<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 21 to 35.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/news/your-signature-could-help-70-million-read"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/business-standard-october-29-2013-somesh-jha-surabhi-agarwal-your-private-data-may-be-online-courtesy-govt"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/privacy-public-property"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/mxmindia-may-27-2015-dyanne-coelho-your-phone-is-a-surveillance-device-your-isp-a-surveillance-provider"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/dna-july-21-2013-shikha-kumar-your-life-is-an-open-facebook"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/hindu-samarth-bansal-december-5-2016-your-digital-wallet-can-be-a-pickpocket"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/cyber-space-hackers-paradise"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/young-scholars-programme-cpr-south-2016"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/young-scholar-tutorials"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/governance-now-april-19-2016-you-will-need-a-license-to-create-whatsapp-group-in-kashmir"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/events/you-too-can-write-on-wikipedia-2014-training-workshop"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/times-of-india-march-30-2015-kim-arora-you-can-still-get-into-trouble-for-online-posts"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/digital-natives/blog/you-are-here"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/home-images/YojanaNov2014.png"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/yogyakarta-meeting-on-open-culture-and-critical-making"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/news/your-signature-could-help-70-million-read">
    <title>Your Signature Could Help 70 Million Read</title>
    <link>https://cis-india.org/news/your-signature-could-help-70-million-read</link>
    <description>
        &lt;b&gt;A humble signature campaign in the city intends to take on a law that prevents the print-impaired from reading. You too can join in and support the cause.&lt;/b&gt;
        
&lt;p&gt;Picture this: You are on a lazy weekend getaway with easy access to a hammock, cool lemonade and your favourite book. This might sound like oh-so common bliss to you, but this scenario is off bounds for over 70 million Indians. The "print-impaired", or in other words, those who cannot read due to a disability, don't have access to nearly 99% of material printed today.&amp;nbsp; A campaign is currently on in Mumbai to change the law, and your endorsement could make a difference.&lt;/p&gt;
&lt;p&gt;"The issue facing a print-impaired person is that when you have a book in standard print, it poses a problem to read," says Dr Sam Taraporevala, Associate Professor and Head of Department, Sociology at St Xavier's College.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Changing the format of a standard book is considered illegal under the Copyright Act of 1957. The Act does not permit conversion of books into a format that can be accessible for the print-impaired (through Braille, screen readers or a digital talking book format, to name a few). To counter this issue and make books accessible to all, Dr Taraporevala (also Director of the Xavier's Resource Centre for the Visually Challenged), has launched a signature campaign.&lt;/p&gt;
&lt;p&gt;"The advantage technology offers is that if an author or publisher wants to make his work accessible, he can do so in real time." The campaign, which is part of a global initiative by the World Blind Union (WBU), Sight Savers International and other organisations, is the first of its kind for the city.&amp;nbsp; It aims at collecting 500 signatures of authors and publishers, who will be directly responsible for bringing about a change. Signing the intent form does not in any way mean that the author is handing over the rights of his book.&lt;/p&gt;
&lt;p&gt;"There is a concern among authors about providing an accessible copy of the book, that it might lead to piracy," says Dr Taraporevala.&amp;nbsp; "I don't condone piracy but it's a reality and this will not add to it significantly. Why allow injustice to prevail because of an artificial fear?"&lt;/p&gt;
&lt;p&gt;Three hundred signatures down and 200 more to go, the race is on for the January 22 deadline. But Dr Taraporevala remains unperturbed. "We will do it. I don't know how but I want to believe anything is possible."&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.mid-day.com/whatson/2010/jan/190110-campaign-St-Xavier-College-Mumbai.htm"&gt;See the original article on Mid-Day&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/your-signature-could-help-70-million-read'&gt;https://cis-india.org/news/your-signature-could-help-70-million-read&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Accessibility</dc:subject>
    

   <dc:date>2011-04-02T13:10:48Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/business-standard-october-29-2013-somesh-jha-surabhi-agarwal-your-private-data-may-be-online-courtesy-govt">
    <title>Your private data may be online, courtesy govt</title>
    <link>https://cis-india.org/news/business-standard-october-29-2013-somesh-jha-surabhi-agarwal-your-private-data-may-be-online-courtesy-govt</link>
    <description>
        &lt;b&gt;Some depts have posted bank account &amp; income details on net for transparency; experts cry privacy breach.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article by Somesh Jha and Surabhi Agarwal was &lt;a class="external-link" href="http://www.business-standard.com/article/economy-policy/your-private-data-may-be-online-courtesy-govt-113102800020_1.html"&gt;published in the Business Standard&lt;/a&gt; on October 29, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;To push the government's agenda of greater transparency and  accountability, several states and central departments might be,  unwittingly, following a bare-it-all approach in posting citizen data  online. And, even sensitive and personal information, such as bank  account numbers and income status, is not being spared. A Business  Standard investigation reveals, with so much citizen data already in the  public domain and more getting added every day, the government could be  jeopardising the privacy of its 1.2 billion citizens, who stand exposed  to a variety of risks, including those of 360-degree profiling and  financial frauds.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For instance, the Centre's National Rural Employment Guarantee Scheme  puts out full bank account numbers of its beneficiaries, along with  details like the amount they received. So, one can easily know the bank  in which most residents of, say, Punjab's Machhiwara district have their  accounts. Also, their account numbers are complete, with photographs.  In the case of Haryana's 25-year-old Ram (surname withheld), the  photograph is not available but one can get his financial details on the  portal, along with the first eight digits of his &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Aadhaar" target="_blank"&gt;Aadhaar&lt;/a&gt; number (the last four have been muted).&lt;br /&gt; &lt;br /&gt; Sample this: The occupation and yearly income of one Amrita of Uttar  Pradesh are just a matter of a few clicks and so are her ration card  number, full address, age, father's/husband's name, category and poverty  status. A farmer from Amethi district, she doesn't have a gas or an  electricity connection, but Lucknow-based Manu, who earns Rs 4 lakh a  year, does have. Amrita's yearly income is Rs 1.2 lakh a year. These  details are all there on their respective ration cards, out in the open  on the government website of Uttar Pradesh, a state that might have gone  overboard in revealing citizen data under the ongoing computerisation  of the public distribution system.&lt;br /&gt; &lt;br /&gt; "If people start publishing information like these and the government  doesn't regulate it through a data protection law, criminal minds can  harvest and combine all databases accurately," says Sunil Abraham,  executive director of Centre for Internet and Society, a Bangalore based  think-tank. People often create passwords and pins based on dates and  numbers very important to them. "A little bit of intelligence and some  amount of social engineering could lead to guesses... and financial  fraud." Even by sifting through just three databases, it is quite easy  to get a random person's details like voter identity card number,  address, name, age, date of birth, ration card number, information on  family members, along with income status and photograph.&lt;br /&gt; &lt;br /&gt; One can argue the electoral roll is a public document and there is  nothing wrong with a person's voter identity card number, full address,  name, age, father's name and even date of birth being easily searcheable  online. But a few states like Uttarakhand have even published  photographs, an element barred from online posting under the law.  Experts argue a massive digitisation exercise is underway in the country  and, with the lack of standards and clear advisories from the Centre,  the situation could worsen in the future.&lt;br /&gt; &lt;br /&gt; A Cabinet minister, who did not wish to be named, said there was a  continuous tug-of-war between the imperative of privacy, which doesn't  allow you to share information; and transparency, which says you should  share it. "Also, the Right to Information Act says if somebody is  receiving government subsidy, it is public information." However, the  Indian laws might not be consistent on this issue as "under Section 43a  of the Information Technology Act, any kind of financial information is  classified as 'sensitive personal information' and can't be put online,"  says an official of the communications and information technology  ministry who has closely worked on drafting of the IT Act.&lt;br /&gt; &lt;br /&gt; But, the IT Act provides an exception for matters covered under the RTI  Act. This could infer that when the recently-approved Food Security Act  comes into being, the income status of two-thirds of the population  (that the Act covers) could be posted online. Also, the law would permit  bank account numbers of beneficiaries of various welfare schemes like  cooking gas subsidy under the ongoing direct benefit transfer scheme to  be made public, as subsidies are transferred directly to accounts under  the project.&lt;br /&gt; &lt;br /&gt; A statement from the office of Rural Development Minister &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Jairam+Ramesh" target="_blank"&gt;Jairam Ramesh&lt;/a&gt; explained the National Rural Employment Guarantee Act provided for  "making available for public scrutiny" all accounts and records related  to the scheme. It added "there appears to be no evident risk of  misappropriation or financial fraud". Sudhir Kumar, secretary in the  Department of Food and Public Distribution, says the whole system needs  to be transparent, especially when huge government subsidy is going out  in the case of PDS. However, "if states are putting unnecessary details  online, it can be looked into". Deputy Election Commissioner Alok Shukla  says, according to an EC order, states are not allowed to put  photographs of voters online to ensure their privacy is safeguarded.  These will be removed if such cases are found. He adds a standard  protocol is also being worked out for states.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/business-standard-october-29-2013-somesh-jha-surabhi-agarwal-your-private-data-may-be-online-courtesy-govt'&gt;https://cis-india.org/news/business-standard-october-29-2013-somesh-jha-surabhi-agarwal-your-private-data-may-be-online-courtesy-govt&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-10-29T05:50:59Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/privacy-public-property">
