<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 231 to 245.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-response-to-draft-e-commerce-policy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/telecom/blog/cis-comments-on-promoting-local-telecom-equipment-manufacturing"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/cis-a2k-work-plan-july-2016-june-2017"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/celebrating-odia-wikipedias-ninth-anniversary"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/john-doe-orders-isp-blocking-websites-copyright-3"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/john-doe-orders-isp-blocking-websites-copyright-2"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/call-for-essays-studying-internet-in-india-2016"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/call-for-essays-studying-internet-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/call-for-essays-list"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/stil-2020-call"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/comments-online-video-report"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/open-government-data-report"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/breaking-down-section-66-a-of-the-it-act"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/big-data-in-india-benefits-harms-and-human-rights-a-report"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/big-data-reproductive-health-india-mcts"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-response-to-draft-e-commerce-policy">
    <title>CIS Response to Draft E-Commerce Policy</title>
    <link>https://cis-india.org/internet-governance/blog/cis-response-to-draft-e-commerce-policy</link>
    <description>
        &lt;b&gt;CIS is grateful for the opportunity to submit comments to the Department of Industrial Policy and Promotion on the draft national e-commerce policy. This response was authored by Amber Sinha, Arindrajit Basu, Elonnai Hickok and Vipul Kharbanda.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Access our response to the draft policy here: &lt;a href="https://cis-india.org/internet-governance/resources/e-commerce-submission"&gt;Download&lt;/a&gt; (PDF)&lt;/h4&gt;
&lt;hr /&gt;
&lt;h3&gt;The E-Commerce Policy is a much needed and timely document that seeks to enable the growth of India's digital ecosystem. Crucially, it backs up India's stance at the WTO, which has been a robust pushback against digital trade policies that would benefit the developed world at the cost of emerging economies. However, in order to ensure that the benefits of the digital economy are truly shared, focus must not only be on the sellers but also on the consumers, which automatically brings in individual rights into the question. No right is absolute but there needs to be a fair trade-off between the mercantilist aspirations of a burgeoning digital economy and the civil and political rights of the individuals who are spurring the economy on. We also appreciate the recognition that the regulation of e-commerce must be an inter-disciplinary effort and the assertion of the roles of various other departments and ministries. However, we also caution against over-reach and encroaching into policy domains that fall within the mandate of existing laws.&lt;/h3&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-response-to-draft-e-commerce-policy'&gt;https://cis-india.org/internet-governance/blog/cis-response-to-draft-e-commerce-policy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>E-Commerce</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-04-26T06:40:34Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/telecom/blog/cis-comments-on-promoting-local-telecom-equipment-manufacturing">
    <title>CIS Comments on TRAI Consultation Paper on Promoting Local Telecom Equipment Manufacturing</title>
    <link>https://cis-india.org/telecom/blog/cis-comments-on-promoting-local-telecom-equipment-manufacturing</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS) sent comments to the TRAI Consultation Paper on promoting telecom equipment manufacturing. CIS submission drew primarily from the research done in the Pervasive Technologies project.&lt;/b&gt;
        &lt;p&gt;&lt;b&gt;&lt;a class="external-link" href="http://trai.gov.in/sites/default/files/CP_on_Manufacturing_18_09_17.pdf"&gt;Read TRAI's Consultation Paper on Promoting Local Telecom Equipment Manufacturing &lt;/a&gt;&lt;/b&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;Preliminary&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;&lt;span&gt;This submission presents comments by the Centre for Internet and Society, India ("&lt;b&gt;CIS&lt;/b&gt;") on the &lt;i&gt;Consultation Paper on Promoting Local Telecom Equipment Manufacturing &lt;/i&gt;dated 18.09. 2017, released by the Telecom Regulatory Authority of India (TRAI), under Department of Telecom, Ministry of Communications and Information Technologies (“&lt;b&gt;the TRAI Consultation Paper&lt;/b&gt;”).&lt;/span&gt;&lt;span&gt; &lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;span&gt;We commend TRAI for its efforts at seeking inputs from various stakeholders on this important and timely issue and are thankful for the opportunity to put forth our views.&lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;span&gt;We have addressed questions 3 and 5 of the TRAI Consultation Paper. Question numbers referred to in our submission correspond to those in the TRAI Consultation Paper.&lt;/span&gt;&lt;span&gt; &lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;span&gt;Further, the Department of Industrial Planning and Promotion (DIPP) invited comments on SEPs and their availability on FRAND terms on 01. 03. 2016.&lt;a href="#_ftn1" name="_ftnref1"&gt;&lt;span&gt;[1]&lt;/span&gt;&lt;/a&gt; CIS submitted a detailed response to the consultation, and our present submission will draw significantly from our earlier response&lt;a href="#_ftn2" name="_ftnref2"&gt;&lt;span&gt;[2]&lt;/span&gt;&lt;/a&gt;, as well as new empirical research concluded in the since the time of the consultation.&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;About CIS&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;&lt;span&gt;CIS&lt;a href="#_ftn3" name="_ftnref3"&gt;&lt;span&gt;[3]&lt;/span&gt;&lt;/a&gt; is a non-profit organisation that undertakes interdisciplinary research on internet and digital technologies from policy and academic perspectives. Our areas of focus include IP rights, openness, internet governance, telecommunication reform, free speech, intermediary liability, digital privacy, cyber-security, and accessibility for persons with diverse abilities.&lt;/span&gt;&lt;span&gt; &lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;span&gt;We strive to maximise public benefit, useful innovation, vibrant competition and consumer welfare. This submission is consistent with our commitment to the domestic goals (as enumerated in Make in India and Digital India), and the protection of India's national interest at the international level. &lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;Submission on the Issues for Resolution&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;&lt;span&gt;“Q.3 Are the existing patent laws in India sufficient to address the issues of local manufacturers? If No, then suggest the measures to be adopted and amendments that need to be incorporated for supporting the local telecom manufacturing industry.&lt;/span&gt;&lt;/i&gt;&lt;/b&gt;&lt;span&gt;”&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;We submit that amendments to the Patents Act, 1970 may not be preferred, presently. It may be noted that there have been no judgments concluded by Indian courts on disputes relating to licensing of SEPs, yet. Justice Bakhru’s landmark order in &lt;i&gt;Telefonaktiebolaget LM Ericsson (Publ) &lt;/i&gt;v. &lt;i&gt;Competition Commission of India (2016) &lt;/i&gt;provided valuable clarity on the issue of conflict between remedies under Patents Act, 1970 and Competition Act, 1970. As various other matters are yet to be conclusively decided, and given the complex legal questions involved around the interpretation of Patents Act, 1970 and Competition Act, 2002, and constitutional issues around the jurisdiction of regulators and the power of judicial review of the courts, we believe that it would be prudent to examine the ruling of the courts on these issues in some detail, before considering amendments.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;However, to support the local telecom manufacturing industry the Government of India may adopt and implement the following measures: &lt;/span&gt;&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt; &lt;span&gt;Develop Model Guidelines to improve the working of Indian Standard Setting Organisations (SSOs&lt;/span&gt;): &lt;/span&gt;&lt;/b&gt;&lt;span&gt;Given the increasing complexity and time-consuming nature of SEP litigation in India, there is a tangible threat of the abuse of the FRAND process, it might be useful for the government to make suggestions on the working of Indian SSOs. The functioning of Indian SSOs has not been satisfactory and it is suggested that the government develop Model Guidelines that may be adopted by Indian SSOs, taking into account India specific requirements. The India specific requirements include a large and exponentially growing mobile device market which has made it possible for manufacturers, patent owners and implementers alike to achieve financial gains even with a low margin. We believe that this measure will also enable the fulfillment of the objectives of the Make in India and Digital India initiatives.&lt;/span&gt;&lt;span&gt;&lt;br /&gt;&lt;br /&gt;We recommend that various stakeholders, including IP holders, potential licensees and users of IP, civil society organizations, academics, and, government bodies, including the Indian Patent Office, the Department of Telecommunications, the DIPP, TRAI, and, the CCI be consulted in the creation of these Model Guidelines.&lt;/span&gt;&lt;span&gt;&lt;br /&gt;&lt;br /&gt;In our opinion, the Model Guidelines may cover (a) the composition of the SSO; (b) the process of admitting members; (c) the process of the determination of a standard or technical specification; (d) the process of declassification of a standard or technical specification; (e) the IPR Policy; (f) resolution of disputes; (g) applicable law.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt;Initiate the formation of a patent pool of critical mobile technologies and cap royalty payments&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span&gt;&lt;span&gt;:&lt;/span&gt;&lt;/span&gt;&lt;span&gt; In light of the observed inadequacies in the IPR policies of various SSOs in India, as well the spate of ongoing patent infringement lawsuits around mobile technologies, we recommend that the government intervene in the setting of royalties and FRAND terms by setting up a patent pool of critical mobile technologies and apply a compulsory license with a five per cent royalty. Further, patent pools should be required to offer FRAND licenses on the same terms to both members and nonmembers of the pool.