<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 181 to 195.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/grounds-for-compulsory-patent-licensing-in-us-canada-china-and-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/spy-files-three"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-fundamental-right-to-privacy-an-analysis"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/digital-natives/pathways/blog/higher-education"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/accessibility/blog/national-resource-kerala-chapter-call-for-comments"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/dataset-patent-landscape-of-mobile-device-technologies-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/cis-a2k-work-plan-july-2016-june-2017"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/consultation-on-national-geospatial-policy-03022016"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/telecom/blog/organizing-india-blogspot-october-11-2012-shyam-ponappa-the-supreme-court-delivers"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/studying-internet-in-india-selected-abstracts"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/digital-natives/making-change/menstrupedia-taboo-beautiful"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/accessibility/blog/rights-of-persons-with-disabilities-bill-2013-and-lack-of-access-to-accessibility-rights"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/wiki-source-handbook-for-indian-communities"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/silicon-plateau-volume-two"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/welcome-to-raw-blog"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/a2k/blogs/grounds-for-compulsory-patent-licensing-in-us-canada-china-and-india">
    <title>Grounds for Compulsory Patent Licensing in United States, Canada, China, and India</title>
    <link>https://cis-india.org/a2k/blogs/grounds-for-compulsory-patent-licensing-in-us-canada-china-and-india</link>
    <description>
        &lt;b&gt;The research paper seeks to answer questions about the grounds of compulsory licensing in international treaties with specific examples from America and Asia. The grounds for granting compulsory licenses, jurisdictional comparison of compulsory licensing, etc., are examined. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Holding ownership to a patented invention means one has certain exclusive rights: a) the right to decide who may use the invention during the time of     protection; b) the right to give licenses to other parties to use the invention on mutually agreed terms; and, c) the right to sell and transfer ownership     of the patent to someone else&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt;. Once this patent expires, the invention would enter the public domain to be     shared freely&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, given certain conditions, a &lt;i&gt;compulsory license &lt;/i&gt;can be granted, in which “authorization [is] given by national authority to a person without or against the consent of the titleholder, for the exploitation of a subject matter protected by a patent or other intellectual property rights”    &lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Compulsory licensing has been most contentiously applied for patented pharmaceutical companies who are often looking to recoup research and development costs. Proponents of this instrument are now also growing amongst advocates for climate change mitigation technologies    &lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt;. The Pervasive Technologies: Access to Knowledge in the Marketplace project is broadly assessing access     to knowledge through sub-100 dollar devices. The accessibility of these critical technologies, and subsequent access to knowledge, information, and culture     through these devices may be implicated by this policy lever&lt;a href="#_ftn5" name="_ftnref5"&gt;[5]&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Thus, this paper seeks to answer the following questions:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt; What are the grounds for compulsory licensing set in international treaties?&lt;/li&gt;
&lt;li&gt;How does Canada, United States (i.e. North America), India, and China (i.e. Asia) provide for compulsory licensing within its national laws? &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;This will be done through first providing an overview of the relevant international treaties to understand the compulsory licensing framework which     signatory nations must follow. Then, utilizing Correa (1999)'s study as a foundation, an analysis of the text within the four aforementioned's codified     laws will be assessed to understand all the possible grounds compulsory licensing can be provided. This paper will conclude by summarizing any significant     distinctions across the four jurisdictions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Compulsory Patent Licensing in International Law and Regional Trade Agreements&lt;/b&gt;&lt;br /&gt;&lt;span&gt;Paris Convention for the Protection of Industrial Property (1883)&lt;/span&gt; &lt;a href="#_ftn6" name="_ftnref6"&gt;[6]&lt;/a&gt;&lt;br /&gt;Article 5(2) of the Paris Convention provides each country with the right to "grant compulsory licenses to prevent abuses which might result form the exercise of exclusive rights conferred by the patent… " United States, Canada, China, and India are four of the 175 contracting parties to this convention    &lt;a href="#_ftn7" name="_ftnref7"&gt;[7]&lt;/a&gt;. This can only be done after 4 years of applying for the patent, or 3 years from the date in which the     patent was granted. This means, a sufficient amount of time must have elapsed to allow the rights holder to exploit the invention.&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;North American Free Trade Agreement (1994)&lt;a href="#_ftn8" name="_ftnref8"&gt;&lt;span&gt;[8]&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;Article 1704 in NAFTA provides that "appropriate measures" can be taken to control abusive or anticompetitive practices. The United States and Canada have     utilized this ground of anti-competition to grant numerous compulsory licenses.     &lt;br /&gt; &lt;br /&gt; Article 1709 notes that there must not be a discrimination of technology – patents may only be revoked when the grant has not remedied lack of     exploitation, and that the use of the patent adheres to certain criteria.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 1993, Canada repealed the compulsory licensing regulations from its Patent Law to comply with the international TRIPS and NAFTA treaties.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Trade Related Aspects of Intellectual Property Rights (1994)&lt;/span&gt; &lt;a href="#_ftn9" name="_ftnref9"&gt;[9]&lt;/a&gt;&lt;br /&gt;All members of the World Trade Organization is provided the right to use compulsory licenses via Article 31    &lt;i&gt;Other Use Without Authorization of the Right Holder &lt;/i&gt;within the Trade Related Aspects of Intellectual Property Rights (TRIPs) agreement&lt;i&gt;. &lt;/i&gt; This Article stipulates 12 procedural provisions: compulsory licensing should be granted on 'individual merits'&lt;a href="#_ftn10" name="_ftnref10"&gt;[10]&lt;/a&gt;, must have shown prior effort to obtain authorization under reasonable commercial terms    &lt;a href="#_ftn11" name="_ftnref11"&gt;[11]&lt;/a&gt;, must be non-exclusive&lt;a href="#_ftn12" name="_ftnref12"&gt;[12]&lt;/a&gt;, adequate renumeration must     be provided&lt;a href="#_ftn13" name="_ftnref13"&gt;[13]&lt;/a&gt;, and the license must be terminated as soon as the circumstances for which it was granted     cease to exist&lt;a href="#_ftn14" name="_ftnref14"&gt;[14]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Suggested, but not obligatory grounds for which compulsory licensing could be granted under the TRIPs agreement are a) emergency and extreme urgency, b)     anticompetitive practices, c) public non-commercial use, and the d) use of dependent patents&lt;a href="#_ftn15" name="_ftnref15"&gt;[15]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Doha Declaration on the TRIPS Agreement and Public Health (2001)&lt;/span&gt;&lt;br /&gt;The Doha Declaration is a clarification of the earlier TRIPS agreement in response to some countries' public health concerns due to obstacles to accessing     patented medicines.&lt;a href="#_ftn16" name="_ftnref16"&gt;[16]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Paragraph 4 of the Doha Declaration expressly allows Members to take measures to protect public health, while paragraph 5b states that "each Member has the     right to grant compulsory licenses and the freedom to determine the grounds upon which such licenses are granted". Freedom of each country to define the     terms of their intellectual property rights is also further reiterated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Grounds for granting compulsory licenses&lt;/b&gt;&lt;br /&gt;Correa (1999) in his paper &lt;i&gt;Intellectual Property Rights and the Use of Compulsory License: Options for Developing Countries&lt;/i&gt; outlines eight common     grounds which provided the framework for this comparative analysis between the jurisdictions of the United States, Canada, India, and China. Through     analyzing the codified law on compulsory licensing, a few other grounds were added to the list.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Refusal to deal&lt;/span&gt;&lt;br /&gt;In principle, the patent owner has an exclusive right to determine whether or not to issue a license to a third party. However, if under reasonable terms,     one still refuses to issue a license, national courts may interpret this as an abuse of patent rights, resulting in lack of availability of the product and     commercial development. In the United States, this is often raised as an anticompetitive issue.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Non-working and inadequate supply&lt;/span&gt;&lt;br /&gt;The "working obligation" was initially understood as the industrial use of an invention, which according to Article 31 of the TRIPs Agreement required     working 'predominantly' for local markets. However, many countries have defined 'working' to include &lt;b&gt;commercial use &lt;/b&gt;of the invention, in     which importation of a product would suffice&lt;a href="#_ftn17" name="_ftnref17"&gt;[17]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Public interest&lt;/span&gt;&lt;br /&gt;The public interest needs to be balanced with individuals' rights, and it is the responsibility of the courts or administration in each respective country     to determine this. Thus, what actually constitutes as "public interest" varies depending on time and jurisdiction. For example, countries with limited industrial development could consider a compulsory patent to develop its national industries as for public interest    &lt;a href="#_ftn18" name="_ftnref18"&gt;[18]&lt;/a&gt;. Accessibility of a product at the lowest price have been argued to be in public interest, but some     courts have ruled this to be invalid&lt;a href="#_ftn19" name="_ftnref19"&gt;[19]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Anticompetitive practices&lt;/span&gt;&lt;br /&gt;A patent is essentially a temporary monopoly meant to provide an economic reward for the inventor's work, as well as additional incentive to continue     producing&lt;a href="#_ftn20" name="_ftnref20"&gt;[20]&lt;/a&gt;. However, excessive monopolization through unlawful or unfair practices, such as when a     patent is overly broad, acquiring and accumulating patent portfolios, and subsequent patent trolling are some acts that be considered anticompetitive     patent practices&lt;a href="#_ftn21" name="_ftnref21"&gt;[21]&lt;/a&gt;. Compulsory licenses have also been granted through this ground under anti-monopoly,     antitrust, and competition laws.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Governmental use&lt;/span&gt;&lt;br /&gt;Each country's government decides what is to be considered as governmental use. Occasionally synonymous to government use has also been    &lt;i&gt;public, non-commercial use&lt;/i&gt;, or as suggested by the TRIPs agreement, for the purposes of national emergency or urgency. This is assuming the     government is acting on behalf of public interest; given its lack of an international standardized definition, this ground can be utilized and interpreted     in other ways.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Facilitate use of dependent patents&lt;/span&gt;&lt;br /&gt;When a new invention (dependent invention) cannot be developed without infringing on the license of an existing patented invention, (principle invention) a     compulsory licensing can be granted to facilitate innovation. This ensures the patents of principle inventions would not block technical progress. The     TRIPs agreement expressly allows this, provided reasonable compensation is articulated. In some jurisdictions, cross-licensing, (which involves a licensing     agreement between two parties to exploit each other's intellectual property&lt;a href="#_ftn22" name="_ftnref22"&gt;[22]&lt;/a&gt;) can be negotiated to     resolve this issue.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Compulsory licenses for medicines&lt;/span&gt;&lt;br /&gt;Numerous countries have issued licenses for increased accessibility to food and medicine. Prior to the Doha Round, TRIPs prohibited this, as Article 27     states "national laws cannot discriminate in exercise of patent rights on the basis of field of technology". However, the Doha Declaration addressed this,     allowing pharmaceuticals to have increased accessibility (via pricing, production, and importation) for the sake of public health.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Exclusive Grant Back or Coercive Package Licensing&lt;/span&gt;&lt;br /&gt;A grant back can be agreed upon when there is an expectation of an improvement on the licensed technology through increased superiority or method    &lt;a href="#_ftn23" name="_ftnref23"&gt;[23]&lt;/a&gt;. This allows the licensee to commercialize an improved product without having to file for another     patent&lt;a href="#_ftn24" name="_ftnref24"&gt;[24]&lt;/a&gt;. Exclusive grant back provides the licensor the exclusive right to use or sublicense     improvements, while licensee retains non-exclusive right to practice the improvements.&lt;a href="#_ftn25" name="_ftnref25"&gt;[25]&lt;/a&gt; Grant-backs,     particularly exclusive ones are sometimes deemed as anticompetitive.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A package license, otherwise known as patent pools is used when the licensing of more than one patent is necessary to commercialize an invention    &lt;a href="#_ftn26" name="_ftnref26"&gt;[26]&lt;/a&gt; Coercive package licensing can occur when the licensing of other patents within the package is     forceful and unnecessary. The defining and interpretation of 'coercion' ultimately depends on each country's respective authorities. &lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Hindrance from Importation of Abroad&lt;a href="#_ftn27" name="_ftnref27"&gt;&lt;span&gt;[27]&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;This ground may fall under non-working, but is unique in that it notes a state's ability to grant compulsory license on behalf of a foreign-owned patent.     Yang (2012) cites that this as one of the most controversial aspects of compulsory patent licensing, as countries may feel undermined when another state     can grant compulsory licenses that are against their own interests&lt;a href="#_ftn28" name="_ftnref28"&gt;[28]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Jurisdictional comparison of Compulsory Licensing&lt;/b&gt;&lt;br /&gt;The following table was developed as an exercise to review compulsory licensing within the jurisdictions of the United States, Canada, India, and China.     Utilizing Correa (1999)'s findings as a skeletal framework, the four aforementioned countries' codified patent laws were used to determine the grounds for     compulsory licensing. The main compairson was done through analyzing the specific text within the laws of the four jurisdiction – one approach to treaty     and law interpretation&lt;a href="#_ftn29" name="_ftnref29"&gt;[29]&lt;/a&gt; However, for those countries that were lacking general provisions on compulsory     licensing (i.e. United States, and eventually Canada in 1993&lt;a href="#_ftn30" name="_ftnref30"&gt;[30]&lt;/a&gt;), there was a need to expand to a more     comprehensive approach and look through other codified laws beyond patents and intellectual property, as well as through case law to see if the mentioned     grounds have been used to provide for compulsory licenses&lt;a href="#_ftn31" name="_ftnref31"&gt;[31]&lt;/a&gt;.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td colspan="2"&gt;
&lt;p&gt;&lt;b&gt;Grounds&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Countries&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p&gt;&lt;b&gt;Law&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td colspan="2" rowspan="4"&gt;
&lt;p&gt;Refusal to deal and/or abuses of patentees' exclusive rights&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;U.S&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p style="text-align: justify; "&gt;n/a in codified law…refusal to deal is an essential element of intellectual property rights…but can lead to anti-competition in which                     Antitrust laws can be used&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Canada&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p style="text-align: justify; "&gt;Patent Law - Abuse of Rights 65.2(d):                    &lt;i&gt;"&lt;b&gt;if by reason of refusal of patentee to grant&lt;/b&gt; a license or licenses on reasonable terms…&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;India&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p style="text-align: justify; "&gt;Patent Act 1970 S.4(d) &lt;b&gt;&lt;i&gt;"Refusal to deal"&lt;/i&gt;&lt;/b&gt; &lt;i&gt; includes any agreement which restricts, or is likely to restrict, by any method the persons or classes of persons to whom goods are                         sold or from whom goods are bought &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Patent Act, 1970 S. 84.7(a) "                     &lt;i&gt; If by reason of refusal…ii) demand for the patented article                        &lt;b&gt;has not been met to an adequate extent or on reasonable terms&lt;/b&gt;; or iii) &lt;/i&gt; &lt;i&gt; a market for the patented article manufactured in India is n&lt;b&gt;ot being supplied or developed&lt;/b&gt;; or iv) the establishment                         or &lt;b&gt;development of commercial activities in India is not prejudiced&lt;/b&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;i&gt; &lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Patent Act 1970 S.84 (6) "                     &lt;i&gt; …Controller shall take into account, - i) nature of invention, the time which has elapsed since the sealing of the patent and the                         measures already taken by the patentee or any licensee to make full use of the invention; iv) ..whether applicant has made efforts to obtain a license from the patentee on reasonable terms conditions, and such efforts have not been successful within a reasonable period                        &lt;b&gt;*period not ordinarily exceeding a period of six months*&lt;/b&gt; as the Controller may deem fit &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;China&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p style="text-align: justify; "&gt;Patent Law of the People's Republic of China - Article 48 (1): "                     &lt;i&gt; When it has been 3 years since the date the patent right is granted, and four years since the date the patent application is submitted,                         the patentee, &lt;b&gt;without legitimate reasons,&lt;/b&gt; fails to have the patent exploited or fully exploited" &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td colspan="2" rowspan="4"&gt;
&lt;p&gt;Non-working and inadequate supply&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;U.S.&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p&gt;n/a&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Canada&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p style="text-align: justify; "&gt;Patent Act 1935: s.65 a): "…                     &lt;i&gt; is &lt;b&gt;capable of being worked within Canada&lt;/b&gt; &lt;b&gt;but is not being worked within Canada on a commercial scale&lt;/b&gt;,                         and no satisfactory reason can be given for that &lt;b&gt;non-working&lt;/b&gt;…" &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;REPEALED in 1993 due to NAFTA and TRIPS &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;India&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p style="text-align: justify; "&gt;Patents Act, 1970 S. 84 (1): "                     &lt;i&gt; At any time after expiration of 3 years from the date of the grant of a patent, any person interested may make an application… b)…not available to the public at a reasonably affordable price, or c) that the patented invention is                        &lt;b&gt;not available to the public at a reasonably affordable price&lt;/b&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;i&gt; &lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Patent Act 1970 S.84(2): "…&lt;i&gt;reasonable requirements of the public&lt;/i&gt;..                    &lt;i&gt;not satisfied or that the patented invention &lt;b&gt;is not worked in the territory of India&lt;/b&gt;, &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;i&gt; &lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; Patent Act, 1970 S. 84.7(a) "If by reason of refusal…ii) demand for the patented article has not been met to an adequate extent or on                         reasonable terms; or iii) a market for the patented article manufactured in India is &lt;b&gt;not being supplied or developed&lt;/b&gt;;                         or iv) the &lt;b&gt;establishment or development of commercial activities in India is not prejudiced&lt;/b&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Patent Act, 1970 S. 84.7(d): "                     &lt;i&gt; If the patented invention is                         &lt;b&gt; not being worked in the territory of India on a commercial scale to an adequate extent, or is not being so worked to the fullest                             extent that is reasonably practicable &lt;/b&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;i&gt; &lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;China&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p style="text-align: justify; "&gt;Measures for Compulsory licensing of Patent Implementation (2012) - Ch 2 Art. 5:                     &lt;i&gt; "&lt;b&gt;If without good reason not implemented or fully implemented&lt;/b&gt;, their licensing patent within 3 years from the date of                         grant of patent right..and 4 years from the date of filing patent" &lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td colspan="2"&gt;
&lt;p&gt;Public interest:&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;U.S.&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p style="text-align: justify; "&gt;"...no general provision allowing authorities to override patents in the larger public interest”                    &lt;a href="#_ftn32" name="_ftnref32"&gt;[32]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Bayh-Dole Act of 1980 - allow government to exercise "march in" rights with regard to government funded research results that universities                     might otherwise patent&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But US has granted compulsory licenses when felt public interest was at stake (Atomic Energy Act and Clean Air Act 1970, Federal                     Non-Nuclear Energy Research and Development Act 1973)&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Canada&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="3"&gt;
&lt;p style="text-align: justify; "&gt;Patent Law - Abuse of Rights 65.2(d):                     &lt;i&gt; "if by reason of refusal of patentee to grant a license or licenses on reasonable terms…                        &lt;b&gt;in public interest that license/licenses should be granted&lt;/b&gt;" &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;i&gt; &lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Patent Act S. 39. (3) License under patent relating to food: "                     &lt;i&gt; I&lt;b&gt;n the case of any patent…of food&lt;/b&gt;…shall grant to any person applying…Commissioner shall have regard to the                         desirability of &lt;b&gt;making the food available to the public&lt;/b&gt; at the lowest possible price consistent with giving to the                         inventor due reward for the research leading to the invention"                         &lt;br /&gt; &lt;/i&gt; &lt;b&gt;REPEALED in 1993 due to NAFTA and TRIPS&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;India&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="3"&gt;
&lt;p style="text-align: justify; "&gt;Patent Act 1970, S. 84&lt;i&gt; (2)…&lt;b&gt;not available to the public &lt;/b&gt;at a reasonably affordable price&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Patent Act 1970 S. 84 (6) "                     &lt;i&gt; …Controller shall take into account, ii) the ability of the applicant to work the invention&lt;b&gt; to the public advantage &lt;/b&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Patent Act, 1970 - S. 92 Special provision for compulsory licenses on notifications by Central Government-(1): "                     &lt;i&gt; If Central Government is satisfied…                        &lt;b&gt;circumstances of national emergency or in circumstances of extreme urgency, or in case of public non commercial use&lt;/b&gt;... &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;China&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="3"&gt;
&lt;p style="text-align: justify; "&gt;Patent Law - Article 49: "                    &lt;i&gt;Where a &lt;b&gt;national emergency or any extraordinary state of affairs occurs, or public interests so require…"&lt;/b&gt;&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Measures for Compulsory Licensing of Patent Implementation - Article 6:                    &lt;i&gt;If &lt;b&gt;emergency or irregular event of the state&lt;/b&gt;…&lt;b&gt;or for purposes of public interest&lt;/b&gt;&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td colspan="2" rowspan="2"&gt;
&lt;p&gt;Anti-competitive practices&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;U.S.&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p style="text-align: justify; "&gt;Antitrust &amp;amp; Trade Law: Sherman Act 15 U.S. C.S. 2 - Monopolizing trade a felony; penalty: "                     &lt;i&gt; Every person who shall monopolize, or &lt;b&gt;a&lt;/b&gt;t&lt;b&gt;tempt to monopolize…any part of trade or commerce &lt;/b&gt;among                         several States, or with foreign nations…&lt;b&gt;deemed guilty of a felony, and conviction&lt;/b&gt;.." &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Canada&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p style="text-align: justify; "&gt;Competition Act (S. 32 RSC 1985): "                     &lt;i&gt; …where use has been made of exclusive rights and privileges conferred by one or more patents for invention…(a)                        &lt;b&gt; limit unduly the facilities for transporting, producing, manufacturing, supplying&lt;/b&gt;…may be a subject of trade or commerce, (b) &lt;b&gt;restrain or injure, unduly, trade or commerce&lt;/b&gt;…(c)                        &lt;b&gt;prevent, limit, or lessen, unduly, the manufacture or production&lt;/b&gt;…or &lt;b&gt;unreasonably enhance the price&lt;/b&gt; thereof, or (d) &lt;b&gt;prevent or lessen, unduly, competition in&lt;/b&gt;… &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;India&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="3"&gt;
&lt;p style="text-align: justify; "&gt;India Patent Law Chapter 90 (1.ix)                     &lt;i&gt; Terms and Conditions of compulsory licenses… granted to                        &lt;b&gt;remedy a practice determined after judicial or administrative process to be anticompetitive&lt;/b&gt;… &lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;China&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="3"&gt;
&lt;p style="text-align: justify; "&gt;Measures for Compulsory Licensing of Patent Implementation, 2012 - Article 11: "                    &lt;i&gt;…that actions of patent holder in exercising patent right…deemed to be &lt;b&gt;monopolistic actions"&lt;/b&gt;&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Patent Law of the People's Republic of China - Article 48 (2): "                     &lt;i&gt; …patentee's exercise of the patent right is in accordance with law, confirmed as                        &lt;b&gt;monopoly and its negative impact on competition needs to be eliminated or reduced"&lt;/b&gt; &lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td colspan="2" rowspan="3"&gt;
&lt;p&gt;Governmental use&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;United States&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p style="text-align: justify; "&gt;28 United States Code 1498: "                     &lt;i&gt; …&lt;b&gt;when used or manufactured by or for the United States without license of the owner&lt;/b&gt;…remedy shall be..Claims for                         recovery of his reasonable and entire compensation for such use and manufacture…" ie. &lt;/i&gt; Government does not have to seek license or negotiate for use, and the only appeal for patent owner is compensation &lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Canada&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p style="text-align: justify; "&gt;Under the 1993 and 1994 amendments to the Patent Act of 1985, section 19.1:                     &lt;i&gt; "the Commissioner may,                         &lt;b&gt; on application by the Government of Canada or the government of a province, authorize the use of a patented invention by that                             government &lt;/b&gt; ." &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;India&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p style="text-align: justify; "&gt;Patent Act, 1970 - S.&lt;i&gt; &lt;/i&gt;100 Power of Central Government to use inventions for purposes of Government (1):                     &lt;i&gt; "…at any time…the Central Government and any person authorized in writing…                        &lt;b&gt;may use the invention for the purposes of Government&lt;/b&gt; in accordance with provisions of this chapter" &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Patent Act, 1970 S. 100 Power of Central Government to use inventions for purposes of Government (2): "                     &lt;i&gt; Where an invention has, before priority date of relevant claim, been duly recorded in a document, or tested or tried, by or on behalf                         of the Government or Government undertaking…                         &lt;b&gt; any use of the invention by the Central Government or any person authorized in writing by it for the purposes of Government may be                             made free of any royalty or other renumeration to the patentee &lt;/b&gt; " &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Patent Act, 1970 S. 100 P&lt;b&gt;ower of Central Government to use inventions for purposes of Government&lt;/b&gt; (6): "                     &lt;i&gt; The right to make, use, exercise, and vend an invention for&lt;b&gt; the purposes of Government &lt;/b&gt;under sub-section (1) shall include the right to sell on noncommercial basis, and person c                        &lt;b&gt;laiming through..as if Central Government or authorized were the patentee of the invention &lt;/b&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;China&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="3"&gt;
&lt;p style="text-align: justify; "&gt;Patent Law of PRC Art. 14:                     &lt;i&gt; "If an invention&lt;b&gt; patent of a State-owned enterprise or institution is o&lt;/b&gt;f                        &lt;b&gt;great significance to national or public interests&lt;/b&gt;, upon approval by State Council.. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Patent Law PRC Article 49: "                     &lt;i&gt; Where a &lt;b&gt;national emergency or any extraordinary state of affairs occurs…&lt;/b&gt;patent administration department                        &lt;b&gt;under the State council may grant a compulsory license&lt;/b&gt; for exploitation of an inanition patent or utility model                         patent" &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Patent Law PRC Article 14: “                     &lt;i&gt; If an invention patent of a State-owned enterprise or institution is o                        &lt;b&gt;f great significance to national or public interests, upon approval by the State Council, &lt;/b&gt;the relevant competent                         department under the State Council ...&lt;b&gt;may decide to have the patent widely applied within an approved scope &lt;/b&gt;and allow the designated units to exploit the patent, and the                        &lt;b&gt;said units shall pay royalties to the patentee in accordance with the regulations of the State.&lt;/b&gt; &lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td colspan="2" rowspan="4"&gt;
&lt;p&gt;Facilitate use of dependent patents&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;United States&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p&gt;N/A - U.S. Does has not formally codified a general provision for Compulsory licensing of Dependent Patents                    &lt;a href="#_ftn33" name="_ftnref33"&gt;[33]&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Canada&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p&gt;N/A&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;India&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p style="text-align: justify; "&gt;Patent Act 1970 - Section 88 Power of Controller in Granting Compulsory licenses (3):                     &lt;i&gt; …if Controller satisfied that the applicant cannot efficiently or satisfactorily work the license granted to him                         &lt;b&gt; under those patents without infringing the other patents held by the patentee, and if those patents involve important technical                             advancement of considerable economic significance &lt;/b&gt; …may direct grant of a license… &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;China&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p style="text-align: justify; "&gt;Patent Law - Ch 6 Art 51: "                     &lt;i&gt; If an invention/utility model…&lt;b&gt;represents major technological advancement of remarkable economic significance&lt;/b&gt;, compared with an earlier invention or utility model for which the patent right has already been obtained, and                        &lt;b&gt; exploitation of former relies on exploitation of latter&lt;/b&gt;…may grant it a compulsory license to exploit..." &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td colspan="2" rowspan="2"&gt;
&lt;p&gt;Compulsory licenses for medicines&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;United States&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p&gt;N/A but has threatened Bayer for compulsory licensing of Ciproflaxin medicine who subsequently dropped their prices drastically                    &lt;a href="#_ftn34" name="_ftnref34"&gt;[34]&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Canada&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p style="text-align: justify; "&gt;Bill C-9 Amendment to Food and Drugs Act, 2004: "…pharmaceutical products intended for export in accordance with that WTO General Council                     decision…to comply with…sold on domestic market"&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Patent Act (4) License under patent relating to medicine - "                    &lt;i&gt;..intended or capable of being &lt;b&gt;used for the preparation of production of medicine&lt;/b&gt;…Commissioner shall grant..&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;REPEALED in 1993 due to NAFTA and TRIPS&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;India&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="3"&gt;
&lt;p style="text-align: justify; "&gt;Patent Act 1970 Section 92.A Compulsory license for export of patent pharmaceutical products in certain exceptional circumstances: "                     &lt;i&gt; …shall be                         &lt;b&gt; available for manufacture and export of patented pharmaceutical products                            &lt;a href="#_ftn35" name="_ftnref35"&gt;&lt;b&gt;[35]&lt;/b&gt;&lt;/a&gt; &lt;/b&gt; to any country having insufficient or no manufacturing capacity in the pharmaceutical sector for the concerned product to address                         public health problems…" &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Patent Act, 1970 Section 83.(d):                     &lt;i&gt; "General principles applicable to working of patented inventions…                        &lt;b&gt;do not impede protection of public health and nutrition… &lt;/b&gt; &lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;China&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="3"&gt;
&lt;p style="text-align: justify; "&gt;Patent Law of PRC: Article 50: "                     &lt;i&gt; For the benefit of &lt;b&gt;public health…&lt;/b&gt;grant compulsory license for &lt;b&gt;manufacture of the drug, &lt;/b&gt;for which a                         patent right has been obtained, and for its &lt;b&gt;export to the countries or regions that conform to the provisions…" &lt;/b&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Measures for Compulsory Licensing of Patent Implementation, 2012 - Ch 2 Art 7: "                     &lt;i&gt; For &lt;b&gt;purposes of public health&lt;/b&gt;…able to implement petition for compulsory licensing…for                        &lt;b&gt;manufacture of patented medicines..and expor&lt;/b&gt;t of, to following countries/regions: &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;1) The most underdeveloped countries/regions; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;2) Developed/developing members of the WTO &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td colspan="2" rowspan="4"&gt;
&lt;p&gt;Exclusive grant-back and Coercive package licensing&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;U.S.&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p style="text-align: justify; "&gt;Legal in the past – granted in Transparent Wrap Machine Corp v Stokes &amp;amp; Smith Co. but discouraged... interpreted by Rule of Reason                     doctrine which is an interpretation of Sherman Antitrust (Anti-competition) Act&lt;a href="#_ftn36" name="_ftnref36"&gt;[36]&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Now Department Of Justice from 2007 has said must be non-exclusive under its Antitrust laws                    &lt;a href="#_ftn37" name="_ftnref37"&gt;[37]&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Canada&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p&gt;N/A&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;India&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p style="text-align: justify; "&gt;Patent Act, 1970 Section 84 (7.c):                     &lt;i&gt; …Reasonable requirements of the public shall be deemed not to have been satisfied                        &lt;a href="#_ftn38" name="_ftnref38"&gt;&lt;b&gt;[38]&lt;/b&gt;&lt;/a&gt; - c) if the patentee imposes a condition upon the grant of license under the patent to provide &lt;b&gt;exclusive grant back&lt;/b&gt;, prevention to challenges to validity of patent, or                        &lt;b&gt;coercive package licensing &lt;/b&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;i&gt; &lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;China&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;N/A&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td colspan="2" rowspan="3"&gt;
&lt;p&gt;Hindered by importation from abroad&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;U.S.&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;N/A&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Canada&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;N/A&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;India&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p style="text-align: justify; "&gt;Patent Act, 1970 Section 84 (7.e): "                     &lt;i&gt; if the working of the patented invention in the territory of India on a commercial scale is                        &lt;b&gt;being prevented or hindered by the importation from abroad of the patented article by&lt;/b&gt;…i) patentee..ii) persons                         purchasing…iii) other persons not taking proceedings for infringement &lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;China&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="3"&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;N/A&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Summary of Cross-Jurisdictional Comparison&lt;/b&gt;&lt;br /&gt;As mentioned previously, this comparison necessitated an expansion into codified law outside of compulsory licensing and patent law into case law, since     the United States had never written a general provision for compulsory licensing, and Canada had repealed theirs in 1993 upon the signing of the NAFTA and     TRIPS agreement. For Canada, compulsory licenses (CLs) continued to be granted following the repeal through the Foods and Drugs Act, as well as the     Competition Act. Despite United States' lack of general provisions, Knowledge Ecology International claims it is the world's leader in the use of CLs, yet     hypocritical to developing countries' requests for affordable patented pharmaceuticals.&lt;a href="#_ftn39" name="_ftnref39"&gt;[39]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In general, India and China both have very extensive compulsory licensing laws. China's State Intellectual Property Office even developed additional     Measures to account for the execution of compulsory licensing. Despite comprehensive CL provisions, India has had only one compulsory license ever granted in the case of Natco Pharma Ltd v. Bayer Corporation, for the domestic production of cancer-drug Nexavar.    &lt;a href="#_ftn40" name="_ftnref40"&gt;[40]&lt;/a&gt; China has yet to grant any compulsory license, but the new Measures may signify an increasing     willingness to do so, or even to be used as a bargaining tool. However, given its goal of developing domestic intellectual property (i.e. China's 5-year     plan), it is unlikely that China will grant compulsory licenses in the masses.&lt;a href="#_ftn41" name="_ftnref41"&gt;[41]&lt;/a&gt; &lt;br /&gt; &lt;br /&gt; In regards to the specific grounds themselves, some grounds noted particular differences per country.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under U.S. Intellectual Property Law, &lt;b&gt;refusal to deal&lt;/b&gt; is actually is considered a right, thus does not provide for compulsory licensing;     depending on the degree however, it could lead to anti-competition&lt;a href="#_ftn42" name="_ftnref42"&gt;[42]&lt;/a&gt;. According to the Paris Convention,     one can only request consideration for a CLs 3 years from the granting of a patent, or 4 years from application, allowing said time for provision of     dealing. However, India seems to have a more stringent period of not exceeding a period of six months, while China noted specifically not 'without     legitimate reasons'.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The &lt;b&gt;non-working and inadequate supply &lt;/b&gt;was again not present in U.S. Law, yet Canada did include it in its former compulsory licensing     provision prior to repeal. Canada had defined 'working' specifically referring to a commercial scale when compulsory licensing was in effect. India's     'working' means being available at a reasonably affordable price, and supplied or developed, through the establishment of commercial activities, worked to     the fullest extent that is fully practicable, while China mentioned non-working 'if without good reason, it is not implemented or fully implemented'.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The United States does not have any provision providing explicitly for &lt;b&gt;public interest. &lt;/b&gt;However, under the Bayh-Dole Act,     government-funding for research during the economic crisis in the 1970s was granted as long as the inventors agreed to allow petition for 'march-in     rights', in which the government or a third party “shall have the right...to require the contractor...to grant a nonexclusive, partially exclusive, or     exclusive license” (35 U.S. Code S203(a)) if it meets one of four requirements - one being to “...alleviate health and safety needs which are not     reasonably satisfied...” (35 U.S. Code Section 203). Canada's public interest clause had existed, but was repealed. India now states that CLs can be     granted to make available to the public “at a reasonably affordable price, to public advantage, and for public non-commercial use”. In China, public     interest is provided in conditions of 'national emergency or extraordinary state of affairs, for the purpose of public interest'.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The United States does however strongly uphold and value competition, and have granted CLs to remedy &lt;b&gt;anticompetitive practices &lt;/b&gt;under its     Antitrust laws, prohibiting any 'attempt to monopolize any part of trade or commerce'. China also uses the language of 'monopolistic actions' and allows     compulsory licensing if its “negative impact on competition needs to be eliminated or reduced.” Canada's Competition Act allows for compulsory licensing if     one 'limits unduly, the facilities for transporting, producing, manufacturing... restrain or injure unduly, trade or commercial etc..' .preventing fair     competition. India also notes the remedying of anticompetitive acts in its patent laws.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Governmental use &lt;/b&gt; in the United States have been granted for use by the Department of Defense and as mentioned previously for the Bayh-Dole Act. However, unlike the other     countries of focus, there is no way to appeal a CL for the purposes of government-use. The only way to remedy this as a patent owner is compensation. In     Canada, the Commissioner may on application by the Government of Canada or province authorize a CL. Indian patent law also allows CLs for the purposes of     the Government, with the explicit possibility of being made free of any royalty or renumeration. It also expressly notes within S103 that one can petition     to the Government if this occurs. The Chinese Patent Law notes governmental use through the language of 'great significance to national or public     interests', and 'national emergency or extraordinary state of affairs. The possibility of appeal is also expressly noted in Article 58.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Neither United States or Canada have formally codified any mention of compulsory licensing for the use of &lt;b&gt;dependent patents&lt;/b&gt;, though it     does exist in the TRIPs agreement they both comply to. In India patent law, CLs is granted through this ground “only if it involves important technical     advancement of considerable economic significance, and... only if it cannot be accomplished without infringing other patents.” In China, the law states     that if an “invention/utility model represents major technological advancement...compared with earlier invention or utility model...and the exploitation of     former relies on exploitation of the latter...”, a compulsory license may be granted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Compulsory licensing for medicine &lt;/b&gt; in the United States again have never been codified, but have been used to encourage Bayer to reduce their prices under the possibility of being issued     compulsory liceninsg. Home to many of the pharmaceutical industries who own patents to medicines, the United States has been called hypocritical due to its     common lack of providing affordable pharmaceuticals. Canada allows for CLs under the Food and Drugs Act which points to the World Trade Organization     guidelines. Prior to the repeal of its compulsory licensing act, Canada also had specific provisions relating to medicines, and was actually the first     country to authorize the compulsory licensing of an AIDS drug for Rwanda for export.&lt;a href="#_ftn43" name="_ftnref43"&gt;[43]&lt;/a&gt; In India, the only     compulsory license that has ever been granted was for cancer drug Nexavar. In its compulsory licensing provision, it states that CLs are “available for     manufacture and export of patented pharmaceutical products...to any country having insufficient or no manufacturing” abilities. Similar to the TRIPs     agreement, it also states that none of the principles should impede the protection of public health and nutrition. China's patent laws state that CLs can     be used for the benefit of public health. The Measures for Implementation specifies more specifically which countries and regions are allowed, which     includes WTO members, or the 'underdeveloped' nations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Only in the Indian Patent Law does it explicitly allow for CL in the event of &lt;b&gt;exclusive grant backs &lt;/b&gt;due to anti-competition and/or not     being reasonable to the public&lt;b&gt;. &lt;/b&gt;On the contrary, the United States actually had allowed exclusive grant back in the Transparent Wrap     Machine Corp v Stokes &amp;amp; Smith Co. case&lt;a href="#_ftn44" name="_ftnref44"&gt;[44]&lt;/a&gt;. However, the FTC now strongly recommends against it as it     is considered anticompetitive when a grant-back is exclusive&lt;a href="#_ftn45" name="_ftnref45"&gt;[45]&lt;/a&gt;. Canada and China does not seem to have     this condition in their laws.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Similarly, only in the Indian patent law does &lt;b&gt;coercive package licensing &lt;/b&gt;provide for compulsory licensing. This clause may have     implications on standard-essential patent pools when attempting to determine which patents are indeed 'essential', and if they comply with fair,     reasonable, and non discriminatory regulations&lt;a href="#_ftn46" name="_ftnref46"&gt;[46]&lt;/a&gt;.     &lt;br /&gt; &lt;br /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indian Patent Law also expressly allows for compulsory licensing on the ground that a product is &lt;b&gt;hindered by importation from abroad&lt;/b&gt;. It     must be proven the lack of accessibility is soley due to the process of it being imported, perhaps affected by natural disasters, socioeconomic reasons, political instability, sanctions, or more – ultimately affecting the cost and availability of this product.    &lt;a href="#_ftn47" name="_ftnref47"&gt;[47]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Conclusion and Further Reflections on Compulsory Licensing&lt;/b&gt;&lt;br /&gt;Ultimately, there seems to be no correlation between the detail and scope of compulsory licensing (and other codified) law, and the number of compulsory     licenses granted. However, it must be noted that the Eastern countries of focus in this review have had much less time developing its intellectual property     landscape. In addition, the comprehensiveness of India and China's patent laws also reflect the incorporation of valuable lessons learned from poor     implementation of other countries.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The prevalence of broadly defined patents, patent trolling, and the increasing need to navigate patent thickets all act as barriers to innovation and     production to a commercial scale in which these technologies can actually be disseminated. The Pervasive Technologies project looks ultimately at bridging     the digital divide through providing access to low-cost technology, and subsequently access to information, culture, and knowledge.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Compulsory licenses can be used to decrease the cost burden of production, and reduce barriers to innovation, ultimately providing greater accessibility to     these tools for all of society. The Centre for Internet and Society has proposed and continues to advocate the establishment of patent pools for low-access     devices through the use of compulsory licenses to achieve this goal&lt;a href="#_ftn48" name="_ftnref48"&gt;[48]&lt;/a&gt;.&lt;/p&gt;
&lt;div&gt;
&lt;hr align="left" size="1" width="100%" /&gt;
&lt;div id="ftn1"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; WIPO. &lt;i&gt;What Is Intellectual Property&lt;/i&gt;. World Intellectual Property Organization, 2012. Print. 5&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; WIPO, 6&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; Correa, Carlos M. “Intellectual Property Rights and the.” &lt;i&gt;Trade Related Agenda Development and Equity&lt;/i&gt; (1999): 3&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; Contreras, Jorge L., and Charles R. McManis. “Compulsory Licensing of Intellectual Property: A Viable Policy Lever for Promoting Access to Critical             Technologies?”             &lt;i&gt; TRIPS and Developing Countries – Towards a New World Order? (Gustavo Ghidini, Rudolph J.R. Peritz &amp;amp; Marco Ricolfi, eds., 2014 (Edward                 Elgar)) &lt;/i&gt; (2014): 112 Print.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; Abraham, Sunil. Letter for Establishment of Patent Pool for Low-Cost Access Devices through Compulsory Licenses. 27 June 2013. Accessed:             &lt;a href="https://cis-india.org/a2k/blogs/letter-for-establishment-of-patent-pool-for-low-cost-access-devices"&gt; http://cis-india.org/a2k/blog/letter-for-establishment-of-patent-pool-for-low-cost-access-devices &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; The Paris Convention is an intellectual property treaty covering industrial property: patents, trademarks, industrial designs, utility models,             service marks, trade names, and geographical indicators.             &lt;br /&gt; &lt;br /&gt; WIPO. “Summary of the Paris Convention for the Protection of Industrial Property (1883).” &lt;i&gt;World Intellectual Property Organization&lt;/i&gt;.             Website. &lt;a href="http://www.wipo.int/treaties/en/ip/paris/summary_paris.html"&gt;http://www.wipo.int/treaties/en/ip/paris/summary_paris.html&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt; WIPO. “WIPO-Administered Treaties: Contracting Parties.” &lt;i&gt;World Intellectual Property Organization&lt;/i&gt;. Website.            &lt;a href="http://www.wipo.int/treaties/en/ShowResults.jsp?treaty_id=2"&gt;http://www.wipo.int/treaties/en/ShowResults.jsp?treaty_id=2&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt; The North American Free Trade Agreement (NAFTA) is the largest free trade agreement in the world, with members Canada, United States, and Mexico.             &lt;br /&gt; USTR. “North American Free Trade Agreement (NAFTA).” &lt;i&gt;Office of the United States Representative&lt;/i&gt;. Website.             &lt;a href="http://www.ustr.gov/trade-agreements/free-trade-agreements/north-american-free-trade-agreement-nafta"&gt; http://www.ustr.gov/trade-agreements/free-trade-agreements/north-american-free-trade-agreement-nafta &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;[9]&lt;/a&gt; The Trade Related Aspects of Intellectual Property RIghts (TRIPS) agreement is a treaty which provides basic intellectual property provisions for             international law, and stipulates that members shall be free to determine methods of implementing the provisions, in addition to enact more             specific measures provided it coincides with the rest of the agreement.             &lt;br /&gt; World Trade Organization. “Agreement on Trade Related Aspects of Intellectual Property Rights, Including Trade in Counterfeit Goods.”&lt;i&gt;WTO Legal Texts - A Summary of the Final Act of the Uruguay Round&lt;/i&gt;. Website.            &lt;a href="http://www.wto.org/english/docs_e/legal_e/ursum_e.htm#nAgreement"&gt;http://www.wto.org/english/docs_e/legal_e/ursum_e.htm#nAgreement&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;[10]&lt;/a&gt; TRIPS - Article 31.a)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;[11]&lt;/a&gt; TRIPS - Article 31.b)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;[12]&lt;/a&gt; TRIPS - Article 31.b)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;[13]&lt;/a&gt; TRIPS – Article 31.h)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;[14]&lt;/a&gt; TRIPS – Article 31.c)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;[15]&lt;/a&gt; TRIPS – Article 31&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;[16]&lt;/a&gt; fWHO. “The Doha Declaration on the TRIPs Agreement and Public Health.” &lt;i&gt;World Health Organization&lt;/i&gt;.            &lt;a href="http://www.who.int/medicines/areas/policy/doha_declaration/en/"&gt;http://www.who.int/medicines/areas/policy/doha_declaration/en/&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn17"&gt;
&lt;p&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;[17]&lt;/a&gt; Correa, 11-12.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn18"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;[18]&lt;/a&gt; Fauver, Cole M. “Compulsory Patent Licensing in the United States: An Idea Whose Time Has Come.”            &lt;i&gt;Northwestern Journal of International Law and Business&lt;/i&gt; 8.3 (1988): 666–685. Print. p671&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn19"&gt;
&lt;p&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;[19]&lt;/a&gt; Correa, 13&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn20"&gt;
&lt;p&gt;&lt;a href="#_ftnref20" name="_ftn20"&gt;[20]&lt;/a&gt; Ferrell, John. &lt;i&gt;Patent Pro Se: The Entrepreneur’s Guide to Provisional Patent Applications&lt;/i&gt;. BayWater Publishing, 2010. Print.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn21"&gt;
&lt;p&gt;&lt;a href="#_ftnref21" name="_ftn21"&gt;[21]&lt;/a&gt; Milchenko, Oleg. “Contemporary Anti-Competetive Practices of Patents Usage.” &lt;i&gt;Journal of International Commercial Law and Technology&lt;/i&gt; 8.3             (2013): 1-13. Print.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn22"&gt;
&lt;p&gt;&lt;a href="#_ftnref22" name="_ftn22"&gt;[22]&lt;/a&gt; Shapiro, Carl. “Navigating the Patent Thicket: Cross Licneses, Patent Pools, and Standard Setting.” &lt;i&gt;Innovation Policy and the Economy&lt;/i&gt; 1             (2001): 119–150. Print.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn23"&gt;
&lt;p&gt;&lt;a href="#_ftnref23" name="_ftn23"&gt;[23]&lt;/a&gt; McGurk, Thomas B. “The Grant-Back Clause in Your Technology License.” &lt;i&gt;Biodiesel Magazine&lt;/i&gt; 17 Jan. 2013.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn24"&gt;
&lt;p&gt;&lt;a href="#_ftnref24" name="_ftn24"&gt;[24]&lt;/a&gt; Origin IP Academy. “Exclusive Grant Back License.” &lt;i&gt;Origiin IP Academy&lt;/i&gt; 15 Nov. 2009. Blog. Accessed:             &lt;a href="http://origiinipae.blogspot.in/2009/11/exclusive-grant-back-license.html"&gt; http://origiinipae.blogspot.in/2009/11/exclusive-grant-back-license.html &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn25"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref25" name="_ftn25"&gt;[25]&lt;/a&gt; Dykeman, David J. “When Licensing out Patents, Make Sure Improvements Are Granted Back.” &lt;i&gt;Boston Business Journal&lt;/i&gt; 8 Mar. 2006. Blog             retrieved from:             &lt;a href="http://www.bizjournals.com/boston/blog/mass-high-tech/2006/03/when-licensing-out-patents-make-sure.html?page=all"&gt; http://www.bizjournals.com/boston/blog/mass-high-tech/2006/03/when-licensing-out-patents-make-sure.html?page=all &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn26"&gt;
&lt;p&gt;&lt;a href="#_ftnref26" name="_ftn26"&gt;[26]&lt;/a&gt; Origiin IP Academy. “Coercive Package Licensing.” &lt;i&gt;Origiin IP Academy&lt;/i&gt; 11 Nov. 2009. Accessed:             &lt;a href="http://origiinipae.blogspot.in/2009/11/coercive-package-licensing.html"&gt; http://origiinipae.blogspot.in/2009/11/coercive-package-licensing.html &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn27"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref27" name="_ftn27"&gt;[27]&lt;/a&gt; Reddy, Prashant. “‘Working’ a Patent under the Indian Patent Act, 970 - Does Importation of a Patented Invention Count?”            &lt;i&gt;Spicy IP - Decoding Indian Intellectual Property Law&lt;/i&gt;. 22 Apr. 2010. Retrieved:             &lt;a href="http://spicyip.com/2010/04/working-patent-under-indian-patent-act.html"&gt; http://spicyip.com/2010/04/working-patent-under-indian-patent-act.html &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn28"&gt;
&lt;p&gt;&lt;a href="#_ftnref28" name="_ftn28"&gt;[28]&lt;/a&gt; Yang, Deli. “Compulsory Licesning: For Better or for Worse, the Done Deal Lies in the Balance.” &lt;i&gt;Journal of Intellectual Property Rights&lt;/i&gt; 17             (2012): 76–81; p80 Print. Global IP Debates&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn29"&gt;
&lt;p&gt;&lt;a href="#_ftnref29" name="_ftn29"&gt;[29]&lt;/a&gt; Shaw, Malcom N. &lt;i&gt;International Law 7th Edition&lt;/i&gt;. 5th ed. Cambridge University Press, 2003. Print.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn30"&gt;
&lt;p&gt;&lt;a href="#_ftnref30" name="_ftn30"&gt;[30]&lt;/a&gt; Canada had repealed its section on Compulsory Licensing in order to comply with the TRIPS and NAFTA agreements&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn31"&gt;
&lt;p&gt;&lt;a href="#_ftnref31" name="_ftn31"&gt;[31]&lt;/a&gt; A more comprehensive approach could be to assess broadly ALL the compulsory licensing cases rather than just a select few ….particularly for United             States and Canada...&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn32"&gt;
&lt;p&gt;&lt;a href="#_ftnref32" name="_ftn32"&gt;[32]&lt;/a&gt; &lt;a href="http://www.aals.org/documents/2006intprop/JeromeReichmanOutline.pdf"&gt; http://www.aals.org/documents/2006intprop/JeromeReichmanOutline.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn33"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref33" name="_ftn33"&gt;[33]&lt;/a&gt; Reichman, Jerome. “Compulsory Licensing of Patented Inventions: Comparing United States Law and Practice with Options under the TRIPS Agreement.”             Vancouver, Canada: Duke University School of Law, 2006.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn34"&gt;
&lt;p&gt;&lt;a href="#_ftnref34" name="_ftn34"&gt;[34]&lt;/a&gt; Reichman, Jerome H. “Comment: Compulsory Licensing of Patented Pharmaceutical Inventions: Evaluating the Options.”            &lt;i&gt;The Journal of Law, Medicine, and Ethics&lt;/i&gt; 37.2 (2009): 247–263. Print.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn35"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref35" name="_ftn35"&gt;[35]&lt;/a&gt; Pharmaceutical products' means any patented product, or product manufactured through a patented process, of the pharmaceutical sector needed to             address public health problems and shall be inclusive of ingredients necessary for their manufacture and diagnostic kits required for their use"&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn36"&gt;
&lt;p&gt;&lt;a href="#_ftnref36" name="_ftn36"&gt;[36]&lt;/a&gt; Dratler, Jay. &lt;i&gt;Licensing of Intellectual Property&lt;/i&gt;. New York: Law Journal Press, 2005: 7.89 Print.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn37"&gt;
&lt;p&gt;&lt;a href="#_ftnref37" name="_ftn37"&gt;[37]&lt;/a&gt; Miller, Mark E., and David S. Almeling. “DOJ, FTC Redefine Antitrust Rules on Patent Pools.” &lt;i&gt;National Law Journal&lt;/i&gt;. 29 Oct. 2007.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn38"&gt;
&lt;p&gt;&lt;a href="#_ftnref38" name="_ftn38"&gt;[38]&lt;/a&gt; Therefore compulsory licensing can be granted given Controller agrees&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn39"&gt;
&lt;p&gt;&lt;a href="#_ftnref39" name="_ftn39"&gt;[39]&lt;/a&gt; Raja, Kanaga. “US Leads the World in Use of Compulsory Licenses, Says KEI.” &lt;i&gt;Third World Network&lt;/i&gt;. N.p., 18 Mar. 2014.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn40"&gt;
&lt;p&gt;&lt;a href="#_ftnref40" name="_ftn40"&gt;[40]&lt;/a&gt; Bakhru, Rachna. “India Grants First Compulsory Licence under Patents Act.” &lt;i&gt;Intellectual Property Magazine&lt;/i&gt; June 2012: 46–47. Print.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn41"&gt;
&lt;p&gt;&lt;a href="#_ftnref41" name="_ftn41"&gt;[41]&lt;/a&gt; Miller Canfield. “China Allows Compulsory Licensing.” &lt;i&gt;Law FIrm of Miller Canfield&lt;/i&gt;. Dec. 2012. Retreived:             http://www.millercanfield.com/resources-321.html&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn42"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref42" name="_ftn42"&gt;[42]&lt;/a&gt; Genevaz, Simon. “Against Immunity for Unilateral Refusal to Deal in Intellectual Property: Why Antitrust Law Should Not Distingusih between IP and             Other Property Rights.” &lt;i&gt;Berkeley Technology Law Journal&lt;/i&gt; 19.2 (2014): 742–784. Print.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn43"&gt;
&lt;p&gt;&lt;a href="#_ftnref43" name="_ftn43"&gt;[43]&lt;/a&gt; World Trade Organization. “Canada Is First to Notify Compulsory License to Export Generic Drug.” &lt;i&gt;WTO | 2007 News Items&lt;/i&gt;. N.p., 4 Oct. 2007.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn44"&gt;
&lt;p&gt;&lt;a href="#_ftnref44" name="_ftn44"&gt;[44]&lt;/a&gt; sSchmalbeck, Richard L. “The Validity of Grant-Back Clauses in Patent Licensing Agreements.” &lt;i&gt;University of Chicago Law Review&lt;/i&gt; 42 (1975):             733–748.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn45"&gt;
&lt;p&gt;&lt;a href="#_ftnref45" name="_ftn45"&gt;[45]&lt;/a&gt; Miller &amp;amp; Ameling, 2007: 3&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn46"&gt;
&lt;p&gt;&lt;a href="#_ftnref46" name="_ftn46"&gt;[46]&lt;/a&gt; Lerner, Josh, and Jean Tirole. “Standard-Essential Patents.” &lt;i&gt;Working Paper&lt;/i&gt; 43.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn47"&gt;
&lt;p&gt;&lt;a href="#_ftnref47" name="_ftn47"&gt;[47]&lt;/a&gt; Reddy, 2010&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn48"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref48" name="_ftn48"&gt;[48]&lt;/a&gt; See Executive Director of CIS' letter to the government here:             &lt;a href="https://cis-india.org/a2k/blogs/letter-for-establishment-of-patent-pool-for-low-cost-access-devices"&gt; http://cis-india.org/a2k/blog/letter-for-establishment-of-patent-pool-for-low-cost-access-devices &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/grounds-for-compulsory-patent-licensing-in-us-canada-china-and-india'&gt;https://cis-india.org/a2k/blogs/grounds-for-compulsory-patent-licensing-in-us-canada-china-and-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maggie</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Pervasive Technologies</dc:subject>
    