    <title>Your Privacy is Public Property</title>
    <link>https://cis-india.org/news/privacy-public-property</link>
    <description>
        &lt;b&gt;Rules issued by a control-obsessed government have armed officials with widespread powers to pry into your private life. This article was published in Mail Today on Sunday, May 15, 2011.&lt;/b&gt;
        
&lt;p&gt;The government has gifted itself the power to pry into your electronic personal details without a search warrant. With new IT Rules, it can lay claim to an array of your most sensitive and zealously guarded personal details — ranging from your ATM pin, your net banking password, your credit card details, to the status of your mental health, your DNA profile, and even your sexual orientation. “These rules are a complete invasion of privacy&lt;br /&gt;with immense potentiality of misuse,” says Supreme Court advocate and cyber law expert Pawan Duggal. Drawing attention to the fact that such executive orders are often drafted by government officials who aren’t legally qualified, Duggal asks: "Our medical records and sexual orientation have no bearing on the verification of our identity or our cyber crime record. So why should the state want access to this data?" That is not all. Every key stroke you make at a cyber cafe will now be under the scanner — with cafe owners being asked to maintain logs of your online activities for a minimum of one year. The rules have also turned the heat on internet service providers and social-networking sites to remove objectionable content posted on them, leading to strong objections from Google.&lt;/p&gt;
&lt;p&gt;Under provisions of the Indian Post Office Act, 1898, The Indian Telegraph Act, 1885, and the Information Technology Act, 2000, the state already has the power to snoop through the letters you post, the emails you send and the calls you make. But while such surveillance came with several checks and balances, cyber law experts and internet activists say that the government can now access private data with far more ease.&lt;/p&gt;
&lt;p&gt;"Whenever any government agency needs to access information on individuals, detailed processes need to be followed so that the rights of the citizen are protected. You need a magistrate — who is not part of the government — to sign a search warrant. A home secretary with the centre or state has to sanction a phone tapping request," points out M.R. Madhavan, head of research, PRS Legislative Research.&lt;/p&gt;
&lt;p&gt;These safeguards have not been included for access to electronic databases. "An investigating officer simply needs to give a request in writing, in contravention of all other norms," says Madhavan.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Your privacy is being violated at several levels with the new rules, says Sunil Abraham, executive director of Bangalore’s Centre for Internet and Society. "Cyber cafe owners across the country can now take photos of women coming to their cafes. They also have to show their identity proof. Many women fear they can be harassed on the basis of this information." Cyber cafe owners also have to maintain records on who you are mailing, the subject, how often you access a web page, the packets of data sent and received, etc. Be prepared for rampant leakage of personal information with this provision, warns Abraham.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;"A boy who fancies you could easily bribe the cafe owner to get the list of websites you access. The owner will have all the information on you stored for a minimum of one year. No process of destroying the logs has been specified by the IT rules and regulations," says Abraham.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;The trouble, says Venkatesh Nayak, the Programme Coordinator for Access to Information, Commonwealth Human Rights Initiative, is that everyone is suspect in the eyes of the government because of the perception that terrorists don’t function like organised crime syndicates.&lt;br /&gt;&lt;br /&gt;Privacy concerns are taken far more seriously in the West. "In countries which have a data protection law, there are data protection tribunals and data protection commissioners. It is not that easy for governments to collect sensitive information on individuals and keep it away from them," says Nayak.&lt;/p&gt;
&lt;p&gt;The government, meanwhile, denies any invasion of privacy with the rules. "The intent of the rules is to protect sensitive personal information. The rules do not give any undue powers to government agencies for free access of sensitive personal information," the department of Information Technology has said in a statement.&lt;/p&gt;
&lt;p&gt;Cyber experts aren’t convinced, and believe that the days of greater surveillance lie ahead. "After 9/11, the US Homeland Security had started accessing databases of public libraries to find out what people were reading. The day may not be far for us," is Nayak’s dark projection.&lt;/p&gt;
&lt;p&gt;Read the original published by Mail Today &lt;a class="external-link" href="http://epaper.mailtoday.in/1552011/epaperpdf/1552011-md-hr-29.pdf"&gt;here&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/privacy-public-property'&gt;https://cis-india.org/news/privacy-public-property&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2011-05-18T02:28:11Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/mxmindia-may-27-2015-dyanne-coelho-your-phone-is-a-surveillance-device-your-isp-a-surveillance-provider">
    <title>Your phone is a surveillance device, your ISP a surveillance provider…: Pranesh Prakash</title>
    <link>https://cis-india.org/internet-governance/news/mxmindia-may-27-2015-dyanne-coelho-your-phone-is-a-surveillance-device-your-isp-a-surveillance-provider</link>
    <description>
        &lt;b&gt;“In India there is no special privilege for journalists over ordinary citizens,” Pranesh Prakash, Policy Director at the Centre for Internet and Society began at the workshop entitled ‘Digital Security for Journalists’ organised by the Mumbai Press Club and the Centre for Internet and Society. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post was &lt;a class="external-link" href="http://www.mxmindia.com/2015/05/your-phone-is-a-surveillance-device-your-isp-a-surveillance-provider-and-facebook-and-google-are-spyware-pranesh-prakash/"&gt;published by mxmindia.com&lt;/a&gt; on May 27, 2015. Pranesh Prakash gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;“Even if you don’t care about your own security/privacy, think about you sources. Your sources want privacy,” Prakash said as he began the workshop on how to assess security threats, how to protect sources and how to prevent your ISP from leaking out information. With the growth of the internet since the 1980s, we know we can’t trust everyone; police stations, governments, all engage in surveillance of some sort, he pointed out. Prakash went on to explain the ‘Threat Model’, wherein journalists ought to ask questions like what are you protecting, who are you protecting yourself against, what do you hope to achieve and to what lengths are you willing to go? All of the measures you are going to take to protect your source are going to be inconvenient. Security is always at the cost of convenience he reiterated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Data threat can be intercepted at two levels, Prakash explained; data in transit and data at rest. The important question to ask is which you wish to secure, because the means to secure both are very different.Emails being sent to someone can be intercepted by an outside source in transit. It is easier to secure you own data on your computer, but an email is so much more difficult to secure because there are multiple points where the information is stored. Targeted surveillance is much more difficult to protect yourself against than mass surveillance.&lt;br /&gt;&lt;br /&gt;For WiFi, password protected networks form an encryption, one more barrier to protect you. However, a WEP encrypted network is easy to break through. You need at least a WPAII to be secure enough. Airport networks usually ask for a password after connecting to the WiFi. That too is easy to see through. Avoid using these networks for sensitive work.&lt;br /&gt;&lt;br /&gt; One must keep in mind who they want to secure the data from; whether from a casual threat or an Intelligence Agency like the National Security Agency (NSA), National Technical Research Organisation (NTRO) or Intelligence Bureau (IB).Mass surveillance or non-targeted surveillance is not legal in India. However. the NTRO engages in mass surveillance, for which it was criticised in a Mint article, following which they shifted only to the national borders for surveillance. It is also possible for the NSA to tamper with your laptop before delivery.The NSA’s ANT catalogue has been working on a technology that has a device that can fit within the connector that connects to your keyboards and it can last there years and years without detection. Hence Prakash suggests that if a journalist is working on a sensitive story that if leaked could cause a ruckus, he/she would be safer buying a new computer and paying for it in hard cash.