The Centre for Internet and Society
https://cis-india.org
These are the search results for the query, showing results 11 to 25.
Thinking with Data@CIS
https://cis-india.org/internet-governance/thinking-with-data
<b>The Thinking with Data course offered at the National Institute of Advanced Studies (NIAS) will be screened at the Centre for Internet and Society, Bangalore. The screening will be followed by online discussions with the faculty through Skype or Google+ Hangouts.</b>
<h3>Introduction to the course</h3>
<p style="text-align: justify; "><a href="http://rajeshkasturirangan.com/" target="_blank">Rajesh</a> and <a href="http://s-anand.net/" target="_blank">Anand</a> are offering a course titled <a href="http://analysis.knofu.org/2012/08/02/thinking-with-data/" target="_blank" title="Thinking with Data"><b>Thinking with Data</b></a> at <a href="http://www.nias.res.in/" target="_blank">NIAS</a>. It’ll be covered in 12 – 14 two-hour sessions. The course will cover the basic ways in which we can use data to enhance our thinking capacities. <a href="http://analysis.knofu.org/2012/08/02/thinking-with-data/">Click here</a> for more information about the course.</p>
<p><b>Salient Features </b></p>
<ol>
<li>How to think with data and work on interesting problems.</li>
<li>Refresher course in programming using Python and HTML.</li>
<li>Discussions and FAQs with faculty and participants.</li>
<li>Project work.</li>
</ol>
<p><b>Timings and Venue</b></p>
<p>It will be screened every Wednesday, starting from September 12, 2012, from 6.30 p.m. to 8.30 p.m.<br />Venue: Centre for Internet and Society, Bangalore.</p>
<p><b>As part of the class, we are also offering a refresher course in Python and HTML</b></p>
<ul>
<li>Objectives: Introduction to Programming using Python </li>
</ul>
<ul>
<li>Hardware Requirement: Learners should bring their own laptops</li>
</ul>
<ul>
<li>Prerequisites: Enthusiasm to learn.</li>
</ul>
<ul>
<li>Audience Level: Learners with following answers are welcomed.</li>
</ul>
<ol>
<li>I’m not too comfortable with programming</li>
<li>I can program, but not that well in Python</li>
<li>I’m good at Python</li>
</ol>
<hr />
<p><b>Timings of the Refresher Course:</b></p>
<ul>
<li>September 16, 2012: 5:00 to 8.30 p.m.</li>
</ul>
<ul>
<li>September 17, 2012: 5:00 to 8:30 p.m.</li>
</ul>
<ul>
<li>September 18, 2012: 5:00 to 8:30 p.m.</li>
</ul>
<hr />
<p>
For more details visit <a href='https://cis-india.org/internet-governance/thinking-with-data'>https://cis-india.org/internet-governance/thinking-with-data</a>
</p>
No publisherpraskrishnaEvent TypeInternet Governance2012-09-05T08:11:49ZEventCartonama Conference
https://cis-india.org/internet-governance/cartonama-conference
<b>HasGeek is organising a Cartonama Conference on September 22, 2012 at the TERI Complex in Bangalore, from 9.30 a.m. to 6.00 p.m.</b>
<p style="text-align: justify; ">Cartonama conference is centered around geospatial data, mapping and location based services. It deals with two primary themes: infrastructure for managing geospatial data including mapping software, cartographic techniques and tools; and application of geospatial data, primarily location-based services. Cartonama is open to entrepreneurs, developers, individuals and institutions working with GIS and cartographic techniques, advocacy groups, among others.</p>
<p style="text-align: justify; ">We will also host four workshops which will provide hands-on training about tools for managing geospatial data and how to build location-based services. Workshops will be held between September 23 to 25, 2012. Tickets for the Cartonama conference can be bought at <a class="external-link" href="http://cartonama.doattend.com">http://cartonama.doattend.com</a></p>
<h3 style="text-align: justify; ">About HasGeek</h3>
<p style="text-align: justify; ">HasGeek is a Bangalore-based organisation. We put together events for developers with the intention of creating discussion spaces about technologies that are new today, and could become mainstream tomorrow. HasGeek is supported by CIS.</p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/cartonama-conference'>https://cis-india.org/internet-governance/cartonama-conference</a>
</p>
No publisherpraskrishnaEvent TypeInternet Governance2012-09-17T13:59:05ZEventBiometric Identification: Specified Error, Accuracy and Efficiency, Considered for the Operations of the UIDAI — A Talk by Hans Varghese Mathews
https://cis-india.org/internet-governance/biometric-identification
<b>Hans Varghese Mathews gave a public lecture on biometric identification at the Centre for Internet & Society office in Bangalore on August 17, 2012 at 5.00 p.m.</b>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
<p><a href="https://cis-india.org/internet-governance/uid-summary-of-findings.pdf" class="internal-link">Click</a> to read UID Summary by Hans Varghese Mathews</p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/biometric-identification'>https://cis-india.org/internet-governance/biometric-identification</a>
</p>
No publisherpraskrishnaEvent TypeInternet Governance2012-09-10T08:07:28ZEventBangalore Force.com August Meetup
https://cis-india.org/openness/bangalore-force-com-cloud-apps-developer-meetup-event
<b>Following the India Salesforce Platform Developer Hands-On Workshop in July, Bangalore Force.com is organizing monthly meetups in Bangalore, starting in August. The first meeting will be held at the Centre for Internet & Society in Bangalore on Sunday, August 19, 2012 from 2.00 p.m. to 5.00 p.m. John Barnes will be speaking on the occasion. </b>
<h3>John Barnes</h3>
<p style="text-align: justify; ">John Barnes, CTO Model Metrics will be the first speaker for this meetup. John has been working with Force.com and Salesforce.com since 2005. He is a frequent speaker at global conferences on Cloud Computing and Mobility (Dreamforce, Adobe MAX, Interop, Cloud Connect, Enterprise 2.0). You can follow his blogs <a class="external-link" href="http://www.modelmetrics.com/author/jbarnes/">here</a>.</p>
<p style="text-align: justify; ">John will give an overview of the Force.com platform, benefits of Force.com, Heroku, etc., and an overview of the Social Enterprise. Siddhesh Kabe, Sr. Developer, Salesforce.com, will follow up with demos and hands-on coding.</p>
<p>
For more details visit <a href='https://cis-india.org/openness/bangalore-force-com-cloud-apps-developer-meetup-event'>https://cis-india.org/openness/bangalore-force-com-cloud-apps-developer-meetup-event</a>
</p>
No publisherpraskrishnaOpennessEvent Type2012-08-09T13:59:50ZEventThe Asian Edge: 2012 Inter-Asia Cultural Studies Society Summer School
https://cis-india.org/internet-governance/iacs-summer-school-2012