   <dc:date>2014-07-29T08:45:25Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/spy-files-three">
    <title>Spy Files 3: WikiLeaks Sheds More Light On The Global Surveillance Industry</title>
    <link>https://cis-india.org/internet-governance/blog/spy-files-three</link>
    <description>
        &lt;b&gt;In this article, Maria Xynou looks at WikiLeaks' latest Spy Files and examines the legality of India's surveillance technologies, as well as their potential connection with India's Central Monitoring System (CMS) and implications on human rights. &lt;/b&gt;
        
&lt;p align="JUSTIFY"&gt;Last month, WikiLeaks released &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://wikileaks.org/spyfiles3.html"&gt;“&lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html"&gt;Spy&lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html"&gt; &lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html"&gt;Files&lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html"&gt; 3”&lt;/a&gt;&lt;/span&gt;, a mass exposure of the global surveillance trade and industry. WikiLeaks first released the Spy Files in December 2011, which entail brochures, presentations, marketing videos and technical specifications on the global trade of surveillance technologies. Spy Files 3 supplements this with 294 additional documents from 92 global intelligence contractors.&lt;/p&gt;

&lt;h2&gt;&lt;b&gt;So what do the latest Spy Files reveal about India?&lt;/b&gt;&lt;/h2&gt;

&lt;p align="JUSTIFY"&gt;When we think about India, the first issues that probably come to mind are poverty and corruption, while surveillance appears to be a more “Western” and elitist issue. However, while many other developing countries are excluded from WikiLeaks’ list of surveillance technology companies, &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt;India&lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt; &lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt;is&lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt; &lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt;once&lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt; &lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt;again&lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt; &lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt;on&lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt; &lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt;the&lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt; &lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt;list&lt;/a&gt;&lt;/span&gt; with some of the most controversial spyware.&lt;/p&gt;

&lt;h3&gt;&lt;b&gt;ISS World Surveillance Trade Shows&lt;/b&gt;&lt;/h3&gt;