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The more important a source is, the less you must use your phone, Prakash pointed out. Phones leak information time and again, information of time and location. The NSA uses it, the police use it. If you are meeting with someone and you both have your phone, then information that you have met is transmitted. Even without GPS it can track your location, when you receive/send a call/message, as your mobile network needs to access the cell tower you are around in order to reach you.&lt;br /&gt;&lt;br /&gt;Encrypted emails still leak identities. If the police look into an encrypted email, they will still know who you are communicating with. Background information you are doing on a story can also give away a lot you don’t want to be given away. Even with an encrypted email, they have access to your location, IP address, the sender and the receiver of the email, time stamp, Mac id and IMEI.&lt;br /&gt;&lt;br /&gt;End-to-end encryption is the way out here.This means that no one in the middle, including the company can read the emails you send from your company server. End-to-end encryption is the most inconvenient. End-to-end encryption means that you and the party concerned need to come up with a code that the other party needs to be able to decrypt. The software both parties use also needs to be compatible.&lt;br /&gt;&lt;br /&gt;“I recommend using WhatsApp over Viber and Line, Skype over other alternatives and Twitter is also safe, but never use Facebook for sensitive conversations that you don’t want to get out,” Prakash said. WhatsApp is safer than normal text messaging he points out. Prakash recommended an app called Conversations to use for messaging on your phone. It is safer than both normal SMSing and WhatsApp. An SMS leaks metadata, he explains, that’s why it is preferable to use data or apps that use the internet.&lt;br /&gt;&lt;br /&gt;In the 2G network space, only Airtel and Docomo use at least a weak encryption.All the rest use no encryption. Anyone can snoop in on your conversations. Instead one must use data-enabled apps for calling like RedPhone, he suggested. This is a great way to protect your source.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Most people are known to repeat passwords for various accounts. Never repeat a password, Prakash advised. Maintain different passwords for all your accounts. It is the safest. And if you are unable to remember them all, then use password managementsoftware like LastPass or KeyPass. These enable you to key in and store all your passwords in one place and you only have to remember the password to your LastPass/KeyPass account. But if you forget your master password, then there is no way to recover all your other passwords.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The session concluded with Prakash working hands-on with the journalists, helping them to download the required software on their laptops and mobile phones. This knowledge is vital for all journalists in order to protect themselves and their sources when doing a high profile, sensitive story, Prakash said.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/mxmindia-may-27-2015-dyanne-coelho-your-phone-is-a-surveillance-device-your-isp-a-surveillance-provider'&gt;https://cis-india.org/internet-governance/news/mxmindia-may-27-2015-dyanne-coelho-your-phone-is-a-surveillance-device-your-isp-a-surveillance-provider&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-06-17T14:53:40Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/dna-july-21-2013-shikha-kumar-your-life-is-an-open-facebook">
    <title>Your life's an open Facebook</title>
    <link>https://cis-india.org/news/dna-july-21-2013-shikha-kumar-your-life-is-an-open-facebook</link>
    <description>
        &lt;b&gt;The jury's out on Facebook's newly introduced Graph Search. While some argue that it's a stalker's dream come true, others say it's a great tool for social research. Shikha Kumar jumps right into the debate.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://www.dnaindia.com/lifestyle/1863603/report-your-life-s-an-open-facebook"&gt;Shikha Kumar's article was published in DNA on July 21, 2013&lt;/a&gt;. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Do this little exercise. Log on to Facebook and type ‘friends of  friends who are single’ or ‘friends of friends who like dancing’ in the  search bar on the top left hand of the screen. A long list of names with  photographs of people you may have never seen in your life will pop up  in front of you. Better still (or worse, depending on perspective), you  can refine this search further with the drop down menu on the right hand  side of the screen; you can filter the results on the basis of gender,  employer, current city, hometown and so on.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Now, depending on whether you are paranoid about your privacy, or don’t  give a damn (since the government is snooping on us anyway), you will  either view this feature as a stalker’s dream come true or just another  irritant to rant about for a day and then forget.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Whatever your reaction, Graph Search, an upgrade on Facebook’s  rudimentary ‘search’, is here to stay and it holds the potential to  forever change the ‘search’ behaviour of its members.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;HOW DOES IT WORK?&lt;br /&gt; Put simply, Graph Search is the Google search of Facebook. It indexes  every little detail you have shared on Facebook — every drunken ‘like’,  every status update, every unflattering photograph you are tagged in,  every joke you’ve shared — so that a simple search can throw up pretty  specific answers. A beta version was unveiled to a select audience in  January but it went live for all English (US) users early last week.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A look at a Tumblr blog called ‘Actual Facebook Graph Searches’ gives  an indication of how specific the results can get. Ranging from humorous  to downright outrageous, some queries posted included ‘Single women who  live nearby and who are interested in men and like Getting Drunk’ and  ‘Married people who like Prostitutes.’&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is exactly why people like Adarsh Matham, a 29-year-old tech  writer, cite as reason for never having been on Facebook. While he does  admit the new feature can be very useful in finding jobs, dates, new  friends and local businesses, he says the downsides trump the benefits.  “Imagine if some pervert searches for ‘girls who like Fifty Shades of  Grey in Mumbai’… It will make it easier for him to stalk them,” says  Matham.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If you use your imagination, the list won’t end. Imagine what perverts  at your workplace and in your apartment complex who are not ‘friends’  with you on Facebook can do with information they glean about you thanks  to Graph Search.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Matham is particularly concerned with Graph Search’s misuse in India  because of our social attitudes and tendency to slot people into types  and judge them immediately. “One of the first things that people do when  they go for a job or on a date is a Google search. Soon they will do a  Graph Search too. This is a complete intrusion of one’s privacy.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham, director at the Bangalore-based Centre for Internet and  Society, thinks the privacy implications are worrying because the  average Indian user is not a ‘power’ user who fully exploits the site’s  advanced features and is thus unclear about what personal information is  public or private. “People need to be very cautious as they’re leaving  behind a digital trail that is always searchable unlike on other  platforms like Twitter. It’s like tattooing yourself, it’s permanent but  you may not be comfortable with it in the future,” he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A brilliant format&lt;/b&gt;&lt;br /&gt; Privacy concerns aside, many have warmed up to the benefits of Graph  Search. Raghu Mohan, a Bangalore-based writer with YourStory.in, has  used it for over six months and has only good things to say about it. “I  think it’s a remarkable engineering feat. Any platform with a user data  of over a billion people needs to come up with such a search facility,”  says Mohan, adding that the tool has been very useful in finding  work-related data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Chetan Asher, founder and CEO of Tonic Media, a social media agency,  agrees with him, saying the new feature is “very exciting” purely  because of its ability to index information that was always there, but  was buried somewhere. “The simple phrase-like format is brilliant… It  completely changes the way you network and mine for information.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mohan adds that start-ups can benefit with what the feature offers.  “Though not a complete marketing tool, Graph Search patterns can also  provide more targeted behaviour for advertisers.” Mohan also looks at  the feature as a social influencer. “If I’m looking to buy a new car,  I’d rather use Graph Search to find out opinions based on my friends’  recommendations than a web search involving strangers,” he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;From his experience, Asher says that the site doesn’t compromise the  privacy settings that the user has set. But Ankit Tuteja, a 23-year-old  technology expert in Delhi, would beg to differ with this. Tuteja has  experimented with random searches to gauge how the feature worked with  different privacy settings and found that Facebook tends to override  certain security settings. “The security of your photographs are a major  cause for concern,” he cautions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For those concerned about privacy, it’s best to think carefully before  ‘liking’ or uploading anything as it will remain in the digital realm  forever, says Abraham. Mohan shrugs off privacy concerns as overrated.  “You lost your personal life when you went online. Stalking can happen  otherwise too.