&lt;/span&gt;&lt;span&gt; &lt;/span&gt;&lt;span&gt;&lt;br /&gt;&lt;br /&gt;Our motivations for this proposal are manifold. In our opinion, it is nearly impossible for potential licensees to avoid inadvertent patent infringement. As a part of our research on technical standards applicable to mobile phones sold in India, we have found nearly 322 standards so far.&lt;a href="#_ftn4" name="_ftnref4"&gt;&lt;span&gt;[4]&lt;/span&gt;&lt;/a&gt; It is submitted that carrying out patent searches for all the standards would be extremely expensive for potential licensees. Further, even if such searches were to be carried out, different patent owners, SSOs and potential licensees disagree on valuation, essentiality, enforceability, validity, and coverage of patents. In addition, some patent owners are non-practising entities and may not be members of SSOs. The patents held by them are not likely to be disclosed. More importantly, homegrown manufacturers that have no patents to leverage and may be new entrants in the market would be especially disadvantaged by such a scenario. Budget phone manufacturers, standing to incur losses either as a result of heavy licensing fees, or, potential litigation, may close down. Alternatively, they may pass on their losses to consumers, driving the now affordable phones out of their financial reach. With the objectives of Make in India and Digital India in sight, it is essential that Indian consumers continue to have access to devices within their purchasing power.&lt;/span&gt;&lt;span&gt; &lt;/span&gt;&lt;span&gt;&lt;br /&gt;&lt;br /&gt;Further, how did we arrive at a cap of 5 percent? The rationale for this figure is the royalty cap imposed by India in the early 1990s. As part of regulating foreign technology agreements, the (former) Department of Industrial Development (later merged with DIPP) capped royalty rates in the early 1990s. Payment of royalties was capped at either a lump sum payment of $2 million, or, 5 percent on the royalty rates charged for domestic sale, and, 8 percent for export of goods pertaining to “high priority industries”.&lt;a href="#_ftn5" name="_ftnref5"&gt;&lt;span&gt;[5]&lt;/span&gt;&lt;/a&gt; Royalties higher than 5 percent or 8 percent, as the case may be, required securing approval from the government. While the early 1990s (specifically, 1991) was too early for the mobile device manufacturing industry to be listed among high priority industries, the public announcement by the government covered computer software, consumer electronics, and electrical and electronic appliances for home use. The cap on royalty rates was lifted by the DIPP in 2009.&lt;a href="#_ftn6" name="_ftnref6"&gt;&lt;span&gt;[6]&lt;/span&gt;&lt;/a&gt; It is submitted in the case of mobile device technology, we are witnessing a situation similar to that of the 1990s. In this sphere, most of the patent holders are multinational corporations which results in large royalty amounts leaving India. At the same time, litigation over patent infringement in India has limited the manufacture and sale of mobile devices of homegrown brands. While SEP litigation in India is indeed comparable to international SEP litigation on broader issues raised, specifically competition law concerns, but differs crucially where the parties are concerned. International SEP litigation is largely between multinational corporations with substantial patent portfolios, capable of engaging in long drawn out litigations, or engaging in other strategies including setting off against each other’s patent portfolios. Dynamics in the Indian market differ – with a larger SEP holder litigating against smaller manufacturers, many of whom are indigenous, homegrown.&lt;/span&gt;&lt;span&gt;&lt;br /&gt;&lt;br /&gt;In June, 2013, we had recommended to the erstwhile Hon’ble Minister for Human Resource Development&lt;a href="#_ftn7" name="_ftnref7"&gt;&lt;span&gt;[7]&lt;/span&gt;&lt;/a&gt; that a patent pool of essential technologies be established, with the compulsory licensing mechanism. Subsequently, in February, 2015, we reiterated this request to the Hon’ble Prime Minister.&lt;a href="#_ftn8" name="_ftnref8"&gt;&lt;span&gt;[8]&lt;/span&gt;&lt;/a&gt; We propose that the Government of India initiate the formation of a patent pool of critical mobile technologies and mandate a five percent compulsory license.&lt;a href="#_ftn9" name="_ftnref9"&gt;&lt;span&gt;[9]&lt;/span&gt;&lt;/a&gt; As we have stated in our request to the Hon’ble Prime Minister, we believe that such a pool would “&lt;i&gt;possibly avert patent disputes by ensuring that the owners' rights are not infringed on, that budget manufacturers are not put out of business owing to patent feuds, and that consumers continue to get access to inexpensive mobile devices. Several countries including the United States issue compulsory licenses on patents in the pharmaceutical, medical, defence, software, and engineering domains for reasons of public policy, or to thwart or correct anticompetitive practices.&lt;/i&gt;”&lt;a href="#_ftn10" name="_ftnref10"&gt;&lt;span&gt;[10]&lt;/span&gt;&lt;/a&gt; We believe that such a measure will not be in breach of our international obligations under the TRIPS Agreement.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt;Increase transparency in the patent system by making patentees comply with the law&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span&gt;: &lt;/span&gt;&lt;span&gt;The Patents Act, 1970 requires patentees and licensees to submit a statement on commercial working of the invention to the Controller every year.&lt;a href="#_ftn11" name="_ftnref11"&gt;&lt;span&gt;[11]&lt;/span&gt;&lt;/a&gt; Form 27 under section 146(2) of the Act lists the details necessary to be disclosed for compliance of the requirement of “working”. A jurisprudential analysis reveals the rationale and objective behind this mandatory requirement. Undeniably, the scheme of the Indian patent regime makes it amply clear that “working” is a very important requirement, and the public as well as competitors have a right to access this information in a timely manner, without undue hurdles. Indeed, as the decision&lt;a href="#_ftn12" name="_ftnref12"&gt;&lt;span&gt;[12]&lt;/span&gt;&lt;/a&gt; in &lt;i&gt;Natco Pharma &lt;/i&gt;v. &lt;i&gt;Bayer Corporation&lt;a href="#_ftn13" name="_ftnref13"&gt;&lt;b&gt;&lt;span&gt;[13]&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;/i&gt; reveals, the disclosures in Form 27 were crucial to determining the imposition of a compulsory license on the patentee. &lt;b&gt;Thus, broadly, Form 27 disclosures can critically enable willing licensees to access patent “working” information in a timely manner&lt;/b&gt;.&lt;/span&gt;&lt;span&gt; &lt;/span&gt;&lt;span&gt;&lt;br /&gt;&lt;br /&gt;However, there has been little compliance of this requirement by the patentees, despite the Indian Patent Office (&lt;b&gt;IPO&lt;/b&gt;) reiterating the importance of compliance through the issuance of multiple public notices&lt;a href="#_ftn14" name="_ftnref14"&gt;&lt;span&gt;[14]&lt;/span&gt;&lt;/a&gt; (suo motu and in response to a public interest litigation filed in 2011&lt;a href="#_ftn15" name="_ftnref15"&gt;&lt;span&gt;[15]&lt;/span&gt;&lt;/a&gt;), and, reminding the patentees that noncompliance is punishable with a heavy fine.&lt;a href="#_ftn16" name="_ftnref16"&gt;&lt;span&gt;[16]&lt;/span&gt;&lt;/a&gt; Findings of research submitted by one of the parties&lt;a href="#_ftn17" name="_ftnref17"&gt;&lt;span&gt;[17]&lt;/span&gt;&lt;/a&gt; in the writ of the 2011 public interest &lt;i&gt;litigation Shamnad Basheer v. Union of India&lt;/i&gt; &lt;i&gt;and others&lt;/i&gt;&lt;a href="#_ftn18" name="_ftnref18"&gt;&lt;span&gt;[18]&lt;/span&gt;&lt;/a&gt; reveal as follows. First, a large number of Form 27s are unavailable for download from the website of the IPO. This possibly indicates that the forms have either not been filed by the patentees with the IPO, or have not been uploaded (yet) by the IPO. Second, a large number of filings in the telecom sector remain incomplete.&lt;/span&gt;&lt;span&gt;&lt;br /&gt;&lt;br /&gt;In 2015, CIS queried the IPO website for Form 27s of mobile device patents to arrive at a similar conclusion. We obtained 4,916 valid Form 27s, corresponding to 3,126 mobile device patents from public online records. These represented only 20.1% of all Forms 27 that should have been filed and corresponded to only 72.5% of all mobile device patents for which Forms 27 should have been filed. Forms 27 were missing for almost all patentees, and even among Forms 27 that were obtained, almost none contained useful information regarding the working of the subject patents or fully complying with the informational requirements of the Indian Patent Rules.&lt;a href="#_ftn19" name="_ftnref19"&gt;&lt;span&gt;[19]&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;span&gt;&lt;br /&gt;&lt;br /&gt;Further, in our study, we observed that patentees adopted drastically different positions regarding the definition of patent working, some arguing that importation of products into India or licensing of Indian suppliers constituted working, while others even went so far as to argue that the granting of a worldwide license to a non-Indian firm constituted working in India. Several significant patentees claimed that they or their patent portfolios were simply too large to  enable  the  provision of information relating to individual patents, and instead  provided  gross  revenue  and product sale figures, together with historical anecdotes about their long histories in India.&lt;/span&gt;&lt;span&gt;&lt;br /&gt;&lt;br /&gt;The Indian government has made little or no effort to monitor or police compliance with Form 27 filings, undoubtedly leading to significant non-compliance. We also propose the alteration of the Form 27 template&lt;a href="#_ftn20" name="_ftnref20"&gt;&lt;span&gt;[20]&lt;/span&gt;&lt;/a&gt; to include more disclosures.&lt;a href="#_ftn21" name="_ftnref21"&gt;&lt;span&gt;[21]&lt;/span&gt;&lt;/a&gt; Presently, patentees are required to declare number of licensees and sub-licensees. We specifically propose that the format of Form 27 filings be modified to include patent pool licenses, with an explicit declaration of the names of the licensees and not just the number.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;span&gt;&lt;b&gt;Require royalty rates to be decided on the basis of the Smallest Saleable Patent Practicing Component: &lt;/b&gt;Most modern telecommunication and IT devices are complex with numerous technologies working in tandem. Different studies indicate that the number of patents in the US applicable to smartphones is between 200,000 and 250,000.&lt;a href="#_ftn22" name="_ftnref22"&gt;&lt;span&gt;[22]&lt;/span&gt;&lt;/a&gt; A comprehensive patent landscape of mobile device technologies conducted by CIS reveals that nearly 4,000 patents are applicable to mobile phones sold in India.