The Centre for Internet and Society
https://cis-india.org
These are the search results for the query, showing results 91 to 100.
CIS-A2K Narrative Report (September 2012 – June 2013)
https://cis-india.org/openness/blog-old/cis-access-to-knowledge-narrative-report-september-2012-june-2013
<b>This narrative report captures the work done by the Access to Knowledge (CIS-A2K) team in the first ten months of the grant. The report also throws some light on the CIS-A2K program strategy in the next one year.</b>
<hr />
<p>This narrative report was originally published on the Wikipedia page. <a class="external-link" href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Reports/CIS-A2K_Narrative_Report:_%28September_2012_%E2%80%93_June_2013%29">Access it here</a>.</p>
<hr />
<h2 style="text-align: left; ">Background to the Access to Knowledge Programme</h2>
<p style="text-align: justify; ">The <a href="https://meta.wikimedia.org/wiki/Wikimedia_Foundation">Wikimedia Foundation</a> approved a <a href="https://cis-india.org/about/news/wikimedia-foundation-awards-grant-to-cis">grant</a> to support the growth of Indian language Wikimedia communities to the <a href="https://cis-india.org/a2k">Centre for Internet & Society (CIS) </a>to expand their <a href="https://meta.wikimedia.org/wiki/India_Access_to_Knowledge">Access to Knowledge program (A2K)</a> in India. The grant enabled CIS to work with the Wikimedia community of volunteers in India to expand upon Wikimedia’s Indic language free knowledge projects, including Wikipedia in Indic languages. Further, the grant aims to generate improvements in India-relevant free knowledge in Wikimedia’s English projects and wider distribution of Wikimedia’s free knowledge within India.</p>
<h2 style="text-align: justify; ">Section A: Introduction</h2>
<h3 style="text-align: justify; ">Objective of the Narrative Report</h3>
<p style="text-align: justify; ">This narrative report captures the work done by the A2K program during the period of September 2012 to June 2013. It examines projects and activities and its impact and outcomes over a period of the initial Ten months of the Grant. This report will also inform CIS-A2K program’s strategy for the next one year to achieve the goals set out by its donor, Wikimedia Foundation, and <a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Programme_Plan">goals</a> listed in our <a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Work_plan_April_2013_-_June_2014">Work Plans</a> (which were developed in consultation with the Wikimedia community in India). Importantly, this Narrative Report is critical for the Wikimedia community in India, Global Wikimedia community and the Wikimedia Foundation to get a comprehensive overview of A2K’s work and to critically assess the A2K program’s eligibility for further support.</p>
<h3 style="text-align: justify; ">Context</h3>
<p style="text-align: justify; ">Though the mandate of the CIS-A2K program was clearly articulated before the commencement of the program, it should be noted, that the context in which the program had to undertake its work was very disturbed. Majority of the Wikimedia community in India saw CIS-A2K as an extension of the India Program as the entire team of the India Program moved into the CIS’s A2K program, except for the Director. Thus the CIS-A2K program inherited the not so conducive image of the India Program that was operational until August 2012. It should be noted that by August 2012, the Wikimedia community in India was extremely critical of the India Program’s work and achievement.<a href="#fn1" name="fr1">[1]</a></p>
<p style="text-align: justify; ">Further, the community explicitly expressed lack of faith and Trust in the India Program’s method of work.<a href="#fn2" name="fr2">[2]</a> Thus, it is important to note that the CIS-A2K program did not start with a clean slate but had to first address multiple challenges, before it could take on active implementation of various programmatic activities. These challenges include:</p>
<ul style="text-align: justify; ">
<li>building trust with the Wikimedia community in India;</li>
<li>building a collaborative relationship with Wikimedia India Chapter;</li>
<li>finding a new leadership to anchor the program that was left vacant in August 2012.</li>
</ul>
<h3 style="text-align: justify; ">A2K Program Achievements (September 2012 to June 2013)</h3>
<p style="text-align: justify; ">CIS Access to Knowledge (A2K) team started working on facilitating the improvement of Indian language Wikimedia projects with special focus on Indic Wikipedias in September 2012. Some key activities during the period of September 2012 to June 2013 are:</p>
<ul style="text-align: justify; ">
<li> Number of newsletters published: 10</li>
<li> Number of events conducted: 49</li>
<li> Number of Wikipedia Education Programs conducted: 5</li>
<li> Number of people reached: about 1314</li>
<li> Number of women participants: approximately 406 (30.9%)</li>
<li> Number of community meet-ups & IRCs: 13</li>
<li> Number of sites across India where Wikimedia events were conducted: 18</li>
<li> Number of valid usernames: 582</li>
<li> Number of blogs posted: 58</li>
<li> Number of Print and Electronic Media mentions: 28</li>
<li> Number of Hackathons supported: 2</li>
<li> Number of community celebration events: 7</li>
<li> Number of Institutional partnerships: 13</li>
</ul>
<p style="text-align: justify; ">CIS hired A2K Programme Director, <a href="https://meta.wikimedia.org/wiki/User:Visdaviva">T. Vishnu Vardhan</a>, through an open and multi-stakeholder process of selection.<a href="#fn3" name="fr3">[3] </a>Representatives from Wikimedia India Chapter, Wikimedia community in India and Wikimedia Foundation were actively part of the selection process. This process was extremely critical and ensured participation of the Wikimedia community in India and the WMIN Chapter in deciding the leadership of the program.</p>
<p style="text-align: justify; ">Noted academician Dr. Tejaswini Niranjana was hired as Adviser to A2K.<a href="#fn4" name="fr4">[4]</a> This was done upon the request of the selection committee that was constituted for the selection of the program Director and in consultation with the WMF.</p>
<ul>
<li style="text-align: justify; ">A2K proactively interacted with the WMIN Chapter Executive Committee and built collaborative working relationship.</li>
<li style="text-align: justify; ">Most of the A2K programs executed in collaboration with WMIN Chapter and community.</li>
<li style="text-align: justify; ">Began a new project on <a href="http://geohacker.github.io/indicwiki">visualisation of the growth of Indic Wikipedias </a><a href="#fn5" name="fr5">[5]</a> <a href="#fn6" name="fr6">[6]</a> Sajjad Anwar and Sumandro are working on this. Two blog posts have been published so far. This was appreciated by the Wikimedia community in India and the WMF. Further, the WMF has expressed interest in extending these visualizations at a global level.</li>
<li style="text-align: justify; ">A2K has successfully reached out to the Wikipedians across Indian Language communities through conducting outreach programs, resolving technical bugs, supporting with required logistics, merchandise and media publicity, building public relations and communications.</li>
<li style="text-align: justify; "><a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Work_plan_April_2013_-_June_2014" title="India Access To Knowledge/Work plan April 2013 - June 2014">Work-plans</a> for the growth of Indic Wikipedias<a href="#fn7" name="fr7">[7]</a> were developed in a participatory manner with active collaboration from Wikimedia community in India and Wikimedia India Chapter Executive Committee.</li>
<li style="text-align: justify; ">Proactive open disclosure of <a class="text external" href="http://commons.wikimedia.org/wiki/File:WMF-A2K_Grant_Budget_and_Utilization_Sept12_-Feb13.pdf">A2K budget</a>. and proposed revisions to the budget seeking feedback from the Wikimedia community in India towards building transparency.</li>
<li style="text-align: justify; ">CIS-A2K gave significant media visibility to Indian Language Wikipedias both in print and electronic media.</li>
</ul>
<h2>Section B: A2K Programme Impact</h2>
<p style="text-align: justify; ">In discussing the A2K program’s impact we have presented below both the tangible and intangible aspects of our work.</p>
<h3 style="text-align: justify; ">Intangible Impact</h3>
<p style="text-align: justify; ">The A2K team has left no stone unturned since the commencement of the program in September 2012 to work in a transparent manner. We have taken the following measures in being transparent:</p>
<ul>
<li> Periodic publication of A2K work and outcomes through monthly newsletters.</li>
<li> Circulation of A2K monthly newsletters and notifications on various India related Wikimedia mailing lists.</li>
<li> Real-time listing and communication of activities on A2K Meta page.</li>
<li> Active documentation of all events and activities, which were published as blogs on CIS.</li>
<li> Prior announcements of all the events organized or supported by A2K.</li>
<li> Open and collaborative process of hiring Program Director.</li>
<li> Keeping the Wikimedia India Chapter EC in the loop on all programmatic developments since March 2013.</li>
<li style="text-align: justify; "> Proactive disclosure of A2K program budget and proposed revised budget to the Indian Wikimedia community.</li>
</ul>
<p style="text-align: justify; ">In addition to this A2K has explored various possibilities of collaboration with the Indian Wikimedia community and Chapter alike. The biggest instance is the A2K Wok Planning exercise for 2013-14, where multiple stakeholders were consulted. These include</p>
<ul>
<li>Some English-language Wikimedia community members from India;</li>
<li>Wikimedia India chapter Executive Committee;</li>
<li>Indian language Wikimedians and</li>
<li>A few of the Wikimedia Foundation staff.</li>
</ul>
<p style="text-align: justify; ">Some of the collaborative and community building efforts of A2K were:</p>
<ul>
<li style="text-align: justify; ">Support to community-led activities and facilitating community participation and ownership (e.g. <a href="http://blog.wikimedia.org/2013/04/24/indian-wikiwomen-celebrate-womens-history-month/">Wiki Women’s Month</a>).</li>
<li style="text-align: justify; ">Mobilization of the Indian Wikimedia community in organizing mega community events like <a href="https://en.wikipedia.org/wiki/te:వికీపీడియా:సమావేశం/తెలుగు_వికీపీడియా_మహోత్సవం_2013">Telugu Wiki Mahotsavam</a>.</li>
<li style="text-align: justify; ">Engagement with WMI Chapter EC and built a collaborative relationship.</li>
<li style="text-align: justify; ">Wikipedia Education programs in 4 Indian languages done in collaboration with the local Wikimedia community.</li>
<li style="text-align: justify; ">Supporting Wikimedians in conducting outreach events.</li>
<li style="text-align: justify; ">Almost all the A2K events since February were done in collaboration with WMI Chapter and the Wikimedia community in India.</li>
<li style="text-align: justify; ">A2K team actively participated in various community meet-ups.</li>
<li style="text-align: justify; ">A2K has provided significant media visibility to Indian Language Wikipedias, especially in mainstream English press. </li>
</ul>
<p style="text-align: justify; ">These transparency and collaboration efforts resulted in building trust among the Wikimedia India communities, where in they have begun to constructively engage with the A2K program’s work. This is a significant achievement since the closure of India program in August 2012. However, there are still some Wikimedians who prefer to ignore the A2K program, which indicates that the A2K program still needs to prove its worth. Thus it could be said that the A2K program has been partly successful in winning the faith of the Indian Wikimedia communities and still needs to put in more effort in this direction. The A2K team is committed to achieve this by demonstrating success through its work during the next phase of this program.</p>
<h3 style="text-align: justify; ">Tangible Impact</h3>
<p style="text-align: justify; ">It is difficult for the CIS-A2K program to either take direct credit for the growth or direct blame for the lack of it in the Indian language Wikimedia projects. However, we believe that we have been one of the factors — and sometimes a key factor — in impacting the growth of the Wikimedia projects and communities in India since the commencement of the project.</p>
<p style="text-align: justify; ">Though the A2K program has done some amount of work with almost all Indian language Wikipedias, the A2K team has had relatively more involvement in 10 Indic languages - Assamese, Bengali, Gujarati, Hindi, Kannada, Malayalam, Marathi, Odia, Punjabi and Telugu - during September 2012 to June 2013.</p>
<p style="text-align: justify; ">In addition to this based on the various outreach work done by A2K we have attempted to present an analysis of direct new Wikipedia users that have emerged in languages impacted by the A2K program, keeping in mind that community mobilization will always be an autonomous activity to some extent.</p>
<table class="listing">
<tbody>
<tr>
<th><img src="https://cis-india.org/home-images/copy_of_Article1.png" alt="article 1" class="image-inline" title="article 1" /></th>
</tr>
<tr>
<td><b>Graph 1</b>: Growth of Articles in Indian Language Wikipedias from September 2012 to June 2013</td>
</tr>
</tbody>
</table>
<p style="text-align: justify; "> </p>
<ul style="text-align: justify; ">
<li>The growth momentum in Indian languages over the eight month period of September 2012 to June 2013 looks healthy.</li>
<li> Some language Wikipedias have been growing at a phenomenal rate than others in terms of percentage change since September 2012.</li>
<li> Punjabi, Assamese and Odia Wikipedias have a growth rate of 82%, 59%, and 37% respectively and are the top 3 Indian language Wikipedia projects during the ten month period.</li>
<li> In terms of absolute number of articles, Tamil, Malayalam, Punjabi and Hindi Wikipedias have grown by about 5,812; 5,008; 3050; and 2,734 articles respectively.</li>
<li> However, given the small size of the Wikipedia communities in Punjabi, Nepali, Kannada, Odia and Sanskrit the growth achieved by them is much commendable and all efforts have to be put to ensure that this momentum continues by strengthening these communities and also expanding them.</li>
</ul>
<table class="listing">
<tbody>
<tr>
<th><img src="https://cis-india.org/home-images/Article2.png" alt="article 2" class="image-inline" title="article 2" /></th>
</tr>
<tr>
<td><b>Graph 2</b>: Active Editors in Indian Language Wikipedias from September 2012 to June 2013</td>
</tr>
</tbody>
</table>
<ul>
<li style="text-align: justify; ">There is a fluctuation in the number of active editors in all Indian language Wikipedias.</li>
<li style="text-align: justify; ">The active editors on Assamese, Marathi and Gujarati Wikipedias have been consistently coming down, which is a cause of concern.</li>
<li style="text-align: justify; ">It is important to note that Tamil, Telugu, Kannada and Nepali Wikipedias where the number of Active Editors were declining earlier have shown a remarkable turnaround. The efforts of the A2K program, especially in Telugu and Kannada, over the last 4 months could have resulted in this positive change.</li>
<li style="text-align: justify; ">It seems the <a href="https://meta.wikimedia.org/wiki/Wikimedia_Nepal/Wiki_Wikipedia_Education_Program_Nepal">Wikipedia Education Program, Nepal</a> has been instrumental in bringing <a href="http://blog.wikimedia.org/2013/09/18/nepal-wikipedia-education-program-pilot/">significant number of new active editors</a> on Nepali Wikipedia.</li>
<li style="text-align: justify; ">Overall the active editors on Malayalam Wikipedia have crossed the 100 mark numerous times, making it the first Indian language Wikipedia to reach this benchmark. However, in month of May and June 2013 this dropped to a 2 digit figure again.</li>
<li style="text-align: justify; ">Looking at the trends Tamil Wikipedia may soon reach the 100 active editor mark.</li>
<li style="text-align: justify; ">Even Bengali community could cross 100 active editors if concerted efforts are put in.</li>
<li style="text-align: justify; ">The Assamese Wikipedia, which received support from A2K program until January 2013, had a consistent active editor population which was around 20 people. However, once the support from the A2K dwindled since February a declining trend can be noticed. One could deduce that the A2K program has had critical relevance in the growth of Assamese Wikipedia. The decline over the last 5 months also alerts us to the possibility of building dependencies on the A2K program, which is a concern that we need to address going forward. </li>
</ul>
<table class="listing">
<tbody>
<tr>
<th><img src="https://cis-india.org/home-images/Article3.png" alt="article 3" class="image-inline" title="article 3" /></th>
</tr>
<tr>
<td>Graph 3: Monthly growth of New Editors on Indian Language Wikipedias from September 2012 to June 2013</td>
</tr>
</tbody>
</table>
<ul style="text-align: justify; ">
<li>On an average 94 new editors have joined Indian language Wikipedias every month.</li>
<li> Bengali, Malayalam and Tamil Wikipedias have consistently seen more than 10 new editors joining almost every month since Jan 2013.</li>
<li> Hindi, Marathi and Telugu have many new editors joining per month.</li>
<li> Total of 849 new people have become editors for Indian language Wikipedia since Sep 2012.</li>
<li> However, the conversion rate of new editors into active editors is still a challenge across all Indian language Wikipedias.</li>
</ul>
<table class="listing">
<tbody>
<tr>
<th><img src="https://cis-india.org/home-images/Article4.png" alt="article 4" class="image-inline" title="article 4" /></th>
</tr>
<tr>
<td>Graph 4: Snapshot of “Page Views” of Indian Language Wikipedias in September 2012 & June 2013</td>
</tr>
</tbody>
</table>
<ul>
<li style="text-align: justify; ">Overall the “Page View” trends of Indian Language Wikipedias until April 2013 look positive. but since the last two months the trend is in the decline. However, it should be noted that the month on month “Page View” trends keep fluctuating.</li>
<li style="text-align: justify; "> Bengali, Tamil, Malayalam and Punjabi Wikipedias have shown highest percentage growth in page views since September 2012.</li>
<li style="text-align: justify; "> In absolute numbers Bengali Wikipedia has seen a spectacular growth of 3,000,000 page-views, Tamil and Malayalam Wikipedias witnessed a growth of about 927,150 and 365,913 a page-views respectively.</li>
<li style="text-align: justify; "> Based on the the absolute numbers of “Page Views” for Indian Wikipedias it could be speculated that there is a significant increase in demand for knowledge and information in Indian languages on the internet.</li>
</ul>
<p style="text-align: justify; ">In the below given Graph 5, we have also looked at the direct impact the A2K programme had in cultivating new editors on Indian language Wikipedias through various outreach programs that conducted during September 2012 to June 2013.</p>
<table class="listing">
<tbody>
<tr>
<th><img src="https://cis-india.org/home-images/Article5.png" alt="article 5" class="image-inline" title="article 5" /></th>
</tr>
<tr>
<td>Graph 5: New Editors from CIS-A2K Outreach September 2012-June 2013</td>
</tr>
</tbody>
</table>
<p style="text-align: justify; ">It should be noted that during the 10 month period CIS-A2K reached out to a total of 1,314 participants. This is approximate 130 people per month. However, the username data for more than 700 participants could not be ascertained, due to incorrect inefficient data collection and input. This includes participants giving wrong usernames, trouble with the handwriting of some of the participants, etc. We have already taken note of this issue and have put in measures to efficiently capture the new user data. Hence, we have only presented an analysis of 582 participants, whose usernames are valid.</p>
<p style="text-align: justify; ">The analysis of this data reveals that more than 120 users have done more than 5 edits, which is about 21 per cent of the participants with valid usernames. Further, 25 participants have done more than 100 edits on English and various Indian language Wikipedias, which constitutes 4 per cent of the total participants that the A2K programme has reached out to. Further 11 users have become very active editors on Indian language Wikipedias with more than 1000 edits to their credit.</p>
<h2 style="text-align: justify; ">Section C: Learning and Challenges</h2>
<h3>Outreach</h3>
<p style="text-align: justify; ">One of the biggest constraints with the existing outreach efforts across India including that of CIS-A2K's is that they are all based on light-touch model. We have learned that a light touch outreach with no follow up, no hand-holding, no support system will not be able to yield desired results. We need to have a thoroughly thought out well-designed outreach programs where there should be continuous interaction with the participants for a minimum of 2-3 months. CIS-A2K approach to outreach should be different from usual Wikipedia editing training. Further, any outreach with an educational institution on the lines of a "Wikipedia Education Program" requires at least 3-4 months commitment from everyone concerned (i.e. student, institution, community and CISA2K).</p>
<ol>
<li>
<p style="text-align: justify; ">This in no way means diminish the importance of the light-touch model of 1/2 or 1 day Wikipedia editing training workshops, as seldom you get institutions/groups who are willing to commit to a long-term engagement. Thus a mixed approach is more pragmatic, while more energies need to put in long-term engagements.</p>
</li>
<li>
<p style="text-align: justify; ">There is a strand of criticism about effectiveness of physical outreach in general. However physical outreach for Indian languages is extremely essential as this is the lead exercise by which language communities have strengthened themselves over the years, though this has been very slow. The need to involve human element, face-to-face interaction and two-way communication is an extremely important factor of for growth of Indian language communities.</p>
</li>
<li>
<p style="text-align: justify; ">The need for each language community is different with respect to outreach. There are some communities that are more comfortable with conducting physical outreach while other communities are more efficient with outreach on social networking sites. For instance the <a href="https://en.wikipedia.org/wiki/or:ପ୍ରଧାନ_ପୃଷ୍ଠା">Odia Wikipedia</a> community where the average age of the active members is less than 25 is more active on Social Media and extensively uses it to network among themselves and to also discuss about the Wikipedia, whereas the <a href="https://en.wikipedia.org/wiki/te:మొదటి_పేజీ">Telugu Wikipedia</a> is more comfortable with physical meetings and primarily uses Village Pump for all community discussions.</p>
</li>
<li>
<p style="text-align: justify; ">Based on the interaction with most of the Indian language Wikimedia communities, CIS-A2K noticed that except for some communities like Malayalam, an institutional partnership is something that might not be easily taken up by community members. This is so because it requires high level of effort, time and strong network, amongst several other things. CIS-A2K has been focusing to address this need in general and in the five focus language areas in particular.</p>
</li>
</ol>
<h3>Work Plan Development and Community Communications</h3>
<ol>
<li style="text-align: justify; ">Even after sending multiple invitations, it took a lot of effort by CIS-A2K to encourage the larger community to engage and participate actively in the development of language focused work plan. CIS-A2K put its best efforts in inviting the community members through meta pages, village pumps, language and city-wide mailing lists, Indian mailing list, India English mailing list, meet-ups, IRCs, social-media channels to give their valuable suggestions and feedback. However, very few community members showed interest and helped in refining the plans. Better feedback could be gathered during physical and informal meetings with the community members.</li>
<li style="text-align: justify; ">Less than 10% active volunteers across all Indian language communities are active on Meta and even less on Indian mailing lists. During some informal conversations some community members expressed that it is too much of an additional burden to also visit Meta and engage. Taking into consideration that most of the language communities have less than 20 active volunteers, pragmatically speaking it is a huge ask to expect them to actively participate on Meta or mailing lists. Thus one cannot have a uniform standard and uniform mode of communication with different language communities. Thus CIS-A2K needs to explore various means of engaging with the Wikimedia community in India and should adopt a mixed channel approach of gauging community feedback. Though this is requires additional efforts on the team.</li>
<li style="text-align: justify; ">The mediums listed show a significant effort was made to solicit feedback and participation. It's okay and understandable that strategic planning is not for everyone, that volunteers economize their time devoted to the movement. So CIS-A2K does not necessarily see it as a failure that participation was low. What CIS-A2K aimed to do was to make sure participation was solicited, encouraged, and made possible. Of course ideally we would want higher participation, but CIS-A2K is careful not to confuse and turn <b>higher participation in strategizing into a goal in itself</b>.</li>
<li style="text-align: justify; ">In spite of this CIS-A2K took the risk and went ahead with a <a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Work_plan_April_2013_-_June_2014/Learning_and_Evaluation">participatory and continuous mode of evaluation</a>. We foresee a challenge in actively involving the community in quarterly evaluation cycles as this would require them also to introspect. In the five focus language communities such an introspection exercise was not done systematically before and a mandatory imposition may not be productive either for the Community or for CIS-A2K. The challenge would be that in the first 2 quarterly cycles CIS-A2K could miss meeting its own evaluation criteria. However, the opportunity here is to train the community to systematically introspect, which will go a long way in strengthening the Indian language Wikipedias and the associated communities.</li>
<li style="text-align: justify; ">Some programs, especially institutional partnerships, have a higher risk of failure than others. Though CIS-A2K committed to a very granular break-down of outcomes, it may require significant revisions. Hence it is extremely important for CIS-A2K to review and revise the plans and goals every 3-4 months.</li>
</ol>
<h3>Community Engagement/Development</h3>
<ol>
<li style="text-align: justify; ">Indian language communities are able to grow and cultivate new editors who come from similar background as their’s. For example, we find that the Telugu community comprises primarily in the age group of 30-50 years, while on the other hand, the Odia community consists of relatively younger editors between the age group of 20-30 years. Hence, it is essential that the community building programs take this aspect into consideration and work to diversify the community mix by engaging with people belonging to varied backgrounds.</li>
<li style="text-align: justify; ">Transparency and accountability are essential to build community trust. CIS-A2K has already taken various measures in this direction. However, there are occasions when more demands are placed on CIS-A2K, which consumes a lot of CIS-A2K's time and effort. The challenge is to struck a balance between the demands of transparency and accountability and the actual work they describe.</li>
<li style="text-align: justify; ">Meetups, one-on-one meetings/talk with community members are an essential ingredient to build long-term relationship. This is especially very important for nascent language communities with few editors. These kind of personal interactions help community members to know and connect with other Wikipedians. It also helps build trust and working relationship between community members and the A2K team.</li>
<li style="text-align: justify; ">CIS-A2K recognizes the potential role of Wikimedia India Chapter in growing the Wikimedia movement in India. Though CIS-A2K's work doesn't depend on the India Chapter, there is a huge potential for collaboration between the <a href="https://meta.wikimedia.org/wiki/Wikimedia_India">Wikimedia India Chapter</a> and CIS-A2K. CIS-A2K has put in its best efforts to build a cordial working relationship with the India Chapter. However, the extent of the collaboration would depend on the India Chapter's capacity and interest.</li>
</ol>
<h2>Section D: Progress Report</h2>
<p style="text-align: justify; ">A detailed progress report of the A2K program activities has been presented on a monthly basis below. Most of the activities have been documented as blog posts or news-items on the CIS website. All of the A2K events, blog-posts and news-items can be seen <a href="https://cis-india.org/@@search?Subject%3Alist=Wikipedia">here.</a></p>
<h3 style="text-align: justify; ">Outreach Sessions in September 2012</h3>
<p style="text-align: justify; "><i>Note: Although most of these workshops were conducted prior to the grant period, the reports for all of these were written during September 2012</i>:</p>
<ol>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/first-punjabi-wikipedia-workshop">The First Punjabi Wikipedia Workshop</a> (by Shiju Alex and Subhashish Panigrahi, September 27, 2012). A total of 25 participants came for this workshop. There were 15 new editors (of which 13 were female).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/punjabi-wikipedia-workshop-at-punjabi-university-patiala">Punjabi Wikipedia Workshop at Punjabi University, Patiala</a> (by Shiju Alex and Subhashish Panigrahi, September 28, 2012). About 30 participants including students and teachers attended the workshop.</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/punjabi-wikipedia-workshop-at-amritsar">Punjabi Wikipedia Workshop at Amritsar</a> (by Shiju Alex and Subhashish Panigrahi, September 30, 2012). Nearly 50 participants including students and teachers from eight different schools apart from the students and teachers of Spring Dale School attended the workshop.</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/report-of-the-wikipedia-workshop-in-british-library">Wikipedia Workshop in British Library, Chandigarh</a> (by Subhashish Panigrahi, September 27, 2012). About 32 participants attended the session on Day 1 and 10 participants attended the session on Day 2.</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/kannada-wiki-workshop-tumkur-university">Kannada Wiki Workshop at Tumkur University</a> (Tumkur, Karnataka, September 15, 2012). About 30 participants including students and teachers participated in this workshop.</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/wikipedia-hyderabad-report">Wikipedia comes to Hyderabad!</a> (By Noopur Raval, September 30, 2012). There was coverage in the Hindu on September 28, 2012. About 60 students participated in the event.</li>
</ol>
<h3>Outreach Sessions in October 2012</h3>
<ol>
<li style="text-align: justify; "><span><a href="https://cis-india.org/openness/blog-old/bengaluru-a-hub-for-kannada-and-sanskrit-wikipedia">Bengaluru: A Hub for Kannada and Sanskrit Wikipedia and other Wikimedia projects!</a> (October 7, 2012, Bangalore). Nitika Tandon, Subhashish Panigrahi and Jessie Wild led the session. Seven Kannada wikipedians participated in the event. </span> </li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/wikipedia-workshop-ghaziabad">Wikipedia workshop @ Inmantec College, Ghaziabad</a> (by Nitika Tandon, October 19, 2012). The Access to Knowledge team was approached by Gaurav Prashar, Assistant Dean at Inmantec College, Ghaziabad to organize the workshop. Over 120 participants attended the workshop including MCA, BCA, BBA students and faculty members. </li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/wiki-women-day-2012-pune">Bridging Gender Gap in Pune: WikiWomenDay 2012 Celebrated with Success!</a> (organised by Wikipedia Club Pune at PAI International Learning Solutions, Azam Campus, Pune, October 28, 2012). Subhashish Panigrahi shares the experience in a blog post. </li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/first-pune-odia-wikipedia-organized">First Pune Odia Wikipedia Workshop Organized!</a> (Co-organised by CIS and Pune Odia Wikipedia community, Pune, October 27, 2012). The Access to Knowledge team showed the participants the <a href="https://en.wikipedia.org/wiki/or:ଉଇକିପିଡ଼ିଆ:ଚାଟସଭା/ପ୍ରଶ୍ନ">Chatasabha</a>, a friendly desk on Odia Wikipedia and demonstrated how they can ask questions and see the answered questions. New wikipedians were connected to <a href="http://facebook.com/groups/OdiaWiki">Facebook</a> </li>
</ol> <ol> </ol>
<h3>Outreach Sessions in November 2012</h3>
<p> </p>
<ol>
<li style="text-align: justify; "><span><a href="https://cis-india.org/openness/blog-old/odia-wiki-workshop-at-aml">Odia Wikipedia Workshop at AML</a> (Academy of Media Learning, Bhubaneswar, November 10, 2012). Odia Wikipedians like <a href="https://meta.wikimedia.org/wiki/User:Ansumang">Ansuman Giri</a>, <a href="https://en.wikipedia.org/wiki/or:User:ManXiii">Manoranjan Behera</a> and <a href="https://en.wikipedia.org/wiki/or:User:Guguly18">Diptiman Panigrahi</a> participated in this event. </span> </li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/follow-up-to-wikipedia-introductory-session-at-bharati%20vidyapeeth">Follow up to Wikipedia Introductory Session</a> (Bharati Vidyapeeth, Delhi, November 19, 2012). A Wikipedia introductory session was organised at Bharati Vidyapeeth Engineering College in Delhi early this year and a follow up session was organised by CIS on November 19, 2012. About 15 participants attended the follow up session. </li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/odia-wikipedia-workshop-organized-in-kmbb-college-bhubaneswar">An Odia Wikipedia Workshop at KMBB</a> (co-organized with CIS and with Odia Wikipedians, KMBB College, Bhubaneswar November 18, 2012). The agenda for the two-and-a-half hour session was to educate students about open source movement, journey of Wikipedia and how to contribute to Odia Wikipedia and how it would help them. Nine active Odia Wikipedians joined to support this event. </li>
</ol>
<h3 style="text-align: justify; ">Outreach Sessions in December 2012</h3>
<ol>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/marathi-wiki-workshop-at-tiss">Marathi Wiki Workshop at TISS</a> (co-organised with the Wikimedia India Chapter, Tata Institute of Social Science, Mumbai, December 8, 2012). There were about 25 participants (MA and PhD level) and 5 conductors - Yogesh, Nikita, Moksh, Kartik and Nitika.</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/wikipedia-workshop-at-nmait">Wikipedia Workshop at NMAIT</a> (NMAIT, Karkala Taluk, Karnataka December 21, 2012, co-organised in association with Metawings Institute). Subhashish Panigrahi led the session. About 170 engineering students took part in this event.</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/wikipedia-workshop-at-srm-chennai">Wikipedia Workshop at SRM</a> (SRM University, Chennai, Tamil Nadu, December 17, 2012, co-organised in association with Metawings Institute). Noopur Raval participated in the event. About 40 students from different engineering colleges in Chennai participated in the workshop. <br /><br />(<i>Note: The following events were also conducted in December 2012. However, reports for these events were published later in January.</i>)</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/two-day-wiki-workshop-in-goa-university">Two-day Wiki Workshop in Goa University: An Introduction</a> (by Nitika Tandon, January 15, 2013). The workshop was conducted on December 12 and 13, 2012 along with the Wikipedia community members for M.A. and Ph.D. students at the Goa University. Over 35 participants attended the two-day workshop.</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/wikipedia-in-st-xaviers-college-goa">Wikipedia in St. Xavier's College, Mapusa, Goa</a> (by Nitika Tandon, January 19, 2013). The workshop was conducted on December 14, 2012. Over 30 participants attended the session.</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/promoting-glam-in-goa">Promoting GLAM in Goa</a> (by Nitika Tandon, January 24, 2013). The Access to Knowledge team organised an introductory Galleries, Libraries, Archives, Museums (GLAM) session at Goa State Central Library on December 13, 2012. About 45 people from over 10 different GLAM institutes in Goa participated in the event.</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/konkani-in-wikipedia-incubator">Konkani in Wikipedia Incubator — Taking it to the Next Level</a> (by Nitika Tandon, January 25, 2013). An introductory session on Konkani in Wikipedia was conducted at the Konkani Department in Goa University on December 12, 2012. About 30 participants took part in the event.</li>
</ol>
<h3>Outreach Session in January 2013</h3>
<ol>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/wikipedia-workshop-at-rkgit-ghaziabad" class="external text" rel="nofollow">A Wiki Workshop at Raj Kumar Goel Institute of Technology, Ghaziabad</a> (RKGIT, Ghaziabad, January 17, 2013). Around 65 mechanical engineering students from second and third year participated in this workshop.</li>
</ol>
<h3>Outreach Session in February 2013</h3>
<ol>
<li><a href="https://cis-india.org/openness/blog-old/digital-literacy-workshop" class="external text" rel="nofollow">Digital Literacy Workshop at Department of Arts, Delhi University</a> (University of Delhi, February 5, 2013). A digital literacy workshop was organised at the Department of Arts, Delhi University for students pursuing their masters in Modern Indian Languages and Literary Studies on February 5, 2013. About 30 students and 4 faculty members attended the workshop.</li>
</ol>
<h3>Outreach Sessions in March 2013</h3>
<ol>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/wikipedia-session-at-bits-goa" class="external text" rel="nofollow">Introductory Wikipedia session at BITS Goa</a> (organised by CIS, Birla Institute of Technology & Science, Pilani, Goa, March 7, 2013). The Access to Knowledge team was invited by Nikhil Dixit, Public Relations Officer at the Birla Institute of Technology & Science, Pilani – Goa (BITS Goa) to organise Wikipedia session on March 7, 2013. About 30 people participated in the event.</li>
<li style="text-align: justify; "><a class="extiw" href="https://en.wikipedia.org/wiki/te:%E0%B0%B5%E0%B0%BF%E0%B0%95%E0%B1%80%E0%B0%AA%E0%B1%80%E0%B0%A1%E0%B0%BF%E0%B0%AF%E0%B0%BE:%E0%B0%B8%E0%B0%AE%E0%B0%BE%E0%B0%B5%E0%B1%87%E0%B0%B6%E0%B0%82/%E0%B0%AE%E0%B0%BE%E0%B0%B0%E0%B1%8D%E0%B0%9A%E0%B0%BF_8,_2013_%E0%B0%B8%E0%B0%AE%E0%B0%BE%E0%B0%B5%E0%B1%87%E0%B0%B6%E0%B0%82" title="w:te:వికీపీడియా:సమావేశం/మార్చి 8, 2013 సమావేశం">Telugu Wikipedia Training Workshop on Women's Day</a> (organised by CIS, Theatre Outreach Unit, University of Hyderabad, Hyderabad, March 8, 2013). Telugu Wikipedians Dr. Rajasekhar and Rahmanuddin alongwith T. Vishnu Vardhan led this event.</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/events/wikipedia-workshop-for-kannada-science-writers" class="external text" rel="nofollow">Wikipedia Workshop for Kannada Science Writers</a> (organised by Wikimedia India Chapter, Karnataka Rajya Vijnana Parishath and CIS, Karnataka Rajya Vijnana Parishath Conference Hall, Banashankari 2nd Stage, Bangalore, March 17, 2013). Dr. U.B. Pavanaja led the event.</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/events/kannada-wikipedia-workshop" class="external text" rel="nofollow">Kannada Wikipedia Workshop</a> (organised by CIS, Institution of Engineers, JLB Road, Mysore, March 24, 2013). Dr. U.B. Pavanaja led this workshop.</li>
<li style="text-align: justify; ">Wikipedia Indian Languages Workshop at IIT, Bombay (organised by CIS, IIT Mumbai, March 28, 2013). Noopur Raval led the event.</li>
</ol>
<h3>Outreach Sessions in April 2013</h3>
<p> </p>
<ol>
<li style="text-align: justify; "><span><a href="https://en.wikipedia.org/wiki/te:వికీపీడియా:సమావేశం/తెలుగు_వికీపీడియా_మహోత్సవం_2013#.E0.B0.B5.E0.B0.BF.E0.B0.95.E0.B1.80.E0.B0.AA.E0.B1.80.E0.B0.A1.E0.B0.BF.E0.B0.AF.E0.B0.BE_.E0.B0.A4.E0.B1.86.E0.B0.B2.E0.B1.81.E0.B0.97.E0.B1.81_.E0.B0.AE.E0.B0.B9.E0.B1.8B.E0.B0.A4.E0.B1.8D.E0.B0.B8.E0.B0.B5.E0.B0.82.2C_.E0.B0.AE.E0.B1.81.E0.B0.82.E0.B0.A6.E0.B0.B8.E0.B1.8D.E0.B0.A4.E0.B1.81_.E0.B0.B5.E0.B0.BF.E0.B0.95.E0.B1.80_.E0.B0.85.E0.B0.95.E0.B0.BE.E0.B0.A1.E0.B1.86.E0.B0.AE.E0.B1.80">Telugu Wikipedia Workshop</a> (April 9, 2013 at the Centre for Good Governance, Hyderabad). Telugu Wikipedians Arjunarao, Rahmanuddin and Pavithran along with T. Vishnu Vardhan led this half-day workshop. This was organized as a pre-event to <a href="https://en.wikipedia.org/wiki/te:వికీపీడియా:సమావేశం/తెలుగు_వికీపీడియా_మహోత్సవం_2013">Telugu Wiki-Mahotsavam</a>. </span> </li>
<li style="text-align: justify; "><a href="https://en.wikipedia.org/wiki/te:వికీపీడియా:సమావేశం/తెలుగు_వికీపీడియా_మహోత్సవం_2013#.E0.B0.AA.E0.B1.8D.E0.B0.B0.E0.B0.BE.E0.B0.A5.E0.B0.AE.E0.B0.BF.E0.B0.95_.E0.B0.B5.E0.B0.BF.E0.B0.95.E0.B1.80_.E0.B0.85.E0.B0.95.E0.B0.BE.E0.B0.A1.E0.B0.AE.E0.B1.80">Telugu Wikipedia Workshop</a> (April 11, 2013 at the Theatre Outreach Unit, University of Hyderabad, Hyderabad). Telugu Wikipedians Radhkrishna and Rajachandra led this half-day workshop. This was organized as part of the <a href="https://en.wikipedia.org/wiki/te:వికీపీడియా:సమావేశం/తెలుగు_వికీపీడియా_మహోత్సవం_2013">Telugu Wiki-Mahotsavam</a>. </li>
<li style="text-align: justify; "><a href="https://en.wikipedia.org/wiki/te:వికీపీడియా:సమావేశం/తెలుగు_వికీపీడియా_మహోత్సవం_2013#.E0.B0.AA.E0.B1.8D.E0.B0.B0.E0.B0.BE.E0.B0.A5.E0.B0.AE.E0.B0.BF.E0.B0.95_.E0.B0.B5.E0.B0.BF.E0.B0.95.E0.B1.80_.E0.B0.85.E0.B0.95.E0.B0.BE.E0.B0.A1.E0.B0.AE.E0.B1.80">Telugu Wikipedia Advance level Workshop</a> (April 11, 2013 at the Theatre Outreach Unit, University of Hyderabad, Hyderabad). Telugu Wikipedians Arjunarao and Rahmanuddin led this demonstration. This was organized as part of the <a href="https://en.wikipedia.org/wiki/te:వికీపీడియా:సమావేశం/తెలుగు_వికీపీడియా_మహోత్సవం_2013">Telugu Wiki-Mahotsavam</a>. </li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/events/kannada-wikipedia-workshop-udupi-april-29-2013">Kannada Wikipedia Workshop</a> (April 29, 2013, Govinda Pai Research Centre, MGM College Udupi). Dr. U.B. Pavanaja led the workshop and gave a talk on Kannada Wikipedia. </li>
</ol>
<h3 style="text-align: justify; ">Outreach Sessions in May 2013</h3>
<ol>
<li style="text-align: justify; ">Wikipedia workshop (May 8, 2013, TISS, Mumbai). T. Vishnu Vardhan conducted the workshop to the students of Post Graduate Diploma in Community Media. A total of 14 students and 1 teacher attended this multi-lingual Wikipedia training workshop.</li>
</ol>
<h3>Outreach Sessions in June 2013</h3>
<ol>
<li style="text-align: justify; ">Kannada Wikipedia Workshop (June 4, 2013, Ramakrishna Vidyalaya, Hassan). Dr. U.B. Pavanaja led the workshop and gave a talk on Kannada Wikipedia.</li>
<li style="text-align: justify; ">Wikipedia workshop (June 10, 2013, Internet Institute, Palm Grove, Bangalore). T. Vishnu Vardhan conducted the workshop. This orientation workshop on Wikipedia was attended by representatives from about 25 Civil Society organizations across India. This was followed up by a hands-on Wikipedia training workshop.</li>
<li style="text-align: justify; ">Kannada Wikipedia workshop for bloggers (June 24, 2013, Suchitra, Bangalore). Dr U.B. Pavanaja conducted the workshop and gave a presentation on Kannada Wikipedia.</li>
</ol>
<h3 style="text-align: justify; ">Education Programme Updates</h3>
<ol>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/launch-of-assamese-wikipedia-education-program">Launch of Assamese Wikipedia Education program</a> at Guwahati University (by Nitika Tandon, October 22, 2012). The program was launched on October 14, 2012 with 15 post-graduate students (90 per cent of these are women students) under the guidance of Prof. Dulumoni Goswami, Head of the Department of Education, Guwahati University.</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/malayalam-wikipedia-education-program-august-october-update">Malayalam Wikipedia Education Program: August to October Updates</a> (by Shiju Alex, October 29, 2012). This program is the first of its kind in an Indic language, and Malayalam community is doing the program in collaboration with the IT@School, a project of the Department of General Education, # <a href="https://cis-india.org/openness/blog-old/gujarati-wikipedia-article-competition">Government of Kerala, setup in 2001, to foster the IT education in schools. Gujarati Wikipedia Article Competition</a> – 10 schools, 200 students, 20 articles on Gujarati Wikipedia (by Noopur Raval, October 31, 2012). This was a competition to raise Wikipedia awareness and help students discover the joy of writing articles in their native language and an attempt to connect producers having knowledge in Gujarati to a wide audience of more than 4,00,000 readers.</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/gujarati-wikipedia-education-program-rajkot">Gujarat Wikipedia Education program:Rajkot</a> (by Noopur Raval, October 31, 2012). This report analyses a series of meetings and workshops held in Rajkot, a city in Gujarat, India during the month of October 2012 including students from the Galaxy Education System, Christ College students and members from the Wikipedia community.</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/first-odia-wikipedia-education-program-to-be-rolled-out-at-iimc-dhenkanal">First Odia Wikipedia Education Program to be Rolled Out</a> (by Subhashish Panigrahi, November 30, 2012). Odia wikipedians launched this program at the Indian Institute of Mass Communications, Dhenkanal on November 8, 2012 to bring students to edit articles on Odia wikipedia through a series of assessments by professors.</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/events/odia-education-program-at-iimc-dhenkanal">Odia Education Program</a> (Indian Institute of Mass Communication, Dhenkanal, Orissa, January 26, 2013). This is the first Odia Education Program which ran for three months and 16 students took active part in contributing on various articles on Odia Wikipedia.</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/odia-wikipedia-education-program-iimc-dhenkanal">Odia Wikipedia Community Brings Wikipedia Education Program to IIMC, Dhenkanal</a> (by Subhashish Panigrahi, February 28, 2013). Sixteen student wikipedians signed up and took part in editing more than a dozen articles on Odia Wikipedia.</li>
</ol>
<h3 style="text-align: justify; ">Hackathons</h3>
<ol>
<li><span><a href="https://cis-india.org/openness/events/wikipedia-hackathon-bits-hyderabad">Wikipedia Hackathon at BITS Hyderabad</a> (organized by CIS - A2K team and BITS-Pilani, Hyderabad, October 26 – 27, 2012). </span> </li>
<li><a href="https://cis-india.org/openness/blog-old/mini-hackathon-delhi">A Wikipedia Mini-hackathon in Delhi</a> (CIS, New Delhi, November 11, 2012) </li>
</ol>
<h3>Meetups</h3>
<ol>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/kolkata-tasting-the-sweetness-of-wikipedia">Kolkata: Tasting the Sweetness of Wikipedia!</a> (Kolkata, November 3, 2012). The journeys of three Wikipedians — Jayanta Nath, Deepon Saha and Ashwin Baindur are examined. Subhashish Panigrahi participated in the meeting.</li>
<li style="text-align: justify; "><a href="http://wiki.wikimedia.in/WikiMeetups/Bangalore/Bangalore51">Wikivoyage, November 18, 2012</a>: Ravikiran presented the Wikivoyage project and discussions on Wiki Project Karnataka. A total of 13 participants attended this meeting.</li>
<li style="text-align: justify; "><a href="http://wiki.wikimedia.in/WikiMeetups/Bangalore/Bangalore52">Wikidata, December 2, 2012</a>: <a href="https://en.wikipedia.org/wiki/User:LydiaPintscher">Lydia Pintscher</a> presented the Wikidata project. The talk covered history of Wikidata project, state of the project and Wikidata India opportunities. About 13 people attended this event.</li>
<li style="text-align: justify; "><a href="http://lists.wikimedia.org/pipermail/wikimediaindia-l/2013-February/009453.html">Wikimedia Meet-up, Hyderabad</a> (7 Hyderabad based Wikimedians attended this meet-up. Abhijith Jayanthi - SIG Hyderabad, Rahimanuddin Shaik - SIG Telugu, Dr. Rajasekhar; Veera Venkata Chowdary, Tausif, Sai Anudeep, and Akhila Thumma came together for a discussion meeting with the CIS-A2K Program Director T. Vishnu Vardhan.</li>
<li style="text-align: justify; "><a href="https://cis-india.org/news/wiki-meet-up-kolkata">Kolkata Wiki Community Meetup</a> (organised by CIS and Kolkata Wiki Community, March 14, 2013). Four Wikipedians from Kolkata, Wikimedia Foundation's mobile Developer Yuvaraj Pandian and OPW intern Sucheta Ghoshal joined T. Vishnu Vardhan and Subhashish Panigrahi for this event.</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/odia-wikipedia-cuttack-community-meetup-march-16-2013">Odia Wikipedia - Cuttack Community Meetup</a> (organised by CIS and Odia Wiki Community, Cuttack, March 16, 2013). T. Vishnu Vardhan and Subhashish Panigrahi met Odia Wikipedians in Cuttack to discuss about the current state of Odia Wikipedia and understand the community building strategies.</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/odia-wikipedia-meet-up-bhubaneswar-march-17-2013">Odia Wikipedia – Bhubaneswar Community Meetup</a> (organised by CIS and Odia Wiki Community, Bhubaneswar, March 17, 2013).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/telegu-wiki-meet-up-at-cis-june-2-2013">First Telugu Wiki Meetup @ CIS, Bangalore</a> (co-organised by Telugu Wikipedia community and CIS-A2K on June 2, 2013). <a href="https://en.wikipedia.org/wiki/te:వాడుకరి:Veera.sj">S.J. Veera</a> conducted the meet-up.</li>
</ol>
<h3>Celebration and Events</h3>
<ul>
<li style="text-align: justify; "><span><a href="https://cis-india.org/openness/blog-old/celebrating-odia-wikipedias-ninth-anniversary">Celebrating Odia Wikipedia's Ninth Anniversary</a> (organized by the Odia Wiki Community with support from CIS and Academy for Media Learning, January 29, 2013, Bhubaneswar). The event attracted good coverage in the local media:</span></li>
</ul>
<ol>
<li><span><span><span><a href="http://odishan.com/?p=2534">ଓଡ଼ିଶାନ୍</a></span></span></span><span><a href="http://odishan.com/?p=2534">: </a></span><span><span><span><a href="http://odishan.com/?p=2534">ଓଡ଼ିଆ ଉଇକିପିଡ଼ିଆର ନବମ ଜନ୍ମତିଥି ଅବସରରେ କର୍ମଶାଳା</a></span></span></span><span><a href="http://odishan.com/?p=2534">: </a></span><span><span><span><a href="http://odishan.com/?p=2534">ଇମିଡ଼ିଆରେ ଓଡ଼ିଆ ଭାଷାର ପ୍ରୟୋଗ</a></span></span></span><span><a href="http://odishan.com/?p=2534">, </a></span><span><span><span><a href="http://odishan.com/?p=2534">ସମ୍ବାଦ</a></span></span></span><span><a href="http://odishan.com/?p=2534">: </a></span><span><span><span><a href="http://odishan.com/?p=2534">ଲିପି ବ୍ୟାକରଣ ଓ ମାନକ ଭାଷାର ପ୍ରୟୋଗ ଜରୁରୀ</a></span></span></span><span>,</span></li>
<li><a href="http://www.eindiadiary.com/content/odisha-workshop-organized-9th-anniversary-odia-language-application-odia-language-e-media">eindiadiary.com</a>: Odisha: Workshop organized on 9th Anniversary of Odia language: Application of Odia language in e-media,</li>
<li style="text-align: justify; "><a href="http://news.fullorissa.com/odia-wikipedias-9th-anniversary">Fullorissa.com: Odia Wikipedia’s 9th anniversary</a></li>
<li style="text-align: justify; "><a href="http://indiaeducationdiary.in/Orissa/Shownews.asp?newsid=19485">Indiaeducationdiary.in: Odisha: Workshop organized on 9th Anniversary of Odia language: Application of Odia language in e-media</a></li>
<li style="text-align: justify; "><a href="http://www.odishaviews.com/odia-language-workshop-organized-on-9th-anniversary-of-odia-wikipedia-application-of-odia-language-in-e-media">Odishaviews.com:Odia language workshop organized on 9th Anniversary of Odia Wikipedia: Application of Odia language in e-media</a> </li>
</ol>
<ul>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/wikipedia-womens-workshop-in-mumbai" class="external text" rel="nofollow">Wikipedia Women's Workshop in Mumbai</a> (by Noopur Raval, Vidyalankar Institute of Technology, Wadala, Mumbai, November 4, 2012).</li>
<li style="text-align: justify; ">
<p><span><a href="https://cis-india.org/openness/blog-old/wiki-womens-day-in-goa">Wiki Women's Day in Goa</a> (organised by the Wikimedia India Chapter and CIS, Nirmala Institute of Education, Panaji, Goa, March 8, 2013). The workshop was organised on International Women's Day. Rohini Lakshane and Nitika Tandon led the workshop. </span></p>
</li>
<li style="text-align: justify; "><span><a href="https://cis-india.org/openness/events/telegu-wiki-mahotsavam-2013">Telugu Wiki Mahotsavam 2013</a> (organised by Telugu Wikipedia Community and CIS, Hyderabad, April 9 – 11, 2013). T. Vishnu Vardhan was one of the trainers at the Wikipedia Academy at Centre for Good Governance on April 9, 2013. Vishnu Vardhan spoke about the Access to Knowledge work in one of the sessions of Wikimedia. Meeting with Media Heads on April 10, 2013. Vishnu Vardhan gave a talk on A2K’s plans for the growth of Telegu Wikipedia in 2013-14 at the Telegu Wikipedia general meeting on April 11, 2013. Vishnu Vardhan also gave a talk about Access to Knowledge in the digital era at the Wiki Chaitanya Vedika on April 11, 2013. </span> </li>
</ul>
<h3><span>Events Participated In</span></h3>
<ol>
<li style="text-align: justify; "><span><a href="https://cis-india.org/openness/blog-old/celebrating-the-success-of-wikipedia-in-wikipedia-summit-pune-2013">Celebrating the success of Wikipedia in Wikipedia Summit Pune 2013</a> (organized by Wikipedia Club, Pune, January 12 – 13, 2013).</span></li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/foss-wikimedia-under-one-roof-gnunify">GNUnify 2013</a> (organized by Pune Linux/Unix User Group and Symbiosis Institute of Computer Studies & Research, Pune, February 15 – 17, 2013). Subhashish Panigrahi participated in the event.</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/creative-commons-comes-to-india">Creative Commons comes to India</a> (co-organized by Pune Linux/Unix User Group and Symbiosis Institute of Computer Studies & Research in Pune, February 15, 2013, and CIS the Wikimedia India Chapter, Chitrakala Parishad, Bangalore, February 25, 2013).The Access to Knowledge team participated in the CC meetings organized in Bangalore.</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/fifty-fourth-bangalore-wikimedia-meetup">Fifty-fourth Bangalore Wikimedia Meet-up at IIM, Bangalore</a> (organized by Radhakrishna Arvapally, SIG (Special Interest Group) Chair, Bangalore (a part of the Wikimedia India Chapter) with support from Solutions IQ, Wikimedia India Chapter and CIS, Indian Institute of Management, February 25, 2013). Sudhwana Jogalekar (President, Wikimedia India) spoke on Wikimedia Projects. T. Vishnu Vardhan (program Director, A2K, CIS) gave a talk on 'Accessibility to Knowledge'. Joe Justice (Founder WikiSpeed) and Vibhu Srinivasan gave a presentation of WikiSpeed Car project. Chief Guest K.S. Viswanath (Vice President, Industry Initiatives, NASSCOM) gave the welcome address. Noopur Raval participated in the event.</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/events/knowledge-sharing-through-glam">Knowledge Sharing through GLAM at Bangalore</a> (organized by Wikimedia India and Creative Commons, Karnataka Chitrakala Parishad, Kumara Krupa Road, Bangalore, February 25, 2013). Dr. U.B. Pavanaja, Nitika Tandon and Subhashish Panigrahi participated in the event. CIS supported the event.</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/events/wikipedia-workshop-for-kannada-science-writers">Wikipedia Workshop for Kannada Science Writers</a> (organised by Wikimedia Chapter India, Karnataka Rajya Vijnana Parishath and CIS, Karnataka Rajya Vijnana Parishath Conference Hall, Banashankari 2nd Stage, Bangalore, March 17, 2013). Dr. U.B. Pavanaja participated in the event.</li>
