatial data, being originally collected and created by a range of government agencies.</p>
<p><strong>5. Integration of National Geospatial Policy with National Data Sharing and Accessibility Policy (NDSAP):</strong> The proactive disclosure of “shareable” geospatial data using open geospatial standards and under open licenses must be carried out under the purview of the NDSAP, and through the open government data platform established through NDSAP. The decisions regarding licensing of open government data, as being discussed by the a committee set up under NDSAP, must also be applicable to open geospatial data that will be published following the instructions of the NGP. Further, instead of multiple online sources of open geospatial data collected by various Indian government agencies, must be identified as the primary and necessary source for publication of open geospatial data.</p>
<p><strong>6. Integration of National Geospatial Policy with Right to Information (RTI) Act:</strong> Geospatial data must be treated as a special category of information under the RTI Act, which necessitates that if an Indian citizen requests for geospatial data from a government agency under the purview of RTI Act, the agency must provide the data in a human-readable and machine-readable open geospatial standard, and not only in the printed format, as key qualities of digital geospatial data can be substantially lost when printed in paper.</p>
<p><strong>7. Need for special infrastructure for management and publication of real-time geospatial (big) data, and governance of the same:</strong> With increasing number of government assets being geo-referenced for the purpose of more effective and real-time management, especially in the transportation sector, the corresponding agencies (which are often not mapping agencies) are acquiring a vast amount of high-velocity geospatial data, which needs to be analysed and (sometimes) published in the real-time. The need for special infrastructure for such data, as well as its governance, has not been discussed in the concept note for NGP, which is a major omission.</p>
<p> </p>
<h3>Endnotes</h3>
<p><strong>[1]</strong> See: <a href="https://github.com/cis-india/website/raw/master/docs/DST_National-Geospatial-Policy_Concept-Note_2016.01.21.pdf">https://github.com/cis-india/website/raw/master/docs/DST_National-Geospatial-Policy_Concept-Note_2016.01.21.pdf</a>.</p>
<p><strong>[2]</strong> UNGA 41/65. Principles Relating to Remote Sensing of the Earth from Space: <a href="http://www.unoosa.org/pdf/gares/ARES_41_65E.pdf">http://www.unoosa.org/pdf/gares/ARES_41_65E.pdf</a>.</p>
<p> </p>
<p>
For more details visit <a href='https://cis-india.org/openness/consultation-on-national-geospatial-policy-03022016'>https://cis-india.org/openness/consultation-on-national-geospatial-policy-03022016</a>
</p>
No publishersinhaOpen DataOpen Government DataFeaturedGeospatial DataOpennessDigital India2016-03-29T17:03:31ZBlog EntryThe Supreme Court Delivers
https://cis-india.org/telecom/blog/organizing-india-blogspot-october-11-2012-shyam-ponappa-the-supreme-court-delivers
<b>Now, the spectrum and licence issues need resolution. On September 27, 2012, the Supreme Court of India delivered the opinion of a bench comprising five Judges on the Presidential Reference regarding the auction of 2G spectrum.</b>
<hr />
<p style="text-align: justify; ">Published in <a class="external-link" href="http://organizing-india.blogspot.in/2012/10/the-supreme-court-delivers.html">Organizing India Blogspot</a> on October 11, 2012 and in <a class="external-link" href="http://www.business-standard.com/india/news/shyam-ponappasupreme-court-delivers/488420/">Business Standard</a> on October 4, 2012.</p>
<hr />
<p style="text-align: justify; ">The Supreme Court’s opinion on the Presidential reference<a href="#fn*" name="fr*">[*]</a>dismissed two preposterous claims. One is that it is beyond the ambit of Parliament and the government to formulate economic policies. The second is that the government must allocate resources only through auctions. It’s like the end of a self-destructive nightmare. True, our heedless kleptocracy as a society of rogue politicians, bureaucrats, defence personnel, and complicit citizens, led to this pass. Even so, the anarchic “destructionism” of these claims is as reprehensible as the kleptocracy they seek to tear down. Fortunately, the Supreme Court opinion rose above the populist clamour.</p>
<p style="text-align: justify; ">There’s still a mess to clear. The big picture is that the Supreme Court left its decision on spectrum auctions unaddressed. In matters of detail, some points need resolution based on facts. These are discussed below to dispel prevalent myths.</p>
<h3 style="text-align: justify; ">Myth 1: Auctions maximise govt revenues</h3>
<p>"Auctions may be the best way of maximising revenue…": paragraph 116 of the opinion. This contravenes the evidence after the National Telecom Policy -99, that revenue-sharing maximises government revenues as well as public benefits. It also ignores the many auction failures.</p>
<p style="text-align: justify; ">Consider the evidence: auction revenues foregone were estimated at under Rs 20,000 crore for 1999-2007, because the sector was mired in losses and was unable to provide services effectively or pay those dues. By comparison, actual collections from revenue-sharing by March 2007 were more than double, at Rs 40,000 crore. Collections by March 2010 were Rs 80,000 crore. Current annual contributions to government revenues may be about Rs 18,000 crore on Adjusted Gross Revenues estimated at Rs 1,40,000 crore, plus taxes, amounting to perhaps Rs 36,000 crore.</p>
<p style="text-align: justify; ">Re public benefits, access to telephony grew from a few million users in 1999 to about 700 million today (excluding around 250 million shadow subscriptions).</p>