&lt;a href="#_ftn23" name="_ftnref23"&gt;&lt;span&gt;[23]&lt;/span&gt;&lt;/a&gt; It is thus extremely difficult to quantify the exact extent of interaction and interdependence between technologies in any device, in such a way that the exact contribution of the patented technology to the entire device can be determined. Thus, we submit that royalty rates for SEPs should be based on the &lt;i&gt;smallest saleable patent practising component&lt;/i&gt;, and not on the net price of the downstream product.&lt;/span&gt;&lt;span&gt;&lt;br /&gt;&lt;br /&gt;The net cost of the device is almost always several times that of the chipset that implements the patented technology. Armstrong et al&lt;a href="#_ftn24" name="_ftnref24"&gt;&lt;span&gt;[24]&lt;/span&gt;&lt;/a&gt; have found that the cost of a 4G baseband chip costs up to $20 including royalties in a hypothetical $400 phone sold in the US. One of the litigating parties in the ongoing patent infringement lawsuits in India has stated that one of the reasons for preferring to leverage its patents as downstream as possible in the value chain is that it will earn the company more royalties.&lt;a href="#_ftn25" name="_ftnref25"&gt;&lt;span&gt;[25]&lt;/span&gt;&lt;/a&gt; In instances where patent exhaustion occurs much earlier in the value chain, such as in the case of the company’s cross-licenses with Qualcomm (another company that owns patents to chip technologies), the company does not try to obtain royalties from the selling prices of devices for the cross-licensed technologies. It is submitted that such market practices could be detrimental to the government’s objectives such as providing a mobile handset to every Indian by 2020 as a part of the Digital India programme.&lt;a href="#_ftn26" name="_ftnref26"&gt;&lt;span&gt;[26]&lt;/span&gt;&lt;/a&gt; It is also worth noting in this context that the mobile device is the first and only medium of access to the Internet and telecom services for a large number of Indians, and, consequently, the only gateway to access to knowledge, information and critical services, including banking.&lt;a href="#_ftn27" name="_ftnref27"&gt;&lt;span&gt;[27]&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;b&gt;&lt;i&gt;&lt;span&gt;&lt;br /&gt;&lt;br /&gt; “Q.5 Please suggest a dispute resolution mechanism for determination of royalty distribution on FRAND (Fair Reasonable and Non Discriminatory) basis.”&lt;/span&gt;&lt;/i&gt;&lt;/b&gt;&lt;span&gt;&lt;br /&gt;&lt;br /&gt;The licensing of SEPs on FRAND terms requires the parties to negotiate “reasonable” royalty rates in good faith, and apply the terms uniformly to all willing licensees. It is our submission that if the parties cannot agree to FRAND terms, they may enter into &lt;b&gt;binding arbitration&lt;/b&gt;. Further, if all efforts fail, there exist remedies under the Patents Act and the Competition Act, 2002 to address the issues.&lt;/span&gt;&lt;span&gt;&lt;br /&gt;&lt;br /&gt;Section 115 of the Patents Act empowers the court to appoint an independent scientific adviser “&lt;i&gt;to assist the court or to inquire and report upon any such question of fact or of opinion (not involving a question of interpretation of law) as it may formulate for the purpose.&lt;/i&gt;”&lt;a href="#_ftn28" name="_ftnref28"&gt;&lt;span&gt;[28]&lt;/span&gt;&lt;/a&gt; Such an independent adviser may inform the court on the technical nuances of the matter.&lt;/span&gt;&lt;span&gt;&lt;br /&gt;&lt;br /&gt;Further&lt;b&gt;, &lt;/b&gt;under the Patents Act, pending the decision of infringement proceedings the Court may provide interim relief, if the plaintiff proves &lt;i&gt;first, &lt;/i&gt;a prima facie case of infringement; &lt;i&gt;second, &lt;/i&gt;that the balance of convenience tilts in plaintiff’s favour; and, &lt;i&gt;third, &lt;/i&gt;that if an injunction is not granted the plaintiff shall suffer irreparable damage. However, it is our suggestion that courts adopt a more cautious stance towards granting injunctions in the field of SEP litigation. &lt;i&gt;First, &lt;/i&gt;in our opinion, injunctions may prove to be a deterrent to arrive at a FRAND commitment, in particular, egregiously harming the willing licensee. &lt;i&gt;Second, &lt;/i&gt;especially in the Indian scenario, where litigating parties operate in vastly different price segments (thereby targeting consumers with different purchasing power), it is difficult to establish that “irreparable damage” has been caused to the patent owner on account of infringement. &lt;i&gt;Third, &lt;/i&gt;we note the approach of the European Court of Justice, which prohibited the patent holder from enforcing an injunction provided a willing licensee makes an offer for the price it wishes to pay to use a patent under the condition that it deposited an amount in the bank as a security for the patent holder.&lt;a href="#_ftn29" name="_ftnref29"&gt;&lt;span&gt;[29]&lt;/span&gt;&lt;/a&gt; &lt;i&gt;Fourth, &lt;/i&gt;we also note the approach of the Federal Trade Commission in the USA, which only authorizes patent holders to seek injunctive relief against potential licensees who have either stated that they will not license a patent on any terms, or refuse to enter into a license agreement on terms that have been set in the final ruling of a court or arbitrator.&lt;a href="#_ftn30" name="_ftnref30"&gt;&lt;span&gt;[30]&lt;/span&gt;&lt;/a&gt; Further, as Contreras (2015)&lt;a href="#_ftn31" name="_ftnref31"&gt;&lt;span&gt;[31]&lt;/span&gt;&lt;/a&gt; observes, that the precise boundaries of what constitutes as an unwilling licensee remains to be seen. We observe a similar ambiguity in Indian jurisprudence, and accordingly submit that courts should carefully examine the conduct of the licensee to injunct them from the alleged infringement.&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Concluding Remarks&lt;/b&gt;&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;We are thankful to TRAI for the opportunity to make these submissions. It would be our pleasure and privilege to discuss these comments with the TRAI; and, supplement these with further submissions if necessary. We also offer our assistance on other matters aimed at developing a suitable policy framework for SEPs and FRAND in India, and, working towards the sustained innovation, manufacture and availability of mobile technologies in India.&lt;/span&gt;&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;&lt;span&gt;[1]&lt;/span&gt;&lt;/a&gt; Department of Industrial Policy and Promotion Discussion Paper on Standard Essential Patents and their Availability on Frand Terms, available at &lt;a href="https://cis-india.org/a2k/blogs/discussion-paper-on-standard-essential-patents-and-their-availability-on-frand-terms"&gt;https://cis-india.org/a2k/blogs/discussion-paper-on-standard-essential-patents-and-their-availability-on-frand-terms&lt;/a&gt; (last accessed November 13, 2017)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;&lt;span&gt;[2]&lt;/span&gt;&lt;/a&gt; Anubha Sinha, Nehaa Chaudhari and Rohini Lakshane, “CIS’ Comments on Department of Industrial Policy and Promotion Discussion Paper on Standard Essential Patents and their Availability on Frand Terms” (April 23, 2016); available at &lt;a href="https://cis-india.org/a2k/blogs/comments-on-department-of-industrial-policy-and-promotion-discussion-paper-on-standard-essential-patents-and-their-availability-on-frand-terms"&gt;https://cis-india.org/a2k/blogs/comments-on-department-of-industrial-policy-and-promotion-discussion-paper-on-standard-essential-patents-and-their-availability-on-frand-terms&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;&lt;span&gt;[3]&lt;/span&gt;&lt;/a&gt; &lt;a href="http://www.cis-india.org"&gt;www.cis-india.org&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;&lt;span&gt;[4]&lt;/span&gt;&lt;/a&gt; Rohini Lakshané, CIS, List of Technical Standards and IP Types (Working document), available at https://drive.google.com/file/d/0B8SgjShAjhbtaml5eW50bS01d2s/view?usp=sharing (last accessed 13 November, 2017).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;&lt;span&gt;[5]&lt;/span&gt;&lt;/a&gt; Kumkum Sen, News on Royalty Payments Brings Cheer in New Year, available at http://www.businessstandard.com/article/economypolicy/newsonroyaltypaymentbringscheerinnewyear11001 0400044_1.html (last accessed 13 November, 2017).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;&lt;span&gt;[6]&lt;/span&gt;&lt;/a&gt; See Sanjana Govil, Putting a Lid on Royalty Outflows How the RBI Can Help Reduce India’s IP Costs &lt;i&gt;, &lt;/i&gt;available at &lt;a href="http://cisindia.org/a2k/blogs/lidonroyaltyoutflows"&gt;http://cisindia.org/a2k/blogs/lidonroyaltyoutflows&lt;/a&gt; (last accessed 13 November, 2017) for a discussion on the introduction of royalty caps in the early 1990s, and its success in reducing the flow of money out of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;&lt;span&gt;[7]&lt;/span&gt;&lt;/a&gt; Nehaa Chaudhari, Letter for Establishment of Patent Pool for Low cost Access Devices through Compulsory&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Licenses, available at &lt;a href="http://cisindia.org/a2k/blogs/letterforestablishmentofpatentpoolforlowcostaccessdevices"&gt;http://cisindia.org/a2k/blogs/letterforestablishmentofpatentpoolforlowcostaccessdevices &lt;/a&gt;(last accessed 13 November, 2017).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;&lt;span&gt;[8]&lt;/span&gt;&lt;/a&gt; See Rohini Lakshané, Open Letter to PM Modi, available at &lt;a href="http://cisindia.org/a2k/blogs/openlettertoprimeministermodi"&gt;http://cisindia.org/a2k/blogs/openlettertoprimeministermodi&lt;/a&gt; (last accessed 13 November, 2017) for further details of CIS’ proposal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;&lt;span&gt;[9]&lt;/span&gt;&lt;/a&gt; Rohini Lakshané, FAQ: CIS’ proposal to form a patent pool of critical mobile technology, September 2015, available at &lt;a href="http://cisindia.org/a2k/blogs/faqcisproposalforcompulsorylicensingofcriticalmobiletechnologies"&gt;http://cisindia.org/a2k/blogs/faqcisproposalforcompulsorylicensingofcriticalmobiletechnologies &lt;/a&gt;(last accessed 13 November, 2017).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;&lt;span&gt;[10]&lt;/span&gt;&lt;/a&gt; Id.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;&lt;span&gt;[11]&lt;/span&gt;&lt;/a&gt; Section 146(2) of the Patents Act, 1970.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;&lt;span&gt;[12]&lt;/span&gt;&lt;/a&gt; Sai Vinod, Patent Office Finally Takes Form 27s Seriously, available at &lt;a href="http://spicyip.com/2013/02/patentofficefinallytakesform27s.html"&gt;http://spicyip.com/2013/02/patentofficefinallytakesform27s.html&lt;/a&gt; (last accessed 13 November, 2017).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;&lt;span&gt;[13]&lt;/span&gt;&lt;/a&gt; Order No. 45/2013 (Intellectual Property Appellate Board, Chennai), available at &lt;a href="http://www.ipab.tn.nic.in/0452013.htm"&gt;http://www.ipab.tn.nic.in/0452013.htm&lt;/a&gt; (last accessed 13 November, 2017).