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This innovation is clearly important to the company. While Asher says  it is part of Facebook’s long-term plans to move beyond networking,  Abraham says that faced with slow overall growth globally (except in  markets like India), such innovations are just an attempt to keep its  user base intact.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The more things change...&lt;/b&gt;&lt;br /&gt; Whatever the reaction, Facebook is probably banking on the fact that  after initial protests and social media debates, people will come around  to accepting this intrusion into their private lives.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The American news satire website The Onion pretty much nailed this  when, in a satirical piece, it ‘quoted’ Zuckerberg as saying: “Facebook  will introduce a bunch of new features that everyone will hate, that  will make your experience worse, you will complain about it, and then  you will realize you are utterly powerless to do anything about these  new features, at which point you will move on and continue to use our  product every single day. Any users who strongly disagree with their  policy should feel free to deactivate their accounts and reactivate them  two days later.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Admit it, you’ll probably be one of them.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/dna-july-21-2013-shikha-kumar-your-life-is-an-open-facebook'&gt;https://cis-india.org/news/dna-july-21-2013-shikha-kumar-your-life-is-an-open-facebook&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-26T04:53:11Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/hindu-samarth-bansal-december-5-2016-your-digital-wallet-can-be-a-pickpocket">
    <title>Your digital wallet can be a ‘pickpocket’ </title>
    <link>https://cis-india.org/internet-governance/news/hindu-samarth-bansal-december-5-2016-your-digital-wallet-can-be-a-pickpocket</link>
    <description>
        &lt;b&gt;If you have installed a wallet app on your smartphone, be careful. Many such apps can access data, even sensitive personal information, and have features that do more than just make payments. All that, with your due “permission”.
&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Samarth Bansal was &lt;a href="http://www.thehindu.com/news/national/Your-digital-wallet-can-be-a-%E2%80%98pickpocket%E2%80%99/article16760772.ece?utm_source=RSS_Feed&amp;amp;utm_medium=RSS&amp;amp;utm_campaign=RSS_Syndication"&gt;published           in the Hindu&lt;/a&gt; on December 5, 2016. Pranesh Prakash was         quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;br /&gt;When installing them, the apps display a list of permissions. The user is prompted to either grant permission to access to SMSs, call records and so on or decline, but the latter means rejecting the download. Barring a small fraction of tech-savvy users, most go with the flow, ignoring the permissions section.&lt;br /&gt;&lt;br /&gt;The Hindu reviewed permissions sought by five wallet applications: MobiKwik, Freecharge, PayTM, Jio Money and Airtel Money.&lt;br /&gt;&lt;br /&gt;Freecharge and Jio Money seek permission to “directly call phone numbers”. The app can call up numbers without notifying you. In fact, Freecharge asks to “read call log”. All five require permission to “read contacts”, which, as PayTM mentions, “gives you the ability to pick a number from contacts for a quick recharge or bill payment” or “helps you send and request money from friends”. FreeCharge and PayTM ask permission to “modify contacts” and “record audio”.&lt;br /&gt;&lt;br /&gt;PayTM is the only one that requests to “read your web bookmarks and history”. According to AndroidPit, an Android-centred news portal, this permission is needed for alternative browsers, back-up tools and possibly some social networking apps. For the rest, it is possibly a way to “spy on user’s browsing behaviour”, the portal says.&lt;br /&gt;Wealth of data&lt;br /&gt;&lt;br /&gt;Pranesh Prakash, policy director at the Centre for Internet and Society, told The Hindu that access to a wealth of data about the user enables various other business models.&lt;br /&gt;&lt;br /&gt;“A mobile wallet application, using location tracking data, can tell a user about the discounts available on a nearby store if the payment is conducted using that platform. If the user is not explicitly made aware of such usage of data, I would call it a misuse of information,” he said. Note that “precise” location tracking feature, via GPS or mobile network, is a feature requested by all.&lt;br /&gt;&lt;br /&gt;For PayTM, there is a mismatch between the complete set of permissions it asks for — as stated in the app store — and the ones it mentions on a dedicated page on its website explaining “PayTM app permissions”. Apart from the six basic features, there is no mention about functions like location tracking or reading web history — which it requires — on the web page.&lt;br /&gt;&lt;br /&gt;“In this regard, PhonePe [another wallet app] is the model to follow: it clearly states the permissions it is seeking and explains why it needs each one of those at the time of set-up.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/hindu-samarth-bansal-december-5-2016-your-digital-wallet-can-be-a-pickpocket'&gt;https://cis-india.org/internet-governance/news/hindu-samarth-bansal-december-5-2016-your-digital-wallet-can-be-a-pickpocket&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Management</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-12-05T01:44:29Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/cyber-space-hackers-paradise">
    <title>Your cyber space is a hackers paradise</title>
    <link>https://cis-india.org/news/cyber-space-hackers-paradise</link>
    <description>
        &lt;b&gt;It Looks like hackers are having a ball targeting all kinds of websites — gaming, news, government, personal email and even those run by terror networks, writes Shayan Ghosh. The article was published in Mail Today on June 6, 2011.&lt;/b&gt;
        
&lt;p&gt;After Sony PlayStation Network and Gmail breaches this week, the latest is an attack on Sony Pictures.&lt;/p&gt;
&lt;p&gt;The hackers who broke into the Sony Pictures website have collected private information such as passwords and email identities.&lt;/p&gt;
&lt;p&gt;"A group of criminal hackers known as LulzSec claimed to have breached some of our websites," CEO of Sony Pictures Entertainment Michael Lynton said.&lt;/p&gt;
&lt;p&gt;LulzSec, involved in the hacking of several leading US media firms last month, however, has another story to tell. The group blamed Sony Pictures for carelessness.&lt;br /&gt;&lt;br /&gt;"Every bit of data we took wasnt encrypted. Sony stored over 10 lakh passwords of its customers in plaintext, which means it is just a matter of taking it." "We broke into SonyPictures. com and compromised over 10 lakh users personal information, including passwords, email addresses, home addresses, dates of birth, and all Sony data associated with their accounts.&lt;/p&gt;
&lt;p&gt;Among other things, we also compromised all administration details of Sony Pictures ( including passwords) along with 75,000 music codes and 3.5 million coupons", the group said in a post on Pastebin. com . Google mail, too, was breached this week and the hackers gained access to email accounts of hundreds of people, including senior US government officials and journalists. Google confirmed that Gmail accounts were hacked." We recently uncovered a campaign to collect user passwords, likely through phishing,” the search, cloud and net tech giant said on its blog.&lt;/p&gt;
&lt;p&gt;Asked about reports that Gmail accounts of some Indian diplomats based in China had been hacked, Google declined to comment, saying it had no data of any specific people whose accounts have been hacked.&lt;/p&gt;
&lt;p&gt;But the company pointed fingers at China.&lt;/p&gt;
&lt;p&gt;"This campaign, which appears to originate from Jinan in China, affected what seem to be the personal Gmail accounts of hundreds of users, including senior US government officials, Chinese political activists, officials in several Asian countries ( predominantly South Korea), military personnel and journalists, among others," a posting on the companys official blog said.&lt;/p&gt;
&lt;p&gt;Indian experts, too, blame Chinese hackers. "China poses a serious threat to our national security as these hacking issues dont just seem to stop," Ahmedabadbased cybercrime consultant Sunny Vaghela said.&lt;/p&gt;
&lt;p&gt;The hackers probably targeted Gmail because of the number of users they have, Vaghela added.&lt;/p&gt;
&lt;p&gt;All regimes have now started implementing surveillance mechanisms on the Internet. This is a disturbing trend all over the world.&lt;/p&gt;
&lt;p&gt;China has supremacy on it mainly because they are an early adopter of Internet surveillance and content filtering mechanisms,” a software consultant based in Bangalore, Anivar Aravind, said.&lt;/p&gt;
&lt;p&gt;"Its become more about proving a point. Hackers want to tell people that I can hack into your system and show its vulnerability," Center for Internet and Society director of research in Bangalore Nishant Shah said.&lt;/p&gt;
&lt;p&gt;But LulzSec has its own logic: "Our goal here is not to come across as master hackers… Why do you put such faith in a company that allows itself to become open to these simple attacks?"&lt;/p&gt;
&lt;p&gt;Online Safety Measures&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Secure your Email:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Change passwords often&lt;/li&gt;&lt;li&gt;Use the Gmail feature to check your “ last account activity”. It shows the IP address ( denoting a specific computer) used to access your email &lt;br /&gt;&lt;/li&gt;&lt;li&gt;Do not open unknown email attachments&lt;/li&gt;&lt;li&gt;Do not store sensitive and personal data in email accounts&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Things to Avoid&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Do not visit unknown sites; Use different passwords for different accounts&amp;nbsp;&lt;/li&gt;&lt;li&gt;Do not divulge credit card numbers over emails or on social networks&amp;nbsp;&lt;/li&gt;&lt;li&gt;Keep track of your credit/ debit card account&amp;nbsp;&lt;/li&gt;&lt;li&gt;For online transactions use encrypted websites. Look for SSL certificate or padlock icon&lt;br /&gt;&lt;br /&gt;Read the original published by Mail Today &lt;a class="external-link" href="http://epaper.mailtoday.in/showstory.aspx?queryed=9&amp;amp;querypage=22&amp;amp;boxid=315562&amp;amp;parentid=54412&amp;amp;eddate=Jun%20%206%202011%2012:00AM&amp;amp;issuedate=NaNundefinedundefined"&gt;here&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/cyber-space-hackers-paradise'&gt;https://cis-india.org/news/cyber-space-hackers-paradise&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2011-08-23T00:58:21Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/young-scholars-programme-cpr-south-2016">
