<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 11 to 15.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/it-amendment-act-69-b-draft-and-final-version-comparison"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/it-amendment-act-69-a-rules-draft-and-final-version-comparison"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/events/workshop-exploring-the-internals-of-mobile-technologies-1"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/it-amendment-act-69-rules-draft-and-final-version-comparison"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/indian-telegraph-act-419-a-rules-and-it-amendment-act-69-rules"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/it-amendment-act-69-b-draft-and-final-version-comparison">
    <title>IT (Amendment) Act, 2008, 69B Rules: Draft and Final Version Comparison</title>
    <link>https://cis-india.org/internet-governance/blog/it-amendment-act-69-b-draft-and-final-version-comparison</link>
    <description>
        &lt;b&gt;Jadine Lannon has performed a clause-by-clause comparison of  the Draft 69B Rules and official 69B Rules under Section 69B in order to  better understand how the two are similar and how they differ. Notes have been included on some changes we deemed to be important.&lt;/b&gt;
        &lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/copy6_of_pc1.png" alt="c1" class="image-inline" title="c1" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/copy3_of_pc2.png" alt="c2" class="image-inline" title="c2" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/copy3_of_pc3.png" alt="c3" class="image-inline" title="c3" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/copy3_of_pc4.png" alt="c4" class="image-inline" title="c4" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/copy4_of_pc5.png" alt="c5" class="image-inline" title="c5" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/copy3_of_pc6.png" alt="c6" class="image-inline" title="c6" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/copy_of_pc7.png" alt="c7" class="image-inline" title="c7" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;There has been a considerable amount of re-arrangement and re-structuring of the various clauses between the 69B Draft Rules and the official Rules, as can be seen in the comparison chart, but very little content has been changed. The majority of the changes made to the official Rules are changes in wording and language that serve to provide some much-needed clarification to the Draft Rules (see the differences between Clause (9) of the Draft Rules and sub-section (4) of Clause (3) of the official Rules as an example). Language redundancies, as well as full clauses (Clause [6] of the Draft Rules) have been thankfully removed in the official Rules.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aside from the addition of four definitions, including a definition for a “security policy”, a phrase which appears in the Draft Rules without being defined, Clause (2) contains what is most likely one of the more noteable changes between the two definitions: under sub-section (g) in the 69 Rules, the words “or unauthorised use” have been added to the definition of “cyber security breaches”, which significantly increases the scope of what can be considered a cyber security breach under the Rules.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A significant change between the two sets of rules can be found in sub-section (2) of Clause (8) of the official rules, which states that, “&lt;i&gt;save as otherwise required for the purpose of any ongoing investigation, criminal complaint or legal proceedings &lt;/i&gt;the intermediary or the person in-charge of computer resource shall destroy records pertaining to directions for monitoring or collection of information”. The section in italics has been added to the original Clause (22) of the Draft Rules, meaning that when the Rules were originally drawn up, no exceptions were to be made for the destructions of the records for the issuing of directions for monitoring and/or the collected information. They would simply have to be destroyed within six months of the discontinuance of the monitoring/collection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One change that may or may not be significant is the replacement of the words “established violations” in the Draft Rules to simply “violation” in the official Rules in Clauses (19)/(6), which deal with the responsibility of the intermediary. This could be taken to mean that suspected and/or perceived violations may also be punishable under this clause, but this is a hard stance to argue. Most likely the adjustment was made when those superfluous and/or convoluted parts of the Draft rules were being removed.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/it-amendment-act-69-b-draft-and-final-version-comparison'&gt;https://cis-india.org/internet-governance/blog/it-amendment-act-69-b-draft-and-final-version-comparison&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jdine</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Information Technology</dc:subject>
    

   <dc:date>2013-04-30T09:47:46Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/it-amendment-act-69-a-rules-draft-and-final-version-comparison">