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;&lt;span&gt;[14]&lt;/span&gt;&lt;/a&gt; Intellectual Property India, Public Notice, available at&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://www.ipindia.nic.in/iponew/publicNotice_Form27_12Feb2013.pdf"&gt;http://www.ipindia.nic.in/iponew/publicNotice_Form27_12Feb2013.pdf&lt;/a&gt; ((last accessed 13 November, 2017) &lt;i&gt;and &lt;/i&gt;Intellectual Property India, Public Notice, available at &lt;a href="http://ipindia.nic.in/iponew/publicNotice_24December2009.pdf"&gt;http://ipindia.nic.in/iponew/publicNotice_24December2009.pdf&lt;/a&gt; (last accessed 13 November, 2017).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;&lt;span&gt;[15]&lt;/span&gt;&lt;/a&gt; Supra note 11.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;&lt;span&gt;[16]&lt;/span&gt;&lt;/a&gt; Id.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;&lt;span&gt;[17]&lt;/span&gt;&lt;/a&gt; See research findings available at &lt;a href="http://spicyip.com/wpcontent/uploads/2015/05/FORM27WP1Rcopy.pdf"&gt;http://spicyip.com/wpcontent/uploads/2015/05/FORM27WP1Rcopy.pdf&lt;/a&gt; (last accessed 13 November, 2017).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;&lt;span&gt;[18]&lt;/span&gt;&lt;/a&gt; In the High Court of Delhi, W.P.(C) 5590/2015. This litigation is currently ongoing. See, illustratively, Mathews P. George, &lt;i&gt;Patent Working in India: Delhi HC issues notice in Shamnad Basheer &lt;/i&gt;v&lt;i&gt;. Union of India &amp;amp; Ors. – I &lt;/i&gt;, available  at &lt;a href="http://spicyip.com/2015/09/patentworkinginindiadelhihcissuesnoticeinshamnadbasheervunionofindiaorsi.html"&gt;http://spicyip.com/2015/09/patentworkinginindiadelhihcissuesnoticeinshamnadbasheervunionofindiaorsi.html&lt;/a&gt; (last accessed 13 November, 2017).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;&lt;span&gt;[19]&lt;/span&gt;&lt;/a&gt; Contreras, Jorge L. and Lakshané, Rohini and Lewis, Paxton, Patent Working Requirements and Complex Products (October 1, 2017). NYU Journal of Intellectual Property &amp;amp; Entertainment Law, Forthcoming. Available at SSRN: &lt;a href="https://ssrn.com/abstract=3004283"&gt;https://ssrn.com/abstract=3004283&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref20" name="_ftn20"&gt;&lt;span&gt;[20]&lt;/span&gt;&lt;/a&gt; Form 27, The Patents Act, available at &lt;a href="http://ipindia.nic.in/ipr/patent/manual/HTML%20AND%20PDF/Manual%20of%20Patent%20Office%20Practice%20and%20Procedure%20%20html/Forms/Form27.pdf"&gt;http://ipindia.nic.in/ipr/patent/manual/HTML%20AND%20PDF/Manual%20of%20Patent%20Office%20Practice%20and%20Procedure%20%20html/Forms/Form27.pdf&lt;/a&gt; (last accessed November 13, 10`7).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref21" name="_ftn21"&gt;&lt;span&gt;[21]&lt;/span&gt;&lt;/a&gt; However, we came across some complaints raised by patentees and industry observers regarding the structure of the Form 27 requirement - namely, patents covering complex, multi-component products that embody dozens of technical standards and thousands of patents are not necessarily amenable to the individual-level data requested by Form 27. See Contreras, Jorge L. and Lakshané, Rohini and Lewis, Paxton, Patent Working Requirements and Complex Products (October 1, 2017). NYU Journal of Intellectual Property &amp;amp; Entertainment Law, Forthcoming. Available at SSRN: &lt;a href="https://ssrn.com/abstract=3004283"&gt;https://ssrn.com/abstract=3004283&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref22" name="_ftn22"&gt;&lt;span&gt;[22]&lt;/span&gt;&lt;/a&gt; Mark Lemley and Carl Shapiro, Patent Holdup and Royalty Stacking, &lt;i&gt;85 Tex. L. Rev. at 2015 &lt;/i&gt;; See also, for e.g.,&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;RPX Corporation, Amendment No. 3 to Form Sl,11 Apr. 2011, at 59, available at http://www.sec.gov/Archives/edgar/data/1509432/000119312511101007/ds1a.htm (last accessed 22 April, 2016), quoting &lt;i&gt;“Based on our research, we believe there are more than 250,000 active patents relevant to today’s&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;smartphones…” &lt;/i&gt;.; See further Steve Lohr, Apple Samsung Case Shows Smartphone as Legal Magnet, New York Times, 25 Aug. 2012, available at &lt;a href="http://www.nytimes.com/2012/08/26/technology/applesamsungcaseshowssmartphoneaslawsuitmagnet"&gt;http://www.nytimes.com/2012/08/26/technology/applesamsungcaseshowssmartphoneaslawsuitmagnet&lt;/a&gt;.html (last accessed November13, 2017).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref23" name="_ftn23"&gt;&lt;span&gt;[23]&lt;/span&gt;&lt;/a&gt; Jorge L. Contreras and Rohini Lakshané, Patents and Mobile Devices in India: An Empirical Survey, available at &lt;a href="http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2756486"&gt;http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2756486&lt;/a&gt; (last accessed 13 November, 2017).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref24" name="_ftn24"&gt;&lt;span&gt;[24]&lt;/span&gt;&lt;/a&gt; Ann Armstrong, Joseph J. Mueller and Timothy D. Syrett, The SmartphoneRoyalty Stack:Surveying Royalty Demands for the Components Within Modern Smartphones, available at  &lt;a href="https://www.wilmerhale.com/uploadedFiles/Shared_Content/Editorial/Publications/Documents/TheSmartphoneRoyaltyStackArmstrongMuellerSyrett.pdf"&gt;https://www.wilmerhale.com/uploadedFiles/Shared_Content/Editorial/Publications/Documents/TheSmartphoneRoyaltyStackArmstrongMuellerSyrett.pdf&lt;/a&gt; (last accessed 13 November, 2017)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref25" name="_ftn25"&gt;&lt;span&gt;[25]&lt;/span&gt;&lt;/a&gt; Florian Mueller, Ericsson Explained Publicly why it Collects Patent Royalties from Device (Not Chipset) Makers, available at  &lt;a href="http://www.fosspatents.com/2014/01/ericssonexplainedpubliclywhyits.Html"&gt;http://www.fosspatents.com/2014/01/ericssonexplainedpubliclywhyits.Html&lt;/a&gt; (last accessed 13 November, 2017).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref26" name="_ftn26"&gt;&lt;span&gt;[26]&lt;/span&gt;&lt;/a&gt; Romit Guha and Anandita Singh Masinkotia, PM Modi’s Digital India Project:Government to Ensure that Every Indian has a Smartphone by 2019, available at &lt;a href="http://articles.economictimes.indiatimes.com/20140825/news/53205445_1_digitalindiaindiatodayfinancialservices"&gt;http://articles.economictimes.indiatimes.com/20140825/news/53205445_1_digitalindiaindiatodayfinancialservices&lt;/a&gt; (last accessed 13 November, 2017).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref27" name="_ftn27"&gt;&lt;span&gt;[27]&lt;/span&gt;&lt;/a&gt; Nehaa Chaudhari, Standard Essential Patents on Low Cost Mobile Phones in India: A Case to Strengthen Competition Regulation? available at &lt;a href="http://www.manupatra.co.in/newsline/articles/Upload/08483340C1B94BA4B6A9D6B6494391B8.pdf"&gt;http://www.manupatra.co.in/newsline/articles/Upload/08483340C1B94BA4B6A9D6B6494391B8.pdf&lt;/a&gt; (last accessed 13 November, 2017).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref28" name="_ftn28"&gt;&lt;span&gt;[28]&lt;/span&gt;&lt;/a&gt; Section 115 of the Patents Act, 1970.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref29" name="_ftn29"&gt;&lt;span&gt;[29]&lt;/span&gt;&lt;/a&gt; &lt;i&gt;Huawei Technologies Co. Ltd &lt;/i&gt;v. &lt;i&gt;ZTE Corp. and ZTE Deutschland &lt;/i&gt;, Judgment of the Court (Fifth Chamber) of 16 July 2015 in GmbH C170/13.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref30" name="_ftn30"&gt;&lt;span&gt;[30]&lt;/span&gt;&lt;/a&gt; Third Party United States Fed. Trade Commission’s Statement on the Public Interest, &lt;i&gt;In re Certain Wireless Communication Devices, Portable Music and Data Processing Devices, Computers and Components Thereof&lt;/i&gt;, U.S. Int’l Trade Comm’n, Inv. No. 337TA745 (Jun. 6, 2012).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref31" name="_ftn31"&gt;&lt;span&gt;[31]&lt;/span&gt;&lt;/a&gt; Jorge L. Contreras, A Brief History of FRAND: Analyzing Current Debates in Standard Setting and Antitrust Through a Historical Lens &lt;i&gt;, &lt;/i&gt;80 Antitrust Law Journal 39 (2015), available at h ttp://ssrn.com/abstract=2374983 or &lt;a href="http://dx.doi.org/10.2139/ssrn.2374983"&gt;http://dx.doi.org/10.2139/ssrn.2374983&lt;/a&gt; (last accessed 13 November, 2017).&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/telecom/blog/cis-comments-on-promoting-local-telecom-equipment-manufacturing'&gt;https://cis-india.org/telecom/blog/cis-comments-on-promoting-local-telecom-equipment-manufacturing&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sinha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2017-11-26T02:56:15Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/cis-a2k-work-plan-july-2016-june-2017">
    <title>CIS - A2K Work Plan: July 2016 - June 2017</title>
    <link>https://cis-india.org/a2k/blogs/cis-a2k-work-plan-july-2016-june-2017</link>
    <description>
        &lt;b&gt;One of the key mandates of the Access to Knowledge (A2K) program at the Centre for Internet and Society (CIS) is to work towards catalyzing the growth of the free and open knowledge movement in Indic languages. CIS has been a steward of the Wikimedia movement in India since December 2008. Since September 2012, we at CIS-A2K, have been actively involved in growing the movement in India through (i) a grant received from the Wikimedia Foundation (WMF) for the period September 2012 - June 2014, (ii) the FDC Grant received for the period July 2014 - June 2015 and (iii) the FDC Grant received for the period July 2015 - June 2016. Based on the productive experience of working with various Indic Wikimedia communities, CIS-A2K has developed this work plan for July 2016 to June 2017.&lt;/b&gt;
        
&lt;p&gt;This was originally published on &lt;a class="external-link" href="https://meta.wikimedia.org/wiki/CIS-A2K/Work_plan_July_2016_-_June_2017"&gt;Meta-wiki&lt;/a&gt; on April 2, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;We have revised the work plan template taking into account the changed proposal plan sent out by WMF and in light of the feedback that we have received from FDC assessment during last proposal application. The FDC feedback is taken into account at the level of design, RoI and ensuring quality for all our activities.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;CIS-A2K responses towards Indic communities concerns&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;During the last plan period CIS-A2K received the following complaints, suggestions, and feedback. We have attempted to address the concerns under redesigned CIS-A2K 2.0. This table was first prepared during our progress report for the current grant and A2K would like to acknowledge the learnings derived out of the suggestions and feedback it received during the last plan. Please see the table &lt;strong&gt;&lt;a title="Grants:APG/Proposals/2014-2015 round2/The Centre for Internet and Society/Progress report form" href="https://meta.wikimedia.org/wiki/Grants:APG/Proposals/2014-2015_round2/The_Centre_for_Internet_and_Society/Progress_report_form#CIS-A2K_responses_towards_Indic_communities_concerns"&gt;here.&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Background to CIS-A2K Program&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;CIS-A2K is working with the Indic Wikimedia communities since December 2008, when Jimbo Wales came to India and visited Bangalore. In mid-2012 CIS-A2K received a financial grant from the Wikimedia Foundation (WMF) and since then it has been actively involved in growing the Wikimedia and free knowledge movement in India. Following a grant received from WMF for the period September 2012 to June 2014, CIS-A2K received FDC Grant for the periods July 2014 to June 2015 and July 2015 to June 2016. Based on the 41-month experience of working with various Indic Wikimedia communities, CIS-A2K has prepared this year's work plan for July 2016 to June 2017.&lt;/strong&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Objective&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;CIS-A2K is committed to improve Wikimedia movement in India by supporting Indic Wikimedia communities and working on Wikimedia projects and collaborating with FOSS and other like minded movement partners. It also strives to catalyse the growth of open and free knowledge movement in South Asia and especially in India. Our main objectives are:&lt;/strong&gt;&lt;/p&gt;