<p style="text-align: justify; ">An ameliorating caveat in paragraph 12 states: "…if the State arrives at the conclusion … that maximum revenue would be earned by auction of the natural resource in question, then that alone would be the process", and this is expanded in paragraph 119:<br /><br />"Where revenue maximisation is not the object of a policy of distribution, the question of auction would not arise. Revenue considerations may assume secondary consideration to developmental considerations."<br /><br />This has not prevented erroneous conclusions in the press that auctions are the only valid process, notwithstanding that the conditions stipulated in the order, eg, that government’s actions be “fair, reasonable, non-discriminatory”, were always operative, if not adhered to in instances of abuse, as in the 2G scam.</p>
<h3 style="text-align: justify; ">Myth 2: Maximum govt collections are in the public interest</h3>
<p style="text-align: justify; ">Government collections as the public interest criterion may work for colonial powers extorting revenues from subject states, or possibly for utopias whose political economy is so balanced that such cross-subsidisation works. Developing economies like India presumably can and should seek the welfare of their people. The same populists crusading for maximum government collections accuse governments of corruption and waste. This doesn’t provide a coherent approach to infrastructure, where each capital-intensive sector is configured to deliver a specific service. For instance, the energy sector has to deliver power, while telecommunications must deliver communications services. Neither can be expected to deliver toilets or water. Yet, many well-intentioned people seem to nurture such irrational expectations.</p>
<h3 style="text-align: justify; ">The spectrum and broadband link</h3>
<p style="text-align: justify; ">The first prerequisite for broadband is high-speed connectivity. The second is reasonably priced services. Our objectives are, therefore: (a) a broadband network, (b) available anywhere (c) at reasonable prices. Our networks are deficient, however, particularly in rural and semi-urban areas. A host of factors are responsible, ranging from limited public sector network rollout, combined with a private sector focus on the most lucrative urban centres, with incentives skewed to voice telephony. Applications need connectivity based on networks that require spectrum.</p>
<h3 style="text-align: justify; ">Problems and solutions</h3>
<p style="text-align: justify; ">Consider an application like distance education. The need is for networks and services of high quality (followed by the additional requirement of content). What is apparent is that such applications cannot be effective without the connectivity. So we’re back to the need for networks, of fibre where feasible, and wireless elsewhere. This brings us back to the need for spectrum.</p>
<h3 style="text-align: justify; ">Reviewing facts</h3>
<p style="text-align: justify; ">As regards the facts relating to the 2G judgment deserving review:<br />The solution the Supreme Court has not considered is that operators need only to use spectrum, for which they can be charged a fee. The evidence of widely available Wi-fi shows that innovation and usage thrive if spectrum is available. The Supreme Court, the government, and the public need to recognise that allocating spectrum to operators is only one way to use spectrum.<br /><br />There need be no alienation of spectrum at all, if policies allow open access and charge fees. Then, spectrum could be used like any infrastructure network, eg, airports, highways, or rail, on payment of usage charges. The sharing could be in at least two ways. Operators could pool spectrum for collective use. For this, (i) regulations must allow pooling/active facilities sharing, and (ii) operators must agree on terms and procedures. Another way is for mandatory spectrum sharing using the database-driven systems being implemented in the US by Spectrum Bridge and Telcordia. Similar deployments are planned in the UK, the European Union, and in Singapore. The TV white space is shared because this range is available for sharing, and not because other bands cannot be shared.<br /><br />There are immense societal costs of duplication in capital investments in multiple networks, including the last-mile spectrum access, of operators using dedicated networks with limited passive facilities sharing (such as towers), compared with the benefits of open-access to common networks, if policies changed. These would employ active facilities sharing (equipment, and not just construction) to reduce capital equipment, construction costs, energy for towers, carbon emissions from a more limited physical network, possibly reduced radiation from a rationalised network with small cells with lower-powered equipment, and the multiplier effect on the finite available spectrum.</p>
<p style="text-align: justify; ">Enormous productivity benefits could accrue through ICT applications in infrastructure such as smart grids for energy, transportation, education, healthcare, and government services, as well as many commercial applications.</p>
<p style="text-align: justify; ">The Supreme Court could also uphold contractual obligations, by discriminating against actual transgressors in the 2G spectrum allocation, while rehabilitating those who operated within the law.</p>
<hr />
<p>[<a href="#fr*" name="fn*">*</a>].<a class="external-link" href="http://supremecourtofindia.nic.in/outtoday/op27092012.pdf">http://supremecourtofindia.nic.in/outtoday/op27092012.pdf</a></p>
<p>
For more details visit <a href='https://cis-india.org/telecom/blog/organizing-india-blogspot-october-11-2012-shyam-ponappa-the-supreme-court-delivers'>https://cis-india.org/telecom/blog/organizing-india-blogspot-october-11-2012-shyam-ponappa-the-supreme-court-delivers</a>
</p>
No publisherShyam PonappaTelecomFeatured2012-12-21T09:57:57ZBlog Entry