&lt;p align="JUSTIFY"&gt;The latest Spy Files include a &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;brochure&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;of&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;the&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;ISS&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;World&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt; 2013&lt;/a&gt;&lt;/span&gt; -the so-called “wiretapper’s ball”- which is the world’s largest surveillance trade show. &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.issworldtraining.com/iss_ap/"&gt;This&lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_ap/"&gt; &lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_ap/"&gt;years&lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_ap/"&gt;’ &lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_ap/"&gt;ISS&lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_ap/"&gt; &lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_ap/"&gt;World&lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_ap/"&gt; &lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_ap/"&gt;Asia&lt;/a&gt;&lt;/span&gt; will take place in Malaysia during the first week of December and law enforcement agencies from around the world will have another opportunity to view and purchase the latest surveillance tech. The&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;leaked&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;ISS&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;World&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt; 2013 &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;brochure&lt;/a&gt;&lt;/span&gt; entails a list of last years’ global attendees. According to the brochure, 53% of the attendees included law enforcement agencies and individuals from the defense, public safety and interior security sectors, 41% of the attendees were ISS vendors and technology integrators, while only 6% of the attendees were telecom operators and from the private enterprise. The brochure boasts that 4,635 individuals from 110 countries attended the ISS World trade shows last year and that the percentage of attendance is increasing.&lt;/p&gt;

&lt;p align="JUSTIFY"&gt;The following table lists the &lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;&lt;i&gt;&lt;span style="text-decoration: underline;"&gt;Indian&lt;/span&gt;&lt;/i&gt;&lt;/a&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;attendees&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;at&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;last&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;years&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;’ &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;ISS&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;World&lt;/a&gt;&lt;/span&gt;:&lt;/p&gt;
 
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;b&gt;Law Enforcement, Defense and Interior Security Attendees&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/th&gt;&lt;th&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;b&gt;Telecom Operators and Private Enterprises Attendees&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/th&gt;&lt;th&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;b&gt;ISS Vendors and Technology Integrators Attendees&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Andhra Pradesh India Police&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;BT&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;AGC Networks&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;CBI Academy&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Cogence Investment Bank&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Aqsacom India&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Government of India, Telecom Department&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;India Reliance Communications&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;ClearTrail Technologies&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;India Cabinet Secretariat&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Span Telecom Pvt. Ldt. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Foundation Technologies&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;India Centre for Development of Telematics (C-DOT)&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;Kommlabs&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;India Chandigarh Police&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Paladion Networks&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;India Defence Agency&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Polaris Wireless&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;India General Police&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Polixel Security Systems&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;India Intelligence Department&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Pyramid Cyber Security&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;India National Institute of Criminology&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Schleicher Group&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;India office LOKAYUKTA NCT DELHI&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Span Technologies&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;India Police Department, A.P.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;TATA India&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;India Tamil Nadu Police Department&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Tata Consultancy Services&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Indian Police Service, Vigilance&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Telecommunications India&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Indian Telecommunications Authority&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Vehere Interactive&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;NTRO India&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;SAIC Indian Tamil Nadu Police&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt; 17                                                        4                                                      15&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;

&lt;p align="JUSTIFY"&gt;According to the above table - which is based on data from the &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;WikiLeaks&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;’ &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;ISS&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;World&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt; 2013 &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;brochure&lt;/a&gt;&lt;/span&gt;- the majority of Indian attendees at last years’ ISS World were from the law enforcement, defense and interior security sectors. 15 Indian companies exhibited and sold their surveillance technologies to law enforcement agencies from around the world and it is notable that India’s popular ISP provider, Reliance Communications, attended the trade show too.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;In addition to the ISS World 2013 brochure, the Spy Files 3 entail a detailed brochure of a major Indian surveillance technology company: ClearTrail Technologies.&lt;/p&gt;

&lt;h3&gt;&lt;b&gt;ClearTrail Technologies&lt;/b&gt;&lt;/h3&gt;

&lt;p align="JUSTIFY"&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.clear-trail.com/"&gt;ClearTrail&lt;/a&gt;&lt;a href="http://www.clear-trail.com/"&gt; &lt;/a&gt;&lt;a href="http://www.clear-trail.com/"&gt;Technologies&lt;/a&gt;&lt;/span&gt; is an Indian company based in Indore. The document titled &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;“&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;Internet&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;Monitoring&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;Suite&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;”&lt;/a&gt;&lt;/span&gt; from ClearTrail Technologies boasts about the company’s mass monitoring, deep packet inspection, COMINT, SIGINT, tactical Internet monitoring, network recording and lawful interception technologies. ClearTrail’s Internet Monitoring Suite includes the following products:&lt;/p&gt;

&lt;p align="JUSTIFY"&gt;&lt;b&gt;1. ComTrail: Mass Monitoring of IP and Voice Networks&lt;/b&gt;&lt;/p&gt;

&lt;p align="JUSTIFY"&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;&lt;span style="text-decoration: underline;"&gt;ComTrail&lt;/span&gt;&lt;/a&gt; is an integrated product suite for centralized interception and monitoring of voice and data networks. It is equipped with an advanced analysis engine for pro-active analysis of thousands of connections and is integrated with various tools, such as Link Analysis, Voice Recognition and Target Location.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;ComTrail is deployed within a service provider network and its monitoring function correlates voice and data intercepts across diverse networks to provide a comprehensive intelligence picture. ComTrail supports the capture, record and replay of a variety of Voice and IP communications in pretty much any type of communication, including - but not limited to- Gmail, Yahoo, Hotmail, BlackBerry, ICQ and GSM voice calls.&lt;/p&gt;

&lt;p align="JUSTIFY"&gt;Additionally, ComTrail intercepts data from any type of network -whether Wireless, packet data, Wire line or VoIP networks- and can decode hundreds of protocols and P2P applications, including HTTP, Instant Messengers, Web-mails, VoIP Calls and MMS.&lt;/p&gt;

&lt;p align="JUSTIFY"&gt;In short, ComTrail’s key features include the following:&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Equipped to handle millions of communications per day intercepted over high speed STM &amp;amp; Ethernet Links&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Doubles up as Targeted Monitoring System&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- On demand data retention, capacity exceeding several years&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Instant Analysis across thousands of Terabytes&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Correlates Identities across multiple networks&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Speaker Recognition and Target Location&lt;/p&gt;

&lt;p align="JUSTIFY"&gt;&lt;b&gt;2. xTrail: Targeted IP Monitoring&lt;/b&gt;&lt;/p&gt;

&lt;p align="JUSTIFY"&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;&lt;span style="text-decoration: underline;"&gt;xTrail&lt;/span&gt;&lt;/a&gt; is a solution for interception, decoding and analysis of high speed data traffic over IP networks and independently monitors ISPs/GPRS and 3G networks. xTrail has been designed in such a way that it can be deployed within minutes and enables law enforcement agencies to intercept and monitor targeted communications without degrading the service quality of the IP network. This product is capable of intercepting all types of networks -including wireline, wireless, cable, VoIP and VSAT networks- and acts as a black box for “record and replay” targeted Internet communications.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Interestingly enough, xTrail can filter based on a “pure keyword”, a URL/Domain with a keyword, an IP address, a mobile number or even with just a user identity, such as an email ID, chat ID or VoIP ID. Furthermore, xTrail can be integrated with link analysis tools and can export data in a digital format which can allegedly be presented in court as evidence.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;In short, xTrail’s key features include the following:&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Pure passive probe&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Designed for rapid field operations at ISP/GPRS/Wi-Max/VSAT Network Gateways&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Stand-alone solution for interception, decoding and analysis of multi Gigabit IP traffic&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Portable trolley based for simplified logistics, can easily be deployed and removed from any network location&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Huge data retention, rich analysis interface and tamper proof court evidence&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Easily integrates with any existing centralized monitoring system for extended coverage&lt;/p&gt;

&lt;p align="JUSTIFY"&gt;&lt;b&gt;3. QuickTrail: Tactical Wi-Fi Monitoring&lt;/b&gt;&lt;/p&gt;

&lt;p align="JUSTIFY"&gt;Some of the biggest IP monitoring challenges that law enforcement agencies face include cases when targets operate from public Internet networks and/or use encryption.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;&lt;span style="text-decoration: underline;"&gt;QuickTrail&lt;/span&gt;&lt;/a&gt; is a device which is designed to gather intelligence from public Internet networks, when a target is operating from a cyber cafe, a hotel, a university campus or a free Wi-Fi zone. In particular, QuickTrail is equipped with multiple monitoring tools and techniques that can help intercept almost any wired, Wi-Fi or hybrid Internet network so that a target communication can be monitored. QuickTrail can be deployed within fractions of seconds to intercept, reconstruct, replay and analyze email, chat, VoIP and other Internet activities of a target. This device supports real time monitoring and wiretapping of Ethernet LANs.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;According to ClearTrail’s brochure, QuickTrail is a “all-in-one” device which can intercept secured communications, know passwords with c-Jack attack, alert on activities of a target, support active and passive interception of Wi-Fi and wired LAN and capture, reconstruct and replay. It is noteworthy that QuickTrail can identify a target machine on the basis of an IP address, MAC ID, machine name, activity status and several other parameters. In addition, QuickTrail supports protocol decoding, including HTTP, SMTP, POP3 and HTTPS. This device also enables the remote and central management of field operations at geographically different locations.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;In short, QuickTrail’s key features include the following:&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Conveniently housed in a laptop computer&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Intercepts Wi-Fi and wired LANs in five different ways&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Breaks WEP, WPA/WPA2 to rip-off secured Wi-Fi networks&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Deploys spyware into a target’s machine&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Monitor’s Gmail, Yahoo and all other HTTPS-based communications&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Reconstructs webmails, chats, VoIP calls, news groups and social networks&lt;/p&gt;

&lt;p align="JUSTIFY"&gt;&lt;b&gt;4. mTrail: Off-The-Air Interception&lt;/b&gt;&lt;/p&gt;

&lt;p align="JUSTIFY"&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;&lt;span style="text-decoration: underline;"&gt;mTrail&lt;/span&gt;&lt;/a&gt; offers active and passive ‘off-the-air’ interception of GSM 900/1800/1900 Mhz phone calls and data to meet law enforcement surveillance and investigation requirements. The mTrail passive interception system works in the stealth mode so that there is no dependence on the network operator and so that the target is unaware of the interception of its communications.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The mTrail system has the capability to scale from interception of 2 channels (carrier frequencies) to 32 channels. mTrail can be deployed either in a mobile or fixed mode: in the mobile mode the system is able to fit into a briefcase, while in the fixed mode the system fits in a rack-mount industrial grade chassis.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Target location identification is supported by using signal strength, target numbers, such as IMSI, TIMSI, IMEI or MSI SDN, which makes it possible to listen to the conversation on so-called “lawfully intercepted” calls in near real-time, as well as to store all calls. Additionally, mTrail supports the interception of targeted calls from pre-defined suspect lists and the monitoring of SMS and protocol information.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;In short, mTrail’s key features include the following:&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Designed for passive interception of GSM communications&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Intercepts Voice and SMS “off-the-air”&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Detects the location of the target&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Can be deployed as a fixed unit or mounted in a surveillance van&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- No support required from GSM operator&lt;/p&gt;

&lt;p align="JUSTIFY"&gt;&lt;b&gt;5. Astra: Remote Monitoring and Infection framework&lt;/b&gt;&lt;/p&gt;

&lt;p align="JUSTIFY"&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;“&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;Astra&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;”&lt;/a&gt;&lt;/span&gt; is a remote monitoring and infection framework which incorporates both conventional and proprietary infection methods to ensure bot delivery to the targeted devices. It also offers a varied choice in handling the behavior of bots and ensuring non-traceable payload delivery to the controller.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The conventional methods of infection include physical access to a targeted device by using exposed interfaces, such as a CD-ROM, DVD and USB ports, as well as the use of social media engineering techniques. However, Astra also supports bot deployment &lt;i&gt;without&lt;/i&gt; requiring any physical access to the target device.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;In particular, Astra can push bot to &lt;i&gt;any&lt;/i&gt; targeted machine sharing the &lt;i&gt;same&lt;/i&gt; LAN (wired, wi-fi or hybrid). The SEED is a generic bot which can identify a target’s location, log keystrokes, capture screen-shots, capture Mic, listen to Skype calls, capture webcams and search the target’s browsing history. Additionally, the SEED bot can also be remotely activated, deactivated or terminated, as and when required. Astra allegedly provides an un-traceable reporting mechanism that operates without using any proxies, which overrules the possibility of getting traced by the target.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Astra’s key features include the following:&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Proactive intelligence gathering&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- End-to-end remote infection and monitoring framework&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Follow the target, beat encryption, listen to in-room conversations, capture keystrokes and screen shots&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Designed for centralized management of thousands of targets&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- A wide range of deployment mechanisms to optimize success ration&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Non-traceable, non-detectable delivery mechanism&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Intrusive yet stealthy&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Easy interface for handling most complex tasks&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Successfully tested over the current top 10 anti-virus available in the market&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- No third party dependencies&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Free from any back-door intervention&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;ClearTrail&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;Technologies&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;argue&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;that&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;they&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;meet&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;lawful&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;interception&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;regulatory&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;requirements&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;/span&gt;across the globe. In particular, they claim that their products are compliant with &lt;a href="http://www.etsi.org/technologies-clusters/technologies/regulation-legislation"&gt;&lt;span style="text-decoration: underline;"&gt;ETSI&lt;/span&gt;&lt;/a&gt; and &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://cryptome.org/laes/calea-require.pdf"&gt;CALEA&lt;/a&gt;&lt;a href="http://cryptome.org/laes/calea-require.pdf"&gt; &lt;/a&gt;&lt;a href="http://cryptome.org/laes/calea-require.pdf"&gt;regulations&lt;/a&gt;&lt;/span&gt; and that they are efficient to cater to region specific requirements as well.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The latest Spy Files also include data on foreign  surveillance technology companies operating in India, such as &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt;Telesoft&lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt; &lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt;Technologies&lt;/a&gt;&lt;/span&gt;, &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/AGTINTERNATIONAL-2011-UrbaManaSolu-fr.pdf"&gt;AGT&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/AGTINTERNATIONAL-2011-UrbaManaSolu-fr.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/AGTINTERNATIONAL-2011-UrbaManaSolu-fr.pdf"&gt;International&lt;/a&gt;&lt;/span&gt; and &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt;Verint&lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt; &lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt;Systems&lt;/a&gt;&lt;/span&gt;. In particular, &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://verint.com/"&gt;Verint&lt;/a&gt;&lt;a href="http://verint.com/"&gt; &lt;/a&gt;&lt;a href="http://verint.com/"&gt;Systems&lt;/a&gt;&lt;/span&gt; has its headquarters in New York and offices all around the world, including Bangalore in India. Founded in 1994 and run by Dan Bodner, Verint Systems produces a wide range of surveillance technologies, including the following:&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Impact 360 Speech Analytics&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Impact 360 Text Analytics&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Nextiva Video Management Software (VMS)&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Nextiva Physical Security Information Management (PSIM)&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Nextiva Network Video Recorders (NVRs)&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Nextiva Video Business Intelligence (VBI)&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Nextiva Surveillance Analytics&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Nextiva IP cameras&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- CYBERVISION Network Security&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- ENGAGE suite&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- FOCAL-INFO (FOCAL-COLLECT &amp;amp; FOCAL-ANALYTICS)&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- RELIANT&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- STAR-GATE&lt;/p&gt;
&lt;p&gt;- VANTAGE&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;While &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://verint.com/"&gt;Verint&lt;/a&gt;&lt;a href="http://verint.com/"&gt; &lt;/a&gt;&lt;a href="http://verint.com/"&gt;Systems&lt;/a&gt;&lt;/span&gt; claims to be in compliance with ETSI, CALEA and other worldwide lawful interception and standards and regulations, it remains unclear whether such products successfully help law enforcement agencies in tackling crime and terrorism, without violating individuals’ right to privacy and other human rights. After all, &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.issworldtraining.com/iss_europe/"&gt;Verint&lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_europe/"&gt; &lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_europe/"&gt;Systems&lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_europe/"&gt; &lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_europe/"&gt;has&lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_europe/"&gt; &lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_europe/"&gt;participated&lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_europe/"&gt; &lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_europe/"&gt;in&lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_europe/"&gt; &lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_europe/"&gt;ISS&lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_europe/"&gt; &lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_europe/"&gt;World&lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_europe/"&gt; &lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_europe/"&gt;Trade&lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_europe/"&gt; &lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_europe/"&gt;shows&lt;/a&gt;&lt;/span&gt; which exhibit some of the most controversial spyware in the world, used to target individuals and for mass surveillance.&lt;/p&gt;

&lt;h2&gt;&lt;b&gt;And what do the latest Spy Files mean for India?&lt;/b&gt;&lt;/h2&gt;

&lt;p align="JUSTIFY"&gt;Why is it even important to look at the latest Spy Files? Well, for starters, they reveal data about which Indian law enforcement agencies are interested in surveillance and which companies are interested in selling and/or buying the latest spy gear. And why is any of this important? I can think of three main reasons:&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;1. The Central Monitoring System (CMS)&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;2. Is any of this surveillance even legal in India?&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;3. Can such surveillance result in the violation of human rights?&lt;/p&gt;

&lt;h3&gt;&lt;b&gt;Spy Files 3...and the Central Monitoring System (CMS)&lt;/b&gt;&lt;/h3&gt;

&lt;p align="JUSTIFY"&gt;Following the &lt;a href="http://www.noeman.org/gsm/hindi/71159-26-november-2008-mumbai-terrorist-attacks.html"&gt;Mumbai&lt;/a&gt;&lt;a href="http://www.noeman.org/gsm/hindi/71159-26-november-2008-mumbai-terrorist-attacks.html"&gt; 2008 &lt;/a&gt;&lt;a href="http://www.noeman.org/gsm/hindi/71159-26-november-2008-mumbai-terrorist-attacks.html"&gt;terrorist&lt;/a&gt;&lt;a href="http://www.noeman.org/gsm/hindi/71159-26-november-2008-mumbai-terrorist-attacks.html"&gt; &lt;/a&gt;&lt;a href="http://www.noeman.org/gsm/hindi/71159-26-november-2008-mumbai-terrorist-attacks.html"&gt;attacks&lt;/a&gt;, the Telecom Enforcement, Resource and Monitoring (TREM) cells and the Centre for Development of Telematics (C-DOT) started preparing the &lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;Central&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;Monitoring&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;System&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; (&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;CMS&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;)&lt;/a&gt;. As of April 2013, this project is being manned by the Intelligence Bureau, while agencies which are planned to have access to it include the Research &amp;amp; Analysis Wing (RAW) and the Central Bureau of Investigation (CBI). ISP and Telecom operators are required to&lt;b&gt; &lt;/b&gt;&lt;span&gt;install the gear which enables law enforcement agencies to carry&lt;/span&gt; out the Central Monitoring System under the &lt;a href="http://www.dot.gov.in/licensing/access-services"&gt;Unified&lt;/a&gt;&lt;a href="http://www.dot.gov.in/licensing/access-services"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/licensing/access-services"&gt;Access&lt;/a&gt;&lt;a href="http://www.dot.gov.in/licensing/access-services"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/licensing/access-services"&gt;Services&lt;/a&gt;&lt;a href="http://www.dot.gov.in/licensing/access-services"&gt; (&lt;/a&gt;&lt;a href="http://www.dot.gov.in/licensing/access-services"&gt;UAS&lt;/a&gt;&lt;a href="http://www.dot.gov.in/licensing/access-services"&gt;) &lt;/a&gt;&lt;a href="http://www.dot.gov.in/licensing/access-services"&gt;License&lt;/a&gt;&lt;a href="http://www.dot.gov.in/licensing/access-services"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/licensing/access-services"&gt;Agreement&lt;/a&gt;.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The Central Monitoring System aims at centrally monitoring all telecommunications and Internet communications in India and its estimated cost is &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.ciol.com/ciol/news/184770/governments-central-monitoring-system-operational-soon"&gt;Rs&lt;/a&gt;&lt;a href="http://www.ciol.com/ciol/news/184770/governments-central-monitoring-system-operational-soon"&gt;. 4 &lt;/a&gt;&lt;a href="http://www.ciol.com/ciol/news/184770/governments-central-monitoring-system-operational-soon"&gt;billion&lt;/a&gt;&lt;/span&gt;. In addition to &lt;span style="text-decoration: underline;"&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;equipping&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;government&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;agencies&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;/span&gt;with Direct Electronic Provisioning, filters and alerts on the target numbers, the CMS will also enable Call Data Records (CDR) analysis and data mining to identify personal information of the target numbers. The CMS supplements&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt;regional&lt;/a&gt;&lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt;Internet&lt;/a&gt;&lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt;Monitoring&lt;/a&gt;&lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt;Systems&lt;/a&gt;&lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt;, &lt;/a&gt;&lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt;such&lt;/a&gt;&lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt;as&lt;/a&gt;&lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt;that&lt;/a&gt;&lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt;of&lt;/a&gt;&lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt;Assam&lt;/a&gt;&lt;/span&gt;, by providing a nationwide monitoring of telecommunications and Internet communications, supposedly to assist law enforcement agencies in tackling crime and terrorism.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;However, data monitored and collected through the CMS will be stored in a&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.globalpost.com/dispatch/news/regions/asia-pacific/india/130509/india-central-monitoring-system-government-internet-access"&gt; &lt;/a&gt;&lt;a href="http://www.globalpost.com/dispatch/news/regions/asia-pacific/india/130509/india-central-monitoring-system-government-internet-access"&gt;centralised&lt;/a&gt;&lt;a href="http://www.globalpost.com/dispatch/news/regions/asia-pacific/india/130509/india-central-monitoring-system-government-internet-access"&gt; &lt;/a&gt;&lt;a href="http://www.globalpost.com/dispatch/news/regions/asia-pacific/india/130509/india-central-monitoring-system-government-internet-access"&gt;database&lt;/a&gt;&lt;/span&gt;, which could potentially increase the probability of centralized cyber attacks and thus increase, rather than reduce, threats to national security. Furthermore, some basic rules of statistics indicate that &lt;span style="text-decoration: underline;"&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;the&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;bigger&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;the&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;amount&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;of&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;data&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;, &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;the&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;bigger&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;the&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;probability&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;of&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;an&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;error&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;in&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;matching&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;profiles&lt;/a&gt;&lt;/span&gt;, which could potentially result in innocent people being charged with crimes they did not commit. And most importantly: the CMS currently lacks adequate legal oversight, which means that it remains unclear how monitored data will be used. The &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;UAS&lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;License&lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;Agreement&lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;regarding&lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;the&lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;CMS&lt;/a&gt;&lt;/span&gt; mandates mass surveillance by requiring ISPs and Telecom operators to enable the monitoring and interception of communications. However, targeted and mass surveillance through the CMS not only raises serious questions around its legality, but also creates the potential for abuse of the right to privacy and other human rights.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Interestingly enough, Indian law enforcement agencies which attended &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;last&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;years&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;’ &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;ISS&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;World&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;trade&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;shows&lt;/a&gt;&lt;/span&gt; are linked to the Central Monitoring System. In particular, last years’ law enforcement, defense and interior security attendees include the Centre for Development of Telematics (C-DOT) and the Department of Telecommunications, both of which prepared the Central Monitoring System. The list of attendees also includes India’s Intelligence Bureau, which is manning the CMS, as well as the &lt;span style="text-decoration: underline;"&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;agencies&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;which&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;will&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;have&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;access&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;to&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;the&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;CMS&lt;/a&gt;&lt;/span&gt;: the Central Bureau of Investigation (CBI), the Research and Analysis Wing (RAW), the National Technical Research Organization (NTRO) and various other state police departments and intelligence agencies.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Furthermore, Spy Files 3 entail a &lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt;list&lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt; &lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt;of&lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt; &lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt;last&lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt; &lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt;years&lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt;’ &lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt;ISS&lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt; &lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt;World&lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt; &lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt;security&lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt; &lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt;company&lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt; &lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt;attendees&lt;/a&gt;, which includes several Indian companies. Again, interestingly enough, many of these companies may potentially be aiding law enforcement with the technology to carry out the Central Monitoring System. ClearTrail Technologies, in particular, provides &lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;solutions&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;for&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;targeted&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;and&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;mass&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;monitoring&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;of&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;IP&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;and&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;voice&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;networks&lt;/a&gt;, as well as remote monitoring and infection frameworks - all of which would potentially be perfect to aid the Central Monitoring System.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;In fact, ClearTrail states in its brochure that its &lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;ComTrail&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;product&lt;/a&gt; is equipped to handle millions of communications per day, while its &lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;xTrail&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;product&lt;/a&gt; can easily be integrated with any existing centralised monitoring system for extended coverage. And if that’s not enough, ClearTrail’s &lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;“&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;Astra&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;” &lt;/a&gt;is designed for the centralized management of thousands of targets. While there may not be any concrete proof that ClearTrail is indeed aiding the Centralized Monitoring System, the facts speak for themselves: ClearTrail is an Indian company which sells target and mass monitoring products to law enforcement agencies. The Centralized Monitoring System is currently being implemented. What are the odds that ClearTrail is &lt;i&gt;not &lt;/i&gt;equipping the CMS? &lt;span&gt;And what are the odds that such technology is &lt;/span&gt;&lt;i&gt;&lt;span&gt;not&lt;/span&gt;&lt;/i&gt;&lt;span&gt; being used for other mass electronic surveillance programmes, such as the Lawful Intercept and Monitoring (LIM)?&lt;/span&gt;&lt;/p&gt;

&lt;h3&gt;&lt;b&gt;Spy Files 3...and the legality of India’s surveillance technologies&lt;/b&gt;&lt;/h3&gt;