&lt;ol style="text-align: justify;"&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;&lt;strong&gt;Bringing content under Creative Commons and similar free licenses;&lt;/strong&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;&lt;strong&gt;Supporting and empowering Indic Wikimedia communities;&lt;/strong&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;&lt;strong&gt;Building and maintaining institutional partnerships in order to support the open knowledge movement and creation of open knowledge resources;&lt;/strong&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;&lt;strong&gt;Planning and executing Wikimedia projects with wider community participations and effective consultation;&lt;/strong&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;&lt;strong&gt;Fostering and enabling an appropriate legal and technological ecosystem;&lt;/strong&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;&lt;strong&gt;Building sustainable communities and grooming potential leaders to represent the communities and projects globally.&lt;/strong&gt;&lt;/div&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Context&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;CIS-A2K has focussed on creating sustainable programmes and capacity development for communities in the last few years. CIS-A2K intends to continue its work during the proposed grant period and would continue to focus on the following Indian language Wikimedia projects: Kannada, Konkani, Marathi, Odia, Telugu (Focus Language Areas, FLA). In order to achieve higher RoI, A2K will be including Tulu in its language plan from this plan period.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;CIS-A2K will continue to provide general support and service to all other Indian language Wikimedia communities for all Wikimedia projects as necessary and as requested by the communities or individuals from the community through its request page and needs assessment workshops.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Community strengthening initiatives will be prioritised in order to address the poor participation of Wikimedians from Indian sub continent in particular and global south in general. CIS-A2K has rolled out initiatives such as Train the Trainer and MediaWiki training, focused edit-a-thons and GLAM activities.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;CIS-A2K and Indian language Wikimedia communities would greatly benefit from collaborating with these initiatives and CIS-A2K during this grant period would attempt to bring these communities closer with a series of interactions, hack-a-thons and training sessions.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Our institutional partnerships have played a very important role in content donation, generation of content, attracting new readers and editors and collaborating opportunities with existing community members. They have provided much needed press coverage towards Indian language Wikimedia projects. The institution partnerships and WEP have been redesigned as per community suggestions.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Methodology&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;This work plan has been prepared based on an extensive engagement with various Wikimedia movement participants and enthusiasts in India. These include:&lt;/p&gt;
&lt;ol style="text-align: justify;"&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;Wikimedia community members across all Indic communities: We have talked to a large number of Indic Wikimedia community members and specially community members of our focused language areas;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;Institutional Partners of CIS-A2K: We have taken feedback and suggestions from our institutional partners regarding the challenges of conducting WEP;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;Like-minded advocates of free and open knowledge;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;Surveys and Interviews.&lt;/div&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;h3 style="text-align: justify;"&gt;Performance against plans and projected targets&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Overall&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;img src="https://cis-india.org/home-images/w1.jpg" alt="null" class="image-inline" title="w1" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Kannada&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;img src="https://cis-india.org/home-images/copy_of_w1.jpg" alt="null" class="image-inline" title="w2" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Konkani&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;img src="https://cis-india.org/home-images/copy2_of_w1.jpg" alt="null" class="image-inline" title="w3" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Marathi&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;img src="https://cis-india.org/home-images/copy3_of_w1.jpg" alt="null" class="image-inline" title="w4" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Odia&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;img src="https://cis-india.org/home-images/copy4_of_w1.jpg" alt="null" class="image-inline" title="Odia" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Telugu&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;img src="https://cis-india.org/home-images/copy6_of_w1.jpg" alt="null" class="image-inline" title="w6" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Progress against goals set&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;img src="https://cis-india.org/home-images/copy7_of_w1.jpg" alt="null" class="image-inline" title="Progress" /&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Language Area Work Plans&lt;/h3&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify;"&gt;
&lt;p&gt;CIS-A2K has put in significant efforts across four focus language areas Kannada, Konkani, Odia and Telugu during the previous work plans. CIS-A2K proposed and initiated Marathi as a focus language project during the last proposal plan. As A2K's strategy of working with FLA has resulted in community building and sustainable outreach efforts, we intend to work with the nascent Tulu community towards making Tulu Wikipedia live.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The &lt;a title="CIS-A2K/Work plan July 2016 - June 2017/Tulu" href="https://meta.wikimedia.org/wiki/CIS-A2K/Work_plan_July_2016_-_June_2017/Tulu"&gt;Tulu Wikipedia&lt;/a&gt; plan is a 'minimal cost program' and is not budgeted same as the other FLA. A2K has been able to build a strong community in Mangalore for the Kannada and Konkani Wikimedia projects. Tulu community draws its editor base and institutional support from Mangalore, hence A2K's plans towards Kannada and Konkani Wikimedia projects can also have the added dimension of Tulu Wikipedia incubation activities.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Detailed work-plan for each of these language areas may be seen here (in alphabetical order):&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;&lt;a title="CIS-A2K/Work plan July 2016 - June 2017/Kannada" href="https://meta.wikimedia.org/wiki/CIS-A2K/Work_plan_July_2016_-_June_2017/Kannada"&gt;Kannada&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a title="CIS-A2K/Work plan July 2016 - June 2017/Konkani" href="https://meta.wikimedia.org/wiki/CIS-A2K/Work_plan_July_2016_-_June_2017/Konkani"&gt;Konkani&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a title="CIS-A2K/Work plan July 2016 - June 2017/Marathi" href="https://meta.wikimedia.org/wiki/CIS-A2K/Work_plan_July_2016_-_June_2017/Marathi"&gt;Marathi&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a title="CIS-A2K/Work plan July 2016 - June 2017/Odia" href="https://meta.wikimedia.org/wiki/CIS-A2K/Work_plan_July_2016_-_June_2017/Odia"&gt;Odia&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a title="CIS-A2K/Work plan July 2016 - June 2017/Telugu" href="https://meta.wikimedia.org/wiki/CIS-A2K/Work_plan_July_2016_-_June_2017/Telugu"&gt;Telugu&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/copy8_of_w1.jpg/@@images/ab0f737d-8061-40d7-bcad-f3850817771a.jpeg" alt="null" class="image-inline" title="Women's Wikipedia Editathon" /&gt;&lt;/p&gt;
&lt;p style="text-align: center;"&gt;Woman's day editathon at Christ University&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Some of the key factors that determined the July 2016-June 2017 work plan:&lt;/strong&gt;&lt;/p&gt;
&lt;ol style="text-align: justify;"&gt;
&lt;li&gt;&lt;strong&gt;Development of Focus Language Area Plan:&lt;/strong&gt; A2K's strategy of building a plan along with the consultation of the community and further customised as per the feedback received by communities and FDC Staff have resulted well across five languages. CIS-A2K is pleased to inform that during July 2015-June 2016 it engaged with all the five focus language area plans as it has been able to recruit program officers and program associates for the vacant positions. It is important to note that while we are engaging with Tulu Wikipedia community with intentions of making Tulu Wikipedia live, it is also a 'minimal cost' program. It helps A2K in acheiving higher RoI for monetary resources and optimisation of staff and volunteer expertise.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;A2K 2.0 as a response to FDC and Indic Wikimedians' Feedback:&lt;/strong&gt; As a learning derived out of FDC, WMF Board and Indic Wikimedians suggestions, CIS-A2K has revised its program structure and composition of work. Please find details of revised divisional of responsibilities of A2K team.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Partnership and networking with institutions and groups:&lt;/strong&gt; CIS-A2K has had the privilege of partnering with educational institutions and developmental organisations. These partnerships and collaborations not only resulted in significant quality-content contributions, but also lead to the diversification and expansion of that particular language Wikimedia community. In order to strengthen the communities, increase participation and conduct GLAM activities and attract content donation A2K would look out for possible institutional partnerships.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Providing sustainability and developing leadership skills:&lt;/strong&gt; A2K has always worked towards enabling Indian Language Wikimedia communities to achieve sustainability and visibility amongst the global communities. We have been greatly privilege to work with the Focus Language Communities and would like to pass on our learning through collaborations with other language communities, while exiting few of our current FLA programs. Through our skill building initiatives such as Train-the-Trainer, Media Wiki Training and Train-a-Wikipedian A2K has also been able to support growth of a new community of volunteers to support the existing community.&lt;/li&gt;&lt;/ol&gt;