<li style="text-align: justify; "><a href="https://cis-india.org/news/wikipedia-womens-workshop-bangalore-2013">Wikipedia Women's Workshop Bangalore 2013</a> (organised by Wikimedia India, Servelots Infotech, Jayanagar, Bangalore, March 8, 2013). The event was covered by Kannada Prabha on March 9, 2013. Dr. U.B. Pavanaja participated in the event.</li>
<li style="text-align: justify; "><a href="https://cis-india.org/news/wikipedia-at-avenir">Wikipedia at Avenir</a> (organised by the Wikipedia community, Netaji Subhash Engineering College, Kolkata, West Bengal, March 11, 2013). CIS supported the event.</li>
<li style="text-align: justify; ">Wikipedia Community members helped the Higher Education Innovation and Research Applications program (HEIRA) of CSCS Bangalore organizes a day-long workshop on ‘Digital Literacy’ at Ahmednagar College, Ahmednagar, Maharasthra on January 17, 2013. Tanveer Hasan of HEIRA shares with us the developments in <a href="https://cis-india.org/openness/blog-old/ahmednagar-marathi-wikipedia-workshop-report">this report</a>. During this period, CIS established partnerships with the Goa University, Tata Institute of Social Science, Mumbai, Regional Research Centre, Udupi, etc. </li>
</ol>
<h3 style="text-align: justify; ">Section E: Indic Wikipedia Visualisation Project</h3>
<table class="listing">
<tbody>
<tr>
<th><img src="https://cis-india.org/openness/blog-old/IndicWikipedia.png" alt="Indic Wikipedia" class="image-inline" title="Indic Wikipedia" /></th>
</tr>
<tr>
<td>Given above is a chart depicting the visualization of Indic Wikipedia project</td>
</tr>
</tbody>
</table>
<p style="text-align: justify; "><span>CIS hired <a href="http://www.ajantriks.net/">Sumandro Chattapadhyay</a> and <a href="http://sajjad.in/">Sajjad Anwar</a> to work on visualisation of the growth of Indic Wikipedia. Their project takes basic parameters, like page views, total articles and total editors, and compares them over time and across projects: </span></p>
<ul>
<li>They have looked into the different aspects of the past and present activities of Indic Wikipedias, and divided the visualisation into three different focus areas: <br /> <ol>
<li><span>Basic parameters </span> </li>
<li>Geographic patterns of edits </li>
<li>Exploring topics that receive greatest number of edits. You can read more about <a href="https://cis-india.org/openness/blog-old/indic-wikipedia-visualisation-project-visualising-basic-parameters">Indic Wikipedia Visualisation Project #1: Visualising Basic Parameters</a></li>
</ol></li>
<li>
<p style="text-align: justify; "><span>They also worked on visualisation of the page views statistics and the project specific pages. The page views indicate the number of unique visits Wikipedia project concerned has received in one month. You can read more about <a href="https://cis-india.org/openness/blog-old/indic-wikipedia-visualisation-project-visualising-page-views-and-project-pages">Indic Wikipedia Visualisation Project #2: Visualising Page Views and Project Pages</a> </span></p>
</li>
<li>
<p><span><a href="http://geohacker.github.io/indicwiki/readership">Readership Dashboard</a>: The Readership Dashboard combines a line graph showing the movement of page view for a project across the years and bar graphs showing a separate variable for the same project.</span></p>
</li>
<li>
<p><a href="http://geohacker.github.io/indicwiki/motion_chart">Motion Charts</a>: The motion charts help compare Indic Wikipedia Projects across Languages on various parameters such as new editors, new articles, active editors, total editors etc.</p>
</li>
<li>
<p style="text-align: justify; "><a href="http://geohacker.github.io/indicwiki/page-views">Calendar Charts</a>: The calendar charts limits each chart section to 12 months allowing the user to focus on more granular movements of the variable concerned, say the number of new editors per month or page views per month, etc.</p>
</li>
</ul>
<h2>Section F: The Access to Knowledge Work Plan (2013 – 2014)</h2>
<p style="text-align: justify; ">The Access to Knowledge team assessed 12 of the active Indic-language communities based on the community dynamics, growth patterns in readership, and community and edit contribution for drafting this work plan. In putting together this work plan the Access to Knowledge team has extensively engaged with various stakeholders. These include: a) some Wikimedia community in India members across various Indian-language Wikimedia projects; b) some English-language Wikimedia community members from India; c) Wikimedia India chapter executive committee; d) some potential institutional partners; e) a few like-minded advocates of free knowledge; f) Access to Knowledge program Adviser Dr. Tejaswini Niranjana; and g) a few of the Wikimedia Foundation staff. Five languages were selected as core language areas. These include: Bengali, Kannada, Konkani, Odia and Telegu. Some key factors that determined the selection of languages areas included:</p>
<ul>
<li>The Access to Knowledge team's existing ties with knowledge institutions, groups and individuals.</li>
<li>Willingness of language community to interact and engage with the Access to Knowledge team.</li>
<li>Considering Wikimedia India Chapter EC's suggestion that Access to Knowledge team should work on at least one incubation project.</li>
<li>Access to Knowledge team's familiarity with the languages.</li>
</ul>
<p style="text-align: justify; ">However, choosing these five languages do not necessarily mean that the A2K program would not focus on the other languages rather there would be more programmatic support and organizational ties to be built.</p>
<h3 style="text-align: justify; ">Language Area Work Plans</h3>
<p>The language area work plans are linked to the individual meta-pages:</p>
<ul>
<li><span><a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Work_plan_April_2013_-_June_2014/Telugu">Telugu</a> </span> </li>
<li><a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Work_plan_April_2013_-_June_2014/Odia">Odia</a> </li>
<li><a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Work_plan_April_2013_-_June_2014/Kannada">Kannada</a> </li>
<li><a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Work_plan_April_2013_-_June_2014/Konkani">Konkani (GOM)</a> </li>
<li><a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Work_plan_April_2013_-_June_2014/Bengali">Bengali</a> </li>
<li><a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Work_plan_April_2013_-_June_2014/Overall_Support_Across_Indian_language_Communities">Overall Support Across Indian language Communities</a> </li>
<li><a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Work_plan_April_2013_-_June_2014/Pilot_Project_–_Performing_Arts_in_India">Pilot Project – Performing Arts in India</a> </li>
<li><a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Work_plan_April_2013_-_June_2014/Learning_and_Evaluation">Learning and Evaluation</a></li>
</ul>
<p>The expected and dream targets for the languages are shown below:</p>
<table class="listing">
<tbody>
<tr>
<th colspan="10">Expected and dream targets for languages</th>
</tr>
<tr>
<td>Parameters</td>
<td colspan="2">Telugu</td>
<td colspan="2">Odia</td>
<td colspan="2">Kannada</td>
<td colspan="2">Bengali</td>
<td>Konkani</td>
</tr>
<tr>
<td></td>
<td>Expected target</td>
<td>Dream target</td>
<td>Expected target</td>
<td>Dream target</td>
<td>Expected target</td>
<td>Dream target</td>
<td>Expected target</td>
<td>Dream target</td>
<td>Target</td>
</tr>
<tr style="text-align: right; ">
<td style="text-align: left; ">No. of Editors</td>
<td style="text-align: right; ">755</td>
<td style="text-align: right; ">905</td>
<td>120</td>
<td>350</td>
<td>600</td>
<td>1000</td>
<td>930</td>
<td>1200</td>
<td>NA</td>
</tr>
<tr style="text-align: right; ">
<td style="text-align: left; ">No. of New editors <br /></td>
<td>200</td>
<td>350</td>
<td>35</td>
<td>100</td>
<td>300</td>
<td>700</td>
<td>30</td>
<td>100</td>
<td>24</td>
</tr>
<tr style="text-align: right; ">
<td style="text-align: left; ">No. of Acitve editors</td>
<td>25</td>
<td>40</td>
<td>20</td>
<td>40</td>
<td>50</td>
<td>70</td>
<td>100</td>
<td>150</td>
<td>NA</td>
</tr>
<tr style="text-align: right; ">
<td style="text-align: left; ">No. of Aritcles</td>
<td>54000</td>
<td>55000</td>
<td>5000</td>
<td>6000</td>
<td>25000</td>
<td>30000</td>
<td>27000</td>
<td>28000</td>
<td>500</td>
</tr>
<tr style="text-align: right; ">
<td style="text-align: left; ">No. of Outreach Events <br /></td>
<td>29</td>
<td>34</td>
<td>12</td>
<td>15</td>
<td>12</td>
<td>20</td>
<td>5</td>
<td>15</td>
<td>12</td>
</tr>
</tbody>
</table>
<p style="text-align: justify; "><span>The detailed plan with projection of outcomes and expected impact of the A2K program activities could be accessed <a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Work_plan_April_2013_-_June_2014">here.</a></span></p>
<h3>Overall Community Support</h3>
<ul>
<li style="text-align: justify; "><span>Besides the specific programs mentioned under individual language area plans, A2K team will provide overall support to all Indian-language Wikipedia communities. This includes but is not limited to:</span></li>
<li style="text-align: justify; ">Creating awareness through online editing videos, editing guides and digital coverage all in local Indian languages.</li>
<li style="text-align: justify; ">Supporting outreach activities</li>
<li style="text-align: justify; ">Capacity building to multiply outreach efforts. This would include training sessions to improve presentation skills, audience engagement skills with mock presentations and video recording for feedback. The first Train-the-Trainer program is being planned in June.</li>
<li style="text-align: justify; ">Facilitate more qualitative interactions amongst community members with an aim to foster creation of new project ideas in the form of physical meet-ups, hangouts/Skype calls, and small/large scale conferences.</li>
<li style="text-align: justify; ">Organize language specific IRCs where community members from that specific language could discuss their plans, issues, concerns, and anything at all.</li>
<li style="text-align: justify; ">Encourage community members to share feedback, suggestions or details of any kind of support on A2K's <a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Requests">Meta help page</a>.</li>
<li style="text-align: justify; ">Supporting communities for bug reporting and following up for resolution. A detailed overall community support page can be found <a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Work_plan_April_2013_-_June_2014/Overall_Support_Across_Indian_language_Communities">here</a>. </li>
</ul>
<h2 style="text-align: justify; ">Section G: Team Orientation and Development</h2>
<h3>Team’s Professional Development</h3>
<ul>
<li style="text-align: justify; ">A one-day orientation was organized in CIS where Wikimedia board members Bishakha Datta and Achal Prabhala helped the Access to Knowledge team members to develop an agenda for a period of 6-7 months. They helped team members to find overlaps, prioritise and recognize possibilities to make best use of available resources. The board members also shared learnings, principles and concepts from other movements that could be applied to the Access to Knowledge program.</li>
<li style="text-align: justify; ">A one-day orientation program was organized with Wikimedia India Chapter Executive Committee Members to find common minimum program on which both the Chapter and the Access to Knowledge team could work together to achieve common objectives. The orientation also helped define overlapping areas and how the two oragnisations will handle them.</li>
<li style="text-align: justify; ">A one-day orientation program was organised with Wikimedia community in India Members such as Tinu Cherian who gave a talk on how to leverage mainstream and social media; Gautam John who organized a workshop on organisational procedures for greater transparency and accountability, and Arun Ramarathnam who spoke about best practices for working with Wikipedia community. This orientation was organized as a part of training and skill development for the Access to Knowledge team members.</li>
<li style="text-align: justify; ">Since March 2013 CIS-A2K started having weekly Team Learning Sessions on every Wednesday. However, given the hectic schedules of the Team these could not be organized in a regular manner.</li>
</ul>
<h3>Exits and New Hires</h3>
<p style="text-align: justify; ">CIS has an office in New Delhi with a five-member team for the Access to Knowledge program. The team is currently headed by <a href="https://meta.wikimedia.org/wiki/User:Visdaviva">T. Vishnu Vardhan</a>, Program Director (Access to Knowledge). Other team members include Tejaswini Niranjana (Distinguished Fellow), <a href="https://meta.wikimedia.org/wiki/User:Pavanaja">Dr. U.B. Pavanaja</a> (Program Officer, Indian Language Initiatives), <a href="https://meta.wikimedia.org/wiki/User:Nitika.t">Nitika Tandon</a> (Program Manager) and <a href="https://meta.wikimedia.org/wiki/User:Psubhashish">Subhashish Panigrahi</a> (Program Officer).</p>
<table class="plain">
<tbody>
<tr>
<th><img src="https://cis-india.org/home-images/vishnu.png" alt="Vishnu" class="image-inline" title="Vishnu" /></th>
<td>
<p style="text-align: justify; "><a href="https://cis-india.org/about/people/our-team">T. Vishnu Vardhan</a>: Vishnu Vardhan was hired as the new program Director-Access to Knowledge at CIS. Vishnu Vardhan has over the last 11 years worked in various capacities as researcher, grant manager, teacher, project consultant, information architect and translator. Vishnu Vardhan managed the Art, Crafts and Culture portfolio of Sir Ratan Tata Trust and also worked as Research Coordinator at the Centre for the Study of Culture and Society in Bangalore.</p>
</td>
</tr>
<tr>
<td><img src="https://cis-india.org/home-images/copy3_of_Pavanaja.png" alt="Pavanaja" class="image-inline" title="Pavanaja" /></td>
<td>
<p style="text-align: justify; "><a href="https://cis-india.org/about/people/our-team">Dr. U.B. Pavanaja</a> joined the team as program Officer, India Language Initiatives on March 4, 2013. Dr. Pavanaja holds a Master’s degree from Mysore University and Ph.D. from Mumbai University. He was a scientist at Bhabha Atomic Research Centre, Mumbai, for about 15 years. He is one of the earliest editors of Kannada Wikipedia. He has to his credit many firsts, viz., first Kannada website, first Kannada online magazine, first Indian language (Kannada) website to receive Golden Web Award, first Indian language (Kannada) editor for Palm OS, first Indian language (Kannada) editor for WinCE device (HP Jornado 720), first Indian language version (Kannada) of universally popular Logo (programming language for children) software, etc.</p>
</td>
</tr>
<tr>
<td><img src="https://cis-india.org/openness/blog-old/Tejaswini.png" alt="Tejaswini" class="image-inline" title="Tejaswini" /></td>
<td style="text-align: justify; ">
<p><a href="https://cis-india.org/about/people/distinguished-fellows">Tejaswini Niranjana</a> is a Senior Fellow at the Centre for the Study of Culture and Society (CSCS), Bangalore, and Visiting Professor at Tata Institute of Social Sciences (TISS), Mumbai joined A2K as an Adviser. She guides the Access to Knowledge team in expanding the Indian language Wikipedias and helps in increasing the number of active editors through strategic partnerships with Higher Education institutions across India.</p>
</td>
</tr>
</tbody>
</table>
<p style="text-align: justify; ">The following staff left the organisation:</p>
<ul>
<li style="text-align: justify; "><a href="https://meta.wikimedia.org/wiki/User:Shijualex">Shiju Alex</a>, Program Manager, Access to Knowledge left the organization on November 16, 2012.</li>
</ul>
<ul>
<li style="text-align: justify; "><a href="https://meta.wikimedia.org/wiki/User:Noopur28">Noopur Raval</a>, Program Officer, Access to Knowledge left the organization on April 24, 2013. </li>
</ul>
<h2>Section H: Additional Links and Data</h2>
<h3>Blog Entries</h3>
<ul>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/indic-language-wikipedias-statistical-report-jan-june-2012">Indic Language Wikipedias – Statistical Report: January – June 2012</a> (by Shiju Alex, September 25, 2012).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/kannada-wiki-workshop-tumkur-university">Kannada Wiki Workshop at Tumkur University</a> (by Shiju Alex, September 25, 2012).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/first-punjabi-wikipedia-workshop">The First Punjabi Wikipedia Workshop</a> (by Shiju Alex and Subhashish Panigrahi, September 27, 2012).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/report-of-the-wikipedia-workshop-in-british-library">Wikipedia Workshop in British Library, Chandigarh</a> (by Subhashish Panigrahi, September 27, 2012).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/punjabi-wikipedia-workshop-at-punjabi-university-patiala">Punjabi Wikipedia Workshop at Punjabi University, Patiala</a> (by Shiju Alex and Subhashish Panigrahi, September 28, 2012).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/editor-growth-and-contribution-on-telegu-wikipedia">Editor Growth & Contribution Program on Telugu Wikipedia</a> (by Nitika Tandon, September 29, 2012).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/punjabi-wikipedia-workshop-at-amritsar">Punjabi Wikipedia Workshop at Amritsar</a> (by Shiju Alex, September 30, 2012).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/wikipedia-hyderabad-report">Wikipedia comes to Hyderabad!</a> (by Noopur Raval, September 30, 2012).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/bengaluru-a-hub-for-kannada-and-sanskrit-wikipedia">Bengaluru: A Hub for Kannada and Sanskrit Wikipedia and other Wikimedia projects!</a> (by Subhashish Panigrahi, October 16, 2012).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/wikipedia-workshop-ghaziabad">Wikipedia workshop @ Inmantec College, Ghaziabad</a> (by Nitika Tandon, October 19, 2012).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/launch-of-assamese-wikipedia-education-program">Launch of Assamese Wikipedia Education Program at Guwahati University</a> (by Nitika Tandon, October 22, 2012).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/malayalam-wikipedia-education-program-august-october-update">Malayalam Wikipedia Education Program: August to October Updates</a> (by Shiju Alex, October 29, 2012).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/wiki-women-day-2012-pune">Bridging Gender Gap in Pune: WikiWomenDay 2012 Celebrated with Success!</a> (by Subhashish Panigrahi, October 29, 2012).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/gujarati-wikipedia-education-program-rajkot">Gujarat Wikipedia Education Program: Rajkot</a> (by Noopur Raval, October 31, 2012).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/gujarati-wikipedia-article-competition">Gujarati Wikipedia Article Competition – 10 schools, 200 students, 20 articles on Gujarati Wikipedia</a> (by Noopur Raval, October 31, 2012).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/first-pune-odia-wikipedia-organized">First Pune Odia Wikipedia Workshop Organized!</a> (by Subhashish Panigrahi, October 31, 2012).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/odia-wiki-workshop-at-aml">An Odia Wikipedia Workshop at Academy of Media Learning</a> (by Subhashish Panigrahi, November 10, 2012).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/mini-hackathon-delhi">A Wikipedia Mini-hackathon in Delhi</a> (a guest blog post by Yuvraj Pandian, November 11, 2012).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/wikipedia-hackathon-hyderabad">Report on Wikipedia Hackathon held in Hyderabad</a> (a guest blog post by Yuvi Panda, November 19, 2012).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/odia-wikipedia-workshop-organized-in-kmbb-college-bhubaneswar">An Odia Wikipedia Workshop at KMBB College, Bhubaneswar</a> (by Subhashish Panigrahi, November 19, 2012).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/follow-up-to-wikipedia-introductory-session-at-bharati-vidyapeeth">Follow up to Wikipedia Introductory Session at Bharati Vidyapeeth — More Interested and More Involved Participants</a> (by Nitika Tandon, November 19, 2012).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/typing-in-indic-languages-from-mobiles">Typing in Indic Languages from Mobiles made Easy!</a> (by Subhashish Panigrahi, November 19, 2012).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/wikipedia-womens-workshop-in-mumbai">Wikipedia Women's Workshop in Mumbai</a> (by Noopur Raval, November 21, 2012).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/first-odia-wikipedia-education-program-to-be-rolled-out-at-iimc-dhenkanal">First Odia Wikipedia Education Program to be Rolled Out</a> (by Subhashish Panigrahi, November 30, 2012).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/kolkata-tasting-the-sweetness-of-wikipedia">Kolkata: Tasting the Sweetness of Wikipedia!</a> (by Subhashish Panigrahi, November 30, 2012).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/marathi-wiki-workshop-at-tiss">Marathi Wiki Workshop at Tata Institute of Social Sciences</a> (by Subhashish Panigrahi, December 8, 2012).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/non-unicode-iscii-text-can-be-converted-to-unicode">Non Unicode ISCII Text Can be Converted to Unicode Now!</a> (by Subhashish Panigrahi, December 19, 2012).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/wikipedia-workshop-at-srm-chennai">A Wikipedia Workshop at SRM University, Chennai</a> (by Subhashish Panigrahi, December 27, 2012).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/new-avenues">New Avenues: Media Wiki Groups</a> (by Noopur Raval, December 27, 2012).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/wikipedia-workshop-at-nmait">A Wikipedia Workshop at NMAIT</a> (by Subhashish Panigrahi, December 30, 2012).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/two-day-wiki-workshop-in-goa-university">Two-day Wiki Workshop in Goa University: An Introduction</a> (by Subhashish Panigrahi, December 30, 2012).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/two-day-wiki-workshop-in-goa-university">Two-day Wiki Workshop in Goa University: An Introduction</a> (by Nitika Tandon, January 14, 2013).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/wikipedia-in-st-xaviers-college-goa">Wikipedia in St. Xavier's College, Mapusa, Goa</a> (by Nitika Tandon, January 19, 2013).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/celebrating-the-success-of-wikipedia-in-wikipedia-summit-pune-2013">Celebrating the success of Wikipedia in Wikipedia Summit Pune 2013</a> (by Subhashish Panigrahi, January 21, 2013).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/wikipedia-workshop-at-rkgit-ghaziabad">A Wiki Workshop at Raj Kumar Goel Institute of Technology, Ghaziabad</a> (by Subhashish Panigrahi, January 22, 2013).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/bringing-konkani-encyclopedia-in-public-domain">Bringing Konkani Encyclopedia in Public Domain</a> (by Nitika Tandon, January 22, 2013).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/promoting-glam-in-goa">Promoting GLAM in Goa</a> (by Nitika Tandon, January 24, 2013).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/konkani-in-wikipedia-incubator">Konkani in Wikipedia Incubator — Taking it to the Next Level</a> (by Nitika Tandon, January 25, 2013).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/digital-literacy-workshop">Digital Literacy Workshop at Department of Arts, Delhi University</a> (by Nitika Tandon, February 5, 2013).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/celebrating-odia-wikipedias-ninth-anniversary">Celebrating Odia Wikipedia's Ninth Anniversary</a> (by Subhashish Panigrahi, February 19, 2013).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/odia-wikipedia-education-program-iimc-dhenkanal">Odia Wikipedia Community Brings Wikipedia Education Program to IIMC, Dhenkanal</a> (by Subhashish Panigrahi, February 28, 2013).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/wikipedia-session-at-bits-goa">Introductory Wikipedia session at BITS Goa</a> (by Nitika Tandon, March 19, 2013).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/ahmednagar-marathi-wikipedia-workshop-report">Ahmednagar — Marathi Wikipedia Workshop</a> (by Tanveer Hasan, March 18, 2013). This is a report contributed by the Centre for Study of Culture and Society.</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/wiki-womens-day-in-goa">Wiki Women's Day in Goa</a> (by Nitika Tandon, March 19, 2013).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/indic-wikipedia-visualisation-project-visualising-basic-parameters">Indic Wikipedia Visualisation Project #1: Visualising Basic Parameters</a> (by Sajjad Anwar and Sumandro Chattapadhyay, March 26, 2013).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/odia-wikipedia-cuttack-community-meetup-march-16-2013">Odia Wikipedia - Cuttack Community Meetup</a> (by Subhashish Panigrahi, April 3, 2013).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/odia-wikipedia-meet-up-bhubaneswar-march-17-2013">Odia Wikipedia - Bhubaneswar Community Meetup</a> (by Subhashish Panigrahi, April 4, 2013).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/indic-wikipedia-visualisation-project-visualising-page-views-and-project-pages">Indic Wikipedia Visualisation Project #2: Visualising Page Views and Project Pages</a> (by Sajjad Anwar and Sumandro Chattapadhyay, April 22, 2013).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/indian-wiki-women-history-month">Indian WikiWomen celebrate Women’s History Month</a> (by Netha Hussain, April 29, 2013). This is a guest blog post by Netha Hussain.</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/odia-wikipedia-needs-assessment">Odia Wikipedia: Needs Assessment</a> (by Subhashish Panigrahi, May 11, 2013).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/access-to-knowledge-work-plan-synopsis-of-feedback-by-wikipedians">Access to Knowledge Work Plan: Synopsis of Feedback by Wikipedians</a> (by Nitika Tandon, May 20, 2013).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/wikipedia-introductory-session">Wikipedia Introductory Session organized for Data and India portal consultants</a> (by Subhashish Panigrahi, May 30, 2013).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/a2k/blog/cis-tiss-mou">CIS Signs MOU with TISS, Mumbai</a> (May 31, 2013).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/telugu-wiki-meet-up-at-cis-june-2-2013">A Telugu Wiki Meetup @ CIS, Bangalore (April 2013 - June 2014)</a> (a guest blog post by S J Veera, June 2, 2013).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/resources/access-to-knowledge-work-plan">Access To Knowledge Work Plan (April 2013 - June 2014)</a> (by T Vishnu Vardhan, June 10, 2013).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/my-first-wikipedia-training-workshop">My First Wikipedia Training Workshop – Theatre Outreach Unit, University of Hyderabad</a> (by T Vishnu Vardhan, June 19, 2013).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/visual-editor.pdf">Wikipedia Visual Editor</a> (by Nitika Tandon, June 27, 2013).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog-old/kannada-wikipedia-workshop-bloggers">A 'Kannada' Wikipedia Workshop for Bloggers</a> (by U B Pavanaja, June 28, 2013).</li>
</ul>
<h3 style="text-align: justify; ">Press Coverage</h3>
<ul>
<li style="text-align: justify; "><a href="http://www.orissadiary.com/ShowEvents.asp?id=37463">Odisha: Odia Wikipedia workshop organized in Pune to promote Odia language</a> (OdishaDiary.com, October 31, 2012).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/news/bangalore-mirror-article-kalyan-subramani-nov-15-2012-some-indian-laws-could-be-challenging">‘Some Indian laws could be challenging’</a> (by Kalyan Subramani, Bangalore Mirror, November 15, 2012).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/news/report-of-odia-wikipedia-workshop-in-sambad">A Report of the Odia Wikipedia Workshop held in KMBB College of Engineering, Bhubaneswar</a> (Sambad, November 19, 2012).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/news/orissa-diary-november-23-2012-pravuprasad-routray">OdishaDiary conferred prestigious Odisha Youth Inspiration Award 2012 to Odia Wikipedia team</a> (by Pravuprasad Routray, Orissa Diary, November 23, 2012).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/news/report-of-odia-wikipedia-workshop-in-iit-kharagpur">A Report of Odia Wikipedia Workshop at IIT, Kharagpur</a> (Samaja, Odia daily, Kolkata edition, December 3, 2012).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/news/article-in-cybersafar">વિકિપીડિયા ગુજરાતી માં પણ છે</a> (by Harsh Kothari, Cybersafar, November 28, 2012).A Report of Odia Wikipedia Workshop at IIT, Kharagpur (Samaja, Odia daily, Kolkata edition, December 3, 2012).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/news/orissa-diary-january-27-2013-first-odia-wikipedia-education-program-concludes-at-iimc">First Odia Wikipedia Education Program concludes at IIMC, Dhenkanal</a> (OdishaDiary Bureau, January 27, 2013).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/news/sambad-e-paper-january-30-2013-odia-wikipedia-workshop-coverage">Odia Wikipedia's 9th Anniversary and Workshop on Application of Odia in Media</a> (Sambad, January 30, 2013).</li>
<li style="text-align: justify; "><a href="http://odishan.com/?p=2534">ଓଡ଼ିଆ ଉଇକିପିଡ଼ିଆର ନବମ ଜନ୍ମତିଥି ଅବସରରେ କର୍ମଶାଳା</a><a href="http://odishan.com/?p=2534">: ଇମିଡ଼ିଆରେ ଓଡ଼ିଆ ଭାଷାର ପ୍ରୟୋଗ</a> (Odishan.com, February 4, 2013).</li>
<li style="text-align: justify; "><a href="http://sambadepaper.com/Details.aspx?id=36615&boxid=23625437">ଓଡ଼ିଆ ଉଇକିପିଡ଼ିଆର ନବମ ଜନ୍ମତିଥି ଅବସରରେ କର୍ମଶାଳା</a><a href="http://sambadepaper.com/Details.aspx?id=36615&boxid=23625437">: ଇମିଡ଼ିଆରେ ଓଡ଼ିଆ ଭାଷାର ପ୍ରୟୋଗ</a> (Sambad, February 4, 2013).</li>
<li style="text-align: justify; "><a href="http://www.odishaviews.com/odia-language-workshop-organized-on-9th-anniversary-of-odia-wikipedia-application-of-odia-language-in-e-media/">Odia language workshop organized on 9th Anniversary of Odia Wikipedia: Application of Odia language in e-media</a> (Odishaviews.com, February 5, 2013).</li>
<li style="text-align: justify; "><a href="http://www.eindiadiary.com/content/odisha-workshop-organized-9th-anniversary-odia-language-application-odia-language-e-media">Odisha: Workshop organized on 9th Anniversary of Odia language: Application of Odia language in e-media</a> (Odishaviews.com, March 2, 2013).</li>
<li style="text-align: justify; "><a href="http://indiaeducationdiary.in/Orissa/Shownews.asp?newsid=19485">Odisha: Workshop organized on 9th Anniversary of Odia language: Application of Odia language in e-media</a> (India Education Diary.com, March 2, 2013).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/news/kannada-wikipedia-workshop-report-in-prajavani">Kannada Wikipedia Workshop, Mysore — Coverage in Prajavani</a> (Prajavani, March 25, 2013).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/news/prajavani-may-24-2013-report-on-cis-celebrates-5-years">CIS Celebrates 5 Years: A Report in Prajavani</a> (Prajavani, May 24, 2013).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/news/udayavani-may-25-2013-cis-celebrates-5-years">CIS Celebrates 5 Years: A Report in Udayavani</a> (Prajavani, May 24, 2013).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/news/hmtv-may-30-2013-wikipedia-and-telugu-wikipedians">A Feature on Wikipedia and Telugu Wikipedians on HMTV</a> (Prajavani, May 30-31, 2013).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/news/wikipedia-live-phone-in-programme">Wikipedia Live Phone-in Programme on HMTV</a> (Prajavani, June 1, 2013).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/news/prajavani-june-5-2013-kannada-wikipedia-workshop-coverage">Kannada Wikipedia Workshop at Hasan</a> (Prajavani, June 5, 2013).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/news/samyukta-karnataka-june-5-2013-kannada-wikipedia-workshop-coverage">Kannada Wikipedia Workshop at Hasan</a> (Samyukta Karnataka, June 5, 2013).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/news/vijaya-karnataka-june-5-2013-report-of-kannada-wikipedia-workshop-in-hasan">Kannada Wikipedia Workshop at Hasan</a> (Vijaya Karnataka, June 5, 2013).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/news/suvarna-news-june-13-2013-wiki-rahasya-panel-discussion">Wiki Rahasya: Panel Discussion on Suvarna News</a> (Suvarna News 24x7, June 13, 2013).</li>
<li style="text-align: justify; "><a href="http://www.timeoutbengaluru.net/bangalore-beat/features/wiki-donors">Wiki donors</a> (TimeOut Bengaluru, June 21, 2013).</li>
</ul>
<h3>Newsletters</h3>
<p>The following newsletters have been published:</p>
<ul>
<li style="text-align: justify; "><a href="https://cis-india.org/about/newsletters/access-to-knowledge-september-2012-bulletin">September 2012 Bulletin</a></li>
<li style="text-align: justify; "><a href="https://cis-india.org/about/newsletters/access-to-knowledge-october-2012-bulletin">October 2012 Bulletin</a></li>
<li style="text-align: justify; "><a href="https://cis-india.org/about/newsletters/access-to-knowledge-bulletin-november-2012">November 2012 Bulletin</a></li>
<li style="text-align: justify; "><a href="https://cis-india.org/about/newsletters/access-to-knowledge-bulletin-december-2012">December 2012 Bulletin</a></li>
<li style="text-align: justify; "><a href="https://cis-india.org/about/newsletters/access-to-knowledge-bulletin-january-2013">January 2013 Bulletin</a></li>
<li style="text-align: justify; "><a href="https://cis-india.org/about/newsletters/access-to-knowledge-bulletin-february-2013">February 2013 Bulletin</a></li>
<li style="text-align: justify; "><a href="https://cis-india.org/about/newsletters/access-to-knowledge-bulletin-march-2013">March 2013 Bulletin</a></li>
<li style="text-align: justify; "><a href="https://cis-india.org/about/newsletters/access-to-knowledge-bulletin-april-2013">April 2013 Bulletin</a></li>
<li style="text-align: justify; "><a href="https://cis-india.org/about/newsletters/access-to-knowledge-bulletin-may-2013">May 2013 Bulletin</a></li>
<li style="text-align: justify; "><a href="https://cis-india.org/about/newsletters/access-to-knowledge-bulletin-june-july-2013">June and July 2013 Bulletin</a> (During this month the CIS-A2K Newsletter was redesigned based on feedback from the community and thus the June Newsletter was clubbed with July 2013).</li>
</ul>
<h3>Talk @ CIS</h3>
<ul>
<li style="text-align: justify; "><span><a href="https://cis-india.org/openness/events/wikipedia-state-of-tech-talk-by-erik-moeller">Wikipedia: State of Tech — A Talk by Erik Moeller</a> (CIS, Bangalore, November 12, 2012). Erik Moeller, Vice President of Engineering and Product Development at the Wikimedia Foundation gave a talk on Wikipedia. </span></li>
</ul>
<h2 style="text-align: justify; ">Section I: Budget Utilization</h2>
<table class="listing">
<tbody>
<tr>
<th> Currency in INR</th><th>2012-13<br />(Per month)</th><th>1st Year<br />(10 months)</th><th>Budget Utilization<br />(Sept. 2012 to June 2013)</th>
</tr>
<tr style="text-align: left; ">
<td><b>People</b></td>
<td></td>
<td></td>
<td></td>
</tr>
<tr>
<td>Prg. Manager</td>
<td style="text-align: right; ">1,17,000</td>
<td style="text-align: right; ">1,170,000</td>
<td style="text-align: right; ">1,170,000</td>
</tr>
<tr>
<td>Prg. Officer</td>
<td style="text-align: right; ">58,800</td>
<td style="text-align: right; ">5,88,000</td>
<td style="text-align: right; ">580,000</td>
</tr>
<tr>
<td>Prg. Officer</td>
<td style="text-align: right; ">1,44,000</td>
<td style="text-align: right; ">14,40,000</td>
<td style="text-align: right; ">1,008,000</td>
</tr>
<tr style="text-align: right; ">
<td style="text-align: left; ">Communications role</td>
<td>60,000</td>
<td>6,00,000</td>
<td>2,20,000</td>
</tr>
<tr style="text-align: right; ">
<td style="text-align: left; ">New Prg. Director</td>
<td>2,00,000</td>
<td>2,000,000</td>
<td>1,000,000</td>
</tr>
<tr style="text-align: right; ">
<td style="text-align: left; ">Consultant</td>
<td>34,500</td>
<td>3,45,000</td>
<td>2,76,000</td>
</tr>
<tr style="text-align: right; ">
<td style="text-align: left; ">Benefits – All</td>
<td>6,250</td>
<td>62,500</td>
<td>0</td>
</tr>
<tr style="text-align: right; ">
<td style="text-align: left; "><b>Staff costs</b></td>
<td><b>6,20,550</b></td>
<td><b>6,205,500</b></td>
<td><b>4,262,000</b></td>
</tr>
<tr style="text-align: right; ">
<td style="text-align: left; ">Rent</td>
<td>47,300</td>
<td>4,73,000</td>
<td>5,70,000</td>
</tr>
<tr style="text-align: right; ">
<td style="text-align: left; ">Janitorial</td>
<td>2,750</td>
<td>27,500</td>
<td>48,634</td>
</tr>
<tr style="text-align: right; ">
<td style="text-align: left; ">Utilities</td>
<td>7,500</td>
<td>75,000</td>
<td>61,836</td>
</tr>
<tr style="text-align: right; ">
<td style="text-align: left; ">Telephone</td>
<td>4,000</td>
<td>40,000</td>
<td>47,819</td>
</tr>
<tr style="text-align: right; ">
<td style="text-align: left; ">Office pantry</td>
<td>5,000</td>
<td>50,000</td>
<td>38,765</td>
</tr>
<tr style="text-align: right; ">
<td style="text-align: left; "><b>Office space</b></td>
<td><b>66,550</b></td>
<td><b>6,65,500</b></td>
<td><b>7,67,054</b></td>
</tr>
<tr>
<td><b>Travel</b></td>
<td></td>
<td></td>
<td></td>
</tr>
<tr style="text-align: right; ">
<td style="text-align: left; ">SF travel</td>
<td>77,726</td>
<td>7,77,257</td>
<td>1,81,887</td>
</tr>
<tr style="text-align: right; ">
<td style="text-align: left; ">Wikimania travel</td>
<td>0</td>
<td>0</td>
<td>0</td>
</tr>
<tr style="text-align: right; ">
<td style="text-align: left; ">Domestic travel</td>
<td>1,10,000</td>
<td>1,100,000</td>
<td>1,373,469</td>
</tr>
<tr style="text-align: right; ">
<td style="text-align: left; "><b>Travel</b></td>
<td><b>1,87,726</b></td>
<td><b>1,877,257</b></td>
<td><b>1,555,356</b></td>
</tr>
<tr style="text-align: right; ">
<td style="text-align: left; ">Printed materials</td>
<td>50,000</td>
<td>5,00,000</td>
<td>38,800</td>
</tr>
<tr style="text-align: right; ">
<td style="text-align: left; ">Design, Creative</td>
<td>55,000</td>
<td>5,50,000</td>
<td>1,25,400</td>
</tr>
<tr style="text-align: right; ">
<td>Volunteer development</td>
<td>50,000</td>
<td>500,000</td>
<td>0</td>
</tr>
<tr style="text-align: right; ">
<td style="text-align: left; ">Postage & Mailing</td>
<td>2,500</td>
<td>25,000</td>
<td>5,800</td>
</tr>
<tr style="text-align: right; ">
<td style="text-align: left; ">Office supplies</td>
<td>7,500</td>
<td>75,000</td>
<td>50,192</td>
</tr>
<tr style="text-align: right; ">
<td style="text-align: left; "><b>General expenses</b></td>
<td>1,65,000</td>
<td>1,650,000</td>
<td><b>2,20,192</b></td>
</tr>
<tr style="text-align: right; ">
<td style="text-align: left; "><b>Total before fees</b></td>
<td><b>1,039,826</b></td>
<td><b>10,398,257</b></td>
<td><b>6,804,602</b></td>
</tr>
<tr>
<td>Admin fee</td>
<td style="text-align: right; ">51,991</td>
<td style="text-align: right; ">5,19,913</td>
<td style="text-align: right; ">5,19,913</td>
</tr>
<tr>
<td>Program fee</td>
<td style="text-align: right; ">51,991</td>
<td style="text-align: right; ">5,19,913</td>
<td style="text-align: right; ">5,19,913</td>
</tr>
<tr style="text-align: right; ">
<td style="text-align: left; "><b>Total</b></td>
<td><b>1,143,808</b></td>
<td><b>11,438,082</b></td>
<td><b>7,844,428</b></td>
</tr>
</tbody>
</table>
<ol> </ol>
<div id="_mcePaste"></div>
<p>Notes:</p>
<ul>
<li style="text-align: justify; ">The above table gives a picture of the A2K program budget utilization (un-audited) for the period Sept. 2012 to June 2013. Thus it is important that these figures be read as provisional figures, which could change post the statutory audit as per the Indian laws binding a Registered Society.</li>
<li style="text-align: justify; ">Approximately there is a 31% underspending of the Budget during the ten month period. This is mainly because of the transition of the program to CIS took sometime along with delays in the recruitment of the New Program Director. CIS-A2K has requested the WMF for a reallocation of the Budget since then.</li>
</ul>
<h3>Footnotes</h3>
<p style="text-align: justify; ">[<a href="#fr1" name="fn1">1</a>]. <a href="https://en.wikipedia.org/wiki/Wikipedia:India_Education_Program/Analysis/Independent_Report_from_Tory_Read">Independent Report from Tory Read</a> on <a href="https://en.wikipedia.org/wiki/India_Education_Program">India Education Program</a></p>
<p style="text-align: justify; ">[<a href="#fr2" name="fn2">2</a>]. <a href="http://lists.wikimedia.org/pipermail/wikimediaindia-l/2011-November/004958.html">Death and Post-mortem of Indian Education Program pilot</a>. Wikimedia-India Mail archive</p>
<p style="text-align: justify; ">[<a href="#fr3" name="fn3">3</a>]. <a href="http://lists.wikimedia.org/pipermail/wikimediaindia-l/2012-December/008929.html">Most recent updates on the hiring of the Programme Director for the A2K programme</a>. Wikimedia-India mail archive</p>
<p style="text-align: justify; ">[<a href="#fr4" name="fn4">4</a>]. <a href="http://lists.wikimedia.org/pipermail/wikimediaindia-l/2013-February/009418.html">The Access to Knowledge - Bulletin - January '13</a></p>
<p style="text-align: justify; ">[<a href="#fr5" name="fn5">5</a>]. <a href="https://cis-india.org/openness/blog-old/indic-wikipedia-visualisation-project-visualising-basic-parameters">Indic Wikipedia Visualisation Project #1: Visualising Basic Parameters</a></p>
<p style="text-align: justify; ">[<a href="#fr6" name="fn6">6</a>]. <a href="https://cis-india.org/openness/blog-old/indic-wikipedia-visualisation-project-visualising-page-views-and-project-pages">Indic Wikipedia Visualisation Project #2: Visualising Page Views and Project Pages</a></p>
<p style="text-align: justify; ">[<a href="#fr7" name="fn7">7</a>]. <a href="http://lists.wikimedia.org/pipermail/wikimediaindia-l/2013-April/009867.html">CIS-A2K Work Plan (Draft)</a>. Wikimedia-India mail archive</p>
<p style="text-align: justify; ">[<a href="#fr8" name="fn8">8</a>]. <a href="http://lists.wikimedia.org/pipermail/wikimediaindia-l/2013-May/009900.html">CIS-A2K Budget, Utilization Report and proposed revision</a>. Wikimedia-India mail archive</p>
<p>
For more details visit <a href='https://cis-india.org/openness/blog-old/cis-access-to-knowledge-narrative-report-september-2012-june-2013'>https://cis-india.org/openness/blog-old/cis-access-to-knowledge-narrative-report-september-2012-june-2013</a>
</p>
No publisherVishnu Vardhan, Nitika Tandon and Subhashish PanigrahiAccess to KnowledgeWikimediaWikipediaFeaturedOpennessHomepage2013-11-30T11:18:56ZBlog EntryTrain the Trainer Program
https://cis-india.org/openness/blog-old/train-the-trainer-program
<b>Wikipedians, about 20 of them, from 10 different cities, speaking 8 different languages, joined together for the first ever four days "Train the Trainer Program" organised by the Centre for Internet and Society's Access to Knowledge (CIS-A2K) team in Bangalore from October 3 to 6, 2013. </b>
<p style="text-align: justify; "><a class="external-link" href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Events/TTT">Read the original published on the Wikipedia meta page</a></p>
<hr />
<p style="text-align: justify; "><a class="external-link" href="http://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Programme_Plan">CIS-A2K</a> organised the residency training program to build capacities amongst different language Wikimedia communities. A good diversity of Wikipedians from various language communities such as Bengali, Gujarati, Sanskrit, Malayalam, Hindi, Marathi, Telugu, Odia, came over for the event.</p>
<p style="text-align: justify; ">CIS-A2K identified two prominent reasons for organizing the event: (1) Limitations of a virtual sphere, and (2) Limited number of Wikipedians leading outreach activities.</p>
<p style="text-align: justify; "><span><b>Limitations of a virtual sphere</b></span><br />Most open source communities face problem of a lack of time and space for sharing ideas in a non-virtual sphere. Similary Wikipedians, who are voluntary contributors and authors of the articles posted on Wikipedia merely get time and opportunity to meet fellow editors because of the limitations of a virtual platform on which Wikipedia is built. There are twelve active Indian language Wikimedia communities that are spread across the world and moving the bandwagon of collaborating with each other and carving their historic mark of compiling the world's largest encyclopaedia and its other sister projects. To keep this movement alive there is a need of cross-sharing ideas of working together for a common goal and strengthening the leaders of these communities.</p>
<p style="text-align: justify; "><span><b>Limited number of Wikipedians leading outreach activities<br /> </b></span>Only a handful of Wikipedians devote their time in leading outreach activities and bringing new blood to the community. Indian language Wikimedia communities are in need of empowering Wikipedians who would lead outreach sessions in order to expand their editor community and strengthen their language projects.</p>
<p style="text-align: justify; ">The inception of this program began with the discussion of organizing a training program for the Wikipedians who are willing to conduct more activities in their home cities. Finally on October 3, 2013, Bangalore heard the voices of prominent Wikipedians from Punjab, West Bengal, Odisha, Andhra Pradesh, Gujarat, Maharashtra, Karnataka and Kerala. The Wikipedians delivered presentations on various topics such as — why Wikipedia is needed for the society, why Wikipedia in Indian languages, importance of starting new Wiki projects and so on.</p>
<p style="text-align: justify; ">Their presentation delivery skills were judged by <a href="https://meta.wikimedia.org/wiki/User:Visdaviva">Vishnu Vardhan</a> and <a href="https://meta.wikimedia.org/wiki/User:Nitika.t">Nitika Tandon</a> and all other community members present. They gave individual assessments and feedback for improvement towards the end of the day. Personal trainer Sachin Nagarajappa spent time with Wikipedians discussing mistakes that trainers do while conducting workshops and gradual improvement techniques for impactful outreach. Wikipedia is built on the concept of crowdsourcing and Malayalam Wikimedian <a href="https://ml.wikipedia.org/wiki/User:Viswaprabha">Viswanathan Prabhakaran</a> carried out a session about “Crowd Sourcing from the Future” explaining the various layers of crowdsourced projects.</p>
<p style="text-align: justify; ">The first day ended with a task where different language Wikipedians formed groups to prepare presentations for the following day.</p>
<hr />
<table class="invisible">
<tbody>
<tr>
<th><img src="https://cis-india.org/home-images/copy_of_TraintheTrainer.png" alt="Train the Trainer 1" class="image-inline" title="Train the Trainer 1" /></th>
</tr>
<tr>
<td>Above: Wikipedians Satdeep Gill, Shyamal Lakshminarayan and Shubha during at the CIS-A2K Train-the-Trainer Program (by Subhashish Panigrahi, CC-BY-SA 3.0)</td>
</tr>
</tbody>
</table>
<hr />
<p style="text-align: justify; ">Groups were given a challenge of imagining the audience as new wikipedians. Five groups presented on the second day. Sachin conducted an advanced presentation skill improvement workshop based on the inputs from the participants and the assessment of the group presentations. Veteran Wikipedian <a href="https://kn.wikipedia.org/wiki/ಸದಸ್ಯ:HPNadig">Hari Prasad Nadig</a> shared learnings from Challenges & Opportunities in building an Indian Language Community online. Open source activist and CIS's Executive Director <a href="https://cis-india.org/about/people/our-team">Sunil Abraham</a> conducted two sessions — a spectrogram based activity to simplify the "Criticality of Neutral Point of View" and an interactive session called “Speed Geeking” on offline and online outreach followed by a one-on-one discussion on the presentation skill improvement.</p>
<p style="text-align: justify; ">Typing in Indian languages is not easy especially when it comes to multiple typing layout standards followed in the public and private sectors in India. <a href="https://meta.wikimedia.org/wiki/User:Pavanaja">Dr. U.B.Pavanaja</a> conducted a session on Unicode standard for Indian languages and its usefulness with a brief context on the fonts and their different operating systems. Social media expert and Wikimedian <a href="https://en.wikipedia.org/wiki/User:Tinucherian">Tinu Cherian</a> shared the secrets of popularizing Indian language Wikipedias and bringing outstanding contributors to the limelight, how media played an important role in showcasing initiatives for free encyclopaedic content contribution in India and tips of social media. With fun activities <a href="https://meta.wikimedia.org/wiki/User:Visdaviva">Vishnu Vardhan</a> shared case studies of making Wikipedia workshops interesting. Wikimedia Foundation board member and writer <a href="https://meta.wikimedia.org/wiki/User:Aprabhala">Achal Prabhala</a> shared stories of documenting Oral traditions in Kerala and South Africa for Wikipedia referencing and how copyright laws evolved in the context of copyright issues that Wikipedia contributors face. Achal also threw light on content donation on WikiSource and other platforms that would be useful for people to consume for knowledge production on diverse platforms where Wikipedia could play a central role. Viswanathan and <a href="https://meta.wikimedia.org/wiki/User:Psubhashish">Subhashish Panigrahi</a> demonstrated how to set up a handheld digital camera based prop to easily digitize books without using any scanner and then create electronic books.</p>
<p style="text-align: justify; ">The most vital part of Wikipedia articles is referencing. Wikimedian <a href="https://en.wikipedia.org/wiki/User:Shyamal">Shyamal Lakshminarayan</a> demonstrated how finding sources of references and citing them for the facts on Wikipedia could be made easier through detailed research and by using several tools available. <a href="https://wiki.wikimedia.in/">Wikimedia India</a>'s founding member and veteran Telugu Wikipedian <a href="https://te.wikipedia.org/wiki/వాడుకరి:Arjunaraoc">Arjuna Rao Chavala</a> gave a talk about the history and future plans of Wikimedia India. Wikipedians then went to M.G. Road boulevard to see the weaving work by Gandhians, Philately exhibition on Gandhi and spent some time with Namma Metro's staff to know about the metro operation. Dr. U.B. Pavanaja and Kannada Wikipedian <a href="https://kn.wikipedia.org/wiki/ಸದಸ್ಯ:Omshivaprakash">Om Shivaprakash</a> guided Wikipedians to the office of Deccan Herald Prajavani where they got to see the entire newspaper production and spent time with the technical staff to learn about the use of Kannada Unicode fonts for newspaper printing. Editors and staff at Prajavani got to know about the use of WikiCommons as a free image repository.</p>
<p style="text-align: justify; ">The four action filled days involved learning new concepts, training on presentation skills, collaborating to create outreach documents, sharing stories from different language communities, understanding new mediums of outreach, meeting Wikipedians from different cities and also having lots of fun. Wikipedians left Bangalore city with happy faces and we hope to cultivate new editors in their communities.</p>
<p style="text-align: justify; "><span><b>List of Participants</b></span></p>
<ul>
<li><a class="extiw" href="https://en.wikipedia.org/wiki/user:AbhiSuryawanshi" title="en:user:AbhiSuryawanshi">Abhishek Suryawanshi</a></li>
<li><a class="extiw" href="https://en.wikipedia.org/wiki/user:AnkitaS" title="en:user:AnkitaS">Ankita Sinha</a></li>
<li><a class="extiw" href="https://en.wikipedia.org/wiki/user:Charan_Gill" title="en:user:Charan Gill">Charan Gill</a></li>
<li><a class="extiw" href="https://en.wikipedia.org/wiki/user:jayantanth" title="en:user:jayantanth">Jayanta Nath</a></li>
<li><a class="extiw" href="https://en.wikipedia.org/wiki/user:Kasyap" title="en:user:Kasyap">Kasyap</a></li>
<li><a class="extiw" href="https://en.wikipedia.org/wiki/user:Niraj_Suryawanshi" title="en:user:Niraj Suryawanshi">Niraj Suryawanshi</a></li>
<li><a class="extiw" href="https://te.wikipedia.org/wiki/user:pranayraj1985" title="te:user:pranayraj1985">pranayraj vangari</a></li>
<li><a class="extiw" href="https://en.wikipedia.org/wiki/user:Satdeep_gill" title="en:user:Satdeep gill">Satdeep Gill</a></li>
<li><a class="external-link" href="https://sa.wikipedia.org/wiki/user:shubha">Shubha</a></li>
<li><a class="extiw" href="https://en.wikipedia.org/wiki/user:Rangilo_Gujarati" title="en:user:Rangilo Gujarati">Rangilo Gujarati</a></li>
<li><a class="extiw" href="https://ml.wikipedia.org/wiki/User:Manojk" title="ml:User:Manojk">Manoj K</a></li>
<li><a class="extiw" href="https://en.wikipedia.org/wiki/User:MKar" title="en:User:MKar">Mrutyunjaya Kar</a> (<a class="extiw" href="https://or.wikipedia.org/wiki/User:MKar" title="or:User:MKar">Odia Wiki</a>)</li>
<li><a class="extiw" href="https://or.wikipedia.org/wiki/User:Subas_Chandra_Rout" title="or:User:Subas Chandra Rout">Subas Chandra Rout</a></li>
<li><a class="extiw" href="https://en.wikipedia.org/wiki/user:Nikhil.kawale" title="en:user:Nikhil.kawale">Nikhil Kawale</a></li>
<li><a class="extiw" href="https://te.wikipedia.org/wiki/%E0%B0%B5%E0%B0%BE%E0%B0%A1%E0%B1%81%E0%B0%95%E0%B0%B0%E0%B0%BF:%E0%B0%B5%E0%B0%BF%E0%B0%B6%E0%B1%8D%E0%B0%B5%E0%B0%A8%E0%B0%BE%E0%B0%A7%E0%B1%8D.%E0%B0%AC%E0%B0%BF.%E0%B0%95%E0%B1%86." title="te:వాడుకరి:విశ్వనాధ్.బి.కె.">Viswanadh.b.k</a></li>
<li><a class="extiw" href="https://hi.wikipedia.org/wiki/user:Hindustanilanguage" title="hi:user:Hindustanilanguage">Muzammil</a></li>
<li><a class="extiw" href="https://en.wikipedia.org/wiki/user:John_Noronha" title="en:user:John Noronha">John Noronha</a></li>
</ul>
<p>
For more details visit <a href='https://cis-india.org/openness/blog-old/train-the-trainer-program'>https://cis-india.org/openness/blog-old/train-the-trainer-program</a>
</p>
No publishersubhaAccess to KnowledgeWikimediaWikipediaFeaturedOpennessHomepage2013-11-18T07:52:26ZBlog EntrySpy Files 3: WikiLeaks Sheds More Light On The Global Surveillance Industry
https://cis-india.org/internet-governance/blog/spy-files-three
<b>In this article, Maria Xynou looks at WikiLeaks' latest Spy Files and examines the legality of India's surveillance technologies, as well as their potential connection with India's Central Monitoring System (CMS) and implications on human rights. </b>