&lt;p align="JUSTIFY"&gt;ClearTrail Technologies’ &lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;&lt;span style="text-decoration: underline;"&gt;brochure&lt;/span&gt;&lt;/a&gt; -the only leaked document on Indian surveillance technology by the latest Spy Files- states that the company complies with &lt;a href="http://www.etsi.org/technologies-clusters/technologies/regulation-legislation"&gt;&lt;span style="text-decoration: underline;"&gt;ETSI&lt;/span&gt;&lt;/a&gt; and &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://cryptome.org/laes/calea-require.pdf"&gt;CALEA&lt;/a&gt;&lt;a href="http://cryptome.org/laes/calea-require.pdf"&gt; &lt;/a&gt;&lt;a href="http://cryptome.org/laes/calea-require.pdf"&gt;regulations&lt;/a&gt;&lt;/span&gt;. While it’s clear that the company complies with U.S. and European regulations on the interception of communications to attract more customers in the international market, such regulations don’t really apply &lt;i&gt;within&lt;/i&gt; India, which is part of ClearTrail’s market. Notably enough, ClearTrail does not mention any compliance with Indian regulations in its brochure. So let’s have a look at them.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;India has five laws which regulate surveillance:&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;1. The &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"&gt;Indian&lt;/a&gt;&lt;a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"&gt;Telegraph&lt;/a&gt;&lt;a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"&gt;Act&lt;/a&gt;&lt;/span&gt;, 1885&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;2. The &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"&gt;Indian&lt;/a&gt;&lt;a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"&gt;Post&lt;/a&gt;&lt;a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"&gt;Office&lt;/a&gt;&lt;a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"&gt;Act&lt;/a&gt;&lt;/span&gt;, 1898&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;3. The &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"&gt;Indian&lt;/a&gt;&lt;a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"&gt; &lt;/a&gt;&lt;a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"&gt;Wireless&lt;/a&gt;&lt;a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"&gt; &lt;/a&gt;&lt;a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"&gt;Telegraphy&lt;/a&gt;&lt;a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"&gt; &lt;/a&gt;&lt;a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"&gt;Act&lt;/a&gt;&lt;/span&gt;, 1933&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;4. The &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.delhidistrictcourts.nic.in/CrPC.htm"&gt;Code&lt;/a&gt;&lt;a href="http://www.delhidistrictcourts.nic.in/CrPC.htm"&gt; &lt;/a&gt;&lt;a href="http://www.delhidistrictcourts.nic.in/CrPC.htm"&gt;of&lt;/a&gt;&lt;a href="http://www.delhidistrictcourts.nic.in/CrPC.htm"&gt; &lt;/a&gt;&lt;a href="http://www.delhidistrictcourts.nic.in/CrPC.htm"&gt;Criminal&lt;/a&gt;&lt;a href="http://www.delhidistrictcourts.nic.in/CrPC.htm"&gt; &lt;/a&gt;&lt;a href="http://www.delhidistrictcourts.nic.in/CrPC.htm"&gt;Procedure&lt;/a&gt;&lt;a href="http://www.delhidistrictcourts.nic.in/CrPC.htm"&gt; (&lt;/a&gt;&lt;a href="http://www.delhidistrictcourts.nic.in/CrPC.htm"&gt;CrPc&lt;/a&gt;&lt;a href="http://www.delhidistrictcourts.nic.in/CrPC.htm"&gt;)&lt;/a&gt;&lt;/span&gt;, 1973: Section 91&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;5. The &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;Information&lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt; &lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;Technology&lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt; (&lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;Amendment&lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;) &lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;Act&lt;/a&gt;&lt;/span&gt;, 2008&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"&gt;Indian&lt;/a&gt;&lt;a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"&gt;Post&lt;/a&gt;&lt;a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"&gt;Offices&lt;/a&gt;&lt;a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"&gt;Act&lt;/a&gt;&lt;/span&gt; does not cover electronic communications and the &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"&gt;Indian&lt;/a&gt;&lt;a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"&gt; &lt;/a&gt;&lt;a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"&gt;Wireless&lt;/a&gt;&lt;a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"&gt; &lt;/a&gt;&lt;a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"&gt;Telegraphy&lt;/a&gt;&lt;a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"&gt; &lt;/a&gt;&lt;a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"&gt;Act&lt;/a&gt;&lt;a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"&gt; &lt;/a&gt;&lt;/span&gt;lacks procedures which would determine if surveillance should be targeted or not. Neither the &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"&gt;Indian&lt;/a&gt;&lt;a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"&gt;Telegraph&lt;/a&gt;&lt;a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"&gt;Act&lt;/a&gt;&lt;/span&gt; nor the &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;Information&lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt; &lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;Technology&lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt; (&lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;Amendment&lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;) &lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;Act&lt;/a&gt;&lt;/span&gt; cover mass surveillance, but are both limited to targeted surveillance. Moreover, targeted interception in India according to these laws requires case-by-case authorization by either the home secretary or the secretary department of information technology. In other words, unauthorized, limitless, mass surveillance is not technically permitted by law in India.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The Indian Telegraph Act mandates that the interception of communications can only be carried out on account of &lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt;a&lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt; &lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt;public&lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt; &lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt;emergency&lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt; &lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt;or&lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt; &lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt;for&lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt; &lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt;public&lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt; &lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt;safety&lt;/a&gt;. However, in 2008, the Information Technology Act copied most of the interception provisions of the Indian Telegraph Act, but removed the preconditions of public emergency or public safety, and instead expanded the power of the government to order interception for the “investigation of any offense”.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The interception of Internet communications is mainly covered by the &lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt;2009 &lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt;Rules&lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt; &lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt;under&lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt; &lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt;the&lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt; &lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt;Information&lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt; &lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt;Technology&lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt; &lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt;Act&lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt; 2008 &lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt;and&lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt; &lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt;Sections&lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt; 69 &lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt;and&lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt; 69&lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt;B&lt;/a&gt; are particularly noteworthy. According to these Sections, an Intelligence Bureau officer who leaked national secrets may be imprisoned for up to three years, while Section 69 not only allows for the interception of any information transmitted through a computer resource, but also requires that users disclose their encryption keys upon request or face a jail sentence of up to seven years.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;While these laws allow for the interception of communications and can be viewed as widely controversial, they do not technically permit the &lt;i&gt;mass&lt;/i&gt; surveillance of  communications. In other words, ClearTrail’s products, such as &lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;&lt;span style="text-decoration: underline;"&gt;ComTrail&lt;/span&gt;&lt;/a&gt;, which enable the mass interception of IP networks, lack legal backing. However, the &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;Unified&lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;Access&lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;Services&lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt; (&lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;UAS&lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;) &lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;License&lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;Agreement&lt;/a&gt;&lt;/span&gt; regarding the Central Monitoring System mandates mass surveillance and requires ISP and Telecom operators to comply.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Through the licenses of the Department of Telecommunications, Internet service providers, cellular providers and telecoms are required to provide the Government of India direct access to all communications data and content &lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt;even&lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt; &lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt;without&lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt; &lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt;a&lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt; &lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt;warrant&lt;/a&gt;, which is not permitted under the laws on interception. These licenses also require cellular providers to have ‘bulk encryption’ of less than 40 bits, which means that potentially any person can use off-the-air interception to monitor phone calls. However, such licenses do not regulate the capture of signal strength, target numbers like IMSI, TIMSI, IMEI or MSI SDN, which can be captured through ClearTrail’s &lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;&lt;span style="text-decoration: underline;"&gt;mTrail&lt;/span&gt;&lt;/a&gt; product.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;More importantly, following &lt;a class="external-link" href="http://www.financialexpress.com/news/states-begin-to-surrender-offair-phone-snooping-equipment/957859"&gt;allegations&lt;/a&gt; that the National Technical Research Organization (NTRO) had been using off-the-air interception equipment to snoop on politicians in 2011, the Home Ministry issued a directive to ban the possession or use of all off-the-air phone interception gear. As a result, the Indian Government asked the Customs Department to provide an inventory of all all such equipment imported over a ten year period, and it was uncovered that as many as 73,000 pieces of equipment had been imported. Since, the Home Ministry has informed the heads of law enforcement agencies that there has been a &lt;a class="external-link" href="http://m.indianexpress.com/news/state-govts-hand-over-few-offair-phonetapping-sets-to-centre/1185166/"&gt;compete ban on use of such equipment&lt;/a&gt; and that all those who possess such equipment and fail to inform the Government will face prosecution and imprisonment. In short, ClearTrail's product, mTrail, which undertakes off-the-air phone monitoring is illegal and Indian law enforcement agencies are prohibited from using it. &lt;/span&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;ClearTrail’s &lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;“&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;Astra&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;”&lt;/a&gt; product is capable of remote infection and monitoring, which can push bot to any targeted machine sharing the same LAN. While India’s ISP and telecommunications licenses generally provide some regulations, they appear to be inadequate in regulating specific surveillance technologies which have the capability to target machines and remotely monitor them. Such &lt;a href="http://www.dot.gov.in/licensing/access-services"&gt;&lt;span style="text-decoration: underline;"&gt;licenses&lt;/span&gt;&lt;/a&gt; mandate mass surveillance, but legally, wireless communications are completely unregulated, which raises the question of whether the interception of public Internet networks is allowed. In other words, it is not clear if ClearTrail’s &lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;&lt;span style="text-decoration: underline;"&gt;QuickTrail&lt;/span&gt;&lt;/a&gt; is technically legal or not. The &lt;a class="external-link" href="http://www.auspi.in/policies/UASL.pdf"&gt;UAS License agreement&lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt; &lt;/a&gt;mandates mass surveillance, and while the law does not prohibit it, it does not mandate mass surveillance either. This remains a grey area.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The issue of data retention arises from &lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;ClearTrail&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;’&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;s&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;leaked&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;brochure&lt;/a&gt;. In particular, ClearTrail states in its brochure that ComTrail - which undertakes mass monitoring of IP and Voice networks - retains data upon request, with a capacity that exceeds several years. xTrail - for targeted IP monitoring - has the ability to retain huge volumes of data which can potentially be used as proof in court. However, India currently lacks privacy legislation which would regulate data retention, which means that data collected by ClearTrail could potentially be stored indefinitely.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;a class="external-link" href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;Section 7 of the Information Technology (Amendment) Act, 2008&lt;/a&gt;, deals with the retention of electronic records. However, this section does not state a particular data retention period, nor who will have authorized access to data during its retention, who can authorize such access, whether retained data can be shared with third parties and, if so, under what conditions. Section 7 of the Information Technology (Amendment) Act, 2008, appears to be incredibly vague and to fail to regulate data retention adequately.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Data retention requirements for service providers are included in the &lt;a href="https://cis-india.org/internet-governance/blog/data-retention-in-india" class="external-link"&gt;ISP and UASL licenses&lt;/a&gt; and, while they clarify the type of data they retain, they do not specify adequate conditions for data retention. Due to the lack of data protection legislation in India, it remains unclear how long data collected by companies, such as ClearTrail, would be stored for, as well as who would have authorized access to such data during its retention period, whether such data would be shared with third parties and disclosed and if so, under what conditions.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;India currently lacks specific regulations for the use of various types of technologies, which makes it unclear whether &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;ClearTrail&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;’&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;s&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;spy&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;products&lt;/a&gt;&lt;/span&gt; are technically legal or not. It is clear that ClearTrail’s mass interception products, such as ComTrail, are not legalized - since Indian laws allow for targeted interception- but they are mandated through the &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;UAS&lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;License&lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;agreement&lt;/a&gt;&lt;/span&gt; regarding the Central Monitoring System.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;In short, the legality of ClearTrail’s surveillance technologies remains ambiguous. While India’s ISP and telecom licenses and the &lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;UAS&lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;License&lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;Agreement&lt;/a&gt; mandate mass surveillance, the laws - particularly the 2009 Information Technology Rules- mandate targeted surveillance and remain silent on the issue of mass surveillance. Technically, this does not constitute mass surveillance legal or illegal, but rather a grey area. Furthermore, while &lt;a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"&gt;India&lt;/a&gt;&lt;a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"&gt;’&lt;/a&gt;&lt;a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"&gt;s&lt;/a&gt;&lt;a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"&gt;Telegraph&lt;/a&gt;&lt;a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"&gt;Act&lt;/a&gt;, &lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;Information&lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt; &lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;Technology&lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt; &lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;Act&lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt; &lt;/a&gt;and 2009 Rules allow for the interception, monitoring and decryption of communications and surveillance in general, they do not explicitly regulate the various types of surveillance technologies, but rather attempt to “legalize” them through the blanket term of surveillance.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;One thing is clear: India’s license agreements ensure that all ISPs and telecom operators are a part of the surveillance regime. The lack of regulations for India’s surveillance technologies appear to create a grey zone for the expansion of mass surveillance in the country. According to &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.outlookindia.com/article.aspx?265192"&gt;Saikat&lt;/a&gt;&lt;a href="http://www.outlookindia.com/article.aspx?265192"&gt; &lt;/a&gt;&lt;a href="http://www.outlookindia.com/article.aspx?265192"&gt;Datta&lt;/a&gt;&lt;/span&gt;, an investigative journalist, a senior privacy telecom official stated:&lt;/p&gt;
&lt;blockquote class="italized"&gt;“&lt;i&gt;Do you really think a private telecom company can stand up to the government or any intelligence agency and cite law if they want to tap someone’s phone?” &lt;/i&gt;&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;﻿&lt;/p&gt;

&lt;h3&gt;&lt;b&gt;Spy Files 3...and human rights in India&lt;/b&gt;&lt;/h3&gt;

&lt;p align="JUSTIFY"&gt;The facts speak for themselves. The latest Spy Files confirm that the same agencies involved in the development of the Central Monitoring System (CMS) are also interested in the latest surveillance technology sold in the global market. Spy Files 3 also provide data on one of India’s largest surveillance technology companies, &lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;&lt;span style="text-decoration: underline;"&gt;ClearTrail&lt;/span&gt;&lt;/a&gt;, which sells a wide range of surveillance technologies to law enforcement agencies around the world. And Spy Files 3 show us exactly what these technologies can do.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;In particular, ClearTrail’s &lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;&lt;span style="text-decoration: underline;"&gt;ComTrail&lt;/span&gt;&lt;/a&gt; provides mass monitoring of IP and voice networks, which means that law enforcement agencies using it are capable of  intercepting millions of communications every day through Gmail, Yahoo, Hotmail and others, of correlating our identities across networks and of targeting our location. &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;xTrail&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;/span&gt;enables law enforcement agencies to monitor us based on our “harmless” metadata, such as our IP address, our mobile number and our email ID. Think our data is secure when using the Internet through a cyber cafe? Well &lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;&lt;span style="text-decoration: underline;"&gt;QuickTrail&lt;/span&gt;&lt;/a&gt; proves us wrong, as it’s able to assist law enforcement agencies in monitoring and intercepting our communications even when we are using public Internet networks.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;And indeed, carrying a mobile phone is like carrying a GPS device, especially since &lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;&lt;span style="text-decoration: underline;"&gt;mTrail&lt;/span&gt;&lt;/a&gt; provides law enforcement with off-the-air interception of mobile communications. Not only can mTrail target our location, listen to our calls and store our data, but it can also undertake passive off-the-air interception and monitor our voice, SMS and protocol information. Interestingly enough, mTrail also intercepts targeted calls from a predefined suspect list. The questions though which arise are: who is a suspect? How do we even know if we are suspects? In the age of the War on Terror, potentially anyone could be a suspect and thus potentially anyone’s mobile communications could be intercepted. After all, mass surveillance dictates that &lt;span style="text-decoration: underline;"&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt;we&lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt; &lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt;are&lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt; &lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt;all&lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt; &lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt;suspicious&lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt; &lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt;until&lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt; &lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt;proven&lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt; &lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt;innocent&lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt;. &lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;And if anyone can potentially be a suspect, then potentially anyone can be remotely infected and monitored by &lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;&lt;span style="text-decoration: underline;"&gt;Astra&lt;/span&gt;&lt;/a&gt;. Having physical access to a targeted device is a conventional surveillance mean of the past. Today, Astra can &lt;i&gt;remotely&lt;/i&gt; push bot to our laptops and listen to our Skype calls, capture our Webcams, search our browsing history, identify our location and much more. And why is any of this concerning? Because contrary to mainstream belief, &lt;span style="text-decoration: underline;"&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt;we&lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt; &lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt;should&lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt; &lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt;all&lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt; &lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt;have&lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt; &lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt;something&lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt; &lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt;to&lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt; &lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt;hide&lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt;! &lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"&gt;Privacy&lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"&gt; &lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"&gt;protects&lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"&gt; &lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"&gt;us&lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"&gt; &lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"&gt;from&lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"&gt; &lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"&gt;abuse&lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"&gt; &lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"&gt;from&lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"&gt; &lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"&gt;those&lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"&gt; &lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"&gt;in&lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"&gt; &lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"&gt;power&lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"&gt; &lt;/a&gt;&lt;/span&gt;and safeguards our individuality and autonomy as human beings. If we are opposed to the idea of the police searching our home without a search warrant, we should be opposed to the idea of our indiscriminate mass surveillance. After all, mass surveillance - especially the type undertaken by &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;ClearTrail&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;’&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;s&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;products&lt;/a&gt;&lt;/span&gt; -  can potentially result in the access, sharing, disclosure and retention of data much more valuable than that acquired by the police searching our home. Our credit card details, our photos, our acquaintances, our personal thoughts and opinions, and other sensitive personal information can usually be found in our laptops, which potentially can constitute much more incriminating information than that found in our homes.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;And most importantly: even if we think that we have nothing to hide, it’s really not up to us to decide: it’s up to data analysts. While we may think that our data is “harmless”, a data analyst linking our data to various other people and search activities we have undertaken might indicate otherwise. Five years ago, &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt;a&lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt; &lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt;UK&lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt; &lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt;student&lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt; &lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt;studying&lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt; &lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt;Islamic&lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt; &lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt;terrorism&lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt; &lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt;for&lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt; &lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt;his&lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt; &lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt;Masters&lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt; &lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt;dissertation&lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt; &lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt;was&lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt; &lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt;detained&lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt; &lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt;for&lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt; &lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt;six&lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt; &lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt;days&lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt;.&lt;/a&gt;&lt;/span&gt; The student may not have been a terrorist, but his data said this: “Young, male, Muslim... who is downloading Al-Qaeda’s training material” - and that was enough for him to get detained. Clearly, the data analysts mining his online activity did not care about the fact that the only reason why he was downloading Al-Qaeda material was for his Masters dissertation. The fact that he was a male Muslim downloading terrorist material was incriminating enough.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;This incident reveals several concerning points: The first is that he was clearly already under surveillance, prior to downloading Al-Qaeda’s material. However, given that he did not have a criminal record and was “just a Masters student in the UK”, there does not appear to be any probable cause for his surveillance in the first place. Clearly he was on some suspect list on the premise that he is male and Muslim - which is a discriminative approach. The second point is that after this incident, it is likely that some male Muslims may be more cautious about their online activity - with the fear of being on some suspect list and eventually being prosecuted because their data shows that “they’re a terrorist”. Thus, mass surveillance today appears to also have implications on freedom of expression. The third point is that this incident reveals the extent of mass surveillance, since even a document downloaded by a Masters student is being monitored.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;This case proves that innocent people can potentially be under surveillance and prosecuted, as a result of mass, indiscriminate surveillance. Anyone can potentially be a suspect today, and maybe for the wrong reasons. It does not matter if we think our data is “harmless”, but what matters is who is looking at our data, when and why.  Every bit of data potentially hides several other bits of information which we are not aware of, but which will be revealed within a data analysis. We should always &lt;span style="text-decoration: underline;"&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt;“&lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt;have&lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt; &lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt;something&lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt; &lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt;to&lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt; &lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt;hide&lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt;”&lt;/a&gt;&lt;/span&gt;, as that is the only way to protect us from abuse by those in power.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;In the contemporary surveillance state, we are all suspects and mass surveillance technologies, such as the ones sold by &lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;&lt;span style="text-decoration: underline;"&gt;ClearTrail&lt;/span&gt;&lt;/a&gt;, can potentially pose major threats to our right to privacy, freedom of expression and other human rights. And probably the main reason for this is because surveillance technologies in India legally fall in a grey area. Thus, it is recommended that law enforcement agencies in India regulate the various types of surveillance technologies in compliance with the &lt;a class="external-link" href="https://en.necessaryandproportionate.org/text"&gt;International Principles on Communications Surveillance and Human Rights.&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Spy Files 3 show us why our human rights are at peril and why we should fight for our right to be free from suspicion.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt; &lt;/p&gt;
&lt;p align="JUSTIFY"&gt;This article was &lt;a class="external-link" href="http://www.medianama.com/2013/11/223-spy-files-3-wikileaks-sheds-more-light-on-the-global-surveillance-industry-cis-india/"&gt;cross-posted in Medianama &lt;/a&gt;on 6th November 2013.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/spy-files-three'&gt;https://cis-india.org/internet-governance/blog/spy-files-three&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2013-11-14T16:21:00Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-fundamental-right-to-privacy-an-analysis">
    <title>The Fundamental Right to Privacy: An Analysis</title>
    <link>https://cis-india.org/internet-governance/blog/the-fundamental-right-to-privacy-an-analysis</link>
    <description>
        &lt;b&gt;Last​ ​month’s​ ​judgment​ ​by​ ​the​ ​nine​ ​judge​ ​referral​ ​bench​ ​was​ ​an​ ​emphatic endorsement​ ​of​ ​the​ ​the​ ​constitutional​ ​right​ ​to​ ​privacy.​ ​In​ ​the​ ​course​ ​of​ ​a​ ​547​ ​page judgment,​ ​the​ ​bench​ ​affirmed​ ​the​ ​fundamental​ ​nature​ ​of​ ​the​ ​right​ ​to​ ​privacy reading​ ​it​ ​into​ ​the​ ​values​ ​of​ ​dignity​ ​and​ ​liberty.​ In the course of a few short papers, we will dissect the various aspects of the right to privacy as put forth by the nine judge constitutional bench in the Puttaswamy matter. The papers will focus on the sources, structure, scope, breadth, and future of privacy. Here are the first three papers, authored by Amber Sinha and edited by Elonnai Hickok.


&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;The​ ​Fundamental​ ​Right​ ​to​ ​Privacy - Part​ ​I:​ ​Sources&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Much​ ​of​ ​the​ ​debate​ ​and​ ​discussion​ ​in​ ​the​ ​hearings​ ​before​ ​the​ ​constitutional​ ​bench was​ ​regarding​ ​where​ ​in​ ​the​ ​Constitution​ ​a​ ​right​ ​to​ ​privacy​ ​may​ ​be​ ​located.​ In​ ​this paper,​ ​we​ ​analyse​ ​the​ ​different​ ​provisions​ ​and​ ​tools​ ​of​ ​interpretations​ ​use​ ​by​ ​the bench​ ​to​ ​read​ ​a​ ​right​ ​to​ ​privacy​ ​in​ ​Part​ ​III​ ​of​ ​the​ ​Constitution.&lt;/p&gt;
&lt;h4&gt;Download: &lt;a href="https://cis-india.org/internet-governance/files/amber-sinha-the-fundamental-right-to-privacy-i-sources-pdf/at_download/file"&gt;PDF&lt;/a&gt;&lt;/h4&gt;
&lt;hr /&gt;
&lt;h3&gt;&lt;strong&gt;The​ ​Fundamental​ ​Right​ ​to​ ​Privacy - ​Part​ ​II:​ Structure&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;​In​ ​the​ ​previous​ ​paper,​ ​we delved​ ​into​ ​the​ ​ ​sources​ ​in​ ​the​ ​Constitution​ ​and​ ​the​ ​interpretive​ ​tools​ ​used​ ​to​ ​locate 
the​ ​right​ ​to​ ​privacy​ ​as​ ​a​ ​constitutional​ ​right.​ ​This​ ​paper​ ​follows​ ​it​ ​up​ ​with​ ​an​ ​analysis of​ ​the​ ​structure​ ​of​ ​the​ ​right​ ​to​ ​privacy​ ​as​ ​articulated​ ​by​ ​the​ ​bench.​ ​We​ ​will​ ​look​ ​at​ ​the various​ ​facets​ ​of​ ​privacy​ ​which​ ​form​ ​a​ ​part​ ​of​ ​the​ ​fundamental​ ​right,​ ​the​ ​basis​ ​for such​ ​dimensions​ ​and​ ​what​ ​their​ ​implications​ ​may​ ​be.&lt;/p&gt;
&lt;h4&gt;Download: &lt;a href="https://cis-india.org/internet-governance/files/amber-sinha-the-fundamental-right-to-privacy-ii-structure-pdf/at_download/file"&gt;PDF&lt;/a&gt;&lt;/h4&gt;
&lt;hr /&gt;
&lt;h3&gt;&lt;strong&gt;The​ ​Fundamental​ ​Right​ ​to​ ​Privacy - Part​ ​III:​ Scope&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;While the previous papers dealt with the sources in the Constitution and the interpretive tools used by the bench to locate the right to privacy as a constitutional right, as well as the structure of the right with its various dimensions, this paper will look at the judgment for guidance on principles to determine what the scope of the right of privacy may be.&lt;/p&gt;
&lt;h4&gt;Download: &lt;a href="https://cis-india.org/internet-governance/the200b-200bfundamental200b-200bright200b-200bto200b-200bprivacy-200b-200bpart200b-200biii-scope/at_download/file" class="external-link"&gt;PDF&lt;/a&gt;&lt;/h4&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-fundamental-right-to-privacy-an-analysis'&gt;https://cis-india.org/internet-governance/blog/the-fundamental-right-to-privacy-an-analysis&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-10-04T11:19:46Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/digital-natives/pathways/blog/higher-education">
    <title>Technology, Social Justice and Higher Education</title>
    <link>https://cis-india.org/digital-natives/pathways/blog/higher-education</link>
    <description>
        &lt;b&gt;Since the last two years, we at the Centre for Internet and Society, have been working with the Higher Education Innovation and Research Applications at the Centre for the Study of Culture and Society, on a project called Pathways to Higher Education, supported by the Ford Foundation. &lt;/b&gt;
        
&lt;p&gt;The main aim of the project is to research the state of social diversity and justice in undergraduate colleges in India and encourage students to articulate the axes of discrimination and exclusion which might keep them from interacting and engaging with educational resources and systems in their college environments.&lt;/p&gt;
&lt;h3&gt;Peer-to-Peer Technologies&lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;The entry point into these debates was digital technologies, where 
through an introduction to peer-to-peer technologies, digital story 
telling through various web based platforms, and a collaborative thought
 environment mediated by internet and digital technologies, we 
facilitated the students to identify, articulate and address questions 
of discrimination, change and the possibility of engaging with these 
critically in order to build a better learning environment for 
themselves (and their peers) in their own colleges.&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr class="even"&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/sies.jpg/image_preview" title="sies " height="266" width="400" alt="sies " class="image-inline image-inline" /&gt;&lt;/td&gt;
&lt;td&gt;
&lt;div align="left"&gt;Each workshop was designed not only to be sensitive to
 the specificities of the locations of the colleges, but also to 
accommodate for the needs, desires and aspirations of the students 
involved. The participants looked at their own personal, family and 
community histories, their everyday experiences, their affective modes 
of aspiration and desire, and their own circumstances which often 
circumscribe them, in order to come up with certain themes that they 
thought were relevant and crucial in their own contexts.&lt;/div&gt;
&lt;br /&gt;
&lt;div align="left"&gt;&amp;nbsp;&lt;/div&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;As a follow-up on the workshops, the students developed specific 
projects and activities that will help them strengthen their hypotheses 
by looking beyond the personal and finding ways by which they can engage
 with the larger communities, spreading awareness, building histories 
and acquiring skills to successfully bolster their classroom interaction
 and learning.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;The following is a bird’s eye view of the key themes that have emerged in the workshops:&lt;/em&gt;&lt;/p&gt;
&lt;h3&gt;The Costs of Belonging&lt;/h3&gt;
&lt;p&gt;Almost unanimously, though articulating it in different ways, the 
students looked at different costs of belonging to a space. Sometimes it
 was the space of the web, sometimes of the larger educational 
institution, sometimes to distinct language groups which do not treat 
English as the lingua franca, and sometimes to communities and friend 
circles within the college environment.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/problem.jpg/image_preview" title="problems" height="365" width="548" alt="problems" class="image-inline image-inline" /&gt;&lt;/p&gt;
&lt;div align="left"&gt;It was particularly insightful for us to understand 
that granting access, providing infrastructure or equipping 
‘underprivileged’ students with skills is not enough. In fact, it became
 apparent that there is a certain policy driven, post-Mandal affirmative
 action that has already bridged the infrastructural and access gap in 
the educational institutions. The easy availability of computers, 
internet access, the ubiquitous cell phone, were all indicators that for
 most of the students, it wasn’t a question of affording access. Even 
when we were dealing with economically disadvantaged students, there 
were a plethora of technology devices they had access to and familiarity
 with. Shared resources, public access to digital technologies, and 
institutional support towards promoting digital familiarity all played a
 significant role in demystifying the digital for them. In many ways, 
these students were digital natives if defined through access, because 
they had Facebook accounts and browsed Google to find everything they 
wanted. Their phone was an extension of their selves and they used it in
 creative ways to communicate and connect with their peers.&lt;br /&gt;&lt;br /&gt;Based
 on this, the students are now prepared to work on documenting, 
exploring and raising awareness about these questions, to see what the 
gating factors are that disallow people with access to still feel 
excluded from the power of the digital.&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;
&lt;h3&gt;The Need for Diversity&lt;br /&gt;&lt;/h3&gt;
&lt;div align="left"&gt;&lt;br /&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/others.jpg/image_preview" alt="others" class="image-inline image-inline" title="others" /&gt;&lt;/td&gt;
&lt;td&gt;It is a telling sign about the state of the Internet in India that every
 student presumed that the only way to be really fluent with the digital
 web is to be fluent in English. The equation of English being 
synonymous with being online was both fascinating and troubling to us. 
Of course, a lot of it has to do with India’s own preoccupations, marked
 by a postcolonial subjectivity, with English as the language of 
modernity and privilege. But it also has to do with the fact that almost
 all things digital in India, lack localisation. The digital 
technologies and platforms remain almost exclusively in English, 
fostered by the fact that input devices (keyboards, for example) and 
display interfaces favour English as the language of computing.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/div&gt;
&lt;p&gt;Such an idea might also help in 
reducing the distance between those who can fluently navigate the web 
through its own language, and those who, through various reasons, find 
themselves tentative and intimidated online.&lt;/p&gt;
&lt;p&gt;The breakthrough that the 
participants had, when they realised that they don’t have to be ‘proper 
in English’ while being online – the ability to find local language 
resources, fonts, translation machines, and the possibility of 
transliterating their local language in the Roman script was a learning 
lesson for us.&lt;/p&gt;
&lt;h3&gt;Peer-to-Peer (P2P) Learning&lt;/h3&gt;
&lt;div align="left"&gt;As a part of their orientation to the world of the 
digital, especially with the methodologies of the workshops, the 
students literally had an overnight epiphany where they could see the 
possibilities and potentials of P2P learning. The recognition that they 
are not merely recipients of knowledge but also bearers of experience 
and contexts which are rich and replete with knowledge, gave them new 
insights on how to approach learning and education. Through digital 
storytelling, the workshops demonstrated how, in our own stories and 
accounts of life, there are many indicators and factors which can help 
us engage with the realities of exclusion and injustice.&lt;br /&gt;&lt;br /&gt;Working 
together in groups, not only to excavate knowledge from the outside, as 
it were, but also to unearth the knowledge, experience, stories, 
emotions that we all carry with ourselves and can serve as valuable 
tools to bring to the classroom, is a lesson that all the groups 
learned. The idea of a peer also led them to question the established 
hierarchies within formal education. What was particularly interesting 
was that they did not – as is often the case – translate P2P into DIY 
education. They recognised that there are certain knowledge and skill 
gaps that they would like experts to address and have incorporated 
special trainings with different experts in areas of language, 
communication, ethnography, interviews, film making, etc. However, the 
methods for these trainings are going to emphasise a more P2P structure 
that is different from the regular classroom learning.&lt;br /&gt;&lt;br /&gt;What would
 happen if a teacher is looked at as a peer rather than a superior? How 
would they navigate curricula if the scope of their learning was greater
 than the curricula? How could they work together to learn from each 
other, different ways of learning and understanding? These are some of 
the questions that get reflected in their proposed campus activities, 
where they are trying to now produce knowledge about their communities, 
cities, families, groups and experiences, by conducting surveys, 
ethnographies, historical archive work, etc. The digital helps them in 
not only disseminating the information they are collecting but also in 
re-establishing their relationship with learning and knowledge.&lt;br /&gt;&lt;br /&gt;&lt;img src="https://cis-india.org/home-images/workshop.jpg/image_preview" title="classroom" height="337" width="509" alt="classroom" class="image-inline image-inline" /&gt;&lt;br /&gt;
&lt;div align="center"&gt;&lt;br /&gt;
&lt;div align="left"&gt;Ideas like open space dialogues, collaborative 
story-telling, mobilising resources for knowledge production, creating 
awareness campaigns and interacting with a larger audience through the 
digital platforms are now a part of their proposals and promise to show 
some creative, innovative and interesting uses of these technologies. 
How the teachers would react to such an imagination of the students as 
peers within the formal education system, remains to be seen as we 
organise a faculty training workshop later in December. &lt;br /&gt;&lt;br /&gt;These 
three large themes find different articulations, interpretations and 
executions in different locations. However, they seem to be emerging as 
the new forms of social exclusion that we need to take into account. It 
is apparent that the role of technologies – both at the level of usage 
and of imagination – is crucial in shaping these forms of social 
inequities. But the technologies can also facilitate negotiations and 
engagements with these concerns by providing new forms of knowledge 
production and pedagogy, which can help the students in developing 
better learning environments and processes. The Pathways to Higher 
Education remains committed to not only documenting these learnings but 
also to see how they might be upscaled and integrated into mainstream 
learning within higher education in India.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/digital-natives/pathways/blog/higher-education'&gt;https://cis-india.org/digital-natives/pathways/blog/higher-education&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Higher Education</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Digital Knowledge</dc:subject>
    