    <title>Young Scholars' Programme, CPRSouth 2016</title>
    <link>https://cis-india.org/internet-governance/news/young-scholars-programme-cpr-south-2016</link>
    <description>
        &lt;b&gt;Rohini Lakshané took part in the Young Scholars' Programme organized by Communication Policy Research South from September 6 to 7, 2016 in Zanzibar.&lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;CPRsouth 2016 Young Scholar Awards&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Following highly successful joint Afro-Asian CPR conferences in Mauritius in 2012, and India in 2013, CPRafrica and CPRsouth formally merged under the banner of CPRsouth in 2014. Since then, CPRsouth has hosted conferences in the Cradle of Humankind in South Africa (2014), and at the Innovation Center for Big Data and Digital Convergence at Yuan Ze University, Taiwan (2015).&lt;br /&gt;&lt;br /&gt;This year’s conference is co-hosted by COSTECH and TCRA in Zanzibar from 8-10 September. It will include sessions on cutting-edge developments in ICT policy and regulation in the South and discussion of the research-policy interface.&lt;br /&gt;&lt;br /&gt;As part of the capacity building initiative, 30 Young Scholars from Africa and the Asia-Pacific region have been selected to participate in a tutorial programme. They will be taught by recognised scholars and practitioners from Africa and Asia, and will be attending the main conference thereafter.  Congratulations to the Young Scholars of 2016. See the &lt;a class="external-link" href="http://researchictafrica.net/ria_rap/2016/05/24/cprsouth-2016-young-scholar-awards/"&gt;list here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/young-scholars-programme-cpr-south-2016'&gt;https://cis-india.org/internet-governance/news/young-scholars-programme-cpr-south-2016&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>ICT</dc:subject>
    

   <dc:date>2016-09-23T01:03:13Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/young-scholar-tutorials">
    <title>Young Scholar Tutorials</title>
    <link>https://cis-india.org/news/young-scholar-tutorials</link>
    <description>
        &lt;b&gt;Communication Policy Research South organised this workshop on September 3 and 4, 2013. Nehaa Chaudhari participated in the event organised by CPR South.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Rohan Samarajiva, Christoph Stork, Marcio Aranha, Ang Peng Hwa, and Sujata Gamage were the speakers. Unedited notes from the workshop can be accessed by clicking on the links below:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/cpr-south-1" class="internal-link"&gt;CPR South Tutorial Note&lt;/a&gt; (1)&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/cpr-south-2" class="internal-link"&gt;CPR South Tutorial Note&lt;/a&gt; (2)&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;Click to &lt;a class="external-link" href="http://www.cprsouth.org/tutorials-2/"&gt;read the original here&lt;/a&gt;.&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/young-scholar-tutorials'&gt;https://cis-india.org/news/young-scholar-tutorials&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-09-30T11:21:25Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/governance-now-april-19-2016-you-will-need-a-license-to-create-whatsapp-group-in-kashmir">
    <title>You will need a license to create a WhatsApp group in Kashmir</title>
    <link>https://cis-india.org/internet-governance/news/governance-now-april-19-2016-you-will-need-a-license-to-create-whatsapp-group-in-kashmir</link>
    <description>
        &lt;b&gt;The internet rights activists have criticised the move stating it as unconstitutional.&lt;/b&gt;
        &lt;p&gt;The article was &lt;a class="external-link" href="http://www.governancenow.com/news/regular-story/you-may-need-a-license-in-kashmir-run-a-whatsapp-group"&gt;published by Governance Now&lt;/a&gt; on April 19, 2016. Pranesh Prakash tweeted on this.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Moving beyond internet ban, Kashmir’s Kupwara district issued a notice asking all admins of WhatsApp news groups to register their groups with the district authority within ten days.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With this move, the authorities are taking power in their hands to monitor WhatsApp news groups owned by private individuals. However, internet rights activists criticised it saying the move is unconstitutional as it breaches freedom of speech.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The circular is issued under the subject of ‘registering of WhatsApp news group and restrictions for spreading rumours thereof’.  The district magistrate said that any spread of information by these WhatsApp news groups, “leading to untoward incidents will be dealt under the law”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;You may need a license in Kashmir to run a WhatsApp group&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/WhatsApp.jpg" alt="WhatsApp" class="image-inline" title="WhatsApp" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The valley witnessed five-day internet shutdown following the Handwara firing incident.  Internet ban is a common phenomenon in Kashmir. &lt;br /&gt;&lt;br /&gt; “For how long will the government decide whether we can communicate with each other or not? Actually, the authorities do not want us to spread the truth about the army’s atrocities far and wide,” said a resident of Handwara as quoted in Kashmir Reader.&lt;br /&gt;&lt;br /&gt; Earlier, parts of Haryan and Gujarat also witnessed internet ban during Jat and Patidar agitation, respectively.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://www.governancenow.com/gov-next/egov/hard-broad-ban-internet-haryana-jat-agitation" target="_blank"&gt;&lt;span&gt;Blocking all internet access &lt;/span&gt;&lt;/a&gt;is clearly an unnecessary and disproportionate measure that cannot be countenanced as a ‘reasonable restriction’ on freedom of expression and the right to seek and receive information, which is an integral part of the freedom of expression,” said Pranesh Prakash.&lt;br /&gt;&lt;br /&gt; For instance, he adds, a riot-affected woman seeking to find out the address of the nearest hospital cannot do so on her phone. “Instead of blocking access to the internet, the government should seek to quell rumours by using social networks to spread the truth, and by using social networks to warn potential rioters of the consequences,” he said. &lt;br /&gt;&lt;br /&gt; Former Mumbai police commissioner Rakesh Maria used WhatsApp to counter rumours spread after circulation of a fake photo in January 2015. &lt;br /&gt;&lt;br /&gt; “The way in which the ban is imposed is unreasonable. Problem is in the method that is being used in absence of guidelines, defining circumstances under which they can impose a restriction on internet sites,” says Arun Kumar, head of cyber initiatives at Observer Research Foundation (ORF). &lt;br /&gt;&lt;br /&gt; If government formulates these rules or guidelines it will set a threshold for state or central authorities, which will define the urgency of imposing ban on internet services.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/governance-now-april-19-2016-you-will-need-a-license-to-create-whatsapp-group-in-kashmir'&gt;https://cis-india.org/internet-governance/news/governance-now-april-19-2016-you-will-need-a-license-to-create-whatsapp-group-in-kashmir&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>WhatsApp</dc:subject>
    

   <dc:date>2016-04-21T02:34:46Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/events/you-too-can-write-on-wikipedia-2014-training-workshop">
    <title>You Too Can Write on Wikipedia! — Training workshop</title>
    <link>https://cis-india.org/events/you-too-can-write-on-wikipedia-2014-training-workshop</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society's Access to Knowledge (CIS-A2K) team in collaboration with Andhra Pradesh Tourism Development Corporation and National Institute of Tourims and Hospitality Management is organizing a two-days training workshop (December 5-6, 2013) in Gachibowli, Hyderabad.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;As you may know, Wikipedia is an online encyclopedia, and is the 5th most-visited website in the world! It's completely free to use and re-use, it has no advertising, and is available in more than 280 different languages - including 20+ Indian languages. Wikipedia articles are written by ordinary people who volunteer to share their knowledge with the world.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;What will you gain from Wikipedia editing?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;It improves &lt;b&gt;writing skills&lt;/b&gt;. Wikipedia provides students/professionals/researchers a platform to hone their writing skills. Writing on Wikipedia enhances &lt;b&gt;critical thinking&lt;/b&gt; and the ability&lt;b&gt; to &lt;/b&gt;see all sides of a story. Students will find this incredibility useful in both their personal and professional lives while evaluating the pros and cons of different situations, projects, assignments etc. Wikipedia editing also strengthens &lt;b&gt;research skills&lt;/b&gt;. A Wikipedia editor has to provide credible references by looking up books, journals and online materials. Writing on Wikipedia is a good practice for those who will also work on a thesis or a research project.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Your articles will be read by thousands of people across the globe&lt;/b&gt;. If you edit a Wikipedia article, it is there *forever* and the audience can be any number from the 500 million who read Wikipedia every month!&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;It'll boost your chances in admissions or scholarships or placements&lt;/b&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;It teaches students how to collaborate!&lt;/b&gt; Editing Wikipedia is magical. You add some content and someone from some other part of the class or school or town or country or somewhere else in the world adds a little bit more and makes the contribution that much better. Wikipedia helps one learn how to work productively with other people, even those you don’t know and may never actually meet.&lt;/p&gt;