<p align="JUSTIFY">Last month, WikiLeaks released <span style="text-decoration: underline;"><a href="http://wikileaks.org/spyfiles3.html">“</a><a href="http://wikileaks.org/spyfiles3.html">Spy</a><a href="http://wikileaks.org/spyfiles3.html"> </a><a href="http://wikileaks.org/spyfiles3.html">Files</a><a href="http://wikileaks.org/spyfiles3.html"> 3”</a></span>, a mass exposure of the global surveillance trade and industry. WikiLeaks first released the Spy Files in December 2011, which entail brochures, presentations, marketing videos and technical specifications on the global trade of surveillance technologies. Spy Files 3 supplements this with 294 additional documents from 92 global intelligence contractors.</p>
<h2><b>So what do the latest Spy Files reveal about India?</b></h2>
<p align="JUSTIFY">When we think about India, the first issues that probably come to mind are poverty and corruption, while surveillance appears to be a more “Western” and elitist issue. However, while many other developing countries are excluded from WikiLeaks’ list of surveillance technology companies, <span style="text-decoration: underline;"><a href="http://wikileaks.org/spyfiles3.html#an1">India</a><a href="http://wikileaks.org/spyfiles3.html#an1"> </a><a href="http://wikileaks.org/spyfiles3.html#an1">is</a><a href="http://wikileaks.org/spyfiles3.html#an1"> </a><a href="http://wikileaks.org/spyfiles3.html#an1">once</a><a href="http://wikileaks.org/spyfiles3.html#an1"> </a><a href="http://wikileaks.org/spyfiles3.html#an1">again</a><a href="http://wikileaks.org/spyfiles3.html#an1"> </a><a href="http://wikileaks.org/spyfiles3.html#an1">on</a><a href="http://wikileaks.org/spyfiles3.html#an1"> </a><a href="http://wikileaks.org/spyfiles3.html#an1">the</a><a href="http://wikileaks.org/spyfiles3.html#an1"> </a><a href="http://wikileaks.org/spyfiles3.html#an1">list</a></span> with some of the most controversial spyware.</p>
<h3><b>ISS World Surveillance Trade Shows</b></h3>
<p align="JUSTIFY">The latest Spy Files include a <span style="text-decoration: underline;"><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf">brochure</a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf">of</a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf">the</a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf">ISS</a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf">World</a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"> 2013</a></span> -the so-called “wiretapper’s ball”- which is the world’s largest surveillance trade show. <span style="text-decoration: underline;"><a href="http://www.issworldtraining.com/iss_ap/">This</a><a href="http://www.issworldtraining.com/iss_ap/"> </a><a href="http://www.issworldtraining.com/iss_ap/">years</a><a href="http://www.issworldtraining.com/iss_ap/">’ </a><a href="http://www.issworldtraining.com/iss_ap/">ISS</a><a href="http://www.issworldtraining.com/iss_ap/"> </a><a href="http://www.issworldtraining.com/iss_ap/">World</a><a href="http://www.issworldtraining.com/iss_ap/"> </a><a href="http://www.issworldtraining.com/iss_ap/">Asia</a></span> will take place in Malaysia during the first week of December and law enforcement agencies from around the world will have another opportunity to view and purchase the latest surveillance tech. The<span style="text-decoration: underline;"><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf">leaked</a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf">ISS</a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf">World</a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"> 2013 </a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf">brochure</a></span> entails a list of last years’ global attendees. According to the brochure, 53% of the attendees included law enforcement agencies and individuals from the defense, public safety and interior security sectors, 41% of the attendees were ISS vendors and technology integrators, while only 6% of the attendees were telecom operators and from the private enterprise. The brochure boasts that 4,635 individuals from 110 countries attended the ISS World trade shows last year and that the percentage of attendance is increasing.</p>
<p align="JUSTIFY">The following table lists the <a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"><i><span style="text-decoration: underline;">Indian</span></i></a><span style="text-decoration: underline;"><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf">attendees</a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf">at</a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf">last</a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf">years</a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf">’ </a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf">ISS</a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf">World</a></span>:</p>
<table class="plain">
<tbody>
<tr>
<th>
<p align="JUSTIFY"><span><span><b>Law Enforcement, Defense and Interior Security Attendees</b></span></span></p>
</th><th>
<p align="JUSTIFY"><span><span><b>Telecom Operators and Private Enterprises Attendees</b></span></span></p>
</th><th>
<p align="JUSTIFY"><span><span><b>ISS Vendors and Technology Integrators Attendees</b></span></span></p>
</th>
</tr>
<tr>
<td>
<p align="JUSTIFY"><span><span><span>Andhra Pradesh India Police</span></span></span></p>
</td>
<td>
<p align="JUSTIFY">BT</p>
</td>
<td>
<p align="JUSTIFY"><span><span><span>AGC Networks</span></span></span></p>
</td>
</tr>
<tr>
<td>
<p align="JUSTIFY"><span><span><span>CBI Academy</span></span></span></p>
</td>
<td>
<p align="JUSTIFY"><span><span><span>Cogence Investment Bank</span></span></span></p>
</td>
<td>
<p align="JUSTIFY"><span><span><span>Aqsacom India</span></span></span></p>
</td>
</tr>
<tr>
<td>
<p align="JUSTIFY"><span><span><span>Government of India, Telecom Department</span></span></span></p>
</td>
<td>
<p align="JUSTIFY"><span><span><span>India Reliance Communications</span></span></span></p>
</td>
<td>
<p align="JUSTIFY"><span><span><span>ClearTrail Technologies</span></span></span></p>
</td>
</tr>
<tr>
<td>
<p align="JUSTIFY"><span><span><span>India Cabinet Secretariat</span></span></span></p>
</td>
<td>
<p align="JUSTIFY"><span><span><span>Span Telecom Pvt. Ldt. </span></span></span></p>
</td>
<td>
<p align="JUSTIFY"><span><span><span>Foundation Technologies</span></span></span></p>
</td>
</tr>
<tr>
<td>
<p align="JUSTIFY"><span><span><span>India Centre for Development of Telematics (C-DOT)</span></span></span></p>
</td>
<td></td>
<td>
<p align="JUSTIFY">Kommlabs</p>
</td>
</tr>
<tr>
<td>
<p align="JUSTIFY"><span><span><span>India Chandigarh Police</span></span></span></p>
</td>
<td></td>
<td>
<p align="JUSTIFY"><span><span><span>Paladion Networks</span></span></span></p>
</td>
</tr>
<tr>
<td>
<p align="JUSTIFY"><span><span><span>India Defence Agency</span></span></span></p>
</td>
<td></td>
<td>
<p align="JUSTIFY"><span><span><span>Polaris Wireless</span></span></span></p>
</td>
</tr>
<tr>
<td>
<p align="JUSTIFY"><span><span><span>India General Police</span></span></span></p>
</td>
<td></td>
<td>
<p align="JUSTIFY"><span><span><span>Polixel Security Systems</span></span></span></p>
</td>
</tr>
<tr>
<td>
<p align="JUSTIFY"><span><span><span>India Intelligence Department</span></span></span></p>
</td>
<td></td>
<td>
<p align="JUSTIFY"><span><span><span>Pyramid Cyber Security</span></span></span></p>
</td>
</tr>
<tr>
<td>
<p align="JUSTIFY"><span><span><span>India National Institute of Criminology</span></span></span></p>
</td>
<td></td>
<td>
<p align="JUSTIFY"><span><span><span>Schleicher Group</span></span></span></p>
</td>
</tr>
<tr>
<td>
<p align="JUSTIFY"><span><span><span>India office LOKAYUKTA NCT DELHI</span></span></span></p>
</td>
<td></td>
<td>
<p align="JUSTIFY"><span><span><span>Span Technologies</span></span></span></p>
</td>
</tr>
<tr>
<td>
<p align="JUSTIFY"><span><span><span>India Police Department, A.P.</span></span></span></p>
</td>
<td></td>
<td>
<p align="JUSTIFY"><span><span><span>TATA India</span></span></span></p>
</td>
</tr>
<tr>
<td>
<p align="JUSTIFY"><span><span><span>India Tamil Nadu Police Department</span></span></span></p>
</td>
<td></td>
<td>
<p align="JUSTIFY"><span><span><span>Tata Consultancy Services</span></span></span></p>
</td>
</tr>
<tr>
<td>
<p align="JUSTIFY"><span><span><span>Indian Police Service, Vigilance</span></span></span></p>
</td>
<td></td>
<td>
<p align="JUSTIFY"><span><span><span>Telecommunications India</span></span></span></p>
</td>
</tr>
<tr>
<td>
<p align="JUSTIFY"><span><span><span>Indian Telecommunications Authority</span></span></span></p>
</td>
<td></td>
<td>
<p align="JUSTIFY"><span><span><span>Vehere Interactive</span></span></span></p>
</td>
</tr>
<tr>
<td>
<p align="JUSTIFY"><span><span><span>NTRO India</span></span></span></p>
</td>
<td></td>
<td></td>
</tr>
<tr>
<td>
<p align="JUSTIFY"><span><span><span>SAIC Indian Tamil Nadu Police</span></span></span></p>
</td>
<td></td>
<td></td>
</tr>
</tbody>
</table>
<table class="plain">
<tbody>
<tr>
<th> 17 4 15<br /></th>
</tr>
</tbody>
</table>
<p align="JUSTIFY">According to the above table - which is based on data from the <span style="text-decoration: underline;"><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf">WikiLeaks</a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf">’ </a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf">ISS</a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf">World</a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"> 2013 </a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf">brochure</a></span>- the majority of Indian attendees at last years’ ISS World were from the law enforcement, defense and interior security sectors. 15 Indian companies exhibited and sold their surveillance technologies to law enforcement agencies from around the world and it is notable that India’s popular ISP provider, Reliance Communications, attended the trade show too.</p>
<p align="JUSTIFY">In addition to the ISS World 2013 brochure, the Spy Files 3 entail a detailed brochure of a major Indian surveillance technology company: ClearTrail Technologies.</p>
<h3><b>ClearTrail Technologies</b></h3>
<p align="JUSTIFY"><span style="text-decoration: underline;"><a href="http://www.clear-trail.com/">ClearTrail</a><a href="http://www.clear-trail.com/"> </a><a href="http://www.clear-trail.com/">Technologies</a></span> is an Indian company based in Indore. The document titled <span style="text-decoration: underline;"><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">“</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">Internet</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">Monitoring</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">Suite</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">”</a></span> from ClearTrail Technologies boasts about the company’s mass monitoring, deep packet inspection, COMINT, SIGINT, tactical Internet monitoring, network recording and lawful interception technologies. ClearTrail’s Internet Monitoring Suite includes the following products:</p>
<p align="JUSTIFY"><b>1. ComTrail: Mass Monitoring of IP and Voice Networks</b></p>
<p align="JUSTIFY"><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"><span style="text-decoration: underline;">ComTrail</span></a> is an integrated product suite for centralized interception and monitoring of voice and data networks. It is equipped with an advanced analysis engine for pro-active analysis of thousands of connections and is integrated with various tools, such as Link Analysis, Voice Recognition and Target Location.</p>
<p align="JUSTIFY">ComTrail is deployed within a service provider network and its monitoring function correlates voice and data intercepts across diverse networks to provide a comprehensive intelligence picture. ComTrail supports the capture, record and replay of a variety of Voice and IP communications in pretty much any type of communication, including - but not limited to- Gmail, Yahoo, Hotmail, BlackBerry, ICQ and GSM voice calls.</p>
<p align="JUSTIFY">Additionally, ComTrail intercepts data from any type of network -whether Wireless, packet data, Wire line or VoIP networks- and can decode hundreds of protocols and P2P applications, including HTTP, Instant Messengers, Web-mails, VoIP Calls and MMS.</p>
<p align="JUSTIFY">In short, ComTrail’s key features include the following:</p>
<p align="JUSTIFY">- Equipped to handle millions of communications per day intercepted over high speed STM & Ethernet Links</p>
<p align="JUSTIFY">- Doubles up as Targeted Monitoring System</p>
<p align="JUSTIFY">- On demand data retention, capacity exceeding several years</p>
<p align="JUSTIFY">- Instant Analysis across thousands of Terabytes</p>
<p align="JUSTIFY">- Correlates Identities across multiple networks</p>
<p align="JUSTIFY">- Speaker Recognition and Target Location</p>
<p align="JUSTIFY"><b>2. xTrail: Targeted IP Monitoring</b></p>
<p align="JUSTIFY"><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"><span style="text-decoration: underline;">xTrail</span></a> is a solution for interception, decoding and analysis of high speed data traffic over IP networks and independently monitors ISPs/GPRS and 3G networks. xTrail has been designed in such a way that it can be deployed within minutes and enables law enforcement agencies to intercept and monitor targeted communications without degrading the service quality of the IP network. This product is capable of intercepting all types of networks -including wireline, wireless, cable, VoIP and VSAT networks- and acts as a black box for “record and replay” targeted Internet communications.</p>
<p align="JUSTIFY">Interestingly enough, xTrail can filter based on a “pure keyword”, a URL/Domain with a keyword, an IP address, a mobile number or even with just a user identity, such as an email ID, chat ID or VoIP ID. Furthermore, xTrail can be integrated with link analysis tools and can export data in a digital format which can allegedly be presented in court as evidence.</p>
<p align="JUSTIFY">In short, xTrail’s key features include the following:</p>
<p align="JUSTIFY">- Pure passive probe</p>
<p align="JUSTIFY">- Designed for rapid field operations at ISP/GPRS/Wi-Max/VSAT Network Gateways</p>
<p align="JUSTIFY">- Stand-alone solution for interception, decoding and analysis of multi Gigabit IP traffic</p>
<p align="JUSTIFY">- Portable trolley based for simplified logistics, can easily be deployed and removed from any network location</p>
<p align="JUSTIFY">- Huge data retention, rich analysis interface and tamper proof court evidence</p>
<p align="JUSTIFY">- Easily integrates with any existing centralized monitoring system for extended coverage</p>
<p align="JUSTIFY"><b>3. QuickTrail: Tactical Wi-Fi Monitoring</b></p>
<p align="JUSTIFY">Some of the biggest IP monitoring challenges that law enforcement agencies face include cases when targets operate from public Internet networks and/or use encryption.</p>
<p align="JUSTIFY"><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"><span style="text-decoration: underline;">QuickTrail</span></a> is a device which is designed to gather intelligence from public Internet networks, when a target is operating from a cyber cafe, a hotel, a university campus or a free Wi-Fi zone. In particular, QuickTrail is equipped with multiple monitoring tools and techniques that can help intercept almost any wired, Wi-Fi or hybrid Internet network so that a target communication can be monitored. QuickTrail can be deployed within fractions of seconds to intercept, reconstruct, replay and analyze email, chat, VoIP and other Internet activities of a target. This device supports real time monitoring and wiretapping of Ethernet LANs.</p>
<p align="JUSTIFY">According to ClearTrail’s brochure, QuickTrail is a “all-in-one” device which can intercept secured communications, know passwords with c-Jack attack, alert on activities of a target, support active and passive interception of Wi-Fi and wired LAN and capture, reconstruct and replay. It is noteworthy that QuickTrail can identify a target machine on the basis of an IP address, MAC ID, machine name, activity status and several other parameters. In addition, QuickTrail supports protocol decoding, including HTTP, SMTP, POP3 and HTTPS. This device also enables the remote and central management of field operations at geographically different locations.</p>
<p align="JUSTIFY">In short, QuickTrail’s key features include the following:</p>
<p align="JUSTIFY">- Conveniently housed in a laptop computer</p>
<p align="JUSTIFY">- Intercepts Wi-Fi and wired LANs in five different ways</p>
<p align="JUSTIFY">- Breaks WEP, WPA/WPA2 to rip-off secured Wi-Fi networks</p>
<p align="JUSTIFY">- Deploys spyware into a target’s machine</p>
<p align="JUSTIFY">- Monitor’s Gmail, Yahoo and all other HTTPS-based communications</p>
<p align="JUSTIFY">- Reconstructs webmails, chats, VoIP calls, news groups and social networks</p>
<p align="JUSTIFY"><b>4. mTrail: Off-The-Air Interception</b></p>
<p align="JUSTIFY"><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"><span style="text-decoration: underline;">mTrail</span></a> offers active and passive ‘off-the-air’ interception of GSM 900/1800/1900 Mhz phone calls and data to meet law enforcement surveillance and investigation requirements. The mTrail passive interception system works in the stealth mode so that there is no dependence on the network operator and so that the target is unaware of the interception of its communications.</p>
<p align="JUSTIFY">The mTrail system has the capability to scale from interception of 2 channels (carrier frequencies) to 32 channels. mTrail can be deployed either in a mobile or fixed mode: in the mobile mode the system is able to fit into a briefcase, while in the fixed mode the system fits in a rack-mount industrial grade chassis.</p>
<p align="JUSTIFY">Target location identification is supported by using signal strength, target numbers, such as IMSI, TIMSI, IMEI or MSI SDN, which makes it possible to listen to the conversation on so-called “lawfully intercepted” calls in near real-time, as well as to store all calls. Additionally, mTrail supports the interception of targeted calls from pre-defined suspect lists and the monitoring of SMS and protocol information.</p>
<p align="JUSTIFY">In short, mTrail’s key features include the following:</p>
<p align="JUSTIFY">- Designed for passive interception of GSM communications</p>
<p align="JUSTIFY">- Intercepts Voice and SMS “off-the-air”</p>
<p align="JUSTIFY">- Detects the location of the target</p>
<p align="JUSTIFY">- Can be deployed as a fixed unit or mounted in a surveillance van</p>
<p align="JUSTIFY">- No support required from GSM operator</p>
<p align="JUSTIFY"><b>5. Astra: Remote Monitoring and Infection framework</b></p>
<p align="JUSTIFY"><span style="text-decoration: underline;"><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">“</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">Astra</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">”</a></span> is a remote monitoring and infection framework which incorporates both conventional and proprietary infection methods to ensure bot delivery to the targeted devices. It also offers a varied choice in handling the behavior of bots and ensuring non-traceable payload delivery to the controller.</p>
<p align="JUSTIFY">The conventional methods of infection include physical access to a targeted device by using exposed interfaces, such as a CD-ROM, DVD and USB ports, as well as the use of social media engineering techniques. However, Astra also supports bot deployment <i>without</i> requiring any physical access to the target device.</p>
<p align="JUSTIFY">In particular, Astra can push bot to <i>any</i> targeted machine sharing the <i>same</i> LAN (wired, wi-fi or hybrid). The SEED is a generic bot which can identify a target’s location, log keystrokes, capture screen-shots, capture Mic, listen to Skype calls, capture webcams and search the target’s browsing history. Additionally, the SEED bot can also be remotely activated, deactivated or terminated, as and when required. Astra allegedly provides an un-traceable reporting mechanism that operates without using any proxies, which overrules the possibility of getting traced by the target.</p>
<p align="JUSTIFY">Astra’s key features include the following:</p>
<p align="JUSTIFY">- Proactive intelligence gathering</p>
<p align="JUSTIFY">- End-to-end remote infection and monitoring framework</p>
<p align="JUSTIFY">- Follow the target, beat encryption, listen to in-room conversations, capture keystrokes and screen shots</p>
<p align="JUSTIFY">- Designed for centralized management of thousands of targets</p>
<p align="JUSTIFY">- A wide range of deployment mechanisms to optimize success ration</p>
<p align="JUSTIFY">- Non-traceable, non-detectable delivery mechanism</p>
<p align="JUSTIFY">- Intrusive yet stealthy</p>
<p align="JUSTIFY">- Easy interface for handling most complex tasks</p>
<p align="JUSTIFY">- Successfully tested over the current top 10 anti-virus available in the market</p>
<p align="JUSTIFY">- No third party dependencies</p>
<p align="JUSTIFY">- Free from any back-door intervention</p>
<p align="JUSTIFY"><span style="text-decoration: underline;"><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">ClearTrail</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">Technologies</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">argue</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">that</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">they</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">meet</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">lawful</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">interception</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">regulatory</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">requirements</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"> </a></span>across the globe. In particular, they claim that their products are compliant with <a href="http://www.etsi.org/technologies-clusters/technologies/regulation-legislation"><span style="text-decoration: underline;">ETSI</span></a> and <span style="text-decoration: underline;"><a href="http://cryptome.org/laes/calea-require.pdf">CALEA</a><a href="http://cryptome.org/laes/calea-require.pdf"> </a><a href="http://cryptome.org/laes/calea-require.pdf">regulations</a></span> and that they are efficient to cater to region specific requirements as well.</p>
<p align="JUSTIFY">The latest Spy Files also include data on foreign surveillance technology companies operating in India, such as <span style="text-decoration: underline;"><a href="http://wikileaks.org/spyfiles3.html#an1">Telesoft</a><a href="http://wikileaks.org/spyfiles3.html#an1"> </a><a href="http://wikileaks.org/spyfiles3.html#an1">Technologies</a></span>, <span style="text-decoration: underline;"><a href="http://www.wikileaks.org/spyfiles/docs/AGTINTERNATIONAL-2011-UrbaManaSolu-fr.pdf">AGT</a><a href="http://www.wikileaks.org/spyfiles/docs/AGTINTERNATIONAL-2011-UrbaManaSolu-fr.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/AGTINTERNATIONAL-2011-UrbaManaSolu-fr.pdf">International</a></span> and <span style="text-decoration: underline;"><a href="http://wikileaks.org/spyfiles3.html#an1">Verint</a><a href="http://wikileaks.org/spyfiles3.html#an1"> </a><a href="http://wikileaks.org/spyfiles3.html#an1">Systems</a></span>. In particular, <span style="text-decoration: underline;"><a href="http://verint.com/">Verint</a><a href="http://verint.com/"> </a><a href="http://verint.com/">Systems</a></span> has its headquarters in New York and offices all around the world, including Bangalore in India. Founded in 1994 and run by Dan Bodner, Verint Systems produces a wide range of surveillance technologies, including the following:</p>
<p align="JUSTIFY">- Impact 360 Speech Analytics</p>
<p align="JUSTIFY">- Impact 360 Text Analytics</p>
<p align="JUSTIFY">- Nextiva Video Management Software (VMS)</p>
<p align="JUSTIFY">- Nextiva Physical Security Information Management (PSIM)</p>
<p align="JUSTIFY">- Nextiva Network Video Recorders (NVRs)</p>
<p align="JUSTIFY">- Nextiva Video Business Intelligence (VBI)</p>
<p align="JUSTIFY">- Nextiva Surveillance Analytics</p>
<p align="JUSTIFY">- Nextiva IP cameras</p>
<p align="JUSTIFY">- CYBERVISION Network Security</p>
<p align="JUSTIFY">- ENGAGE suite</p>
<p align="JUSTIFY">- FOCAL-INFO (FOCAL-COLLECT & FOCAL-ANALYTICS)</p>
<p align="JUSTIFY">- RELIANT</p>
<p align="JUSTIFY">- STAR-GATE</p>
<p>- VANTAGE</p>
<p align="JUSTIFY">While <span style="text-decoration: underline;"><a href="http://verint.com/">Verint</a><a href="http://verint.com/"> </a><a href="http://verint.com/">Systems</a></span> claims to be in compliance with ETSI, CALEA and other worldwide lawful interception and standards and regulations, it remains unclear whether such products successfully help law enforcement agencies in tackling crime and terrorism, without violating individuals’ right to privacy and other human rights. After all, <span style="text-decoration: underline;"><a href="http://www.issworldtraining.com/iss_europe/">Verint</a><a href="http://www.issworldtraining.com/iss_europe/"> </a><a href="http://www.issworldtraining.com/iss_europe/">Systems</a><a href="http://www.issworldtraining.com/iss_europe/"> </a><a href="http://www.issworldtraining.com/iss_europe/">has</a><a href="http://www.issworldtraining.com/iss_europe/"> </a><a href="http://www.issworldtraining.com/iss_europe/">participated</a><a href="http://www.issworldtraining.com/iss_europe/"> </a><a href="http://www.issworldtraining.com/iss_europe/">in</a><a href="http://www.issworldtraining.com/iss_europe/"> </a><a href="http://www.issworldtraining.com/iss_europe/">ISS</a><a href="http://www.issworldtraining.com/iss_europe/"> </a><a href="http://www.issworldtraining.com/iss_europe/">World</a><a href="http://www.issworldtraining.com/iss_europe/"> </a><a href="http://www.issworldtraining.com/iss_europe/">Trade</a><a href="http://www.issworldtraining.com/iss_europe/"> </a><a href="http://www.issworldtraining.com/iss_europe/">shows</a></span> which exhibit some of the most controversial spyware in the world, used to target individuals and for mass surveillance.</p>
<h2><b>And what do the latest Spy Files mean for India?</b></h2>
<p align="JUSTIFY">Why is it even important to look at the latest Spy Files? Well, for starters, they reveal data about which Indian law enforcement agencies are interested in surveillance and which companies are interested in selling and/or buying the latest spy gear. And why is any of this important? I can think of three main reasons:</p>
<p align="JUSTIFY">1. The Central Monitoring System (CMS)</p>
<p align="JUSTIFY">2. Is any of this surveillance even legal in India?</p>
<p align="JUSTIFY">3. Can such surveillance result in the violation of human rights?</p>
<h3><b>Spy Files 3...and the Central Monitoring System (CMS)</b></h3>
<p align="JUSTIFY">Following the <a href="http://www.noeman.org/gsm/hindi/71159-26-november-2008-mumbai-terrorist-attacks.html">Mumbai</a><a href="http://www.noeman.org/gsm/hindi/71159-26-november-2008-mumbai-terrorist-attacks.html"> 2008 </a><a href="http://www.noeman.org/gsm/hindi/71159-26-november-2008-mumbai-terrorist-attacks.html">terrorist</a><a href="http://www.noeman.org/gsm/hindi/71159-26-november-2008-mumbai-terrorist-attacks.html"> </a><a href="http://www.noeman.org/gsm/hindi/71159-26-november-2008-mumbai-terrorist-attacks.html">attacks</a>, the Telecom Enforcement, Resource and Monitoring (TREM) cells and the Centre for Development of Telematics (C-DOT) started preparing the <a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system">Central</a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"> </a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system">Monitoring</a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"> </a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system">System</a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"> (</a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system">CMS</a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system">)</a>. As of April 2013, this project is being manned by the Intelligence Bureau, while agencies which are planned to have access to it include the Research & Analysis Wing (RAW) and the Central Bureau of Investigation (CBI). ISP and Telecom operators are required to<b> </b><span>install the gear which enables law enforcement agencies to carry</span> out the Central Monitoring System under the <a href="http://www.dot.gov.in/licensing/access-services">Unified</a><a href="http://www.dot.gov.in/licensing/access-services"> </a><a href="http://www.dot.gov.in/licensing/access-services">Access</a><a href="http://www.dot.gov.in/licensing/access-services"> </a><a href="http://www.dot.gov.in/licensing/access-services">Services</a><a href="http://www.dot.gov.in/licensing/access-services"> (</a><a href="http://www.dot.gov.in/licensing/access-services">UAS</a><a href="http://www.dot.gov.in/licensing/access-services">) </a><a href="http://www.dot.gov.in/licensing/access-services">License</a><a href="http://www.dot.gov.in/licensing/access-services"> </a><a href="http://www.dot.gov.in/licensing/access-services">Agreement</a>.</p>
<p align="JUSTIFY">The Central Monitoring System aims at centrally monitoring all telecommunications and Internet communications in India and its estimated cost is <span style="text-decoration: underline;"><a href="http://www.ciol.com/ciol/news/184770/governments-central-monitoring-system-operational-soon">Rs</a><a href="http://www.ciol.com/ciol/news/184770/governments-central-monitoring-system-operational-soon">. 4 </a><a href="http://www.ciol.com/ciol/news/184770/governments-central-monitoring-system-operational-soon">billion</a></span>. In addition to <span style="text-decoration: underline;"><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system">equipping</a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"> </a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system">government</a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"> </a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system">agencies</a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"> </a></span>with Direct Electronic Provisioning, filters and alerts on the target numbers, the CMS will also enable Call Data Records (CDR) analysis and data mining to identify personal information of the target numbers. The CMS supplements<span style="text-decoration: underline;"><a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"> </a><a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf">regional</a><a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"> </a><a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf">Internet</a><a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"> </a><a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf">Monitoring</a><a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"> </a><a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf">Systems</a><a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf">, </a><a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf">such</a><a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"> </a><a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf">as</a><a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"> </a><a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf">that</a><a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"> </a><a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf">of</a><a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"> </a><a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf">Assam</a></span>, by providing a nationwide monitoring of telecommunications and Internet communications, supposedly to assist law enforcement agencies in tackling crime and terrorism.</p>
<p align="JUSTIFY">However, data monitored and collected through the CMS will be stored in a<span style="text-decoration: underline;"><a href="http://www.globalpost.com/dispatch/news/regions/asia-pacific/india/130509/india-central-monitoring-system-government-internet-access"> </a><a href="http://www.globalpost.com/dispatch/news/regions/asia-pacific/india/130509/india-central-monitoring-system-government-internet-access">centralised</a><a href="http://www.globalpost.com/dispatch/news/regions/asia-pacific/india/130509/india-central-monitoring-system-government-internet-access"> </a><a href="http://www.globalpost.com/dispatch/news/regions/asia-pacific/india/130509/india-central-monitoring-system-government-internet-access">database</a></span>, which could potentially increase the probability of centralized cyber attacks and thus increase, rather than reduce, threats to national security. Furthermore, some basic rules of statistics indicate that <span style="text-decoration: underline;"><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system">the</a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"> </a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system">bigger</a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"> </a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system">the</a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"> </a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system">amount</a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"> </a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system">of</a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"> </a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system">data</a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system">, </a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system">the</a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"> </a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system">bigger</a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"> </a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system">the</a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"> </a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system">probability</a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"> </a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system">of</a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"> </a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system">an</a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"> </a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system">error</a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"> </a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system">in</a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"> </a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system">matching</a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"> </a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system">profiles</a></span>, which could potentially result in innocent people being charged with crimes they did not commit. And most importantly: the CMS currently lacks adequate legal oversight, which means that it remains unclear how monitored data will be used. The <span style="text-decoration: underline;"><a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf">UAS</a><a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"> </a><a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf">License</a><a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"> </a><a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf">Agreement</a><a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"> </a><a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf">regarding</a><a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"> </a><a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf">the</a><a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"> </a><a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf">CMS</a></span> mandates mass surveillance by requiring ISPs and Telecom operators to enable the monitoring and interception of communications. However, targeted and mass surveillance through the CMS not only raises serious questions around its legality, but also creates the potential for abuse of the right to privacy and other human rights.</p>
<p align="JUSTIFY">Interestingly enough, Indian law enforcement agencies which attended <span style="text-decoration: underline;"><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf">last</a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf">years</a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf">’ </a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf">ISS</a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf">World</a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf">trade</a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf">shows</a></span> are linked to the Central Monitoring System. In particular, last years’ law enforcement, defense and interior security attendees include the Centre for Development of Telematics (C-DOT) and the Department of Telecommunications, both of which prepared the Central Monitoring System. The list of attendees also includes India’s Intelligence Bureau, which is manning the CMS, as well as the <span style="text-decoration: underline;"><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system">agencies</a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"> </a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system">which</a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"> </a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system">will</a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"> </a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system">have</a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"> </a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system">access</a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"> </a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system">to</a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"> </a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system">the</a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"> </a><a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system">CMS</a></span>: the Central Bureau of Investigation (CBI), the Research and Analysis Wing (RAW), the National Technical Research Organization (NTRO) and various other state police departments and intelligence agencies.</p>
<p align="JUSTIFY">Furthermore, Spy Files 3 entail a <a href="http://wikileaks.org/spyfiles3.html#an1">list</a><a href="http://wikileaks.org/spyfiles3.html#an1"> </a><a href="http://wikileaks.org/spyfiles3.html#an1">of</a><a href="http://wikileaks.org/spyfiles3.html#an1"> </a><a href="http://wikileaks.org/spyfiles3.html#an1">last</a><a href="http://wikileaks.org/spyfiles3.html#an1"> </a><a href="http://wikileaks.org/spyfiles3.html#an1">years</a><a href="http://wikileaks.org/spyfiles3.html#an1">’ </a><a href="http://wikileaks.org/spyfiles3.html#an1">ISS</a><a href="http://wikileaks.org/spyfiles3.html#an1"> </a><a href="http://wikileaks.org/spyfiles3.html#an1">World</a><a href="http://wikileaks.org/spyfiles3.html#an1"> </a><a href="http://wikileaks.org/spyfiles3.html#an1">security</a><a href="http://wikileaks.org/spyfiles3.html#an1"> </a><a href="http://wikileaks.org/spyfiles3.html#an1">company</a><a href="http://wikileaks.org/spyfiles3.html#an1"> </a><a href="http://wikileaks.org/spyfiles3.html#an1">attendees</a>, which includes several Indian companies. Again, interestingly enough, many of these companies may potentially be aiding law enforcement with the technology to carry out the Central Monitoring System. ClearTrail Technologies, in particular, provides <a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">solutions</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">for</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">targeted</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">and</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">mass</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">monitoring</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">of</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">IP</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">and</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">voice</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">networks</a>, as well as remote monitoring and infection frameworks - all of which would potentially be perfect to aid the Central Monitoring System.</p>
<p align="JUSTIFY">In fact, ClearTrail states in its brochure that its <a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">ComTrail</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">product</a> is equipped to handle millions of communications per day, while its <a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">xTrail</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">product</a> can easily be integrated with any existing centralised monitoring system for extended coverage. And if that’s not enough, ClearTrail’s <a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">“</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">Astra</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">” </a>is designed for the centralized management of thousands of targets. While there may not be any concrete proof that ClearTrail is indeed aiding the Centralized Monitoring System, the facts speak for themselves: ClearTrail is an Indian company which sells target and mass monitoring products to law enforcement agencies. The Centralized Monitoring System is currently being implemented. What are the odds that ClearTrail is <i>not </i>equipping the CMS? <span>And what are the odds that such technology is </span><i><span>not</span></i><span> being used for other mass electronic surveillance programmes, such as the Lawful Intercept and Monitoring (LIM)?</span></p>
<h3><b>Spy Files 3...and the legality of India’s surveillance technologies</b></h3>
<p align="JUSTIFY">ClearTrail Technologies’ <a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"><span style="text-decoration: underline;">brochure</span></a> -the only leaked document on Indian surveillance technology by the latest Spy Files- states that the company complies with <a href="http://www.etsi.org/technologies-clusters/technologies/regulation-legislation"><span style="text-decoration: underline;">ETSI</span></a> and <span style="text-decoration: underline;"><a href="http://cryptome.org/laes/calea-require.pdf">CALEA</a><a href="http://cryptome.org/laes/calea-require.pdf"> </a><a href="http://cryptome.org/laes/calea-require.pdf">regulations</a></span>. While it’s clear that the company complies with U.S. and European regulations on the interception of communications to attract more customers in the international market, such regulations don’t really apply <i>within</i> India, which is part of ClearTrail’s market. Notably enough, ClearTrail does not mention any compliance with Indian regulations in its brochure. So let’s have a look at them.</p>
<p align="JUSTIFY">India has five laws which regulate surveillance:</p>
<p align="JUSTIFY">1. The <span style="text-decoration: underline;"><a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf">Indian</a><a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"> </a><a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf">Telegraph</a><a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"> </a><a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf">Act</a></span>, 1885</p>
<p align="JUSTIFY">2. The <span style="text-decoration: underline;"><a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf">Indian</a><a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"> </a><a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf">Post</a><a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"> </a><a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf">Office</a><a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"> </a><a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf">Act</a></span>, 1898</p>
<p align="JUSTIFY">3. The <span style="text-decoration: underline;"><a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf">Indian</a><a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"> </a><a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf">Wireless</a><a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"> </a><a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf">Telegraphy</a><a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"> </a><a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf">Act</a></span>, 1933</p>
<p align="JUSTIFY">4. The <span style="text-decoration: underline;"><a href="http://www.delhidistrictcourts.nic.in/CrPC.htm">Code</a><a href="http://www.delhidistrictcourts.nic.in/CrPC.htm"> </a><a href="http://www.delhidistrictcourts.nic.in/CrPC.htm">of</a><a href="http://www.delhidistrictcourts.nic.in/CrPC.htm"> </a><a href="http://www.delhidistrictcourts.nic.in/CrPC.htm">Criminal</a><a href="http://www.delhidistrictcourts.nic.in/CrPC.htm"> </a><a href="http://www.delhidistrictcourts.nic.in/CrPC.htm">Procedure</a><a href="http://www.delhidistrictcourts.nic.in/CrPC.htm"> (</a><a href="http://www.delhidistrictcourts.nic.in/CrPC.htm">CrPc</a><a href="http://www.delhidistrictcourts.nic.in/CrPC.htm">)</a></span>, 1973: Section 91</p>
<p align="JUSTIFY">5. The <span style="text-decoration: underline;"><a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf">Information</a><a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"> </a><a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf">Technology</a><a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"> (</a><a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf">Amendment</a><a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf">) </a><a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf">Act</a></span>, 2008</p>
<p align="JUSTIFY">The <span style="text-decoration: underline;"><a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf">Indian</a><a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"> </a><a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf">Post</a><a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"> </a><a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf">Offices</a><a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"> </a><a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf">Act</a></span> does not cover electronic communications and the <span style="text-decoration: underline;"><a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf">Indian</a><a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"> </a><a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf">Wireless</a><a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"> </a><a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf">Telegraphy</a><a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"> </a><a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf">Act</a><a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"> </a></span>lacks procedures which would determine if surveillance should be targeted or not. Neither the <span style="text-decoration: underline;"><a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf">Indian</a><a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"> </a><a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf">Telegraph</a><a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"> </a><a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf">Act</a></span> nor the <span style="text-decoration: underline;"><a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf">Information</a><a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"> </a><a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf">Technology</a><a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"> (</a><a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf">Amendment</a><a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf">) </a><a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf">Act</a></span> cover mass surveillance, but are both limited to targeted surveillance. Moreover, targeted interception in India according to these laws requires case-by-case authorization by either the home secretary or the secretary department of information technology. In other words, unauthorized, limitless, mass surveillance is not technically permitted by law in India.</p>
<p align="JUSTIFY">The Indian Telegraph Act mandates that the interception of communications can only be carried out on account of <a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0">a</a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"> </a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0">public</a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"> </a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0">emergency</a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"> </a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0">or</a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"> </a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0">for</a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"> </a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0">public</a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"> </a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0">safety</a>. However, in 2008, the Information Technology Act copied most of the interception provisions of the Indian Telegraph Act, but removed the preconditions of public emergency or public safety, and instead expanded the power of the government to order interception for the “investigation of any offense”.</p>
<p align="JUSTIFY">The interception of Internet communications is mainly covered by the <a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0">2009 </a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0">Rules</a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"> </a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0">under</a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"> </a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0">the</a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"> </a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0">Information</a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"> </a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0">Technology</a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"> </a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0">Act</a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"> 2008 </a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0">and</a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"> </a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0">Sections</a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"> 69 </a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0">and</a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"> 69</a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0">B</a> are particularly noteworthy. According to these Sections, an Intelligence Bureau officer who leaked national secrets may be imprisoned for up to three years, while Section 69 not only allows for the interception of any information transmitted through a computer resource, but also requires that users disclose their encryption keys upon request or face a jail sentence of up to seven years.</p>
<p align="JUSTIFY">While these laws allow for the interception of communications and can be viewed as widely controversial, they do not technically permit the <i>mass</i> surveillance of communications. In other words, ClearTrail’s products, such as <a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"><span style="text-decoration: underline;">ComTrail</span></a>, which enable the mass interception of IP networks, lack legal backing. However, the <span style="text-decoration: underline;"><a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf">Unified</a><a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"> </a><a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf">Access</a><a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"> </a><a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf">Services</a><a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"> (</a><a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf">UAS</a><a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf">) </a><a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf">License</a><a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"> </a><a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf">Agreement</a></span> regarding the Central Monitoring System mandates mass surveillance and requires ISP and Telecom operators to comply.</p>
<p align="JUSTIFY">Through the licenses of the Department of Telecommunications, Internet service providers, cellular providers and telecoms are required to provide the Government of India direct access to all communications data and content <a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0">even</a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"> </a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0">without</a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"> </a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0">a</a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"> </a><a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0">warrant</a>, which is not permitted under the laws on interception. These licenses also require cellular providers to have ‘bulk encryption’ of less than 40 bits, which means that potentially any person can use off-the-air interception to monitor phone calls. However, such licenses do not regulate the capture of signal strength, target numbers like IMSI, TIMSI, IMEI or MSI SDN, which can be captured through ClearTrail’s <a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"><span style="text-decoration: underline;">mTrail</span></a> product.</p>
<p align="JUSTIFY"><span>More importantly, following <a class="external-link" href="http://www.financialexpress.com/news/states-begin-to-surrender-offair-phone-snooping-equipment/957859">allegations</a> that the National Technical Research Organization (NTRO) had been using off-the-air interception equipment to snoop on politicians in 2011, the Home Ministry issued a directive to ban the possession or use of all off-the-air phone interception gear. As a result, the Indian Government asked the Customs Department to provide an inventory of all all such equipment imported over a ten year period, and it was uncovered that as many as 73,000 pieces of equipment had been imported. Since, the Home Ministry has informed the heads of law enforcement agencies that there has been a <a class="external-link" href="http://m.indianexpress.com/news/state-govts-hand-over-few-offair-phonetapping-sets-to-centre/1185166/">compete ban on use of such equipment</a> and that all those who possess such equipment and fail to inform the Government will face prosecution and imprisonment. In short, ClearTrail's product, mTrail, which undertakes off-the-air phone monitoring is illegal and Indian law enforcement agencies are prohibited from using it. </span></p>