   <dc:date>2015-03-30T14:54:21Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/accessibility/blog/national-resource-kerala-chapter-call-for-comments">
    <title>National Resource Kit : The Kerala Chapter (Call for Comments)</title>
    <link>https://cis-india.org/accessibility/blog/national-resource-kerala-chapter-call-for-comments</link>
    <description>
        &lt;b&gt;The National Resource Kit team is pleased to bring you its research on the state of laws, policies and programmes for persons with disabilities in the state of Kerala. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Note: The chapter is an early draft and will undergo subsequent modifications. We welcome comments and feedback from our readers.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Statistics&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Capital: Tiruvananthapuram&lt;/li&gt;
&lt;li&gt;HDI Rank: 1&lt;sup&gt;st&lt;/sup&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Literacy: 1&lt;sup&gt;st&lt;/sup&gt; in India with a literacy of 93.91 per cent&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Population:33,387,677 &lt;/li&gt;
&lt;li&gt;Population of Persons with Disability: 2.7 per cent. The district of Malappuram has the highest number of persons with disabilities, followed by Thiruvananthapuram and Ernakulam.&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Ministries and Departments&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Department of Social Welfare – responsible for protection of rights of persons with disabilities.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Directorate of Social Welfare (under Department of Social Welfare) – nodal authority that implements central and state government programmes in Kerala.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Government run Organisations&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;The Kerala State Handicapped Persons Welfare Corporation&lt;/li&gt;
&lt;li&gt;The Commissionerate of Persons with Disabilities&lt;/li&gt;
&lt;li&gt;The National Institute of Speech and Hearing&lt;/li&gt;
&lt;li&gt;The Central Social Welfare Board&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Legal Provisions&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Kerala does not have a legislation specifically for persons with disabilities in the state but implements the central legislation – the Persons with Disabilities (Equal Opportunities, Protection of Rights and Full Participation) Act 1995. The state also issues various schemes, policies and notifications for persons with disabilities. The Department of Social Welfare has implemented some central and state schemes for persons with disabilities in the state,&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt; while some schemes are being implemented by the Kerala State Handicapped Persons Welfare Corporation (KSHPWC).&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt; These are listed below under various categories as:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Accessibility&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The Department of Local Self Governance vide G.O. (MS) No.41/11/LSGD, Thiruvananthapuram, dated 14/02/2011 have issued rules for housing which also include special provisions for accommodation of the requirements of persons with disabilities. These include provision of ramps, lifts, convenient parking slots and removal of architectural barriers.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Personal mobility&lt;/li&gt;
&lt;/ul&gt;
&lt;p class="callout" style="text-align: justify; "&gt;Persons with disabilities with a regular and reasonable income and having to travel regularly on work are given a subsidy of Rs. 2000 linked with bank loan for procuring motorised tricycles / vehicles.&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;KSHPWC supplies aids and appliances every three years to Persons with Disabilities with annual income less than Rs. 60,000 (see note 3). These include: artificial limbs, tricycles, wheelchairs, callipers, crutches, hearing aids, white canes, colostomy bags, etc. The beneficiaries are selected at medical camps held at district, block and panchayat levels.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Subsidy of Rs.10,000 is provided by KSHPWC to each self-employed young disabled person for procuring motorized tricycle upon applying in the proper format with attested copies of original bill, registration and insurance documents, and photographs (see note 3).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Education&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Through the Kerala Right of Children to Free and Compulsory Education Rules, 2010, the government provides free and compulsory education for children with disabilities until the age of 18. The rules also provide for inclusive education, special schools for severely disabled children, learning aids and appliances, training for special teachers and vocational training for children with disabilities.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Three seats are reserved for persons with disabilities in arts and science colleges and engineering colleges, nine seats are reserved in polytechnic colleges, five seats are reserved in ITIs, five per cent seats are reserved in junior technical colleges and 25 per cent seats are reserved for teachers in special schools (see note 4).&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Scholarships are given to children with disabilities where annual income of parents is less than Rs. 24,000 at Rs. 30 per month for children in classes I – IV and Rs. 45 per month for children in classes V – VIII. For students in higher classes, scholarships are provided for day scholars and residential students with special allowance for readers. In addition to the scholarships, students with orthopaedic impairment are given Rs. 25 per month for maintenance of prosthetic / orthopaedic aids (at the recommendation of the head of the institution) and Rs. 50 per month as transportation allowance (see note 4).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Children with mental disabilities where the annual income of parents is less than Rs. 24,000 are given scholarships upto the age of 21 at the scale of Rs. 60 per month with dress allowance of Rs. 40 and school requisite allowance (see note 4).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The government runs two vocational training centres for persons with disabilities at Thiruvananthapuram and Kozhikode (see note 4).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Students with Disabilities who top their districts in the categories of Orthopaedic disability, speech and hearing impairment, visual impairment and mental retardation; in the SSLC and Higher Secondary exams are awarded &lt;b&gt;Rs. 2,500 each&lt;/b&gt;. Awards of &lt;b&gt;Rs. 5000&lt;/b&gt; are given to state rank holders in the above categories (see note 3).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Health: Details of policies / schemes for health unavailable.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Rehabilitation: The state runs community based rehabilitation programmes and vocational training centres for persons with disabilities (see note 2).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Employment: The state provides three per cent reservation in classes I, II (videG.O. (RT) No. 291/2012/SWD dated, Thiruvananthapuram 20&lt;sup&gt;th&lt;/sup&gt; June 2012)&lt;b&gt;, &lt;/b&gt;III and IV (vide G.O. (P)No.20/98/P&amp;amp;ARd dated, Thiruvananthapuram, 14 July, 1998) of state government jobs and PSUs. Three per cent reservation is also provided on part-time contingency posts and one per cent worker class vacancies in the government, corporations and companies are reserved for persons with disabilities (see note 4).&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;An age relaxation of ten years on the upper age limit is provided to persons with disabilities for applying to government jobs. Upto 10 grace marks can be given to persons with disabilities at the discretion of the Public Service Commission for direct recruitment to various posts except those that are specifically excluded (see note 4).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Persons with disabilities are allowed a special casual leave of 15 days for treating an illness that is directly connected with their disability vide G.O. (P) 249/84/Fin. Dated  9–5–84.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Loans for self employment are being given to persons with disabilities by banks through KSHPWC for setting up self employment programmes. A subsidy of Rs. 2000 linked with the bank loan is given to each beneficiary (see note 4).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;KSHPWC channelizes loans from the National Handicapped Finance and Development Corporation to Persons with Disabilities at low interest rates for self-employment. Applicants must have at least 40 per cent disability and their family income should not exceed Rs. 3,00,000 for rural and Rs. 5,00,000 for urban applicants (see note 3).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;KSHPWC runs the following commercial units to provide employment to persons with disabilities (see note 4): Sowbhagya Department Store – Thiruvananthapuram, Sowbhagya Department Store – Kozhikode, Sowbhagya Extension Counter, MLA Quarters – Thiruvananthapuram, Photocopier Unit, MLA Quarters – Thiruvananthapuram, and Envelope Making Unit – Thiruvananthapuram.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;KSHPWC together with the Kerala State Lotteries Department implements the scheme through which disabled persons are identified throughout the state for undertaking agency for Lottery tickets and are given financial assistance of Rs. 5,000 for purchase and sale of lottery tickets.&lt;/li&gt;
&lt;/ol&gt; 
&lt;ul&gt;
&lt;li&gt;Social Protection&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Persons with disabilities in the categories of vision impaired, hearing impaired and orthopaedically disabled whose annual family income does not exceed Rs.3,600 are given a disability pension of Rs.85 per month.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Conveyance allowance of Rs.100 for vision impaired and locomotor disabled employees of aided schools and government departments and Rs.50 for part time employees are given vide G.O.(P) No. 521/87/Fin, dated 15.6.87.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Free travel facility is provided to the vision impaired on buses and boats and for the locomotor disabled on buses. Persons with 50 per cent or more locomotor disabilities are given 70 per cent concession on private buses to travel upto 40 kilometres (see note 4). &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;A distress relief fund has been created for persons with disabilities vide G.O. (MS) No. 4/95/SWD dated 24/1/95. A maximum amount of Rs. 2000 can be given for a case in a financial year and the amount can be extended to Rs. 8000 in exceptional cases. Persons with disabilities whose annual income does not exceed Rs. 12,000 can claim financial assistance for the following reasons (see note 4): for medical treatment including surgery, disability incurred due to an accident, any other purposes not covered by existing schemes for persons with disabilities, grant by the government under the grant-in-aid to persons with disabilities under the Deendayal Disabled Scheme (see note 2).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Under the Rajiv One Million Housing Scheme (see note 4), one per cent of the houses constructed for the economically backward class have been reserved for persons with disabilities.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;KSHPWC operates a scheme for children who are below 8 years of age and have 60 per cent or more disability and whose parent’s have an annual income of less than Rs.60,000, the corporation deposits an amount of Rs. 15,000 for boys and Rs.20,000 for girls. The fund under this scheme is released after the child attains the age of 18 years for self-employment or marriage or as per requests after assessing the case. (see note 3).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;A scheme run by the state offers marriage assistance to women with disabilities and to daughters of Persons with Disabilities (see note 2).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;KSHPWC runs an old-age home for persons with disabilities at Parassala (see note 3).&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Miscellaneous&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;State awards of Rs. 3000 per head are given to outstanding and efficient employees among persons with disabilities (see note 4)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Persons with disabilities are exempted from professional tax and road tax. They are given an additional income tax exemption of Rs. 5000 (see note 4).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The state also gives grant-in-aid for voluntary organisations running homes for the disabled and financial assistance for advocates with orthopaedic or visual impairment (see note 2).&lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;Government Orders&lt;/h3&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Category&lt;/th&gt;&lt;th&gt;Headline&lt;/th&gt;&lt;th&gt;Issuing Authority&lt;/th&gt;&lt;th&gt;Number &amp;amp; Date&lt;/th&gt;&lt;th&gt;Briefs&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Employment&lt;/td&gt;
&lt;td&gt;Public Services Reservations for Physically Handicapped Persons – three per cent reservation for Class III and Class IV posts&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Personnel and Administrative Reforms (Advice) Department&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;G.O. (P)No.20/98/P&amp;amp;ARD&lt;br /&gt;Dated, Thiruvananthapuram, &lt;br /&gt;14 July, 1998&lt;br /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Orders issued for a maximum of 50 appointments each in the categories of subordinate service, last grade service and part-time contingent service being set apart every year for the appointment of persons with disabilities to the public services.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;span&gt;Employment&lt;/span&gt; &lt;/td&gt;
&lt;td&gt;Reservation of three per cent vacancies in Class I and II posts in Public Services for appointment of physically disabled persons – post of Assistant Engineer (Civil), Public Works Department – eligibility for full participation in the selection process and appointment in respect of certain categories of physically disabled persons – clarified orders&lt;/td&gt;
&lt;td&gt;Social Welfare Department&lt;/td&gt;
&lt;td&gt;
&lt;p class="MsoNormal" style="text-align:justify; "&gt;&lt;span&gt;G.O. (RT) No. 291/2012/SWD.&lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align:justify; "&gt;&lt;span&gt;Dated, Thiruvananthapuram 20&lt;sup&gt;th&lt;/sup&gt; June 2012&lt;/span&gt;&lt;/p&gt;
 &lt;/td&gt;
&lt;td style="text-align: justify; "&gt;This order has been issued in clarification to earlier orders issued for identification of posts for Persons with Disabilities.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;span&gt;Building construction&lt;/span&gt; &lt;/td&gt;
&lt;td&gt;&lt;span&gt;Kerala Panchayat Building Rules 2011&lt;/span&gt; &lt;/td&gt;
&lt;td&gt;&lt;span&gt;Local Self Governance Department&lt;/span&gt; &lt;/td&gt;
&lt;td&gt;
&lt;p class="MsoNormal"&gt;G.O. (MS) No.41/11/LSGD Dated, Thiruvananthapuram 14/02/2011.&lt;/p&gt;
 &lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Notification has been issued to regulate building construction. Provides for accessibility and elimination of architectural barriers.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Special Schools and Vocational Training Centres&lt;/h3&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;Centre for Training and Rehabilitation of the Mentally Retarded, Thiruvananthapuram&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Adarsha Rehabilitation Institute for Spastics and Neurologically Impaired, Kochi&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Asha Niketan, Kozhikode&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Jagathy Government School for the Blind, Thiruvananthapuram&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Jagathy Government BHSS for the Deaf, Thiruvananthapuram&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Kunnamkulam GS for the Blind, Kunnamkulam, Thrissur&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Kunnamkulam GS for the Deaf, Kunnamkulam, Thrissur&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Non Governmental Organisations for Persons with Disabilities&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;National Association of the Blind, Thiruvananthapuram&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Kerala Federation of the Blind, Thiruvananthapuram&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Kerala Institution of the Blind, Thrissur&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;All Kerala Association of the Deaf, Thrissur&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Kerala Government Deaf Employees Union&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Association for the Welfare of the Handicapped, Kozhikode&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Kerala State Physically Handicapped Employees Association&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/accessibility/blog/national-resource-kerala-chapter-call-for-comments'&gt;https://cis-india.org/accessibility/blog/national-resource-kerala-chapter-call-for-comments&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>anandi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    

   <dc:date>2013-11-07T06:20:04Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/dataset-patent-landscape-of-mobile-device-technologies-in-india">
    <title>Dataset: Patent Landscape of Mobile Device Technologies in India</title>
    <link>https://cis-india.org/a2k/blogs/dataset-patent-landscape-of-mobile-device-technologies-in-india</link>
    <description>
        &lt;b&gt;Patent landscape of mobile technology patents and patent applications held by 50 companies operating in India. Licensed CC-BY-SA 4.0.&lt;/b&gt;
        &lt;p&gt;&lt;a href="https://cis-india.org/a2k/blogs/cis-mobile-device-patent-landscape" class="internal-link"&gt;Dataset: Patent Landscape of Mobile Device Technologies in India&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;This dataset contains a landscape of 23,569 patents and patent applications registered in India and relevant to the domain of mobile technology. These patents and patent applications are held by 50 Indian and non-Indian companies operating in the country. The patent landscape has been released under the Creative Commons-Attribution-Share Alike 4.0 (CC-BY-SA 4.0) License as a part of the ongoing Pervasive Technologies research project.&lt;/p&gt;
&lt;p&gt;For the detailed methdology used for drawing up this landscape, read: &lt;a class="external-link" href="http://cis-india.org/a2k/blogs/patent-landscaping-in-the-indian-mobile-device-market"&gt;Methodology: Patent Landscaping in the Indian Mobile Device Marketplace&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;A paper titled &lt;a class="external-link" href="http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2756486"&gt;"Patents and Mobile Devices in India: An Empirical Survey"&lt;/a&gt; published on SSRN in March 2016 presents an analyis of this patent landscape.&lt;/p&gt;
&lt;p&gt;For queries regarding the dataset or its reuse, write to &lt;a class="mail-link" href="mailto:rohini@cis-india.org"&gt;rohini@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;h3&gt;Using this dataset:&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Assignee:&lt;/b&gt; The assignee is one of 50 companies specified in&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/fifty-companies.pdf"&gt; Annexure 4&lt;/a&gt; of the methodology document. Where two assignees are mentioned, the patent was transferred from the second assignee to the first on account of sale of the patent, company merger, etc. For example, "Huawei|NEC" indicates that a patent that belonged to NEC was transferred to Huawei.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Patent Number:&lt;/b&gt; This column contains the patent number in the case of granted patents and the application number in case of patent applications. Patent numbers have been coded in the Thomson Reuters database as IN&amp;lt;6 digit number&amp;gt;B. For example, the patent number 247760 in the Indian Patent Office database is coded as IN247760B in this dataset. The application number is coded as well. However, there is a separate column (Column R) for the application number as given in the Indian Patent Office database.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Level 1: &lt;/b&gt;Patents and patent applications in the landscape have been categorised into: Body Design, Communication, Connectable Interfaces, Display, Energy Storage, Memory, Operational Blocks, Sensors, Software, and Sound, image and video.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Level 2: &lt;/b&gt;Almost all categories have further been divided into sub-categories, i.e., Level 2 categories.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Infrastructure/ UE: &lt;/b&gt;Refers to whether the patent pertains to infrastructure and the user equipment (IUE) or only the user equipment (UE).&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/dataset-patent-landscape-of-mobile-device-technologies-in-india'&gt;https://cis-india.org/a2k/blogs/dataset-patent-landscape-of-mobile-device-technologies-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>rohini</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Pervasive Technologies</dc:subject>
    

   <dc:date>2016-05-03T20:06:43Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/cis-a2k-work-plan-july-2016-june-2017">
    <title>CIS - A2K Work Plan: July 2016 - June 2017</title>
    <link>https://cis-india.org/a2k/blogs/cis-a2k-work-plan-july-2016-june-2017</link>
    <description>
        &lt;b&gt;One of the key mandates of the Access to Knowledge (A2K) program at the Centre for Internet and Society (CIS) is to work towards catalyzing the growth of the free and open knowledge movement in Indic languages. CIS has been a steward of the Wikimedia movement in India since December 2008. Since September 2012, we at CIS-A2K, have been actively involved in growing the movement in India through (i) a grant received from the Wikimedia Foundation (WMF) for the period September 2012 - June 2014, (ii) the FDC Grant received for the period July 2014 - June 2015 and (iii) the FDC Grant received for the period July 2015 - June 2016. Based on the productive experience of working with various Indic Wikimedia communities, CIS-A2K has developed this work plan for July 2016 to June 2017.&lt;/b&gt;
        