<b>The 2nd Biannual Inter Asia Cultural Studies (IACS) Summer School will be hosted in Bangalore, India by the Centre for the Study of Culture and Society (CSCS) and the Centre for Internet and Society (CIS) with the Inter Asia Cultural Studies Consortium. The event will be held in the first and second week of August 2012.</b>
<p style="text-align: justify; ">The IACS Summer School brings together South and East Asian experts from different disciplines as faculty for graduate and advanced research students to engage with key issues of larger social, cultural and political concerns in Cultural Studies in Asia. Any student registered in a post-graduate degree program is eligible for the IACS Summer School. There are limited seats and students will be selected based on their applications. Students registered at universities participating in the Consortium of Inter Asia Cultural Studies Institutions will be given first preference.</p>
<p style="text-align: justify; ">The Summer School 2012 proposes to integrate the teaching with core IACS faculty with the larger realities of change in South and East Asia. It proposes a 10 + 4 day structure.</p>
<p style="text-align: justify; "><b>Core</b><b> </b><b>Course: Methodologies for Cultural Studies in Asia:</b><b> </b>The Summer School offers a 10 day core course that works through seminars, taught classrooms, tutorials, open spaces, field trips and workshops. The core course shall address questions of Cultural Identity, Modernity, Nationalism, Gender, Class, Revolution and Asianism to frame an argument about relocating methods, concepts and ideas in contemporary Cultural Studies in Asia.</p>
<table class="listing grid">
<tbody>
<tr>
<th>Day/Date</th><th>Time</th><th>Session</th><th>Instructors</th><th>Readings</th>
</tr>
<tr>
<td>Aug 02<br />(Thu)<br /><br /></td>
<td>09:30-10:00</td>
<td>Introduction to Course/Orientation</td>
<td><br /></td>
<td><br /></td>
</tr>
<tr>
<td><br /></td>
<td>10:00-1:00</td>
<td>Session 1: The Question of Knowledge<br /><br /></td>
<td>Instructors: Daniel PS Goh Nithin Manayath<br /><br /></td>
<td>The Epistemological Value of East Asian Perspective – Sun Ge<br /><br />Knowledge Production in the Era of Neo-Liberal Globalisation – Kuan-Hsing Chen<br /><br />Teaching versus Research? – Meaghan Morris<br /><br /></td>
</tr>
<tr>
<td><br /></td>
<td>3:00-5:00 <br /></td>
<td>Student Presentations</td>
<td>Choi, Ji Yeon<br />Ajinkya Shenava<br />Khetrimayum M Singh<br />Vincent Chung<br />Jaime Fang-Tze Hsu<br /><br /></td>
<td><br /></td>
</tr>
<tr>
<td>Aug 03<br />(Fri)<br /><br /></td>
<td><br /></td>
<td>Culture Industries workshop</td>
<td><br /></td>
<td><br /></td>
</tr>
<tr>
<td><br /></td>
<td><br /></td>
<td>Workshop party</td>
<td><br /></td>
<td><br /></td>
</tr>
<tr>
<td>Aug 04<br />(Sat)<br /><br /></td>
<td>10:00-1:00 <br /></td>
<td>Session 2: The Question of Culture<br /><br /></td>
<td>Instructors: <br />Asha Achuthan<br />Ratheesh Radhakrishnan<br /><br /></td>
<td>Hind Swaraj – Chs IV, VI, XII, XIII – MK Gandhi<br /><br />Value Typology of Chinese Peasants and Its Transformation in Contemporary China – He Xuefeng<br /><br />An Elaborative Argumentation of a Nong-Country – Zhang Shi Zhao<br /></td>
</tr>
<tr>
<td><br /></td>
<td>3:00-5:00 <br /></td>
<td>Student Presentations</td>
<td>Annisa Beta<br />Ying-Tzu, Liu (Eva)<br />Li, Yen-Chieh<br />Sharib Aqleem Ali<br />Li, Cho Kiu (Joseph)<br /></td>
<td>Venue: 1 Shanti Road</td>
</tr>
<tr>
<td><br /></td>
<td>6:00-8:00</td>
<td>EVENING SALON</td>
<td>Tejaswini Niranjana and Kuan-Hsing Chen</td>
<td>Venue: 1 Shanti Road</td>
</tr>
<tr>
<td>Aug 05<br />(Sun)<br /></td>
<td><br /></td>
<td>HOLIDAY</td>
<td><br /></td>
<td><br /></td>
</tr>
<tr>
<td>Aug 06<br />(Mon)<br /><br /></td>
<td>10:00-1:00</td>
<td>Session 3: Nationalism and Modernity<br /><br /></td>
<td>
<p>Instructor: Milind Wakankar</p>
<p>Student Presentations: <br />Mai Thi Thu<br />Baidurya Chakrabarti<br />Zhang, Bing<br />Musab Iqbal<br />Meng Hsien Lu</p>
</td>
<td>
<p>On Nation – Zhang Tai Yan<br /><br />Nationalism in India – <br />Rabindranath Tagore<br /><br />New Dominant Ideology and Changes of Urban Space in Today's Shanghai – Wang Xiaoming<br /><br />The Twilight of Certitudes: Secularism, Hindu Nationalism and Other Masks of Deculturation – Ashis Nandy</p>
<p>A National Culture for Pakistan: the political economy of a debate – Saadia Toor</p>
</td>
</tr>
<tr>
<td><br /></td>
<td>3:00-5:00</td>
<td><br /></td>
<td>Instructor: Madhuja M<br />Student Presentations:<br />Pan Yifan<br />Zhang Zhihui<br />Se Young Oh</td>
<td><br /></td>
</tr>
<tr>
<td><br /></td>
<td><br /></td>
<td>EVENING SALON</td>
<td>Stephen Chah and Ashish Rajadhyaksha</td>
<td>Venue: Centre for Internet and Society</td>
</tr>
<tr>
<td>Aug 07<br />(Tue)<br /></td>
<td>10:00-1:00</td>
<td>Session 4: Culture and Economy</td>
<td>Instructors: <br />Radhika P<br />Raghu Tenkayala<br /></td>
<td>
<p>In the Margin of the Capital: From ‘Tjerita Boedjang Bingoeng’ to ‘Si Doel anak sekolahan’</p>
<p>The Emergent Culture of Consumption – Chua Beng Huat</p>
<p>‘Bollywood’ 2004; When Was Bollywood – Ashish Rajadhyaksha</p>
<p>Peasant Cultures of the 21st Century – Partha Chatterjee</p>
</td>
</tr>
<tr>
<td><br /></td>
<td>3:00-5:00</td>
<td>Student Presentations</td>
<td>Chan Ka Yi<br />Kim Yoon Young<br />Tanna Shilpa Shirishkumar<br />Ruchi Jaggi<br />Haesook Yong</td>
<td><br /></td>
</tr>
<tr>
<td>Aug 08<br />(Wed)<br /></td>
<td>10:00-1:00</td>
<td>Session 5: Gender and Culture</td>
<td>Instructors: <br />Navaneetha Mokkil <br />Nitya Vasudevan<br /></td>
<td>Why Culture Matters – Tejaswini Niranjana<br /><br />Prostitutes Parasites and the house of state feminism – Naifei Ding<br /><br />Women and Freedom – Firdous Azim<br /><br />Letters to the Editor: The domestic violence act and conflict<br /><br />Spectralization of the Rural: Reinterpreting the labour mobility of rural young women in post-Mao China – Yan Hairong</td>
</tr>
<tr>
<td><br /></td>
<td>3:00-5:00</td>
<td>Student Presentations</td>
<td>Elmo I-Che Hsu<br />Pang Ka Wei (Janet)<br />Li-Fang Lai<br />Kris Yu-Shiuan Chi<br />Samia Vasa<br />Shwetha D<br />Ryu M-Rye<br />Sabreena Ahmed</td>
<td><br /></td>
</tr>
<tr>
<td><br /></td>
<td>6:00-8:00</td>
<td>EVENING SALON</td>
<td>Firdous Azim and Naifei Ding/Siddharth/Arvind in conversation</td>
<td>Venue: Alternative Law Forum</td>
</tr>
<tr>
<td>Aug 09<br />(Thurs)</td>
<td>10:00-1:00</td>
<td>FIELD TRIP</td>
<td>SURESH JAYARAM – Pettai Tour</td>
<td><br /></td>
</tr>
<tr>
<td>Aug 10<br />(Fri)</td>
<td>10:00-1:00</td>
<td>Session 6: Understanding Popular Cultural Practice</td>
<td>Instructors: <br />Namita Malhotra<br />Nishant Shah<br /></td>
<td>Hong Kong Action film in the Indian B Circuit – SV Srinivas<br /><br />Inter-Asia Comparative Framework: Postcolonial Film Historiography in Taiwan and South Korea Kim Soyoung<br /><br />Fan Bhakti and Subaltern Sovereignty – Madhava Prasad</td>