&lt;p&gt;The workshop will cover the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;What exactly is Wikipedia and how does it work?&lt;/li&gt;
&lt;li&gt;Who edits Wikipedia?&lt;/li&gt;
&lt;li&gt;How do I edit Wikipedia? &lt;/li&gt;
&lt;li&gt;What can I edit?&lt;/li&gt;
&lt;li&gt;How can I input text in Indian languages?&lt;/li&gt;
&lt;li&gt;How do I insert images?&lt;/li&gt;
&lt;li&gt;How do I find and add references?&lt;/li&gt;
&lt;li&gt;Do’s and Don’ts&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;Schedule&lt;/h2&gt;
&lt;p&gt;&lt;span style="text-decoration: underline;"&gt;December 5, 2013&lt;/span&gt; (Day 1)&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Timing&lt;/th&gt;&lt;th&gt;Activity&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;09.30 to 10.00 a.m.&lt;/td&gt;
&lt;td&gt;Welcome and Introduction&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10.00 to 11.15 a.m.&lt;/td&gt;
&lt;td&gt;Building Knowledge Bases and Platforms via Mass Collaboration on the Internet&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11.15 to 11.30 a.m.&lt;/td&gt;
&lt;td&gt;Tea/Coffee Break&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11.30 to 01.00 p.m.&lt;/td&gt;
&lt;td&gt;Wikipedia demonstration + Basics of Wikipedia Editing (hands on activity)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;01.00 to 02.00 p.m.&lt;/td&gt;
&lt;td&gt;Lunch Break&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;02.00 to 02.15 p.m.&lt;/td&gt;
&lt;td&gt;Energizer&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;02.15 to 03.45 p.m.&lt;/td&gt;
&lt;td&gt;Basics of Wikipedia Editing (Hands on activity)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;03.45 to 04.00 p.m.&lt;/td&gt;
&lt;td&gt;Tea/Coffee Break&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;04.00 to 05.30 p.m.&lt;/td&gt;
&lt;td&gt;NPOV on Wikipedia (Spectrogram activity)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;05.30 to 05.45 p.m.&lt;/td&gt;
&lt;td&gt;Look back on what has worked and what has not&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;span style="text-decoration: underline;"&gt;December 6, 2013&lt;/span&gt; (Day 2)&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Timing&lt;/th&gt;&lt;th&gt;Activity&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;09.30 to 11.15 a.m.&lt;/td&gt;
&lt;td&gt;Advanced Wikipedia Editing (Hands on activity)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11.15 to 11.30 a.m.&lt;/td&gt;
&lt;td&gt;Tea/Coffee Break&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11.30 to 01.00 p.m.&lt;/td&gt;
&lt;td&gt;On Wiki activity&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;01.00 to 02.00 p.m.&lt;/td&gt;
&lt;td&gt;Lunch Break&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;02.00 to 02.15 p.m.&lt;/td&gt;
&lt;td&gt;Energizer&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;02.15 to 03.45 p.m.&lt;/td&gt;
&lt;td&gt;Wikimedia projects and Tourism&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;03.45 to 04.00 p.m.&lt;/td&gt;
&lt;td&gt;Tea/Coffee Break&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;04.00 to 05.30 p.m.&lt;/td&gt;
&lt;td&gt;Group Activity – Wiki projects on Tourism&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;05.30 to 05.45 p.m.&lt;/td&gt;
&lt;td&gt;Feedback and Closing session&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;ul&gt;
&lt;li&gt;For map of the venue: click this link: &lt;a class="external-link" href="http://sh.st/r90j"&gt;http://sh.st/r90j&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;For venue: click this link: &lt;a class="external-link" href="http://sh.st/r889"&gt;http://sh.st/r889&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/you-too-can-write-on-wikipedia-2014-training-workshop'&gt;https://cis-india.org/events/you-too-can-write-on-wikipedia-2014-training-workshop&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Wikimedia</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    

   <dc:date>2013-12-06T07:55:38Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/times-of-india-march-30-2015-kim-arora-you-can-still-get-into-trouble-for-online-posts">
    <title>You can still get into trouble for online posts: Digital law experts</title>
    <link>https://cis-india.org/internet-governance/news/times-of-india-march-30-2015-kim-arora-you-can-still-get-into-trouble-for-online-posts</link>
    <description>
        &lt;b&gt;The internet in India is freer now, but individuals could still to get into trouble for online posts, say digital media and law experts. Hailing the Supreme Court judgment on Tuesday as a landmark verdict for free speech in India, experts who have closely read the judgment say there is much to be careful about too. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Kim Arora was &lt;a class="external-link" href="http://timesofindia.indiatimes.com/tech/tech-news/You-can-still-get-into-trouble-for-online-posts-Digital-law-experts/articleshow/46741580.cms"&gt;published in the Times of India&lt;/a&gt; on March 30, 2015. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The scrapping of the contentious section doesn't mean that one has a free run, cautions Sunil Abraham, executive director, Centre for Internet and Society. An online comment can still land you in jail, he says.&lt;br /&gt;&lt;br /&gt;"The judgement in no way means that speech on online platforms will be unregulated now. You can still be charged for pornography or voyeurism under the IT Act. There are many provisions in the Constitution and Indian Penal Code that the government can use to target people it wants to go after. You can be still charged for hate speech or defamation - which is a criminal offence in India - for an online comment," says Abraham.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While lawyer Apar Gupta found the judgment to be forward-looking, he pointed to Para 98 of the 120 page judgment, which addresses Article 14 of the Constitution regarding "discrimination" and talks of the distinction between online and other media.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"We make it clear that there is an intelligible differentia between speech on the internet and other mediums of communication for which separate offences can certainly be created by legislation," says the judgment. "The court has indicated that special offences can be created for the internet. Constant vigilance is the price of liberty. We need to constantly engage with these issues to keep the internet free," says Gupta.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The judgment has been praised for making a distinction between online posts and messages that pertain to advocacy, discussion and incitement. "This is an excellent decision. The SC is saying that no matter what the medium, we stand for constitutional rights. The judges were ready to listen, and ready to share their experience of using the internet also," says Mishi Choudhary, legal director at Software Freedom Law Center, adding, "It was a lost opportunity for the Modi government. They should have gotten rid of section 66 A themselves."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section 69A of the Act, which stands as is, allows non-transparent blocking of online content in the interest of "sovereignty and integrity of India, defense of India, security of the State, friendly relations with foreign states or public order or for preventing incitement to the commission of any cognizable offence relating to above." However, Choudhary says that since it is a narrowly-drawn provision, it ensures more safeguards.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"It will be noticed that Section 69A unlike Section 66A is a narrowly drawn provision with several safeguards. First and foremost, blocking can only be resorted to where the Central Government is satisfied that it is necessary so to do. Secondly, such necessity is relatable only to some of the subjects set out in Article 19(2). Thirdly, reasons have to be recorded in writing in such blocking order so that they may be assailed in a writ petition under Article 226 of the Constitution," she says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Going forward, the government plan of action should focus on balancing safety and freedom on the internet, says Rajya Sabha MP Rajeev Chandrasekhar, who himself was one of the petitioners. "The final endgame has to be one where we have a new law or even a new IT Act which meets the twin objectives of a safe and free internet. The two need not be mutually exclusive," he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(With inputs from Anand J in Bengaluru) &lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/times-of-india-march-30-2015-kim-arora-you-can-still-get-into-trouble-for-online-posts'&gt;https://cis-india.org/internet-governance/news/times-of-india-march-30-2015-kim-arora-you-can-still-get-into-trouble-for-online-posts&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Chilling Effect</dc:subject>
    

   <dc:date>2015-04-02T01:44:32Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/digital-natives/blog/you-are-here">
    <title>You Are Here</title>
    <link>https://cis-india.org/digital-natives/blog/you-are-here</link>
    <description>
        &lt;b&gt;Geo-tagging applications are creating new and impromptu communities of true.&lt;/b&gt;
        &lt;p&gt;As somebody who thinks he is quite “with it” when it comes to digital technologies, my universe was slightly shaken by a bunch of screen-agers. I asked them if they blogged. There were 10 seconds of awkward silence, in which they exchanged looks, cleared throats and fidgeted. I thought I had perhaps crossed a line and they might be uncomfortable sharing their personal blogs with me. The universe of blogs is often restricted to close friends. I was just about to reassure them that they did not have to share theirs, when a bold one looked me in the eye and said, “You still blog? You must be so old! Blogging is, like, so 20th century!” The school kids, their pockets bulging with iPods, PSPs, cellphones and Bluetooth devices all nodded in unison.&lt;/p&gt;