<p align="JUSTIFY">ClearTrail’s <a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">“</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">Astra</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">”</a> product is capable of remote infection and monitoring, which can push bot to any targeted machine sharing the same LAN. While India’s ISP and telecommunications licenses generally provide some regulations, they appear to be inadequate in regulating specific surveillance technologies which have the capability to target machines and remotely monitor them. Such <a href="http://www.dot.gov.in/licensing/access-services"><span style="text-decoration: underline;">licenses</span></a> mandate mass surveillance, but legally, wireless communications are completely unregulated, which raises the question of whether the interception of public Internet networks is allowed. In other words, it is not clear if ClearTrail’s <a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"><span style="text-decoration: underline;">QuickTrail</span></a> is technically legal or not. The <a class="external-link" href="http://www.auspi.in/policies/UASL.pdf">UAS License agreement</a><a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"> </a>mandates mass surveillance, and while the law does not prohibit it, it does not mandate mass surveillance either. This remains a grey area.</p>
<p align="JUSTIFY">The issue of data retention arises from <a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">ClearTrail</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">’</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">s</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">leaked</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">brochure</a>. In particular, ClearTrail states in its brochure that ComTrail - which undertakes mass monitoring of IP and Voice networks - retains data upon request, with a capacity that exceeds several years. xTrail - for targeted IP monitoring - has the ability to retain huge volumes of data which can potentially be used as proof in court. However, India currently lacks privacy legislation which would regulate data retention, which means that data collected by ClearTrail could potentially be stored indefinitely.</p>
<p align="JUSTIFY"><a class="external-link" href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf">Section 7 of the Information Technology (Amendment) Act, 2008</a>, deals with the retention of electronic records. However, this section does not state a particular data retention period, nor who will have authorized access to data during its retention, who can authorize such access, whether retained data can be shared with third parties and, if so, under what conditions. Section 7 of the Information Technology (Amendment) Act, 2008, appears to be incredibly vague and to fail to regulate data retention adequately.</p>
<p align="JUSTIFY">Data retention requirements for service providers are included in the <a href="https://cis-india.org/internet-governance/blog/data-retention-in-india" class="external-link">ISP and UASL licenses</a> and, while they clarify the type of data they retain, they do not specify adequate conditions for data retention. Due to the lack of data protection legislation in India, it remains unclear how long data collected by companies, such as ClearTrail, would be stored for, as well as who would have authorized access to such data during its retention period, whether such data would be shared with third parties and disclosed and if so, under what conditions.</p>
<p align="JUSTIFY">India currently lacks specific regulations for the use of various types of technologies, which makes it unclear whether <span style="text-decoration: underline;"><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">ClearTrail</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">’</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">s</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">spy</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">products</a></span> are technically legal or not. It is clear that ClearTrail’s mass interception products, such as ComTrail, are not legalized - since Indian laws allow for targeted interception- but they are mandated through the <span style="text-decoration: underline;"><a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf">UAS</a><a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"> </a><a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf">License</a><a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"> </a><a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf">agreement</a></span> regarding the Central Monitoring System.</p>
<p align="JUSTIFY">In short, the legality of ClearTrail’s surveillance technologies remains ambiguous. While India’s ISP and telecom licenses and the <a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf">UAS</a><a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"> </a><a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf">License</a><a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"> </a><a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf">Agreement</a> mandate mass surveillance, the laws - particularly the 2009 Information Technology Rules- mandate targeted surveillance and remain silent on the issue of mass surveillance. Technically, this does not constitute mass surveillance legal or illegal, but rather a grey area. Furthermore, while <a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf">India</a><a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf">’</a><a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf">s</a><a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"> </a><a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf">Telegraph</a><a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"> </a><a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf">Act</a>, <a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf">Information</a><a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"> </a><a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf">Technology</a><a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"> </a><a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf">Act</a><a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"> </a>and 2009 Rules allow for the interception, monitoring and decryption of communications and surveillance in general, they do not explicitly regulate the various types of surveillance technologies, but rather attempt to “legalize” them through the blanket term of surveillance.</p>
<p align="JUSTIFY">One thing is clear: India’s license agreements ensure that all ISPs and telecom operators are a part of the surveillance regime. The lack of regulations for India’s surveillance technologies appear to create a grey zone for the expansion of mass surveillance in the country. According to <span style="text-decoration: underline;"><a href="http://www.outlookindia.com/article.aspx?265192">Saikat</a><a href="http://www.outlookindia.com/article.aspx?265192"> </a><a href="http://www.outlookindia.com/article.aspx?265192">Datta</a></span>, an investigative journalist, a senior privacy telecom official stated:</p>
<blockquote class="italized">“<i>Do you really think a private telecom company can stand up to the government or any intelligence agency and cite law if they want to tap someone’s phone?” </i></blockquote>
<p style="text-align: justify; "></p>
<h3><b>Spy Files 3...and human rights in India</b></h3>
<p align="JUSTIFY">The facts speak for themselves. The latest Spy Files confirm that the same agencies involved in the development of the Central Monitoring System (CMS) are also interested in the latest surveillance technology sold in the global market. Spy Files 3 also provide data on one of India’s largest surveillance technology companies, <a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"><span style="text-decoration: underline;">ClearTrail</span></a>, which sells a wide range of surveillance technologies to law enforcement agencies around the world. And Spy Files 3 show us exactly what these technologies can do.</p>
<p align="JUSTIFY">In particular, ClearTrail’s <a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"><span style="text-decoration: underline;">ComTrail</span></a> provides mass monitoring of IP and voice networks, which means that law enforcement agencies using it are capable of intercepting millions of communications every day through Gmail, Yahoo, Hotmail and others, of correlating our identities across networks and of targeting our location. <span style="text-decoration: underline;"><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">xTrail</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"> </a></span>enables law enforcement agencies to monitor us based on our “harmless” metadata, such as our IP address, our mobile number and our email ID. Think our data is secure when using the Internet through a cyber cafe? Well <a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"><span style="text-decoration: underline;">QuickTrail</span></a> proves us wrong, as it’s able to assist law enforcement agencies in monitoring and intercepting our communications even when we are using public Internet networks.</p>
<p align="JUSTIFY">And indeed, carrying a mobile phone is like carrying a GPS device, especially since <a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"><span style="text-decoration: underline;">mTrail</span></a> provides law enforcement with off-the-air interception of mobile communications. Not only can mTrail target our location, listen to our calls and store our data, but it can also undertake passive off-the-air interception and monitor our voice, SMS and protocol information. Interestingly enough, mTrail also intercepts targeted calls from a predefined suspect list. The questions though which arise are: who is a suspect? How do we even know if we are suspects? In the age of the War on Terror, potentially anyone could be a suspect and thus potentially anyone’s mobile communications could be intercepted. After all, mass surveillance dictates that <span style="text-decoration: underline;"><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear">we</a><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"> </a><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear">are</a><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"> </a><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear">all</a><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"> </a><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear">suspicious</a><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"> </a><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear">until</a><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"> </a><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear">proven</a><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"> </a><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear">innocent</a><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear">. </a></span></p>
<p align="JUSTIFY">And if anyone can potentially be a suspect, then potentially anyone can be remotely infected and monitored by <a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"><span style="text-decoration: underline;">Astra</span></a>. Having physical access to a targeted device is a conventional surveillance mean of the past. Today, Astra can <i>remotely</i> push bot to our laptops and listen to our Skype calls, capture our Webcams, search our browsing history, identify our location and much more. And why is any of this concerning? Because contrary to mainstream belief, <span style="text-decoration: underline;"><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear">we</a><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"> </a><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear">should</a><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"> </a><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear">all</a><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"> </a><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear">have</a><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"> </a><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear">something</a><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"> </a><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear">to</a><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"> </a><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear">hide</a><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear">! </a></span></p>
<p align="JUSTIFY"><span style="text-decoration: underline;"><a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html">Privacy</a><a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"> </a><a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html">protects</a><a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"> </a><a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html">us</a><a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"> </a><a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html">from</a><a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"> </a><a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html">abuse</a><a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"> </a><a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html">from</a><a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"> </a><a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html">those</a><a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"> </a><a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html">in</a><a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"> </a><a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html">power</a><a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"> </a></span>and safeguards our individuality and autonomy as human beings. If we are opposed to the idea of the police searching our home without a search warrant, we should be opposed to the idea of our indiscriminate mass surveillance. After all, mass surveillance - especially the type undertaken by <span style="text-decoration: underline;"><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">ClearTrail</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">’</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">s</a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"> </a><a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf">products</a></span> - can potentially result in the access, sharing, disclosure and retention of data much more valuable than that acquired by the police searching our home. Our credit card details, our photos, our acquaintances, our personal thoughts and opinions, and other sensitive personal information can usually be found in our laptops, which potentially can constitute much more incriminating information than that found in our homes.</p>
<p align="JUSTIFY">And most importantly: even if we think that we have nothing to hide, it’s really not up to us to decide: it’s up to data analysts. While we may think that our data is “harmless”, a data analyst linking our data to various other people and search activities we have undertaken might indicate otherwise. Five years ago, <span style="text-decoration: underline;"><a href="http://www.timeshighereducation.co.uk/402844.article">a</a><a href="http://www.timeshighereducation.co.uk/402844.article"> </a><a href="http://www.timeshighereducation.co.uk/402844.article">UK</a><a href="http://www.timeshighereducation.co.uk/402844.article"> </a><a href="http://www.timeshighereducation.co.uk/402844.article">student</a><a href="http://www.timeshighereducation.co.uk/402844.article"> </a><a href="http://www.timeshighereducation.co.uk/402844.article">studying</a><a href="http://www.timeshighereducation.co.uk/402844.article"> </a><a href="http://www.timeshighereducation.co.uk/402844.article">Islamic</a><a href="http://www.timeshighereducation.co.uk/402844.article"> </a><a href="http://www.timeshighereducation.co.uk/402844.article">terrorism</a><a href="http://www.timeshighereducation.co.uk/402844.article"> </a><a href="http://www.timeshighereducation.co.uk/402844.article">for</a><a href="http://www.timeshighereducation.co.uk/402844.article"> </a><a href="http://www.timeshighereducation.co.uk/402844.article">his</a><a href="http://www.timeshighereducation.co.uk/402844.article"> </a><a href="http://www.timeshighereducation.co.uk/402844.article">Masters</a><a href="http://www.timeshighereducation.co.uk/402844.article"> </a><a href="http://www.timeshighereducation.co.uk/402844.article">dissertation</a><a href="http://www.timeshighereducation.co.uk/402844.article"> </a><a href="http://www.timeshighereducation.co.uk/402844.article">was</a><a href="http://www.timeshighereducation.co.uk/402844.article"> </a><a href="http://www.timeshighereducation.co.uk/402844.article">detained</a><a href="http://www.timeshighereducation.co.uk/402844.article"> </a><a href="http://www.timeshighereducation.co.uk/402844.article">for</a><a href="http://www.timeshighereducation.co.uk/402844.article"> </a><a href="http://www.timeshighereducation.co.uk/402844.article">six</a><a href="http://www.timeshighereducation.co.uk/402844.article"> </a><a href="http://www.timeshighereducation.co.uk/402844.article">days</a><a href="http://www.timeshighereducation.co.uk/402844.article">.</a></span> The student may not have been a terrorist, but his data said this: “Young, male, Muslim... who is downloading Al-Qaeda’s training material” - and that was enough for him to get detained. Clearly, the data analysts mining his online activity did not care about the fact that the only reason why he was downloading Al-Qaeda material was for his Masters dissertation. The fact that he was a male Muslim downloading terrorist material was incriminating enough.</p>
<p align="JUSTIFY">This incident reveals several concerning points: The first is that he was clearly already under surveillance, prior to downloading Al-Qaeda’s material. However, given that he did not have a criminal record and was “just a Masters student in the UK”, there does not appear to be any probable cause for his surveillance in the first place. Clearly he was on some suspect list on the premise that he is male and Muslim - which is a discriminative approach. The second point is that after this incident, it is likely that some male Muslims may be more cautious about their online activity - with the fear of being on some suspect list and eventually being prosecuted because their data shows that “they’re a terrorist”. Thus, mass surveillance today appears to also have implications on freedom of expression. The third point is that this incident reveals the extent of mass surveillance, since even a document downloaded by a Masters student is being monitored.</p>
<p align="JUSTIFY">This case proves that innocent people can potentially be under surveillance and prosecuted, as a result of mass, indiscriminate surveillance. Anyone can potentially be a suspect today, and maybe for the wrong reasons. It does not matter if we think our data is “harmless”, but what matters is who is looking at our data, when and why. Every bit of data potentially hides several other bits of information which we are not aware of, but which will be revealed within a data analysis. We should always <span style="text-decoration: underline;"><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear">“</a><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear">have</a><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"> </a><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear">something</a><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"> </a><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear">to</a><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"> </a><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear">hide</a><a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear">”</a></span>, as that is the only way to protect us from abuse by those in power.</p>
<p align="JUSTIFY">In the contemporary surveillance state, we are all suspects and mass surveillance technologies, such as the ones sold by <a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"><span style="text-decoration: underline;">ClearTrail</span></a>, can potentially pose major threats to our right to privacy, freedom of expression and other human rights. And probably the main reason for this is because surveillance technologies in India legally fall in a grey area. Thus, it is recommended that law enforcement agencies in India regulate the various types of surveillance technologies in compliance with the <a class="external-link" href="https://en.necessaryandproportionate.org/text">International Principles on Communications Surveillance and Human Rights.</a></p>
<p align="JUSTIFY">Spy Files 3 show us why our human rights are at peril and why we should fight for our right to be free from suspicion.</p>
<p align="JUSTIFY"> </p>
<p align="JUSTIFY">This article was <a class="external-link" href="http://www.medianama.com/2013/11/223-spy-files-3-wikileaks-sheds-more-light-on-the-global-surveillance-industry-cis-india/">cross-posted in Medianama </a>on 6th November 2013.</p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/blog/spy-files-three'>https://cis-india.org/internet-governance/blog/spy-files-three</a>
</p>
No publishermariaPrivacyInternet GovernanceSAFEGUARDSFeaturedHomepage2013-11-14T16:21:00ZBlog EntryBanking and Accessibility in India: A Report by CIS
https://cis-india.org/accessibility/blog/banking-and-accessibility-in-india-report
<b>The report gives an analysis of banking accessibility for persons with disabilities in India. Besides a detailed look at the legal provisions and guidelines on banking and technology, the report also provides a view on different disabilities in relation to banking and accessibility in India and contains case studies and guidelines from countries such as New Zealand, Australia, the United States of America, Canada and the Netherlands. The report sums up the analysis with suggestions and recommendations to improve banking accessibility for persons with disabilities in India.</b>
<h2>Executive Summary</h2>
<p style="text-align: justify; ">India is a signatory to the United Nations Convention on the Rights of Persons with Disabilities (CRPD), and has an obligation to provide equal opportunities and facilities to everyone, irrespective of any disabilities they might suffer from. This is guaranteed in the right to equality and the right to life, which are enshrined in the fundamental rights in the Constitution of India. There are specific Reserve Bank of India (RBI) notifications that mandate banks to offer banking facilities in a non-discriminatory manner to all customers. Nevertheless, there are many problems faced by people with disabilities while accessing banking and financial services in India. For instance, many banks and Automated Teller Machines (ATMs) are not physically accessible, staff has no training or expertise in dealing with customers who have special needs, and despite the existence of technology, and ATMs are not equipped to be used by people with disabilities.</p>
<p style="text-align: justify; ">There are several international guidelines which can be referred to while formulating policy on banking accessibility, such as guidelines on ATM construction and modification (USA) and guidelines on making websites accessible for people with disabilities (the Web Content Accessibility Guidelines), as well as voluntary standards that have been taken up by banking associations in countries like Australia and New Zealand in order to make banking more accessible to people with disabilities and the elderly population.</p>
<p style="text-align: justify; ">The adoption of accessibility features and technologies in Indian banks today is very low, despite there being a legislative as well as executive push for the same. Banks which do not follow these guidelines are not meeting their legal requirements, and it is important for them to understand not just their obligations, but also the benefits that will accrue to them if they follow the suggested guidelines. To that end, this report looks at the current notifications and guidelines that govern this area, the problems faced by people with disabilities, and looks at guidelines from other countries to suggest solutions that can be incorporated by different banks in India.</p>
<h2 style="text-align: justify; ">Introduction</h2>
<p style="text-align: justify; ">As per the 2001 Census, there are around 2.19 crore persons with disabilities in India. They constitute 2.13 per cent of the total population of the country.<a href="#fn1" name="fr1">[1]</a> This includes persons with visual, hearing, speech, locomotor and mental disabilities. Despite these numbers, there is a lack of understanding of their needs, and people with disabilities face a number of obstacles when it comes to living a normal life, and availing banking facilities is a big part of the problem. Consider the fact that only 50 out of the 1.04 lakh Automated Teller Machines (ATMs) in India are accessible to people with disabilities.<a href="#fn2" name="fr2">[2]</a> There is a general lack of infrastructure and awareness in India that permits people with disabilities to use banking services. This translates to problems not just in accessing a physical bank and seeking help from a bank official, but also extends to accessing services such as ATM machines and online banking options. The problem is exacerbated by the fact that around 75 per cent of persons with disabilities live in rural areas, and only around 49 per cent of the disabled population is literate and only 34 per cent is employed.<a href="#fn3" name="fr3">[3]</a> Although one may find some rare cases of disabled-friendly banking options in the metros, in the rural areas, there are neither facilities nor is there any sensitisation towards meeting the needs of the disabled.</p>
<p style="text-align: justify; ">India is a signatory to both the United Nations Convention on the Rights of Persons with Disabilities, 2006<a href="#fn4" name="fr4">[4]</a> (hereinafter, “UNCRPD”) and Biwako Millennium Framework towards an Inclusive, Barrier-free and Rights-based Society for PWDs in Asia and the Pacific, 2002<a href="#fn5" name="fr5">[5]</a> and thus has an international obligation to ensure equal access to all members of the population. This obligation extends to giving people with disabilities the right to conduct banking services. This has been recognised by several Reserve Bank of India (RBI) directives as well, although these guidelines have not been fully implemented so far.</p>
<p style="text-align: justify; ">Currently, it is very difficult for people with disabilities to use banking services in India. If a person who has a hearing disability walks into a branch for a home loan, the branch does not have a person who can understand or interpret sign language. More usually, the branch does not even have the resources or knowledge about whom to contact to facilitate the interaction by interpreting. These obstacles mean that a person with disability/ies always has to latch on to someone who is fully capable to help them. Without such help in the form of guarantors or co-borrowers who are fully capable, the chances of obtaining finance from the banks are low because bank's probably give a person with disability/ies a much lower credit rating based on their own internal criteria. These determinations automatically put the disabled at a disadvantage. A person with a learning disability, for example, dyslexia, will face severe difficulty filling out an application form (or any document for that matter) and banks are not disabled friendly in terms of the attitude of the staff towards such difficulties.</p>
<p style="text-align: justify; ">Making banking accessible for people with disabilities is both a best practice that should be followed, as well as a sound commercial decision. There are a large number of people in India with differing levels of disability, who would benefit from using banking services. Additionally, the number of people will only increase with time as India’s young population grows old, since incidence of disability increases with age.<a href="#fn6" name="fr6">[6]</a> The Internet, above all, is a tool for people with disabilities to bridge the differences between them and others, and all efforts must be made to ensure that they are not at a disadvantage when it comes to using services such as net banking. There is also the consideration that improving accessibility improves access for all users, and makes it possible for them to make use of more services. A lot of accessibility issues (such as the physical accessibility to branches and ATMs, signature mismatches due to hand tremors or strokes) are common to the disabled, the elderly and those with neurological conditions. Taken together, this constitutes a significant percentage of the customer base — so these issues should be addressed by banks for that reason alone.</p>
<p style="text-align: justify; ">This report will look at the legal imperatives that govern accessibility in banking services in India, and look at the various problems being faced by people with disabilities when trying to use banks. It will also look at sample guidelines from other countries and suggest best practices for banking institutions, as well as take a look at the various costs that could be incurred in trying to make their banks more accessible.</p>
<p style="text-align: justify; ">The scope of this report is restricted to covering only basic banking services in India, and other financial services, such as insurance and loans, have not been dealt with.</p>
<h2 style="text-align: justify; ">Legal Imperatives</h2>
<p style="text-align: justify; ">The rights of persons with disabilities have been recognised under various legal instruments, and it has been established that they are to be given the same services and privileges as other members of society.</p>
<h3 style="text-align: justify; ">Constitutional Provisions</h3>
<p style="text-align: justify; ">Part III of the Constitution of India, which deals with the fundamental rights of citizens, recognizes the principle of equality of all people. Article 14 states that the government must accord equal protection of the law to any person within the territory of India.<a href="#fn7" name="fr7">[7] </a>This recognition of the importance of non-discrimination means that the state must ensure that people with disabilities do not suffer disadvantages when it comes to accessing public services.</p>
<p style="text-align: justify; ">Article 15, which deals with prohibition of discrimination on various grounds states that no citizen is to be subject to any disability, liability or restriction with regard to access to shops, public restaurants, and other public places.<a href="#fn8" name="fr8">[8]</a></p>
<p style="text-align: justify; ">It is evident that this important constitutional protection extends to people with disabilities, and it is their right to gain equal and accessible access to all manner of services, including banking.</p>
<h3 style="text-align: justify; ">Legislation dealing with Disability</h3>
<p style="text-align: justify; ">There are several national laws that deal with the rights of people with disabilities, though not all of these laws have a direct bearing with banking.</p>
<h3 style="text-align: justify; ">The Persons with Disabilities (Equal Opportunities, Protection of Rights and Full Participation) Act, 1995</h3>
<p style="text-align: justify; ">The Persons with Disabilities (Equal Opportunities, Protection of Rights and Full Participation) Act, 1995 (“the PWD Act”) was enacted to give effect to the proclamation on the full participation and equality of people with disabilities on both central and state governments. The PWD Act has been enacted under Article 253 of the Constitution.<a href="#fn9" name="fr9">[9] </a>It has several provisions for people with disabilities, including education, employment, creation of barrier free environment, social security and similar overlooked areas. It provides for a three tier arrangement:</p>
<p style="text-align: justify; ">For evolution of policy for the benefit of persons with disabilities Implementation of the provisions of the Act and laws, policies, etc., and monitoring implementation and redressing grievances.</p>
<p style="text-align: justify; ">The implementation of the Act relies on collaboration between the appropriate governments, which includes various central ministries and departments, state and union territories, and local bodies.<a href="#fn10" name="fr10">[10]</a></p>
<p style="text-align: justify; ">Chapter VIII of the Act deals with non-discrimination, and one of the measures it recommends is making buildings accessible by simple measures such as curb cuts and slopes in the pavements for wheelchair users.</p>
<p style="text-align: justify; ">There are several problems with the enactment.<a href="#fn11" name="fr11">[11]</a> The terms "accessibility" and "disability" are not clearly defined. They are also not provided as a matter of right but are based on the economic capacity of the service provider. It also fails to consider the access to services and information. However, public banks need to be conscious, since they will usually be considered to have sufficient economic capacity, and might be bound to deliver their services to people with disabilities. This has often become an issue in other jurisdictions as well. In 2009, the Royal Bank of Scotland, for example, was forced to pay extensive damages to a disabled student who was unable to access the bank due to a lack of wheelchair lifts.<a href="#fn12" name="fr12">[12]</a></p>
<h3 style="text-align: justify; ">The National Trust for the Welfare of Persons with Autism, Cerebral Palsy, Mental Retardation and Multiple Disabilities Act, 1999</h3>
<p style="text-align: justify; ">The trust is intended to give complete care to people with mental retardation and cerebral palsy, and also manage the properties bequeathed to the trust. The trust supports programmes that promotes independence and address the concerns of these special persons, especially the ones who do not have family support. The trust is also empowered to receive grants, donations, benefactions, requests and transfers.<a href="#fn13" name="fr13">[13]</a></p>
<h3 style="text-align: justify; ">The Mental Health Act, 1987</h3>
<p style="text-align: justify; "><b> </b>The Act consolidates and amends the law relating to the treatment and care of mentally ill persons, in order to make better provisions with respect to their property and affairs, and other incidental matters.<a href="#fn14" name="fr14">[14]</a></p>
<h3 style="text-align: justify; ">The Rehabilitation Council of India Act, 1992</h3>
<p style="text-align: justify; "><b> </b>The Act was created to provide for the constitution of the Rehabilitation Council of India for regulating training of the rehabilitation professionals and maintaining of a central rehabilitation register. It also regulates the recognized rehabilitation qualifications, and prescribes minimum standards of education.<a href="#fn15" name="fr15">[15]</a></p>
<h3 style="text-align: justify; ">RBI Notifications</h3>
<p style="text-align: justify; ">The most important resource when it comes to banking guidelines is the RBI, which comes out with regular notifications. The RBI has been conferred wide powers under the Banking Regulation Act, 1949 (BRA),<a href="#fn16" name="fr16">[16]</a> under which it can supervise and control the various banking companies, and they are bound to follow its directions. Section 35A of the Act specifies that in public interest or in the interest of banking policy, the RBI can issue such directions as it deems fit, and the banking companies or the banking company, as the case may be, shall be bound to comply with such directions.<a href="#fn17" name="fr17">[17]</a></p>
<p style="text-align: justify; ">RBI has released several notifications dealing with the rights of the disabled.</p>
<h3 style="text-align: justify; ">Circular on grant of banking facilities to the visually challenged</h3>
<p style="text-align: justify; "><b> </b>In its Circular DBOD. No. Leg BC. 91 /09.07.005/2007-08 dated June 4, 2008,<a href="#fn18" name="fr18">[18]</a> the RBI mandated that banking facilities (including cheque book facility, operation of ATM, locker, etc.) cannot be denied to the visually challenged as they are legally competent to contract.</p>
<p style="text-align: justify; ">In the notification, the RBI recalled the order of the Chief Commissioner for Persons with Disabilities, which had earlier been passed by the Indian Banks’ Association (“IBA”) to its member banks. The Order instructed that banks should offer all the banking facilities including cheque book facility, ATM facility and locker facility to the visually challenged and also assist them in withdrawal of cash. This order has reiterated that there can be no denial of services just because there is an apprehension of risk in operating or using the facility; it said that a similar security threat exists for all members of the population.</p>
<p style="text-align: justify; ">As per the RBI notification, the banks are therefore bound to:<br />Ensure that all the banking facilities such as cheque books are offered to the visually impaired without any discrimination. These facilities should include third party cheques, ATM, net banking, locker, retail loan and credit card facilities.</p>
<p style="text-align: justify; ">Advise their branches to render all possible assistance to the visually impaired for availing the various banking facilities.</p>
<h3 style="text-align: justify; ">Circular on making ATMs accessible</h3>
<p style="text-align: justify; "><b> </b>The RBI had been receiving several suggestions to make branches and ATMs easily accessible to people with disabilities by providing ramps so that wheel chair users can access them and the height of the machine is also appropriate for them. It had also been receiving suggestions for installing speaking software and key pads with letters in Braille to facilitate use by persons with visual impairment. After considering these suggestions, the RBI passed a notification, directing the banks to implement such measures.</p>
<p style="text-align: justify; ">As per its Circular DBOD. No. Leg BC. 91 /09.07.005/2007-08 dated June 4, 2008, RBI has directed all banks to provide:</p>
<ul>
<li style="text-align: justify; ">Ramps to ATMs: Banks have to take necessary steps to provide all existing ATMs or future ATMs with ramps so that wheelchair users or persons with disabilities can easily access them and also make arrangements in such a way that the height of the ATM does not create an impediment in its use by a wheelchair user.</li>
<li style="text-align: justify; ">Ramps at bank entrances: Banks may also take appropriate steps including providing ramps at the entrance of the bank branches so that the persons with disabilities or wheelchair users can enter the bank branches and conduct business without much difficulty.</li>
<li style="text-align: justify; ">Accessible ATMs: Banks should make at least one third of new ATMs installed as talking ATMs with Braille keypads and place them strategically <span>in consultation with other banks</span> to ensure that at least one talking ATM with Braille keypad is generally available in each locality for catering to needs of visually impaired persons.</li>
<li style="text-align: justify; ">Information about the ATMs: Banks should also bring the locations of such talking ATMs to the notice of their disabled customers.</li>
</ul>
<h3 style="text-align: justify; ">Circular on implementation of the guidelines</h3>
<p style="text-align: justify; "><b> </b>These guidelines were strongly reiterated as recently as September 5, 2012, where the RBI by its notification numbered DBOD.No. Leg.BC. 38/09.07.005/2012-13<a href="#fn20" name="fr20">[20] </a>highlighted the abovementioned circulars. It said that it had been brought to their notice by the Office of the Chief Commissioner for Persons with Disabilities that visually challenged persons are facing problems in availing banking facilities like internet banking.</p>
<p style="text-align: justify; ">Banks were advised under this notification to strictly adhere to instructions contained in the above circulars and extend all banking facilities to persons with blindness, low-vision and other disabilities.</p>
<h3 style="text-align: justify; ">Circular on guardianship certificates</h3>
<p style="text-align: justify; "><b> </b>The RBI, by its Master Circular DBOD.No.Leg.BC.9/ 09.07.006/ 2009-10<a href="#fn21" name="fr21">[21]</a>dated July 1, 2009 on Customer Service, directed banks to accept guardianship certificates issued by local level committees set up under the National Trust Act, enabling persons with disabilities like autism and cerebral palsy to open and operate accounts. Banks were advised to rely on the guardianship certificate issued either by the district court under the Mental Health Act or by the local level committees under the National Trust Act for the purposes of opening and operating bank accounts<a href="#fn22" name="fr22">[22]</a> by the legal guardians for people with disabilities that is covered under the Act. Banks were also advised to ensure that their branches give proper guidance so that the parents or relatives of the person with disability/ies do not face any difficulties in this regard. It has also directed that information about the opening of such bank accounts be displayed conspicuously, in both English as well as the regional language, in its circular RBI /2009-10/142.<a href="#fn23" name="fr23">[23]</a><i> This notification was in response to a Delhi High Court decision that directed banks to put up such information</i>.</p>
<p style="text-align: justify; ">Banks are therefore directed to:</p>
<ul>
<li style="text-align: justify; ">Accept guardianship certificates: Banks can accept certificates issued by local level committees set up under the National Trust Act or district court under the Mental Health Act, so that persons with disabilities like autism and cerebral palsy can open and operate accounts.</li>
<li style="text-align: justify; ">Provide assistance: Banks should ensure that their branches give proper guidance so that the parents or relatives of the person with disability/ies do not face any difficulties.</li>
<li style="text-align: justify; ">Display information: Banks should ensure that information about the opening of such bank accounts be displayed conspicuously, in both English as well as the regional language.</li>
</ul>
<h3 style="text-align: justify; ">National Policy on Disability</h3>
<p style="text-align: justify; "><b> </b>The National Policy for Persons with Disabilities, which was published in 2006, recognizes the extent of problems faced by the disabled in India. The report also discusses the number of citizens who are affected by disability: “According to the Census 2001, there are 2.19 crore persons with disabilities in India who constitute 2.13 per cent of the total population. This includes persons with visual, hearing, speech, locomotor and mental disabilities. Seventy five per cent of persons with disabilities live in rural areas, 49 per cent of disabled population is literate and only 34 per cent are employed. The earlier emphasis on medical rehabilitation has now been replaced by an emphasis on social rehabilitation. There has been an increasing recognition of the abilities of persons with disabilities and emphasis on mainstreaming them in the society based on their capabilities.”<a href="#fn24" name="fr24">[24] </a>The policy endorses accessibility and says that a barrier-free environment enables people with disabilities to move about safely and freely, and use the facilities within the built environment. In the principle areas of intervention identified by the policy, it ensures that banking services are made barrier free and accessible.<a href="#fn25" name="fr25">[25] </a></p>
<p style="text-align: justify; ">The National Policy is intended to inform the disability plan to be incorporated in the 11th Five Year plan,<a href="#fn26" name="fr26">[26] </a>which will have a timeline and funds for programmes which can be allotted through the Finance Commission.</p>
<h2 style="text-align: justify; ">Explaining Disabilities</h2>
<p style="text-align: justify; ">There are many problems faced by people with disabilities when they consider banking and financial services. From the very beginning, banks are a complicated route to charter for people with disabilities. Banks often resort to complex schemes and pricing systems, which can be difficult to understand for people with cognitive disabilities.<a href="#fn27" name="fr27">[27] </a>Finding bank branches and ATMs in their neighbourhood which are disabled-friendly and can be accessible to them is another difficulty, especially in a place like India where finding information is often a problem. There might be problems with physical accessibility — lack of ramp which makes it impossible for a wheelchair-bound person to use a bank or uncomfortable height of an ATM which makes it unwieldy for a wheelchair-bound person to access it — which can extend to the virtual realm as well: if a bank’s website is not complying with the standards for web-accessibility (discussed below) and is difficult to use by people with disabilities, they will be unable to take recourse to internet banking, as well.</p>
<p style="text-align: justify; ">In many countries such as Australia<a href="#fn28" name="fr28">[28]</a> there is great reliance on phone banking, which can be especially helpful to blind customers, or on audio-based telephone devices, which can be used by deaf-blind or the deaf customers. However, neither technology is at present available in India; text-based alternatives or spoken prompts (TTY based telephone banking) are not used by any banks. It is therefore essential that if a customer is using the interactive voice response (“IVR”) system of a bank and speaking to a bank representative on the phone to get a transaction done that the communication be clear, precise and easy to follow — as anyone who has attempted phone banking in India would testify, that is certainly not the case.</p>
<p style="text-align: justify; ">Let us take a look at some specific disabilities and what banks can do to ensure accessibility to their customers:</p>
<h3 style="text-align: justify; ">Problems faced by the hearing impaired while banking</h3>
<p style="text-align: justify; "><b> </b>When a person who cannot hear goes to a bank, the first problem they face is the fact that unless they are proficient at lip reading, they will find it difficult to communicate with the bank officials or tellers even when undertaking simple tasks like withdrawing money or depositing cheques. An important point to remember is that most hearing impaired people are more familiar with sign language than with English, and so can get confused by the complicated language used by the banks in their brochures and information booklets. If a deaf customer is communicating with the bank official by writing out instructions, it could take a longer time than other customers and they might face problems with other customers.</p>
<p style="text-align: justify; ">Another problem that might occur is that error messages or other audio cues might not be picked up by customers who are using multimedia based banking services or ATM machines.<a href="#fn29" name="fr29">[29]</a> This problem is exacerbated when using customer care services for banks, which are usually available only on the phone. With a lack of technological options for the hearing impaired, they are unable to access the IVR systems, or interact with customer care executives, which make it difficult for them to avail of all banking service facilities.</p>
<p style="text-align: justify; ">What can banks do?</p>
<ul>
<li>Training: Ensure that the bank staff is sensitised to the needs of the disabled and deaf customers, and know of a sign language translator who can be called if a customer requires it.</li>
<li style="text-align: justify; ">Ease of understanding: Make the instructions — both in the physical banks as well as in ATMs and websites — simple and precise, so they are easily understood. This will help all customers, not just those with disabilities.</li>
<li style="text-align: justify; ">Technical solutions: One solution available in some countries is using a phone-to-text machine or software that enables hearing impaired customers to use the phone banking and customer care services of a bank. For example, the Royal Bank of Scotland users can use a Typetalk or BT Textdirect service which will enable them to speak to an operator and so convey their messages.<a href="#fn30" name="fr30">[30]</a> If a bank feels that sufficient customers will benefit from such a technology, it should invest in it.</li>
<li style="text-align: justify; ">Sign language interpretation: A more low-tech solution is to offer interpretative services, where customers who need it can be assisted by someone who is proficient in sign language to help relay their point across to the bank.</li>
</ul>
<h3 style="text-align: justify; ">Problems faced by the visually impaired while banking</h3>
<p style="text-align: justify; ">Visually impaired customers can find it difficult to navigate and even reach their banks, if the path is not clear and if the building is not provided with enough ramps and clear entrances. Even understanding the terms and conditions of banks and their services are difficult to comprehend, because the language used to describe services and procedures is confusing and complicated. Often, a booklet with the terms and conditions is simply handed over with no concern for how the person is supposed to read them. Visually impaired people might also face problems in distinguishing details on cheques and other financial instruments which, unlike currency, do not have physically distinguishable marks on them.</p>
<p style="text-align: justify; ">Visually impaired customers often face a lot of problems while using ATMs, because the keys are not marked with recognisable lettering in Braille. Even when there is a token raised symbol on the middle key or Braille markings on the keypad for tactile recognition, there is still the problem that what is being displayed on the touchscreen, as well as the instructions on how to proceed with a transaction, are not capable of being communicated. Most ATMs in India are not equipped with an audio jack, and so can’t be used by blind customers who want to connect headphones and hear the display on the screen.</p>
<p style="text-align: justify; ">There is also the problem of signature mismatches, especially when it comes to opening accounts and signing cheques. Currently the bank’s solution is to not have the person with disability/ies sign the cheque, which is not a solution that works consistently, especially when a person with disabilities is running a company. There should be a separate process in place to facilitate issuance of cheques by the visually impaired.<a href="#fn31" name="fr31">[31]</a></p>
<p style="text-align: justify; ">The first and most obvious problem with the visually impaired using net banking and other services on the internet is that they won’t be able to see the screen. Similarly, when they attempt to use the ATM machines, the screen cannot be read and the keyboard functions are often unclear. The problem is often accentuated for people with low vision, because the improper lighting, low contrast print and other glares make it difficult to make out what the screen says.<a href="#fn32" name="fr32">[32]</a> Some sites have a security requirement where users have to input CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) codes in order to validate their payment or to register for a particular service; using such security codes can be particularly problematic for blind customers.<a href="#fn33" name="fr33">[33]</a> Banks websites might have pop ups or automatic music playing, which makes it difficult for the visually impaired to use their screen readers. Another problem arises in the mobile applications (“apps”) that are used by various banks; the format is not supported by screen readers on smartphones, and so customers with disabilities can’t use the facility made available to others.</p>
<p style="text-align: justify; ">What can banks do?</p>
<ul>
<li style="text-align: justify; ">Training: Sensitise the staff to the needs of blind customers, and ensure that there is a customer care executive who is present when a visually impaired customer needs assistance with a particular service.</li>
<li style="text-align: justify; ">Accessible formats: Printing out bank documents or statements in large size fonts, Braille or in audio script format if required is the first thing that banks can do to assist their visually impaired customers. Banks can also try to migrate towards accessible e-text or DAISY formats for their disabled customers.</li>
<li style="text-align: justify; ">Banking Guide: Coming out with a bank note guide to help identify the different bank notes and counterfeits, if any, is also important for visually impaired people who rely on their sense of touch. Similarly, an accessible format guide that takes you through the various steps that are involved in withdrawing cash or using an ATM would greatly assist blind customers who are using a new format or type of bank machine for the first time. At the same time, increasing the screen size and resolution of ATM screens would go a long way in improving access to the customers.</li>
<li style="text-align: justify; ">Templates: Banks can also be encouraged to come out with cheque book templates, so that blind users can familiarise themselves with using such bank documents and the process of writing cheques becomes easier for them.<a href="#fn34" name="fr34">[34] </a>Banks should also develop a better solution to the problem of visually impaired customer’s inability to sign cheques.</li>
<li style="text-align: justify; ">Open format statements: Banks should also ensure that when they provide customers with statements, they are made available in open formats, such as HTML or RTF, so that they can easily be read by screen readers. </li>
<li style="text-align: justify; ">Technical solutions: There are some alternatives to the CAPTCHA codes available, such as audio codes or maths questions. Some sites have the option of hearing the codes, instead of just seeing them. There are also human aided accessible CAPTCHA services (such as Solona), where the customer can send a screenshot of the screen to an aide. However, this has several security and privacy implications, and so is not an ideal solution. Multimedia on the websites of banks should be made optional, with a clear possibility of turning the music or animation off, so that users can use the screen reader without any problems. </li>
<li style="text-align: justify; ">Mobile apps: Banks should work with their technology partners to ensure that their mobile apps are accessible on all devices and can be used by customers using assistive technology. </li>
<li style="text-align: justify; ">Improved ATMs: Several banks around the world are switching to ATMs which give output in multiple formats, such as audio and large-font print,<a href="#fn35" name="fr35">[35]</a> making them more user friendly. There are several guidelines in effect in various jurisdictions which describe better design for ATMs, which takes into account the physical needs of disabled customers; newer ATMs which are set up should be asked to conform to such standards. While this is slowly starting to take place, more banks need to expand and improve their building structures keeping such guidelines and needs in mind. This has been discussed in the next section on ATM Guidelines. </li>
<li style="text-align: justify; ">Sensitisation: Special care should be taken to explain terms and conditions to visually impaired persons — there should be an effort to ensure that the person who is opening an account has understood the various terms and conditions and not just heard them.</li>
</ul>