&lt;p&gt;This was originally published on &lt;a class="external-link" href="https://meta.wikimedia.org/wiki/CIS-A2K/Work_plan_July_2016_-_June_2017"&gt;Meta-wiki&lt;/a&gt; on April 2, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;We have revised the work plan template taking into account the changed proposal plan sent out by WMF and in light of the feedback that we have received from FDC assessment during last proposal application. The FDC feedback is taken into account at the level of design, RoI and ensuring quality for all our activities.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;CIS-A2K responses towards Indic communities concerns&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;During the last plan period CIS-A2K received the following complaints, suggestions, and feedback. We have attempted to address the concerns under redesigned CIS-A2K 2.0. This table was first prepared during our progress report for the current grant and A2K would like to acknowledge the learnings derived out of the suggestions and feedback it received during the last plan. Please see the table &lt;strong&gt;&lt;a title="Grants:APG/Proposals/2014-2015 round2/The Centre for Internet and Society/Progress report form" href="https://meta.wikimedia.org/wiki/Grants:APG/Proposals/2014-2015_round2/The_Centre_for_Internet_and_Society/Progress_report_form#CIS-A2K_responses_towards_Indic_communities_concerns"&gt;here.&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Background to CIS-A2K Program&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;CIS-A2K is working with the Indic Wikimedia communities since December 2008, when Jimbo Wales came to India and visited Bangalore. In mid-2012 CIS-A2K received a financial grant from the Wikimedia Foundation (WMF) and since then it has been actively involved in growing the Wikimedia and free knowledge movement in India. Following a grant received from WMF for the period September 2012 to June 2014, CIS-A2K received FDC Grant for the periods July 2014 to June 2015 and July 2015 to June 2016. Based on the 41-month experience of working with various Indic Wikimedia communities, CIS-A2K has prepared this year's work plan for July 2016 to June 2017.&lt;/strong&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Objective&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;CIS-A2K is committed to improve Wikimedia movement in India by supporting Indic Wikimedia communities and working on Wikimedia projects and collaborating with FOSS and other like minded movement partners. It also strives to catalyse the growth of open and free knowledge movement in South Asia and especially in India. Our main objectives are:&lt;/strong&gt;&lt;/p&gt;
&lt;ol style="text-align: justify;"&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;&lt;strong&gt;Bringing content under Creative Commons and similar free licenses;&lt;/strong&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;&lt;strong&gt;Supporting and empowering Indic Wikimedia communities;&lt;/strong&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;&lt;strong&gt;Building and maintaining institutional partnerships in order to support the open knowledge movement and creation of open knowledge resources;&lt;/strong&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;&lt;strong&gt;Planning and executing Wikimedia projects with wider community participations and effective consultation;&lt;/strong&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;&lt;strong&gt;Fostering and enabling an appropriate legal and technological ecosystem;&lt;/strong&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;&lt;strong&gt;Building sustainable communities and grooming potential leaders to represent the communities and projects globally.&lt;/strong&gt;&lt;/div&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Context&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;CIS-A2K has focussed on creating sustainable programmes and capacity development for communities in the last few years. CIS-A2K intends to continue its work during the proposed grant period and would continue to focus on the following Indian language Wikimedia projects: Kannada, Konkani, Marathi, Odia, Telugu (Focus Language Areas, FLA). In order to achieve higher RoI, A2K will be including Tulu in its language plan from this plan period.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;CIS-A2K will continue to provide general support and service to all other Indian language Wikimedia communities for all Wikimedia projects as necessary and as requested by the communities or individuals from the community through its request page and needs assessment workshops.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Community strengthening initiatives will be prioritised in order to address the poor participation of Wikimedians from Indian sub continent in particular and global south in general. CIS-A2K has rolled out initiatives such as Train the Trainer and MediaWiki training, focused edit-a-thons and GLAM activities.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;CIS-A2K and Indian language Wikimedia communities would greatly benefit from collaborating with these initiatives and CIS-A2K during this grant period would attempt to bring these communities closer with a series of interactions, hack-a-thons and training sessions.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Our institutional partnerships have played a very important role in content donation, generation of content, attracting new readers and editors and collaborating opportunities with existing community members. They have provided much needed press coverage towards Indian language Wikimedia projects. The institution partnerships and WEP have been redesigned as per community suggestions.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Methodology&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;This work plan has been prepared based on an extensive engagement with various Wikimedia movement participants and enthusiasts in India. These include:&lt;/p&gt;
&lt;ol style="text-align: justify;"&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;Wikimedia community members across all Indic communities: We have talked to a large number of Indic Wikimedia community members and specially community members of our focused language areas;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;Institutional Partners of CIS-A2K: We have taken feedback and suggestions from our institutional partners regarding the challenges of conducting WEP;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;Like-minded advocates of free and open knowledge;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;Surveys and Interviews.&lt;/div&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;h3 style="text-align: justify;"&gt;Performance against plans and projected targets&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Overall&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;img src="https://cis-india.org/home-images/w1.jpg" alt="null" class="image-inline" title="w1" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Kannada&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;img src="https://cis-india.org/home-images/copy_of_w1.jpg" alt="null" class="image-inline" title="w2" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Konkani&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;img src="https://cis-india.org/home-images/copy2_of_w1.jpg" alt="null" class="image-inline" title="w3" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Marathi&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;img src="https://cis-india.org/home-images/copy3_of_w1.jpg" alt="null" class="image-inline" title="w4" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Odia&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;img src="https://cis-india.org/home-images/copy4_of_w1.jpg" alt="null" class="image-inline" title="Odia" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Telugu&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;img src="https://cis-india.org/home-images/copy6_of_w1.jpg" alt="null" class="image-inline" title="w6" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Progress against goals set&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;img src="https://cis-india.org/home-images/copy7_of_w1.jpg" alt="null" class="image-inline" title="Progress" /&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Language Area Work Plans&lt;/h3&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify;"&gt;
&lt;p&gt;CIS-A2K has put in significant efforts across four focus language areas Kannada, Konkani, Odia and Telugu during the previous work plans. CIS-A2K proposed and initiated Marathi as a focus language project during the last proposal plan. As A2K's strategy of working with FLA has resulted in community building and sustainable outreach efforts, we intend to work with the nascent Tulu community towards making Tulu Wikipedia live.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The &lt;a title="CIS-A2K/Work plan July 2016 - June 2017/Tulu" href="https://meta.wikimedia.org/wiki/CIS-A2K/Work_plan_July_2016_-_June_2017/Tulu"&gt;Tulu Wikipedia&lt;/a&gt; plan is a 'minimal cost program' and is not budgeted same as the other FLA. A2K has been able to build a strong community in Mangalore for the Kannada and Konkani Wikimedia projects. Tulu community draws its editor base and institutional support from Mangalore, hence A2K's plans towards Kannada and Konkani Wikimedia projects can also have the added dimension of Tulu Wikipedia incubation activities.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Detailed work-plan for each of these language areas may be seen here (in alphabetical order):&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;&lt;a title="CIS-A2K/Work plan July 2016 - June 2017/Kannada" href="https://meta.wikimedia.org/wiki/CIS-A2K/Work_plan_July_2016_-_June_2017/Kannada"&gt;Kannada&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a title="CIS-A2K/Work plan July 2016 - June 2017/Konkani" href="https://meta.wikimedia.org/wiki/CIS-A2K/Work_plan_July_2016_-_June_2017/Konkani"&gt;Konkani&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a title="CIS-A2K/Work plan July 2016 - June 2017/Marathi" href="https://meta.wikimedia.org/wiki/CIS-A2K/Work_plan_July_2016_-_June_2017/Marathi"&gt;Marathi&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a title="CIS-A2K/Work plan July 2016 - June 2017/Odia" href="https://meta.wikimedia.org/wiki/CIS-A2K/Work_plan_July_2016_-_June_2017/Odia"&gt;Odia&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a title="CIS-A2K/Work plan July 2016 - June 2017/Telugu" href="https://meta.wikimedia.org/wiki/CIS-A2K/Work_plan_July_2016_-_June_2017/Telugu"&gt;Telugu&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/copy8_of_w1.jpg/@@images/ab0f737d-8061-40d7-bcad-f3850817771a.jpeg" alt="null" class="image-inline" title="Women's Wikipedia Editathon" /&gt;&lt;/p&gt;
&lt;p style="text-align: center;"&gt;Woman's day editathon at Christ University&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Some of the key factors that determined the July 2016-June 2017 work plan:&lt;/strong&gt;&lt;/p&gt;
&lt;ol style="text-align: justify;"&gt;
&lt;li&gt;&lt;strong&gt;Development of Focus Language Area Plan:&lt;/strong&gt; A2K's strategy of building a plan along with the consultation of the community and further customised as per the feedback received by communities and FDC Staff have resulted well across five languages. CIS-A2K is pleased to inform that during July 2015-June 2016 it engaged with all the five focus language area plans as it has been able to recruit program officers and program associates for the vacant positions. It is important to note that while we are engaging with Tulu Wikipedia community with intentions of making Tulu Wikipedia live, it is also a 'minimal cost' program. It helps A2K in acheiving higher RoI for monetary resources and optimisation of staff and volunteer expertise.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;A2K 2.0 as a response to FDC and Indic Wikimedians' Feedback:&lt;/strong&gt; As a learning derived out of FDC, WMF Board and Indic Wikimedians suggestions, CIS-A2K has revised its program structure and composition of work. Please find details of revised divisional of responsibilities of A2K team.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Partnership and networking with institutions and groups:&lt;/strong&gt; CIS-A2K has had the privilege of partnering with educational institutions and developmental organisations. These partnerships and collaborations not only resulted in significant quality-content contributions, but also lead to the diversification and expansion of that particular language Wikimedia community. In order to strengthen the communities, increase participation and conduct GLAM activities and attract content donation A2K would look out for possible institutional partnerships.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Providing sustainability and developing leadership skills:&lt;/strong&gt; A2K has always worked towards enabling Indian Language Wikimedia communities to achieve sustainability and visibility amongst the global communities. We have been greatly privilege to work with the Focus Language Communities and would like to pass on our learning through collaborations with other language communities, while exiting few of our current FLA programs. Through our skill building initiatives such as Train-the-Trainer, Media Wiki Training and Train-a-Wikipedian A2K has also been able to support growth of a new community of volunteers to support the existing community.&lt;/li&gt;&lt;/ol&gt;
&lt;h3&gt;&lt;span id="Community_Strengthening_Initiatives" class="mw-headline"&gt;Community Strengthening Initiatives&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;span id="Community_Strengthening_Initiatives" class="mw-headline"&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/span&gt;&lt;span class="mw-headline"&gt;CIS-A2K started two community strengthening initiatives— &lt;a title="TTT" class="mw-redirect" href="https://meta.wikimedia.org/wiki/TTT"&gt;Train-the-Trainer&lt;/a&gt; and &lt;a title="MWTTT" class="mw-redirect" href="https://meta.wikimedia.org/wiki/MWTTT"&gt;MediaWiki Training&lt;/a&gt; to grow and strengthen the Indic Wikimedia projects and the associated communities, both qualitatively and quantitatively. The earlier iteration of these two programs played an important role in connecting the Indian language Wikimedia communities and fostering multi-lingual projects. This year also CIS-A2K proposes to undertake these two successful community strengthening initiatives. In mid-March 2016, CIS-A2K conducted a 2-day-long nationwide Wikipedia Education Program review workshop that brought students and faculty members from institutions that are running WEP in partnership with CIS-A2K and several important topics such as structural challenges such as academic schedule, institutional interest, faculty buy-in and more importantly response by the students were discussed. This year also CIS-A2K proposes to conduct such a workshop.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span id="Creating_Movement_Resources" class="mw-headline"&gt;Creating Movement Resources&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span id="Creating_Movement_Resources" class="mw-headline"&gt; &lt;/span&gt;CIS-A2K has been creating resources to help Indic Wikimedia communities. All the resources are created after assessing the communities' need assessment and close interactions with many of the active community members.&lt;/p&gt;
&lt;p&gt;CIS-A2K proposed to create the following resources (this also include printed resources):&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Wikipedia editing tutorials&lt;/li&gt;
&lt;li&gt;PEG and IEG application handbooks;&lt;/li&gt;
&lt;li&gt;Handbook on how apply for various WMF scholarships;&lt;/li&gt;
&lt;li&gt;Handbook on best practices for Wiki-events, workshops, meetup, outreach and other programs;&lt;/li&gt;
&lt;li&gt;FAQ for content donors –give this job to a law school intern. No need of this handbook to be translated to Indian languages.&lt;/li&gt;
&lt;li&gt;Bookmarks creation to increase awareness about Indian Wikimedia Projects;&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;General Support and Service to the Movement&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;CIS-A2K regularly supports Indic-language Wikimedia communities to conduct workshops, edit-a-thons and events to improve their projects. All these requests are placed at &lt;a title="Talk:CIS-A2K/Requests" href="https://meta.wikimedia.org/wiki/Talk:CIS-A2K/Requests"&gt;CIS-A2K request page&lt;/a&gt; and fulfilled after extensive community discussion and needs assessment.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Currently CIS-A2K is working on a program named &lt;a title="CIS-A2K/Train-a-Wikipedian" href="https://meta.wikimedia.org/wiki/CIS-A2K/Train-a-Wikipedian"&gt;Train-a-Wikipedian&lt;/a&gt; (TAW) to identify enthusiastic Indic Wikipedians and train and groom them to develop their editing skills. We'll continue empowering Indic Wikimedia community members through this program.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Learning and Evaluation&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Following the &lt;a title="Grants:Learning &amp;amp; Evaluation/Global metrics" href="https://meta.wikimedia.org/wiki/Grants:Learning_%26_Evaluation/Global_metrics"&gt;Global metrics&lt;/a&gt; and discussions some members of the Wikimedia community, the A2K program had put together some evaluation tools to assess the impact of its work during the last year. We have included some more metrics for evaluation this year.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Evaluation tools&lt;/strong&gt;&lt;/p&gt;
&lt;dt&gt;Participation&lt;/dt&gt;
&lt;ol&gt;
&lt;li&gt;Number of active editors involved&lt;/li&gt;
&lt;li&gt;Number of newly registered users&lt;/li&gt;
&lt;li&gt;Number of individuals involved&lt;/li&gt;&lt;/ol&gt;
&lt;dl&gt;&lt;dt&gt;Content&lt;/dt&gt;&lt;/dl&gt;
&lt;ol&gt;
&lt;li&gt;Number of new images/media added to Wikimedia article pages&lt;/li&gt;
&lt;li&gt;Number of new images/media uploaded to Wikimedia Commons&lt;/li&gt;
&lt;li&gt;Number of articles added or improved on Wikimedia projects&lt;/li&gt;
&lt;li&gt;Number of bytes added to and/or deleted from Wikimedia projects&lt;/li&gt;&lt;/ol&gt;
&lt;h3&gt;Reports&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;CIS-A2K will undertake monthly and annually review of our work using the above evaluation tools. CIS-A2K report activities and progress to Wikimedia foundation in monthly meetings.&lt;sup&gt;&lt;a href="https://meta.wikimedia.org/wiki/CIS-A2K/Work_plan_July_2016_-_June_2017#cite_note-1"&gt;[1]&lt;/a&gt;&lt;/sup&gt; CIS-A2K team will also report the successes and learnings to the Wikimedia India &amp;amp; the Global Community. CIS-A2K team will actively review progress of each language area plan in collaboration with the respective Wikimedia community. Based on this feedback we will undertake mid-course corrections, should there be a need. To summarize following reports will be published in the year of 2016 - 2017:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Progress report (for the current grant)&lt;/li&gt;
&lt;li&gt;Impact Report (July 2016 - June 2017)&lt;/li&gt;
&lt;li&gt;Monthly report to Wikimedia foundation;&lt;/li&gt;
&lt;li&gt;Monthly Newsletters&lt;/li&gt;
&lt;li&gt;Annual report to CIS&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;Monthly Review and Learning Sessions&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Last year we &lt;a title="CIS-A2K/Work plan July 2015 - June 2016" href="https://meta.wikimedia.org/wiki/CIS-A2K/Work_plan_July_2015_-_June_2016#Monthly_review_and_learning_sessions"&gt;wrote about&lt;/a&gt; conducting monthly review and learning sessions. Currently CIS-A2K is conducting monthly learning sessions to critically reflect on the successes and failures of our work internally. The learnings are shared with Wikimedia Foundation for their feedback and suggestion. We'll continue conducting monthly reviews and learnings and progress will be shared with Wikimedia Foundation. We will try to share the same the Wikimedia India members.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Budget&lt;/h3&gt;
&lt;p&gt;Please find link to CIS-A2K program budget for proposed grant period July 2016-June 2017 &lt;a title="CIS-A2K/Work plan July 2016 - June 2017/Budget" href="https://meta.wikimedia.org/wiki/CIS-A2K/Work_plan_July_2016_-_June_2017/Budget"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;Feedback&lt;/h3&gt;
&lt;p&gt;We appreciate your valuable feedback. However, for the sake of structured engagement by everyone, we request you to consider the following before you share your feedback.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;For feedback on the overall A2K Work Plan you can write &lt;a title="Talk:CIS-A2K/Work plan July 2016 - June 2017" href="https://meta.wikimedia.org/wiki/Talk:CIS-A2K/Work_plan_July_2016_-_June_2017"&gt;&lt;strong&gt;here&lt;/strong&gt;&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;For feedback on respective Language area plans, please write on the discussion page of the respective language plan.&lt;/li&gt;&lt;/ul&gt;
&lt;dl&gt;&lt;dd&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a title="CIS-A2K/Work plan July 2016 - June 2017/Kannada" href="https://meta.wikimedia.org/wiki/CIS-A2K/Work_plan_July_2016_-_June_2017/Kannada"&gt;&lt;strong&gt;Kannada&lt;/strong&gt;&lt;/a&gt; plan (&lt;a title="Talk:CIS-A2K/Work plan July 2016 - June 2017/Kannada" href="https://meta.wikimedia.org/wiki/Talk:CIS-A2K/Work_plan_July_2016_-_June_2017/Kannada"&gt;&lt;strong&gt;discussions&lt;/strong&gt;&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;&lt;a title="CIS-A2K/Work plan July 2016 - June 2017/Konkani" href="https://meta.wikimedia.org/wiki/CIS-A2K/Work_plan_July_2016_-_June_2017/Konkani"&gt;&lt;strong&gt;Konkani&lt;/strong&gt;&lt;/a&gt; plan (&lt;a title="Talk:CIS-A2K/Work plan July 2016 - June 2017/Konkani" href="https://meta.wikimedia.org/wiki/Talk:CIS-A2K/Work_plan_July_2016_-_June_2017/Konkani"&gt;&lt;strong&gt;discussions&lt;/strong&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a title="CIS-A2K/Work plan July 2016 - June 2017/Marathi" href="https://meta.wikimedia.org/wiki/CIS-A2K/Work_plan_July_2016_-_June_2017/Marathi"&gt;&lt;strong&gt;Marathi&lt;/strong&gt;&lt;/a&gt; plan (&lt;a title="Talk:CIS-A2K/Work plan July 2016 - June 2017/Marathi" href="https://meta.wikimedia.org/wiki/Talk:CIS-A2K/Work_plan_July_2016_-_June_2017/Marathi"&gt;&lt;strong&gt;discussions&lt;/strong&gt;&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;&lt;a title="CIS-A2K/Work plan July 2016 - June 2017/Odia" href="https://meta.wikimedia.org/wiki/CIS-A2K/Work_plan_July_2016_-_June_2017/Odia"&gt;&lt;strong&gt;Odia&lt;/strong&gt;&lt;/a&gt; plan (&lt;a title="Talk:CIS-A2K/Work plan July 2014 - June 2015/Odia" href="https://meta.wikimedia.org/wiki/Talk:CIS-A2K/Work_plan_July_2014_-_June_2015/Odia"&gt;&lt;strong&gt;discussions&lt;/strong&gt;&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;&lt;a title="CIS-A2K/Work plan July 2016 - June 2017/Telugu" href="https://meta.wikimedia.org/wiki/CIS-A2K/Work_plan_July_2016_-_June_2017/Telugu"&gt;&lt;strong&gt;Telugu&lt;/strong&gt;&lt;/a&gt; plan (&lt;a title="Talk:CIS-A2K/Work plan July 2014 - June 2015/Telugu" href="https://meta.wikimedia.org/wiki/Talk:CIS-A2K/Work_plan_July_2014_-_June_2015/Telugu"&gt;&lt;strong&gt;discussions&lt;/strong&gt;&lt;/a&gt;)&lt;/li&gt;&lt;/ul&gt;
&lt;/dd&gt;&lt;/dl&gt;
&lt;ul&gt;
&lt;li&gt;Alternatively you could also share your feedback over e-mail at tanveer@cis-india.org. Please use the subject line Feedback on Work Plan.&lt;/li&gt;
&lt;li&gt;Should you feel the need to discuss any aspect of the plan before sharing your feedback, please write to us and we can set up a telephone/Skype call.&lt;/li&gt;&lt;/ul&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/cis-a2k-work-plan-july-2016-june-2017'&gt;https://cis-india.org/a2k/blogs/cis-a2k-work-plan-july-2016-june-2017&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>CIS-A2K</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Wikimedia</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    

   <dc:date>2016-04-29T09:36:45Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/consultation-on-national-geospatial-policy-03022016">
    <title>Consultation on 'National Geospatial Policy' - Notes and Submission</title>
    <link>https://cis-india.org/openness/consultation-on-national-geospatial-policy-03022016</link>
    <description>
        &lt;b&gt;The Department of Science and Technology, Government of India, has constituted a National Expert Committee for developing a draft National Geospatial Policy (NGP) to provide appropriate guidelines for collection, analysis, use, and distribution of geospatial information across India, and to assure data availability, accessibility and quality. A pre-drafting consultation meeting for the NGP was organised in Delhi on February 03, 2016. Ms. Anubha Sinha represented CIS at the meeting, and shares her notes.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;National Geospatial Policy - Pre-Drafting Consultation Meeting&lt;/h3&gt;
&lt;p&gt;Keeping in mind the importance of geospatial data in the context of national development, the Department of Science and Technology, Government of India, has constituted a National Expert Committee for developing a draft National Geospatial Policy (NGP). The Committee is Chaired by Major General Dr. R Siva Kumar, former Head of Natural Resources Data Management System (NRDMS) and CEO of National Spatial Data Infrastructure (NSDI), and Dr. Bhoop Singh, Head of NRDMS and NSDI Division at Department of Science and Technology, as Member Secretary. The Policy aims at providing appropriate guidelines for collection, analysis, use, and distribution of geospatial information across India, and to assure data availability, accessibility and quality.&lt;/p&gt;
&lt;p&gt;A pre-drafting consultation meeting for the NGP was organised in Delhi by Dr. Valli Manickam, Professor at the Academic Staff College of India, on February 03, 2016, and CIS was invited to take part in it as the only participant from the civil society. The other participants included representatives from the geospatial industry and industry associations (like FICCI and CII), and Ms. Ranjana Kaul, Partner at Dua Associates. Among the drafting committee members, Major General Dr. R Siva Kumar, Dr. Bhoop Singh, Dr. Sandeep Tripathi (IFS), and Wing Commander Satyam Kushwaha were present.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;National Geospatial Policy - Concept Note&lt;/h3&gt;
&lt;p&gt;The purpose of the meeting was to hear the stakeholders' response to a Concept Note on the NGP, circulated prior to the meeting &lt;strong&gt;[1]&lt;/strong&gt;. The Note sets out the principles and concerns of the proposed policy, which plans to guarantee geospatial data availability, accessibility, quality and in consonance with the imperatives of national security and intellectual property rights. The applicability of the policy is aimed at:&lt;/p&gt;
&lt;blockquote&gt;all geospatial data created, generated and collected using public funds provided by Central and State Governments and International donor organizations, directly or through authorized agencies.&lt;/blockquote&gt;
&lt;p&gt;The note suggests establishment of an "empowered body" to ensure proper creation, updates, management, dissemination, and sharing of the data, and management of an online portal for the same. The institutional mechanism to implement the policy will be composed of an Appellate authority / National High Power Implementation Committee, the NGP Implementation Committee, and the NGP Steering Committee.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Notes from the Meeting&lt;/h3&gt;
&lt;p&gt;The Welcome Address was delivered by Dr. Bhoop Singh (Head of NRDMS and NSDI Division, DST) who informed the participants that the Expert Committee had already met National Security Council and heard their concerns on the policy. The principles on which the proposed policy is to be based were also shared. The policy resulted from an exercise started two years ago to fix quality and accuracy of geospatial data, which was when it was realised that there were significant gaps that need urgent redressal. It was also identified that in previous initiatives to manage geospatial data at the national level, some data-generating organisations had been left behind. The chief concerns for the Expert Committee are 1) tailoring a policy suited to India's unique security issues, 2) avoiding a blanket open policy that may lead to misuse of low resolution data, 3) heeding restrictions on mapping, considering that 43% of landmass was not represented on maps presently (a probable solution was to do feature based mapping), and 4) clarifying government regulation of drone-based mapping. Security concerns were raised frequently throughout the meeting. The Committee also recognised that for development, data sharing should be made more open. The Committee was keen to have the private industry as a partner in generation of geospatial data.&lt;/p&gt;
&lt;p&gt;Private industry representatives agreed with the objectives of the policy and were willing to contribute to geospatial data generation. The Expert Committee mulled over the possibility of creating a Public Private Partnership to cater to data generation. The private industry complained about the lack of efforts in popularising geospatial technologies and making the process of tenders more transparent.&lt;/p&gt;
&lt;p&gt;There were suggestions to examine the policies of other jurisdictions facing similar internal security threats as India, and delineating the types of data that could be openly shared (for instance, geospatial data from border regions versus non-border regions). Segregation of restricted and open geospatial data can also be done on the basis of its end-application, such as for military and engineering purposes. Participants also requested the creation of a clear Do's and Don'ts guideline. CIS presented a written submission that raised seven key concerns. These are listed in the section below.&lt;/p&gt;
&lt;p&gt;On the question of making an open data policy, it was suggested that the committee needs to decide the fundamental approach of the policy first - whether the policy should be based on prohibition and restriction, or focus on identifying and regulating open and free geospatial. The UN General Assembly document on Principles relating to remote sensing of the Earth from space provides an appropriate international point of reference &lt;strong&gt;[2]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;After listening to the concerns and comments of the stakeholders, the core committee made the following concluding remarks:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Existing policies of government and defence should be mapped out to avoid conflict or overlap with the proposed NGP policy&lt;/li&gt;
&lt;li&gt;The sharing of data vests with government agencies and other organisations recommended by  them – there needs to be a transparent mechanism for such recommendation based sharing&lt;/li&gt;
&lt;li&gt;Industry should come up with self-regulatory mechanisms, do's and don'ts, and code of conduct&lt;/li&gt;
&lt;li&gt;Develop a secure mechanism for providing data on sensitive areas (in terms of national security;&lt;/li&gt;
&lt;li&gt;Even the defence agencies sometimes cannot access maps due to policies of the National Remote Sensing Centre and other agencies – such inconsistencies need to be fixed&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;It was announced that the next consultation will occur in a couple of months, and will be open to the public at large, including representatives of industry, defence, and civil society.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Key Concerns about the NGP Concept Note&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;1. Complete lack of availability  of open geospatial data from Indian government agencies:&lt;/strong&gt; No government agency in India publish open geospatial data. While maps are often sold, both in printed and in digital form, they are not provided in a machine-readable open format and under an open license. The concept note towards NGP has made strong commitments towards changing this situation. There is an immediate need to participate in the NGP drafting process, with coordination among various civil society actors interested in open geospatial data, to ensure that these principles are carried into and operationalised in the actual NGP document.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;2. Need for explicit and comprehensive set of criteria to determine if a set of geospatial data is sensitive for national security reasons:&lt;/strong&gt; In formal and informal conversations with various agencies collecting and creating geospatial data in India, the role played by security agencies in blocking proactive and reactive public disclosure of geospatial data, and even intra-governmental sharing of such data, has been highlighted. Addressing this issue requires development of an explicit and comprehensive list of criteria that will establish a clear and rule-based system for identifying if a specific geospatial data set is to be categorised as “shareable” or “non-shareable.”&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3. No clarity regarding legal status of citizen/crowd-sourced geospatial data, and initiatives to generate them:&lt;/strong&gt; Open user-contributed geospatial data, especially through the OpenStreetMap platform, has emerged as a key driver of the global geospatial services industry. There is a legal ambiguity created by the National Mapping Policy regarding generation of such data in India, which came into focus when Survey of India filed a case against Google for organising a Mapathon contest, which invited Indian users to add metadata about physical and built features through Google Maps platform.1 The NGP needs to expressly provide legal sanction (and perhaps framework) for citizen/crowd-sourcing of geospatial data.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;4. Fragmented institutional structure for collection, management, and distribution of different kinds of geospatial data:&lt;/strong&gt; Survey of India, Indian Institute of Remote Sensing, and Indian Space Research Organisation are all key government agencies involved in creating and managing geospatial data. Further, Election Commission of India is involved in preparing geospatial data about electoral units and their boundaries. The National Spatial Data Infrastructure was conceptualised to harmonise and centralise the geospatial data management processes, but is yet to be implemented with the backing of a policy or an Act. The NSDI can be institutionalised via the NGP as the national archive, aggregator, and distributor of open geospatial data, being originally collected and created by a range of government agencies.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;5. Integration of National Geospatial Policy with National Data Sharing and Accessibility Policy (NDSAP):&lt;/strong&gt; The proactive disclosure of “shareable” geospatial data using open geospatial standards and under open licenses must be carried out under the purview of the NDSAP, and through the open government data platform  established through NDSAP. The decisions regarding licensing of open government data, as being discussed by the a committee set up under NDSAP, must also be applicable to open geospatial data that will be published following the instructions of the NGP. Further, instead of multiple online sources of open geospatial data collected by various Indian government agencies,  must be identified as the primary and necessary source for publication of open geospatial data.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;6. Integration of National Geospatial Policy with Right to Information (RTI) Act:&lt;/strong&gt; Geospatial data must be treated as a special category of information under the RTI Act, which necessitates that if an Indian citizen requests for geospatial data from a government agency under the purview of RTI Act, the agency must provide the data in a human-readable and machine-readable open geospatial standard, and not only in the printed format, as key qualities of digital geospatial data can be substantially lost when printed in paper.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;7. Need for special infrastructure for management and publication of real-time geospatial (big) data, and governance of the same:&lt;/strong&gt; With increasing number of government assets being geo-referenced for the purpose of more effective and real-time management, especially in the transportation sector, the corresponding agencies (which are often not mapping agencies) are acquiring a vast amount of high-velocity geospatial data, which needs to be analysed and (sometimes) published in the real-time. The need for special infrastructure for such data, as well as its governance, has not been discussed in the concept note for NGP, which is a major omission.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Endnotes&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;[1]&lt;/strong&gt; See: &lt;a href="https://github.com/cis-india/website/raw/master/docs/DST_National-Geospatial-Policy_Concept-Note_2016.01.21.pdf"&gt;https://github.com/cis-india/website/raw/master/docs/DST_National-Geospatial-Policy_Concept-Note_2016.01.21.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[2]&lt;/strong&gt; UNGA 41/65. Principles Relating to Remote Sensing of the Earth from Space: &lt;a href="http://www.unoosa.org/pdf/gares/ARES_41_65E.pdf"&gt;http://www.unoosa.org/pdf/gares/ARES_41_65E.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/consultation-on-national-geospatial-policy-03022016'&gt;https://cis-india.org/openness/consultation-on-national-geospatial-policy-03022016&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sinha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Data</dc:subject>
    
    
        <dc:subject>Open Government Data</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Geospatial Data</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Digital India</dc:subject>
    

   <dc:date>2016-03-29T17:03:31Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/telecom/blog/organizing-india-blogspot-october-11-2012-shyam-ponappa-the-supreme-court-delivers">
    <title>The Supreme Court Delivers </title>
    <link>https://cis-india.org/telecom/blog/organizing-india-blogspot-october-11-2012-shyam-ponappa-the-supreme-court-delivers</link>
    <description>
        &lt;b&gt;Now, the spectrum and licence issues need resolution. On September 27, 2012, the Supreme Court of India delivered the opinion of a bench comprising five Judges on the Presidential Reference regarding the auction of 2G spectrum.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Published in &lt;a class="external-link" href="http://organizing-india.blogspot.in/2012/10/the-supreme-court-delivers.html"&gt;Organizing India Blogspot&lt;/a&gt; on October 11, 2012 and in &lt;a class="external-link" href="http://www.business-standard.com/india/news/shyam-ponappasupreme-court-delivers/488420/"&gt;Business Standard&lt;/a&gt; on October 4, 2012.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Supreme Court’s opinion on the Presidential reference&lt;a href="#fn*" name="fr*"&gt;[*]&lt;/a&gt;dismissed two preposterous claims. One is that it is beyond the ambit of Parliament and the government to formulate economic policies. The second is that the government must allocate resources only through auctions. It’s like the end of a self-destructive nightmare. True, our heedless kleptocracy as a society of rogue politicians, bureaucrats, defence personnel, and complicit citizens, led to this pass. Even so, the anarchic “destructionism” of these claims is as reprehensible as the kleptocracy they seek to tear down. Fortunately, the Supreme Court opinion rose above the populist clamour.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There’s still a mess to clear. The big picture is that the Supreme Court left its decision on spectrum auctions unaddressed. In matters of detail, some points need resolution based on facts. These are discussed below to dispel prevalent myths.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Myth 1: Auctions maximise govt revenues&lt;/h3&gt;
&lt;p&gt;"Auctions may be the best way of maximising revenue…": paragraph 116 of the opinion. This contravenes the evidence after the National Telecom Policy -99, that revenue-sharing maximises government revenues as well as public benefits. It also ignores the many auction failures.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Consider the evidence: auction revenues foregone were estimated at under Rs 20,000 crore for 1999-2007, because the sector was mired in losses and was unable to provide services effectively or pay those dues. By comparison, actual collections from revenue-sharing by March 2007 were more than double, at Rs 40,000 crore. Collections by March 2010 were Rs 80,000 crore. Current annual contributions to government revenues may be about Rs 18,000 crore on Adjusted Gross Revenues estimated at Rs 1,40,000 crore, plus taxes, amounting to perhaps Rs 36,000 crore.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Re public benefits, access to telephony grew from a few million users in 1999 to about 700 million today (excluding around 250 million shadow subscriptions).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An ameliorating caveat in paragraph 12 states: "…if the State arrives at the conclusion … that maximum revenue would be earned by auction of the natural resource in question, then that alone would be the process", and this is expanded in paragraph 119:&lt;br /&gt;&lt;br /&gt;"Where revenue maximisation is not the object of a policy of distribution, the question of auction would not arise. Revenue considerations may assume secondary consideration to developmental considerations."&lt;br /&gt;&lt;br /&gt;This has not prevented erroneous conclusions in the press that auctions are the only valid process, notwithstanding that the conditions stipulated in the order, eg, that government’s actions be “fair, reasonable, non-discriminatory”, were always operative, if not adhered to in instances of abuse, as in the 2G scam.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Myth 2: Maximum govt collections are in the public interest&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Government collections as the public interest criterion may work for colonial powers extorting revenues from subject states, or possibly for utopias whose political economy is so balanced that such cross-subsidisation works. Developing economies like India presumably can and should seek the welfare of their people. The same populists crusading for maximum government collections accuse governments of corruption and waste. This doesn’t provide a coherent approach to infrastructure, where each capital-intensive sector is configured to deliver a specific service. For instance, the energy sector has to deliver power, while telecommunications must deliver communications services. Neither can be expected to deliver toilets or water. Yet, many well-intentioned people seem to nurture such irrational expectations.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The spectrum and broadband link&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The first prerequisite for broadband is high-speed connectivity. The second is reasonably priced services. Our objectives are, therefore: (a) a broadband network, (b) available anywhere (c) at reasonable prices. Our networks are deficient, however, particularly in rural and semi-urban areas. A host of factors are responsible, ranging from limited public sector network rollout, combined with a private sector focus on the most lucrative urban centres, with incentives skewed to voice telephony. Applications need connectivity based on networks that require spectrum.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Problems and solutions&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Consider an application like distance education. The need is for networks and services of high quality (followed by the additional requirement of content). What is apparent is that such applications cannot be effective without the connectivity. So we’re back to the need for networks, of fibre where feasible, and wireless elsewhere. This brings us back to the need for spectrum.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Reviewing facts&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;As regards the facts relating to the 2G judgment deserving review:&lt;br /&gt;The solution the Supreme Court has not considered is that operators need only to use spectrum, for which they can be charged a fee. The evidence of widely available Wi-fi shows that innovation and usage thrive if spectrum is available. The Supreme Court, the government, and the public need to recognise that allocating spectrum to operators is only one way to use spectrum.&lt;br /&gt;&lt;br /&gt;There need be no alienation of spectrum at all, if policies allow open access and charge fees. Then, spectrum could be used like any infrastructure network, eg, airports, highways, or rail, on payment of usage charges. The sharing could be in at least two ways. Operators could pool spectrum for collective use. For this, (i) regulations must allow pooling/active facilities sharing, and (ii) operators must agree on terms and procedures. Another way is for mandatory spectrum sharing using the database-driven systems being implemented in the US by Spectrum Bridge and Telcordia. Similar deployments are planned in the UK, the European Union, and in Singapore. The TV white space is shared because this range is available for sharing, and not because other bands cannot be shared.&lt;br /&gt;&lt;br /&gt;There are immense societal costs of duplication in capital investments in multiple networks, including the last-mile spectrum access, of operators using dedicated networks with limited passive facilities sharing (such as towers), compared with the benefits of open-access to common networks, if policies changed. These would employ active facilities sharing (equipment, and not just construction) to reduce capital equipment, construction costs, energy for towers, carbon emissions from a more limited physical network, possibly reduced radiation from a rationalised network with small cells with lower-powered equipment, and the multiplier effect on the finite available spectrum.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Enormous productivity benefits could accrue through ICT applications in infrastructure such as smart grids for energy, transportation, education, healthcare, and government services, as well as many commercial applications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Supreme Court could also uphold contractual obligations, by discriminating against actual transgressors in the 2G spectrum allocation, while rehabilitating those who operated within the law.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a href="#fr*" name="fn*"&gt;*&lt;/a&gt;].&lt;a class="external-link" href="http://supremecourtofindia.nic.in/outtoday/op27092012.pdf"&gt;http://supremecourtofindia.nic.in/outtoday/op27092012.pdf&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/telecom/blog/organizing-india-blogspot-october-11-2012-shyam-ponappa-the-supreme-court-delivers'&gt;https://cis-india.org/telecom/blog/organizing-india-blogspot-october-11-2012-shyam-ponappa-the-supreme-court-delivers&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Shyam Ponappa</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    