</tr>
<tr>
<td><br /></td>
<td>3:00-5:00</td>
<td>Student Presentations</td>
<td>Samhita Sunya<br />Khatija Sana Khader<br />Ayesha Maria Mualla<br />Antoreep Sengupta</td>
<td><br /></td>
</tr>
<tr>
<td>Aug 11<br />(Sat)</td>
<td><br /></td>
<td>UNWORKSHOP DAY (Writing)</td>
<td>Evening: Final Party</td>
<td><br /></td>
</tr>
</tbody>
</table>
<p><b> </b></p>
<p><b>Optional </b><b>Courses:</b><b> </b>2 Additional 4-days parallel Courses shall be offered to participants interested in specialised inquiries of their research practice.<b> </b></p>
<p><b>Course</b><b> </b><b>A.</b><b> </b><b>The</b><b> </b><b>Digital</b><b> </b><b>Subject:</b><b> </b><b>Science,</b><b> </b><b>Technology</b><b> </b><b>and</b><b> </b><b>Society</b><b> </b><b>in</b><b> </b><b>Asia</b></p>
<ul>
<li>Course Coordinator: Nishant Shah</li>
</ul>
<ul>
<li>Course Instructors: Nishant Shah, Lawrence Liang and Ashish Rajadhyaksha</li>
</ul>
<p><b> </b></p>
<p><b>Course</b><b> </b><b>B.</b><b> </b><b>Research</b><b> </b><b>Seminar</b><b> </b><b>on</b><b> </b><b>Technology, Culture & the Body</b></p>
<ul>
<li>Course Coordinator: Nitya Vasudevan</li>
</ul>
<ul>
<li>Course Instructors: Tejaswini Niranjana, DING Naifei, Audrey Yue, Wing-Kwong Wong, Hsing-Wen Chang, Nitya Vasudevan</li>
</ul>
<div id="_mcePaste">
<p class="TableContents"><span>Nandy</span></p>
<p class="TableContents"><span> </span></p>
<span>A National Culture for Pakistan: the political economy of a debate – Saadia Toor</span></div>
<p class="TableContents"><span>Nandy</span></p>
<p class="TableContents"><span> </span></p>
<p><span>A National Culture for Pakistan: the political economy of a debate – Saadia Toor</span></p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/iacs-summer-school-2012'>https://cis-india.org/internet-governance/iacs-summer-school-2012</a>
</p>
No publisherpraskrishnaEvent TypeInternet GovernanceResearch2012-08-02T13:23:14ZEventTechnology Evangelists and Religious Evangelists — A Talk by Katherine Sydenham
https://cis-india.org/openness/technology-evangelists-religious-evangelists
<b>Katherine Sydenham from the University of Michigan School of Information will deliver a lecture at the Centre for Internet & Society office in Bangalore on August 10, 2012, from 5.00 p.m. to 6.30 p.m.</b>
<h3>Abstract</h3>
<p style="text-align: justify; ">The current investigation explores the possibility of comparison of techniques used by technology evangelists and religious evangelists. The study sought informants from three major categories: proprietary software evangelists, proponents of Free and Open Source Software (FOSS), and religious evangelists of several religious traditions. A preliminary analysis of qualitative data indicates that there are enough similarities in strategies used by members from each group to make the inquiry relevant. Early data also reveal significant differences in each group´s strategy that may inform and shape future efforts on behalf of technology evangelists to reach a wider audience for their products.</p>
<p style="text-align: justify; "> </p>
<h3>Katherine Sydenham</h3>
<p>Katherine is a doctoral student at the University of Michigan School of Information. Her research in the Information and Communication Technologies and Development (ICTD) field focuses on technology adoption by marginalized communities. Her background is in Religious Studies and Library and Information Science. Her summer internship at Microsoft Research is exploring the strategic similarities between technology evangelism and religious evangelism.</p>
<p style="text-align: justify; "><a class="external-link" href="http://www.si.umich.edu/people/katherine-sydenham">Click here</a> to read more about Katherine</p>
<p>
For more details visit <a href='https://cis-india.org/openness/technology-evangelists-religious-evangelists'>https://cis-india.org/openness/technology-evangelists-religious-evangelists</a>
</p>
No publisherpraskrishnaOpen DataEvent Type2012-09-04T10:44:34ZEventData-Driven Journalism, Data Literacy & Open Government — Talk at CIS
https://cis-india.org/openness/data-driven-journalism-data-literacy-and-open-govt
<b>The Open Knowledge Foundation and the Centre for Internet and Society invite you to an informal talk by Lucy Chambers and Laura Newman on 'Data-Driven Journalism, Data Literacy, and Open Government'. </b>
<p style="text-align: justify; ">The Government of India recently passed a policy that requires all departments to start opening up data to the public, and NIC is working towards consolidating this on a single website. This workshop would focus on exchanging information on how such data are used by journalists elsewhere, and what can be done in India to drive journalism using data.</p>
<h3 style="text-align: justify; ">Details</h3>
<p style="text-align: justify; ">The Open Knowledge Foundation is an international not-for-profit with a mission to open up the world's data, build data-literacy and promote evidence-based policy making. Working in 3 broad fields open-government, open research and open cultural heritage the activities of the foundation are focused around projects, working groups and local meetups.</p>
<p style="text-align: justify; ">The talk will be very informal, and focus on Data Journalism (<a class="external-link" href="http://datajournalismhandbook.org/">datajournalismhandbook.org</a>), but will also touch on data management for governments (ckan.org), the teaching of data literacy (<a class="external-link" href="http://schoolofdata.org/">schoolofdata.org</a>) and explaining the meaning of the numbers behind government expenditure (<a class="external-link" href="http://openspending.org/">openspending.org</a>).</p>
<h3 style="text-align: justify; ">More Details</h3>
<p style="text-align: justify; ">The Data Journalism Handbook was born at a 48-hour workshop at MozFest 2011 in London. It subsequently spilled over into an international, collaborative effort involving dozens of data journalism's leading advocates and best practitioners including from the Australian Broadcasting Corporation, the BBC, the Chicago Tribune, Deutsche Welle, the Guardian, the Financial Times, Helsingin Sanomat, La Nacion, the New York Times, ProPublica, the Washington Post, the Texas Tribune, Verdens Gang, Wales Online, Zeit Online and many others. Ms. Chambers was one of the<br />editors of the book.</p>
<h3 style="text-align: justify; ">Additional Links</h3>
<ul>
<li>Data Journalism Handbook - Online Version:<a class="external-link" href="http://bit.ly/Istv8c">http://bit.ly/Istv8c</a></li>
</ul>
<ul>
<li>Examples of data-driven journalism:<a class="external-link" href="http://bit.ly/8KwHR">http://bit.ly/8KwHR</a></li>
</ul>
<ul>