    <title>IT (Amendment) Act, 2008, 69A Rules: Draft and Final Version Comparison</title>
    <link>https://cis-india.org/internet-governance/blog/it-amendment-act-69-a-rules-draft-and-final-version-comparison</link>
    <description>
        &lt;b&gt;Jadine Lannon has performed a clause-by-clause comparison of the 69A draft rules and 69A rules for Section 69A of the IT Act in order to better understand how the two differ. While there has been reshuffling of the clauses in the official rules, the content itself has not changed significantly. Notes have been included on some changes we deemed to be important.&lt;/b&gt;
        &lt;p&gt;Below is a chart depicting the 69A Draft Rules and the 69A Rules:&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/copy5_of_pc1.png" alt="c1" class="image-inline" title="c1" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/copy2_of_pc2.png" alt="c2" class="image-inline" title="c2" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/copy2_of_pc3.png" alt="c3" class="image-inline" title="c3" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/copy2_of_pc4.png" alt="c4" class="image-inline" title="c4" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/copy3_of_pc5.png" alt="c5" class="image-inline" title="c5" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/copy2_of_pc6.png" alt="c6" class="image-inline" title="c6" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;There was a lot of structural change between the draft rules and the official rules—many of the draft clauses were shuffled around and combined—but not a lot of change in content. Many of the changes that appear in the official rules serve to clarify parts of the draft rules.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Three definitions were added under clause (2), two to clarify later references to a “designated officer” and a “nodal officer” and the third to indicate a form appended to the official Rules.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Clause (3) of the official rules then clarifies who shall be named the “designated officer”, which was not done in the draft rules as there was no inclusion of an official title of the officer who would have the responsibilities of the “designated officer”. Interestingly, clause (3) of the draft rules requires the Secretary of the Department of Information Technology, Ministry of Communications &amp;amp; Information Technology, Government of India to name an officer, whereas clause (3) of the official rules states that the “Central Government” shall designate an officer, a change in language that allows for much more flexibility on the government's part.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Clause (5) in the draft rules and clause (4) in the official rules deal with the designation of a Nodal Officer, but omitted in the official rules are responsibilities of the designated officer, which includes acting on the “direction of the indian competent court”. This responsibility does not appear in any part of the official rules. Further, clause (4) of the official rules requires the organizations implicated in the rules to publish the name of the Nodal Officer on their website; this is an addition to the draft rules, and a highly useful one at that. This is an important move towards some form of transparency in this contentious process.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Clause (5) of the official rules significantly clarifies clause (4) of the draft rules by stating that the designated officer may direct any Agency of the Government or intermediary to block access &lt;i&gt;once a request from the Nodal Officer has been received&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Clause (7) of the official rules uses the word “information” instead of “computer resource”, which is used in the corresponding clause (12) in the draft rules, when referring to the offending object. This change in language significantly widens the scope of what can be considered offending under the rules.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The sub-sections (2), (3) and (4) of clause (9) of the official rules are additions to the draft rules. Sub-section (2) is a significant addition, as it deals with the ability of the Secretary of the Department of Information Technology's ability to block for public access any information or part thereof without granting a hearing to the entity in control of the offending information &lt;i&gt;in a case of emergency nature. &lt;/i&gt;The request for blocking will then be brought before the committee of examination of request &lt;i&gt;within 48 hours of the issue of direction&lt;/i&gt;, meaning that the offending information could be blocked for two days without giving notice to the owner/controller of the information of the reason for the blockage.