&lt;p&gt;It was a startling realisation that about a decade ago, there were young people, largely in schools and universities, for whom blogging was the coolest thing. Sites like LiveJournal, Blogspot and Wordpress were the hottest addresses. People formed communities, interest groups, meet-up platforms, swap groups and cool-kids’ clubs while providing detailed insights into their personal life and incisive commentary on the world around them. Blogging has been accepted by all sectors of society; governments use them for the dissemination of policies and reports, marketing companies use them to share reviews and invite feedback, schools and universities use them as teaching tools.&lt;/p&gt;
&lt;p&gt;However, after this unsettling adventure, I decided to figure out where the younger generation was spending its time. A little bit of prodding and the screen-agers guided me to interfaces that were more than just screens to access the internet. And so I was introduced to FourSquare, the geo-tagging application that rides on your cellphone and publishes information about your physical location. An app which has become a rage around the world. With the easy availability of smart phones and cheap GPRS access, it has become easy to triangulate one’s position using Global Positioning Systems (via satellite) or your Internet Service Providers. FourSquare, like many other applications, blurs the ever decreasing gap between virtual reality and real life, and now allows users to “check in” at locations that they pass through and publish information about their whereabouts, on sites like Facebook or especially dedicated sites.&lt;/p&gt;
&lt;p&gt;For the digital native it has become a way of forming a support group and a peer network like never before. Of the six digital natives I spoke to, at least two keep track of their close friends through this app. All of them have participated in flash parties, one met his girlfriend because they happened to be in the same coffee shop and sent each other messages. Two confessed to “stalking” somebody in school using the app. And then one told me the story of how FourSquare helped her in a sticky situation. Let’s call her R.&lt;/p&gt;
&lt;p&gt;One night, after a study session with her friends, R and her roommate started their 2 km walk home. On the way, they became aware of a group of boys following them. They were only half-way home and the streets were completely deserted, since it was past midnight. R posted about it on FourSquare, and marked the route she was taking home and sent it to all the people who had checked in at different places on that route. And to her relief and surprise, she immediately received messages on “how to be safe”. One enterprising user asked all the users still awake on the route that R and her friend were taking to come out and stand at their gates. In a matter of minutes, R was delighted to see the streets no longer deserted. On the short walk home, she encountered 17 people, mostly young, standing by and seeing them home to safety. R recalls the incident with pleasure.&lt;/p&gt;
&lt;p&gt;When I asked her about the possibility of somebody else harassing them because they knew they were vulnerable, she looked a little perplexed and said, “but they were all my friends,” despite the fact that she did not know any of them and had never met them. They were together in a design of trust that the application provided and because of their digital commonalities, they had become friends and neighbours and communities of support for each other. “And now you are going to blog about it, aren’t you?” asked R, as all of them burst into giggles.&lt;/p&gt;
&lt;p&gt;Read the original in&lt;a class="external-link" href="http://www.indianexpress.com/news/you-are-here/694540/3"&gt; Indian Express&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/digital-natives/blog/you-are-here'&gt;https://cis-india.org/digital-natives/blog/you-are-here&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Natives</dc:subject>
    

   <dc:date>2011-08-04T10:31:31Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/home-images/YojanaNov2014.png">
    <title>Yojana</title>
    <link>https://cis-india.org/home-images/YojanaNov2014.png</link>
    <description>
        &lt;b&gt;Yojana article&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/home-images/YojanaNov2014.png'&gt;https://cis-india.org/home-images/YojanaNov2014.png&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2014-12-05T01:04:26Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/yogyakarta-meeting-on-open-culture-and-critical-making">
    <title>Yogyakarta Meeting on Open Culture and Critical Making</title>
    <link>https://cis-india.org/news/yogyakarta-meeting-on-open-culture-and-critical-making</link>
    <description>
        &lt;b&gt;Sharath Chandra Ram will be part of the ASIA LABS theme panel and will also be doing community FOSS/FOSH workshops at the Maker events at the event organized by HONF Foundation, Catec, and r0g from June 12 to 15, 2014. &lt;/b&gt;
        &lt;p&gt; &lt;/p&gt;
&lt;p&gt;Venues : Langgeng Art Foundation (LAF) , Ndalem Mangkubumen, Widya Mataram University&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;span&gt;side event:&lt;b&gt;&lt;br /&gt; 03.00pm – 05.30pm (FABLAB_OD24h):&lt;/b&gt;&lt;/span&gt;&lt;br /&gt; &lt;span&gt; Opening Workshop at HONFablab (Fablab Yogyakarta)&lt;/span&gt;&lt;br /&gt; &lt;b&gt;&lt;span&gt;DrawDio Workshop by Helmi Hardian (WAFT, SBY)&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;OPENING | 12 June 2014&lt;/b&gt;&lt;br /&gt; 07.00 PM at Langgeng Art Foundation (LAF) Yogyakarta&lt;/p&gt;
&lt;p&gt;&lt;b&gt;07.00pm – 07.15pm :&lt;/b&gt;&lt;br /&gt; Opening Performance, by Dream Orchestra&lt;/p&gt;
&lt;p&gt;&lt;b&gt;07.15pm – 07.45pm: Welcome Speech and Outline:&lt;/b&gt;&lt;br /&gt; - Ilham Habibie (The Habibie Center, CATEC)&lt;br /&gt; - Stephen Kovats (r0g_)&lt;br /&gt; - Venzha Christ (HONF Foundation) and presents:&lt;br /&gt; - Bapak Muchsan. (Rector of Widya Mataram Univ.)&lt;br /&gt; - Bapak. J. Eka Prijatma (Rector of Sanata Dharma Univ.)&lt;br /&gt; - Gregorius Subanar (Sanata Dharma University)&lt;/p&gt;
&lt;p&gt;&lt;b&gt;08.00pm – 08.30pm:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;Screening Movie “DO TIMI MAKE SINDI”&lt;/b&gt;&lt;br /&gt; Speech: Gentur Suria (Movie Director)&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Opening Exhibition “DO! MAKE!”&lt;/b&gt;&lt;br /&gt; Speech: Irene Agrivina (Exhibition Curator)&lt;/p&gt;
&lt;p&gt;&lt;b&gt;08.30pm – 10.00pm:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;Collaborative Visual and Sound Performance by:&lt;/b&gt;&lt;br /&gt; - Felix Deufel and Friends (DE)&lt;br /&gt; - DJ Wok The Rock (YK)&lt;br /&gt; - DJ Haman &amp;amp; DJ Ones (YK)&lt;/p&gt;
&lt;p&gt;Welcoming Dinner&lt;/p&gt;
&lt;p&gt;&lt;b&gt;10.00pm – 12.00pm:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;Critical Cocktail Session 1.0&lt;/b&gt;&lt;br /&gt; Introduction-get together&lt;/p&gt;
&lt;p&gt;&lt;b&gt;———————–&lt;br /&gt; &lt;span&gt;Side Event:&lt;b&gt;&lt;br /&gt; &lt;b&gt;(FABLAB_OD24h):&lt;/b&gt;&lt;br /&gt; 12 June 2014 | 11.00pm – 12.00pm&lt;br /&gt; Midnight Workshop at HONFablab (Fablab Yogyakarta)&lt;br /&gt; &lt;/b&gt;&lt;/span&gt;&lt;/b&gt;&lt;span&gt;Intelligent Furniture Workshop by DORXLab&lt;/span&gt;&lt;br /&gt; &lt;b&gt;———————–&lt;/b&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;b&gt;CONFERENCE DAY#01 | 13 June 2014&lt;br /&gt; &lt;/b&gt;at Ndalem Mangkubumen, Widya Mataram University&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Side Event:&lt;b&gt;&lt;br /&gt; &lt;b&gt;(FABLAB_OD24h):&lt;/b&gt;&lt;br /&gt; 13 June 2014 | 09.00am – 11.00am&lt;br /&gt; Morning Workshop at HONFablab (Fablab Yogyakarta)&lt;br /&gt; &lt;/b&gt;Edible Book Workshop by Saad Chinoy&lt;/span&gt;&lt;br /&gt; &lt;b&gt;———————–&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;09.00am – 09.15am:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;15 mins Body and Mind Excercise&lt;/b&gt;&lt;br /&gt; short meditation by Craig Warren Smith&lt;/p&gt;
&lt;p&gt;&lt;b&gt;09.30am – 10.00am:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;[proto:type] A &lt;/b&gt;&lt;br /&gt; Opening Speech&lt;br /&gt; &lt;b&gt;Introduction to [proto:type] Y2014 Yogyakarta Meeting of Open Culture and Critical Making&lt;/b&gt;&lt;br /&gt; Technology and Society&lt;br /&gt; by Ilham Habibie (The Habibie Center, CATEC)&lt;/p&gt;
&lt;p&gt;&lt;b&gt;10.00am – 11.30:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;[proto:type] B Session I&lt;/b&gt;&lt;br /&gt; &lt;b&gt;“Open System and Critical ICT4D”&lt;/b&gt;&lt;br /&gt; Moderator: Gregorius Subanar&lt;br /&gt; Panelist:&lt;br /&gt; - Craig Warren Smith&lt;br /&gt; - Etiene Turpin&lt;br /&gt; - Eku Wand&lt;br /&gt; - Sanata Dharma ICT4D&lt;br /&gt; - Yantisa Akhadi&lt;/p&gt;
&lt;p&gt;11.45am – 12.30pm:&lt;br /&gt; Break | Friday Prayer&lt;/p&gt;
&lt;p&gt;12.30pm – 01.15pm:&lt;br /&gt; Open Cultures/P2P Intro &amp;amp; Lunch&lt;/p&gt;
&lt;p&gt;&lt;span&gt;side event:&lt;/span&gt;&lt;br /&gt; &lt;span&gt; 10.00am – 01.30pm:&lt;/span&gt;&lt;br /&gt; &lt;span&gt; &lt;b&gt;Open Workshop at Makers Booth&lt;/b&gt;, Limasan Ndalem Mangkubumen, Widya Mataram University&lt;/span&gt;&lt;br /&gt; &lt;span&gt; Sticthing on Plywood session I by Maken Living Indonesia&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;b&gt;01.30pm – 03.00pm:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;[proto:type] B Session II&lt;/b&gt;&lt;br /&gt; &lt;b&gt;“Open Design and Critical Making”&lt;/b&gt;&lt;br /&gt; Moderator: Bertha Bintari&lt;br /&gt; Panelist:&lt;br /&gt; - Deanna Herst&lt;br /&gt; - Steve McCoy&lt;br /&gt; - Jean Nöel Montagne&lt;br /&gt; - Stefania Druga&lt;br /&gt; - Yoyok Wahyudi Subroto&lt;br /&gt; - Enda Nasution&lt;br /&gt; - Matt Rato (live stream)&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;side event:&lt;/span&gt;&lt;br /&gt; &lt;span&gt; 02.00pm – 04.00pm:&lt;/span&gt;&lt;br /&gt; &lt;span&gt; &lt;b&gt;Open Workshop at Makers Booth&lt;/b&gt;, Limasan Ndalem Mangkubumen, Widya Mataram University&lt;/span&gt;&lt;br /&gt; &lt;span&gt; Fun with Arduino Workshop by Yudianto Asmoro&lt;/span&gt; &lt;span&gt;03.00pm – 05.30pm:&lt;/span&gt;&lt;br /&gt; &lt;span&gt; &lt;b&gt;&lt;b&gt;(FABLAB_OD24h):&lt;/b&gt;&lt;br /&gt; Afternoon Workshop at HONFablab (Fablab Yogyakarta)&lt;br /&gt; &lt;/b&gt;Noise2Noise Workshop by Felix Deufel&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;03.00pm – 03.30pm:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;Critical Cocktail Break&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;04.00pm – 05.00pm:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;[proto:type] C Session III&lt;/b&gt;&lt;br /&gt; &lt;b&gt;“Asia Labs”&lt;/b&gt;&lt;br /&gt; Moderator: Argha Mahendra&lt;br /&gt; Panelist:&lt;br /&gt; - Tommy Surya (Fablab Asia Network)&lt;br /&gt; - Jay Fajardo (Launch Garage – SEA Labs)&lt;br /&gt; - Irene Agrivina (HONF)&lt;/p&gt;