<h3 style="text-align: justify; ">Problems faced by those with physical disabilities while banking</h3>
<p style="text-align: justify; "><b> </b>In India, a major problem is the physical accessibility of banks, with hardly any buildings being equipped with ramps and elevators; even if the bank itself is made accessible via these architectural modifications, the area surrounding the bank, for example, the market place, might be difficult to reach for people in wheelchairs, ultimately making it very difficult for them to use banks.</p>
<p style="text-align: justify; ">People with physical disabilities might find controlling their limbs for prolonged periods to be a problem, and so would find it difficult to use not just the physical banking services, but also internet services which necessitate controlling a mouse for a long period of time.</p>
<p style="text-align: justify; ">What can banks do?</p>
<ul>
<li style="text-align: justify; ">Build ramps: The most important step that needs to be taken by different banking institutions is ensuring that their ATMs and branches are accessible through a ramp, so that it is physically possible to reach from the road or other public area.</li>
<li style="text-align: justify; ">Elevators: Where possible, elevators should also be provided.</li>
<li style="text-align: justify; ">Special measures: Within the bank, there should be special provisions for people in wheelchairs or crutches, such as a designated queue and teller, so that they do not have to wait in queue for a long period of time.</li>
</ul>
<h3 style="text-align: justify; ">Problems faced by those with cognitive disabilities while banking</h3>
<p style="text-align: justify; "><b> </b>People with cognitive disabilities might have lower attention spans and might have problems with understanding complicated bank procedures and requirements. If the steps involved in using an ATM or other physical transactions are not logical and simple, people with cognitive disabilities will be unable to handle them. As a lot of Indian banks are rather chaotic and the transactions lack a certain consistency, people with cognitive disabilities could face a lot of problems adjusting. People who have cognitive disabilities might also be relying on their guardians or parents to assist in operating their bank accounts, and legal and bureaucratic hurdles to doing so can be a big hassle.</p>
<p style="text-align: justify; ">The front staff at banks are often improperly trained and do not have a holistic understanding of how to deal with people with disabilities. It has also been observed that while banks can be helpful while opening accounts, they are not open-minded about granting loans to people with disabilities.<a href="#fn36" name="fr36">[36]</a></p>
<p style="text-align: justify; ">Customers who are autistic have hand function issues which can cause their signatures not to match the ones on record, which again causes problems when it comes to opening accounts or signing cheques which ultimately bounce.</p>
<p style="text-align: justify; ">What can banks do?</p>
<ul>
<li style="text-align: justify; ">Sensitisation: Sensitise the staff to the special needs of customers with cognitive disabilities.</li>
<li style="text-align: justify; ">Display of information: Information for guardians of such customers, on the requirements for opening bank accounts, should be prominently displayed in the branches of the bank (Refer to Section 4.3.4).</li>
<li style="text-align: justify; ">Uniformity in procedures: Banks should make uniform guidelines or procedures to be followed for each transaction, so that there is a certainty and regularity that eases the way for people with cognitive disabilities.</li>
<li style="text-align: justify; ">Clear language: Banks should also ensure that they use extremely simple and clear language in all their transactions as well as literature in order to mitigate confusion.<a href="#fn37" name="fr37">[37]</a> </li>
<li style="text-align: justify; ">Identity establishment: There need to be rules put in place to allow those who are unable to sign properly to establish identity in some other manner.</li>
</ul>
<h2 style="text-align: justify; ">Guidelines on Banking Services and Technology</h2>
<p style="text-align: justify; ">The previous section has looked at some of the problems being faced by people with disabilities when they access banking services in India. This section will look at some guidelines and best practices which are aimed at increasing the accessibility of services.</p>
<h3 style="text-align: justify; ">Mobile banking</h3>
<p>There is the possibility of accessing a variety of financial services through mobile devices, which are termed as mobile banking or “m-banking”. This accessibility means that a lot of people with disabilities who live in rural areas, who have earlier not been able to access banks, can now do so using their mobile phones. Mobile banking also makes it much easier for customers with bank accounts to access their details and do transactions — for people with disabilities, this is a big step forward, as it means they do not have to endure the hassle and inconvenience of going to a bank, where they may not find the assistance that they need.</p>
<p>Currently, mobile banking is not that prevalent in India; less than one per cent of current bank customers are covered under the mobile banking services.<a href="#fn38" name="fr38">[38]</a></p>
<p style="text-align: justify; ">However, the growth in mobile banking transactions has shown an increasing trend. For example, in the month of June 2012, 3.43 million transactions amounting to Rs. 3067.10 million were processed, as compared to 1.41 million transactions amounting to Rs. 984.66 million processed in June 2011 — an increase of about 143 per cent in volume and approximately 211 per cent in value terms.<a href="#fn39" name="fr39">[39]</a></p>
<p style="text-align: justify; ">The Reserve Bank of India has passed some operating guidelines for mobile banking transactions.<a href="#fn40" name="fr40">[40]</a> These guidelines specify the technology and security standards, as well as the requirements for interoperability between operators, transaction limits and procedure for grievance redressal. They also tackle customer protection issues.</p>
<p style="text-align: justify; ">Banks should leverage the flexibility and utility of mobile banking in increasing access to their customers who have disabilities, as it would mean lesser expenses for both the banks as well as the customers.</p>
<h3 style="text-align: justify; ">Internet banking</h3>
<p style="text-align: justify; ">Internet banking is increasingly popular with customers, due to its convenience and ease of use; it removes the necessity of physically going to a bank. Since physical banks are often difficult for people with disabilities to navigate, internet banking could provide the best solution (though there are several problems with this medium as well, as have been described in the previous chapter). However, banks can make their websites more accessible and follow the prescribed guidelines to ensure a better banking experience not just for their disabled customers, but for all customers.</p>
<p style="text-align: justify; ">The biggest obstacle that comes with developing net banking options which are accessible to all is the wide diversity in the people who are trying to access the banks’ websites, and it is here that universal design comes into play. “The goal of universal design is to have each web page accessible by all people, instead of providing separate web pages for people with disabilities. This requires, for example, for people who are blind, textual equivalents for all images, and reading order and structure compatible with screen reading; for people who are deaf, visual equivalents such as captions for all audio information; and for people with motor disabilities, means to navigate the page without fine motor control.”<a href="#fn41" name="fr41">[41]</a></p>
<p style="text-align: justify; ">There are a set of standards in place for website accessibility. The Web Content Accessibility Guidelines (“WCAG”) 2.0 specify the manner in which the material on any website is to be perceivable, operable, understandable and robust.<a href="#fn42" name="fr42">[42]</a> Under these four stated principles of web content accessibility, twelve guidelines have been given, which give the web content developers a framework and set of objectives to understand the needs of the disabled. There are also levels of conformance that are defined for each guideline, and a list of sufficient and advisory techniques has also been given.<a href="#fn43" name="fr43">[43]</a></p>
<p style="text-align: justify; ">The WCAG 2.0 Guidelines includes some basic steps, such as including text alternatives for all non-text objects, including descriptors or captioning for images, audio and animated sequences, and following a style sheet wherever possible, in order to maintain a consistent design. The guidelines deal with visibility and display (using contrasting colours for background and text; using relative sizing so that the text can be increased to upto 200 per cent), functionality (providing skip links such as “Back to Top”; ensuring that animation can be paused or switched off; ensuring keyboard as well as mouse functionality), and formatting (ensuring the text is not justified; setting the language attribute of each page; providing clear navigation mechanisms; ensuring that all mark up is validated and coded correctly), amongst others.<a href="#fn44" name="fr44">[44]</a></p>
<p style="text-align: justify; ">The National Informatics Centre (NIC) has developed some guidelines for government websites, which contain best practices for accessibility in website design; these guidelines were released in 2009, and are mandated for governmental websites. The guidelines are classified into three categories: mandatory, advisory and voluntary; a compliance matrix has been provided for various departments and organisations to assess their compliance with the guidelines.<a href="#fn45" name="fr45">[45]</a> It is crucial that banks comply with these guidelines to ensure that a certain basic minimum standard at web accessibility is met for the banking customers across all websites.</p>
<p style="text-align: justify; ">Another dimension which is unique to India is that of regional language; for banking customers who are not comfortable with English, it is recommended that bank websites be provided in major regional languages as well. The best way to display regional fonts is to use Unicode (UTF-8). Banks should ensure that Unicode is used to display the fonts, as otherwise the fonts can become garbled and a person using a screen reader will not be able to access the written material at all.</p>
<p style="text-align: justify; ">A critical guideline to be followed is that visual information should also be coupled with audio information, and that frequency and volume of the audible cues should be capable of being configured and controlled by the user.<a href="#fn46" name="fr46">[46]</a></p>
<h3 style="text-align: justify; ">Automated Teller Machines (ATMs)</h3>
<p style="text-align: justify; ">The number of ATMs and their penetration in India is very low: 63 ATMs and 497 points of sale per million population,<a href="#fn47" name="fr47">[47]</a> and a number of regulatory and commercial requirements have led to their relative low (though increasing) use in India. RBI has recently passed guidelines on operating White Label ATMs<a href="#fn48" name="fr48">[48] </a>which effectively open up most of the acquiring part of the process to non-bank independent players.<a href="#fn49" name="fr49">[49] </a>This should ensure that there is a greater increase in the number and penetration of ATMs in India, which will be beneficial for people with disabilities only if the ATM-makers ensure that minimum guidelines for the disabled are met with.</p>
<p style="text-align: justify; ">Currently there are no guidelines in India on how to construct ATMs in accordance with the needs of people with disabilities. However, banks can take guidelines from other jurisdictions as their guide and look at how other countries have handled the issue of making ATMs more accessible. It is hoped that this lacuna in the policy will be filled soon.</p>
<p style="text-align: justify; ">The American Department of Justice recently notified a final ruling on the standards of accessibility relating to ATMs under the Americans with Disability Act (“ADA”). Such standards range from requirements that signs be in Braille, a voice guidance system, and input controls for blind users.<a href="#fn50" name="fr50">[50]</a> These standards took effect in March 2011, and had a March 2012 compliance date. All ATM owners are to comply with these guidelines when constructing or altering ATMs.</p>
<p style="text-align: justify; ">Some salient features of these guidelines are:</p>
<ul>
<li style="text-align: justify; ">Height and reach: It is mandated that the ATM’s reach should be between 15 and 48 inches. Further, the graphic area where the touch commands are input needs to be lowered to the desired height. </li>
<li style="text-align: justify; ">The input device should be tactile, and so the surface of the keys should be different from the base and this should be apparent by touch. The keypad should also be arranged in a standard 12-key ascending or descending layout, as seen in telephones or computers. </li>
<li style="text-align: justify; ">ATMs must be equipped with both voice guidance systems as well as Braille language signage. This would mean adding a headphone jack to the machine, so the audio is heard only by the user and thus ensuring his privacy. </li>
<li style="text-align: justify; ">The display in the ATM needs to be clear; from an observation point 40 inches above the floor in front of the machine, the letters should appear in a sans serif font, with a minimum height of 3/16 inches, in a colour contrasting to the background. </li>
<li style="text-align: justify; ">There is also a requirement of equal services, which means that all services offered at any location through a bank’s ATM must also be provided by an “accessible” ATM in the same location. For this purpose, each installation is to be considered as a separate location.</li>
</ul>
<p style="text-align: justify; ">The Indian Banks’ Association (IBA) has issued a Standards document on Accessible ATMs for customers with disabilities, and has also released a work flow document to be followed by various banks. The IBA Standards documents states that:</p>
<blockquote class="quoted" style="text-align: justify; ">“The fundamental principle of an Accessible ATM for development, testing and implementation purposes is to ensure a machine which enable the user to complete all transactions successfully with a blank screen simply through voice guidance for totally blind users, permit independent use through clear screen data for low vision / partially sighted users and effective physical access for wheel chair users.”</blockquote>
<p style="text-align: justify; ">The document specifies different accessibility measures to be taken for each level of accessibility (for example: completely blind users and users with partial sight), with details about the size and measurement of various features that need to be incorporated. It also includes a workflow to be incorporated into the Speaking ATMs for the effective use by people with disabilities.</p>
<h3 style="text-align: justify; ">Currency</h3>
<p style="text-align: justify; ">For currency to be most effective as a means of payment, all users should have barrier-free access. The ability to conduct financial transactions using bank notes is crucial to independent living.<a href="#fn52" name="fr52">[52] </a>Yet this can pose significant challenges for individuals who are blind or partially sighted.</p>
<p style="text-align: justify; ">Physical currency (both notes and coins) are confusing and often cannot be distinguished from each other by merely feeling them. There is a great similarity between the hundred, five hundred and thousand rupee notes, as well as in the coins which are now completely confusing. Notes should also be discernible to the colour blind, which in their current form is not always possible. Various representations have been made to the Government of India on this regard and the change required is only a small one, though no changes have so far been forthcoming.</p>
<p style="text-align: justify; ">India can learn from the example of other countries which have experimented in the past with introducing currency which is friendlier to people with disabilities. Whether it is the printing of differently coloured notes, or the development of “raised-texture tactile features,”<a href="#fn53" name="fr53">[53]</a> there are several alterations that can be made to the currency. In India, the bank notes come with raised texture shapes to help the visually impaired to identify the different notes, and also come in different colours, though further improvements can be made. This problem is exacerbated in the coins — earlier, there was a differentiation in shape between them, but the newly minted coins of denominations Rs. 1, Rs. 2 and Rs. 5 are all very similar, and differentiating between them is a big problem.</p>
<p style="text-align: justify; ">In countries such as Canada, development of bank notes is based on a “continuous process that relies on scientific and empirical research, together with direct feedback from bank note user groups and experts. The bank consults Canadians living with blindness and low vision, as well as their representative organizations and vision experts, to identify the needs of this community and to explore potential solutions.”<a href="#fn54" name="fr54">[54] </a>It is this sort of consultative process that needs to be incorporated in India as well.</p>
<h3 style="text-align: justify; ">Telephone Banking</h3>
<p style="text-align: justify; ">Telephone banking is in its nascence in India and not all banks provide it. Furthermore, there are no guidelines in place to govern how telephone banking would take place. For people with disabilities, telephone banking could be very useful, if the proper tools are made available to them. Banks can look at the draft guidelines of other countries (refer to section 8 of the Report) which have provisions for phone banking to see what kind of procedure they should follow.</p>
<h2 style="text-align: justify; ">Converting to Accessibility in India</h2>
<p style="text-align: justify; ">Making banking accessible is not just in the commercial interest of the bank but is also in line with its commitments under various legislation and international conventions. In India, this has even been acknowledged by the RBI, which has issued a notification<a href="#fn55" name="fr55">[55]</a> suggesting that at least one-third of the new ATMs of all banks must be accessible.<a href="#fn56" name="fr56">[56]</a> Dinesh Kaushal has studied<a href="#fn57" name="fr57">[57]</a> some examples, such as the Punjab National Bank, which has set up some talking ATMs in Jaipur, or the State Bank of India which in 2010 announced plans of installing 7000 talking ATMs, but there is no news on the status of this goal. Currently the bare minimum target set by RBI is also not being met.</p>
<p style="text-align: justify; ">Subsequent to the RBI notifications, some positive developments have started taking place. The Union Bank of India has indicated that it will deploy over 100 Voice Guided ATMs — which not only allows access to visually impaired people but also people with physical disabilities through ramps for wheel chair access.<a href="#fn58" name="fr58">[58]</a></p>
<p style="text-align: justify; ">Half of these ATMs are to be put up in the banks, and the other half in passport offices. The ‘Talking ATM’ is designed as per Access for All (AFA) standards and comprise of accessible key pads, voice-guidance technology, Braille stickers and multi-lingual capability. When a visually challenged person attaches his headphone set to this ATM, he can hear the instruction which enables him to fill-in the required data using the numeric keypad. Apart from reading aloud screen messages, the machine provides complete orientation making it easy for the customer to use the machine. An important security feature of this ATM is that it provides the person an option to blank out the screen as a safety mechanism to avoid shoulder surfing by any bystander trying to access customer data during the transaction.<a href="#fn59" name="fr59">[59]</a> The bank recently completed setting up the 100th such ATM in the building of the National Association for the Blind.</p>
<p style="text-align: justify; ">The NCR Corporation India, which has a 47.5 per cent share in the country’s ATM business, has stated that it will install 50 ‘talking’ ATMs in various passport offices.<a href="#fn60" name="fr60">[60] </a>The company set up India’s first talking ATM in Ahmedabad for the visually impaired under the Union Bank of India initiative described above. Importantly, the managing director of the ATM company stated that while the hardware of the ATMs remains the same, the software customisations depend on the specific needs. Banks do not need to change their entire fleet of ATMs for installation of new solutions.<a href="#fn61" name="fr61">[61] </a></p>
<p style="text-align: justify; ">One concern that arises when we consider questions of accessibility is: what would be the cost of altering the present technology and infrastructure? If the cost of making banking accessible is too prohibitive, it would not be in the interests of the banks to do so.</p>
<p style="text-align: justify; ">“A talking ATM is the regular ATM with an additional module that allows a blind person to get the information in audio format. A talking ATM could be configured so that when a user plugs in a headphone in the audio jack, the ATM would start talking to the person with audio messages…Installing talking ATM technology is not very expensive. It might range anywhere between Rs. 25,000 and Rs. 50,000.”<a href="#fn62" name="fr62">[62] </a></p>
<p style="text-align: justify; ">There needs to be an evaluation of the present ATMs to see if merely upgrading the software would suffice in converting them to speaking ATMs — if this is the case, it can be done so with the help of the manufacturer at a low cost. The evaluation would also help the banks identify those machines which can be upgraded by the addition of some simple technology and hardware, while the others could be marked for eventual replacement. At the same time, the new machines that are set up by the banks should be audio-enabled; this should not be difficult as “all new ATM installations are audio enabled, as all major ATM manufacturers now produce talking ATMs including Triton, NCR, Wincor-Nixdorf, Diebold, and Fujitsu.”<a href="#fn63" name="fr63">[63] </a></p>
<p style="text-align: justify; ">Under the Americans with Disability Act, the determination of when an undue burden is placed on an establishment which has to make its services accessible is to be determined on a case by case basis, and would be considered keeping in mind factors such as the nature and cost of the upgrades, the availability of alternatives and the resources present with the financial institution in question.<a href="#fn64" name="fr64">[64] </a>Such a system should be incorporated in India as well, where the ability of the bank is considered when seeing the efforts it needs to make when converting its services to make them more accessible.</p>
<p style="text-align: justify; ">Union Bank of India’s Accessible and Talking ATM has brought in many initiatives for the first time, like the use of bilingual Indian accent text-to-speech (TTS) voices in English and Hindi, accessible infrastructure for the physically disabled and complete voice guidance support for ATM operation.<a href="#fn65" name="fr65">[65]</a> These should set the benchmark for other banks who want to improve the accessibility of their services as per the guidelines set forth by RBI.</p>
<h2 style="text-align: justify; ">Case studies and Guidelines in Other Countries</h2>
<p style="text-align: justify; ">Looking at the guidelines that are present in other countries can be helpful in determining how banks in India should go about improving their services. The following countries have specific provisions in place which regulate or instruct how banks should handle their disabled customers.</p>
<h3 style="text-align: justify; ">New Zealand</h3>
<p style="text-align: justify; ">The New Zealand Banker’s Association published a set of Voluntary Guidelines to meet the needs of older and disabled customers, which aim to improve access to banking services for such customers.<a href="#fn66" name="fr66">[66]</a> The guidelines recognise the increasing importance of older and disabled customers to banks as well as the importance of meeting their needs and demands. The guidelines direct the member banks to give training to the staff in order to better help the disabled customers, as well as to have specific procedures in place in case financial irregularities or abuse occur in bank accounts of people with disabilities. There are directions on improving physical accessibility (such as providing for low tables, ramps in ATMs, queuing aisles wide enough for wheelchairs and so on), as well as giving specific customer care help to those who need it, such as consulting the needs of the disabled when developing new services, having a provision for a reduction in fee if some customers are unable to use certain features, and having a provision for personal banking in special cases at no additional cost.</p>
<p style="text-align: justify; ">There are also specific provisions in the Guidelines for things such as ATM construction. Section 5.9 of the Guidelines specifies the factors to be kept in mind while designing ATMs: large screens, audible output, tactile differentiation in the keys, easy prompts in clear language and so on.<a href="#fn67" name="fr67">[67] </a>Section 5.10 talks about improving the accessibility of online banking and how bank websites should be designed, and recommends the use of international W3C web accessibility best practice standard, the accessibility-related New Zealand e-government web standards.<a href="#fn68" name="fr68">[68]</a> Finally, the Guidelines also talk about basics, such as clear and large font prints in their literature, and providing information in several formats (including Braille, DVD, and audio) wherever possible, to facilitate bank use by people with disabilities.<a href="#fn69" name="fr69">[69]</a></p>
<h3 style="text-align: justify; ">Australia</h3>
<p style="text-align: justify; ">The Disability Discrimination Act, 1992 (“DDA”) makes it unlawful to discriminate against a person on the grounds of a disability.<a href="#fn70" name="fr70">[70]</a> The objects of the DDA include eliminating, as far as possible, discrimination against people with disabilities and promoting recognition and acceptance within the community that people with disabilities have the same fundamental rights as the rest of the community. The law is administered by the Human Rights and Equal Opportunity Commission and sets out specific areas in which it is unlawful to discriminate. These areas include accommodation, employment, access to premises, and the provision of goods, services<a href="#fn71" name="fr71">[71]</a> and facilities. The HREOC administers the legislation, which includes complaints handling, public inquiries, policy development and education and training. The Commission has supported the development of several voluntary guidelines that determine accessibility in the sphere of banking.</p>
<p style="text-align: justify; ">The Australian Bankers’ Association (“ABA”) has worked with the community to produce voluntary Industry Standards in 2002 which aim to improve the accessibility of electronic banking. These standards cover a range of areas: ATMs, Electronic Funds Transfer at the Point of Sale, Automated Phone Banking and Internet banking.<a href="#fn72" name="fr72">[72]</a></p>
<p style="text-align: justify; ">The voluntary standards for ATMs<a href="#fn73" name="fr73">[73]</a> cover a broad range of topics, including their access and location, their operation, the method of swiping and removing the cards, the display, the keypad, the output, security and privacy for the users, and finally, installation and operating instructions. There is a checklist provided with the recommended detailed standards for each of the above areas.</p>
<p style="text-align: justify; ">Electronic Funds Transfer at Point of Sale<a href="#fn74" name="fr74">[74]</a> occurs when funds are directly transferred from a cardholder's bank account to the retailer, when the cardholder's magnetic stripe card is swiped in an EFTPOS terminal. Cardholder authentication occurs by signature or Personal Identification Number (PIN). These standards cover areas such as access and location of the EFTPOS terminals, process of swiping, inserting or removing the card, operating instructions, display, keypad and output options, amongst others. A helpful checklist has been provided for EFTPOS deployers to assess whether their machines are disabled-friendly.</p>
<p style="text-align: justify; ">The guidelines on phone banking<a href="#fn75" name="fr75">[75]</a></p>
<p style="text-align: justify; ">deal with financial services which are available to the customer via the telephone, that can be used by the customer without having to converse with an employee of the financial institution. The guidelines look at certain design principles, best practices for input and navigation, output, documentation, the role of TTY Communications and Relay Operators, and dealing with timeouts and errors. Like with the other standards, a checklist with the best practices as per the guidelines has been provided.</p>
<p style="text-align: justify; ">The standards on internet banking<a href="#fn76" name="fr76">[76]</a></p>
<p style="text-align: justify; ">looks at various aspects of financial transactions taking place on the internet, and prescribe guidelines for design and implementation (for example: compliance with the WCAG1.0 standards), feedback and testing of accessibility, compatibility, enhanced usability (in areas such as navigation, registration, login, information redundancy and so on), consistency and user support. A specification checklist is also provided, so that owners can comfortably see whether their site is compliant with the guidelines or not.</p>
<p style="text-align: justify; ">There is an action plan for the above four set of guidelines, to check their implementation and to identify problems and barriers that may arise in the future.<a href="#fn77" name="fr77">[77]</a> Though these guidelines are voluntary, it is worthwhile to consider the example of such a detailed action plan, as implementation of any sort of guidelines will only become more efficient if something like this is followed.</p>
<p style="text-align: justify; ">The Australian Banker’s Association has also come up with a set of Guiding Principles for Accessible Authentication, which recognizes that “accessibility issues need to be considered in the deployment of authentication technologies, to ensure that people with disabilities and older people are not disadvantaged… The purpose of the Guiding Principles is to provide a framework for financial institutions to help reach a workable balance between security requirements, commercial strategies and equitable access to banking products and services.”<a href="#fn78" name="fr78">[78]</a> The Principles aim to follow certain universal design principles, of equitable and flexible use, minimal effort, simple and intuitive design, amongst others. They are as follows:<a href="#fn79" name="fr79">[79]</a></p>
<ul style="text-align: justify; ">
<li style="text-align: justify; "><span>Accessibility of authentication technologies:</span> Financial institutions should ensure that authentication technologies are accessible to all customers, or where this is not possible, a human-based alternative authentication system needs to provide equivalent amenity and convenience.</li>
<li style="text-align: justify; "><span>Customer convenience:</span> All customers should be able to undertake their personal and business financial activities conveniently and safely.</li>
<li style="text-align: justify; "><span>Authentication planning:</span> Financial institutions should consider the accessibility needs of customers with disabilities and older customers as part of authentication technology planning.</li>
<li style="text-align: justify; "><span>Authentication testing</span>: Financial institutions should consult customers with disabilities and older customers as part of planning and testing accessibility of authentication technologies.</li>
<li style="text-align: justify; "><span>Registration, login and transaction procedures</span>: Financial institutions should ensure that registration; login and transaction procedures are as accessible as possible to all customers.</li>
<li style="text-align: justify; "><span>Messages and error recovery</span>: Financial institutions should ensure that online messages are unambiguous and written in “plain English” and that error recovery processes are efficient and accessible. </li>
<li style="text-align: justify; "><span>Staff and customer training</span>: Financial institutions should provide relevant customer support staff with appropriate disability awareness training so they are aware of the needs of customers with disabilities and older customers. In addition, financial institutions should provide customers with information and training in the use of available authentication technologies.</li>
<li style="text-align: justify; "><span>Raising staff, business and customer awareness:</span> Financial institutions should develop a strategy for enabling relevant management and staff awareness of these Guiding Principles. In addition, financial institutions should promote the availability of alternative accessible authentication technologies with their customers. </li>
<li style="text-align: justify; "><span>Confidentiality of customer information</span>: Financial institutions must ensure the confidentiality of information of customers with disabilities and older customers.</li>
</ul>
<h3>United States of America</h3>
<p style="text-align: justify; ">The 2010 Standards under the ADA have set out detailed requirements to make ATMs accessible, as was discussed in the previous section of the paper. These elements are considered by the Department of Justice to be Auxiliary Aids and Services (and not structural elements) and the safe harbour provision does not apply to them.<a href="#fn80" name="fr80">[80]</a></p>
<p style="text-align: justify; ">Though American ATMs have been equipped with text to speech functions and have been subject to height and space requirements for many years, the new rules provide for additional security and instructional features for disabled customers.<a href="#fn81" name="fr81">[81]</a></p>
<p style="text-align: justify; ">All the ATMs which come under the scope of the ruling will have to be speech enabled; further, there are specifications as to the height requirement (the machine should be between 15 and 48 inches in height). There is a requirement that the input area be not just touchscreen, and it should be tactilely discernible from the surrounding surface; the keypad should be arranged in a manner that is common and easy to remember. Instructions about the use of the ATMs should be given in Braille and equal services should be offered to all customers, irrespective of their disabilities.</p>
<p style="text-align: justify; ">Subsequent to the passing of the ruling, the American Bankers’ Association recommended that banks be aware of the legal requirements under the Americans with Disabilities Act; ABA advocated that banks make a careful audit of their existing machines, and compare them to the standards to which they need to conform. In case the machines need to be upgraded, the machine manufacturers would have to be contacted in order to make alterations, if necessary.</p>
<h3 style="text-align: justify; ">Canada</h3>
<p style="text-align: justify; ">Canada has issued standards for “self-service interactive devices”,<a href="#fn82" name="fr82">[82] </a>the umbrella term under which ATMs would fall, the purpose of which is to specify minimum accessibility and usability requirements for self-service interactive devices intended for public use. The standard specifies accessibility requirements for automated banking machines (ABMs) — both stand-alone and wall mounted — and ABM sites. There are specifications which give the various minimum dimensions that must be conformed to when constructing such self-service interactive devices. However, the standards do not look at the technological aspect, specifically excluding it from their purview and giving that responsibility to the relevant authority.<a href="#fn83" name="fr83">[83]</a> It is interesting to note that the steering committee that ultimately led to the adoption of the standards was pulled together by the Canadian Banker’s Association, and the committee included representatives from the major Canadian banks.<a href="#fn84" name="fr84">[84]</a> The committee recommended that there be a mandatory requirement for audible instructions and the provision for attaching headphones to an automated banking machine; it would be the duty of the financial institution to provide the headsets to the disabled customers, along with a list of machines where they could be used. The committee also looked into the issue of the cost of making the machines and other areas more accessible, and though they were waiting for more conclusive research, they were hesitant about the prohibitive cost of major redesigns.<a href="#fn85" name="fr85">[85]</a></p>
<h3 style="text-align: justify; ">Netherlands</h3>
<p style="text-align: justify; ">In 2007, the Dutch National Forum on the Payment System produced a document in English on "Guidelines for user-friendly payment terminals". These guidelines include advice on making payment terminals accessible and easy to use for people with disabilities and older people.<a href="#fn86" name="fr86">[86]</a> The guidelines describe certain standardised elements of the PIN payment procedure, the user interface and advocates practical values for the same.<a href="#fn87" name="fr87">[87]</a> The document then goes on to specify important design principles which must be kept in mind while considering the accessibility of payment gateways and banks; the guideline is designed in such a way that if the design principles are to be kept in mind, the subsequent ergonomic principles which have been described will be easy to meet.<a href="#fn88" name="fr88">[88]</a></p>
<h2 style="text-align: justify; ">Suggestions and Recommendations</h2>
<p>The report illustrates that though banks are mandated to ensure that there is accessibility in banking services in India, there is still a lot that needs to be done. There are several measures that can be taken up by banks, which will not be costly and which will be especially rewarding for customers with disabilities:</p>
<ul>
<li style="text-align: justify; ">Compliance with RBI Guidelines: Banks should ensure a basic minimum compliance with the guidelines set forth by RBI for increasing access to banking services as described in Section 4.3 of the Report. </li>
<li style="text-align: justify; ">Compliance with International norms: Banks also need to ensure a basic minimum compliance with international norms, such as the WCAG 2.0 standards for websites, so that people with disabilities can access the bank websites with ease.</li>
<li style="text-align: justify; ">Physical Accessibility: Banks need to ensure that as far as possible, there is at least physical accessibility to their branches — which would include building ramps, having wider lifts, and so on. Branches should, even if they cannot be located on the ground floor, at least make reasonable accommodations for the disabled, such as having a person who can assist them up to the branch or come down to meet them. Branches should be organised in an easily navigable manner and there should always be a plan for assistance in place — interpreters, special staff to assist with filling out of forms, physical assistance, and easily available information in the form of maps, diagrams, bold text explanations, etc. Banks should also focus more on creating avenues for disabled customers to use their services. This would include building usable and user-friendly voice systems, which is currently needed.<a href="#fn89" name="fr89">[89]</a> </li>
<li style="text-align: justify; ">Technical Solutions: Today there are many technological solutions to overcome some of the barriers faced by the visually challenged in the area of banking. Finger print identification technology<a href="#fn90" name="fr90">[90]</a> can be effectively explored to allow the use of thumb impressions while operating bank accounts.<a href="#fn91" name="fr91">[91]</a> For example, the XRCVC is in the process of developing a 'thumb print recognition software named as "e-Signs" with the help of CMC Ltd. (a TATA Enterprise) which can be applied across the banking system in partnership with the RBI to process cheques.<a href="#fn92" name="fr92">[92]</a> Most manufacturers now have accessible ATM models and banks must ensure that new ATMs have these models installed, and that old ATMs are retrofitted to become accessible. Banks should also work with their technology departments to ensure that their mobile apps are accessible on screen reader and other assistive technology software.</li>
</ul>
<ul>
<li style="text-align: justify; ">Promote the growth of banking services for people with disabilities: State and national governments should encourage opening of bank accounts by the disabled so that any funds or scholarships can be directly transferred into their account as opposed to being given to organisations which may not transfer it to the beneficiaries — this would help curb malpractices. Information on how people with disabilities can open an account — whether joint or single — and the formalities they need to fulfil should be made easily and readily available. This will encourage more people to open accounts for/with the disabled.</li>
<li style="text-align: justify; ">Adopt accessible formats for disabled customers: Banks should publish instruction manuals for ATMs as well as banking procedures in accessible formats such as Braille and DAISY. The banks can then take help of various volunteer organisations in producing and distributing the books to the relevant segments of the population. Such materials should also be made available for download, free of cost, on the bank’s website.</li>
<li style="text-align: justify; ">Training and sensitisation: Banks should not simply train and sensitise their employees and increase awareness of the various kinds of disability and the services to be provided to the disabled, but actively solicit those with special needs and make it clear that they "understand their needs" and welcome their business. Banks need to consider whether it makes sense to have separate or specially prepared paperwork for the disabled to fill out if the regular forms are difficult to read or understand.</li>
<li style="text-align: justify; ">Preferential Treatment: The Ministry of Finance should push for preferential treatment of all persons with disabilities along the same lines as the special rates of interest provided to the elderly. Public sector banks like the State Bank of India have a massive network and such visible and actively advertised preferential treatment will spread awareness not only at the bank level but in society as well. This will really encourage family members of the disabled to help them set up bank accounts and will foster independence.</li>
<li style="text-align: justify; ">“Know Your Customer” (KYC) procedures undertaken by banks should be clarified and made simpler — a one-time verification should take place rather than repeated calls, visits, questions, clarifications and summons to the office or branch.</li>
<li style="text-align: justify; ">Bank managers and staff should be proactive and watchful enough to monitor and check for abuse of power by those who are 'assisting' or administering the property and money of the disabled, who are even more susceptible to fraud than the average account holder, and therefore should be provided with stronger anti-fraud/theft services, such as more frequent SMS or email alerts for transactions.</li>
</ul>
<p style="text-align: justify; ">The most important aspect<a href="#fn93" name="fr93">[93] </a>that financial service providers need to understand is that accessibility— goes much beyond merely providing ramps and the financial service providers do not currently understand the variety of disabilities and the issues which are tied to each kind of disability. Consider ATMs — the way they are currently designed, the machines are too high for users who are in a wheelchair and the doors themselves are inaccessible to the orthopedically challenged; ATMs have neither voice support nor compatible software for the visually challenged. Thus, a basic and fundamental change in the way banks are catering to customers’ needs to take place.</p>
<p style="text-align: justify; ">Financial service providers should be more encouraging and should engage in outreach to make it easier and more attractive for those with less capability to open and operate accounts with their parents or guardians. Financial independence and control should be offered and facilitated to the maximum extent possible.</p>
<p style="text-align: justify; ">Accessibility should not be treated as a corporate social responsibility measure by the large banks and financial corporations, but as a responsibility to be fulfilled regardless of anything else. Further, public sector banks have the biggest responsibility to implement these measures — while they employ people with disabilities because they have a reservation <a href="#fn94" name="fr94">[94]</a> for them, their services are not accessible to their own employees! There needs to be an effort made to ensure that the internal banking software which is used is accessible for people with disabilities and can be accessed by them using the appropriate assistive technology like screen readers.</p>
<p style="text-align: justify; ">Financial service providers should tailor accessibility solutions to address each kind of disability and the range of problems faced by the persons affected by them; they should look at best practices from around the world and implement solutions on their own steam instead of minimum compliance with the government or RBI requirements. Ultimately, making financial services more accessible will only mean that their customer base will grow. Change needs to be top-down — rules and regulations first, then training, sensitisation, and then infrastructure. Schemes and offers should be put in place to attract the disabled as customers, assure them of good and competent service without discrimination, and incentives to invest or save (by offering special schemes such as those which currently exist for women and the elderly).</p>
<p style="text-align: justify; ">Building such systems would involve learning more about the customers and their particular situations and needs, and banks can take the help of various organisations that work with the disabled in order to get a better understanding of what they need to deliver. While there are some voluntary standards that can be used as a guide,<a href="#fn95" name="fr95">[95] </a>the most important aspect is to keep the basics in mind: simple and clear language, audible scripts, easy and non-confusing navigation and instructions and the ability to speak to someone in case of an error; these are all elements that will go a long way in ensuring that disabled customers are more equipped to use the financial services offered by a bank.</p>
<p style="text-align: justify; ">It would be helpful if there was a monitoring or evaluating mechanism to see how far banks are complying with the standards or guidelines that have been set forth before them. There needs to be a comparative study about how far, for example, the bank websites are compliant with the WCAG Guidelines on Web Accessibility or how easy it is for people with disabilities to access the bank counters and ATMs in different branches. Such a study would give good empirical evidence and serve as the starting point for improvement on the current scenario.<a href="#fn96" name="fr96">[96]</a></p>
<p style="text-align: justify; ">In the light of the above, some specific suggestions/ recommendations are made to the Department of Banking Operations in order to make banking more inclusive for persons with disabilities and senior citizens as under:</p>
<ol>
<li style="text-align: justify; ">The department may consider coming out with a policy/ Code requiring all banks to make their services accessible to persons with disabilities. The Policy/ Code may also identify good practices to be followed by banks with respect to areas such as websites, ATMs, mobile and phone banking services, website accessibility and customer care.</li>
<li style="text-align: justify; ">The Department may require RBI to stringently enforce its notification regarding accessibility of ATMs</li>
<li style="text-align: justify; ">The Department may ensure that accessibility be incorporated as a key strategy in all future policies and programmes planned by the Department and is also incorporated in any existing policy which is executed by the department.</li>
<li style="text-align: justify; ">The Department may involve persons with disabilities in executing its accessibility strategy and identify goals/ targets to be achieved over the next 5 years in terms of making banking services accessible in India. </li>
</ol>
<h2 style="text-align: justify; ">Bibliography</h2>
<ul>
<li style="text-align: justify; ">“Barriers to Using Automatic Teller Machines”, Tim Noonan, available at <a href="http://www.hreoc.gov.au/disability_rights/inquiries/ecom/atmpaper.htm">http://www.hreoc.gov.au/disability_rights/inquiries/ecom/atmpaper.htm</a>. </li>
<li style="text-align: justify; ">“Guidelines for Accessible and Usable Web Sites: Observing Users Who Work with Screen Readers”, Mary Theofranos and Janice Redish, available at <a href="http://redish.net/content/papers/interactions.html">http://redish.net/content/papers/interactions.html</a>.</li>
<li style="text-align: justify; ">“The Banking Experience: How to Make Financial Services Accessible for Blind and Partially Sighted People”, RNIB’s Handbook of Good Practices and Standards, at <a href="http://www.rnib.org.uk/aboutus/Research/reports/2012/Banking_Experience_CP.pdf">http://www.rnib.org.uk/aboutus/Research/reports/2012/Banking_Experience_CP.pdf</a>. </li>
<li style="text-align: justify; ">“Website Accessibility”, available at <a href="http://www.tiresias.org/research/guidelines/web.htm">http://www.tiresias.org/research/guidelines/web.htm</a>. </li>
<li style="text-align: justify; ">ABA Guiding Principles for Accessible Authentication, available at <a href="http://www.bankers.asn.au/ArticleDocuments/177/ABA-Guiding_Principles_for_Accessible_Authentication.doc.aspx">http://www.bankers.asn.au/ArticleDocuments/177/ABA-Guiding_Principles_for_Accessible_Authentication.doc.aspx</a></li>
<li style="text-align: justify; ">John Gill, “The Markets for the Adaptation of Self Service Terminals to be Accessible by People with Disabilities”, available at <a href="http://europa.eu/information_society/activities/einclusion/docs/worshop_atm/atm_markets_report.doc">http://europa.eu/information_society/activities/einclusion/docs/worshop_atm/atm_markets_report.doc</a></li>
<li style="text-align: justify; ">Carolyn Samuel, “Making Bank Notes Accessible for Canadians Living with Blindness or Low Vision”, available at <a href="http://www.bankofcanada.ca/wp-content/uploads/2011/08/samuel.pdf">http://www.bankofcanada.ca/wp-content/uploads/2011/08/samuel.pdf</a>. </li>
</ul>
<h2>Glossary of Terms</h2>
<ul>
<li>ABA - Australian Bankers’ Association</li>
<li>ABM - Automated Banking Machines</li>
<li>ADA - Americans with Disability Act</li>
<li>AFA - Access for All</li>
<li>BRA - Banking Regulation Act</li>
<li>BT - British Telecom</li>
<li>CAPTCHA - Completely Automated Public Turing test to tell Computers and Humans Apart</li>
<li>DDA - The Disability Discrimination Act (Australia)</li>
<li>EFTPOS - Electronic Funds Transfer at Point of Sale</li>
<li>HREOC - Human Rights and Equal Opportunity Commission</li>
<li>HTML - Hyper Text Markup Language</li>
<li>IBA - Indian Banks’ Association</li>
<li>IVR - Interactive Voice Response</li>
<li>NIC - National Informatics Centre</li>
<li>PIN - Personal Identification Number</li>
<li>PWD - People with Disabilities</li>
<li>PWDA - The People with Disabilities (Equal Opportunities, Protection of Rights and Full Participation) <i>Act</i><i>,</i> 1995</li>
<li>RBI - Reserve Bank of India</li>
<li>RTF - Rich Text Format</li>
<li>TTS - Text to Speech</li>
<li>UNCRPD - United Nations Convention on Persons with Disabilities </li>
<li>WCAG - Web Content Accessibility Guidelines </li>
<li>XRCVC - Xavier’s Resource Centre for the Visually Challenged</li>
</ul>
<h2>Annexure 1 – Disability and Accommodations</h2>
<ul>
</ul>
<table class="vertical listing">
<tbody>
<tr style="text-align: center; ">
<th style="text-align: justify; ">Disability</th><th style="text-align: justify; ">Branch Banking</th><th style="text-align: justify; ">Phone Banking</th><th style="text-align: justify; ">Internet Banking</th><th style="text-align: justify; ">Payment Terminals and Kiosks</th><th style="text-align: justify; ">Mobile Banking<br /></th>
</tr>
<tr>
<td>Physical Disability</td>
<td style="text-align: justify; ">
<ul>
<li style="text-align: left; ">Bank branches are inaccessible to people using wheelchairs, as they are not provided with ramps, and often have steps at the entrance</li>
</ul>
<ul>
<li style="text-align: left; ">The queuing and counter system in place is not friendly for customers with disabilities; desks are not always at a height that can be accessed by someone in a wheelchair</li>
</ul>
<ul>
<li style="text-align: left; ">The staff is not sensitised to the needs of customers with physical disabilities</li>
</ul>
<b>Suggested Solution</b>:<br /><br />
<ul>
<li style="text-align: left; ">Conduct sensitisation and training programmes for the staff train them about the needs of customers with disabilities</li>
</ul>
<ul>
<li style="text-align: left; ">Construct ramps and walkways so that buildings are accessible by wheelchairs</li>
</ul>
<ul>
<li style="text-align: left; ">Ensure that the bank layout is accessible and as uniform as possible, ensuring ease of access for customers with disabilities</li>
</ul>
</td>
<td></td>
<td>
<ul>
<li style="text-align: left; ">Using websites which are not accessible could be a problem for a person who doesn’t have full use of their limbs</li>
</ul>
<b>Suggested Solution</b>:<br />
<ul>
<li style="text-align: left; ">Ensure websites are compatible with assistive technologies, such as alternate input devices. Standards such as the WCAG should be followed</li>
</ul>
<br /></td>
<td>
<ul>
<li style="text-align: left; ">ATM entrances are not accessible for people with wheelchairs as they are not provided with ramps</li>
</ul>
<ul>
<li>ATMs are often too high, and cannot be accessed by someone who is sitting in a wheelchair</li>