&lt;h3&gt;&lt;span id="Community_Strengthening_Initiatives" class="mw-headline"&gt;Community Strengthening Initiatives&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;span id="Community_Strengthening_Initiatives" class="mw-headline"&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/span&gt;&lt;span class="mw-headline"&gt;CIS-A2K started two community strengthening initiatives— &lt;a title="TTT" class="mw-redirect" href="https://meta.wikimedia.org/wiki/TTT"&gt;Train-the-Trainer&lt;/a&gt; and &lt;a title="MWTTT" class="mw-redirect" href="https://meta.wikimedia.org/wiki/MWTTT"&gt;MediaWiki Training&lt;/a&gt; to grow and strengthen the Indic Wikimedia projects and the associated communities, both qualitatively and quantitatively. The earlier iteration of these two programs played an important role in connecting the Indian language Wikimedia communities and fostering multi-lingual projects. This year also CIS-A2K proposes to undertake these two successful community strengthening initiatives. In mid-March 2016, CIS-A2K conducted a 2-day-long nationwide Wikipedia Education Program review workshop that brought students and faculty members from institutions that are running WEP in partnership with CIS-A2K and several important topics such as structural challenges such as academic schedule, institutional interest, faculty buy-in and more importantly response by the students were discussed. This year also CIS-A2K proposes to conduct such a workshop.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span id="Creating_Movement_Resources" class="mw-headline"&gt;Creating Movement Resources&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span id="Creating_Movement_Resources" class="mw-headline"&gt; &lt;/span&gt;CIS-A2K has been creating resources to help Indic Wikimedia communities. All the resources are created after assessing the communities' need assessment and close interactions with many of the active community members.&lt;/p&gt;
&lt;p&gt;CIS-A2K proposed to create the following resources (this also include printed resources):&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Wikipedia editing tutorials&lt;/li&gt;
&lt;li&gt;PEG and IEG application handbooks;&lt;/li&gt;
&lt;li&gt;Handbook on how apply for various WMF scholarships;&lt;/li&gt;
&lt;li&gt;Handbook on best practices for Wiki-events, workshops, meetup, outreach and other programs;&lt;/li&gt;
&lt;li&gt;FAQ for content donors –give this job to a law school intern. No need of this handbook to be translated to Indian languages.&lt;/li&gt;
&lt;li&gt;Bookmarks creation to increase awareness about Indian Wikimedia Projects;&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;General Support and Service to the Movement&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;CIS-A2K regularly supports Indic-language Wikimedia communities to conduct workshops, edit-a-thons and events to improve their projects. All these requests are placed at &lt;a title="Talk:CIS-A2K/Requests" href="https://meta.wikimedia.org/wiki/Talk:CIS-A2K/Requests"&gt;CIS-A2K request page&lt;/a&gt; and fulfilled after extensive community discussion and needs assessment.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Currently CIS-A2K is working on a program named &lt;a title="CIS-A2K/Train-a-Wikipedian" href="https://meta.wikimedia.org/wiki/CIS-A2K/Train-a-Wikipedian"&gt;Train-a-Wikipedian&lt;/a&gt; (TAW) to identify enthusiastic Indic Wikipedians and train and groom them to develop their editing skills. We'll continue empowering Indic Wikimedia community members through this program.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Learning and Evaluation&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Following the &lt;a title="Grants:Learning &amp;amp; Evaluation/Global metrics" href="https://meta.wikimedia.org/wiki/Grants:Learning_%26_Evaluation/Global_metrics"&gt;Global metrics&lt;/a&gt; and discussions some members of the Wikimedia community, the A2K program had put together some evaluation tools to assess the impact of its work during the last year. We have included some more metrics for evaluation this year.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Evaluation tools&lt;/strong&gt;&lt;/p&gt;
&lt;dt&gt;Participation&lt;/dt&gt;
&lt;ol&gt;
&lt;li&gt;Number of active editors involved&lt;/li&gt;
&lt;li&gt;Number of newly registered users&lt;/li&gt;
&lt;li&gt;Number of individuals involved&lt;/li&gt;&lt;/ol&gt;
&lt;dl&gt;&lt;dt&gt;Content&lt;/dt&gt;&lt;/dl&gt;
&lt;ol&gt;
&lt;li&gt;Number of new images/media added to Wikimedia article pages&lt;/li&gt;
&lt;li&gt;Number of new images/media uploaded to Wikimedia Commons&lt;/li&gt;
&lt;li&gt;Number of articles added or improved on Wikimedia projects&lt;/li&gt;
&lt;li&gt;Number of bytes added to and/or deleted from Wikimedia projects&lt;/li&gt;&lt;/ol&gt;
&lt;h3&gt;Reports&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;CIS-A2K will undertake monthly and annually review of our work using the above evaluation tools. CIS-A2K report activities and progress to Wikimedia foundation in monthly meetings.&lt;sup&gt;&lt;a href="https://meta.wikimedia.org/wiki/CIS-A2K/Work_plan_July_2016_-_June_2017#cite_note-1"&gt;[1]&lt;/a&gt;&lt;/sup&gt; CIS-A2K team will also report the successes and learnings to the Wikimedia India &amp;amp; the Global Community. CIS-A2K team will actively review progress of each language area plan in collaboration with the respective Wikimedia community. Based on this feedback we will undertake mid-course corrections, should there be a need. To summarize following reports will be published in the year of 2016 - 2017:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Progress report (for the current grant)&lt;/li&gt;
&lt;li&gt;Impact Report (July 2016 - June 2017)&lt;/li&gt;
&lt;li&gt;Monthly report to Wikimedia foundation;&lt;/li&gt;
&lt;li&gt;Monthly Newsletters&lt;/li&gt;
&lt;li&gt;Annual report to CIS&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;Monthly Review and Learning Sessions&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Last year we &lt;a title="CIS-A2K/Work plan July 2015 - June 2016" href="https://meta.wikimedia.org/wiki/CIS-A2K/Work_plan_July_2015_-_June_2016#Monthly_review_and_learning_sessions"&gt;wrote about&lt;/a&gt; conducting monthly review and learning sessions. Currently CIS-A2K is conducting monthly learning sessions to critically reflect on the successes and failures of our work internally. The learnings are shared with Wikimedia Foundation for their feedback and suggestion. We'll continue conducting monthly reviews and learnings and progress will be shared with Wikimedia Foundation. We will try to share the same the Wikimedia India members.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Budget&lt;/h3&gt;
&lt;p&gt;Please find link to CIS-A2K program budget for proposed grant period July 2016-June 2017 &lt;a title="CIS-A2K/Work plan July 2016 - June 2017/Budget" href="https://meta.wikimedia.org/wiki/CIS-A2K/Work_plan_July_2016_-_June_2017/Budget"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;Feedback&lt;/h3&gt;
&lt;p&gt;We appreciate your valuable feedback. However, for the sake of structured engagement by everyone, we request you to consider the following before you share your feedback.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;For feedback on the overall A2K Work Plan you can write &lt;a title="Talk:CIS-A2K/Work plan July 2016 - June 2017" href="https://meta.wikimedia.org/wiki/Talk:CIS-A2K/Work_plan_July_2016_-_June_2017"&gt;&lt;strong&gt;here&lt;/strong&gt;&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;For feedback on respective Language area plans, please write on the discussion page of the respective language plan.&lt;/li&gt;&lt;/ul&gt;
&lt;dl&gt;&lt;dd&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a title="CIS-A2K/Work plan July 2016 - June 2017/Kannada" href="https://meta.wikimedia.org/wiki/CIS-A2K/Work_plan_July_2016_-_June_2017/Kannada"&gt;&lt;strong&gt;Kannada&lt;/strong&gt;&lt;/a&gt; plan (&lt;a title="Talk:CIS-A2K/Work plan July 2016 - June 2017/Kannada" href="https://meta.wikimedia.org/wiki/Talk:CIS-A2K/Work_plan_July_2016_-_June_2017/Kannada"&gt;&lt;strong&gt;discussions&lt;/strong&gt;&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;&lt;a title="CIS-A2K/Work plan July 2016 - June 2017/Konkani" href="https://meta.wikimedia.org/wiki/CIS-A2K/Work_plan_July_2016_-_June_2017/Konkani"&gt;&lt;strong&gt;Konkani&lt;/strong&gt;&lt;/a&gt; plan (&lt;a title="Talk:CIS-A2K/Work plan July 2016 - June 2017/Konkani" href="https://meta.wikimedia.org/wiki/Talk:CIS-A2K/Work_plan_July_2016_-_June_2017/Konkani"&gt;&lt;strong&gt;discussions&lt;/strong&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a title="CIS-A2K/Work plan July 2016 - June 2017/Marathi" href="https://meta.wikimedia.org/wiki/CIS-A2K/Work_plan_July_2016_-_June_2017/Marathi"&gt;&lt;strong&gt;Marathi&lt;/strong&gt;&lt;/a&gt; plan (&lt;a title="Talk:CIS-A2K/Work plan July 2016 - June 2017/Marathi" href="https://meta.wikimedia.org/wiki/Talk:CIS-A2K/Work_plan_July_2016_-_June_2017/Marathi"&gt;&lt;strong&gt;discussions&lt;/strong&gt;&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;&lt;a title="CIS-A2K/Work plan July 2016 - June 2017/Odia" href="https://meta.wikimedia.org/wiki/CIS-A2K/Work_plan_July_2016_-_June_2017/Odia"&gt;&lt;strong&gt;Odia&lt;/strong&gt;&lt;/a&gt; plan (&lt;a title="Talk:CIS-A2K/Work plan July 2014 - June 2015/Odia" href="https://meta.wikimedia.org/wiki/Talk:CIS-A2K/Work_plan_July_2014_-_June_2015/Odia"&gt;&lt;strong&gt;discussions&lt;/strong&gt;&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;&lt;a title="CIS-A2K/Work plan July 2016 - June 2017/Telugu" href="https://meta.wikimedia.org/wiki/CIS-A2K/Work_plan_July_2016_-_June_2017/Telugu"&gt;&lt;strong&gt;Telugu&lt;/strong&gt;&lt;/a&gt; plan (&lt;a title="Talk:CIS-A2K/Work plan July 2014 - June 2015/Telugu" href="https://meta.wikimedia.org/wiki/Talk:CIS-A2K/Work_plan_July_2014_-_June_2015/Telugu"&gt;&lt;strong&gt;discussions&lt;/strong&gt;&lt;/a&gt;)&lt;/li&gt;&lt;/ul&gt;
&lt;/dd&gt;&lt;/dl&gt;
&lt;ul&gt;
&lt;li&gt;Alternatively you could also share your feedback over e-mail at tanveer@cis-india.org. Please use the subject line Feedback on Work Plan.&lt;/li&gt;