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An important clarification has been included in clause (15) of the official rules, which differs from clause (23) of the draft rules through the inclusion of the following phrase: “The Designated Officer shall maintain complete record of the &lt;i&gt;request received and action taken thereof &lt;/i&gt;[...] of the cases of blocking for public access”. This is a significant change from clause (23), which simply states that the “Designated Officer shall maintain complete &lt;i&gt;record&lt;/i&gt; [...] of the cases of blocking”. This could be seen as an important step towards transparency and accountability in the 69B process of blocking information for public access if clause (16) of the official rules did not state that all requests and complaints received and all actions taken thereof must be kept confidential, so the maintenance of records mentioned in clause (15) of the official rules appears to be only for internal record-keeping. However, just the fact that this information is being recording is a significant change from the draft rules, and may, if the sub-rules relating to confidentiality were to be changed, be useful data for the public.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/it-amendment-act-69-a-rules-draft-and-final-version-comparison'&gt;https://cis-india.org/internet-governance/blog/it-amendment-act-69-a-rules-draft-and-final-version-comparison&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jdine</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-04-30T10:10:48Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/events/workshop-exploring-the-internals-of-mobile-technologies-1">
    <title>A Workshop on "Exploring the Internals of Mobile Technologies"</title>
    <link>https://cis-india.org/a2k/events/workshop-exploring-the-internals-of-mobile-technologies-1</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society invites all individuals interested in investigating and exploring the internal of the Mobile/Hardware Technologies and understanding of capabilities of mobile phones to join our workshop on Saturday, October 27, 2012, at the TERI Southern Regional Centre.&lt;/b&gt;
        &lt;p&gt;&lt;b id="internal-source-marker_0.38347873743623495"&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;span id="internal-source-marker_0.38347873743623495"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;h3&gt;&lt;b&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Objective:&lt;/b&gt;&lt;/h3&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Bringing together the technical/hacker community and individuals interested in mobile devices to explore mobile devices internals and capabilities&lt;/p&gt;
&lt;h3&gt;Scope of Conference and Workshop:&lt;/h3&gt;
&lt;div&gt;Our proposed topics/areas which we hope to have discussions on are:&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;Hardware Hacking (Board/Chips Capabilities)&lt;/li&gt;
&lt;li&gt;Operating System Internals (Hardware/OS Interfacing)&lt;/li&gt;
&lt;li&gt;Software Development Kit (MRE, etc.)&lt;/li&gt;
&lt;li&gt;Forensic Analysis&lt;/li&gt;
&lt;li&gt;Understanding of Mobile as Telecommunication Device (2G/3G, etc.)&lt;/li&gt;
&lt;li&gt;Understanding Mobile/Devices Internals&lt;/li&gt;
&lt;li&gt;Working with JTAG/UART Ports&lt;/li&gt;
&lt;li&gt;Porting Open Softwares on Mobiles/Hardwares&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Expected outcomes:&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Understanding of mobile devices internals and capabilities&lt;/li&gt;
&lt;li&gt;Documenting mobile devices capabilities and internals&lt;/li&gt;
&lt;li&gt;Publishing of blogs on knowledge generated&lt;/li&gt;
&lt;li&gt;Exploration/Speculation on research/development avenues&lt;/li&gt;
&lt;/ol&gt; 
&lt;hr /&gt;
&lt;h3&gt;&lt;b&gt;Agenda &lt;/b&gt;&lt;/h3&gt;
&lt;table class="vertical listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th style="text-align: left; "&gt;&lt;b&gt;I. Core Talks&lt;/b&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Tea/Coffee: &lt;br /&gt;Time: 9:00 - 9:30 a.m.&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p class="normal"&gt;&lt;b&gt;1. Arduino Board Capabilities and Playing Around It!&lt;/b&gt;&lt;br /&gt;Objective: Understanding Arduino board capabilities and playing with it&lt;br /&gt;Speaker: Sudar Muthu&lt;br /&gt;Level: Introduction&lt;br /&gt;Duration: 1 Hour&lt;br /&gt;Time: 9:30 - 10:30 a.m.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;2. Initiatives@CIS&lt;br /&gt;&lt;/b&gt;
&lt;p class="normal"&gt;Objective: Discussing the research initiative that has led CIS to become interested in mobile device internals and capabilities&lt;br /&gt;Speaker: Jadine Lannon&lt;br /&gt;Level: Introduction&lt;br /&gt;Duration: 10-15 Minutes&lt;br /&gt;Time: 10:30 - 10:45 a.m.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;3. Mobile Hacking Through Linux Drivers&lt;br /&gt;&lt;/b&gt;
&lt;p class="normal"&gt;Objective: Understanding the Linux kernel &amp;amp; driver internals from the perspective of reverse engineering&lt;br /&gt;Speaker: Anil Kumar Pugalia&lt;br /&gt;Level: Intermediate to Advanced&lt;br /&gt;Duration: 1 Hour&lt;br /&gt;Time: 10:45 - 11:45 a.m.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;4. Hardware Hacking (Board/Chips Capabilities)&lt;br /&gt;&lt;/b&gt;