</ul>
<ul>
<li>Using keypads could be a problem for a person who doesn’t have full use of their limbs</li>
</ul>
<p align="left"><b>Suggested Solution:</b></p>
<ul>
<li>ATMs should be provided with ramps (with the appropriate slope) that can be accessed by customers in a wheelchair</li>
</ul>
<ul>
<li> ATMs should be at the appropriate height and should be designed keeping in mind the needs of people in wheelchairs</li>
</ul>
</td>
<td>
<ul>
<li>Using phone apps could be a problem for a person who doesn’t have full use of their limbs</li>
</ul>
<p><b>Suggested Solution</b>:</p>
<ul>
<li>Mobile apps should have a clean interface, which is not problematic to use and which can be controlled by voice commands</li>
</ul>
</td>
</tr>
<tr>
<td>Visual Disability</td>
<td>
<p align="left">Branches are not laid out in a uniform manner, and are difficult to navigate for someone who can’t see</p>
<ul>
<li>The signage is not done in raised texture maps, and so can’t be accessed by someone who can’t see</li>
</ul>
<ul>
<li>Coinage in India is not disabled-friendly, with the coin sizes being very similar to each other and difficult to demarcate</li>
</ul>
<ul>
<li>Bank literature is not available in large print or Braille formats and so can’t be read by people with low or no vision</li>
</ul>
<p align="left"><b>Suggested Solution:</b></p>
<ul>
<li>Conduct sensitisation and training programmes for the staff train them about the needs of customers with disabilities</li>
</ul>
<ul>
<li>Textured maps and signage should be made readily available at branch locations</li>
</ul>
<ul>
<li>The branch layout should be simplified so that someone with a visual disability is not at a disadvantage</li>
</ul>
<ul>
<li>In case the customer desires, bank literature, statements and other documents should be made available in alternate formats (eg: large print, Braille, PDF)</li>
</ul>
</td>
<td></td>
<td>
<ul>
<li>Websites are often not accessible using assistive technologies like screen readers, and are not navigable using non-traditional input devices</li>
</ul>
<p align="left"><b>Suggested Solution:</b></p>
<ul>
<li> Websites need to be made accessible and should comply with the Web Content Accessibility Guidelines (WCAG) which clearly specify how best to make the web interface usable for people with disabilities</li>
</ul>
</td>
<td>
<ul>
<li>There aren’t many speaking ATMs with audio jacks which can be used by people who can’t use the touchscreen</li>
</ul>
<ul>
<li>The number pad display is not uniform amongst various banks, and so can be problematic for people relying on tactile memory</li>
</ul>
<p align="left"><b>Suggested Solution:</b></p>
<ul>
<li> Banks should introduce more speaking ATMs, which have an audio jack that can be plugged into a listening device, which helps a customer with visual disability use an ATM</li>
</ul>
</td>
<td>
<ul>
<li>Mobile banking apps are not accessible using phone screen reading software</li>
</ul>
<br /><b>Suggested Solution:</b><br />
<ul>
<li>Phone apps need to be made accessible and should comply with the W3C Guidelines which specify how best to make the mobile interface usable for people with disabilities</li>
</ul>
<br /></td>
</tr>
<tr>
<td>Hearing Disability</td>
<td>
<ul>
<li>Branch officials have not been sensitised to the requirements of someone who is hearing impaired, who might require them to write down their statements</li>
</ul>
<ul>
<li>Sign language interpreters are not on call to help translate in case a person with disability needs them</li>
</ul>
<ul>
<li>Alert and announcements in banks are usually based on sound notifications, and so can often be missed by customers with hearing disabilities</li>
</ul>
<b>Suggested Solution:</b><br />
<ul>
<li>Conduct sensitisation and training programmes for the staff train them about the needs of customers with disabilities</li>
</ul>
<ul>
<li>Designated branches should have a sign language interpreter on call for assistance of customers with hearing disabilities</li>
</ul>
<ul>
<li>Notifications and announcements, such as at a teller, should be accompanied by a visual alert as well (eg: a blinking light, or a number flashing on a screen)</li>
</ul>
<br /></td>
<td>
<ul>
<li>There is great reliance on spoken directions and no option for a deaf customer to have a conversation about phone banking with their bank</li>
</ul>
<ul>
<li>No provision for options such as text relay that can be used by deaf customers to do banking transactions</li>
</ul>
<ul>
<li>The options on an automated VRS system at a bank’s call centre are often not clear and are incomprehensible</li>
</ul>
<p align="left"><b>Suggested Solution:</b></p>
<ul>
<li>Banks should attempt to introduce text relay services, which can be used by deaf customers to communicate with bank officials via the phone</li>
</ul>
<ul>
<li> The VRS system should be in clear, understandable and audible tones for the ease of customers</li>
</ul>
</td>
<td></td>
<td>
<ul>
<li>Alerts and notifications in an ATM are usually in the form of a loud noise or a beep, which will be missed by a person with hearing disability</li>
</ul>
<b>Suggested Solution:</b><br />
<ul>
<li>ATMs should have a light which flashes in case of a notification, which will come to the attention of the user</li>
</ul>
<br /></td>
<td></td>
</tr>
<tr>
<td>Cognitive Disability</td>
<td style="text-align: left; ">
<ul>
<li>Bank literature and documents are complicated and the language is not easy to comprehend; this could be a problem for someone with a learning disability</li>
</ul>
<ul>
<li>Banks have a bias against someone with a learning disability and despite rules against this, are reluctant to open account for customers with cognitive disabilities</li>
</ul>
<b>Suggested Solution:<br /></b>
<ul>
<li>Conduct sensitisation and training programmes for the staff train them about the needs of customers with disabilities</li>
</ul>
<ul>
<li>Bank documents, scheme information and so on should be in clear, easy to understand language </li>
</ul>
</td>
<td>
<ul>
<li>The options on an automated VRS system at a bank’s call centre are often not clear and are incomprehensible</li>
</ul>
<p><br /><b>Suggested Solution</b>:</p>
<ul>
<li>The VRS system should be in clear, understandable and audible tones for the ease of customers</li>
</ul>
<p> </p>
</td>
<td></td>
<td></td>
<td></td>
</tr>
</tbody>
</table>
<h2>Annexure 2 – Banking and Accessibility Guidelines</h2>
<table class="vertical listing">
<tbody>
<tr>
<th>Area of Banking</th><th>Guidelines/Recommendations</th>
</tr>
<tr>
<td>Mobile banking</td>
<td>
<p align="left">Web Accessibility Initiatives international guidelines on mobile accessibility: <a href="http://www.w3.org/WAI/mobile/">http://www.w3.org/WAI/mobile/</a></p>
</td>
</tr>
<tr>
<td>Internet banking</td>
<td>
<p align="left">The Web Content Accessibility Guidelines lay down the principles for making websites more accessible for people with disabilities: <a href="http://www.w3.org/TR/WCAG/">http://www.w3.org/TR/WCAG/</a></p>
<p align="left">Australian Industry Standards for Electronic Banking: <a href="http://www.bankers.asn.au/Industry-Standards/ABAs-Accessibility-of-Electronic-Banking-">http://www.bankers.asn.au/Industry-Standards/ABAs-Accessibility-of-Electronic-Banking-</a></p>
<p align="left">Royal National Institute for the Blind’s Good Practices and Standards for Electronic Banking: <a href="http://www.rnib.org.uk/aboutus/Research/reports/2012/Banking_Experience_CP.pdf">www.rnib.org.uk/aboutus/Research/reports/2012/Banking_Experience_CP.pdf</a></p>
</td>
</tr>
<tr>
<td>ATMs and payment kiosks</td>
<td>
<p align="left">Americans with Disabilities Act ATM Standards, 2010: <a href="http://www.firstdata.com/downloads/thought-leadership/atm_ada_accessibility.pdf">www.firstdata.com/downloads/thought-leadership/atm_ada_accessibility.pdf</a></p>
<p align="left">Australian Industry Standards for ATMs: <a href="http://www.bankers.asn.au/Industry-Standards/ABAs-Accessibility-of-Electronic-Banking-/ATM-Standard">www.bankers.asn.au/Industry-Standards/ABAs-Accessibility-of-Electronic-Banking-/ATM-Standard</a></p>
<p align="left">Canadian Guidelines on Self Service Interactive Devices: A summary is available at “Standard B651.1-09”, sourced from <a href="http://hub.eaccessplus.eu/wiki/Canadian_standard_for_accessible_design_for_automated_banking_machines">http://hub.eaccessplus.eu/wiki/Canadian_standard_for_accessible_design_for_automated_banking_machines</a></p>
<p align="left">Dutch Guidelines on Payment Terminals: <a href="http://hub.eaccessplus.eu/uploads/a/a1/Dutch_Guidelines_on_payment_systems.pdf">http://hub.eaccessplus.eu/uploads/a/a1/Dutch_Guidelines_on_payment_systems.pdf</a></p>
</td>
</tr>
<tr>
<td>Phone Banking</td>
<td>
<p align="left">Australian Industry Standards for Automated Phone Banking: <a href="http://www.bankers.asn.au/Industry-Standards/ABAs-Accessibility-of-Electronic-Banking-/Automated-Telephone-Banking-Standard">http://www.bankers.asn.au/Industry-Standards/ABAs-Accessibility-of-Electronic-Banking-/Automated-Telephone-Banking-Standard</a></p>
</td>
</tr>
<tr>
<td>Branch Banking</td>
<td>
<p align="left">New Zealand Banker’s Association Voluntary Guidelines on Meeting Needs of Older and Disabled Customers: <a href="http://www.nzba.org.nz/banking-standards/code-of-banking-practice/voluntary-guidelines-to-assist-banks-to-meet-the-needs-of-older-and-disabled-customers/">http://www.nzba.org.nz/banking-standards/code-of-banking-practice/voluntary-guidelines-to-assist-banks-to-meet-the-needs-of-older-and-disabled-customers/</a></p>
</td>
</tr>
</tbody>
</table>
<hr />
<p>[<a href="#fr1" name="fn1">1</a>]. Data taken from <a href="http://www.disabilityindia.com/html/facts.html">http://www.disabilityindia.com/html/facts.html</a>.</p>
<p>[<a href="#fr2" name="fn2">2</a>]. “NCR Corp to set up 50 Talking ATMs in Post Offices”, available at <a href="http://lflegal.com/2012/09/ncr-india/">http://lflegal.com/2012/09/ncr-india/</a>.</p>
<p style="text-align: justify; ">[<a href="#fr3" name="fn3">3</a>]. More data on disability can be seen at the World Bank Country Profile on Disability for India, available at <a href="http://siteresources.worldbank.org/DISABILITY/Resources/Regions/South%20Asia/JICA_India.pdf">http://siteresources.worldbank.org/DISABILITY/Resources/Regions/South%20Asia/JICA_India.pdf</a>.</p>
<p>[<a href="#fr4" name="fn4">4</a>]. Full text available at <a href="http://www.un.org/disabilities/default.asp?id=259">http://www.un.org/disabilities/default.asp?id=259</a>.</p>
<p>[<a href="#fr5" name="fn5">5</a>]. Full text available at <a href="http://www8.cao.go.jp/shougai/english/biwako/contents.html">http://www8.cao.go.jp/shougai/english/biwako/contents.html</a>.</p>
<p style="text-align: justify; ">[<a href="#fr6" name="fn6">6</a>]. See generally: “Guidelines for Accessible and Usable Web Sites: Observing Users Who Work with Screen Readers”, Mary Theofranos and Janice Redish, available at <a href="http://redish.net/content/papers/interactions.html">http://redish.net/content/papers/interactions.html</a>, last viewed on July 26.</p>
<p style="text-align: justify; ">[<a href="#fr7" name="fn7">7</a>]. Article 14: Equality before law - The State shall not deny to any person equality before the law or the equal protection of the laws within the territory of India (Prohibition of discrimination on grounds of religion, race, caste, sex or place of birth).</p>
<p style="text-align: justify; ">[<a href="#fr8" name="fn8">8</a>]. Article 15. Prohibition of discrimination on grounds of religion, race, caste, sex or place of birth<br />(1) The State shall not discriminate against any citizen on grounds only of religion, race, caste, sex, place of birth or any of them<br />(2) No citizen shall, on grounds only of religion, race, caste, sex, place of birth or any of them, be subject to any disability, liability, restriction or condition with regard to<br />(a) access to shops, public restaurants, hotels and palaces of public entertainment; or<br />(b) the use of wells, tanks, bathing ghats, roads and places of public resort maintained wholly or partly out of State funds or dedicated to the use of the general public</p>
<p style="text-align: justify; ">[<a href="#fr9" name="fn9">9</a>]. Article 253: Legislation for giving effect to international agreements - Notwithstanding anything in the foregoing provisions of this Chapter, Parliament has power to make any law for the whole or any part of the territory of India for implementing any treaty, agreement or convention with any other country or countries or any decision made at any international conference, association or other body.</p>
<p>[<a href="#fr10" name="fn10">10</a>]. For more details on the legislation, along with the full text, refer to http://socialjustice.nic.in/policiesacts3.php.</p>
<p>[<a href="#fr11" name="fn11">11</a>]. See generally: <a href="http://www.accessability.co.in/access/files/Accessibility-in-India-Issues-Status-Way-Forward.pps">www.accessability.co.in/access/files/Accessibility-in-India-Issues-Status-Way-Forward.pps</a>.</p>
<p style="text-align: justify; ">[<a href="#fr12" name="fn12">12</a>]. “Bank loses accessibility case”, available at <a href="http://www.fm-world.co.uk/news/fm-industry-news/bank-loses-accessibility-case/">http://www.fm-world.co.uk/news/fm-industry-news/bank-loses-accessibility-case/</a>.</p>
<p style="text-align: justify; ">[<a href="#fr13" name="fn13">13</a>]. Singh, A. & Nizamie, S.H. (2004) Disability: the concept and related Indian legislations. <i>Mental Health Reviews,</i> accessed from http://www.psyplexus.com/mhr/disability_india.html on September 11, 2012.</p>
<p>[<a href="#fr14" name="fn14">14</a>]. Id.</p>
<p>[<a href="#fr15" name="fn15">15</a>]. Id.</p>
<p style="text-align: justify; ">[<a href="#fr16" name="fn16">16</a>]. Full text of the legislation is available at The Banking Regulation Act, 1949, <a href="http://indiankanoon.org/doc/1129081/">http://indiankanoon.org/doc/1129081/</a></p>
<p style="text-align: justify; ">[<a href="#fr17" name="fn17">17</a>]. Section 35A: Power of the Reserve Bank to give directions-<br />(1) Where the Reserve Bank is satisfied that-<br />(a) in the public interest; or<br />(aa)in the interest of banking policy; or<br />(b) to prevent the affairs of any banking company being conducted in a manner detrimental to the interests of the depositors or in a manner prejudicial to the interests of the banking company; or<br />(c) to secure the proper management of any banking company generally; it is necessary to issue directions to banking companies generally or to any banking company in particular, it may, from time to time, issue such directions as it deems fit, and the banking companies or the banking company, as the case may be, shall be bound to comply with such directions.<br />(2) The Reserve Bank may, on representation made to it or on its own motion, modify or cancel any direction issued under sub- section (1), and in so modifying or cancelling any direction may impose such conditions as it thinks fit, subject to which the modification or cancellation shall have effect.</p>
<p>[<a href="#fr18" name="fn18">18</a>]. Available at http://rbi.org.in/scripts/NotificationUser.aspx?Id=4226&Mode=0</p>
<p>[<a href="#fr19" name="fn19">19</a>]. Available at <a href="http://rbi.org.in/scripts/NotificationUser.aspx?Id=4923&Mode=0">http://rbi.org.in/scripts/NotificationUser.aspx?Id=4923&Mode=0</a></p>
<p>[<a href="#fr20" name="fn20">20</a>]. Available at <a href="http://www.rbi.org.in/scripts/BS_CircularIndexDisplay.aspx?Id=7548">http://www.rbi.org.in/scripts/BS_CircularIndexDisplay.aspx?Id=7548</a></p>
<p>[<a href="#fr21" name="fn21">21</a>]. Available at <a href="http://rbi.org.in/scripts/BS_CircularIndexDisplay.aspx?Id=5071">http://rbi.org.in/scripts/BS_CircularIndexDisplay.aspx?Id=5071</a>.</p>
<p>[<a href="#fr22" name="fn22">22</a>]. “Banking Made Easier for People with Disabilities”, available at <a href="http://www.autism-india.org/india_legal.html">http://www.autism-india.org/india_legal.html</a>.</p>
<p>[<a href="#fr23" name="fn23">23</a>]. Available at <a href="http://rbi.org.in/scripts/NotificationUser.aspx?Mode=0&Id=5248">http://rbi.org.in/scripts/NotificationUser.aspx?Mode=0&Id=5248</a>.</p>
<p>[<a href="#fr24" name="fn24">24</a>]. National Policy for Persons with Disability, available at <a href="http://www.socialjustice.nic.in/nppde.php?format=print">http://www.socialjustice.nic.in/nppde.php?format=print</a>.</p>
<p style="text-align: justify; ">[<a href="#fr25" name="fn25">25</a>]. Principle Areas of Intervention VI (x): “Banking system will be encouraged to meet the needs to the persons with disabilities”, <i>Id.</i></p>
<p style="text-align: justify; ">[<a href="#fr26" name="fn26">26</a>]. See generally: Discussion on disability in the Mid Term Appraisal of the Eleventh Five Year Plan, Page 185, available at <a href="http://planningcommission.nic.in/plans/mta/11th_mta/chapterwise/Comp_mta11th.pdf">http://planningcommission.nic.in/plans/mta/11th_mta/chapterwise/Comp_mta11th.pdf</a>.</p>
<p style="text-align: justify; ">[<a href="#fr27" name="fn27">27</a>]. Tim Noonan, “Acceptable E-commerce in Australia: A Discussion Paper about the Effects of Electronic Commerce Developments on People With Disabilities”, available at <a href="http://www.timnoonan.com.au/ecrep10.htm">http://www.timnoonan.com.au/ecrep10.htm</a></p>
<p>[<a href="#fr28" name="fn28">28</a>]. Id.</p>
<p style="text-align: justify; ">[<a href="#fr29" name="fn29">29</a>]. “Barriers to Using Automatic Teller Machines”, Tim Noonan, available at <a href="http://www.hreoc.gov.au/disability_rights/inquiries/ecom/atmpaper.htm">http://www.hreoc.gov.au/disability_rights/inquiries/ecom/atmpaper.htm</a>, last viewed on July 26, 2012.</p>
<p>[<a href="#fr30" name="fn30">30</a>]. See generally: Accessibility at the RBS, available at <a href="http://www.bankofscotland.co.uk/accessibility/hearing-impaired/">http://www.bankofscotland.co.uk/accessibility/hearing-impaired/</a>, last viewed on July 20.</p>
<p style="text-align: justify; ">[<a href="#fr31" name="fn31">31</a>]. In conversation with Mr. George Abraham, CEO, SCORE Foundation. Ms. Radhika Alkazi, Managing Trustee of Aarth-Aastha also pointed out that in many instances, banks often ask persons with disabilities to bring someone else to sign for them (or operate the account on their behalf) even when the person is fully capable of signing and operating the account themselves. There is no fixed basis for the procedure, which varies from bank to bank.</p>
<p style="text-align: justify; ">[<a href="#fr32" name="fn32">32</a>]. “Barriers to Using Automatic Teller Machines”, Tim Noonan, available at <a href="http://www.hreoc.gov.au/disability_rights/inquiries/ecom/atmpaper.htm">http://www.hreoc.gov.au/disability_rights/inquiries/ecom/atmpaper.htm</a>, last viewed on July 26, 2012.</p>
<p style="text-align: justify; ">[<a href="#fr33" name="fn33">33</a>]. “The Challenges of Blind Internet Users”, available at <a href="http://www.evengrounds.com/blog/challenges-of-blind-internet-users">http://www.evengrounds.com/blog/challenges-of-blind-internet-users</a>, last viewed on July 15.</p>
<p style="text-align: justify; ">[<a href="#fr34" name="fn34">34</a>]. See generally: Accessibility at the RBS, available at <a href="http://www.bankofscotland.co.uk/accessibility/visually-impaired/">http://www.bankofscotland.co.uk/accessibility/visually-impaired/</a>, last viewed on July 20.</p>
<p style="text-align: justify; ">[<a href="#fr35" name="fn35">35</a>]. Consider the development of such ATMs by Wells Fargo bank in the USA; more details are available at https://www.wellsfargo.com/about/diversity/accessibility/.</p>
<p style="text-align: justify; ">[<a href="#fr36" name="fn36">36</a>]. In conversation with Mr. Anil Joshi, the Programme Director of Human Ability and Accessibility at IBM, who works with parents of children with Down’s Syndrome and other mental disabilities. He also pointed out that given that only a miniscule portion of people with disabilities are able to understand banking concepts, the few who do so invariably use banking facilities with the help of their parents or guardians.</p>
<p style="text-align: justify; ">[<a href="#fr37" name="fn37">37</a>]. “Barriers to Using Automatic Teller Machines”, Tim Noonan, available at <a href="http://www.hreoc.gov.au/disability_rights/inquiries/ecom/atmpaper.htm">http://www.hreoc.gov.au/disability_rights/inquiries/ecom/atmpaper.htm</a>, last viewed on July 26, 2012.</p>
<p style="text-align: justify; ">[<a href="#fr38" name="fn38">38</a>]. “Customising mobile banking in India: issues and challenges”, Address delivered by Shri Harun R. Khan, Deputy Governor, Reserve Bank of India, at the FICCI-IBA (FIBAC) 2012 Conference on-“Sustainable excellence through customer engagement, employee engagement and right use of technology” on September 5, 2012 at Mumbai, available at <a href="http://www.rbi.org.in/scripts/BS_SpeechesView.aspx?id=726">http://www.rbi.org.in/scripts/BS_SpeechesView.aspx?id=726</a>.</p>
<p>[<a href="#fr39" name="fn39">39</a>]. Id.</p>
<p>[<a href="#fr40" name="fn40">40</a>]. Available at <a href="http://www.rbi.org.in/Scripts/bs_viewcontent.aspx?Id=1660">http://www.rbi.org.in/Scripts/bs_viewcontent.aspx?Id=1660</a>.</p>
<p style="text-align: justify; ">[<a href="#fr41" name="fn41">41</a>]. Leonard R. Kasday, "<a href="http://www.acm.org/pubs/articles/proceedings/chi/355460/p161-kasday/p161-kasday.pdf">A Tool to Evaluate Universal Web Accessibility</a>" Posters, Proceedings of the 2000 International Conference on Intelligent User Interfaces 2000, pp. 161-162.</p>
<p>[<a href="#fr42" name="fn42">42</a>]. See generally: “WCAG 2 at a Glance”, available at <a href="http://www.w3.org/WAI/WCAG20/glance/">http://www.w3.org/WAI/WCAG20/glance/</a></p>
<p>[<a href="#fr43" name="fn43">43</a>]. See generally: “Website Accessibility”, available at <a href="http://www.tiresias.org/research/guidelines/web.htm">http://www.tiresias.org/research/guidelines/web.htm</a></p>
<p style="text-align: justify; ">[<a href="#fr44" name="fn44">44</a>]. For more details, see generally: “Website Accessibility”, available at <a href="http://www.tiresias.org/research/guidelines/web.htm">http://www.tiresias.org/research/guidelines/web.htm</a></p>
<p>[<a href="#fr45" name="fn45">45</a>]. The Compliance Matrix can be accessed at <a href="http://web.guidelines.gov.in/compliance.php">http://web.guidelines.gov.in/compliance.php</a>.</p>
<p style="text-align: justify; ">[<a href="#fr46" name="fn46">46</a>]. “Deaf and Hearing Impaired”, Woei-Jyh Lee, Handbook of Universal Usability in Practice, available at <a href="http://otal.umd.edu/UUPractice/hearing/">http://otal.umd.edu/UUPractice/hearing/</a>, last viewed on 23 July, 2012.</p>
<p style="text-align: justify; ">[<a href="#fr47" name="fn47">47</a>]. “ATM Usage very low in India, says RBI”, available at http://www.firstpost.com/economy/atm-usage-very-low-in-india-says-rbi-404198.html.</p>
<p>[<a href="#fr48" name="fn48">48</a>]. Available at <a href="http://rbi.org.in/scripts/NotificationUser.aspx?Id=7286&Mode=0">http://rbi.org.in/scripts/NotificationUser.aspx?Id=7286&Mode=0</a>.</p>
<p style="text-align: justify; ">[<a href="#fr49" name="fn49">49</a>]. Harsh Vardhan, “White Label ATMs”, available at <a href="http://ajayshahblog.blogspot.in/2012/08/white-label-atms.html">http://ajayshahblog.blogspot.in/2012/08/white-label-atms.html</a>.</p>
<p style="text-align: justify; ">[<a href="#fr50" name="fn50">50</a>]. “Department of Justice finalises New ATM Accessibility Standards”, available at <a href="http://www.diebold.com/solutions/atms/opteva/html/Diebold_AccessibilityStandards.pdf">http://www.diebold.com/solutions/atms/opteva/html/Diebold_AccessibilityStandards.pdf</a>, last viewed on July 12.</p>
<p style="text-align: justify; ">[<a href="#fr51" name="fn51">51</a>]. “Department of Justice Finalises New ATM Accessibility Standards”, available at <a href="http://www.diebold.com/solutions/atms/opteva/html/Diebold_AccessibilityStandards.pdf">http://www.diebold.com/solutions/atms/opteva/html/Diebold_AccessibilityStandards.pdf</a>, last viewed on July 12.</p>
<p>[<a href="#fr52" name="fn52">52</a>]. “Making Bank Notes Accessible for Canadians Living with Blindness or Low Vision”, Carolyn Samuel, available at <a href="http://www.bankofcanada.ca/wp-content/uploads/2011/08/samuel.pdf">http://www.bankofcanada.ca/wp-content/uploads/2011/08/samuel.pdf.</a></p>
<p>[<a href="#fr53" name="fn53">53</a>]. Id.</p>
<p>[<a href="#fr54" name="fn54">54</a>]. Carolyn Samuel, “Making Bank Notes Accessible for Canadians Living With Blindness or Low Vision”, available at <a href="http://www.bankofcanada.ca/wp-content/uploads/2011/08/samuel.pdf">http://www.bankofcanada.ca/wp-content/uploads/2011/08/samuel.pdf</a>.</p>
<p>[<a href="#fr55" name="fn55">55</a>]. (DBOD.No.Leg.BC.123 /09.07.005/2008-09).</p>
<p>[<a href="#fr56" name="fn56">56</a>]. Refer to Section 4.3 of the Report.</p>
<p style="text-align: justify; ">[<a href="#fr57" name="fn57">57</a>]. Dinesh Kaushal, “The Case for Accessible Banking”, available at <a href="https://cis-india.org/accessibility/accessible-banking">http://cis-india.org/accessibility/accessible-banking</a>.</p>
<p style="text-align: justify; ">[<a href="#fr58" name="fn58">58</a>]. NR Indran, “UBI to deploy Mumbai’s first Talking ATM for the visually challenged”, available at <a href="http://apnnews.com/2012/07/09/ubi-to-deploy-mumbai%E2%80%99s-first%E2%80%98talking-atm%E2%80%99-for-the-visually-challenged-powered-by-ncr/">http://apnnews.com/2012/07/09/ubi-to-deploy-mumbai%E2%80%99s-first%E2%80%98talking-atm%E2%80%99-for-the-visually-challenged-powered-by-ncr/</a></p>
<p>[<a href="#fr59" name="fn59">59</a>]. Id.</p>
<p>[<a href="#fr60" name="fn60">60</a>]. “NCR Corp to set up 50 Talking ATMs in passport offices”, available at http://lflegal.com/2012/09/ncr-india/.</p>
<p>[<a href="#fr61" name="fn61">61</a>]. “NCR Corp to set up 50 Talking ATMs in passport offices”, available at http://lflegal.com/2012/09/ncr-india/.</p>
<p style="text-align: justify; ">[<a href="#fr62" name="fn62">62</a>]. Dinesh Kaushal, “The Case for Accessible Banking”, available at <a href="https://cis-india.org/accessibility/accessible-banking">http://cis-india.org/accessibility/accessible-banking</a>.</p>
<p>[<a href="#fr63" name="fn63">63</a>]. Id.</p>
<p style="text-align: justify; ">[<a href="#fr64" name="fn64">64</a>]. “Department of Justice Finalises New ATM Accessibility Standards”, available at <a href="http://www.diebold.com/solutions/atms/opteva/html/Diebold_AccessibilityStandards.pdf">http://www.diebold.com/solutions/atms/opteva/html/Diebold_AccessibilityStandards.pdf</a>, last viewed on July 12.</p>
<p>[<a href="#fr65" name="fn65">65</a>]. See more details at <a href="http://www.unionbankofindia.co.in/personal_TalkingATMs.aspx">http://www.unionbankofindia.co.in/personal_TalkingATMs.aspx</a></p>
<p style="text-align: justify; ">[<a href="#fr66" name="fn66">66</a>]. These guidelines are available at <a href="http://www.nzba.org.nz/banking-standards/code-of-banking-practice/voluntary-guidelines-to-assist-banks-to-meet-the-needs-of-older-and-disabled-customers/">http://www.nzba.org.nz/banking-standards/code-of-banking-practice/voluntary-guidelines-to-assist-banks-to-meet-the-needs-of-older-and-disabled-customers/</a></p>
<p>[<a href="#fr67" name="fn67">67</a>]. Id.</p>
<p>[<a href="#fr68" name="fn68">68</a>]. Id.</p>
<p>[<a href="#fr69" name="fn69">69</a>]. Id.</p>
<p style="text-align: justify; ">[<a href="#fr70" name="fn70">70</a>]. Section 4 of the DDA defines disability in relation to a person as:<br />a. total or partial loss of the person's bodily or mental functions; or<br />b. total or partial loss of a part of the body; or<br />c. the presence in the body of organisms causing disease or illness; or<br />d. the presence in the body of organisms capable of causing disease or illness; or<br />e. the malfunction, malformation or disfigurement of a part of the person's body; or<br />f. a disorder or malfunction that results in the person learning differently from a person without the disorder or malfunction; or<br />g. a disorder, illness or disease that affects a person's thought processes, perception of reality, emotions or judgment or that results in disturbed behaviour; and includes a disability that:<br />a. presently exists; or<br />b. previously existed but no longer exists; or<br />c. may exist in the future; or is imputed to a person.</p>
<p style="text-align: justify; ">[<a href="#fr71" name="fn71">71</a>]. Section 4 of the DDA defines a service as relating to, amongst other things, banking, insurance, superannuation and the provision of grants, loans, credit or finance, and including financial and information services provided, for example, through websites, telephones, ATMs and EFTPOS.</p>
<p style="text-align: justify; ">[<a href="#fr72" name="fn72">72</a>]. For a full list, please refer to: <a href="http://www.bankers.asn.au/Industry-Standards/ABAs-Accessibility-of-Electronic-Banking-/Industry-Standards---Accessibility">http://www.bankers.asn.au/Industry-Standards/ABAs-Accessibility-of-Electronic-Banking-/Industry-Standards---Accessibility</a>, last accessed on 12<sup>th</sup> August, 2012.</p>
<p style="text-align: justify; ">[<a href="#fr73" name="fn73">73</a>]. Refer to <a href="http://www.bankers.asn.au/Industry-Standards/ABAs-Accessibility-of-Electronic-Banking-/ATM-Standard">http://www.bankers.asn.au/Industry-Standards/ABAs-Accessibility-of-Electronic-Banking-/ATM-Standard</a></p>
<p style="text-align: justify; ">[<a href="#fr74" name="fn74">74</a>]. Refer to <a href="http://www.bankers.asn.au/Industry-Standards/ABAs-Accessibility-of-Electronic-Banking-/EFTPOS-Standard">http://www.bankers.asn.au/Industry-Standards/ABAs-Accessibility-of-Electronic-Banking-/EFTPOS-Standard</a></p>
<p style="text-align: justify; ">[<a href="#fr75" name="fn75">75</a>]. Refer to <a href="http://www.bankers.asn.au/Industry-Standards/ABAs-Accessibility-of-Electronic-Banking-/Automated-Telephone-Banking-Standard">http://www.bankers.asn.au/Industry-Standards/ABAs-Accessibility-of-Electronic-Banking-/Automated-Telephone-Banking-Standard</a></p>
<p style="text-align: justify; ">[<a href="#fr76" name="fn76">76</a>]. ABA Industry Standard on Electronic Banking, available at <a href="http://www.bankers.asn.au/Industry-Standards/ABAs-Accessibility-of-Electronic-Banking-/Internet-Banking-Standard">http://www.bankers.asn.au/Industry-Standards/ABAs-Accessibility-of-Electronic-Banking-/Internet-Banking-Standard</a></p>
<p style="text-align: justify; ">[<a href="#fr77" name="fn77">77</a>]. Refer to <a href="http://www.bankers.asn.au/Industry-Standards/ABAs-Accessibility-of-Electronic-Banking-/Australian-Banking-Industry-E-Commerce-Industry-Action-Plan">http://www.bankers.asn.au/Industry-Standards/ABAs-Accessibility-of-Electronic-Banking-/Australian-Banking-Industry-E-Commerce-Industry-Action-Plan</a></p>
<p style="text-align: justify; ">[<a href="#fr78" name="fn78">78</a>]. “Background to the Guiding Principles”, Section 1.1 of the ABA Guiding Principles for Accessible Authentication, available at <a href="http://www.bankers.asn.au/ArticleDocuments/177/ABA-Guiding_Principles_for_Accessible_Authentication.doc.aspx">http://www.bankers.asn.au/ArticleDocuments/177/ABA-Guiding_Principles_for_Accessible_Authentication.doc.aspx</a></p>
<p>[<a href="#fr79" name="fn79">79</a>]. Id.</p>
<p style="text-align: justify; ">[<a href="#fr80" name="fn80">80</a>]. “Department of Justice Finalises New ATM Accessibility Standards”, available at <a href="http://www.diebold.com/solutions/atms/opteva/html/Diebold_AccessibilityStandards.pdf">http://www.diebold.com/solutions/atms/opteva/html/Diebold_AccessibilityStandards.pdf</a>, last viewed on July 12</p>
<p style="text-align: justify; ">[<a href="#fr81" name="fn81">81</a>]. See generally: “Department of Justice finalizes new ATM accessibility standards”, available at <a href="http://www.diebold.com/solutions/atms/opteva/html/Diebold_AccessibilityStandards.pdf">www.diebold.com/solutions/atms/opteva/html/Diebold_AccessibilityStandards.pdf</a></p>
<p style="text-align: justify; ">[<a href="#fr82" name="fn82">82</a>]. A summary is available at “Standard B651.1-09”, sourced from <a href="http://hub.eaccessplus.eu/wiki/Canadian_standard_for_accessible_design_for_automated_banking_machines">http://hub.eaccessplus.eu/wiki/Canadian_standard_for_accessible_design_for_automated_banking_machines</a>, and a full text can be purchased from the Canadian Standards Association website.</p>
<p style="text-align: justify; ">[<a href="#fr83" name="fn83">83</a>]. “The extent to which technical requirements are applied is the responsibility of others, such as the authority having jurisdiction.”</p>
<p style="text-align: justify; ">[<a href="#fr84" name="fn84">84</a>]. “Barrier Free Banking”, available at <a href="http://www.abilities.ca/agc/article/article.php?pid=&cid=&subid=&aid=429">http://www.abilities.ca/agc/article/article.php?pid=&cid=&subid=&aid=429</a></p>
<p>[<a href="#fr85" name="fn85">85</a>]. Id.</p>
<p style="text-align: justify; ">[<a href="#fr86" name="fn86">86</a>]. “Dutch Guidelines for User Friendly payment terminals”, available at <a href="http://hub.eaccessplus.eu/wiki/Dutch_Guidelines_for_user-friendly_payment_terminals">http://hub.eaccessplus.eu/wiki/Dutch_Guidelines_for_user-friendly_payment_terminals</a></p>
<p style="text-align: justify; ">[<a href="#fr87" name="fn87">87</a>]. “Dutch Guidelines for Payment Systems”, available at <a href="http://hub.eaccessplus.eu/uploads/a/a1/Dutch_Guidelines_on_payment_systems.pdf">http://hub.eaccessplus.eu/uploads/a/a1/Dutch_Guidelines_on_payment_systems.pdf</a></p>
<p>[<a href="#fr88" name="fn88">88</a>]. Id.</p>
<p>[<a href="#fr89" name="fn89">89</a>]. Building User Friendly Voice Systems, Tim Noonan, available at <a href="http://www.timnoonan.com.au/ivrpap98.htm">http://www.timnoonan.com.au/ivrpap98.htm</a></p>
<p style="text-align: justify; ">[<a href="#fr90" name="fn90">90</a>]. See generally, “What are the possibilities”, the webpage for the Xavier’s Resource Centre for the Visually Challenged, available at <a href="http://www.xrcvc.org/fs_alternatives.php">http://www.xrcvc.org/fs_alternatives.php</a></p>
<p style="text-align: justify; ">[<a href="#fr91" name="fn91">91</a>]. In countries like Japan, even sighted people use what are known as signature stamps, Hanko and Inkan, instead of actual signatures, for signing of official documents. This is a practice that can also be incorporated by banks.</p>
<p style="text-align: justify; ">[<a href="#fr92" name="fn92">92</a>]. See generally, “What are the possibilities”, the webpage for the Xavier’s Resource Centre for the Visually Challenged, available at <a href="http://www.xrcvc.org/fs_alternatives.php">http://www.xrcvc.org/fs_alternatives.php</a>.</p>
<p style="text-align: justify; ">[<a href="#fr93" name="fn93">93</a>]. In conversation with Ms. Anubhuti Mittal, who works for HR Solutions for the Differently Abled, and runs a consultancy which works with people with disabilities, providing recruitment services to the disabled, doing access audits, job mapping, sensitization and training of employees at organisations.</p>
<p style="text-align: justify; ">[<a href="#fr94" name="fn94">94</a>]. Pursuant to Section 33 of the PWD Act, which states: Every appropriate government shall appoint in every establishment such percentage of vacancies not less than three per cent for persons or class of persons with disability of which one per cent? each shall be reserved for persons suffering from:</p>
<ul style="text-align: justify; ">
<li>Blindness or low vision;</li>
<li>Bearing impairment;</li>
<li>Loco motor disability or cerebral palsy, in the posts identified for each disability: </li>
</ul>
<p style="text-align: justify; ">Provided that the appropriate Government may, having regard to the type of work carried on in any department or establishment, by notification subject to such conditions, if any, as may be specified in such notification, exempt any establishment from the provisions of this section.</p>
<p>[<a href="#fr95" name="fn95">95</a>]. For example, the Australian and New Zealand Standards (AS/NZS 4263).</p>
<p style="text-align: justify; ">[<a href="#fr96" name="fn96">96</a>]. A good reference point would be “A Look at Internet Banking Accessibility in Australia”, Sofia Celic, Steven Faulkner, and Andrew Arch, available at <a href="http://ausweb.scu.edu.au/aw04/papers/refereed/celic/paper.html">http://ausweb.scu.edu.au/aw04/papers/refereed/celic/paper.html</a>, where the authors have studied the websites of different Australian banks to see how far they are complying with the WCAG1.0 guidelines and have rated them on different criteria. Unfortunately, the team found that “the overall status of the accessibility of Australian banking web sites, using the accessibility of their home pages as an indicator, is less than desirable. None of the banks assessed has met the <acronym>ABA</acronym> recommended timetable of addressing all applicable <acronym>WCAG</acronym> 1.0 Priority 1 and Priority 2 checkpoints within 18 months of the Standard being released (April 2002).”</p>
<hr />
<p><b>Contributors:</b></p>
<ul>
<li>Nirmita Narasimhan, Policy Director</li>
<li>Vrinda Maheshwari, Consultant</li>
</ul>
<p><a href="https://cis-india.org/accessibility/blog/banking-accessibility-report.pdf" class="internal-link">Click to download the entire report </a>(PDF) 802 Kb</p>
<ul>
</ul>
<ul>
</ul>
<ul>
</ul>
<ul style="text-align: justify; ">
</ul>
<p>
For more details visit <a href='https://cis-india.org/accessibility/blog/banking-and-accessibility-in-india-report'>https://cis-india.org/accessibility/blog/banking-and-accessibility-in-india-report</a>
</p>
No publishernirmitaFeaturedHomepageAccessibility2013-08-13T04:00:19ZBlog EntryInstitute on Internet & Society: Event Report
https://cis-india.org/telecom/knowledge-repository-on-internet-access/institute-on-internet-and-society-event-report
<b>The Institute on Internet and Society organized by the Centre for Internet and Society (CIS) with grant supported by the Ford Foundation took place from June 8 to 14, 2013 at the Golden Palms Resort in Bangalore.</b>
<p style="text-align: justify;">A total of 20 participants spent the seven days in a residential institute, learning about the fundamental technologies of the Internet and topics on which CIS has expertise on such as Accessibility, Openness, Privacy, Digital Natives and Internet Governance.</p>
<p style="text-align: justify;">The participants belonged to various stakeholder groups and it provided a common forum (first of its kind in India) to discuss and share ideas. Twenty-four expert speakers from various domains came to share their knowledge and speak about their work, so as to encourage activity in the field and supply resources from which participants could learn to increase their accessibility, range and funding possibilities, as well as network with the speakers and amongst themselves.</p>
<p style="text-align: justify;">The Institute has triggered a number of follow-up events — those that the participants organized themselves with the help of CIS staff, including Crypto Parties in Bangalore, Delhi and Mumbai, that taught netizens to keep their online communication private. In addition to that, the CIS Access2Knowledge (A2K) team could rope in eight new Wikipedians who will contribute to Wikipedia in Indic languages.</p>
<p style="text-align: justify;">The day wise talks and activities that took place are listed below:</p>
<hr />
<h2 style="text-align: justify;">Day 1: June 8, 2013</h2>
<p style="text-align: justify;">The seven day residential Institute began on Saturday, the 8th of June with a warm welcome by Dr. Ravina Aggarwal and Dr. Nirmita Narasimhan. They outlined the purpose of the residential institute and briefly went over the topics which would get covered over the week long duration. This was followed by each of the participants introducing themselves briefly and also stating their expectations from the Institute, why they were attending the same and what they hope to get at the end.</p>
<p style="text-align: justify;"> </p>
<h3>Session 1: History of the Internet</h3>
<p>(by Pranesh Prakash and Bernadette Längle)</p>
<table class="listing">
<tbody>
<tr>
<td>
<p><img src="https://cis-india.org/home-images/Pranesh.png/@@images/539b71f7-111a-4700-a90b-17cbdb5589bc.png" alt="" class="image-inline" title="Pranesh Prakash" /></p>
<p style="text-align: justify;"><em>Above is a picture of Pranesh Prakash <br />speaking about the History of the Internet during <br />the first session on Day 1.</em></p>
</td>
<td>
<p style="text-align: justify;">The Institute proceedings kicked off with the first session, <strong>History of the Internet</strong> by Pranesh Prakash and Bernadette Längle. Participants learned where the Internet originally came from and how it is organized, as well as different technologies surrounding the Internet. Pranesh Prakash and Bernadette Längle set the start point of the Internet in the late 50's when the Russians send the first satellite in space (Sputnik) and the US founded the DARPA(<em>Defense Advanced Research Projects Agency</em>), a research agency that was tasked with creating new technologies for military use. DARPA is credited with development of many technologies which have had a major effect on the world, including computer networking, as well as NLS, which was both the first hypertext system, and an important precursor to the contemporary ubiquitous graphical user interface (GUI). A few years later the first four computers were connected to a network.</p>
</td>
</tr>
</tbody>
</table>
<p style="text-align: justify;">After the Network Control Protocol (NCP, later replaced by the TCP/IP) was invented in 1970, the first applications were made: email (connecting people), telnet (connecting computers) and the file transport protocol (FTP) (connecting information) — all of these are still in use today. Participants were surprised to learn that the Web, most commonly used today, known to be invented by one single person in the 90's, actually existed for a long time prior to the '90s.</p>
<p style="text-align: justify;"><strong>VIDEO</strong></p>
<iframe src="//www.youtube.com/embed/p4iFqDnhNZI" frameborder="0" height="250" width="250"></iframe>
<h3 style="text-align: justify;">Session 2: Domestic Bodies and Mechanisms</h3>
<p style="text-align: justify;">(by Pranesh Prakash)<br />After lunch, Pranesh Prakash led the second session about Domestic Bodies and Mechanisms and he started with some of the problems associated with the Domestic Regulatory Bodies:</p>
<ol>
<li>Lack of coherence and consistency in Internet related policies</li>
<li>Rather than co-operating, the different agencies compete with each other.</li>
<li>Communication with the public is of different degrees and openness of different agencies varies.</li></ol>
<ul>
<li style="text-align: justify;">Department of Electronics and Information Technology (DEITY), is one of the most important public agencies & the CERT-in focuses on issues like malware and content regulation. There is also the STQC (Standard Setting and Quality Setting Body).</li>
<li style="text-align: justify;">The work of these organizations is to govern the Internet, bring about better privacy policies and ensure freedom of speech.</li>
<li style="text-align: justify;">Other governing bodies include DOT (Department of Telecommunications) which governs the telecom and internet policies of India. In India, certain content regulation takes place under a notification as part of the IT Act, 2003.</li>
<li style="text-align: justify;">TRAI (Telecom Regulatory Authority of India) also looks into the tariff, interconnections and quality of telecom sector, spectrum regulation and so on.</li>
<li style="text-align: justify;">The USOF (Universal Service Obligation Fund) seeks to provide funds for setting up telecom services in rural areas.</li>
<li style="text-align: justify;">Ministry of Information and Broadcasting (MIB) has been extending copyright restrictions to online publications.</li></ul>
<h3> VIDEO<br /></h3>
<iframe src="//www.youtube.com/embed/e0VlI12fODE" frameborder="0" height="250" width="250"></iframe>
<h3>Session 3: Emerging trends in Internet usage in India</h3>
<p>(by Nandini C and Vir Kamal Chopra)<br /><strong>Emerging Trends in Internet Usage with specific focus on BSNL offerings</strong> (by Vir Kamal Chopra)<br />Some of the salient points discussed were:</p>
<p></p>
<p> </p>
<ul>
<li style="text-align: justify;">In 1995, the VSNL provided internet in 4 metros of India, by 1998 DOT had provided internet in 42 cities.</li>
<li style="text-align: justify;">Some of the facilities internet provides include Tele-education, Tele-medicine, mobile banking, payment of bills via mobile internet, etc.</li>
<li style="text-align: justify;"> BSNL has got maximum broadband market share in India.</li>
<li style="text-align: justify;"> Present Scenario, there are 900 million mobiles in India, 430 million wireless connections with capability to access data.</li>
<li style="text-align: justify;"> The total broadband connections are 15 million in country, 10 million provided by BSNL.</li>
<li style="text-align: justify;"> Total internet users are 120 million with a growth rate of 30%.</li>
<li style="text-align: justify;"> Public access is not only about network intermediaries but about info-mediaries who understand internet.</li>
<li style="text-align: justify;"> BSNL lost Rs 18,000 crores from 3G license.</li>
<li style="text-align: justify;"> 2G to 3G shifting is not seamless and leads to lot of packet loss, and 3G coverage is not as extensive as 2G. Thus 3G is not efficient however; the government has made a lot of money from selling 3G licenses.</li>
<li style="text-align: justify;"> Future trends include technology trends for internet access, optical fiber technologies, fiber to the curb, fibre to the home, metro Ethernet, etc. </li>
<li style="text-align: justify;">Internet has created an online Public sphere.</li>
<li style="text-align: justify;"> In 2000 Parliament passed the Information Technology Act 2000 and the dot.com boom is seen.</li></ul>
<p style="text-align: justify;"><strong>Making internet access meaningful in the Indian Context</strong> (by Nandini.C) <br />(<a class="external-link" href="http://internet-institute.in/repository/womens-access-to-the-internet">Click to see the presentation slides</a>)<br />Some of the salient points discussed were: <br /></p>
<p style="text-align: justify;"> </p>
<ul>
<li style="text-align: justify;">Status of internet access today sees low level of overall penetration of internet, high rate of household mobile penetration and huge rural-urban divide in internet access.</li>
<li style="text-align: justify;"> Relationship b/w women and internet in India</li>
<li style="text-align: justify;"> 8.4% of women in India have access to internet in India and 43% of women using internet in India perceived it as being an important part of their life.</li>
<li style="text-align: justify;"> Some area of concerns include ensuring adequate access of internet for the women, entrenched patriarchies, contextual relevance, the imaginary of ‘public access’.</li>
<li style="text-align: justify;">The importance of an existing strong social support network, ITC itself cannot open up economic/social empowerment opportunities for women</li>
<li style="text-align: justify;"> ICT-enabled micro-enterprises may also force the burden of double work on women, who undertake both productive activities for the micro-enterprise and re/productive activities for the household.</li>
<li style="text-align: justify;"> The Internet today has created an online public sphere.</li>
<li style="text-align: justify;"> Countering the threat of online violence.</li>
<li style="text-align: justify;"> Censorship and content regulation.</li>
<li style="text-align: justify;"> Women’s rights and the spaces of internet governance.</li>
<li style="text-align: justify;"> Arbitrary censorship and self-regulation by the corporate and slide towards an illusory freedom; state is used as a bogeyman by corporate to create an online culture that is suitable to the corporate values.</li></ul>
<p> <strong>VIDEO</strong></p>
<p><iframe src="http://www.youtube.com/embed/CUaGZh5nNR4" frameborder="0" height="250" width="250"></iframe></p>
<p><strong><br /></strong></p>
<div id="_mcePaste" style="text-align: justify;"><strong>Activity</strong><br />Day 1 featured an interesting activity called the Creative Handshake. The goal of the game was to teach the participants the concept of "Handshake" in Internet terms and why it is important to make sure that integrity of data transferred is maintained.</div>
<hr />
<h2 style="text-align: justify;">Day 2: June 9, 2013</h2>
<p style="text-align: justify;">The focus of the second day was more on the nuts and bolts behind the working of the Internet by Dr. Nadeem Akhtar, Wireless Technologies and a case-study in Air Jaldi by Michael Ginguld, Collaborative Knowledge base building by Vishnu Vardhan and Affordable Devices on the Internet by Ravikiran Annaswamy.</p>
<p style="text-align: justify;">The salient points of each of the talks are listed below.</p>
<h3 style="text-align: justify;">Session 1: How Internet Works</h3>
<p>(by Nadeem Akhtar)<br /><a class="external-link" href="http://internet-institute.in/repository/how-internet-works">Click to read the presentation slides</a></p>
<ul>
<li>Internet structure and hierarchy:<br />
<ol>
<li style="text-align: justify;">Data Networks comprise of set of nodes, connected by transmission links, for exchange of data between nodes. </li>
<li style="text-align: justify;">Some of the key principles which underpin data networks include digital transmission, multiplexing and data forwarding/routing.</li></ol>
</li>
<li>Data networks through ownership include public and private networks.</li>
<li>Data networks through coverage include local area networks (small area), metro area networks (may comprise of a city) and wide area networks (wide geographic area across cities).</li>
<li>Protocols include:<br />
<ol>
<li style="text-align: justify;">Open systems interconnection (OSI) model divides a communication system into smaller parts. Each part is referred to as a layer. Similar communication functions are grouped into logical layers.</li>
<li style="text-align: justify;">OSI model defines the different stages that data must go through to travel from one device to another over a network & this enables a modular approach towards developing complex system functionality i.e. functionality at layer X does not depend on how layer Y is implemented.</li></ol>
<table class="listing">
<tbody>
<tr>
<th><img src="https://cis-india.org/home-images/Nadeem.png" alt="" class="image-inline" title="Nadeem Akhtar" /></th>
</tr>
<tr>
<td><em>Above is a picture of Dr. Nadeem Akhtar speaking on the working of the internet on Day 2</em></td>
</tr>
</tbody>
</table>
</li>
<li>Internet networks or connections.</li>
<li style="text-align: justify;">Internet backbone refers to the principal data routes between large, strategically interconnected networks and core routers on the internet and these data routes are hosted by commercial, government, academic and other high-capacity network centers, the internet exchange points and network access points. The internet back bone is decentralized.</li>
<li style="text-align: justify;">Transit Service - Passing information from small ISP to large ISP.</li>
<li style="text-align: justify;">Peering Service - The passing of information between two similar ISP’s os similar size to let network traffic pass.</li>
<li style="text-align: justify;">Three levels of network Tier1, Tier2 and Tier 3. TATA Company is the only Tier 1 Indian Company.</li>
<li style="text-align: justify;">Backhaul- Transport Links which connects access edge networks with the ‘core’ network. The transmitters have to be mounted on a high level. </li></ul>
<p> <strong>VIDEO</strong></p>
<iframe src="//www.youtube.com/embed/8skb7ykF9jI" frameborder="0" height="250" width="250"></iframe>
<h3>Session 2: Wireless Technologies</h3>
<p>(by Michael Ginguld)<br /><a class="external-link" href="http://prezi.com/tjaiatxtz1ch/walking-on-the-wireless-side/">Click to read the presentation slides</a></p>
<ul>
<li>We are surrounded by electromagnetic radiation</li>
<li>All about transmission waves and there are both advantages and disadvantages of the same:<br />
<ol>
<li style="text-align: justify;">Pros: higher reach for lower price, overcomes topographic challenges, lower maintenance, less to damage/lose</li>
<li style="text-align: justify;">Cons: limited resources, maintenance (energy), physical limitations to transfer rates.</li></ol>
</li>
<li style="text-align: justify;">Satellite/VSAT is a very small aperture tech: a small satellite dish that connects to a geo-static satellite.</li>
<li style="text-align: justify;"> Strength: globally usable, can connect from anywhere.</li>
<li style="text-align: justify;"> Weakness: signal problems, relatively high installation charge, upstream connection is lower than the downstream, transmitter on satellite is extremely expensive, hence limitation on transmission capacity of the satellite.</li>
<li style="text-align: justify;"> VSATs are not scalable. It is a dead-end tech for usages where data transmission volume is expected to grow.</li>
<li style="text-align: justify;"> 2G Technology for mobile connection.</li>
<li style="text-align: justify;">Limitation in transfer of data, due to technology and encryption limitations but great availability and reasonable price.</li>
<li style="text-align: justify;">3G Technology has a problem in India; low uptake, leading to low investment, leading to low speed, leading to low uptake. The technology allows for high-speed data transfer but the market condition in India still does not make adequate infrastructural support feasible.</li>
<li style="text-align: justify;">4G license auction.</li>
<li style="text-align: justify;">A company bought the country-wide 4G license in the auction. Mukesh Ambani bought the company after some days.</li>
<li style="text-align: justify;">The present legislation does not allow for VoIP-based Telco operation but that is expected to change soon.</li>
<li style="text-align: justify;">Wifi technology is wireless technology. It is low cost wireless transfer of data. The Public dissemination of the ranges in which data transfer using the WiFi protocol can take place. It was made public in India in January 2005.<br />
<ol>
<li>Limitations: needs line of sight, limit to data transfer.</li>
<li>Strength: cheap, de-licensed spectrum usage, easily deployable. </li></ol>
</li>
<li style="text-align: justify;"> 2G spectrum, 3G spectrum and now 4G spectrum all are part of the wireless technology.</li>
<li style="text-align: justify;">Air Jaldi started in Dharamshala; building wifi connection spanning campuses.</li>
<li style="text-align: justify;"> Three types of consumer categories: (1) no coverage, (2) under-served, and (3) ‘deserving clients’. #2 is the most common group. #3 are people who should be served but cannot pay fully for the service, hence are cross-subsidised by group #2.</li>
<li style="text-align: justify;"> Deployed and managed by local staff, trained by AirJaldi.</li>
<li style="text-align: justify;"> Customer premise equipment: Rs. 3-4k.</li>
<li style="text-align: justify;"> User charges: Rs 975 per month for 512 kbps, Rs 1500 per month for 1 mbps.</li>
<li style="text-align: justify;"> Content: by and large, AirJaldi brings infrastructure on which content can ride on, teams with various content providers (like e-learning, rural BPOs, local e-banking etc) for the content side. The biggest drivers are local BPO, banking and retail. The next big driver coming up is entertainment.</li>