<li>Data-Driven Journalism mailing list:<a class="external-link" href="http://bit.ly/hUOQX3"> http://bit.ly/hUOQX3</a></li>
</ul>
<p>
For more details visit <a href='https://cis-india.org/openness/data-driven-journalism-data-literacy-and-open-govt'>https://cis-india.org/openness/data-driven-journalism-data-literacy-and-open-govt</a>
</p>
No publisherpraneshOpen DataEvent TypeOpenness2012-07-31T06:08:55ZEventRole of the US Tech Companies in Government Surveillance: A Lecture by Christopher Soghoian
https://cis-india.org/internet-governance/role-of-us-tech-companies-in-govt-surveillance
<b>Christopher Soghoian will deliver a lecture on the role US tech companies play in assisting government surveillance at the Centre for Internet & Society office in Bangalore on August 27, 2012, from 5.00 p.m. to 7.00 p.m.
</b>
<p style="text-align: justify; ">Your internet, phone and web application providers are all, for the most part, in bed with US and other foreign government agencies. They all routinely disclose their customers' communications and other private data to law enforcement and intelligence agencies. Worse, firms like Google and Microsoft specifically log data in order to assist the government. How many government requests does your ISP get for its customers' communications each year? How many do they comply with? How many do they fight? How much do they charge for the surveillance assistance they provide? Who knows? Most companies have a strict policy of not discussing such topics.</p>
<p style="text-align: justify; ">The differences in the privacy practices of the major players in the telecommunications and internet applications market are significant. Some firms retain identifying data for years, while others retain no data at all; some voluntarily provide the government access to user data, while other companies refuse to voluntarily disclose data without a court order; some companies charge government agencies when they request user data, while others disclose it for free. For an individual, later investigated by the police or intelligence services, the data retention practices adopted by their phone company or email provider can significantly impact their freedom.</p>
<p style="text-align: justify; ">Unfortunately, although many companies claim to care about end-user privacy, and some even that they compete on their privacy features, none seem to be willing to compete on the extent to which they assist or resist the government in its surveillance activities. Because information about each firms' practices is not publicly known, consumers cannot vote with their wallets, and pick service providers that best protect their privacy.</p>
<p style="text-align: justify; ">This talk will pierce the veil of secrecy surrounding these practices. Based upon a combination of Freedom of Information Act requests, off the record conversations with industry lawyers, and investigative journalism, the practices of many of these firms will be revealed.</p>
<hr />
<h3>Christopher's Personal Experience</h3>
<p style="text-align: justify; ">In the year 2006, the Federal Bureau of Investigation (FBI) raided Christopher’s home at 2.00 a.m. seizing his personal documents and computers. Two attorneys, Stephen Braga and Jennifer Granick came to his defence. With their expert assistance, Christopher was able to get back his possessions within three weeks, and FBI’s criminal and TSA’s civil investigations were closed without any charges being filed.</p>
<p style="text-align: justify; ">Jennifer Granick came to Christopher’s assistance once again (joined by Steve Leckar) in 2010 after the Federal Trade Commission’s Inspector General investigated Christopher for using his government badge to attend a closed-door surveillance industry conference. It was at that event that Christopher recorded an executive from wireless carrier ‘Sprint’ bragging about the eight million times his company had obtained GPS data on its customers for law enforcement agencies in the previous years.</p>
<p style="text-align: justify; ">To know more, read Christopher Soghoian’s dissertation titled "<a href="https://cis-india.org/internet-governance/spies-we-trust" class="internal-link">The Spies We Trust: Third Party Service Providers and Law Enforcement Surveillance</a>". [PDF, 1056 Kb]</p>
<hr />
<h3>About Christopher Soghoian</h3>
<p style="text-align: justify; ">Christopher Soghoian is a privacy researcher and activist, working at the intersection of technology, law and policy. He is a Principal Technologist and Senior Policy Analyst at the American Civil Liberties Union and is based in Washington, D.C.</p>
<p style="text-align: justify; ">Soghoian completed his Ph.D. at Indiana University in 2012, which focused on the role that third party service providers play in facilitating law enforcement surveillance of their customers. In order to gather data, he has made extensive use of the Freedom of Information Act, sued the Department of Justice <i>pro se</i>, and used several other investigative research methods. His research has appeared in publications including the <i>Berkeley Technology Law Journal </i>and been cited by several federal courts, including the Ninth Circuit Court of Appeals.</p>
<p style="text-align: justify; ">Between the years, 2009-2010, he was the first ever in-house technologist at the Federal Trade Commission's Division of Privacy and Identity Protection, where he worked on investigations of Facebook, Twitter, MySpace and Netflix. Prior to joining the FTC, he co-created the Do Not Track privacy anti-tracking mechanism now adopted by all of the major web browsers.</p>
<p>He is a TEDGlobal 2012 Fellow, was an Open Society Foundations Fellow between the years, 2011-2012, and was a Student Fellow at the Berkman Center for Internet & Society, Harvard University between 2008 and 2009.</p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/role-of-us-tech-companies-in-govt-surveillance'>https://cis-india.org/internet-governance/role-of-us-tech-companies-in-govt-surveillance</a>
</p>
No publisherpraskrishnaLectureEvent TypeInternet GovernancePrivacy2012-08-26T11:03:19ZEventGeekUp with Alan Knott-Craig
https://cis-india.org/internet-governance/geek-up-with-alan-knott-craig
<b>HasGeek and CIS invite you to a lecture by Alan Knott-Craig at CIS office in Bangalore on June 30, 2012, from 5.00 p.m. to 6.30 p.m.</b>
<p style="text-align: justify; ">Alan is founder of World of Avatar and CEO of Mxit, Africa’s largest social network. Between 2003 and 2006, Alan co-founded five companies in the mobile services sector. In 2006, he was appointed managing director of iBurst, a broadband network operator in South Africa. In April 2008, he published Don’t Panic, a best selling book aimed at persuading emigrant South Africans to return home. In June 2008, he founded The Trust, an NGO focused on assisting charities access skills and capital. In 2009, he was named as a Young Global Leader by the World Economic Forum. In June 2012 he published Mobinomics, the story of Mxit and mobile in Africa. Alan is a qualified Chartered Accountant (SA).</p>