&lt;li&gt;Should you feel the need to discuss any aspect of the plan before sharing your feedback, please write to us and we can set up a telephone/Skype call.&lt;/li&gt;&lt;/ul&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/cis-a2k-work-plan-july-2016-june-2017'&gt;https://cis-india.org/a2k/blogs/cis-a2k-work-plan-july-2016-june-2017&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>CIS-A2K</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Wikimedia</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    

   <dc:date>2016-04-29T09:36:45Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/celebrating-odia-wikipedias-ninth-anniversary">
    <title>Celebrating Odia Wikipedia's Ninth Anniversary</title>
    <link>https://cis-india.org/openness/blog-old/celebrating-odia-wikipedias-ninth-anniversary</link>
    <description>
        &lt;b&gt;Odia Wikipedia saw its first edit on January 29, 2004. After a dormancy of many years it got revived in 2011. To commemorate the effort of many volunteer wikipedians, a celebratory event was organized on January 29, 2013 in Bhubaneswar.  Subhashish Panigrahi participated in this event.&lt;/b&gt;
        
&lt;p style="text-align: justify; "&gt;&lt;a href="http://or.wikipedia.org/"&gt;Odia Wikipedia&lt;/a&gt; recently has celebrated its &lt;a href="http://or.wikipedia.org/wiki/ଉଇକିପିଡ଼ିଆ:ମେଳଣ/ଭୁବନେଶ୍ୱର/ଭୁବନେଶ୍ୱର୪"&gt;9&lt;/a&gt;&lt;a href="http://or.wikipedia.org/wiki/ଉଇକିପିଡ଼ିଆ:ମେଳଣ/ଭୁବନେଶ୍ୱର/ଭୁବନେଶ୍ୱର୪"&gt;&lt;sup&gt;th&lt;/sup&gt;&lt;/a&gt;&lt;a href="http://or.wikipedia.org/wiki/ଉଇକିପିଡ଼ିଆ:ମେଳଣ/ଭୁବନେଶ୍ୱର/ଭୁବନେଶ୍ୱର୪"&gt; anniversary&lt;/a&gt;. January 29 is considered to be that day when someone made a first edit on it. Communities from Bhubaneswar, Cuttack and Nalconagar joined hands to celebrate this event with a panel discussion on "Application of Odia language in e-media". The discussion was coordinated by Nilambar Rath, Director of Academy for Media Learning. The event was organized by the Odia Wiki Community with support from &lt;a href="https://cis-india.org/"&gt;The Centre for Internet and Society&lt;/a&gt; in collaboration with &lt;a href="http://www.aml.edu.in/"&gt;Academy for Media Learning&lt;/a&gt;. Panelists who took part in the discussion were Prasanna Kumar Mohanty, Director of "Odia Bhasa Pratisthan", Dr. Prafulla Tripathy, Odia linguist and writer, Dr. Dhanada Mishra, Academician and Director-Academics, &lt;a href="http://www.kmbb.in/"&gt;KMBB College of Engineering&lt;/a&gt;, Subhashish Panigrahi, Programme Officer, Centre for Internet and Society, Jatindra Das, Senior journalist and founder, &lt;a href="http://Odisha.com/"&gt;Odisha.com&lt;/a&gt; and Subhransu Panda, Senior journalist, &lt;a href="http://www.orissasambad.com/"&gt;Sambad&lt;/a&gt;. Wikipedians, students and journalists took active part in the discussion.&lt;/p&gt;
&lt;p&gt;To celebrate the success of Odia Wikipedia, wikipedians joined the guest to cut a “&lt;a href="http://en.wikipedia.org/wiki/Chhena_Poda"&gt;Chhenapoda&lt;/a&gt;” and light Deepam as an integral part of the Odia culture.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The discussion began with Nilambar Rath speaking briefly about the agenda of the meeting and about the current scenario of the use of Odia language in media especially in the web.  Prasanna Kumar Mohanty spoke about how the true form of the language should be taken to public via media. He also emphasized about the need to sacrifice our conventional way of approach and adopt new technologies like Wikipedia. Many such efforts are not rewarded because of the lack of support from the government even though funding is available for such development.  Odia linguist Prafulla Tripathy explained about the lack of public interest to pledge for declaring Odia as a classical language even though Odia holds the 31&lt;sup&gt;st&lt;/sup&gt; position among 6500 world languages. "The language of our personal lives, social interaction and verbal communication never gets documented. The confusion among various linguists is another obstacle to take Odia to a global level. If the script grammar is kept in focus and script and eventually the fonts are simplified then they would be easier to be used online", he expressed. Dr. Tripathy also shared his experience of his interaction with other Indian language experts at places where he worked such as on &lt;a href="http://en.wikipedia.org/wiki/Optical_character_recognition"&gt;OCR (Optical character reading)&lt;/a&gt; software which could be a great tool to digitize many precious resources. He offered his support for helping with OCR in Odia. Few other aspects of simpler approaches of scripts discussed were glossary,  Odia-English and English-Odia lexicon, spell check feature for typing and interactive e-learning which could boost the effort of the wikipedians.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prof. Dhanada Mishra took the audience through the free and open source culture and Linux and future role of Odia Wikipedia to tackle the problems of primary education. He thanked the wikipedians for their noble effort and showed his interest in promoting it more in academics. Subhashish Panigrahi discussed about the role of Odia Wikipedia in documenting various resources in Odia Wikipedia. He brought various technical problems that common men face while typing, contributing to Wikipedia and how they could be handled.  He also proposed a plan for bringing more language experts and museum curators to the community which would increase the spectrum of resource and capacity for the Odia Wikimedia community.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Jatindra Das, founder of the first online Odia newspaper Odisha.com discussed about the hurdles of using Odia Unicode and acceptance level in the society for it. Senior journalist Subhransu Panda discussed about the usage of various fonts and how adopting Unicode could bring a lot of information to the public.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nilambar Rath, Director, Academy for Media Learning talked about the future efforts of Odia Wikipedia community. He elaborated how media could be used as an essential tool for taking Wikipedia to more people. Mrutyunjaya Kar, one of the very active Wikipedians closed the ceremony with a brief talk about the achievements, education program and impact of Odia Wikipedia in the recent past and community building plans.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There was a press meet in the afternoon. Wikipedians interacted with the media about future prospects of Odia Wikipedia and its current state.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/openness/blog-old/OdiaWikipediansbeingfelicitated.JPG/@@images/dda743db-d287-4a02-9525-7376d44934f1.jpeg" title="Odia Wikipedians being felicitated" height="204" width="622" alt="Odia Wikipedians being felicitated" class="image-inline" /&gt;&lt;/p&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: center; "&gt;&lt;i&gt;Odia wikipedians being felicitated by the guests&lt;/i&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th style="text-align: center; "&gt;Few glimpses of the event&lt;br /&gt;&lt;iframe frameborder="0" height="253" src="http://commons.wikimedia.org/wiki/File:Bhubaneswar_Odia_Meetup_2013Jan29-32.webm?embedplayer=yes" width="450"&gt;&lt;/iframe&gt;&lt;br /&gt;Audio Podcast&lt;br /&gt;&lt;iframe frameborder="0" height="23" src="http://commons.wikimedia.org/wiki/File:Prafulla_Tripathy_on_Odia_script_and_Odia_Wikipedia.ogg?embedplayer=yes" width="300"&gt;&lt;/iframe&gt;&lt;/th&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;b&gt;&lt;br /&gt;Press coverage:&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;&lt;/span&gt;&lt;span&gt;&lt;b&gt;ଓଡ଼ିଶାନ୍:&lt;/b&gt;&lt;/span&gt;&lt;a href="http://odishan.com/?p=2534"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;b&gt; &lt;/b&gt;ଓଡ଼ିଆ 	ଉଇକିପିଡ଼ିଆର ନବମ ଜନ୍ମତିଥି 	ଅବସରରେ କର୍ମଶାଳା&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;a href="http://odishan.com/?p=2534"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;: &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;a href="http://odishan.com/?p=2534"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;ଇମିଡ଼ିଆରେ 	ଓଡ଼ିଆ ଭାଷାର ପ୍ର‌ୟୋଗ&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;span&gt;.&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;b&gt; &lt;/b&gt;&lt;/span&gt;&lt;span&gt;&lt;b&gt;&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt; &lt;span&gt;&lt;b&gt;ସମ୍ବାଦ:&lt;/b&gt;&lt;/span&gt;&lt;a href="http://sambadepaper.com/Details.aspx?id=36615&amp;amp;boxid=23625437"&gt;&lt;span&gt;&lt;i&gt;&lt;span&gt;&lt;b&gt; &lt;/b&gt;ଲିପି 	ବ୍ୟାକରଣ ଓ ମାନକ ଭାଷାର ପ୍ରୟୋଗ 	ଜରୁରୀ&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;span&gt;.&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;b&gt; &lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt; &lt;span&gt;eindiadiary.com:&lt;/span&gt;&lt;a href="http://www.eindiadiary.com/content/odisha-workshop-organized-9th-anniversary-odia-language-application-odia-language-e-media"&gt;&lt;span&gt;&lt;span&gt;Odisha: 	Workshop organized on 9th Anniversary of Odia language: Application 	of Odia language in e-media&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;span&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt; &lt;span&gt;Fullorissa.com:&lt;/span&gt;&lt;a href="http://news.fullorissa.com/odia-wikipedias-9th-anniversary/"&gt;&lt;span&gt; Odia 	Wikipedia’s 9th anniversary&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;b&gt;. &lt;/b&gt;&lt;/span&gt;&lt;span&gt;Fullorissa.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt; &lt;span&gt;orissadiary.com:&lt;/span&gt;&lt;a href="http://www.orissadiary.com/ShowEvents.asp?id=3924"&gt;&lt;span&gt;&lt;span&gt;Odisha: 	Workshop organized on 9th Anniversary of Odia language: Application 	of Odia language in e-media&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;span&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt; &lt;span&gt;&lt;span&gt;In&lt;/span&gt;&lt;/span&gt;&lt;span&gt;diaeducationdiary.in:&lt;/span&gt;&lt;a href="http://indiaeducationdiary.in/Orissa/Shownews.asp?newsid=19485"&gt;&lt;span&gt;&lt;span&gt;Odisha: 	Workshop organized on 9th Anniversary of Odia language: Application 	of Odia language in e-media&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;span&gt;. &lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt; &lt;span&gt;Odishaviews.com:&lt;/span&gt;&lt;a href="http://www.odishaviews.com/odia-language-workshop-organized-on-9th-anniversary-of-odia-wikipedia-application-of-odia-language-in-e-media/"&gt;Odia 	language workshop organized on 9th Anniversary of Odia Wikipedia: 	Application of Odia language in e-media&lt;/a&gt;&lt;i&gt;. &lt;/i&gt;Subhashish Panigrahi is quoted.&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/celebrating-odia-wikipedias-ninth-anniversary'&gt;https://cis-india.org/openness/blog-old/celebrating-odia-wikipedias-ninth-anniversary&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>subha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Wikimedia</dc:subject>
    