<li style="text-align: justify;"> WiMax includes 4g spectrum. </li></ul>
<p> <strong>VIDEO</strong></p>
<iframe src="//www.youtube.com/embed/btd4MqOSRe0" frameborder="0" height="250" width="250"></iframe>
<h3 style="text-align: justify;">Session 3: Building Knowledge Bases and Platform via Mass Collaboration on the Internet</h3>
<p><a class="external-link" href="http://commons.wikimedia.org/wiki/File:Building_Knowledge_Bases_and_Platforms_via_Mass_Collaboration_on_the_Internet.pdf">Click to read the presentation slides</a></p>
<table class="listing">
<tbody>
<tr>
<td style="text-align: justify;">
<p>The session started off with some physical activity in the form of "Kasa Kasa Warte, Chan Chan Warte" to break off the lunch induced sleep and a mental activity where the participants were divided into two groups and both the groups were asked to collect information on "Water". One group was left to itself while the other had some expert inputs from Vishnu Vardhan on how to collaborate and organize the data. After the activity, both teams presented the information that they had collected on "Water".</p>
<p>The benefits of collaborative authoring such as "everyone's voice is heard", "various inputs leading to a multi-dimensional thinking" etc were evident as against a single dimensional thought process that was seen from the group that was un-assisted.</p>
</td>
<td><img src="https://cis-india.org/home-images/Participant.png/@@images/0bd8de0e-6e85-4100-80c7-070dd046fabf.png" alt="" class="image-inline" title="Participants" /><br /><em>Given above is a picture of the participants involved in a group activity</em></td>
</tr>
</tbody>
</table>
<p></p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">Salient points discussed during the presentation:</p>
<p style="text-align: justify;"></p>
<p style="text-align: justify;"> </p>
<ul>
<li style="text-align: justify;">The Concept of Knowledge today is not something of modern phenomena, but it is something which has been existent since print culture was developed. Print technology shapes what we consider as knowledge, and hence as knowledge platform </li>
<li style="text-align: justify;">Techno-sociality of knowledge production</li>
<li style="text-align: justify;">The Concept of Knowledge today is not something of modern phenomena, but it is something which has been existent since print culture was developed. Print technology shapes what we consider as knowledge, and hence as knowledge platform </li>
<li style="text-align: justify;">Techno-sociality of knowledge production<br />Examples of knowledge platforms:<br />
<ol>
<li>Baidu baike </li>
<li> English wikipedia </li>
<li> Hudong </li>
<li>Catawiki </li>
<li>Wikieducator </li>
<li>Open street map </li>
<li>Pad.ma </li>
<li> Sahapedia </li>
<li> Internet archive </li>
<li> Jstor </li>
<li> Dsal </li>
<li> Dli</li></ol>
</li>
<li style="text-align: justify;"> In 1994 Cunningham developed the ‘Wiki Wiki Web’ also known as the ‘Ward Wiki’. Basically it is a knowledge platform.</li>
<li style="text-align: justify;"> Internet since then has been used for dissemination of information especially in the education sector. Digital Archived have developed over the years which provide information across various platforms like Wikipedia.</li>
<li style="text-align: justify;"> The spread of the internet has made possible the building of knowledge bases by seamless and mass collaboration. </li></ul>
<p><strong> Generic challenges for Wikipedia</strong></p>
<p></p>
<p> </p>
<ul>
<li>Quality, relevance, consistency of knowledge </li>
<li>Suitable motivation of the contributors</li>
<li>Another issue is the scalability</li></ul>
<p>Some of the problems faced by Indian Wikipedian pages:</p>
<ul>
<li style="text-align: justify;">Technical infrastructure for Indian languages </li>
<li style="text-align: justify;">Typing in the regional language </li>
<li style="text-align: justify;">OCR: complexity of Indian language scripts</li>
<li style="text-align: justify;">Various other technical troubles like browser compatibility, font display, etc., which deter new users</li>
<li style="text-align: justify;">Dearth of quality content available in digital format</li>
<li style="text-align: justify;">Different standards/formats/generations (gov.in/DLI)</li>
<li style="text-align: justify;">Relative lack of research/academic standards, which is transferred on to Indic wikipedias. </li>
<li style="text-align: justify;">Lack of knowledge sharing culture.</li>
<li style="text-align: justify;">Building a mass knowledge platform is the need of the hour.</li>
<li style="text-align: justify;">The platform should be user friendly, easily available and adoptable; offline outreach is key to effective use of online platforms.</li>
<li style="text-align: justify;">The programme should have feedback loop key, behavior statistics data, reinvent and replicate the programme, multi-channel awareness, ‘user connect’ programmes.</li>
<li style="text-align: justify;">The people should communicate knowledge sharing objectives, make knowledge sharing fun, appoint ambassadors; virtual volunteer community building looks simple but its complex and leads to failure.</li></ul>
<p> <strong>VIDEO</strong></p>
<iframe src="//www.youtube.com/embed/2cM7CZ2hMeg" frameborder="0" height="250" width="250"></iframe>
<h3>Session: 4 Affordable Devices to access the Internet</h3>
<p>(by Ravikiran Annaswamy)<br /><a class="external-link" href="http://internet-institute.in/repository/MeetMobileInternet.pdf">Click to read the presentation slides</a></p>
<table class="listing">
<tbody>
<tr>
<td><img src="https://cis-india.org/home-images/Ravikiran.png" alt="" class="image-inline" title="Ravikiran Annaswamy" /></td>
</tr>
<tr>
<td><em>Given above is a picture of the speaker Ravikiran Annaswamy giving a demo of the low cost Akash tablet</em>.</td>
</tr>
</tbody>
</table>
<p></p>
<p> </p>
<ul>
<li>Overview of Affordable Mobile Phones such as Lava Iris, Karbonn A1, Nokia Asha, etc.</li>
<li>Overview of Affordable Tablets such as Aakash, Ubislate, Karbonn Smart A34, etc.</li>
<li> The number of Internet users in India is expected to nearly triple from 125 million in 2011 to 330 million by 2016, says a report by Boston Consulting Group.</li>
<li> How Internet Penetration impacts society.</li>
<li> Demo of the devices.</li>
<li> Need for Mobile Internet</li>
<li> Sugata Mitra & Arvind Eye Care examples.</li></ul>
<p> <strong>VIDEO</strong></p>
<iframe src="//www.youtube.com/embed/TUcbcFaX-v4" frameborder="0" height="250" width="250"></iframe>
<hr />
<h2>Day 3: June 10, 2013</h2>
<p style="text-align: justify;">The third day of the Institute focussed on Wired means of accessing the Internet, the technology involved followed by an assignment time where the participants were introduced to 2 topics and asked to work on an assignment. This was followed by a site visit in the afternoon to MapUnity. <strong>MapUnity</strong> develops technology to tackle social problems and development challenges. Their GIS, MIS and mobile technologies are used mostly by government departments and civil society organisations and in the R&D initiatives of commercial ventures.</p>
<h3 style="text-align: justify;">Session 1: Wired Access Technology</h3>
<p>(by Dr. Nadeem Akhtar)<br /><a class="external-link" href="http://internet-institute.in/repository/wired-access-nadeem-akhtar">Click to read the presentation slides</a></p>
<p>Some of the salient points discussed were:</p>
<p><strong>Wired and Wireless</strong></p>
<p></p>
<p> </p>
<p>Wired:</p>
<ul>
<li>Separate communication channel for each users</li>
<li> Low signal attenuation</li>
<li> No interference</li>
<li> Fixed point-of-attachment</li></ul>
<p>Wireless:</p>
<ul>
<li> Shared medium of communication</li>
<li> Signal is attenuated by a number of factors</li>
<li> Interference between adjacent channels</li>
<li> Points-of-attachment can be changed on-the-fly</li></ul>
<p>Ethernet:</p>
<ul>
<li style="text-align: justify;"> A family of computer networking technologies for LANs which was Invented in 1973 and commercially introduced in 1980. The systems communicating over ethernet divide a stream o data into individual packets called frames. Each frame contains source and destination addresses and error-checking data so that damaged data can be detected and re-transmitted.</li>
<li style="text-align: justify;"> Ethernet, by definition, is a broadcast protocol</li>
<li style="text-align: justify;"> Any signal can be received by all hosts</li>
<li style="text-align: justify;"> Switching enables individual hosts to communicate</li></ul>
<p>Digital subscriber line (DSL):</p>
<ul>
<li style="text-align: justify;"> DSL uses existing telephone lines to transport data to internet subscribers and the term xDSL is used to refer to a number of similar yet competing forms of DSL technologies which includes ADSL, SDSL, HDSL, HDSL-2, G.SHDL, IDSL, and VDSL. DSL service is delivered simultaneously with wired telephone service on the same telephone line and this is possible because DSL uses higher frequency bands for data.</li></ul>
<p>Asymmetric DSL (ADSL):</p>
<ul>
<li> ADSL is the most commonly installed technology and an ADSL tech can provide maximum downstream speeds of up to 8 mbps.</li></ul>
<p>Modem and router:</p>
<ul>
<li> Modem is specific to a technology</li>
<li style="text-align: justify;"> Modem is de/modulator, it takes bits coming from one protocol/technology, demodulates it (converts it into original data), and re-modulated the original data to another protocol/technology.</li>
<li style="text-align: justify;"> Router allows creation of a local area network, allowing multiple devices to connect to the network and access internet together through the router. It has very high bitrate DSL (VDSL) and goes up to 52 mbps downstream and 16 mbps upstream. The length of the physical connection is limited to 300 meters and the second generation VDSL (CDSL2) provides data rates up to 100 mbps simultaneously in both direction, but maximum available bit rate is still achieved about 300 meters.</li></ul>
<p>Cable:</p>
<ul>
<li style="text-align: justify;"> Cable broadband uses existing CATV infrastructure to provide high-access internet access; uses channels specifically reserved for data transfer</li>
<li style="text-align: justify;"> Support simultaneous access to broadband and TV programs</li>
<li style="text-align: justify;">Cable access tech is built for one-way transmission; hence some congestion takes place for bi-way data transfer, leading to much lower upstream connection relative to downstream connection for data.</li></ul>
<p>Fiber:</p>
<ul>
<li style="text-align: justify;"> It is a generic term for any broadband network architecture using optical fiber; fiber to the neighborhood; fiber to the curb; the street cabinet is much closer to the user’s premises, typically within 300m, thus allowing ethernet or radio-based connection to the final users; fiber to the basement; fiber to the home (BSNL already providing); fiber to the desktop</li>
<li style="text-align: justify;"> Passive optical networks (PON)</li></ul>
<p>Advantages of fiber:</p>
<ul>
<li> Immunity to electromagnetic interference.</li>
<li> Provides very high data rates at long distances.</li>
<li style="text-align: justify;"> When network links run over several 1000s of meters (e.g., metro area networks), fiber significantly outperforms copper.</li>
<li style="text-align: justify;"> Replacing at least part of these links with fiber shortens the remaining copper segments and allows them to run much faster.</li>
<li style="text-align: justify;"> The data rate of a fiber link is typically limited by the terminal equipment rather than the fiber itself.</li></ul>
<p style="text-align: justify;"><strong>Assignment</strong><br />Participants were given two options for an assignment to work on in the coming days and they could choose either one.</p>
<p>Assignment A<br />The Universal Service Obligation Fund of India has put out a Call for Proposals under two schemes:</p>
<ul>
<li>Mobile Connectivity and ICT related livelihood skills for womens’ SHGs (<a href="http://www.usof.gov.in/usof-cms/pdf21may/Concept_Paper.pdf%29">http://www.usof.gov.in/usof-cms/pdf21may/Concept_Paper.pdf)</a>, and</li></ul>
<ul>
<li style="text-align: justify;">Access to ICTs and ICT enabled services for persons with disabilities in rural India. (<a href="http://www.usof.gov.in/usof-cms/usofsub/Concept%20paper_USOF%20Scheme_PwDs_A.G.Gulati.pdf">http://www.usof.gov.in/usof-cms/usofsub/Concept%20paper_USOF%20Scheme_PwDs_A.G.Gulati.pdf</a>)</li></ul>
<p style="text-align: justify;">Your NGO is committed to the task of facilitating access to the Internet for women/ persons with disabilities in rural parts of Kerala and wishes to submit a proposal/ project idea in partnership with a service provider to the USOF.</p>
<p style="text-align: justify;">Assignment B<strong><br />You</strong> are a member of the ancient tribe of Meithis residing in Manipur. Over the years, there is a strong feeling in your community that although the Government has rolled out projects to connect the rural areas throughout India, these have not been successful for your tribe and there is still even a lack of basic fixed telephony, let alone mobile and broadband services. You have hence come to the conclusion that there is a need for focused efforts to target such communities as yours and have decided to submit a concept note to the USOF requesting that ‘ethnic and rural tribal communities’ be specifically included within the mandate of the USOF’s activities by defining them as an ‘underserved community’.</p>
<table class="listing">
<tbody>
<tr>
<th><img src="https://cis-india.org/home-images/Raveena.png" alt="" class="image-inline" title="Participants in Discussion" /></th>
</tr>
<tr>
<td><em>Given above is a picture of the participants engaged in a discussion.</em> </td>
</tr>
</tbody>
</table>
<p style="text-align: justify;"></p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><strong>Field Trip - Destination: MapUnity.</strong> <strong><br />MapUnity</strong> develops technology to tackle social problems and development challenges. Their GIS, MIS and mobile technologies are used mostly by government departments and civil society organisations, and in the R&D initiatives of commercial ventures. MapUnity presented their product offerings to the participants.</p>
<p style="text-align: justify;"><strong>VIDEO</strong></p>
<iframe src="http://blip.tv/play/AYOT%2BQwA.html?p=1" frameborder="0" height="250" width="250"></iframe><embed type="application/x-shockwave-flash" src="http://a.blip.tv/api.swf#AYOT+QwA" style="display:none"></embed>
<hr />
<h2 style="text-align: justify;">Day 4: June 11, 2013</h2>
<h3>Session 1: Universal Access</h3>
<p>(by Archana Gulati)<br /><a class="external-link" href="http://internet-institute.in/repository/UniversalServiceConceptsandPractices_Archana.G.Gulati.pdf">Click to read the presentation slides</a></p>
<table class="listing">
<tbody>
<tr>
<td><img src="https://cis-india.org/home-images/Archana.png/@@images/a1f18756-20b4-4732-b032-502b59078819.png" alt="" class="image-inline" title="Archana" /><br /><br />
<p style="text-align: justify;"><em>Given above is a picture of Archana Gulati speaking on Universal Access</em>.</p>
</td>
<td>
<p style="text-align: justify;">Tuesday revolved around questions of access and openness. The day kicked off with Archana Gulati, a policy expert in access to ICTs for people with disabilities talking on <strong>Universal Access</strong>.</p>
<p style="text-align: justify;"></p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">Ms. Gulati stressed the importance of ICTs for social development. ICTs are a necessary aid in development structures including education, health and increased citizen participation in national affairs & they provide crucial knowledge inputs into productive activities. However, even with the Telecom boom, there still exists an access gap in India, which cannot be covered by commercially viable systems.</p>
<p> </p>
</td>
</tr>
</tbody>
</table>
<p style="text-align: justify;">This 'actual access gap' exists because of geographic (scattered population, low income, low perceived utility of service, lack of commercial/industrial customers, lack of roads, power, difficult terrain, insurgency), economic (urban poor) and social inequality (gender, disabilities) differences. To achieve Universal Access or Universal Service, additional efforts must be made, so as to include these groups. However, Universal Access and Universal Service, while they may imply the same thing, are very different approaches to deal with the problematic access gap.</p>
<p style="text-align: justify;">Universal service, a term coined by Theodore Vail, president of AT&T in 1906, argued that the government should enforce the usage of only one network. This approach suggests a monopolization of the market and goes against the liberal market principle.</p>
<p style="text-align: justify;">Universal access on the other hand suggests cross-subsidizing the low and no profit service areas by high profit service areas. However, this results in the urban population to get over-charged while the rich rural areas benefit from rural subsidizing.</p>
<p style="text-align: justify;">So how do we enable a fair and inexpensive network to be able to create access for a large number of people equally? <br />Ms. Archana Gulati went on to introduce the Sanchar Shakti scheme as a contribution to national access in India. It was initiated with the objective of improving rural SHG access skills, knowledge, financial services and markets through mobile connections and involved several stakeholders like NABARD, handset/modem manufacturers, DoT USOF, Mobile VAS Providers, Lead NGOs, Mobile Service Providers.</p>
<p style="text-align: justify;">This scheme shows how important is, for the commercial, private and public sector to work together on obtaining accessibility to ITCs.</p>
<h3 style="text-align: justify;">Session 2: Free and Open Internet</h3>
<p style="text-align: justify;">(by Pranesh Prakash) <br />The following session by Pranesh Prakash on <strong>Free and Open Internet</strong> showed how the internet can still be a restrictive place which does not allow for internet equality. His talk focussed on the concepts of free and open Internet. Prakash started by stating the Freedom of Speech and Expression Article of the Indian Constitution and in an interactive round it was discussed, how these articles are fundamental for securing other basic human rights. This was demonstrated by an example in which the distribution of food did not proceed equally, as misinformation and restrictions led to an inappropriate hoarding of goods. Therefore, it is important for everyone to have that right. In fact, the Indian constitution formulates Article 19 in a positive way, implying not only everyone should have that right, but that the government must promote the upholding of these rights.</p>
<p style="text-align: justify;">However, in the case of Article 66a, the law actually caused a problem with freedom of speech in itself, as it penalizes sending false and offensive messages through communication services. This is a massive impediment on free speech, as outsiders decide upon what is offensive and what is false.</p>
<p style="text-align: justify;">The other side of freedom of speech and expression is censorship. Online, the removal of websites and editing of content often happens quietly and obscures the fact that someone or something is being censored. Unlike book burnings in the past, which were always made a big political spectacle, often websites are simply removed without a trace, or one is faced with a 404 error, when trying to access it. Because of the offensive content law, journals and magazines are quick to remove supposedly offensive content, as it seems more difficult to engage in argument with the people claiming offense. The CIS proposed a counter-law to secure for this to happen less, as freedom of speech includes the freedom to receive that speech.</p>
<p style="text-align: justify;"><strong>VIDEO</strong></p>
<iframe src="//www.youtube.com/embed/SGxYxLEA8OY" frameborder="0" height="250" width="250"></iframe>
<h3 style="text-align: justify;">Session 3: Openness</h3>
<p style="text-align: justify;">(by Sunil Abraham)</p>
<table class="listing">
<tbody>
<tr>
<td>
<p style="text-align: justify;">Next to ensuring freedom of speech and access, the third session of the day focussed on Openness in terms of Open Source software. Sunil Abraham, CIS executive director, stated the importance of free software and open access of data, as they ensure what he called the four freedoms of internet usage, namely the freedom to use for any purpose, the freedom to study, to modify and to share (freely or for a fee). Proprietary software imposes on these freedoms, as it only has restrictive use and a strong copyright. However, there are alternatives that have moderate copyrights, or so-called copy centred perspectives, or even copyleft, including the above mentioned rights into the terms of the software usage.</p>
</td>
<td><img src="https://cis-india.org/home-images/copy_of_Sunil.png/@@images/92ac30ac-90da-4fcd-a0b2-0469aa2ecc75.png" alt="" class="image-inline" title="Sunil Abraham" /><br /><br /><em>Above is a picture of Sunil Abraham speaking on Openness</em></td>
</tr>
</tbody>
</table>
<p style="text-align: justify;">In alignment with Sunil Abraham’s talk Pranesh Prakash criticized copyright law cutting into accessibility rights, as copyright infringements include translation into other languages, audio versions and also integral parts of education. The key is not to have a "one size fits all" copyright solution, as it is impossible to treat twitter content the same as a blockbuster movie. However, the government of India is doing exactly that and needs to interlink questions of access with copyright law.</p>
<p style="text-align: justify;"><strong>VIDEO</strong></p>
<iframe src="//www.youtube.com/embed/vqv7qai5c-s" frameborder="0" height="250" width="250"></iframe>
<h3 style="text-align: justify;">Session 4: Open Content</h3>
<p style="text-align: justify;">(by Prof. Subbiah Arunachalam)<br />Prof. Subbiah Arunachalam, who led the next session, discussed <strong>Open Content</strong>. He had seen during the course of his experience India's poor performance in Science & Technology and outlined the reasons for the same. The lack of access to information essential in scientific research and knowledge production, he said, was the major limiting cause.</p>
<p style="text-align: justify;"><strong>VIDEO</strong></p>
<iframe src="//www.youtube.com/embed/BFJyUTNzYvE" frameborder="0" height="250" width="250"></iframe>
<h3 style="text-align: justify;">Session 5: Quick Talk on Copyright Law and Access</h3>
<p>This short session dealt with implications of copyright law on internet access.</p>
<p></p>
<p> </p>
<p><strong>Activity</strong></p>
<p style="text-align: justify;">The participants were divided into two groups, and they were asked build as huge a network as possible with their personal belongings and present their creations. The participants had good ideas. One group placed their mobiles and laptops into the network to have them as nodes. The other group implemented the re-routing around censorship.</p>
<p style="text-align: justify;"><strong>VIDEO</strong></p>
<iframe src="//www.youtube.com/embed/nSLy1eRAndQ" frameborder="0" height="250" width="250"></iframe>
<table class="listing">
<tbody>
<tr>
<th><img src="https://cis-india.org/home-images/Network.png" alt="" class="image-inline" title="Networking" /></th>
</tr>
<tr>
<td><em>Given above is a picture of the participants in an activity making the longest network possible with their personal belongings</em>.<br /><br /></td>
</tr>
</tbody>
</table>
<hr />
<h2 style="text-align: justify;">Day 5: (June 12, 2013)</h2>
<h3>Session 1: Privacy on the Internet in India</h3>
<p>(by Sunil Abraham and Elonnai Hickok)</p>
<p><a class="external-link" href="http://internet-institute.in/repository/privacy-on-the-internet-by-elonnai">Click to view the presentation slides</a></p>
<p></p>
<p> </p>
<table class="listing">
<tbody>
<tr>
<td>
<p><img src="https://cis-india.org/home-images/Elonnai.png" title="Elonnai" height="211" width="317" alt="" class="image-inline" /></p>
<p></p>
<p> <em>Given above is a picture of Elonnai Hickock speaking about privacy</em></p>
</td>
<td style="text-align: justify;">
<p>The following day, June 12th started off with “Privacy” as the theme. The session Privacy on the Internet in India was led by CIS privacy experts Sunil Abraham and Elonnai Hickock.</p>
<p>In an exchange of anecdotes, it was made clear how there needs to be a certain degree of state surveillance to secure the citizens safety.</p>
<p>This can happen through off air interception and active or passive cell phone towers that can track mobile devices.</p>
<p>However, encryption is an important tool to secure one’s own privacy against cyber espionage.</p>
</td>
</tr>
</tbody>
</table>
<p></p>
<p> </p>
<p>Some of the salient points discussed were:</p>
<ul>
<li> Off-the Air Interception</li>
<li> Possible to set up active or passive cell phone tower. </li>
<li> The signal strength will be strong and everyone looks for it.</li>
<li> Capacity to identify itself as a service provider. </li>
<li> Interception can begin with encryption Technology today used by security agencies.</li>
<li> NTRO- national technical Research Org and Outlook </li></ul>
<p> <strong>VIDEO</strong></p>
<iframe src="//www.youtube.com/embed/PQWi9hHHSpc" frameborder="0" height="250" width="250"></iframe>
<h3>Session 2: E-Accessibility</h3>
<p>(by Nirmita Narasimhan)<br /><a class="external-link" href="http://internet-institute.in/repository/eAccessibility.pdf">Click to view the presentation slides</a></p>
<table class="listing">
<tbody>
<tr>
<th><img src="https://cis-india.org/home-images/copy_of_Eaccessibility.png" alt="" class="image-inline" title="E-accessibility" /></th>
</tr>
<tr>
<td><em>Given above is a picture of Dr. Nirmita Narasimhan speaking on e-accessibility</em></td>
</tr>
</tbody>
</table>
<table class="invisible">
<tbody>
<tr></tr>
</tbody>
</table>
<p>The second<strong> </strong>session was on<strong> “E-Accessibility” </strong>led by Dr. Nirmita Narasimhan<strong>. </strong>Some of the salient points discussed were:</p>
<p> </p>
<ul>
<li> Problems arising out of disability</li>
<li> Accessibility-Infrastructure and ICT</li>
<li> Assistive technologies for PWD’s.</li>
<li style="text-align: justify;"> Reasonable accommodation (not available or cannot be and requires extra effort and putting up an accessible copy up) and universal Design (for both for PWD’s and non-PWD’s).</li>
<li> Web Content Accessibility is operable and easily understandable. </li>
<li style="text-align: justify;"> Accessibility standards include; Daisy (6 types of books including audio and text books) is all about marking up the documents. Really a good way to read but is expensive and time consuming, also need Daisy tools and player to make it work.</li>
<li> In 1808 the first typewriter was developed to help the blind.</li>
<li> Considerations involved in Web Accessibility </li>
<li> Overlap b/w mobile accessibility and web accessibility.</li>
<li style="text-align: justify;"> Example- Raku Raku phone captured 60% of market share in Japan. It has many assistive features.</li>
<li style="text-align: justify;"> Relay Services has a middle man who passes on the message b/w different PWD’s in many countries, but it is not yet available in India.</li>
<li> PWD’s communicating with customer care – the issues involved. </li>
<li style="text-align: justify;"> Accessibility Policy- very few people are adopting accessible technologies. There is a need to have a strong policy. U.K. and U.S. already have strong policies related to accessible and assistive technology for PWD’s.</li></ul>
<p> <strong> Video</strong></p>
<iframe src="//www.youtube.com/embed/vI8mixgTgCM" frameborder="0" height="250" width="250"></iframe>
<h3>Session 3: International Bodies and Mechanisms</h3>
<p style="text-align: justify;">(by Tulika Pandey and Gaurab Raj Upadhyay)<br /><strong>Activity</strong><br />Gaurab incorporated an <strong>Activity</strong> into his talk to enable the students to have a clearer understanding of International Bodies and Mechanisms.</p>
<table class="listing">
<tbody>
<tr>
<th><img src="https://cis-india.org/home-images/Gaurab.png" alt="" class="image-inline" title="Gaurab" /></th>
</tr>
<tr>
<td><em>Given above is a picture of the speaker Gaurab Raj Upadhaya explaining the International Bodies and Mechanisms</em></td>
</tr>
</tbody>
</table>
<p style="text-align: justify;"></p>
<p style="text-align: justify;"> </p>
<p>Some of the salient points discussed during his talk were:</p>
<ul>
<li> Definition: “Internet Governance is the development and application by Govt., the private sector and civil society, in their respective roles, of shared principles, norms, rules, decision-making procedures and programmes which shape the evolution and use of internet.”</li>
<li>It should be multilateral, transparent and democratic</li>
<li> Enhanced cooperation means to enable govt…</li></ul>
<p>Technical issues to keep in mind while talking about internet:<br /></p>
<p> </p>
<ol>
<li> Critical internet resources</li>
<li>Root server locations </li>
<li> Open Standards (CIS leads the initiative) </li>
<li> Interoperability </li>
<li> Search Engines </li>
<li> Internationalized Domain names (in own script & language) </li>
<li> Content</li></ol>
<p></p>
<p> </p>
<ul>
<li>Virtual yet real space and most important question to be understood is that whether, the governance of internet is possible?</li>
<li> Public Policy- to monitor cross-border data flow, Openness vs Privacy</li>
<li> India’s Outlook in internet policies-Pillars of Internet which is not fully addressed by the Indian government today. </li>
<li> Established an Inter- Ministerial Group by including various government departments into the arena.</li>
<li> Layer 0-7 Names and Numbers</li>
<li> Layer 8 and above</li>
<li> Applications and Usage </li>
<li> Legal business, policy, etc.</li></ul>
<h3>Session-4: E-Governance</h3>
<p>(by Tulika Pandey and Sunil Abraham)</p>
<table class="listing">
<tbody>
<tr>
<th><img src="https://cis-india.org/home-images/Tulika.png" alt="" class="image-inline" title="Tulika" /></th>
</tr>
<tr>
<td><em>Given above is a picture of the speaker Tulika Pandey speaking about e-Governance</em> </td>
</tr>
</tbody>
</table>
<p></p>
<p> </p>
<p>Some of the salient points discussed were:</p>
<ul>
<li style="text-align: justify;"> Making policies in India is difficult because the population is huge and implementation at rural level is difficult.</li>
<li style="text-align: justify;"> Bombarded by Techno utopians- who believe in technology’s ability to change lives.</li>
<li style="text-align: justify;"> Techno determinants- Corruption solved through technology through open government data. More technology is better, the most sophisticated ones are the best are gross misconceptions.</li>
<li style="text-align: justify;"> Bhoomi project tried to deal with corruption at village level. Important policy change made all paper work illegal and digitized the land records etc. every action and request will be logged. But this led to creation of new corruption. Bribes were taken even before data was logged!</li>
<li style="text-align: justify;"> UID Project (Cobra Post Scam) around 20 public sector and 30 private banks were involved in money laundering scams. </li>
<li style="text-align: justify;"> People who design the systems in Delhi prepare sub-contracts<strong>.</strong></li></ul>
<p><strong> </strong>VIDEO</p>
<iframe src="//www.youtube.com/embed/Le3b-kka5Hs" frameborder="0" height="250" width="250"></iframe>
<hr />
<h2>Day 6: (June 13, 2013)</h2>
<h3>Session 1: Critical Perspectives of the Internet</h3>
<p>(by Dr. Nishant Shah)<br /><a class="external-link" href="http://internet-institute.in/repository/critical-perspectives-of-internet-society-dr-nishant-shah">Click to view the presentation slides</a></p>
<table class="listing">
<tbody>
<tr>
<td style="text-align: justify;">The sixth day of the Institute kicked off with Nishant Shah, director of research at CIS, looking into Critical Perspectives of the Internet. Nishant made a very important distinction between the internet as infrastructure and as social network constructing alternative universes. Nonetheless it was important to stress that technology should not be alienated in the process of this separation but seen as an integral part of it, as the digital is as much part of reality as any other technology and has become essential as a technology of change that it brings about not only in scientific but also in social development. Quoting Michel Foucault, Shah argued that technology becomes influential when it changes life, labour and language, which is why research in the field should involve critical ways of thinking about body, space and community.</td>
<td><img src="https://cis-india.org/home-images/Nishant.png/@@images/836aa919-b1aa-4e61-86d2-2e4a6e5fc62f.png" alt="" class="image-inline" title="Nishant Shah" /><br /><br /> <em>Above is a picture of Dr. Nishant Shah speaking on Critical Perspectives of the Internet.</em> </td>
</tr>
</tbody>
</table>
<p style="text-align: justify;">The body perception can be perceived through the way bodily agencies change through technology. Technology does not necessarily taint or corrupt the body, but can also be a way to escape its confines. To put it to a point, we are all born into technology and cannot free ourselves from them, as for example pregnancy already starts with nutritional supplements, regulatory diets and exercise and essentially ends with birth technologies that do not necessarily involve only the digital - we must remember, speech is one of the oldest technologies available today.</p>
<p style="text-align: justify;"><strong>VIDEO</strong></p>
<iframe src="//www.youtube.com/embed/HAnwjxLGA-g" frameborder="0" height="250" width="250"></iframe>
<h3 style="text-align: justify;">Session 2: Strategies for Policy Intervention</h3>
<p style="text-align: justify;">(by Chakshu Roy)<br />The second session on “Strategies for Policy Intervention” was led by Chakshu Roy. This session dealt with various ways in which policy intervention can be made and the various factors necessary to successfully engage in policy forums.</p>
<p style="text-align: justify;"><strong>VIDEO</strong></p>
<iframe src="//www.youtube.com/embed/B-tiOPu6WaU" frameborder="0" height="250" width="250"></iframe>
<h3 style="text-align: justify;">Session 3: Profile of Internet Service Providers</h3>
<p style="text-align: justify;">(by Satyen Gupta)<br /><a class="external-link" href="http://internet-institute.in/repository/profile-of-isps-by-satyen-gupta">Click to view the presentation slides</a></p>
<table class="listing">
<tbody>
<tr>
<th><img src="https://cis-india.org/home-images/SatyenGupta.png" alt="" class="image-inline" title="Satyen Gupta" /></th>
</tr>
<tr>
<td><em>Given above is a picture of Satyen Gupta speaking about Internet Service Providers</em></td>
</tr>
</tbody>
</table>
<p style="text-align: justify;">Satyen Gupta during his talk on “Profile of Internet Service Providers” discussed the nature, offerings and profile of various ISPs in India, their market share and dynamics.</p>
<p style="text-align: justify;">The salient points discussed were:</p>
<ul>
<li style="text-align: justify;">National Broadband Plans</li>
<li style="text-align: justify;">Spectrum Issues “Management”</li>
<li style="text-align: justify;">Reality check of Indian ISPs</li>
<li style="text-align: justify;">Broadband Definition & Penetration</li>
<li style="text-align: justify;">Roadblocks for Broadband in India, Governments Role, Regulation</li>
<li style="text-align: justify;">Institutional Framework for the Indian Telecom</li>
<li style="text-align: justify;">Broadband Access in India- Technology-Neutrality</li>
<li style="text-align: justify;">Satellite based DTH Services offer alternate for the Broadband via Receive Only Internet Service (ROIS)</li>
<li style="text-align: justify;">Broadband using DTH for Receive-only Internet</li>
<li style="text-align: justify;">VSAT has the potential for significant impact on Broadband Penetration in Remote Areas</li>
<li style="text-align: justify;">Fixed Wireless Access- an important access technology</li>
<li style="text-align: justify;">Facilitating Radio Spectrum for Broadband Access</li>
<li style="text-align: justify;">Fiscal measures to reduce the cost of access devices, infrastructure and broadband service</li>
<li style="text-align: justify;">Reduction in the cost of connectivity</li>
<li style="text-align: justify;">National Internet Exchange of India (NIXI) -National Internet Exchange of India (NIXI) has been set up on recommendation of TRAI by DIT, Government of India to ensure that Internet traffic, originating and destined for India, should be routed within India.</li>
<li style="text-align: justify;">Emerging Broadband Services</li>
<li style="text-align: justify;">Broadband Commission for Digital Development (BCDD)-UN Targets for Universal Broadband,2015</li>
<li style="text-align: justify;">NOFN India-Existing Fiber Infrastructure and Coverage by Various Service Providers</li>
<li style="text-align: justify;">National Telecom Policy (NTP) 2012- Salient Features</li>
<li style="text-align: justify;">State of Internet Services and ISPs in India:<br />
<ol>
<li>India’s Ranking on Key Broadband Indicators</li>
<li>Regulator’s Report – Growth of Internet in India</li>
<li>Internet Subscribers Base & Market share of top 10 ISPs</li>
<li>Technology trends for Internet/Broadband Access</li>
<li>Internet/broadband Subscribers for top 10 states</li>
<li>Tariff Plans for USO funded Broadband</li>
<li>Contribution of Telcos in Development of Internet Services</li>
<li>Incumbent’s Role in Growth of Broadband</li>
<li>Plugging rural missing link- BBNL</li></ol>
</li>
<li style="text-align: justify;">Internet Subscribers Base & Market share of top 10 ISPs</li></ul>
<p> <strong>VIDEO</strong></p>
<iframe src="//www.youtube.com/embed/DOSeo-ASOQ8" frameborder="0" height="250" width="250"></iframe>
<h3 style="text-align: justify;">Session 4: Competition in the Market by Helani Galpaya</h3>
<p style="text-align: justify;">Helani Galpaya during her talk on “Competition in the Market” discussed about what competition meant, <em>Herfindahl–Hirschman</em> Index to measure how competitive a market is, what are the dangers of monopoly markets and the landscape of the Telecom market in India.</p>
<table class="listing">
<tbody>
<tr>
<th><img src="https://cis-india.org/home-images/Helani.png" alt="" class="image-inline" title="Helani" /></th>
</tr>
<tr>
<td><em>Above is a picture of Helani Galpaya speaking about Competition in the Market</em></td>
</tr>
</tbody>
</table>
<hr />
<h2 style="text-align: justify;">Day 7: (June 14, 2013)</h2>
<p style="text-align: justify;">The final day of the Institute focussed on how the Internet can be used to effect change on society – Activism was the theme.</p>
<h3 style="text-align: justify;">Session 1: Leveraging Internet for activism</h3>
<p style="text-align: justify;">(by Ananth Guruswamy)<br /><a class="external-link" href="http://internet-institute.in/repository/LeveragingInternetforActivism.pdf">Click to read the presentation slides</a></p>
<table class="listing">
<tbody>
<tr>
<th><img src="https://cis-india.org/home-images/AnanthGuruswamy.png" alt="" class="image-inline" title="Ananth Guruswamy" /></th>
</tr>
<tr>
<td><em>Above is a picture of Ananth Guruswamy speaking during the session on leveraging internet for activism</em></td>
</tr>
</tbody>
</table>
<p style="text-align: justify;">Some of the salient points discussed were:</p>
<ul>
<li style="text-align: justify;">Digital Activism</li>
<li style="text-align: justify;">Target Omar Abdullah. It is about an act called Administrative detention Act. One can be detained without act i.e. The Preventive Detention Act. He directly responded to the threat.</li>
<li style="text-align: justify;">Twitter seems to be a place where the political leaders are actually accessible. This kind of access was not possible in day to day life earlier if one was a common man. This phenomenon is developing. Even in Corporate setup writing a mail directly to the CEO seems possible. </li>
<li style="text-align: justify;">Strengths: Wide reach, Freedom of speech, Data collection is made easy, Issues can be tackled swiftly, Global communities, singular identities have lot of power. Eg: 190 Million people stood up against Poverty; this kind of mobilization impossible without internet.</li>
<li style="text-align: justify;">Besides local issues even Global issues are addressed an collection of funds becomes easy. Onion.com once a struggling publication in U.S., but now with a global audience it is thriving and it has a healthy reader base today. </li>
<li style="text-align: justify;">The Earth Hour helps people connect across space and time.</li>
<li style="text-align: justify;">Weakness: More popularity, more attention; Traditional/Real Protest has become rare and a threat; There is no real action beyond internet, threat of movement is low, there is no real commitment involved in digital activism and just one click is enough to make one ‘feel good’.</li>
<li style="text-align: justify;">Opportunities: Recruitment of protestors for real protests. Diff. b/w real and virtual blurred; anything that affects the mind space is real. The intersection is interesting.</li>
<li style="text-align: justify;">Threats: Total removal of privacy, Government intervention in private issues and there could be misinterpretation of people’s thoughts by certain people.</li>
<li style="text-align: justify;">Traditional vs Digital activism: Traditional fails to provide results whereas clicking a button is as easy as wearing a badge.</li>
<li style="text-align: justify;">Facebook activism: ‘Like Buttons’, People moving away from reading emails, a shift towards use of facebook; creates a sense of belongingness which the traditional activism failed to achieve.</li>
<li style="text-align: justify;">India against Corruption: used mobile phone effectively.</li>
<li style="text-align: justify;">Social Media has changed the way protests happen globally and in India, one example is Twitter. Change.org is a website which gives freedom to anybody to start a petition without any external source; Awaaz.org another such petition website.</li>
<li style="text-align: justify;">Green Peace launched a Green peace X which was a runaway success. YouTube is another platform for the masses. People today are more interested in watching rather than reading.</li>
<li style="text-align: justify;">Pakistan in 2007: “Flash protests”; Free Fraizan Movement on Twitter.</li>
<li style="text-align: justify;">Something to keep in mind regarding while launching a campaign online is to think who the audience is and what we want them to do and how will the campaign help our objectives?</li>
<li style="text-align: justify;">How to measure success of a social media campaign?</li>
<li style="text-align: justify;">Reach</li>
<li style="text-align: justify;">Engagement- likes, tweets, comments, etc.</li>
<li style="text-align: justify;">Influence</li>
<li style="text-align: justify;">Attrition Score</li></ul>
<p> <strong>VIDEO</strong></p>
<iframe src="//www.youtube.com/embed/PXZE7y1qxlo" frameborder="0" height="250" width="250"></iframe>
<h3 style="text-align: justify;">Session 2: Internet Access Activism</h3>
<p style="text-align: justify;">(by Parminder Jeet Singh)<br />The next session on “INTERNET ACCESS” ACTIVISM by Parminder Jeet Singh dealt with how people can contribute to initiatives for improving internet access amongst masses.</p>
<p style="text-align: justify;"><strong>VIDEO</strong></p>
<iframe src="//www.youtube.com/embed/_zyM3_OiUxM" frameborder="0" height="250" width="250"></iframe>
<p></p>
<p> </p>
<p></p>
<h3>Session 3: Ensuring Access to the Internet</h3>
<p style="text-align: justify;">(by A.K. Bhargava)<br /><a class="external-link" href="http://internet-institute.in/repository/BBNLiis.pdf">Click to view the presentation</a><br />The last session on “Ensuring Access to the Internet” by A.K. Bhargava discussed strategies to enhance access to the Internet in India with special focus on National Optical Fibre Network.</p>
<p style="text-align: justify;">The salient points discussed were:</p>
<p style="text-align: justify;">- Role of Broadband in Nation Building<br />- Policy Aspiration of Broadband - How do we meet aspiration?<br />- Telecom Network Layers‐Gaps in OFC Reach<br />- BBNL Interconnection<br />- NOFN - Bridging The Gap<br />- Digital Knowledge Centres (DKCs)<br />- Architecture of BBNL<br />- NOFN Impact</p>
<ol>
<li>Societal<br />
<ul>
<li>Bridging the digital divide</li></ul>
</li>
<li>Business<br />
<ul>
<li>Job creation, indigenous industry growth</li></ul>
</li>
<li>Sectoral<br />
<ul>
<li>Improved connectivity, data growth</li></ul>
</li>
<li>Technological<br />
<ul>
<li>Differentiators</li></ul>
<p><strong>VIDEO</strong></p>
<iframe src="//www.youtube.com/embed/4X3WSn1u3WM" frameborder="0" height="250" width="250"></iframe>
</li></ol>
<p style="text-align: justify;"><strong>Speaker Presentation Slides</strong><br />All the presentation aids/slide shows barring a few have been uploaded to the website at <a class="external-link" href="http://internet-institute.in/repository">http://internet-institute.in/repository</a></p>
<p style="text-align: justify;"><strong>Presentation of Assignments</strong><br />The participants presented their assignments which were given to them to work on the 3rd day. The participants were presented with Wikipedia T-Shirts as a token of appreciation.</p>
<table class="listing">
<tbody>
<tr>
<th><img src="https://cis-india.org/home-images/Assignments.png" alt="" class="image-inline" title="Assignments" /></th>
</tr>
<tr>
<td><em>Given above is a picture of the participants presenting their assignments</em> </td>
</tr>
</tbody>
</table>
<p style="text-align: justify;"><strong>Participant Feedback</strong><br />All participants were asked to fill a "Session Feedback Form" for each of the sessions and also an "Overall Feedback Form". They were also constantly encouraged to come up with suggestions and inputs on how to make the Institute more interesting.</p>
<p style="text-align: justify;">The key findings from the <strong>Quantitative Feedback</strong> provided are:<br />(The figures below are averaged scores (out of 5) provided by participants in the Overall Feedback Forms)</p>
<table class="plain">
<tbody>
<tr>
<th>S.No.</th>
<th>Parameter</th>
<th>Score (Out of 5)</th>
</tr>
<tr>
<td>1</td>
<td>Relevance of Content</td>
<td style="text-align: right;">3.6</td>
</tr>
<tr style="text-align: right;">
<td style="text-align: justify;">2</td>
<td style="text-align: justify;">Comprehensiveness of Content</td>
<td>3.44</td>
</tr>
<tr>
<td>3</td>
<td>Easy to Understand</td>
<td style="text-align: right;">3.55</td>
</tr>
<tr>
<td>4</td>
<td>Well Paced</td>
<td style="text-align: right;">3.33</td>
</tr>
<tr>
<td>5</td>
<td>Sufficient Breaks</td>
<td style="text-align: right;">3</td>
</tr>
<tr>
<td>6</td>
<td>Duration of Talks</td>
<td style="text-align: right;">3.2</td>
</tr>
<tr>
<td>7</td>
<td>Mix between Learning & Activities</td>
<td style="text-align: right;">3</td>
</tr>
</tbody>
</table>
<p style="text-align: justify;">The key findings from the <strong>Qualitative Feedback</strong> provided are:</p>
<table class="plain">
<tbody>
<tr>
<th>S.No.</th>
<th>Points observed</th>
</tr>
<tr>
<td>1</td>
<td style="text-align: justify;"><strong>Presentations</strong> – Participants felt sessions with accompanying slides/aids were most helpful. Some felt that accompanying notes could also be useful for future reference.</td>
</tr>
<tr>
<td>2</td>
<td style="text-align: justify;"><strong>Use of Examples/Case Studies</strong> – Participants felt concepts can be better assimilated if case-studies/examples are used. Some also felt that for the technological advancements discussed, it would have been better had the social/economic impact of the same was discussed too.</td>
</tr>
<tr>
<td>3</td>
<td style="text-align: justify;"><strong>Implementation Gaps</strong>– One participant, who is working at the field level in Kolkata had a specific thing to say about the talk about BSNL and its offerings– Although BSNL has so many options available on paper to connect to the Internet, common service centres in West Bengal are mostly run on Tata Indicom’s network even though the board outside says “BSNL” etc. She felt that the reality is far different from what exists on paper.</td>
</tr>
<tr>
<td>4</td>
<td><strong>Interactive sessions</strong> were most appreciated than speaker led sessions.</td>
</tr>
<tr>
<td>5</td>
<td style="text-align: justify;">There were many responses to the question “<strong>How will you apply this new information in the future</strong>” and it is very encouraging. People have given thought to contributing to Wikipedia in their mother tongue, take the knowledge to the field work that they are associated with, continue with their research, change their Internet connections, to help file RTIs, to adopt more open source software, sharing with students, advocacy efforts, etc</td>
</tr>
<tr>
<td>6</td>
<td>The responses to the question “<strong>What did you learn from the session/workshop that was new?</strong>” elicited more responses for the following sessions<br />
<ol>
<li>Domestic Bodies and Mechanisms</li>
<li>Case-studies such as Air Jaldi</li>
<li>Low cost devices in India</li>
<li>USOF</li>
<li>Free & Open Internet</li>
<li>Copyright laws</li>
<li>Privacy</li>
<li>Accessibility</li>
<li>Digital Natives</li>
<li>ISPs</li></ol>
</td>
</tr>
<tr>
<td>7</td>
<td style="text-align: justify;"><strong>Field Trip</strong> – One participant said “<em>One or two of the persons from MapUnity could have made the presentation at the institute venue itself. A visit to an underserved or un-served community with interactions with the people there could also have given a good understanding of on-ground challenges and needs.”</em></td>
</tr>
<tr>
<td>8</td>
<td style="text-align: justify;"><strong>Follow-up Session</strong> –One participant had ideas about having a follow-up session “<em>A follow-up call [webinar?] after 6 months to see if any of these concepts were useful would be an interesting exercise to take up”</em></td>
</tr>
<tr>
<td>9</td>
<td><strong>Assignment – </strong>Participants felt that the assignments were good but they needed more time to work on the same.</td>
</tr>
</tbody>
</table>
<p style="text-align: justify;"><strong>Other Feedback:</strong></p>
<ol>
<li>The food and the facilities were enjoyed and appreciated by all.</li>
<li style="text-align: justify;">The remote location of the Golden Palms Resort was a concern for most of the participants.</li></ol>
<p style="text-align: justify;"><strong>Participation Certificates</strong><br />Participation Certificates (template shown below) have been mailed to all the participants in the third week of July 2013.</p>
<table class="listing">
<tbody>
<tr>
<th><img src="https://cis-india.org/home-images/Certificate.png" alt="" class="image-inline" title="Certificate of Participation" /></th>
</tr>
<tr>
<td><em>Given above is the certificate declaring the successful completion of the event</em></td>
</tr>
</tbody>
</table>
<h2 style="text-align: justify;">Institute Expenses</h2>
<p style="text-align: justify;">A total of Rs. 19, 91,889 (Rupees nineteen lakhs ninety one thousand eight hundred and eighty nine only) was spent towards organizing and conducting the Internet Institute. A breakup of the Institute Expenditures is given below:</p>
<table class="vertical listing">
<tbody>
<tr>
<th>S.No.</th>
<th style="text-align: left;">Type of Expense</th>
<th style="text-align: left;">Description</th>
<th style="text-align: right;">Total</th>
</tr>
<tr>
<td>1</td>
<td>Venue – Golden Palms Resort</td>
<td>Accommodation for participants, speakers and food</td>
<td style="text-align: right;">12,91,176</td>
</tr>
<tr>
<td>2</td>
<td>Travel</td>
<td>Cost of Air tickets</td>
<td style="text-align: right;">2,94,515</td>
</tr>
<tr>
<td>3</td>
<td>Local Travel</td>
<td>Airport Pickup/Drop, Local City Travel</td>
<td style="text-align: right;">1,41,001</td>
</tr>
<tr>
<td>4</td>
<td>Gifts & Printing</td>
<td>Gifts for speakers and ad hoc document printing charges</td>
<td style="text-align: right;">24,000</td>
</tr>
<tr>
<td>5</td>
<td>Infrastructure</td>
<td>Telephony, Audio, Video, Stage</td>
<td style="text-align: right;">1,05,000</td>
</tr>
<tr>
<td>6</td>
<td>Participant Bags</td>
<td><br /></td>
<td style="text-align: right;">10,650</td>
</tr>
<tr>
<td>7</td>
<td>Reimbursements</td>
<td>Reimbursements to participants and speakers</td>
<td style="text-align: right;">1,25,547</td>
</tr>
<tr>
<td style="text-align: center;" colspan="3"><strong>Total Expenses</strong></td>
<td style="text-align: right;">19,91,889</td>
</tr>
</tbody>
</table>
<h3 style="text-align: justify;">What the participants had to say</h3>
<blockquote class="quoted">Sangh Priya Rahul – “<em>One of my organisation's work is more or less related to empowerment of rural areas so knowledge about USOF will be useful there</em><em>.” </em>(On USOF)</blockquote>
<blockquote style="text-align: justify;" class="quoted">Rashmi. M – “<em>Makes me more sensitized towards the disabled people.”</em> (On e-Accessibility)</blockquote>
<blockquote style="text-align: justify;" class="quoted">Preethi Ayyaluswamy – “<em>Would help me in strategically planning for an online campaign” </em>(On digital activism).</blockquote>
<hr />
<h2 style="text-align: justify;">Conclusion</h2>
<p style="text-align: justify;">The Institute was highly engaging and enabled the participants to explore the various facets of Internet & Society. As was evident from the feedback forms, participants had given thought to contributing to Wikipedia in their mother tongue, take the knowledge to the field work that they are associated with, continue with their research, change their Internet connections, help file RTIs, adopt more open source software, sharing with students, advocacy efforts etc. There was a very high level of expertise amongst speakers at the Institute which was apparent from the participatory discussions and a lot of insightful perspectives were brought forth. There was a common consensus amongst all participants that inclusive growth across all dimensions would take efforts from all stakeholders.</p>
<p style="text-align: justify;">We hope to learn from the findings of this Institute and work towards a better second Institute.</p>
<table class="listing">
<tbody>
<tr>
<th><img src="https://cis-india.org/home-images/GroupPhoto.png" alt="" class="image-inline" title="Group Photo of Participants" /></th>
</tr>
<tr>
<td><em>Above is a group picture of all the participants and the organizers</em></td>
</tr>
</tbody>
</table>
<ul></ul>
<ul></ul>
<p>
For more details visit <a href='https://cis-india.org/telecom/knowledge-repository-on-internet-access/institute-on-internet-and-society-event-report'>https://cis-india.org/telecom/knowledge-repository-on-internet-access/institute-on-internet-and-society-event-report</a>
</p>
No publishersrividyaVideoInternet StudiesFeaturedHomepage2013-10-15T06:48:00ZBlog EntryWhose Change is it Anyway?