&lt;p class="normal"&gt;Objective: Discuss and explore key areas of mobile hardware&lt;br /&gt;(power, clock, pin multiplexing, peripherals, etc.)&lt;br /&gt;Speaker: Khasim Syed Mohammed&lt;br /&gt;Level: Introductory to Advanced&lt;br /&gt;Duration: 1 Hour&lt;br /&gt;Time: 11:45 - 12:45 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Lunch Time&lt;br /&gt;Time: 12:45 - 1:30 p.m.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;5. Porting Open Software on Hardware&lt;/b&gt;&lt;br /&gt;Objective:&lt;br /&gt;Cover porting examples for each type of peripherals&lt;br /&gt;Cover Android and Linux bringup as an example&lt;br /&gt;Speaker: Khasim Syed Mohammed&lt;br /&gt;Level: Intermediate to Advance&lt;br /&gt; Duration: 2 Hours&lt;br /&gt;Time: 1:30 - 3:30 p.m.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th style="text-align: left; "&gt;&lt;b&gt;II.&lt;/b&gt;&lt;b&gt;Community Knowledge Sharing/Hacking! &lt;/b&gt;&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Time: 3.30 to 5.30 p.m.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p class="normal"&gt;&lt;b&gt;5. Free Slot&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p class="normal"&gt;&lt;b&gt;6. Free Slot&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Tea/Coffee Time&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;7. Free Slot&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;8. Free Slot&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;blockquote&gt;&lt;/blockquote&gt;
&lt;p dir="ltr"&gt;&lt;span class="Apple-tab-span"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;i&gt;We are inviting community members to take up &lt;b&gt;Free Slots &lt;/b&gt;to share their knowledge in this section. In this section, any person can propose a talk, workshop, or speculation about any device for a duration 30 minutes to 1 hour, as long as the topic falls within broader scope of the focus areas described at the in the “Scope of the Conference and Workshop” section of the workshop objectives.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Venue, Dates and Logistics&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;The event will take place on Saturday, October 27, 2012, at the following address:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="internal-source-marker_0.6882451646961272" style="text-align: start; "&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;TERI Southern Regional Centre&lt;br /&gt;4th Main, Domlur II Stage &lt;br /&gt;Bangalore - 560 071 &lt;br /&gt;Karnataka&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;The event will be begin at 9 a.m. on Saturday and end in the evening around 5 p.m. Lunch and snacks will be provided by CIS.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;b&gt;Available Resources:&lt;br /&gt;&lt;/b&gt;CIS has purchased 12 gray-market mobile phones with the intent to document as much information about the life-cycles, hardware, software and content of each phone as possible. We request that the producers, make and model of each device be kept anonymous in discussions/publications that take place outside of the workshop.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3 class="normal" style="text-align: justify; "&gt;The Speakers&lt;/h3&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;b&gt;1. Anil Kumar Pugalia&lt;/b&gt;&lt;br /&gt;The author is a freelance trainer in Linux internals, Linux device drivers, embedded Linux &amp;amp; related topics. Prior to this, he was at Intel and Nvidia. He has been working with Linux since 1994. A gold medallist from IISc, Linux &amp;amp; knowledge sharing are two of his many passions. Creating and playing with open source hardware is one of his hobbies, which he materializes through his company eSrijan, which can be accessed at:&lt;a href="http://profession.sarika-pugs.com/"&gt;&lt;br /&gt;Website: &lt;/a&gt;&lt;a href="http://profession.sarika-pugs.com/"&gt;http://profession.sarika-pugs.com/&lt;/a&gt;&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;b&gt; 2. Jadine Lannon&lt;/b&gt;&lt;br /&gt;Jadine is a research intern at the Centre for Internet and Society. She is currently working on the “Pervasive Technologies: Access to Knowledge in the Marketplace” research project. More information on the research project can be found here: &lt;a href="https://cis-india.org/a2k/pervasive-technologies-access-to-knowledge-in-the-market-place"&gt;http://cis-india.org/a2k/pervasive-technologies-access-to-knowledge-in-the-market-place&lt;/a&gt;&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;b&gt;3. Khasim Syed Mohammed&lt;/b&gt;&lt;br /&gt;Khasim leads Open Hardware and Software Initiatives at Texas Instruments. Blog: &lt;a href="http://www.khasim.in/"&gt;http://www.khasim.in/&lt;/a&gt;; &lt;a href="http://khasim.blogspot.in/"&gt;http://khasim.blogspot.in/&lt;/a&gt;&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;b&gt;4. Sudar Muthu&lt;/b&gt;&lt;br /&gt;Sudar does open hardware as hobby; Arudino is his playground. He is passionate about programming (particularly web-based) and loves to design and build web sites/services from scratch. AJAX, Web2.0, Semantic Web, Comet, RDF or any of those latest buzz-field jargons.&lt;/p&gt;