   <dc:date>2012-12-21T09:57:57Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/studying-internet-in-india-selected-abstracts">
    <title>Studying Internet in India: Selected Abstracts</title>
    <link>https://cis-india.org/raw/studying-internet-in-india-selected-abstracts</link>
    <description>
        &lt;b&gt;We received thirty five engaging abstracts in response to the call for essays on 'Studying Internet in India.' Here are the ten selected abstracts. The final essays will be published from June onwards.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Deva Prasad M - 'Studying the Internet Discourse in India through the Prism of Human Rights'&lt;/h3&gt;
&lt;p&gt;Exploring Internet from the perspective of human rights gives rise to the multitude of issues such as right to privacy, freedom of expression, accessibility. Pertinent socio-political and legal issues related to Internet which was widely debated upon in the past one year in India includes lack of freedom of expression on Internet and Section 66A of Information Technology Act, 2000. The recent net neutrality debate in India has also evoked deliberation about the right of equal accessibility to Internet and to maintain Internet as a democratic space. The repercussions of ‘Right to be Forgotten’ law of European Union also had led to debate of similar rights in Indian context. Interestingly all these issues have an underlying thread of human right perspective connecting them and need pertinent deliberation from human rights perspective.&lt;/p&gt;
&lt;p&gt;This paper is an attempt to understand and analyze theses issues from the human rights angle and also how they have contributed in evolving an understanding and perspective amongst the digitally conscious Indian’s to ensure the democratic nature of “Internet” is perceived. Moreover, analysis of these three issues would also help in emphasizing upon the need for a right-based approach in studying Internet in India.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Dibyajyoti Ghosh - 'Indic Scripts and the Internet'&lt;/h3&gt;
&lt;p&gt;Whereas the status of the internet in India is similar to the status of the internet in similar economies with low-penetration and a primarily mobile-based future, an alphabetically diverse nation such as India has its added worries. Whereas the 1990s saw an overdomination of English given the linguistic communities which were developing the world of computers and the world of the internet, by 2015, some of the disparity with offline linguistic patterns has been reduced. However, for Indic scripts, much less development has taken place. If one is studying the internet in India, chances are one is studying it in English.&lt;/p&gt;
&lt;p&gt;What does this hold for the future of these Indic scripts? Given the multilingual skills of Indian school-goers and the increasing amount of daily reading time of those connected to the internet (which is somewhere between 12% and 20% of the population) being devoted to reading on the internet, chances are reading is increasingly in English. In this essay, I shall attempt to study the effects this has on the internet population of India, some of which are as follows.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The kind of mimetic desire it causes&lt;/li&gt;
&lt;li&gt;The degneration in spelling skills caused due to transliteration&lt;/li&gt;
&lt;li&gt;The effacement of non-digitised Indic verbal texts&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Divij Joshi - 'The Internet in the Indian Judicial Imagination'&lt;/h3&gt;
&lt;p&gt;The first mention of the 'Internet' in the vocabulary of Indian judicial system was a fleeting reference to its radical capability to allow access to knowledge. In one of its most recent references, it expounded upon and upheld the idea of the Internet as a radical tool for free expression, announcing its constitutional significance for free speech.&lt;/p&gt;
&lt;p&gt;The judicial imagination of the Internet – the understanding of its capabilities and limitations, its actors and constituents, as reflected in the judgements of Indian courts – plays a major role in shaping the Internet in India, both reflecting and defining conceptions of the Internet and its relationship with society, law, and public policy.&lt;/p&gt;
&lt;p&gt;This essay is an attempt to use legal and literary theory to study the archives of judicial decisions, tracing the history of the Internet in India through the lens of judicial trends, and also to look at how the judiciary has defined its own role in relation to the Internet. It attempts a vital study of how courts in India have conceptualized and understood the Internet, and how these conceptions have, in turn, impacted the influence of the Internet on Indian society.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Ipsita Sengupta&lt;/h3&gt;
&lt;p&gt;The proposed essay will make observations of a specific kind of conversation that takes place on the social media platform of YouTube. The conclusive argument is imagined along questions of high versus low culture, as described below.&lt;/p&gt;
&lt;p&gt;Under study are two objects- one, particular YouTube videos which play Rabindra-Sangeet, i.e. songs penned and composed in the late 19- early 20th centuries by the Bengali writer and artist Rabindranath Tagore, the body of work which today has become a genre of Indian music; and the second, comments that these videos receive from users of the site.&lt;/p&gt;
&lt;p&gt;Visuals of YouTube song videos of Rabindra-Sangeet are of many kinds. So are renditions, with solitary or duet or band performances, and with varying pace and instrumental accompaniment.&lt;/p&gt;
&lt;p&gt;The videos which have visuals from contemporary cinema, like images of urban youth, and the remixed renditions have often been found to receive comments which reflect/ reveal hurt sentiments of people trying to preserve some kind of sanctity of Rabindra-Sangeet, comments which state how the ethics of presenting the genre have been violated, via their notation and design, by either makers of the film in the song’s incorporation, or by the way young pop stars have been placed in particular montages.&lt;/p&gt;
&lt;p&gt;Some examples:&lt;/p&gt;
&lt;p&gt;&lt;iframe src="https://www.youtube-nocookie.com/embed/1aGwOBgyWTo?rel=0" frameborder="0" height="315" width="420"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p&gt;&lt;iframe src="https://www.youtube-nocookie.com/embed/8_z3blCxCCQ?rel=0" frameborder="0" height="315" width="420"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p&gt;In such a scenario, YouTube as medium of user-generated expression becomes interesting to analyse individual and group dynamics- given the space for commenting (below the video), and statistical data such as “Likes”, “Dislikes”, and “Views”. The debate here is that in Tagore’s “Nationalism”, when he himself is seen to have an imagination of the human race beyond patriotic groupings and consequent othering, does this apparent need to avoid “insulting” his compositions by preserving an intangible art form in a particular way, become then a type of jingoism of region or identity? And what is this Benjaminian “aura” of the “original” that listeners look for in their experience of these videos?&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Laird Brown - 'Dharamsala Networked'&lt;/h3&gt;
&lt;p&gt;Three hours after regulations governing public access to WiFi in India were changed in 2005 the first router went up in Dharamsala. It was homemade, open source, and eventually, “monkey proof.”  Something unimaginable had happened: high-speed Internet access in one of India’s most difficult physical geographies. Dharamsala has also become one of India's interesting information networks and has a burgeoning, unlikely 'tech scene’. But is it so unlikely?&lt;/p&gt;
&lt;p&gt;Since 1959 Dharamsala has been home to the Dalai Lama, the Tibetan people and, government in exile. This single, significant incident possibly set in motion a number of factors that made it possible for the mountain-town to become a political, global, communications. However, much like the rest of India, the region struggles for human and environmental rights against fractured ideas of 'development'. This essay will draw on archives and interviews to unpack this microcosmic tale of Internet access, its histories and economics and the factors at play in shaping it - mundane and maverick, familiar and outlier.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Maitrayee Deka - 'WhatsApp Economy'&lt;/h3&gt;
&lt;p&gt;Everyone around us is connected to the Internet through some or other electronic devices, phones, laptops, and tablets. However, not everyone use Internet for the same purpose. Through an ethnographic account of the usage of WhatsApp messages by the traders in three electronic bazaars in Delhi, Palika Bazaar, Nehru Place and Lajpat Rai Market, we see how Internet on the phone is used predominantly for business purpose. The paper seeks to examine how Whatsapp messages, which are for most of the users a medium for social communication, for the traders in Delhi, become a mode to establish business contact with their counterparts in China. From sharing of pictures of new tools to quoting prices of different products, Whatsapp messages become the lifeline of what many has termed as ‘globalization from below’. This paper argues what has started as economic exchanges through Whatsapp messages may start a new political alliance of similar mass markets in Asia. With the electronic bazaars in Delhi facing stiff competition from formal business actors both online and offline, the WhatsApp messages that is a space of new innovations and trade alliances could sustain the mass markets in India.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Purbasha Auddy - 'Citizens and their Internet'&lt;/h3&gt;
&lt;p&gt;Suddenly it seems internet data package on mobile phones is the reply to the problems in India. As mobile phones remain with us most of the time, it is as if we are ready to face the world if our mobile phones have a data package. Yes, several television commercials in India are gleefully harping on the notes of knowledge, empowerment and freedom. Moreover, internet is being identified as a virtual institution.&lt;/p&gt;
&lt;p&gt;The essay proposes to look into those advertisements which talk about the internet to promote data packages, mobile phones or apps. Through this, the essay firstly, would like to construct the idea of the internet using the Indian citizen who is depicted as smart and almost infallible. Secondly, on the other hand, the essay would analyse how an affirmative and constructive view of using the internet in the minds of citizens has been generated by these advertisements, like the virtual world of the internet can save you from any drastic situation.&lt;/p&gt;
&lt;p&gt;Advertisements are creative constructs, which have a strong aptitude to entice target consumers. While studying the internet in India, studying the ‘texts’ of Indian advertisements which refer to the act of ‘consuming’ the internet could result in an interesting study.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Sailen Routray - 'The Many Lives and Sites of Internet in Bhubaneswar'&lt;/h3&gt;
&lt;p&gt;Those of us who have jumped or meandered across to the wrong (or perhaps the right) side of thirty by now, first came to consume internet in what were called, and are still called, cyber cafes or internet cafes. Their numbers in big Indian cities is dwindling because of the increasing ubiquity of smartphone, and netbooks and data cards. The cyber café seems to be inexorably headed the way of the STD booth in the geography of large Indian cities. The present paper is a preliminary step towards capturing some of the experience of running and using internet cafes. With ethnographic fieldwork with cyber café owners and internet users in these cafes in the Chandrasekharpur area of Bhubaneswar (where the largest section of the computer industry in the state of Odisha is located), this paper tries to capture experiences that lie at the interstices of ‘objects’ and spaces - experiences that are at the same time a history of the internet as well as a personal history of the city.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Sarah McKeever - 'Quantity over Quality: Social Media and the New Class System in India'&lt;/h3&gt;
&lt;p&gt;From the humblest mobile phones to the most sophisticated computers, the Internet is everywhere and nowhere in India. The boundaries, the contours of the space remain nebulous and opaque. When engaging with social media in urban India in particular, we are bound to the conventions of corporations which demand quantity over quality creating a new class system of the Internet: those who are “active” – and therefore a “better” user – and those who have seemingly failed to keep up with the demands of the medium, buried in the ever­‐growing noise and chaos. The creation of a new class system on the Internet, based on Western corporate desire for data, has shaped who is seen and heard on the Internet in India.&lt;/p&gt;
&lt;p&gt;Based on fieldwork in New Delhi which examines the impact of the Internet on offline social movements – including the anti corruption movement in 2011 and the Delhi Rape Case in 2012 – I will argue that the study of the Internet in India can reinforce Western corporate conceptions of how to use the Internet properly among various users involved in the movements. By challenging these preconceptions, this essay will engage with issues of Western corporate notions of Internet use and how we engage with and find participants, how we evaluate what is “good” use of the Internet, and the creation of a new class system on the Internet in India.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Smarika Kumar - 'Governing Speech on the Internet: Transforming the Public Sphere through Policymaking'&lt;/h3&gt;
&lt;p&gt;In the privatised spaces of the World Wide Web and the internet, how does one make sense of speech? Should speech in such a space be understood as the product of a marketplace of ideas? Or should its role in democratic participation be recognised by contextualising the internet as part of the Habermasian public sphere? These questions have interesting implications for the regulation of speech on the internet, as they employ different principles in understanding speech. Recent scholarship has argued for the benefits of employing the public sphere approach to the internet and thus recognising its democratic potential. But taking into account that all speech is inherently made in private spaces on the internet, the application of this
approach is far from simple.&lt;/p&gt;
&lt;p&gt;This creates a tension between the marketplace of ideas and the public sphere approaches to speech on the internet in policymaking. I propose to explore how legal and regulatory mechanisms manage these tensions by
creating governance frameworks for the internet: I argue that through the use of policy and regulation, the private marketplace of the internet is sought to be reined in and reconciled to the public sphere, which is mostly represented through legislations governing the internet. I propose that this less-than-perfect reconciliation then manages to modify the very idea of the public sphere itself in the Indian context, by infusing participation of the "other" on the internet through indirect means.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/studying-internet-in-india-selected-abstracts'&gt;https://cis-india.org/raw/studying-internet-in-india-selected-abstracts&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Internet Studies</dc:subject>
    
    
        <dc:subject>RAW Blog</dc:subject>
    

   <dc:date>2015-08-28T06:53:33Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/digital-natives/making-change/menstrupedia-taboo-beautiful">
    <title>From Taboo to Beautiful - Menstrupedia</title>
    <link>https://cis-india.org/digital-natives/making-change/menstrupedia-taboo-beautiful</link>
    <description>
        &lt;b&gt;On this post, we take a look at 'menstrual activism' -a movement that despite its trajectory in feminism, remains unnoticed in most accounts of traditional and digital activism. We interview Tuhin Paul, the artist and storyteller behind Menstrupedia, an India-based social venture creating comics to shatter the myths and misunderstandings surrounding menstruation around the world. &lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;pre&gt;&lt;strong&gt;CHANGE-MAKER:&lt;/strong&gt; Tuhin Paul, Aditi Gupta&lt;em&gt; &lt;/em&gt;and Rajat Mittal&lt;em&gt;
&lt;/em&gt;&lt;strong&gt;ORGANIZATION:&lt;/strong&gt; Menstrupedia
&lt;strong&gt;METHOD OF CHANGE:&lt;/strong&gt; Storytelling and comics
&lt;strong&gt;STRATEGY OF CHANGE:&lt;/strong&gt; To shatter the myths and misunderstandings surrounding
 menstruation, by delivering accessible, informative and entertaining 
 content about menstruation through different media.&lt;/pre&gt;
&lt;p align="justify"&gt;Most of us think we know what menstruation is; except...we don’t. Many of my male friends still cringe at the mention of the phrase “I’m on my period”, or use it as a derogatory justification for my occasional cranky mood at the office: “It’s that time of the month, isn’t it?” Poor menstruation has been the culprit of femininity; always bashful, tiptoeing for five days straight, trying its best to remain incognito. The social venture Menstrupedia is committed to change this. Aditi, Tuhin and Rajat want to shift how we look at menstruation and remove the stigma that haunts the natural, self-regulation process women undergo to keep their bodies healthy and strong to sustain life in the future.&lt;/p&gt;
&lt;p align="justify"&gt;Now, if you are already wondering what menstruation has to do with internet and society, just wait for it. This post manages to bring art, punk, menstruation &lt;em&gt;and&lt;/em&gt; technology together, all within the scope of the &lt;a href="https://cis-india.org/digital-natives/blog/whose-change-is-it-anyway.pdf"&gt;Making Change&lt;/a&gt; project! Before though, we shall start with some definitions. Let us first lay conceptual grounds about menstruation and Menstrupedia, to then locate and unpack their theory of change.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;What is menstruation?&lt;/h2&gt;
&lt;p&gt;It can be defined as:&lt;/p&gt;
&lt;blockquote&gt;&lt;strong&gt;&lt;a href="http://en.wikipedia.org/wiki/Menstruation"&gt;Menstruation&lt;/a&gt;&lt;/strong&gt; is the periodic discharge of blood and mucosal tissue (the endometrium) from the uterus and vagina. It starts at menarche at or before sexual maturity (maturation), in females of certain mammalian species, and ceases at or near menopause (commonly considered the end of a female's reproductive life).&lt;/blockquote&gt;
&lt;p&gt;And it looks something like this:&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/physiologymenstruation.jpg/image_preview" title="Cycle" height="243" width="292" alt="Cycle" class="image-inline image-inline" /&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;But, I believe, most women will agree the following are much more accurate depictions of the spectrum of thoughts, emotions and sensations that menstruation spurs:&lt;/p&gt;
&lt;h3&gt;The Beauty of RED&lt;/h3&gt;
&lt;p&gt;&lt;iframe src="http://www.youtube.com/embed/qf4TulXdNXY" frameborder="0" height="315" width="560"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;h3&gt;My Periods: A Blessing or a Curse&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;By Naina Jha&lt;/strong&gt;&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;My periods&lt;br /&gt; Are a dreadful experience&lt;br /&gt; Because of all the pain.&lt;br /&gt; Myths and secrets make it a mystery&lt;br /&gt; What worsens it most though, are members of my family&lt;br /&gt; Especially my mother, who always make it a big deal&lt;br /&gt; They never try to understand what I truly feel&lt;br /&gt; I face all those cramps and cry the whole night long&lt;br /&gt; None of which is seen or heard or felt by anyone.&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Instead of telling me, what it is,&lt;br /&gt; They ask me to behave maturely instead.&lt;br /&gt; Can somebody tell me how I am supposed to&lt;br /&gt; Naturally accept it?&lt;br /&gt; My mother asks me to stay away from men&lt;br /&gt; And a few days later, she asks me to marry one!&lt;br /&gt; When I ask her to furnish&lt;br /&gt; the reason behind her haste&lt;br /&gt; She told me that now that I was menstruating,&lt;br /&gt; I was grown up and ready to give birth to another.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;I don’t know whether to feel blessed about it&lt;br /&gt; Or consider it to be my curse.&lt;br /&gt; For these periods are the only reason for me to be disposed.&lt;br /&gt; Since my childhood, I felt rather blessed to be born as a girl&lt;br /&gt; But after getting my periods now,&lt;br /&gt; I’m convinced that it’s a curse...&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;Find it in &lt;a href="http://menstrupedia.com/blog/my-periods-a-blessing-or-a-curse/"&gt;Menstrupedia's blog&lt;/a&gt;.&lt;/p&gt;
&lt;p align="justify"&gt;Despite all this, it is still perceived as a social stigma in society. There is clearly a dissonance between the definition, experience and perceptions around menstruation, that calls for a reconfiguration of the information we are using to define it.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Stigma as a Crisis&lt;/h2&gt;
&lt;p align="justify"&gt;However, re-defining 'menstruation' is no popular or easy task. The word belongs to a group of contested terminology around womanhood and is the protagonist of its own breed of feminist activism: &lt;strong&gt;menstrual activism&lt;/strong&gt;. &lt;a name="fr1" href="#fn1"&gt;[1]&lt;/a&gt; Although I would consider many of the stigmas surrounding menstruation to be quite self-explanatory (we've all experienced and perpetuated them in one way or another -and if they are not, then you are the product of an obscenely progressive upbringing for which I congratulate your parents, teachers and all parties involved), I will still outline the main reasons why menstruation is a source of social stigma for women, and refer to scholarly authority on the subject to legitimize my rant.&lt;/p&gt;
&lt;p align="justify"&gt;Ingrid Johnston-Robledo and Joan Chrisler use Goffman's definition of stigma &lt;a name="fr2" href="#fn2"&gt;[2]&lt;/a&gt; on their paper: &lt;a href="http://link.springer.com/article/10.1007/s11199-011-0052-z#page-1"&gt;The Menstrual Mark: Menstruation as a Social Stigma&lt;/a&gt; to explain the misadventures of menstruation:&lt;/p&gt;
&lt;pre&gt;&lt;strong&gt;Stigma: &lt;/strong&gt;
stain or mark setting people apart from others. it conveys the information 
that those people have a defect of body or of character that spoils their 
appearance or identity&lt;/pre&gt;
&lt;p align="justify"&gt;Among the various negative social constructs deeming menstruation a dirty and repulsive state, this one made a particular echo:&lt;em&gt; “[menstruation is] a tribal identity of femaleness”.&lt;/em&gt; Menstruation is the equivalent of a &lt;em&gt;rite of passage&lt;/em&gt; marking the lives of girls with a 'before' and an 'after' on how the world sees them and how they see themselves. From the dreaded stain on the skirt and the 5-day mission to keep its poignant color and smell on the down low, to having to justify mood and body swings to the overly inquisitive; menstruation is imagined as inconvenient, unpleasant and unwelcome.  As Johnston-Robledo and Chrisler point out: the menstrual cycle, coupled with stigmas, pushes women to adopt the role of the&lt;em&gt; “physically or mentally disordered”&lt;/em&gt; and reinforce it through their communication, secrecy, embarrassment and silence (Kissling, 1996).&lt;/p&gt;
&lt;p&gt;&lt;em&gt; &lt;/em&gt;&lt;/p&gt;
&lt;h2 dir="ltr"&gt;Why does it matter?&lt;/h2&gt;
&lt;p align="justify"&gt;Besides from strengthening attitudes that underpin gender discrimination and attempting against girls' self-identity and sense of worth, there are other tangible consequences for their development and education. I'm going to throw some facts and figures at you, to back this up with the case of India.&lt;/p&gt;
&lt;p align="justify"&gt;An &lt;a href="http://www.wsscc.org/resources/resource-news-archive/menstruation-taboo-puts-300-mln-women-india-risk-experts-0"&gt;article&lt;/a&gt; published by the WSSCC, the Geneva based Water supply and Sanitation Council, shows the Menstruation taboo, consequence of a&lt;em&gt; “patriarchal, hierarchical society”&lt;/em&gt;, puts 300 million women at risk in India. They do not have access to menstrual hygiene products, which has an effect on their health, education (23% of girls in India leave school when they start menstruating and the remaining 77% miss 5 days of school a month) and their livelihoods.&lt;/p&gt;
&lt;p align="justify"&gt;In terms of awareness and information about the issue, WSSCC found that 90% didn't know what a menstrual period was until they got it. Aru Bhartiya's research on &lt;a href="http://www.ijssh.org/papers/296-B00016.pdf"&gt;Menstruation, Religion and Society&lt;/a&gt;,&amp;nbsp; shows the main sources of information about menstruation come from beliefs and norms grounded on culture and religion. Some of the related restrictions (that stem from Hinduism, among others) include isolation, exclusion from religious activities, and restraint from intercourse. She coupled this with a survey where she found: 63% of her sample turned to online sites over their mothers for information, 62% did not feel comfortable talking about the subject with males and 70% giggled upon reading the topic of the survey. All in all, a pretty gruesome scenario&lt;/p&gt;
&lt;h2&gt;Here's where Menstrupedia comes in&lt;/h2&gt;
&lt;p align="justify"&gt;The research ground work attempted above was done in depth by Menstrupedia back in 2009 when the project started taking shape. They conducted research for one year while in NID and did not only find that awareness about menstruation was very low, but that parents and teachers did not know how to talk about the subject.&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;br /&gt;&lt;/th&gt;
&lt;th&gt;&lt;br /&gt;&lt;/th&gt;
&lt;th&gt;&lt;br /&gt;&lt;/th&gt;
&lt;th&gt;&lt;br /&gt;&lt;/th&gt;
&lt;th&gt;&lt;br /&gt;&lt;/th&gt;
&lt;th&gt;&lt;br /&gt;&lt;/th&gt;
&lt;th&gt;&lt;br /&gt;&lt;/th&gt;
&lt;th&gt;
&lt;p&gt;&lt;iframe src="http://www.youtube.com/embed/2caqzHWk2r8" frameborder="0" height="315" width="560"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;br /&gt;&lt;/th&gt;
&lt;th&gt;&lt;br /&gt;&lt;/th&gt;
&lt;th&gt;&lt;br /&gt;&lt;/th&gt;
&lt;th&gt;&lt;br /&gt;&lt;/th&gt;
&lt;th&gt;&lt;br /&gt;&lt;/th&gt;
&lt;th&gt;&lt;br /&gt;&lt;/th&gt;
&lt;th&gt;&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Facts about menstruation awareness in India. Video courtesy of &lt;a href="https://www.youtube.com/user/menstrupedia"&gt;Menstru pedia&lt;/a&gt; Youtube channel.&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p align="justify"&gt;Their proposed intervention: distribute an education visual guide and a comic to explain the topic. They tested out the prototype among 500 girls in 5 different states in Northern India and the results were astonishing.&lt;/p&gt;
&lt;table class="plain" align="center"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: center;"&gt;&lt;img src="https://cis-india.org/home-images/194053_426937890752368_1403341955_o.jpg/image_preview" title="workshop 1" height="267" width="177" alt="workshop 1" class="image-inline image-inline" /&gt;&lt;/td&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/1102736_426937754085715_534486559_o.jpg/image_preview" title="workshop 2" height="266" width="402" alt="workshop 1" class="image-inline image-inline" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;span id="fbPhotoSnowliftCaption" class="fbPhotosPhotoCaption"&gt;&lt;span class="hasCaption"&gt;A workshop conducted by MJB smriti sansthan to spread awareness about mensuration. &lt;br /&gt;Find full album of &lt;a href="https://www.facebook.com/media/set/?set=a.538044002975089.1073741837.277577839021708&amp;amp;type=3"&gt;Menstrupedia Comic being used around India&lt;/a&gt; on &lt;a href="https://www.facebook.com/Menstrupedia"&gt;Menstrupedia's Facebook page.&lt;/a&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;blockquote class="gmail_quote"&gt;&lt;em&gt;"To my surprise, they [the nuns] all agreed that until they read the information given in the Menstrupedia comic,&lt;/em&gt;&lt;em&gt; even they were of the opinion that Menstruation was a ‘dirty’ and 'abominable' thing and they wondered 'why&lt;/em&gt;&lt;em&gt; women suffered from it in the first place'?&lt;/em&gt;&lt;em&gt; But after reading the comic book, their view had changed…now they felt that this was a 'vital' part of&lt;/em&gt;&lt;em&gt; womanhood and there's nothing to feel ashamed about it!&lt;/em&gt;&lt;em&gt; The best part was while this exercise clarified their ideas, beliefs, concepts about menstruation, it also&lt;/em&gt;&lt;em&gt; helped me to get over my innate hesitancy to approach such a sensitive issue in ‘public’ and boosted&lt;/em&gt;&lt;em&gt; my confidence for taking this up as a 'mission' to reach out to the maximum possible girls across the&lt;/em&gt;&lt;em&gt; country." &lt;/em&gt;&lt;br /&gt;
&lt;div align="right"&gt;&lt;strong&gt;Ina Mondkar,&lt;/strong&gt;&lt;br /&gt; on her experience of educating young nuns about menstruation.&lt;/div&gt;
&lt;/blockquote&gt;
&lt;p align="center"&gt;Testimonial after a workshop held in two Buddhist monasteries in Ladakh.&lt;/p&gt;
&lt;p align="justify"&gt;Their mandate today reads:&lt;strong&gt; ‘Menstrupedia is a guide to explain menstruation and all issues surrounding it in the most friendly manner.’ &lt;/strong&gt;They currently host a &lt;a href="http://menstrupedia.com/"&gt;website&lt;/a&gt; with information about puberty, menstruation, hygiene and myths, along with illustrations that turn explaining the process of growing up into a much friendlier endeavour than its stigma-ladden alternatives.&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/Comic.jpg/image_preview" alt="Comic" class="image-inline image-inline" title="Comic" /&gt;&lt;/p&gt;
&lt;p align="center"&gt;Snipbit of the first chapter. Read it for free &lt;a href="http://menstrupedia.com/comic/"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p align="justify"&gt;Through the comic and the interactions around it, Menstrupedia strives to create a) &lt;strong&gt;content &lt;/strong&gt;that frame menstruation as a natural process that is inconvenient, yes; but that should have no negative effects on their self-esteem and development; and b) &lt;strong&gt;an environment&lt;/strong&gt; where girls can talk about it openly and clarify their doubts.&lt;/p&gt;
&lt;h3&gt;Technology's role in the mix&lt;/h3&gt;
&lt;div class="pullquote"&gt;&lt;strong&gt;"&lt;/strong&gt;We want to reach out to as many girls as possible”. Tuhin, Menstrupedia&lt;/div&gt;
&lt;p align="justify"&gt;The role of digital technologies basically comes down to &lt;strong&gt;scalability&lt;/strong&gt;. Opposite to &lt;a href="https://soundcloud.com/user742107957/scalingup"&gt;The Kahani Project's views&lt;/a&gt; on scaling up, Menstrupedia makes emphasis on using technology&lt;strong&gt; to reach a larger audience&lt;/strong&gt;. Currently they have a series of communication channels enabled by technology that include: a visual &lt;a href="http://menstrupedia.com/quickguide"&gt;quick guide&lt;/a&gt;, a &lt;a href="http://questions.menstrupedia.com/"&gt;Q&amp;amp;A forum&lt;/a&gt; (for both men and women), a &lt;a href="http://menstrupedia.com/blog"&gt;blog&lt;/a&gt; (a platform of self-expression on menstruation), a &lt;a href="https://www.youtube.com/user/menstrupedia"&gt;you tube channel&lt;/a&gt; (where they provide updates on their progress) and the upcoming comic.&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;br /&gt;&lt;/th&gt;
&lt;th&gt;&lt;br /&gt;&lt;/th&gt;
&lt;th&gt;&lt;br /&gt;&lt;/th&gt;
&lt;th&gt;&lt;br /&gt;&lt;/th&gt;
&lt;th&gt;&lt;br /&gt;&lt;/th&gt;
&lt;th&gt;&lt;br /&gt;&lt;/th&gt;
&lt;th&gt;&lt;br /&gt;&lt;/th&gt;
&lt;th&gt;
&lt;p&gt;&lt;iframe src="http://www.youtube.com/embed/NRosnGzkg9Y" frameborder="0" height="315" width="560"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;br /&gt;&lt;/th&gt;
&lt;th&gt;&lt;br /&gt;&lt;/th&gt;
&lt;th&gt;&lt;br /&gt;&lt;/th&gt;
&lt;th&gt;&lt;br /&gt;&lt;/th&gt;
&lt;th&gt;&lt;br /&gt;&lt;/th&gt;
&lt;th&gt;&lt;br /&gt;&lt;/th&gt;
&lt;th&gt;&lt;br /&gt;&lt;/th&gt;
&lt;th&gt;&lt;br /&gt;&lt;/th&gt;
&lt;th&gt;&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p align="justify"&gt;Upon the question of the digital divide and whether this expands the divide between have and have nots, Tuhin was very set on the idea of producing the same content in both its digital and print form. &lt;em&gt;“parents or schools should be able to buy the comic and give it to their daughters, so whenever they feel like it, they can refer to it”&lt;/em&gt;. The focus is on making this material as readily available as possible, in order to overcome the tension between new and old information: &lt;em&gt;“workshops are conducted but the moment they go back home, their mothers impose certain restrictions. It becomes a dilemma. But if you provide [The girl] with a comic book, she has something she can take home and educate her mother with”&lt;/em&gt;&lt;/p&gt;
&lt;h2&gt;And here's why it works&lt;/h2&gt;
&lt;p align="justify"&gt;More than the comic book itself, what is truly remarkable about Menstrupedia is Tuhin, Rajat and Aditi’s guts to pick up such a problematic theme in the Indian social imaginary and challenge the entrenched, stubborn beliefs surrounding the issue. The comic book, asides from being appealing to the eye and an accessible format of storytelling (a method we have unpacked in &lt;a href="https://cis-india.org/@@search?SearchableText=storytelling"&gt;previous posts&lt;/a&gt;), fits right into the movement of menstrual activism and what it stands for.&lt;/p&gt;
&lt;div align="justify" class="pullquote"&gt;“We thought of creating something: a tool that can help girls understand menstruation without having to rely on anybody else”. Tuhin, Menstrupedia&lt;/div&gt;
&lt;p align="justify"&gt;First, it is a &lt;strong&gt;self-reliant resource.&lt;/strong&gt; Once the comic book leaves Menstrupedia's hands and lands on those of kids and adults, it takes its own journey. The format of the comic is accessible enough for someone to pick it up and learn about menstruation without the intervention or the support of a third party. This makes Menstrupedia's comic &lt;strong&gt;highly flexible and mobile&lt;/strong&gt;. It can be shared from teacher to child, from mom to daughter, from peer to peer: “[it should teach] &lt;em&gt;how to help your friends when they get their period”&lt;/em&gt; (Tuhin) However, it has the autonomy to also take roads less travelled: from mom to dad, from child to teacher, from boy to girl. The goal at the end of the day: a self-reliant, solidarity-based community where information circulating about menstruation highlights its capacity to give life and overshadows its traditional stigmatized identity.&lt;/p&gt;
&lt;p align="justify"&gt;This self-reliance is characteristic of previous manifestations of menstrual activism. Back in the 80s, the feminist movement, tightly linked to punk culture, embraced the&lt;strong&gt; do it yourself movement,&lt;/strong&gt;&lt;a name="fr3" href="#fn3"&gt;[3]&lt;/a&gt; that enabled women to materialize personalized forms of resistance. They published &lt;a href="http://en.wikipedia.org.advanc.io/wiki/Zine"&gt;zines&lt;/a&gt; promoting&lt;em&gt; “dirty self-awareness, body and menstrual consciousness and unlearning shame” t&lt;/em&gt;hrough &lt;em&gt;“raw stories and personal narratives” &lt;/em&gt;(Bobel, 2006). According to Bobel using the&lt;strong&gt; self as an example&lt;/strong&gt; is a core element in the “history of self-help” within the DIY movement. The role of the Menstrupedia blog is then crucial to sustain the exposure and production of “raw narratives”. Tuhin adds: &lt;em&gt;“We don't write articles on the blog. It is a platform where people from different backgrounds write about their experiences with menstruation and bring in a different perspective”:&lt;/em&gt; For example,&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Red is my colour&lt;/strong&gt; by Umang Saigal&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Red is my colour,&lt;br /&gt; To make you understand, I endeavour,&lt;br /&gt; Try to analyse and try to favour.&lt;br /&gt; It is not just a thought, but an attempt,&lt;br /&gt; To treat ill minds that are curable.&lt;/p&gt;
&lt;p&gt;When I was born, I was put in a red cradle,&lt;br /&gt; I grew up watching the red faces for a girl-children in anger,&lt;br /&gt; Red became my favourite,&lt;br /&gt; But I never knew,&lt;br /&gt; That someday I would be cadged in my own red world.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;Red lover I was,&lt;br /&gt; All Love I lost,&lt;br /&gt; When I got my first red spots,&lt;br /&gt; What pain it caused only I know,&lt;br /&gt; When I realized, Red determined my ‘class’
&lt;p&gt;I grew up then, ignoring red,&lt;br /&gt; At night when I found my bedsheet wet,&lt;br /&gt; All day it ached,&lt;br /&gt; All day it stained,&lt;br /&gt; And in agony I would, turn insane.&lt;/p&gt;
&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;At times I would think,&lt;br /&gt; Does red symbolize beauty or pain?&lt;br /&gt; But when I got tied, in the sacred knot,&lt;br /&gt; I found transposition of my whole process of thought,&lt;br /&gt; When from dirty to gold, Red crowned my bridal course.&lt;/p&gt;
&lt;p&gt;As I grew old,&lt;br /&gt; All my desires vanished and got cold,&lt;br /&gt; My mind still in a dilemma,&lt;br /&gt; What more than colour in itself could it unfold?&lt;br /&gt; What was the secret behind its truth untold?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Is Red for beauty, or is it for beast?&lt;br /&gt; It interests me now to know the least,&lt;br /&gt; All I know is that Red is a Transition,&lt;br /&gt; From anguish to pride&lt;br /&gt; Red is a sensation.&lt;/p&gt;
&lt;p&gt;Red is my colour, as it is meant to be,&lt;br /&gt; No matter what the world thinks it to be,&lt;br /&gt; No love lost, one Love found,&lt;br /&gt; Red symbolizes life and also our wounds,&lt;br /&gt; I speak it aloud with life profound,&lt;br /&gt; That red is my colour, and this is what I’ve found.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p align="center"&gt;Submission to the &lt;a href="http://menstrupedia.com/blog/red-is-my-colour/"&gt;Menstrupedia blog&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;'Self-expression' is not a concept we usually find side by side with 'menstruation'; however, if we look at what has been done in the past, we find that Menstrupedia is actually contributing to a much larger tradition of resistance. For instance, &lt;a href="http://menstrala.blogspot.in/"&gt;Menstrala&lt;/a&gt;, by the American artist Vanessa Tiegs. Menstrala is the name of a collection of 88 paintings &lt;em&gt;“affirming the hidden forbidden bright red cycle of renewal”.&lt;/em&gt;&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;br /&gt;&lt;/th&gt;
&lt;th&gt;&lt;br /&gt;&lt;/th&gt;
&lt;th&gt;&lt;br /&gt;&lt;/th&gt;
&lt;th&gt;&lt;br /&gt;&lt;/th&gt;
&lt;th&gt;&lt;br /&gt;&lt;/th&gt;
&lt;th&gt;&lt;br /&gt;&lt;/th&gt;
&lt;th&gt;&lt;br /&gt;&lt;/th&gt;
&lt;th&gt;
&lt;p&gt;&lt;iframe src="http://www.youtube.com/embed/KJ5-_zegKSU" frameborder="0" height="315" width="560"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;br /&gt;&lt;/th&gt;
&lt;th&gt;&lt;br /&gt;&lt;/th&gt;
&lt;th&gt;&lt;br /&gt;&lt;/th&gt;
&lt;th&gt;&lt;br /&gt;&lt;/th&gt;
&lt;th&gt;&lt;br /&gt;&lt;/th&gt;
&lt;th&gt;&lt;br /&gt;&lt;/th&gt;
&lt;th&gt;&lt;br /&gt;&lt;/th&gt;
&lt;th&gt;&lt;br /&gt;&lt;/th&gt;
&lt;th&gt;&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p align="justify"&gt;Another interesting example is American feminist Gloria Steinem's&lt;a name="fr4" href="#fn4"&gt;[4]&lt;/a&gt; text&amp;nbsp; &lt;a href="http://www.mylittleredbook.net/imcm_orig.pdf"&gt;If Men Could Menstruate&lt;/a&gt;.&lt;/p&gt;
&lt;blockquote&gt;“What would happen, for instance, if suddenly, magically, men could menstruate and women could not?  &lt;br /&gt;The answer is clear:&lt;br /&gt; Menstruation would become an enviable, boast worthy, masculine event: &lt;br /&gt;Men would brag about how long and how much. &lt;br /&gt;Boys would mark the onset of menses, that longed- for proof of manhood,with religious  and stag parties.”&lt;br /&gt;
&lt;div align="right"&gt;&lt;strong&gt;Gloria Steinem&lt;/strong&gt;&lt;br /&gt;[excerpt]&lt;/div&gt;
&lt;/blockquote&gt;
&lt;p align="justify"&gt;Opportunities like these, enable Menstrupedia's community to actively participate in the reconfiguration of 'menstruation' as a concept and as an experience. By exposing new narratives and perspectives on the issue and by disseminating menstrual health information, the community is able to crowd source resistance and dismantle the stigma together.&lt;/p&gt;
&lt;h2&gt;Making Change through Menstrupedia&lt;/h2&gt;
&lt;p align="justify"&gt;The case of Menstrupedia reminds us of &lt;a href="https://cis-india.org/digital-natives/making-change/blank-noise-citizenship"&gt;Blank Noise&lt;/a&gt; because of its approach to change. Both  locate their crises at&lt;strong&gt; the discursive level&lt;/strong&gt; and seek to resolve them by creating new forms of meaning-making. They advocate for a reconsideration of 'givens', for a self-reflection on our role perpetuating these notions and for resistance against conceptual status quos: be it socially accepted culprits like 'eve-teasing', or more discrete rejects like 'menstruation'. Both seek to dismantle power structures that give one discourse preference over others, and both count with a strong gender dynamic dominating the context where these narratives unfold. They are producing a revolution in our system of meaning making, yet only producing resistance in the larger societal context they inhabit.&lt;/p&gt;
&lt;p align="justify"&gt;On the question of where is Menstrupedia's action located, Tuhin replied by pinning it at the&lt;strong&gt; individual level&lt;/strong&gt;&lt;em&gt;&lt;strong&gt;: &lt;/strong&gt;“if a person is aware of menstruation and they know the facts, they are more likely to resist restrictions and spread awareness”. &lt;/em&gt;However, they still acknowledge the historicity behind menstrual awareness (as knowledge passed down from generation to generation) that precedes the project. While the introduction of Menstrupedia, to an extent, does shake up household dynamics in terms of content, it also provides tools and resources to sustain the traditional model of oral tradition and knowledge sharing within the community.&lt;/p&gt;
&lt;p align="justify"&gt;In terms of their role as change-makers ,Tuhin stated that the possibility to intervene was a result of their socio-economic status and the resources they had at hand as “&lt;em&gt;educated members of the middle class with access to information and communication technologies”&lt;/em&gt;. Is this the role the middle class should play? I asked. To which he gave a two fold answer: First, in terms of &lt;strong&gt;responsibility of action&lt;/strong&gt;:&lt;em&gt; “it is a role that anyone can play depending on what kind of expertise they have. It comes to a point where [intents of change] cannot be sustained by activism if you want to achieve long term impact” &lt;/em&gt;And second, in terms of setting up a &lt;strong&gt;resilient infrastructure: &lt;/strong&gt;&lt;em&gt;“I believe we can create an infrastructure people can use and create models that can help low income groups overcome their challenges and become self-sustainable.” &lt;/em&gt;Both answers highlight the need for sustainability in social impact projects, hinting a retreat from wishful thinking upon the presence of technology and a more strategic allocation of skills and resources by middle class and for-profit interventions.&lt;/p&gt;
&lt;p align="justify"&gt;As far the relationship between art, punk, menstruation and technology goes; that was just a hook to get you through the unreasonable length of my blog post, but if anything, it represents an effort to portray the importance of &lt;strong&gt;contextuality and interdisciplinary&lt;/strong&gt; we have been exploring throughout the series. Identifying the use of various mediums and language systems, such as different art forms and modes of self-expression, as well the acknowledgement of the theoretical and social contexts preceding and framing the project, as is feminist activism and the cultural and religious backdrop in India, contribute immensely to fill gaps in the stories of how we imagine change making today; especially at the nascence of new narratives, as we hope is the case for menstruation in a post-Menstrupedia era.&lt;/p&gt;