<h3 style="text-align: justify; ">The Story of MXit</h3>
<p style="text-align: justify; ">MXit (pronounced "mix it") is a free instant messaging application developed by MXit Lifestyle (Pty) Ltd. in South Africa that runs on multiple mobile and computing platforms. According to a 2011 study by consultancy World Wide Worx, MXit currently has about 10 million active subscribers, making it the largest mobile social network in Africa.</p>
<p style="text-align: justify; ">MXit allows users to send and receive one-on-one text and multimedia messages to and from other users, and in general chat rooms. MXit also supports gateways to other instant messaging platforms such as MSN Messenger, ICQ and Google Talk.</p>
<p style="text-align: justify; ">On 1 April 2009, MXit released an open-source plug-in for the libPurple library. This allows applications using the libPurple library such as Pidgin and Adium to connect to the MXit network. This coincided with the release of the MXit Developer Zone web-site and documentation on the MXit client protocol. MXit has been included as a standard protocol in Pidgin since version 2.6.4.</p>
<h3 style="text-align: justify; ">Agenda</h3>
<table class="plain">
<tbody>
<tr>
<td>17:00 - 17:05</td>
<td>Welcome with Tea, Coffee, and Snacks</td>
</tr>
<tr>
<td>17:05 - 17:15</td>
<td>Lightning Talks</td>
</tr>
<tr>
<td>17:15 - 18:00</td>
<td>The Story of MXit</td>
</tr>
<tr>
<td>18:00 - 18:30<br /></td>
<td>Q & A</td>
</tr>
</tbody>
</table>
<p>For registration, <a class="external-link" href="http://geekup.in/2012/alan-knott-craig"><span class="visualHighlight">click here</span></a></p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/geek-up-with-alan-knott-craig'>https://cis-india.org/internet-governance/geek-up-with-alan-knott-craig</a>
</p>
No publisherpraskrishnaEvent TypeInternet Governance2012-06-29T11:11:52ZEventPrivacy Matters — Consumer Privacy
https://cis-india.org/internet-governance/consumer-privacy-delhi
<b>Privacy India, in partnership with the Centre for Internet & Society, International Development Research Centre, Society in Action Group and Privacy International, invites you to a public conference focused on discussing the challenges and concerns to consumer privacy in India. The event will be held at the Indian International Centre, New Delhi on Saturday, July 7, 2012, from 9 a.m. to 5 p.m.</b>
<p>According to the Consumer Protection Act, 1986, a consumer is a broad label for any person who buys any goods or services for consideration with the intent of using them for a non-commercial purpose. Certain services that consumers use may, by their very nature, put an extraordinary amount of sensitive personal information into the hands of vendors.</p>
<p>Consumer privacy is concerned with accuracy of how a consumers information is collected and used. Because a consumers relationship with another entity is based on an exchange along consented terms, a breach in consumer privacy can be constituted as an action that was not agreed to. In the age of data collection – a breach in privacy occurs when information is used in different ways than was intended. Consumer privacy in India is determined at the sectoral level, and differs depending on the services that is provided for.</p>
<p>As corporations sell data banks, ISP's expose consumer habits, or ones personal information falls in the wrong hands – the consequences are far reaching, and can result in spamming, unwanted marketing, theft, or the violation can impact an individual's ability to buy a home, potential employment opportunities, or gain access to credit.</p>
<p>In India, the right to privacy has been a neglected area of study and engagement. Although sectoral legislation deals with privacy issues, India does not as yet have a horizontal legislation that deals comprehensively with privacy across all contexts. The absence of a minimum guarantee of privacy is felt most heavily by marginalized communities, including HIV patients, children, women, sexuality minorities, prisoners, etc. - people who most need to know that sensitive information is protected.</p>
<p>Since June 2010, Privacy India in collaboration with Privacy International, based in London, has been conducting workshops and engaging in public awareness. Participants include policy makers, researchers, sectoral experts, NGOs, and the public to discuss and deliberate different questions of privacy, its intersections and its implications with our everyday life. The discussions have ranged from topics of online privacy to minority rights and privacy and e-Governance initiatives privacy. The workshops have been organized in different cities - Bangalore, Guwahati, Mumbai, Delhi, Kolkata, Ahmedabad, Chennai, Goa, etc.</p>
<p><a href="https://cis-india.org/internet-governance/consumer-privacy-event" class="internal-link">Click here</a> for the agenda</p>
<p>Please confirm your participation with <a class="external-link" href="mailto:natasha@cis-india.org">natasha@cis-india.org</a></p>
<hr />
<ul>
<li>Download the invite <a href="https://cis-india.org/internet-governance/consumer-privacy-invite" class="internal-link">here</a> [PDF, 160 Kb]</li>
</ul>
<ul>
<li>Download our research <a href="https://cis-india.org/internet-governance/consumer-research.pdf" class="internal-link">here</a> [PDF, 178 Kb]</li>
</ul>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/consumer-privacy-delhi'>https://cis-india.org/internet-governance/consumer-privacy-delhi</a>
</p>
No publisherpraskrishnaEvent TypeInternet GovernancePrivacy2012-07-31T10:55:30ZEventHasGeek presents The Fifth Elephant
https://cis-india.org/internet-governance/has-geek-presents-the-fifth-elephant
<b>HasGeek and the Centre for Internet & Society invite you the Fifth Elephant at the NIMHANS Convention Centre, Bangalore on July 27 and 28, 2012. </b>
<h3>Why The Fifth Elephant?</h3>
<p>Modern technology with ubiquitous connectivity and cloud-hosted computing power is increasingly becoming important for making sense of data. The infrastructure, tools, processes and algorithms for storage, analytics and visualization shape the meanings and value that can be derived from the data. At the same time, these technologies are strongly intertwined i.e., the database infrastructure shapes how data is accessed for processing, as well as the tools you can (or cannot) use to represent the data in certain ways on the frontend. Similarly, the paradigms used for simplifying and storing data — MapReduce, NoSQL, RDBMS — variously enable the morphing of complex data into meaningful formats. Working with each one of them involves limitations and possibilities.</p>