https://cis-india.org/digital-natives/blog/hivos-knowledge-programme-june-14-2013-nishant-shah-whose-change-is-it-anyway
<b>This thought piece is an attempt to reflect critically on existing practices of “making change” and its implications for the future of citizen action in information and network societies. It observes that change is constantly and explicitly invoked at different stages in research, practice, and policy in relation to digital technologies, citizen action, and network societies. </b>
<p>The White Paper by Nishant Shah was <a class="external-link" href="http://www.hivos.net/Hivos-Knowledge-Programme/Themes/Civic-Explorations/Publications/Whose-Change-is-it-anyway">published by Hivos recently</a>.</p>
<hr />
<p style="text-align: justify;">However, we do not have adequate frameworks to address the idea of change. What constitutes change? What are the intentions that make change possible? Who are the actors involved? Whose change is it, anyway?</p>
<p style="text-align: justify;">Drawing on the Hivos Knowledge Programme and on knowledge frameworks around youth, technology, and change from the last four years, this thought piece introduces new ways of defining, locating, and figuring change. In the process, it also helps understand the role that digital technologies play in shaping and amplifying our processes and practices of change, and to understand actors of change who are not necessarily confined to the category of “citizen”, which seems to be understood as the de facto agent of change in contemporary social upheavals, political uprisings, and cultural innovations.</p>
<p style="text-align: justify;">Methodologically, this thought piece attempts to make three discursive interventions: It locates digital activism in historical trajectories, positing that digital activism has deep ties to traditional activism, when it comes to the core political cause. Simultaneously, it recognises that new modes of political engagement are demanding and producing novel practices and introducing new actors and stakeholders. It looks at contemporary digital and network theories, but also draws on older philosophical lineages to discuss the crises that we seek to address. It tries to interject these abstractions and theoretical frameworks back into the field by producing two case studies that show how engagement with these questions might help us reflect critically on our past practices and knowledge as well as on visions for and speculations about the future, and how these shape contemporary network societies. It builds a theoretical framework based on knowledge gleaned from conversations, interviews, and on-the-ground action with different groups and communities in emerging information societies, and integrates with new critical theory to build an interdisciplinary and accessible framework that seeks to inform research, development-based interventions, and policy structures at the intersection of digital technologies, citizen action, and change by introducing questions around change into existing discourse.</p>
<hr />
<p><a href="https://cis-india.org/digital-natives/blog/whose-change-is-it-anyway.pdf" class="internal-link">Click to download the full White Paper here</a> (PDF, 321 Kb)</p>
<p>
For more details visit <a href='https://cis-india.org/digital-natives/blog/hivos-knowledge-programme-june-14-2013-nishant-shah-whose-change-is-it-anyway'>https://cis-india.org/digital-natives/blog/hivos-knowledge-programme-june-14-2013-nishant-shah-whose-change-is-it-anyway</a>
</p>
No publishernishantDigital ActivismRAW PublicationsDigital NativesYouthFeaturedPublicationsHomepage2015-04-17T10:56:47ZBlog EntryCIS Welcomes Standing Committee Report on IT Rules
https://cis-india.org/internet-governance/blog/cis-welcomes-standing-committee-report-on-it-rules
<b>The Centre for Internet and Society welcomes the report by the Standing Committee on Subordinate Legislation, in which it has lambasted the government and has recommended that the government amend the Rules it passed in April 2011 under section 79 of the Information Technology Act.</b>
<hr />
<p style="text-align: justify; "><a class="external-link" href="http://www.prsindia.org/uploads/media/IT%20Rules/IT%20Rules%20Subordinate%20committee%20Report.pdf">Click to read</a> the Parliamentary Standing Committee Report on the IT Rules. A modified version was <a class="external-link" href="http://www.ciol.com/ciol/news/185991/cis-welcomes-panels-anti-govt-stand-it-rules">published in CiOL</a> on March 27, 2013.</p>
<hr />
<p style="text-align: justify; ">These rules have been noted by many, including CIS, Software Freedom Law Centre, and Society for Knowledge Commons, and many eminent lawyers, as being unconstitutional. The Standing Committee, noting this, has asked the government to make changes to the Rules to ensure that the fundamental rights to freedom of speech and privacy are safeguarded, and that the principles of natural justice are respected when a person’s freedom of speech or privacy are curtailed.</p>
<h3 style="text-align: justify; ">Ambiguous and Over-reaching Language</h3>
<p style="text-align: justify; ">The Standing Committee has noted the inherent ambiguity of words like "blasphemy", "disparaging", etc., which are used in the Intermediary Guidelines Rules, and has pointed out that unclear language can lead to harassment of people as has happened with Section 66A of the IT Act, and can lead to legitimate speech being removed. Importantly, the Standing Committee recognizes that many categories of speech prohibited by the Intermediary Guidelines Rules are not prohibited by any statute, and hence cannot be prohibited by the government through these Rules. Accordingly, the Standing Committee has asked the government to ensure "no new category of crimes or offences is created" by these Rules.</p>
<h3 style="text-align: justify; ">Government Confused Whether Rules Are Mandatory or Advisory</h3>
<p style="text-align: justify; ">The Standing Committee further notes that there is a discrepancy in the government’s stand that the Intermediary Guidelines Rules are not mandatory, and are only "of advisory nature and self-regulation", and that "it is not mandatory for the Intermediary to disable the information, the rule does not lead to any kind of censorship". The Standing Committee points out the flaw in this, and notes that the language used in the rules is mandatory language (“shall act” within 36 hours). Thus, it rightly notes that there is a "need for clarity on the aforesaid contradiction". Further, it also notes that there is "there should be safeguards to protect against any abuse", since this is a form of private censorship by intermediaries."</p>
<h3 style="text-align: justify; ">Evidence Needed Against Foreign Websites</h3>
<p style="text-align: justify; ">The government has told the Standing Committee that "foreign websites repeatedly refused to honour our laws", however, it has not provided any proof for this assertion. The government should make public all evidence that foreign web services are refusing to honour Indian laws, and should encourage a public debate on how we should tackle this problem in light of the global nature of the Internet.</p>
<h3 style="text-align: justify; ">Cyber Cafes Rules Violate Citizens’ Privacy</h3>
<p style="text-align: justify; ">The Standing Committee also pointed out that the Cyber Cafe Rules violated citizens’ right to privacy in requiring that "screens of the computers installed other than in partitions and cubicles should face open space of the cyber café". Unfortunately, the Standing Committee did not consider the privacy argument against retention of extensive and intrusive logs. Under the Cyber Cafe Rules, cyber cafes are required to retain (for a minimum of one year) extensive logs, including that of "history of websites accessed using computer resource at cyber café" in such a manner that each website accessed can be linked to a person. The Committee only considered the argument that this would impose financial burdens on small cybercafes, and rejected that argument. CIS wishes the Committee had examined the provision on log maintenance on grounds of privacy as well."</p>
<h3 style="text-align: justify; ">Government’s Half-Truths</h3>
<p style="text-align: justify; ">In one response, the government notes that "rules under Section 79 in particular have undergone scrutiny by High Courts in the country. Based on the Rules, the courts have given reliefs to a number of individuals and organizations in the country. No provision of the Rules notified under Sections 43A and 79 of the IT Act, 2000 have been held <i>ultra vires</i>."</p>
<p style="text-align: justify; ">What the government says is a half-truth. So far, courts have not struck down any of the IT Rules. But that is because none of the High Court cases in which the vires of the Rules have been challenged has concluded. So it is disingenuous of the government to claim that the Rule have "undergone scrutiny by High Courts". And in those cases where relief has been granted under the Intermediary Guidelines, the cases have been ex-parte or have been cases where the vires of the Rules have not been challenged. The government, if it wants to defend the Rules, should point out to any case in which the vires of the Rules have been upheld. Not a single court till date has declared the Rules to be constitutional when that question was before it.</p>
<h3 style="text-align: justify; ">Lack of Representation of Stakeholders in Policy Formulation</h3>
<p style="text-align: justify; ">Lastly, the Standing Committee noted that it is not clear whether the Cyber Regulatory Advisory Committee (CRAC), which is responsible for policy guidance on the IT Act, has "members representing the interests of principally affected or having special knowledge of the subject matter as expressly stipulated in Section 88(2) of the IT Act". This is a problem that we at CIS also noted in November 2012, when the CRAC was reconstituted after having been defunct for more than a decade.</p>
<p style="text-align: justify; ">CIS hopes that the government finally takes note of the view of legal experts, the Standing Committee on Delegated Legislation, the Parliamentary motion against the Rules, and numerous articles and editorials in the press, and withdraws the Intermediary Guidelines Rules and the Cyber Cafe Rules, and instead replaces them with rules that do not infringe our constitutional rights.</p>
<hr />
<p style="text-align: justify; "><i>The Centre for Internet and Society is a non-profit research organization that works on policy issues relating to freedom of expression, privacy, accessibility for persons with disabilities, access to knowledge and IPR reform, and openness, and engages in academic research on digital natives and digital humanities. It was among the organizations that submitted evidence to the Standing Committee on Subordinate Legislation on the IT Rules</i>.</p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/blog/cis-welcomes-standing-committee-report-on-it-rules'>https://cis-india.org/internet-governance/blog/cis-welcomes-standing-committee-report-on-it-rules</a>
</p>
No publisherpraneshIT ActPrivacyFreedom of Speech and ExpressionInternet GovernanceFeaturedCensorshipHomepage2013-04-03T10:54:52ZBlog EntryAnalyzing the Latest List of Blocked URLs by Department of Telecommunications (IIPM Edition)
https://cis-india.org/internet-governance/blog/analyzing-latest-list-of-blocked-urls-by-dot
<b>The Department of Telecommunications (DoT) in its order dated February 14, 2013 has issued directions to the Internet Service Providers (ISPs) to block seventy eight URLs. The block order has been issued as a result of a court order. Snehashish Ghosh does a preliminary analysis of the list of websites blocked as per the DoT order.</b>
<hr />
<p>Medianama has <a class="external-link" href="http://www.medianama.com/wp-content/uploads/blocking-instruction-II-14-Feb-2013.pdf">published the DoT order</a>, dated February 14, 2013, on its website.</p>
<hr />
<h3>What has been blocked?</h3>
<p style="text-align: justify;">The block order contains seventy eight URLs. Seventy three URLs are related to the Indian Institute of Planning and Management (IIPM). The other five URLs contain the term “highcourt”. The order also contains links from reputed news websites and news blogs including The Indian Express, Firstpost, Outlook, Times of India, Economic Times, Kafila and Caravan Magazine, and satire news websites Faking News and Unreal Times. The order also directs blocking of a public notice issued by the University Grants Commission (UGC).</p>
<p>The block order does not contain links to any social media website. However, some content related to IIPM has been removed but it finds no mention in the block order. Pursuant to which order or direction such content has been removed remains unclear. For example, Google has removed search results for the terms <Fake IIPM> pursuant to Court orders and it carries the following notice:</p>
<p><em>"In response to a legal request submitted to Google, we have removed 1 result(s) from this page. If you wish, you may </em><a href="http://www.chillingeffects.org/notice.cgi?sID=432099"><em>read more about the request</em></a><em> at ChillingEffects.org."</em></p>
<h3>Are there any mistakes in the order?</h3>
<p style="text-align: justify;">The direction issued by the DoT is once again inaccurate and mired with errors. In effect, the DoT has blocked sixty one unique URLs and the block order contains numerous repetitions. By its order the DoT has directed the ISPs to block an entire blog [<a class="external-link" href="http://iipmexposed.blogspot.in">http://iipmexposed.blogspot.in</a>] along with URLs to various posts in the same blog.</p>
<h3 style="text-align: justify;">Reasons for Blocking Websites</h3>
<p style="text-align: justify;"><a href="http://economictimes.indiatimes.com/tech/internet/directed-by-gwalior-court-government-blocks-70-urls-critical-of-iipm/articleshow/18523107.cms">According to news reports</a>, the main reason for blocking of websites by the DoT is a Court order issued by a Court in Gwalior. The reason for issuing such a block order might have been a court proceeding with respect to defamation and removal of defamatory content thereof. However, the reasons for blocking of domain names containing the term ‘high court’, which is not at all related to the IIPM Court case is unclear. The DoT by its order has also blocked a link in the website of a internet domain registrar which carried advertisement for the domain name [<a class="external-link" href="http://www.highcourt.com">www.highcourt.com</a>].</p>
<h3 style="text-align: justify;">Are the blocks legitimate?</h3>
<p style="text-align: justify;">The block order may have been issued by the DoT under Rule 10 of the Information Technology (Procedure and Safeguards for Blocking for Access of Information by Public) Rules, 2009.</p>
<p style="text-align: justify;">The Court order seems to be an interim injunction in a defamation suit. Generally, Courts exercise utmost caution while granting interim injunction in defamation cases. According to the Bonnard Rule (Bonnard v. Perryman, [1891] 2 Ch 269) in a defamation case, “interim injunction should not be awarded unless a defence of justification by the defendant was certain to fail at trial level.” Moreover, in the case of Woodward and Frasier, Lord Denning noted “that it would be unjust to fetter the freedom of expression, when actually a full trial had not taken place, and that if during trial it is proved that the defendant had defamed the plaintiff, then should they be liable to pay the damages.” The Delhi High Court in <em><a href="http://www.indiankanoon.org/doc/562656/">Tata Sons Ltd. v. Green Peace International</a></em> followed the Bonnard Rule and the Lord Denning’s judgements and ruled against the award of interim injunction for removal of defamatory content and stated:</p>
<p style="text-align: justify;">“The Court notes that the rule in Bonnard is as applicable in regulating grant of injunctions in claims against defamation, as it was when the judgment was rendered more than a century ago. This is because the Courts, the world over, have set a great value to free speech and its salutary catalyzing effect on public debate and discussion on issues that concern people at large. The issue, which the defendant’s game seeks to address, is also one of public concern. The Court cannot also sit in value judgment over the medium (of expression) chosen by the defendant since in a democracy, speech can include forms such as caricature, lampoon, mime parody and other manifestations of wit.”</p>
<p style="text-align: justify;">Therefore, it appears that the Court order has moved away from the settled principles of law while awarding an interim injunction for blocking of content related to IIPM. It is also interesting to note that in <em>Green Peace International</em>, the Court also answered the question as to whether there should be different standard for posting or publication of defamatory content on the internet. It was observed by the Court that publication is a comprehensive term, ‘embracing all forms and medium – including the Internet’.</p>
<h3 style="text-align: justify;">Blocking a Public Notice issued by a Statutory Body of Government of India</h3>
<p style="text-align: justify;">The block order mentions a URL which contains a public notice issued by University Grants Commission (UGC) related to the derecognition of IIPM as a University. The blocking of a public notice issued by the statutory body of the Government of India is unprecedented. A public notice issued by a statutory body is a function of the State. It can only be blocked or removed by a writ order issued by the High Court or the Supreme Court and only if it offends the Constitution. However, so far, ISPs such as BSNL have not enforced the blocking of this URL.</p>
<h3 style="text-align: justify;">Implementation of the order by the ISPs</h3>
<p style="text-align: justify;">As pointed out in my previous <a href="https://cis-india.org/internet-governance/analyzing-the-latest-list-of-blocked-sites-communalism-and-rioting-edition-part-ii">blog post</a> on blocking of websites, the ISPs have again failed to notify their consumers the reasons for the blocking of the URLs. This lack of transparency in the implementation of the block order has a chilling effect on freedom of speech.</p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/blog/analyzing-latest-list-of-blocked-urls-by-dot'>https://cis-india.org/internet-governance/blog/analyzing-latest-list-of-blocked-urls-by-dot</a>
</p>
No publishersnehashishSocial MediaFreedom of Speech and ExpressionInternet GovernanceFeaturedCensorshipHomepage2013-02-17T07:35:25ZBlog EntryFive Frequently Asked Questions about the Amended ITRs
https://cis-india.org/internet-governance/blog/five-faqs-on-amended-itrs
<b>This piece discusses the five major questions that have been the subject of debate after the World Conference on International Telecommunications 2012 (WCIT). The politics surrounding the WCIT are not discussed here but it must be kept in mind that they have played a significant role in the outcome of the conference and in some of the debates about it.</b>
<p style="text-align: justify; ">Each question is discussed with reference to the text of the treaty, to the minutes of the plenary sessions (which are available via the <a href="http://www.itu.int/en/pages/default.aspx">ITU website</a>), a little international law and a few references to other people’s comments on the treaty.</p>
<p><b>1. Do the ITRs apply to content on the internet?</b></p>
<p style="text-align: justify; ">Article 1.1 (a) has been amended to add the sentence “These Regulations do not address the content-related aspects of telecommunications”. Although some discussions about the <a href="http://www.itu.int/en/wcit-12/Documents/final-acts-wcit-12.pdf">International Telecommunication Regulations (ITRs)</a> and content have ignored this altogether, others seem concerned about its interpretation.</p>
<p style="text-align: justify; ">The ITU Secretary General has issued <a href="http://www.itu.int/en/wcit-12/Pages/statement-toure.aspx">a statement</a> in which he has clarified that “The new ITR treaty does NOT cover content issues and explicitly states in the first article that content-related issues are not covered by the treaty”.</p>
<p style="text-align: justify; ">Commentators like <a href="http://tryingtoreason.wordpress.com/2012/12/15/yes-the-new-itrs-do-cover-content-and-the-internet/">Chuan-Zheng Lee</a> however, continue to view the treaty with suspicion, on the basis that it is necessary to examine content in order to tell whether it is spam (Lee and <a href="http://globalvoicesonline.org/2013/01/02/wcit-and-its-relationship-to-the-internet-what-lies-ahead/">Chaparro</a> differ on this question). However, others like <a href="http://www.nytimes.com/2012/12/15/technology/in-a-huff-a-telling-us-walkout.html?pagewanted=all&_r=0">Eric Pfanner</a> have pointed to this paragraph in their skepticism about the US refusal to sign.</p>
<p style="text-align: justify; "><i>Some highlights from the plenary session discussions</i></p>
<p style="text-align: justify; ">The Chairman proposed the addition to Article 1.1(a) at the tenth plenary session. He did this to address concerns that the ITRs text could be interpreted to apply to content on the Internet. The original formulation that he proposed was ‘These regulations do not address and cannot be interpreted as addressing content’. This text was suggested in the middle of an extended discussion on Article 5A.</p>
<p style="text-align: justify; ">Many countries were skeptical of this insertion. Sudan argued that content could not be avoided in telecommunication networks “because it will always be in transit.” The United Arab Emirates seemed concerned about international interference in states’ existing regulation of content, and said “maybe we could actually say this in the minutes of the meeting that this regulation should not be interpreted as on alteration to Member States content regulation”.</p>
<p style="text-align: justify; ">Concerns about what the term ‘content’ means and whether it would apply broadly were raised by more than one country, including Saudi Arabia. For instance, it was argued that the text proposed by the Chairman might interfere with parts of the treaty that require operators to send tariff information correspondence. More than one country that felt that the insertion of this text would impact several parts of the treaty, and that it would be difficult to determine what amounted to dealing with content. The primary issue appeared to be that the term ‘content’ was not defined, and it therefore remained unclear what was being excluded. In response to these concerns, the Chairman withdrew his proposal for the amendment excluding content.</p>
<p style="text-align: justify; ">However, several states then spoke up in favour of the Chairman’s proposal, suggesting that the proposed amendment to Article 1.1 influenced their acceptance of Article 5A (on security and robustness of networks – discussed in detail below). Brazil suggested that an answer to the definitional concerns may be found in the work by Study Group 17, which had a definition available.</p>
<p style="text-align: justify; ">Following this, the next day, at the twelfth plenary, the Chairman brought back the Article 1.1 amendment excluding content. He stated explicitly that this amendment might be the way to get Articles 5A and 5B approved. The text he read out was insertion of the words <i>“</i>to the exclusion of their content”, after ‘’services’ at the end of 1.1A. Interestingly however, the term ‘content’ was never defined.</p>
<p style="text-align: justify; ">At the next plenary session, Iran raised the objection that this phrase was overbroad, and proposed the following formulation instead: “These Regulations do not address the content-related aspects of telecommunications”. This formulation found its way into the amended ITRs as the treaty stands today.</p>
<p><b>2. Does Article 5A on network security legitimize surveillance of Internet content?</b></p>
<p style="text-align: justify; ">Article 5A deals with ‘security and robustness of networks’ and requires member states to “individually and collectively endeavour to ensure the security and robustness of international telecommunication networks...”. This may have given rise to concerns about interpretations that may extend the security of networks to malware or viruses, and therefore to content on the Internet. However, Article 5A has to be read with Article 1.1(a), and therefore must be interpreted such that it does not ‘address the content-related aspects of telecommunications’.</p>
<p style="text-align: justify; ">Some commentators continue to see Article 5A as problematic. Avri Doria <a href="http://avri.doria.org/post/38641776703/wcit">has argued</a> that the use of the word ‘security’ in addition to ‘robustness’ of telecommunication infrastructure suggests that it means Internet security. However Emma Llansó of the Centre for Democracy and Technology <a href="https://www.cdt.org/blogs/emma-llanso/2012making-sense-wcit-it%E2%80%99s-complicated">has noted</a> that the language used in this paragraph is “ far too vague to be interpreted as a requirement or even a recommendation that countries surveil users on their networks in order to maintain security”. Llansó has suggested that civil society advocates make it clear to countries which attempt to use this article to justify surveillance, that it does not lend itself to such practices.</p>
<p style="text-align: justify; "><i>Some highlights from the plenary session discussions</i></p>
<p style="text-align: justify; ">Article 5A was one of the most controversial parts of the ITRs and was the subject of much debate.</p>
<p style="text-align: justify; ">On December 11<sup>th</sup>, in the Chairman’s draft that was being discussed, Article 5A was titled ‘security of networks’, and required members to endeavour to ensure the “security and robustness of international telecommunication networks”. The Chairman announced that this was the language that came out of Committee 5’s deliberations, and that ‘robustness’ was inserted at the suggestion of CEPT.</p>
<p style="text-align: justify; ">Several countries like Poland, Australia, Germany and the United States of America were keen on explicitly stating that Article 5A was confined to the physical or technical infrastructure, and either wanted a clarification that to this effect or use of the term ‘robustness’ instead of security. Many other countries, such as Russia and China, were strongly opposed to this suggestion and insisted that the term security must remain in the document (India was one of the countries that preferred to have the document use the term ‘security’).</p>
<p style="text-align: justify; ">It was in the course of this disagreement, during the tenth plenary session, that the Chairman suggested his global solution for Article 1.1 – a clarification that this would not apply to content. This solution was contested by several countries, withdrawn and then reinstated (in the eleventh plenary) after many countries explained that their assent to Article 5A was dependant on the existence of the Article 1 clarification about content (see above for details).</p>
<p style="text-align: justify; ">There was also some debate about whether Article 5A should use the term ‘robustness’ or the term ‘security’ (eg. The United States clarified that its preference was for the use of ‘resilience and robustness’ rather than security). The Secretary General referred to this disagreement, and said that he was therefore using both terms in the draft. The title of Article 5A was changed, in the eleventh plenary, to use both terms, instead of only referring to security.</p>
<p><b>3. Does Article 5B apply to spam content on the Internet? </b></p>
<p style="text-align: justify; ">The text of the amended treaty talks of ‘unsolicited bulk electronic communications’ and does not use the term ‘spam’[Article 5B says that ‘Members should endeavour to take necessary measures to prevent the propagation of unsolicited bulk electronic communications and minimize its impact on international telecommunication services’].If this phrase is read in isolation, it may certainly be interpreted as being applicable to spam. Commentators like <a href="http://avri.doria.org/tagged/WCIT/page/2">Avri Doria</a> have pointed to sources like<a href="http://www.itu.int/osg/csd/intgov/resoultions_2010/PP-10/RESOLUTION_130.pdf"> Resolution 130 of the Plenipotentiary Conference of the International Telecommunication Union</a> (Guadalajara, 2010) to demonstrate that ‘unsolicited bulk electronic communications’ ordinarily means spam. However, others like<a href="http://globalvoicesonline.org/2013/01/02/wcit-and-its-relationship-to-the-internet-what-lies-ahead/"> Enrique A. Chaparro</a> argue that it cannot possibly extend to content on the Internet given the language used in Article 1.1(a). Chapparo has explained, that given the exclusion of content, Article 5B it authorizes anti-spam mechanisms that do not work on content.</p>
<p style="text-align: justify; ">Article 5B, which discusses ‘unsolicited bulk electronic communications’, must be read with Article 1, which is the section on purpose and scope of the ITRS. Article 1.1 (a) specifies that the ITRs “do not address the content-related aspects of telecommunications”. Therefore it may be argued that ‘unsolicited bulk electronic communications’ cannot be read as being applicable to content on the Internet.</p>
<p style="text-align: justify; ">However, many continue to be concerned about Article 5B’s applicability to spam on the Internet. Although some of them that their fear is that some states may interpret Article 5B as applying to content, despite the contents of Article 1.1(a), many have failed to engage with the issue in the context of Article 1.1(a).</p>
<p><i>Some highlights from the plenary session discussions</i></p>
<p style="text-align: justify; ">Article 5B is inextricably linked with the amendment to Article 1.1. Mexico asked specifically about what the proposed amendment to Article 1.1 would mean for Article 5B: “I’m referring to the item which we’ll deal with later, namely unsolicited bulk electronic communications. Could that be referred to as content, perhaps?”. The Chairman responded saying, “This is exactly will solve the second Article 5B, that we are not dealing with content here. We are dealing with measures to prevent propagation of unsolicited bulk electronic messages”.<sup></sup></p>
<p style="text-align: justify; ">The amendment to Article 1.1 was withdrawn soon after it was introduced. Before it was reintroduced, Sweden said (at the eleventh plenary) that it could not see how Article 5B could apply without looking into the content of messages. The United States agreed with this and went on state that the issue of spam was being addressed at the WTSA level, as well as by other organisations. It argued that the spam issue was better addressed at the technical level than by introducing it in treaty text.</p>
<p style="text-align: justify; ">The amendment excluding content was reintroduced during the twelfth plenary. The Chairman explicitly stated that it might be the way to get Articles 5A and 5B approved.</p>
<p style="text-align: justify; ">The word ‘spam’ was dropped from the ITRs in the eight plenary, and “unsolicited bulk electronic communications” was used instead. However, in the eleventh plenary, as they listed their reasons for not signing the newly-amended ITRs, Canada and the United States of America referred to ‘spam’ which suggests that they may have viewed the change as purely semantic.</p>
<p><b>4. Does the resolution on Internet Governance indicate that the ITU plans to take over the Internet?</b></p>
<p style="text-align: justify; ">Much controversy has arisen over the plenary resolution ‘to foster an enabling environment for the greater growth of the Internet’. This controversy has arisen partly thanks to the manner in which it was decided to include the resolution, and partly over the text of the resolution. The discussion here focuses on the text of the resolution and then describes the proceedings that have been (correctly) criticized.</p>
<p style="text-align: justify; ">The history of this resolution, as <a href="http://www.circleid.com/posts/20121217_wcit_and_internet_governance_harmless_resolution_or_trojan_horse/">Wolfgang Kleinwächter</a> has explained, is that it was part of a compromise to appease the countries which were taking positions on the ITU’s role in Internet governance, that were similar to the <a href="http://files.wcitleaks.org/public/Merged%20UAE%20081212.pdf">controversial Russian proposal</a>. The controversial suggestions about Internet governance were excluded from the actual treaty and included instead in a non-binding resolution.</p>
<p style="text-align: justify; ">The text of the resolution instructs the Secretary General to “to continue to take the necessary steps for ITU to play an active and constructive role in the development of broadband and the multi-stakeholder model of the Internet as expressed in § 35 of the Tunis Agenda”. This paragraph is particularly controversial since of paragraph 35 of the <a href="http://www.itu.int/wsis/docs2/tunis/off/6rev1.html">Tunis Agenda</a> says “Policy authority for Internet-related public policy issues is the sovereign right of States. They have rights and responsibilities for international Internet-related public policy issues.” Kleinwächter has pointed out that this selection leaves out later additions that have taken place with progression towards a multi-stakeholder model.</p>
<p style="text-align: justify; ">The resolution also resolves to invite member states to “to elaborate on their respective positions on international Internet-related technical, development and public-policy issues within the mandate of ITU at various ITU forums including, inter alia, the World Telecommunication/ICT Policy Forum, the Broadband Commission for Digital Development and ITU study groups”.</p>
<p style="text-align: justify; ">A little after its introduction, people began expressing concerns such as the <a href="https://www.accessnow.org/blog/2012/12/12/wcit-watch-just-taking-the-temperature-a-late-night-resolution-on-the-inter">Secretary General may treat the resolution as binding</a>, While the language may raise cause for concern, it is important to note that resolutions of this nature are not binding and countries are free to opt out of them. Opinions vary about the intentions that have driven the inclusion of this resolution, and what it may mean for the future. However commentators like Milton Mueller have scoffed at these concerns, pointing out that the resolution is harmless and may have been a <a href="http://www.internetgovernance.org/2012/12/13/what-really-happened-in-dubai/">clever political maneuver</a> to resolve the basic conflict haunting the WCIT, and that <a href="http://www.internetgovernance.org/2012/12/18/itu-phobia-why-wcit-was-derailed/">mere discussion of the Internet in the ITU harms no one</a>.</p>
<p><i>Some highlights from the plenary session discussions</i></p>
<p style="text-align: justify; ">Egypt and Bulgaria suggested that the resolution refer to paragraph 55 of the Tunis agenda instead of paragraph 35, by inserted the following text “”Recognizing that the existing arrangements for Internet Governance have worked effectively to make the Internet the highly robust, dynamic and geographically diverse medium it is today, with the private sector taking the lead in day-to-day operations and with innovation and value creation at the edges.” The US was also quite insistent on this language (although it did also argue that this was the wrong forum to discuss these issues).</p>
<p style="text-align: justify; ">The Chairman was willing to include paragraph 55 in addition to paragraph 35 but Saudi Arabia objected to this inclusion. Finland suggested that the resolution should be removed since it was not supported by all the countries present and was therefore against the spirit of consensus. The Secretary General defended the resolution, suggesting both that it was harmless and that since it was a key component of the compromise, eliminating it would threaten the compromise. South Africa and Nigeria supported this stand.</p>
<p style="text-align: justify; ">It was during this debate that the procedural controversy arose. Late into the night, the Chairman said there was a long list of countries that wished to speak and said “I just wanted to have the feel of the room on who will accept the draft resolution”. He proceeded to have countries indicate whether they would accept the draft resolution or not, and then announced that the majority of the countries in the room were in favour of retaining the resolution. The resolution was then retained. Upon Spain’s raising the question, the Chairman clarified that this was not a vote. The next day, other countries raised the same question and the Chairman, while agreeing that the resolution was adopted on the basis of the ‘taking of temperature’ insisted that it was not a vote so much as an effort to see what majority of the countries wanted.</p>
<p style="text-align: justify; "><b>5. Does the human rights language used in the preamble, especially the part about states’ access to the Internet, threaten the Internet in any way?</b></p>
<p style="text-align: justify; ">The preamble says “Member States affirm their commitment to implement these Regulations in a manner that respects and upholds their human rights obligations”, and “These Regulations recognize the right of access of Member States to international telecommunication services”. The text of the preamble can be used as an interpretation aid since it is recognized as providing context to, and detailing the object and purpose of, a treaty. However if the meaning resulting from this appears to be ambiguous, obscure, absurd or unreasonable, then supplementary means such as the preparatory work for the treaty and the circumstances for its conclusion may also be taken into account.</p>
<p style="text-align: justify; ">Therefore anyone who is concerned about the impact of the text inserted in the preamble must (a) identify text within the main treaty that could be interpreted in an undesirable manner using the text in the preamble; and (b) consider preparatory work for the treaty and see whether it supports this worrying interpretation. For example, if there were concerns about countries choosing to interpret the term ‘human rights’ as subordinating political rights to economic rights, it would be important to take note of the Secretary General’s emphasis on the <a href="http://www.un.org/en/documents/udhr/index.shtml">UDHR</a> being applicable to all member states.</p>
<p style="text-align: justify; ">Initially, only the first insertion about ‘human rights obligations’ was part of the draft treaty. The second insertion, recognizing states’ rights followed after the discussion about human rights language. Some states argued that it was inconsistent to place human rights obligations on states towards their citizens, but to leave out their cross-border obligations. It was immediately after this text was voted into the draft, that the United States, the United Kingdom and other countries refused to sign the ITRs. This particular insertion is phrased as a right of states rather than that of individuals or citizens, which does not align with the language of international human rights. While it may not be strictly accurate to say that human rights have traditionally been individual centric (since collective rights are also recognized in certain contexts), it is certainly very unusual to treat the rights of states or governments as human rights.</p>
<p><i>Some highlights from the plenary session discussions</i></p>
<p style="text-align: justify; ">The United States of America and the Netherlands wanted to include language to state explicitly that states’ international human rights obligations are not altered in anyway. This was to clarify that the inclusion of human rights language was not setting the ITU up as a forum in which human rights obligations are debated. Malaysia objected to the use of human rights language in the preamble right at the outset, on the grounds that the ITRs are the wrong place for this, and that the right place is the ITU Constitution. It even pointed to the fact that jurisprudence is ever-evolving, to suggest that the meaning of human rights obligations might change over time. These were the two major perspectives offered towards the beginning of the discussion.</p>
<p style="text-align: justify; ">The Chairman underlined the fact that the Universal Declaration of Human Rights is already applicable to all UN countries. He argued that reflection of these principles in the ITRs would help build universal public faith in the conference.</p>
<p style="text-align: justify; ">The first traces of the states’ access rights can be seen in Cuba’s intervention at the ninth plenary – Cuba argued that limiting states’ access to public information networks amounted to infringement of human rights. At the fourteenth plenary, Nigeria proposed on behalf of the African group that the following text be added to the preamble “And recognize the right of access of all Member States to international telecommunication networks and services." Countries like China which had been ambivalent about the human rights language in the preamble, were happy with this move away from an individual-centric understanding of human rights, to one that sees states as representative of people.</p>
<p style="text-align: justify; ">The United States was express in its dissent, and said “human rights obligations go to the individual”. Sweden was also not happy with the proposal and argued that it moved away from well-established human rights language that affirmed existing commitments to drafting new human rights language.</p>
<p style="text-align: justify; ">It was an amended version of the African group proposal that finally found its way into the preamble. It was supported by many countries such as China, Nigeria and Sudan, who took the position that group rights are included within human rights, and that governments represent their citizens and therefore have rights on their behalf. This position was strenuously disputed by states like the USA, Switzerland, United Kingdom and Canada.</p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/blog/five-faqs-on-amended-itrs'>https://cis-india.org/internet-governance/blog/five-faqs-on-amended-itrs</a>
</p>
No publisherchinmayiWCITInternet GovernanceFeaturedITUHomepageInformation Technology2013-01-30T05:36:26ZBlog EntryBreaking Down Section 66A of the IT Act
https://cis-india.org/internet-governance/blog/breaking-down-section-66-a-of-the-it-act
<b>Section 66A of the Information Technology Act, which prescribes 'punishment for sending offensive messages through communication service, etc.' is widely held by lawyers and legal academics to be unconstitutional. In this post Pranesh Prakash explores why that section is unconstitutional, how it came to be, the state of the law elsewhere, and how we can move forward.</b>
<p style="text-align: justify; ">Back in February 2009 (after the IT Amendment Act, 2008 was hurriedly passed on December 22, 2008 by the Lok Sabha, and a day after by the Rajya Sabha<a href="#fn1" name="fr1">[1]</a> but before it was <a class="external-link" href="http://deity.gov.in/sites/upload_files/dit/files/downloads/itact2000/act301009.pdf">notified on October 27, 2009</a>) I had written that <a href="https://cis-india.org/internet-governance/resources/section-66A-information-technology-act" class="external-link">s.66A</a> is "patently in <a href="https://cis-india.org/internet-governance/publications/it-act/short-note-on-amendment-act-2008/" class="external-link">violation of Art. 19(1)(a) of the Constitution of India</a>":</p>
<p class="visualClear" style="text-align: justify; ">Section 66A which punishes persons for sending offensive messages is overly broad, and is patently in violation of Art. 19(1)(a) of our Constitution. The fact that some information is "grossly offensive" (s.66A(a)) or that it causes "annoyance" or "inconvenience" while being known to be false (s.66A(c)) cannot be a reason for curbing the freedom of speech unless it is directly related to decency or morality, public order, or defamation (or any of the four other grounds listed in Art. 19(2)). It must be stated here that many argue that John Stuart Mill's harm principle provides a better framework for freedom of expression than Joel Feinberg's offence principle. The latter part of s.66A(c), which talks of deception, is sufficient to combat spam and phishing, and hence the first half, talking of annoyance or inconvenience is not required. Additionally, it would be beneficial if an explanation could be added to s.66A(c) to make clear what "origin" means in that section. Because depending on the construction of that word s.66A(c) can, for instance, unintentionally prevent organisations from using proxy servers, and may prevent a person from using a sender envelope different from the "from" address in an e-mail (a feature that many e-mail providers like Gmail implement to allow people to send mails from their work account while being logged in to their personal account). Furthermore, it may also prevent remailers, tunnelling, and other forms of ensuring anonymity online. This doesn't seem to be what is intended by the legislature, but the section might end up having that effect. This should hence be clarified.</p>
<p class="visualClear" style="text-align: justify; ">I stand by that analysis. But given that it is quite sparse, in this post I will examine s.66A in detail.</p>
<p class="visualClear" style="text-align: justify; ">Here's what s. 66A of the IT (Amendment) Act, 2008 states:</p>
<p class="callout" style="text-align: justify; "><b>66A. Punishment for sending offensive messages through communication service, etc.,<br /></b>Any person who sends, by means of a computer resource or a communication device,—<br />(a) any information that is grossly offensive or has menacing character;<br />(b) any information which he knows to be false, but for the purpose of causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred, or ill will, persistently by making use of such computer resource or a communication device,<br />(c) any electronic mail or electronic mail message for the purpose of causing annoyance or inconvenience or to deceive or to mislead the addressee or recipient about the origin of such messages<br /><br />shall be punishable with imprisonment for a term which may extend to three years and with fine.<br /><br />Explanation: For the purposes of this section, terms "electronic mail" and "electronic mail message" means a message or information created or transmitted or received on a computer, computer system, computer resource or communication device including attachments in text, images, audio, video and any other electronic record, which may be transmitted with the message.<a href="#fn2" name="fr2">[2]</a></p>
<p align="JUSTIFY">A large part of s.66A can be traced back to s.10(2) of the UK's Post Office (Amendment) Act, 1935:</p>
<p align="JUSTIFY" class="callout">If any person —<br />(a) sends any message by telephone which is grossly offensive or of an indecent, obscene, or menacing character; or<br />(b) sends any message by telephone, or any telegram, which he knows to be false, for the purpose of causing annoyance, inconvenience, or needless anxiety to any other person; or<br />(c) persistently makes telephone calls without reasonable cause and for any such purposes as aforesaid;<br />he shall be liable upon summary conviction to a fine not exceeding ten pounds, or to imprisonment for a term not exceeding one month, or to both such fine and imprisonment.</p>
<p align="JUSTIFY">Section 66A bears a striking resemblance to the three parts of this law from 1935, with clauses (b) and (c) being merged in the Indian law into a single clause (b) of s.66A, with a whole bunch of new "purposes" added. Interestingly, the Indian Post Office Act, 1898, was never amended to add this provision.</p>
<p align="JUSTIFY">The differences between the two are worth exploring.</p>
<h3 align="JUSTIFY">Term of Punishment</h3>
<p style="text-align: justify; ">The first major difference is that the maximum term of imprisonment in the 1935 Act is only one month, compared to three years in s.66A of the IT Act. It seems the Indian government decided to subject the prison term to hyper-inflation to cover for the time. If this had happened for the punishment for, say, criminal defamation, then that would have a jail term of up to 72 years! The current equivalent laws in the UK are the Communications Act, 2003 (s. 127) and the <a class="external-link" href="http://www.legislation.gov.uk/ukpga/1988/27/section/1">Malicious Communications Act</a> 1988 (s.1) for both of which the penalty is up to 6 months' imprisonment or to a maximum fine of £5000 or both. What's surprising is that in the Information Technology (Amendment) Bill of 2006, the penalty for section 66A was up to 2 years, and it was changed on December 16, 2008 through an amendment moved by Mr. A. Raja (the erstwhile Minister of Communications and IT) to 3 years. Given that parts of s.66A(c) resemble nuisance, it is instructive to note the term of punishment in the Indian Penal Code (IPC) for criminal nuisance: a fine of Rs. 200 with no prison term.</p>
<h3 style="text-align: justify; ">"Sending" vs. "Publishing"</h3>
<p align="JUSTIFY">J. Sai Deepak, a lawyer, has made an interesting point that <a class="external-link" href="http://thedemandingmistress.blogspot.in/2012/11/does-section-66a-of-information.html">the IT Act uses "send" as part of its wording, and not "publish"</a>. Given that, only messages specifically directed at another would be included. While this is an interesting proposition, it cannot be accepted because: (1) even blog posts are "sent", albeit to the blog servers — s.66A doesn't say who it has to be sent to; (2) in the UK the Communications Act 2003 uses similar language and that, unlike the Malicious Communication Act 1988 which says "sends to another person", has been applied to public posts to Twitter, etc.; (3) The explanation to s.66A(c) explicitly uses the word "transmitted", which is far broader than "send", and it would be difficult to reconcile them unless "send" can encompass sending to the publishing intermediary like Twitter.</p>
<p align="JUSTIFY">Part of the narrowing down of s.66A should definitely focus on making it applicable only to directed communication (as is the case with telephones, and with the UK's Malicious Communication Act), and not be applicable to publishing.</p>
<h3 align="JUSTIFY">Section 66A(c)</h3>
<p style="text-align: justify; ">Section 66A(c) was also inserted through an amendment moved by Mr. Raja on December 16, 2008, which was passed by the Lok Sabha on December 22, 2008, and a day after by the Rajya Sabha. (The version introduced in Parliament in 2006 had only 66A(a) and (b).) This was done in response to the observation by the Standing Committee on Information Technology that there was no provision for spam. Hence it is clear that this is meant as an anti-spam provision. However, the careless phrasing makes it anything but an anti-spam provision. If instead of "for the purpose of causing annoyance or inconvenience or to deceive or to mislead the addressee or recipient about the origin of such messages" it was "for the purpose of causing annoyance and inconvenience and to deceive and to mislead the addressee or recipient about the origin of such messages", it would have been slightly closer to an anti-spam provision, but even then doesn't have the two core characteristics of spam: that it be unsolicited and that it be sent in bulk. (Whether only commercial messages should be regarded as spam is an open question.) That it arise from a duplicitous origin is not a requirement of spam (and in the UK, for instance, that is only an aggravating factor for what is already a fine-able activity).<br /><br />Curiously, the definitional problems do not stop there, but extend to the definitions of "electronic mail" and "electronic mail message" in the 'explanation' as well. Those are so vast that more or less anything communicated electronically is counted as an e-mail, including forms of communication that aren't aimed at particular recipients the way e-mail is.<br /><br />Hence, the anti-spam provision does not cover spam, but covers everything else. This provision is certainly unconstitutional.</p>
<h3 class="visualClear" style="text-align: justify; ">Section 66A(b)</h3>
<p style="text-align: justify; ">Section 66A(b) has three main elements: (1) that the communication be known to be false; (2) that it be for the purpose of causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred or ill will; (3) that it be communicated persistently. The main problem here is, of course, (2). "Annoyance" and "inconvenience", "insult", "ill will" and "hatred" are very different from "injury", "danger", and "criminal intimidation". That a lawmaker could feel that punishment for purposes this disparate belonged together in a single clause is quite astounding and without parallel (except in the rest of the IT Act). That's akin to having a single provision providing equal punishment for calling someone a moron ("insult") and threatening to kill someone ("criminal intimidation"). While persistent false communications for the purpose of annoying, insulting, inconveniencing, or causing ill will should not be criminalised (if need be, having it as a civil offence would more than suffice), doing so for the purpose of causing danger or criminal intimidation should. However, the question arises whether you need a separate provision in the IT Act for that. Criminal intimidation is already covered by ss. 503 and 506 of the IPC. Similarly, different kinds of causing danger are taken care of in ss.188, 268, 283, 285, 289, and other provisions. Similarly with the other "purposes" listed there, if, for instance, a provision is needed to penalise hoax bomb threats, then the provision clearly should not be mentioning words like "annoyance", and should not be made "persistent". (At any rate, s. 505(1) of the IPC suffices for hoax bomb threats, so you don't need a separate provision in the IT Act).</p>
<p style="text-align: justify; ">I would argue that in its current form this provision is unconstitutional, since there is no countervailing interest in criminalising false and persistent "insults", etc., that will allow those parts of this provision to survive the test of 'reasonableness' under Art.19(2). Furthermore, even bits that survive are largely redundant. While this unconstitutionality could be cured by better, narrower wording, even then one would need to ensure that there is no redundancy due to other provisions in other laws.</p>
<h3>Section 66A(a)</h3>
<p style="text-align: justify; ">In s.66A(a), the question immediately arises whether the information that is "grossly offensive" or "menacing" need to be addressed at someone specific and be seen as "grossly offensive" or "menacing" by that person, or be seen by a 'reasonable man' test.</p>
<p style="text-align: justify; ">Additionally, the term "grossly offensive" will have to be read in such a heightened manner as to not include merely causing offence. The one other place where this phrase is used in Indian law is in s.20(b) of the Indian Post Office Act (prohibiting the sending by post of materials of an indecent, obscene, seditious, scurrilous, threatening, or grossly offensive character). The big difference between s.20(b) of the IPO Act and s.66A of the IT Act is that the former is clearly restricted to one-to-one communication (the way the UK's Malicious Communication Act 1988 is). Reducing the scope of s.66A to direct communications would make it less prone to challenge.<br /><br />Additionally, in order to ensure constitutionality, courts will have to ensure that "grossly offensive" does not simply end up meaning "offensive", and that the maximum punishment is not disproportionately high as it currently is. Even laws specifically aimed at online bullying, such as the UK's Protection from Harassment Act 1997, can have unintended effects. As George Monbiot notes, the "first three people to be prosecuted under [the Protection from Harassment Act] were all peaceful protesters".</p>
<h3 style="text-align: justify; ">Constitutional Arguments in Importing Laws from the UK</h3>
<p style="text-align: justify; ">The plain fact is that the Indian Constitution is stronger on free speech grounds than the (unwritten) UK Constitution, and the judiciary has wide powers of judicial review of statutes (i.e., the ability of a court to strike down a law passed by Parliament as 'unconstitutional'). Judicial review of statutes does not exist in the UK (with review under its EU obligations being the exception) as they believe that Parliament is supreme, unlike India. Putting those two aspects together, a law that is valid in the UK might well be unconstitutional in India for failing to fall within the eight octagonal walls of the reasonable restrictions allowed under Art.19(2). That raises the question of how they deal with such broad wording in the UK.</p>
<h3 style="text-align: justify; ">Genealogy of UK Law on Sending 'Indecent', 'Menacing', 'Grossly Offensive' Messages</h3>
<p style="text-align: justify; ">Quoting from the case of DPP v. Collins [2006] UKHL 40 [6]:</p>
<p style="text-align: justify; ">The genealogy of [s. 127(1) of the Communication Act] may be traced back to s.10(2)(a) of the Post Office (Amendment) Act, 1935, which made it an offence to send any message by telephone which is grossly offensive or of an indecent, obscene or menacing character. That subsection was reproduced with no change save of punctuation in s.66(a) of the Post Office Act 1953. It was again reproduced in s.78 of the Post Office Act 1969, save that "by means of a public telecommunication service" was substituted for "by telephone" and "any message" was changed to "a message or other matter". Section 78 was elaborated but substantially repeated in s.49(1)(a) of the British Telecommunications Act 1981 and was re-enacted (save for the substitution of "system" for "service") in s.43(1)(a) of the Telecommunications Act 1984. Section 43(1)(a) was in the same terms as s.127(1)(a) of the 2003 Act, save that it referred to "a public telecommunication system" and not (as in s.127(1)(a)) to a "public electronic communications network". Sections 11(1)(b) of the Post Office Act 1953 and 85(3) of the Postal Services Act 2000 made it an offence to send certain proscribed articles by post.</p>
<p style="text-align: justify; ">While the above quotation talks about s.127(1) it is equally true about s.127(2) as well. In addition to that, in 1988, the <a class="external-link" href="http://www.legislation.gov.uk/ukpga/1988/27/section/1">Malicious Communications Act</a><a class="external-link" href="http://www.legislation.gov.uk/ukpga/1988/27/section/1"></a> (s.1) was passed to prohibit one-to-one harassment along similar lines.</p>
<p style="text-align: justify; ">The UK's Post Office Act was eclipsed by the Telecommunications Act in 1984, which in turn was replaced in 2003 by the Communications Act. (By contrast, we still stick on to the colonial Indian Post Office Act, 1898.) Provisions from the 1935 Post Office Act were carried forward into the Telecommunications Act (s.43 on the "improper use of public telecommunication system"), and subsequently into s.127 of the Communications Act ("improper use of public electronic communications network"). Section 127 of the Communications Act states:</p>
<p class="callout" style="text-align: justify; ">127. Improper use of public electronic communications network<br />(1) A person is guilty of an offence if he — <br />(a) sends by means of a public electronic communications network a message or other matter that is grossly offensive or of an indecent, obscene or menacing character; or<br />(b) causes any such message or matter to be so sent.<br />(2) A person is guilty of an offence if, for the purpose of causing annoyance, inconvenience or needless anxiety to another, he —<br />(a) sends by means of a public electronic communications network, a message that he knows to be false,<br />(b) causes such a message to be sent; or<br />(c) persistently makes use of a public electronic communications network.<br />(3) A person guilty of an offence under this section shall be liable, on summary conviction, to imprisonment for a term not exceeding six months or to a fine not exceeding level 5 on the standard scale, or to both.<br />(4) Subsections (1) and (2) do not apply to anything done in the course of providing a programme service (within the meaning of the Broadcasting Act 1990 (c. 42)).</p>
<p style="text-align: justify; ">Currently in the UK there are calls for repeal of s.127. In a separate blog post I will look at how the UK courts have 'read down' the provisions of s.127 and other similar laws in order to be compliant with the European Convention on Human Rights.</p>
<h3 style="text-align: justify; ">Comparison between S. 66A and Other Statutes</h3>
<p>Section 144, IPC, 1860</p>
<p style="text-align: justify; ">Power to issue order in urgent cases of nuisance or apprehended danger</p>
<ol>
<li style="text-align: justify; ">...<b>obstruction, annoyance or injury</b> to any person lawfully employed, or <b>danger </b>to human life, health or safety, or a disturbance of the public tranquillity</li>
</ol>
<p style="text-align: justify; ">Babulal Parate v. State of Maharastra and Ors. [1961 AIR SC 884] (Magistrates order under s. 144 of the Cr. PC, 1973 was in violation of Art.19(1)(a) of the Constitution).</p>
<p style="text-align: justify; "><i>A special thanks is due to Snehashish Ghosh for compiling the below table.<br /></i></p>
<table class="grid listing">
<tbody>
<tr>
<th>Section</th><th>Term(s)/phrase(s) used in 66A</th><th>Term(s)/ phrase(s) used in similar sections</th>
</tr>
<tr>
<td>Section 66A (heading)</td>
<td style="text-align: justify; ">Punishment for sending offensive messages through communication service, etc</td>
<td>Section 127, CA, 2003, "Improper use of public electronic communications network"</td>
</tr>
<tr>
<td>Section 66A(a)</td>
<td style="text-align: justify; ">Any person who sends, by means of a computer resource or a communication device</td>
<td>Section 1(1), MCA 1988, "Any person who sends to another person..."</td>
</tr>
<tr>
<td>Section 66A(a)</td>
<td>Grossly offensive</td>
<td style="text-align: justify; ">Section 1(1)(a)(i), MCA 1988; <br />Section 127(1)(a),CA, 2003; <br />Section 10(2)(a), Post Office (Amendment) Act, 1935*; <br />Section 43(1)(a), Telecommunications Act 1984*;<br /> Section 20, India Post Act 1898</td>
</tr>
<tr>
<td>Section 66A(a)</td>
<td>Menacing character</td>
<td>Section127(1)(a),CA, 2003</td>
</tr>
<tr>
<td>Section 66A(b)</td>
<td>Any information which he knows to be false</td>
<td style="text-align: justify; ">Section 1(1)(a)(iii), MCA 1988 "information which is false and known or believed to be false by the sender"; <br />Section 127(2)(a), CA, 2003, "a message that he knows to be false"<br /></td>
</tr>
<tr style="text-align: justify; ">
<td>Section 66A(b) “purpose of...” <br /></td>
<td>Causing annoyance</td>
<td>Section127(2), CA, 2003</td>
</tr>
<tr>
<td></td>
<td>
<p>Inconvenience</p>
</td>
<td style="text-align: justify; ">Section 127 (2), CA, 2003</td>
</tr>
<tr>
<td></td>
<td>Danger</td>
<td></td>
</tr>
<tr>
<td></td>
<td>Insult</td>
<td>Section 504, IPC, 1860</td>
</tr>
<tr>
<td></td>
<td>Injury</td>
<td style="text-align: justify; ">Section 44 IPC, 1860, "The word 'injury' denotes any harm whatever illegally caused to any person, in body, mind, reputation or property."<br /></td>
</tr>
<tr>
<td></td>
<td>Criminal intimidation</td>
<td>Sections 503 and 505 (2), IPC, 1860</td>
</tr>
<tr>
<td></td>
<td>Enmity, hatred or ill-will</td>
<td>Section 153A(1)(a), IPC, 1860</td>
</tr>
<tr>
<td></td>
<td>Persistently by making use of such computer resource or a communication device</td>
<td>Section 127(2)(c), CA, 2003, "persistently makes use of a public electronic communications network."</td>
</tr>
<tr>
<td>Section 66A(c)</td>
<td>
<p>Deceive or to mislead</p>
</td>
<td>-</td>
</tr>
</tbody>
</table>
<hr />
<p><b>Notes</b><br />MCA 1988: <a class="external-link" href="http://www.legislation.gov.uk/ukpga/1988/27/section/1">Malicious Communications Act</a> (s.1)<br />CA: <a class="external-link" href="http://www.legislation.gov.uk/ukpga/2003/21/section/127">Communications Act 2003</a> (s.127)<br />*Replaced by Communications Act 2003</p>
<hr />
<p style="text-align: justify; ">[<a href="#fr1" name="fn1">1</a>]. The Information Technology (Amendment) Bill, 2008, was one amongst the eight bills that were passed in fifteen minutes on December 16, 2008.<br />[<a href="#fr2" name="fn2">2</a>]. Inserted vide Information Technology Amendment Act, 2008.</p>
<p style="text-align: justify; ">This was re-posted in <a class="external-link" href="http://www.outlookindia.com/article.aspx?283149">Outlook </a>(November 28, 2012)</p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/blog/breaking-down-section-66-a-of-the-it-act'>https://cis-india.org/internet-governance/blog/breaking-down-section-66-a-of-the-it-act</a>
</p>
No publisherpraneshIT ActFreedom of Speech and ExpressionPublic AccountabilityInternet GovernanceFeaturedHomepage2012-12-14T09:51:17ZBlog Entry