&lt;p&gt;&lt;b&gt;———————–&lt;br /&gt; &lt;/b&gt;&lt;span&gt;side event:&lt;/span&gt;&lt;br /&gt; &lt;span&gt; 04.00pm – 05.30pm:&lt;/span&gt;&lt;br /&gt; &lt;span&gt; &lt;b&gt;Open Workshop at Makers Booth&lt;/b&gt;, Limasan Ndalem Mangkubumen, Widya Mataram University&lt;/span&gt;&lt;br /&gt; &lt;span&gt; Make! with 3D Printer workshop by Weissa Adhiprasetya&lt;/span&gt;&lt;br /&gt; &lt;b&gt;———————–&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;05.00pm – 05.30pm:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;[proto:type] D Session IV&lt;/b&gt;&lt;br /&gt; &lt;b&gt;“Community Development Forum”&lt;/b&gt;&lt;br /&gt; 05.00pm – 05.30pm: Session 4.1 “Open Ecology and Sustainable”&lt;br /&gt; 10 mins presentation for each presenter:&lt;br /&gt; - Performance Klub&lt;br /&gt; - Rumah Kardus&lt;br /&gt; - DORXLab&lt;/p&gt;
&lt;p&gt;05.30pm: Break | Maghrib | Dawn Pray&lt;/p&gt;
&lt;p&gt;06.00pm – 06.30pm: Session 4.2 “(H)acktivism as an open solution&lt;br /&gt; 10 mins presentation for each presenter:&lt;br /&gt; - XXLab&lt;br /&gt; - WAFT&lt;br /&gt; - LPTI Pelataran Mataram&lt;/p&gt;
&lt;p&gt;06.30pm – 07.00pm: Session 4.3: Citizen participation for social change&lt;br /&gt; 10 mins presentation for each presenter:&lt;br /&gt; - Hysteria&lt;br /&gt; - C2O&lt;br /&gt; - Explainer Maker&lt;/p&gt;
&lt;p&gt;07.00pm – 07.45pm: Session 4.4: Development at the Entrepreneurial &amp;amp; Grassroots Level&lt;br /&gt; 10 mins presentation for each presenter:&lt;br /&gt; - House The House&lt;br /&gt; - Klub Makan Siang&lt;br /&gt; - Jalan Emas&lt;br /&gt; - Technonatura&lt;/p&gt;
&lt;p&gt;&lt;b&gt;07.45pm: Jalan Emas Documentation&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;08.00pm – 09.30pm: &lt;/b&gt;&lt;br /&gt; &lt;b&gt;[proto:type] DINNER: MEET &amp;amp; GREET&lt;/b&gt;&lt;br /&gt; Venue: Ndalem Kaneman, Widya Mataram University&lt;br /&gt; Gamelan and performance by Among Bekso Dance&lt;/p&gt;
&lt;p&gt;&lt;b&gt;———————–&lt;/b&gt;&lt;br /&gt; &lt;span&gt;09.00pm – 11.30pm:&lt;/span&gt;&lt;br /&gt; &lt;span&gt; &lt;b&gt;&lt;b&gt;(FABLAB_OD24h):&lt;/b&gt;&lt;br /&gt; Midnight Workshop at HONFablab (Fablab Yogyakarta)&lt;br /&gt; &lt;/b&gt;Fun with Electronics Workshop by Satya Anindita&lt;/span&gt;&lt;br /&gt; &lt;b&gt;———————–&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;10.00pm – 12.00pm:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;FAB BAR&lt;/b&gt;&lt;br /&gt; venue: HONFablab (Fablab Yogyakarta)&lt;/p&gt;
&lt;p&gt;&lt;b&gt;CONFERENCE DAY#02 | 14 June 2014&lt;br /&gt; &lt;/b&gt;at Ndalem Mangkubumen, Widya Mataram University&lt;/p&gt;
&lt;p&gt;&lt;b&gt;09.00am – 09.15am:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;15 mins Body and Mind Excercise&lt;/b&gt;&lt;br /&gt; short meditation by Craig Warren Smith&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;b&gt;———————–&lt;/b&gt;&lt;br /&gt; side event:&lt;br /&gt; 09.00am – 10.30am:&lt;br /&gt; &lt;b&gt;&lt;b&gt;(FABLAB_OD24h):&lt;/b&gt;&lt;br /&gt; Morning Workshop at HONFablab (Fablab Yogyakarta)&lt;br /&gt; Explainer Maker by Andre Takdare&lt;/b&gt;&lt;/span&gt;&lt;br /&gt; &lt;span&gt;10.00am – 01.30pm:&lt;/span&gt;&lt;br /&gt; &lt;span&gt;&lt;b&gt;Open Workshop at Makers Booth&lt;/b&gt;, Limasan Ndalem Mangkubumen, Widya Mataram University&lt;/span&gt;&lt;br /&gt; &lt;span&gt;Sticthing on Plywood session II by Maken Living Indonesia&lt;/span&gt;&lt;br /&gt; &lt;b&gt;———————–&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;09.30am – 10.30am:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;[proto:type] E Session V&lt;/b&gt;&lt;br /&gt; &lt;b&gt;“Y2014 to Y2015 Summit of Critical Making 2015″&lt;/b&gt;&lt;br /&gt; Introduction to [proto:type] Y2014 and toward Y2015 by Stephen Kovats ￼&lt;/p&gt;
&lt;p&gt;&lt;b&gt;09.30am – 10.30am:&lt;br /&gt; &lt;/b&gt;&lt;b&gt;[proto:type] F Session VI&lt;br /&gt; “Open Knowledge as a Platform of Sharing”&lt;br /&gt; &lt;/b&gt;Moderator: Wan Zaleha Radzi&lt;br /&gt; Panelist:&lt;br /&gt; - Elisa Anggraeni&lt;br /&gt; - Yuka Narendra&lt;br /&gt; - Saa￼d Chinoy&lt;br /&gt; - Edin Khoo&lt;br /&gt; - Tia Pamungkas&lt;br /&gt; - Inasanti Susanto&lt;/p&gt;
&lt;p&gt;&lt;b&gt;12.00pm – 01.00pm:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;Lunch&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;———————–&lt;br /&gt; &lt;/b&gt;&lt;span&gt;side event:&lt;br /&gt; 12.00pm – 02.30:&lt;/span&gt;&lt;br /&gt;&lt;b&gt;&lt;b&gt;(FABLAB_OD24h):&lt;/b&gt;&lt;br /&gt; Closing FABLAB_OD24h Workshop at HONFablab (Fablab Yogyakarta)&lt;br /&gt; Introduction to Raspberry Pi by Tommy Surya&lt;br /&gt; &lt;/b&gt;————————&lt;/p&gt;
&lt;p&gt;&lt;b&gt;01.30pm – 03.00pm&lt;/b&gt;&lt;br /&gt; &lt;b&gt;[proto:type] F Session VII&lt;br /&gt; ￼￼”Maker Culture: Of Fields and Labs”&lt;br /&gt; &lt;/b&gt;Moderator: Venzha Christ&lt;br /&gt; Panelist:&lt;br /&gt; - Jeong ok Jeon&lt;br /&gt; - Amrin Hakim&lt;br /&gt; - Marton Kocsev&lt;br /&gt; - Gustaff Hariman Iskandar&lt;br /&gt; - Diyanto Imam&lt;/p&gt;
&lt;p&gt;&lt;b&gt;———————–&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;side event:&lt;br /&gt; 02.00pm – 03.30pm:&lt;/span&gt;&lt;br /&gt; &lt;span&gt;&lt;b&gt;Open Workshop at Makers Booth&lt;/b&gt;, Limasan Ndalem Mangkubumen, Widya Mataram University&lt;/span&gt;&lt;br /&gt; &lt;span&gt;DIY BioPlastic Workshop by Irene Agrivina&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;———————–&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;03.30pm:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;[proto:type] G Session VIII&lt;br /&gt; &lt;/b&gt;Closing speech by Venzha Christ&lt;/p&gt;
&lt;p&gt;–move to Makers Camp–&lt;/p&gt;
&lt;p&gt;&lt;b&gt;MAKERS CAMP DAY#01&lt;/b&gt;&lt;br /&gt; Venue: Tembi Village Yogyakarta&lt;br /&gt; &lt;b&gt;02.00pm – 03.30pm:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;Workshop#01&lt;/b&gt;&lt;br /&gt; Hackidemia Workshop by Stefania Druga&lt;/p&gt;
&lt;p&gt;&lt;b&gt;04.00pm – 05.00pm:&lt;br /&gt; Break&lt;/b&gt;&lt;br /&gt; &lt;b&gt;Traditional Music Performance&lt;/b&gt;&lt;br /&gt; by Tembi Village&lt;/p&gt;
&lt;p&gt;&lt;b&gt;06.00pm – 08.00pm:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;Workshop#02&lt;/b&gt;&lt;br /&gt; DIY Organic Subs Workshop by Blah!&lt;/p&gt;
&lt;p&gt;&lt;b&gt;08.00pm – 10.00pm:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;Workshop#03&lt;/b&gt;&lt;br /&gt; How to Make Ceramics Workshop by Tembi Village&lt;/p&gt;
&lt;p&gt;&lt;b&gt;———————–&lt;br /&gt; &lt;/b&gt;&lt;span&gt;side event:&lt;br /&gt; &lt;b&gt;03.00pm – 01.00am +1&lt;/b&gt;&lt;/span&gt;&lt;br /&gt; &lt;span&gt;&lt;b&gt;cellsDISCO!&lt;/b&gt;&lt;br /&gt; DJ Session&lt;br /&gt; &lt;i&gt;&lt;b&gt;DJ Line-up:&lt;/b&gt;&lt;/i&gt;&lt;br /&gt; DJ Hamam (JKT). DJ Ones (YK). DJ Navis (YK). DJ Latex (YK). DJ Noor  (YK). DJ TIM (YK). DJ Metzdub (YK). DJ Lintang Egha (YK). DJ Felix (DE).  DJ Adit (YK). DJ NDA (YK).&lt;br /&gt; &lt;/span&gt;&lt;b&gt;———————–&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;09.00pm – 10.00pm:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;Makers Dinner&lt;/b&gt;&lt;br /&gt; Dinner is served in traditional way of Tembi Village&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;b&gt;MAKERS CAMP DAY#02&lt;/b&gt;&lt;br /&gt; Venue: Tembi Village Yogyakarta&lt;/p&gt;
&lt;p&gt;&lt;b&gt;07.00am – 09.00am:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;Breakfast&lt;/b&gt;&lt;br /&gt; Breakfast is served in traditional way of Tembi&lt;/p&gt;
&lt;p&gt;&lt;b&gt;11.00am – 01.00pm:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;Workshops:&lt;/b&gt;&lt;br /&gt; Workshop#03: DIY Batik by Tembi Village&lt;/p&gt;
&lt;p&gt;Workshop#04: Open Source Hardware by Yudianto Asmoro&lt;/p&gt;
&lt;p&gt;Workshop#05: Body Hacking by Iwan Wijono&lt;/p&gt;
&lt;p&gt;&lt;i&gt;*workshops are happening on the same time in different spot/space. Participants registration are required&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;01.00pm – 02.00pm:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;Lunch Break&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;02.00pm – 04.00pm:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;Workshops:&lt;/b&gt;&lt;br /&gt; Workshop#06: OS Wash Workshop by Jean Nöel Montagne&lt;/p&gt;
&lt;p&gt;Workshop#07: DIY Greenhouse with Automatic Light by Irene Agrivina&lt;/p&gt;
&lt;p&gt;Workshop#08: DIY Holographic Microscope by Irene Agrivina&lt;/p&gt;
&lt;p&gt;&lt;i&gt;*workshops are happening on the same time in different spot/space. Participants registration are required&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;07.00pm – 08.00pm:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;Makers Dinner&lt;/b&gt;&lt;br /&gt; Dinner is served in traditional way of Tembi Village&lt;/p&gt;
&lt;p&gt;&lt;b&gt;———————–&lt;br /&gt; &lt;/b&gt;&lt;span&gt;side event:&lt;br /&gt; &lt;b&gt;02.00pm – 02.00am +1&lt;/b&gt;&lt;/span&gt;&lt;br /&gt; &lt;span&gt;&lt;b&gt;cellSONIC!&lt;/b&gt;&lt;br /&gt; Bands Performance &amp;amp; DJ Session&lt;br /&gt; &lt;i&gt;&lt;b&gt;Bands Line-up:&lt;/b&gt;&lt;/i&gt;&lt;br /&gt; - - Seek Six Sick – Belkastrelka – Cangkang Serigala – Skandal – Talking  Coasty – Summer in Vienna – Luise Najib - Chika and The Pistol Air –  Distorsi Liar – AHAA – Dinosaur Youth – Fashion Statement (YK)&lt;br /&gt; &lt;i&gt;&lt;b&gt;DJ Line-up:&lt;/b&gt;&lt;/i&gt;&lt;br /&gt; DJ Hamam (JKT). DJ Ones (YK). DJ Navis (YK). DJ Latex (YK). DJ  Noor (YK). DJ TIM (YK). DJ Metzdub (YK). DJ Lintang Egha (YK). DJ  Felix (DE). DJ Adit (YK). DJ NDA (YK).&lt;br /&gt; &lt;/span&gt;&lt;b&gt;———————–&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;02.00am – the next morning:&lt;br /&gt; please, have a rest!&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/yogyakarta-meeting-on-open-culture-and-critical-making'&gt;https://cis-india.org/news/yogyakarta-meeting-on-open-culture-and-critical-making&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2014-07-03T08:57:07Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