<p><strong>The Fifth Elephant </strong>is the first of its kind of events where you will meet different people working with different kinds of data. It is an opportunity for learning about new tools, technologies, platforms, processes and best practices, and engaging with business leaders, IT decision-makers, journalists, analysts and developers. It is also an opportunity to showcase data products, APIs, services and platforms.</p>
<h3>A Conference? An Event?</h3>
<p>The Fifth Elephant is not simply a series of lectures. It is a space for interactions with a diverse audience to serendipitously explore insights and solutions for your data problems, to understand how hidden meanings in data can be made manifest, and to learn how others are working with data. The event is open to data analysts and scientists, statisticians, geeks, enthusiasts, data-driven product managers and designers, enterprise architects, journalists, researchers, developers and database professionals.</p>
<h3>The Agenda</h3>
<p>The Fifth Elephant will be held on July 27 and 28, 2012 at the NIMHANS Convention Centre, Bangalore. Day 1 covers the technology track — big data infrastructure, analytics and visualization. Day 2 invites talks from business and industry — finance, retail, health, media, telecom — to showcase the nature of data in each of these sectors and how they are working (and not working) with the data.</p>
<p>Apart from demos, lectures and tutorials, there will be opportunities for open house discussions and presentations on Hadoop, NoSQL versus RDBMS paradigms, and legal and licensing frameworks for data sharing, among others. Hacker corners, a dedicated participant lounge and interactive sponsor booths will further the learning, showcasing and engagement at the event.</p>
<p>For submitting talks and speaking proposals, visit <a class="external-link" href="http://funnel.hasgeek.com/5el">funnel.hasgeek.com/5el</a>.<br />Corporate tickets available for company delegates and employees. For more information write to <a class="external-link" href="mailto:info@hasgeek.com">info@hasgeek.com</a><br />For sponsorship queries, write to <a class="external-link" href="mailto:zainab@hasgeek.com">zainab@hasgeek.com</a></p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/has-geek-presents-the-fifth-elephant'>https://cis-india.org/internet-governance/has-geek-presents-the-fifth-elephant</a>
</p>
No publisherpraskrishnaEvent TypeInternet Governance2012-06-19T06:38:13ZEventMedical Privacy
https://cis-india.org/internet-governance/medical-privacy
<b>Privacy India in partnership with the Indian Network for People living with HIV/AIDS, Centre for Internet & Society, IDRC, Society in Action Group and Privacy International is organising an event on Medical Privacy at Yashwantrao Chavan Academy of Development Administration, Rajbhavan Complex, Baner Road, Pune on June 30, 2012, from 9 a.m to 5 p.m. </b>
<p>Confidentiality and privacy are essential to all trusting relationships, such as that between patients and doctors. Moreover, in a healthcare context, patient confidentiality and the protection of privacy is the foundation of the doctor-patient relationship. Medical confidentiality promotes the individual's medical autonomy, by sheltering those seeking morally controversial medical care from outside criticism and interference with decisions.<a name="fr1" href="#fn1">[1]</a>Patients must feel comfortable sharing private information about their bodily functions, physical and sexual activities, and medical history.<a name="fr1" href="#fn2">[2]</a> This will make them more willing to seek information and support to fully understand and evaluate their options so that they can make the most informed medical decisions.</p>
<p>The disclosure of personal health information has the potential to be embarrassing, stigmatizing or discriminatory. Furthermore, various goods such as employment, life, and medical insurance, could be placed at risk if the flow of medical information were not restricted.<a name="fr3" href="#fn3">[3]</a></p>
<p>This workshop will explore the various types of medical privacy including: informational privacy (e.g., confidentiality, anonymity, secrecy and data security); physical privacy (e.g., modesty and bodily integrity); associational privacy (e.g. intimate sharing of death, illness and recovery); proprietary privacy (e.g., selfownership and control over personal identifiers, genetic data, and body tissues); and decisional privacy (e.g., autonomy and choice in medical decision-making).<a name="fr4" href="#fn4">[4]</a></p>
<p>The right to privacy in India has been a neglected area of study and engagement. Although sectoral legislation deals with privacy issues, India does not as yet have a horizontal legislation that deals comprehensively with privacy across all contexts. The absence of a minimum guarantee of privacy is felt most heavily by marginalized communities, including HIV patients, children, women, sexuality minorities, prisoners, etc. - people who most need to know that sensitive information is protected.</p>
<p>Since June 2010, Privacy India in collaboration with Privacy International, based in London, has been conducting workshops and engaging in public awareness. Participants include policy makers, researchers, sectoral experts, NGOs, and the public to discuss and deliberate different questions of privacy, its intersections and its implications with our everyday life.</p>
<p>The discussions have ranged from topics of online privacy to minority rights and privacy, and consumer privacy. The workshops have been organized in different cities - Bangalore, Guwahati, Mumbai, Delhi, Kolkata, Chennai, Goa, etc.</p>
<p>Please confirm your participation through <a class="external-link" href="mailto:natasha@cis-india.org">email to Natasha Vaz</a>. We sincerely hope you will be able to attend and look forward to your participation.</p>
<p><a href="https://cis-india.org/internet-governance/medical-privacy.pdf" class="internal-link" title="Medical Privacy Invite">Download the event Invite</a> [PDF, 522 Kb]</p>
<hr />
<p>[<a name="fn1" href="#fr1">1</a>]. Allen, A. (2011). Privacy and Medicine. in E. N. Zalta (Ed.), The Stanford Encyclopedia of Philosophy (2011st ed.). Retrieved from http://plato.stanford.edu/archives/spr2011/entries/privacy‐medicine/<br />[<a name="fn2" href="#fr2">2</a>]. Mishra, N., Parker, L., Nimgaonkar, V., & Deshpande, S. (2008). Privacy and the Right to Information Act, 2005. Indian Journal of Medical Ethics, 5(4), 158‐161.<br />[<a name="fn3" href="#fr3">3</a>].Nissenbaum, H. (2004). Privacy as Contextual Integrity. Washington Law Review, 79(1), 101‐139.<br />[<a name="fn4" href="#fr4">4</a>]. Allen, A. (2011). Privacy and Medicine. In E. N. Zalta (Ed.), The Stanford Encyclopedia of Philosophy (2011st ed.). Retrieved from http://plato.stanford.edu/archives/spr2011/entries/privacy‐medicine/</p>