&lt;p class="normal"&gt;Blog: &lt;a href="http://sudarmuthu.com/"&gt;http://SudarMuthu.com&lt;/a&gt;; &lt;a href="http://hardwarefun.com/"&gt;http://hardwarefun.com&lt;/a&gt;; &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p class="normal"&gt;&lt;b&gt;Supporting Communities:&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;NULL: &lt;a href="http://null.co.in/"&gt;http://null.co.in/&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;SecurityXploaded: &lt;a href="http://securityxploded.com/"&gt;http://securityxploded.com/&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Computer Club India: &lt;a href="http://computerclub.in/Main_Page"&gt;http://computerclub.in/Main_Page&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p class="normal"&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="normal"&gt;&lt;b&gt;Register at:&lt;/b&gt;&lt;a href="https://docs.google.com/spreadsheet/viewform?fromEmail=true&amp;amp;formkey=dG1UcHBYR2xRLWhPZ0QwVWlaaEg0SXc6MQ"&gt; https://docs.google.com/spreadsheet/viewform?fromEmail=true&amp;amp;formkey=dG1UcHBYR2xRLWhPZ0QwVWlaaEg0SXc6MQ&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/events/workshop-exploring-the-internals-of-mobile-technologies-1'&gt;https://cis-india.org/a2k/events/workshop-exploring-the-internals-of-mobile-technologies-1&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jdine</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event Type</dc:subject>
    
    
        <dc:subject>Workshop</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2012-10-25T06:52:50Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/it-amendment-act-69-rules-draft-and-final-version-comparison">
    <title>IT (Amendment) Act, 2008, 69 Rules: Draft and Final Version Comparison</title>
    <link>https://cis-india.org/internet-governance/blog/it-amendment-act-69-rules-draft-and-final-version-comparison</link>
    <description>
        &lt;b&gt;Jadine Lannon has performed a clause-by-clause comparison of the Draft 69 Rules and official 69 Rules under Section 69B in order to better understand how the two are similar and how they differ. Very brief notes have been included on some changes we deemed to be important.
&lt;/b&gt;
        &lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/copy_of_pc1.png" alt="c1" class="image-inline" title="c1" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/pc2.png" alt="c2" class="image-inline" title="c2" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/pc3.png" alt="c3" class="image-inline" title="c3" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/pc4.png" alt="c4" class="image-inline" title="c4" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/pc5.png" alt="c5" class="image-inline" title="c5" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/copy_of_pc6.png" alt="c6" class="image-inline" title="c6" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/pc7.png" alt="c7" class="image-inline" title="c7" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/pc8.png" alt="c8" class="image-inline" title="c8" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/pc9.png" alt="c9" class="image-inline" title="c9" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Similar to the other comparisons that I have done on the 69A and 69B Draft and official Rules, the majority of the changes between these two sets of rules serves to restructure and clarify various clauses in the Draft 69 Rules.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Three new definitions appear in the Clause (2) of the 69 Rules, including a definition for “communication”, which appears in the Draft Rules but has no associated definition under Clause (2) of the Draft Rules.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Clause (31) of the Draft Rules, which deals with the requirement of security agencies of the State and Union territories to share any information gathered through interception, monitoring and/or decryption with federal agencies, does not make an appearance in the official rules. Further, this necessity does not seem to be implied anywhere in the official 69 Rules.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/it-amendment-act-69-rules-draft-and-final-version-comparison'&gt;https://cis-india.org/internet-governance/blog/it-amendment-act-69-rules-draft-and-final-version-comparison&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jdine</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Information Technology</dc:subject>
    

   <dc:date>2013-04-30T09:56:07Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/indian-telegraph-act-419-a-rules-and-it-amendment-act-69-rules">
    <title>Indian Telegraph Act, 1885, 419A Rules and IT (Amendment) Act, 2008, 69 Rules</title>
    <link>https://cis-india.org/internet-governance/blog/indian-telegraph-act-419-a-rules-and-it-amendment-act-69-rules</link>
    <description>
        &lt;b&gt;Jadine Lannon has performed a clause-by-clause comparison of the 419A Rules of the Indian Telegraph Act, 1885 and the 69 Rules under Section 69 of the Information Technology (Amendment) Act, 2008 in order to better understand how the two are similar and how they differ. Though they are from different Acts entirely, the Rules are very similar. Notes have been included on some changes we deemed to be important. &lt;/b&gt;