&lt;h2 align="JUSTIFY"&gt;Sources:&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;Bhartiya, Aru: “&lt;em&gt;Menstruation&lt;/em&gt;, &lt;em&gt;Religion and Society”&lt;/em&gt; IJSSH: International Journal of Social Science and Humanity. Volume: Vol.3, No.6.&lt;/p&gt;
&lt;div id="gs_cit2" style="text-align: justify;" class="gs_citr"&gt;Bobel, Chris. "“Our Revolution Has Style”: Contemporary Menstrual Product Activists “Doing Feminism” in the Third Wave." &lt;em&gt;Sex Roles&lt;/em&gt; 54, no. 5-6 (2006): 331-345.&lt;br /&gt;&lt;br /&gt;Johnston-Robledo, Ingrid, and Joan C. Chrisler. "The menstrual mark: Menstruation as social stigma." &lt;em&gt;Sex roles&lt;/em&gt; 68, no. 1-2 (2013): 9-18.&lt;/div&gt;
&lt;h2&gt;Footnotes&lt;/h2&gt;
&lt;p&gt;[&lt;a href="https://cis-india.org/digital-natives/making-change/menstrupedia-taboo-beautiful#fr1" name="fn1"&gt;1&lt;/a&gt;] Refer to Chris Bobel's work including New Blood: Third-Wave Feminism and the Politics of Menstruation. Access it &lt;a href="http://rutgerspress.rutgers.edu/product/New-Blood,113.aspx"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a href="https://cis-india.org/digital-natives/making-change/menstrupedia-taboo-beautiful#fr2" name="fn2"&gt;2&lt;/a&gt;] Johnston Robledo and Chrisler made reference to &lt;a href="http://en.wikipedia.org.advanc.io/wiki/Erving_Goffman"&gt;Erving Goffman&lt;/a&gt;'s 1963 work:&lt;strong&gt; Stigma: Notes on the management of spoiled identity&lt;em&gt;. &lt;/em&gt;&lt;/strong&gt;&lt;em&gt;"According to Goffman (1963), the word stigma refers to any stain or mark that sets some people apart from others; it conveys the information that those people have a defect of body or of character that spoils their appearance or identity  Goffman (1963, p. 4) categorized stigmas into three types: "abominations of the body” (e.g., burns, scars, deformities), “ blemishes of individual character” (e.g., criminality, addictions), and “tribal” identities or social markers associated with marginalized groups (e.g., gender,race, sexual orientation, nationality)".&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a href="https://cis-india.org/digital-natives/making-change/menstrupedia-taboo-beautiful#fr3" name="fn3"&gt;3&lt;/a&gt;] For a short run through on DIY as part of the Punk Subculture, refer to  Ian P. Moran's paper: Punk - The Do-it-Yourself culture."Punk as a  subculture goes much further than rebellion and fashion as punks  generally seek an alternative lifestyle divergent from the norms of  society. The do-it-yourself, or D.I.Y. aspect of punk is one of the most  important factors fueling the subculture." Access it &lt;a href="http://repository.wcsu.edu/cgi/viewcontent.cgi?article=1074&amp;amp;context=ssj"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a href="https://cis-india.org/digital-natives/making-change/menstrupedia-taboo-beautiful#fr4" name="fn4"&gt;4&lt;/a&gt;] Gloria Steimen is a journalist, and social and political activist who  became nationally recognized as a leader of, and media spokeswoman for,  the women's liberation movement in the late 1960s and 1970. Visit her  official website &lt;a href="http://www.gloriasteinem.com/"&gt;here&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/digital-natives/making-change/menstrupedia-taboo-beautiful'&gt;https://cis-india.org/digital-natives/making-change/menstrupedia-taboo-beautiful&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>denisse</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Making Change</dc:subject>
    
    
        <dc:subject>Net Cultures</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2015-10-24T14:25:59Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/accessibility/blog/rights-of-persons-with-disabilities-bill-2013-and-lack-of-access-to-accessibility-rights">
    <title>The Right of Persons with Disabilities Bill 2013 and the Lack of Access to Accessibility Rights</title>
    <link>https://cis-india.org/accessibility/blog/rights-of-persons-with-disabilities-bill-2013-and-lack-of-access-to-accessibility-rights</link>
    <description>
        &lt;b&gt;The Rights of Persons with Disabilities Bill, 2013 (The RPD Bill) went through three avatars since its commissioning in 2009 under the Sudha Kaul Committee. This blog post brings you a summary of the three stages since it was initially commissioned.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The first was the one the Committee proposed in 2011, after consultations with persons with disabilities and Disabled People's Organizations across the country; the second was &lt;a class="external-link" href="http://www.socialjustice.nic.in/pdf/draftpwd12.pdf"&gt;notified by the Ministry of Social Justice and Empowerment in 2012&lt;/a&gt;, which was in parts opposed to by several stakeholders; and the third, the &lt;a class="external-link" href="http://www.thehindu.com/news/national/cabinet-okays-disabilities-bill/article5456834.ece"&gt;RPD BIll of 2013&lt;/a&gt;, has actually brought the entire disability lobby, as it were, together, in being entirely appalled at the turn of events. The Bill, which is being furiously evaluated in the short time available between its being made available to the public and its impending introduction (and possible passing in the House), is full of flaws. Not only does it not adhere to the standards of the UNCRPD, but it also violates the spirit of the Indian Constitution, as well as contradicting existing case law, and most importantly it betrays the consensus and recommendations of persons with disabilities who were initially part of these recommendations. &lt;br /&gt;&lt;br /&gt;Doubtlessly, while access to government establishments and entities like courts, collectorates, municipal offices, is important for persons with disabilities, there are other establishments which are equally important for persons with disabilities, for purposes of recreation, access to culture, and private services. I've made the point elsewhere that the law proposed is less of an empowering statute and more on the lines of the charity model – and in line with that, the indication is that persons with disabilities will only ever have to come in contact with the government and other entities, so they can enforce rights, take grants, petition government servants, etc. But if the statute itself is rights based, why so much focus on access to forums for rights enforcement, and not on others beyond this?&lt;br /&gt;&lt;br /&gt;While they did have their flaws, the &lt;a class="external-link" href="http://www.socialjustice.nic.in/pwd2011.php"&gt;2011 and 2012 versions of the Bill&lt;/a&gt;, which had rather comprehensive provisions with regard to ensuring accessibility. To start with, the right of persons with disabilities, on an equal basis with others to the physical environment, transportation, information and communications, including appropriate technologies and systems, and other facilities and services open or provided to the public, both in urban and in rural areas, was  recognized. The RPD Bill recognizes the obligation of the government to provide accessibility measures, but by now wording it in terms of a right, it does not do complete justice. The 2011 and 2012 drafts were replete with separate sections on the right to transport, personal mobility, communications, services, the built environment, etc. On the other hand, the RPD Bill clumsily lops all of these into a few sections, with repeated emphasis on infrastructure and services run by "establishments", which is, in effect, the government. There is no mention of website accessibility, though a cursory mention is made to the appropriate government ensuring that all contents available in audio, print and electronic media are in accessible format; and that persons with disabilities have access to electronic media by providing audio description, sign language interpretation and close captioning. Again, the ambiguity as to whether this extends to websites which are not run by the government, is not clear. &lt;br /&gt;&lt;br /&gt;There is another aspect to accessibility which is lost under the Act by its failure to recognize it as a right. A senior person in the sector, who is blind, told me of an instance where he was barred from entering a bar with some friends. "You won't be able to tell what the bill is or how many drinks you've had", said the manager. He was therefore, being discriminated against entering a place, solely on the grounds of his disability. Persons who have been cured of leprosy are denied access to transport and other public facilities on the basis of outdated statutes. Persons who use crutches and calllipers are denied entry to religious places. The understanding of the Bill on accessibility is extremely limited, and limited to the built environment of government establishments, and this does nothing to extend the rights of persons with disabilities. Groups which are forwarding non negotiables for amendments to the Bill do not consider, at present, the right to accessibility to be a non negotiable. I do wonder, however, whether any of the other rights make sense when express and implied bars to access exist and are effectively encouraged, under this proposed law.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/accessibility/blog/rights-of-persons-with-disabilities-bill-2013-and-lack-of-access-to-accessibility-rights'&gt;https://cis-india.org/accessibility/blog/rights-of-persons-with-disabilities-bill-2013-and-lack-of-access-to-accessibility-rights&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>salelkar</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    

   <dc:date>2014-02-03T02:21:45Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/wiki-source-handbook-for-indian-communities">
    <title>Wikisource Handbook for Indian Communities</title>
    <link>https://cis-india.org/a2k/blogs/wiki-source-handbook-for-indian-communities</link>
    <description>
        &lt;b&gt;Wikisource is one of the trending Wikimedia projects. Many new editors and new books to Indic language Wikisource's get added over a period of time. However, new editors as well as existing editors face numerous problems while working with the content online. The Centre for Internet &amp; Society's Access to Knowledge (CIS-A2K) team, to help the editors, has created this Handbook. CIS invites feedback to the first draft of this Handbook. CIS-A2K will continue to work with the Wikipedia communities to improve their efforts towards developing Wikisource. &lt;/b&gt;
        &lt;h2&gt;Preface&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Currently, CIS-A2K is working with five Indian-languages Wikimedia communities (Kannada, Konkani, Marathi, Odia, and Telugu) and one focus project area (Wikisource with punjabi community). While working with the above mentioned Indic Wikimedia communities, we noticed that there are many similarities between the issues and challenges faced by these communities. So, we decided to create this “Wikisource Handbook for Indian Communities”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At first, we went through the Wikisource of each language and noted the status. Then we talked to Indic Wikipedians to know more about the Wikisource related issues that they are facing. We also asked for the feedback on the first draft of this handbook. Our actual work will start after the release of this book, when we’ll work with the communities to improve their efforts towards developing Wikisource.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Click to download the &lt;b&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/files/wikisource-handbook-for-indian-communities"&gt;Wikisource Handbook for Indian Communities&lt;/a&gt;&lt;/b&gt; co-authored by Bodhisattwa Mandal and Ananth Subray P V. with graphics support from Saumya Naidu.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/wiki-source-handbook-for-indian-communities'&gt;https://cis-india.org/a2k/blogs/wiki-source-handbook-for-indian-communities&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Bodhisattwa Mandal and Ananth Subray P. V.</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>CIS-A2K</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Wikimedia</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2018-09-19T02:18:40Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/silicon-plateau-volume-two">
    <title>Silicon Plateau: Volume Two</title>
    <link>https://cis-india.org/raw/silicon-plateau-volume-two</link>
    <description>
        &lt;b&gt;Silicon Plateau is an art project and publishing series that explores the intersection of technology, culture and society in the Indian city of Bangalore. Each volume of the series is a themed repository for research, artworks, essays and interviews that observe the ways technology permeates the urban environment and the lives of its inhabitants. This project is an attempt at creating collaborative research into art and technology, beginning by inviting an interdisciplinary group of contributors (from artists, designers and writers, to researchers, anthropologists and entrepreneurs) to participate in the making of each volume.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Download the book: &lt;a href="https://files.cargocollective.com/c221119/SiliconPlateau_VolumeTwo.epub"&gt;Epub&lt;/a&gt; and &lt;a href="https://files.cargocollective.com/c221119/SiliconPlateau_VolumeTwo.pdf"&gt;PDF&lt;/a&gt;&lt;/h4&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;em&gt;Silicon Plateau Volume 2&lt;/em&gt; explores the ecosystem of mobile apps and their on-demand services. The book investigates how apps and their infrastructure are impacting our relationship with the urban environment; the way we relate and communicate with each other; and the way labour is changing. It also explores our trust in these technologies, and their supposed capacity to organise things for us and make them straightforward—while, in exchange, we relentlessly feed global corporations with our GPS data and online behaviours.&lt;/p&gt;
&lt;p&gt;The sixteen book contributors responded to a main question: what does it mean to be an app user today—as a worker, a client, or simply an observer?&lt;/p&gt;
&lt;p&gt;The result is a collection of stories about contemporary life in Bangalore; of conversations and deliberations on how we behave, what we sense, and what we might think about when we use the services that are offered to us on demand, through just a tap on our mobile screens.&lt;/p&gt;
&lt;p&gt;Website: &lt;a href="https://siliconplateau.info/" target="_blank"&gt;siliconplateau.info&lt;/a&gt;&lt;/p&gt;
&lt;h4&gt;Contributors&lt;/h4&gt;
&lt;p&gt;Sunil Abraham and Aasavri Rai, Yogesh Barve, Deepa Bhasthi, Carla Duffett, Furqan Jawed, Vir Kashyap, Saudha Kasim, Qusai Kathawala, Clay Kelton, Tara Kelton, Mathangi Krishnamurthy, Sruthi Krishnan, Vandana Menon, Lucy Pawlak, Nicole Rigillo, Yashas Shetty, Mariam Suhail&lt;/p&gt;
&lt;h4&gt;Editors&lt;/h4&gt;
&lt;p&gt;Marialaura Ghidini and Tara Kelton&lt;/p&gt;
&lt;h4&gt;Publisher&lt;/h4&gt;
&lt;p&gt;Institute of Network Cultures, Amsterdam, in collaboration with the Centre for Internet and Society, India, 2018. ISBN: 978-94-92302-29-8&lt;/p&gt;
&lt;h4&gt;Book and Cover Design&lt;/h4&gt;
&lt;p&gt;Furqan Jawed and Tara Kelton&lt;/p&gt;
&lt;h4&gt;Copyediting&lt;/h4&gt;
&lt;p&gt;Aditya Pandya&lt;/p&gt;
&lt;h4&gt;Supported by&lt;/h4&gt;
&lt;p&gt;Jitu Pasricha, Bangalore; Aarti Sonawala, Singapore; and the Centre for Internet and Society, India.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Cross-posted from &lt;a href="https://networkcultures.org/blog/publication/silicon-plateau-volume-two/" target="_blank"&gt;Institute of Network Cultures&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/silicon-plateau-volume-two'&gt;https://cis-india.org/raw/silicon-plateau-volume-two&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sneha-pp</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Silicon Plateau</dc:subject>
    
    
        <dc:subject>RAW Publications</dc:subject>
    
    
        <dc:subject>Web Cultures</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Publications</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2019-03-13T01:01:27Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/welcome-to-raw-blog">
    <title>Welcome to r@w blog!</title>
    <link>https://cis-india.org/raw/welcome-to-raw-blog</link>
    <description>
        &lt;b&gt;We from the researchers@work programme at the Centre for Internet and Society (CIS) are delighted to announce the launch of our new blog, hosted on Medium. It will feature works by researchers and practitioners working in India and elsewhere at the intersections of internet, digital media, and society; and highlights and materials from ongoing research and events at the researchers@work programme.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;r@w blog: &lt;a href="https://medium.com/rawblog" target="_blank"&gt;Visit&lt;/a&gt; (Medium)&lt;/h4&gt;
&lt;hr /&gt;
&lt;h3&gt;A space for reflections on internet and society, r@w blog is also an attempt to facilitate conversations around contemporary debates and foster creative engagement with research and practice through text, images, sounds, videos, code, and other media forms offered by the internet.&lt;br /&gt;&lt;br /&gt;&lt;/h3&gt;
&lt;h3&gt;r@w blog opens with  an essay on ‘&lt;a href="https://medium.com/rawblog/information-offline-labour-surveillance-and-activism-in-the-indian-it-ites-industry-903c71567d1a" target="_blank"&gt;Information Offline: Labour, Surveillance, and Activism in the Indian IT &amp;amp; ITES Industry&lt;/a&gt;’ by Rianka Roy - as part of an &lt;a href="https://cis-india.org/raw/call-for-essays-offline" target="_blank"&gt;essay series&lt;/a&gt; exploring social, economic, cultural, political, infrastructural, and aesthetic dimensions of the "offline" - and audio recording from a session titled &lt;a href="https://medium.com/rawblog/iloveyou-167665a5145a" target="_blank"&gt;#ILoveYou&lt;/a&gt; by Dhiren Borisa and Dhrubo Jyoti, which was part of the &lt;a href="https://cis-india.org/raw/irc18" target="_blank"&gt;Internet Researchers’ Conference 2018 - #Offline&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;/h3&gt;
&lt;h3&gt;We will publish our (including commissioned/supported) writings and works on this blog, as well as submitted and compiled materials. Please write to raw[at]cis-india[dot]org to submit your works to be considered for publication. Copyright to all material published on this blog are owned by CIS and author(s) concerned, and they are shared under Creative Commons Attribution 4.0 International license.&lt;/h3&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/welcome-to-raw-blog'&gt;https://cis-india.org/raw/welcome-to-raw-blog&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sneha-pp</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>RAW Blog</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Internet Studies</dc:subject>
    

   <dc:date>2019-01-02T11:48:04Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