<p>The event is free and open to the public.</p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/medical-privacy'>https://cis-india.org/internet-governance/medical-privacy</a>
</p>
No publishernatashaEvent TypeInternet GovernancePrivacy2012-06-15T16:11:11ZEventSecuring e-Governance: Ensuring Data Protection and Privacy
https://cis-india.org/internet-governance/securing-e-governance
<b>Privacy India in partnership with the Centre for Internet & Society, International Development Research Centre, and Society in Action Group is organizing a discussion on E-Governance. It is based on the theme, ‘Security and Privacy Issues’, and will be held in Ahmedabad, Gujarat on June 16, 2012, from 9.30 a.m. to 5.00 p.m. Registration is free and open to the public.</b>
<p>India has witnessed a rapid proliferation of the use of information and communication technology in the delivery of government services. E-government is seen as an instrument to simultaneously increase the efficiency, transparency and accountability of public administration and improve public service delivery. Consequently, this has transformed the traditional delivery of public sector services, this is known as “e-governance”. These developments have implications and pose challenges for privacy and security. </p>
<p>The right to privacy in India has been a neglected area of study and engagement. Although sectoral legislation deals with privacy issues, India does not as yet have a horizontal legislation that deals comprehensively with privacy across all contexts. The absence of a minimum guarantee of privacy is felt most heavily by marginalized communities, including HIV patients, children, women, sexuality minorities, prisoners, etc. — people who most need to know that sensitive information is protected.</p>
<p>Since June 2010, Privacy India in collaboration with Privacy International, based in London, has been engaging in public awareness through workshops and consultations. These provide a platform for policy makers, sectoral experts, NGOs, and the public to discuss and deliberate different questions of privacy, its intersections and its implications with our everyday life. The discussions have ranged from topics of identity and privacy, to minority rights and privacy, and consumer privacy. The workshops have been organized in different cities — Bangalore, Guwahati, Mumbai, Delhi, Kolkata, Chennai, Goa, etc.</p>
<h2>Agenda</h2>
<table style="text-align: left;" class="plain">
<tbody>
<tr>
<td>9.00 - 9.30<br /></td>
<td><strong>Registration</strong></td>
</tr>
<tr>
<td>9.30 - 10.00<br /></td>
<td><strong>Welcome</strong><br />Prashant Iyengar is a practicing lawyer and lead researcher for Privacy India. He will present who Privacy India is, and the objectives of Privacy India's research. His presentation will focus on discussing privacy in India.<br /></td>
</tr>
<tr>
<td>10.00 - 10.15<br /></td>
<td>Tea Break<br /></td>
</tr>
<tr>
<td>10.15 - 10.45<br /></td>
<td>
<h3>Session I<br /></h3>
<strong>People as the Most Vulnerable Link in e-Governance</strong><br />Dr. Nityesh Bhatt, Sr. Associate Professor and Chairperson in the information Management Area at Institute of Management, Nirma University, Ahmedabad<br /></td>
</tr>
<tr>
<td>10.45 - 11.15<br /></td>
<td><strong>Ongoing e-Governance projects: Issue with security and privacy</strong><br />Professor Subhash Bhatnagar, Advisor - Center for Electronic Governance, Indian Institute of Management, Ahmedabad<br /></td>
</tr>
<tr>
<td>11.15 - 11.25<br /></td>
<td>Discussion</td>
</tr>
<tr>
<td>11.25 - 11.55<br /></td>
<td><strong>E-governance: What is it?</strong><br />Mr. Gopalkrishnan Devanathan (Kris Dev), Co-founder of the International Transparency and Accountability Network.<br /></td>
</tr>
<tr>
<td>11.55 - 12.25<br /></td>
<td><strong>Security and privacy in e-governance with reference to the Gujarat Government</strong><br />Dr. Neeta Shah, Director (eGovernance), Gujarat Informatics, Ltd.<br /></td>
</tr>
<tr>
<td>12.25 - 12.35<br /></td>
<td>Discussion</td>
</tr>
<tr>
<td>12.35 - 1.20<br /></td>
<td>Lunch Break<br /></td>
</tr>
<tr>
<td>1.20 - 1.50<br /></td>
<td>
<h3>Session II</h3>
<strong>Cyber Usages: Challenges and Dispute Resolution <br /></strong>Utkarsh Jani<strong>, </strong>Advocate, Jani Advocates<strong><br /></strong></td>
</tr>
<tr>
<td>1.50 - 2.20<br /></td>
<td><strong>Concern for privacy and security of the common man</strong><br />Dr. Mrinalini Shah, Professor of Operations Management at Institute of Management Technology, Ghaziabad<br /></td>
</tr>
<tr>
<td>2.20 - 2.50<br /></td>
<td><strong>Security issues in e-Governance: A hacker's perspective</strong><br />Mr. Sunny Vaghela, Founder & CTO, TechDefence Private Limited<br /></td>
</tr>
<tr>
<td>2.50 - 3.00<br /></td>
<td>Discussion<br /></td>
</tr>
<tr>
<td>3.00 - 3.30<br /></td>
<td>
<h3>Session III</h3>
<strong>Securing the desktop through Virtualisation </strong><br />Anindya Kumar Banerjee, Regional Manager East, CG & MP at NComputing Inc</td>
</tr>
<tr>
<td>3.30 - 4.00<br /></td>
<td>Opening up Data and privacy<br />Ms. Nisha Thompson, Data Project Manager at Arghyam/India Water Portal</td>
</tr>
<tr>
<td>4.00 - 4.10<br /></td>
<td>Discussion</td>
</tr>
<tr>
<td>4.10 - 4.25<br /></td>
<td>Tea Break<br /></td>
</tr>
<tr>
<td>4.25 - 5.00<br /></td>
<td>Discussion and Questions</td>
</tr>
</tbody>
</table>
<h2>Confirmed Speakers</h2>
<ul><li>Dr. Nityesh Bhatt, Sr. Associate Professor and Chairperson in the Information Management Area at Institute of Management, Nirma University, Ahmedabad</li><li>Utkarsh Jani, Advocate, Jani Advocates</li><li>Gopalakrishnan Devanathan (Kris Dev), Co-Founder of the International Transparency and Accountability Network</li><li>Prof. Subhash Bhatnagar, Advisor- CEG- IIMA</li><li>Anindya Kumar Banerjee, Regional Manager- East, CG & MP @ NComputing India</li><li>Nisha Thompson, Consultant, India Water Portal<br /></li><li>Dr. Mrinalini Shah, Professor, NMIMS University, Mumbai</li><li>Sunny Vaghela, Founder & CTO, TechDefence Private Limited</li><li>Prashant Iyengar, Assistant Professor, Jindal Global Law School & Assistant Director, Centre for Intellectual Property Rights Studies</li></ul>
<p>Please confirm your participation with Natasha Vaz at <a class="external-link" href="mailto:natasha@cis-india.org">natasha@cis-india.org</a>. We sincerely hope you will be able to attend and look forward to your participation.</p>
<h2>Download the following:</h2>