        &lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/copy4_of_pc1.png" alt="c1" class="image-inline" title="c1" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/copy_of_pc2.png" alt="c2" class="image-inline" title="c2" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/copy_of_pc3.png" alt="c3" class="image-inline" title="c3" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/copy_of_pc4.png" alt="c4" class="image-inline" title="c4" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/copy2_of_pc5.png" alt="c5" class="image-inline" title="c5" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Though they are from different Acts entirely, the 419A Rules from the Indian Telegraph Act of 1885 and the 69 Rules from the Information Technology (Amended) Act, 2008 are very similar. In fact, much of the language that appears in the official 69 rules is very close, if not the same in many places, as the language found in the 419A rules. The majority of the change in language between the 419A Rules and the equivalent 69 Rules acts to clarify statements or wordings that may appear vague in the former. Aside from this, it appears that many of the 69 Rules have been cut-and-pasted from the 419A Rules.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Arguably the most important change between the two sets of rules takes place between Clause (3) of the 419A Rules and Clause (8) of the 69 Rules, where the phrase “while issuing directions [...] the officer shall consider possibility of acquiring the necessary information by other means” has been changed to “the competent authority shall, &lt;i&gt;before issuing&lt;/i&gt; any direction under Rule (3), consider possibility of acquiring the necessary information by other means”. This is an important distinction, as the latter requires other options to be looked at before issuing the order for any interception or monitoring or decryption of any information, whereas the former could possibly allow the interception of messages while other options to gather the “necessary” information are being considered. It seems unreasonable that the state and various state-approved agencies could possibly be intercepting the personal messages of Indian citizens in order to gather “necessary” information without having first established that interception was a last resort.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another potentially significant change between the rules can be found between Clause (15) of the 419A Rules, which states, in the context of punishment of a service provider, the action taken shall include “not only fine but also suspension or revocation of their licenses”, whereas Clause (21) of the 69 Rules states that the punishment of an intermediary or person in-charge of computer resources “shall be liable for any action under the relevant provisions of the time being in force”. This is an interesting distinction, possibly made to avoid issues with legal arbitrariness associated with assigning punishments that differ for those punishments for the same activities laid out under the Indian Penal Code. Either way, the punishments for a violation of the maintenance of secrecy and confidentiality as well as unauthorized interception (or monitoring or decryption) could potentially be much harsher under the 69 Rules.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the same vein, the most significant clarification through a change in language takes place between Clause (10) of the 419A and Clause (14) of the 69 Rules: “the service providers shall designate &lt;i&gt;two senior executives&lt;/i&gt; of the company” from the 419A Rules appears as “every intermediary or person in-charge of computer resource shall designate &lt;i&gt;an officer to receive requisition, and another officer to handle such requisition&lt;/i&gt;” in the 69 Rules. This may be an actual difference between the two sets of Rules, but either way, it appears to be the most significant change between the equivalent Clauses.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The addition of certain clauses in the 69 Rules can also give us some interesting insights about what was of concern when the 419A rules were being written. To begin, the 419A rules provide no definitions for any of the specific terms used in the Rules, whereas the 69 Rules include a list of definitions in Clause (2). Clause (4) of 69 Rules, which deals which the authorisation of an agency of the Government to perform interception, monitoring and decryption, is sorely lacking in the 419A rules, which alludes to “authorised security [agencies]” without ever providing any framework as to how these agencies become authorised or who should be doing the authorising.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The 69 Rules also include Clause (5), which deals with how a state should go about obtaining authorisation to issue directions for interception, monitoring and/or decryption in territories outside of its jurisdiction, which is never mentioned in 419A rules, lamely sentencing states to carry out the interception of messages only within their own jurisdiction.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Lastly, Clause (24), which deals with the prohibition of interception, monitoring and/or decryption of information without authorisation, and Clause (25), which deals with the prohibition of the disclosure of intercepted, monitored and/or decrypted information, have fortunately been added to the 69 Rules.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/indian-telegraph-act-419-a-rules-and-it-amendment-act-69-rules'&gt;https://cis-india.org/internet-governance/blog/indian-telegraph-act-419-a-rules-and-it-amendment-act-69-rules&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jdine</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-04-30T10:04:38Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