<ol><li><a href="https://cis-india.org/internet-governance/e-governance-identity-privacy.pdf" class="internal-link" title="E-Governance, Identity and Privacy">E-Governance, Identity and Privacy</a> [PDF, 253 Kb]</li><li><a href="https://cis-india.org/internet-governance/securing-e-governance-event.pdf" class="internal-link" title="Securing E-Governance, Ahmedabad">Event Poster</a> [PDF, 162 Kb] </li><li><a href="https://cis-india.org/internet-governance/securing-e-governance-programme.pdf" class="internal-link" title="Securing E-Governance in Ahmedabad">Event Brochure</a> [PDF, 1618 Kb]<br /></li></ol>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/securing-e-governance'>https://cis-india.org/internet-governance/securing-e-governance</a>
</p>
No publisherpraskrishnaEvent TypeInternet Governance2012-06-15T04:10:57ZEvent3rd IJLT-CIS Lecture Series at NLSIU, Bangalore
https://cis-india.org/telecom/ijlt-cis-lecture-series-nlsiu
<b>The Indian Journal of Law and Technology in association with the Centre for Internet and Society, Bangalore is organising the 3rd IJLT-CIS Lecture Series at the National Law School of India University, Bangalore. The lecture series will be spread out over the course of the year and will include eminent speakers who will talk with the students and other interested persons on their topics of expertise.</b>
<p><span class="Apple-style-span">
<div>
<p>To kick off the lecture series, Professor Rohan Samarajiva will deliver the inaugural lecture on <em>Tariff Regulation in South Asia</em>.</p>
<p>Tariff regulation has in the recent past attracted the attention of the Telecom Regulatory Authority of India and the Telecom Dispute Settlement Appellate Tribunal, as well as the Department of Telecom at the Union Ministry of Communications. India has a burgeoning and competitive cellular services provider market, and tariff regulation has far-reaching impact on the industry. Moreover, as aware consumers of mobile telephony and data services, this is an issue that is relevant for all of us. </p>
<p>Prof Samarajiva is a pre-eminent figure in policy-making and academia on the subject of information and communications technology, and this is an excellent opportunity to get his insights on the crucial topic, not just from an Indian perspective but from a pan-Asian viewpoint. He has taught at universities in USA, Netherlands and Sri Lanka and is currently Chairman & CEO, LIRNEasia, an ICT policy and regulation think tank active across 12 emerging Asian economies. He is also a Board member at Communication for Policy Research - South, which is a capacity building initiative to develop Asia-Pacific based policy initiatives on ICT policy regulation among junior to mid level scholars. His full profile can be accessed <a class="external-link" href="http://lirneasia.net/about/profiles/rohan-samarajiva/">here</a>.</p>
<p>The lecture will be organised at NLSIU, Bangalore on <em>Sunday, the 27th of May, 2012 from 5.30 pm to 6.30 pm</em>. You are requested to take your seats by 5.20 pm. The hour-long session will include both a lecture and an interactive session with the speaker. Interested persons are requested to register for the lecture series by sending in an email to <a class="external-link" href="mailto:editorialboard@ijlt.in">editorialboard@ijlt.in</a></p>
<p>The address of the venue is</p>
<p>National Law School of India University<br />Jnanabharati Road, Nagarbhavi<br />Bangalore - 560072 <br />Google maps location: <a class="external-link" href="http://g.co/maps/ppwcr">http://g.co/maps/ppwcr</a></p>
<p>Follow our event page ‘3rd IJLT-CIS Lecture Series’ on Facebook to remain updated!</p>
<p><a href="https://cis-india.org/internet-governance/ijlt-cis-lecture-series.pdf" class="internal-link" title="3rd IJLT-CIS Lecture Series in Bangalore">Download the event poster</a> [PDF, 57 kb]</p>
</div>
</span></p>
<p>
For more details visit <a href='https://cis-india.org/telecom/ijlt-cis-lecture-series-nlsiu'>https://cis-india.org/telecom/ijlt-cis-lecture-series-nlsiu</a>
</p>
No publisherpraskrishnaTelecomLectureEvent Type2012-05-25T15:33:16ZEventThe Awesome Contracts Project (Geekup @ CIS)
https://cis-india.org/internet-governance/awesom-contracts-project
<b>Vivek Durai, co-founder at Awesome Contracts, a Singapore-India startup will give a public lecture on May 18, 2012 at the Centre for Internet & Society in Bangalore. Lawyer, musician, legal recruiter and entrepreneur, Amith Narayan will also participate through Skype!</b>
<h2>The Awesome Contracts Project</h2>
<p>Contracts are ubiquitous in our everyday life. They are also a nuisance. And they typically come attached with a bigger nuisance - lawyers! Interestingly though, contracts are a lot like code. Geek-lawyers, a very small, minuscule tribe on this planet, tend to notice a lot of similarities between the two. If this is true, it opens up a lot of possibilities, including changing the way we do business and in particular generate contracts, negotiate and seal deals.</p>
<p> </p>
<p>We'll talk about some of the technology and some of the products we're working on that we think can provide power to a lot of folks.</p>
<p> </p>
<h2>Agenda</h2>
<table class="plain">
<tbody>
<tr>
<td>17:00 - 17:05</td>
<td>Welcome with Tea, Coffee, and Snacks</td>
</tr>
<tr>
<td>17:05 - 17:15<br /><br /></td>
<td>Lightning Talks<br /><br /></td>
</tr>
<tr>
<td>17:15 - 18:00<br /><br /></td>
<td>The Awesome Contracts Project</td>
</tr>
<tr>
<td>
<div class="time">18:00 - 18:30</div>
</td>
<td>Q & A</td>
</tr>
</tbody>
</table>
<h2>Vivek Durai</h2>
<p>Vivek Durai is a co-founder at Awesome Contracts, a Singapore-India startup that is working on interesting problems in the field of law and contracts. As with just about everyone else, he and co-founder Amith Narayan would like to change the world. Preferably, for the better. Vivek and Amith are both alumnus of the National Law School of India University.<br /><br />Vivek is a lawyer by training, a geek by nature, and generally human. Most of the time. As far as ideologies go, Vivek is a Pythonista currently flirting with Node and other things. He is also incidentally a Partner at Atman Law Partners, a young three office boutique law firm.</p>
<h2>Amith Narayan</h2>
<p>Amith Narayan loves hats. He likes them so much in fact, he's been wearing all kinds. He has been a corporate lawyer, a musician, a record producer, a legal recruiter, and now an entrepreneur running this crazy little startup. Amith grew up in Calicut (Kozhikode) Kerala, trained in law at NLSIU, worked in the grand dame of the Indian legal world - Crawford Bayley - before moving to Singapore where he's been living for the past 10 years. Amith will join us over Skype during the talk.<br /><br /></p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/awesom-contracts-project'>https://cis-india.org/internet-governance/awesom-contracts-project</a>
</p>
No publisherpraskrishnaLectureEvent TypeInternet Governance2012-05-11T12:17:09ZEvent