   <dc:date>2013-02-28T04:32:29Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/john-doe-orders-isp-blocking-websites-copyright-3">
    <title>Can Judges Order ISPs to Block Websites for Copyright Infringement? (Part 3)</title>
    <link>https://cis-india.org/a2k/blogs/john-doe-orders-isp-blocking-websites-copyright-3</link>
    <description>
        &lt;b&gt;In a three-part study, Ananth Padmanabhan examines the "John Doe" orders that courts have passed against ISPs, which entertainment companies have used to block dozens, if not hundreds, of websites.  In this, the third and concluding part, he looks at the Indian law in the Copyright Act and the Information Technology Act, and concludes that both those laws restrain courts and private companies from ordering an ISP to block a website for copyright infringement.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;In the third part of his study, Ananth Padmanabhan looks into the fair use provisions recently introduced in respect of mere conduit intermediaries by the Copyright (Amendment) Act, 2012, and concludes that there is no scope for any general, or specific, access blocking orders at the behest of the plaintiff in a civil suit, in India. He also argues that the &lt;a class="external-link" href="http://eprocure.gov.in/cppp/sites/default/files/eproc/itact2000.pdf"&gt;Information Technology Act, 2000&lt;/a&gt; read with the&lt;a class="external-link" href="http://deity.gov.in/sites/upload_files/dit/files/GSR314E_10511%281%29.pdf"&gt; Information Technology (Intermediaries Guidelines) Rules, 2011&lt;/a&gt; do not in any manner permit the Government to override the provisions of the &lt;a class="external-link" href="http://www.ircc.iitb.ac.in/webnew/Indian%20Copyright%20Act%201957.html"&gt;Copyright Act, 1957&lt;/a&gt; (as amended) while facilitating the denial of access to websites on grounds of copyright infringement, because the Copyright Act, 1957, is a complete code by itself.&lt;/p&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify; "&gt;Fair Use Provisions Introduced by the Copyright (Amendment) Act, 2012&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;In 2010, the &lt;a href="https://cis-india.org/a2k/blogs/copyright-bill-analysis" class="external-link"&gt;controversial Copyright (Amendment) Bill&lt;/a&gt; came up for deliberation before the Parliamentary Standing Committee on Human Resource Development headed by Mr. &lt;a class="external-link" href="http://archive.india.gov.in/govt/rajyasabhampbiodata.php?mpcode=173"&gt;Oscar Fernandes&lt;/a&gt;. While a major part of the discussion on this amendment revolved around the altered royalty structure and rights allocation between music composers and lyricists on the one hand and film producers on the other, it can be safely stated that this is the most significant amendment to the Copyright Act, 1957 for more than this one reason. The amendment seeks to reform the Copyright Board, bring in a scheme of statutory licenses, expand the scope of performers’ rights and introduce anti-circumvention measures to check copyright piracy. As part of its ambitious objective, the amendment also attempts a new fair use model to protect intermediaries and file-sharing websites.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Copyright (Amendment) Act, 2012, which gives expression to this fair use model through Sections 52(1)(b) and (c), reads thus:&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;52. Certain acts not to be infringement of copyright&lt;/i&gt;&lt;/b&gt;&lt;i&gt;. - (1) The following acts shall not constitute an infringement of copyright, namely:&lt;/i&gt;&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;i&gt;(a) to (ad) - *****&lt;/i&gt;&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;i&gt;(b) the transient or incidental storage of a work or performance purely in the technical process of electronic transmission or communication to the public;&lt;/i&gt;&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;i&gt;(c) transient or incidental storage of a work or performance for the purpose of providing electronic links, access or integration, where such links, access or integration has not been expressly prohibited by the right holder, unless the person responsible is aware or has reasonable grounds for believing that such storage is of an infringing copy:&lt;/i&gt;&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;i&gt;Provided that if the person responsible for the storage of the copy has received a written complaint from the owner of copyright in the work, complaining that such transient or incidental storage is an infringement, such person responsible for the storage shall refrain from facilitating such access for a period of twenty-one days or till he receives an order from the competent court refraining from facilitating access and in case no such order is received before the expiry of such period of twenty-one days, he may continue to provide the facility of such access;&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;From a plain reading, it is clear that two important exceptions are carved out: one, in respect of the technical process of electronic transmission and the other, in respect of providing electronic links, access or integration. The material distinction between these exceptions is the presence of a take-down &lt;i&gt;proviso &lt;/i&gt;in respect of the latter kind of activity, ie. when providing electronic links, access or integration. This window of opportunity is not provided to the copyright owner when the third party is an ISP involved in the pure technical process of electronic transmission of data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In &lt;i&gt;R.K. Productions&lt;/i&gt;, the court was not informed of the introduction of these provisions &lt;i&gt;vide&lt;/i&gt; the Copyright (Amendment) Act, 2012, despite the hearing happening on a date subsequent to the amendment coming into force. This probably influenced the outcome as well, since the court held that ISPs were liable to block access to infringing content, once the specific webpage was brought to the notice of the concerned ISP. Newly introduced Section 52(1)(b) however makes it abundantly clear that ISPs cannot, in any manner, be held liable when they are acting as mere conduit pipes for the transmission of information. This legal position is also materially different from jurisdictions such as the United Kingdom where, the ISPs though not liable for copyright infringement, are statutorily mandated to lend all possible assistance such as take-down or blocking of access upon notice of infringement being furnished to them. This dichotomy between liability for infringement on the one hand and a general duty to assist in the prevention of infringement on the other is explained clearly by the Chancery Division in &lt;i&gt;Twentieth Century Fox Film Corporation v. British Telecommunications Plc.&lt;/i&gt;&lt;a href="#fn1" name="fr1"&gt;[1] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In &lt;i&gt;Newzbin2&lt;/i&gt;, the Chancery Division took note of the safe harbour provisions created by the E-Commerce Directive,&lt;a href="#fn2" name="fr2"&gt;[2] &lt;/a&gt;particularly Articles 12 to 14 that dealt with acting as a “mere conduit”, caching and hosting respectively. The interesting feature with the “mere conduit” exception, which in all other respects is akin to the exception contained in Section 52(1)(b) of the Copyright Act, 1957, is the additional presence of Article 12(3). This provision clarifies that the “mere conduit” exception shall not stand in the way of a court or administrative authority requiring the service provider to terminate or prevent an infringement. Article 18 of this Directive also casts an obligation upon Member States to ensure that court actions available under national law permit the rapid adoption of measures, including interim measures, designed to terminate any alleged infringement and to prevent any further impairment of the interests involved. Similarly, the court looked into the Information Society Directive,&lt;a href="#fn3" name="fr3"&gt;[3] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article 8(3) of which provides that “Member States shall ensure that rightholders are in a position to apply for an injunction against intermediaries whose services are used by a third party to infringe a copyright or related right.” This Directive was transposed into the domestic law in UK by the Copyright and Related Rights Regulations 2003, SI 2003/2498, resulting in the insertion of Section 97A in the Copyright, Designs and Patents Act 1988. This provision empowers the court to grant an injunction against a service provider who has actual knowledge of another person using their service to infringe copyright, such as where the service provider is given sufficient notice of the infringement. Finally, the Chancery Division also took note of the Enforcement Directive,&lt;a href="#fn4" name="fr4"&gt;[4] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article 11 of which provided that Member States shall ensure that copyright owners are in a position to apply for an injunction against intermediaries whose services are used by a third party to infringe an intellectual property right. This entire legislative scheme compelled the court in &lt;i&gt;Newzbin2&lt;/i&gt; to conclude that an order of injunction could be granted against ISPs who are “mere conduits”, restraining them from providing access to websites that indulged in mass copyright infringement. The court reasoned that the language used in Section 97A did not require knowledge of any particular infringement but only a more general kind of knowledge about certain persons using the ISPs’ services to infringe copyright. Thus, it is seen that in the United Kingdom, though a “mere conduit” activity is not infringement at all, the concerned ISP can be directed by the court to block access to a website that hosts infringing content on the basis of the above legislative scheme. The enquiry should therefore be directed towards whether India has a similar scheme for copyright enforcement.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Information Technology Act – An Inapplicable Scheme for Website Blocking&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Information Technology Act, 2000&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt;read with certain recently framed guidelines provides for a duty that could be thrust upon even “mere conduit” ISPs to disable access to copyrighted works. This is due to the presence of Section 79(2)(c) of this Act, which makes it clear that an intermediary shall be exempt from liability only where the intermediary observes due diligence as well as complies with the other guidelines framed by the Central Government in this behalf. Moreover, Section 79(3) provides that the intermediary shall not be entitled to the benefit of the exemption in Section 79(1) in a situation where the intermediary, upon receiving actual knowledge that any information, data, or communication link residing in or connected to a computer resource controlled by the intermediary is being used to commit an unlawful act, fails to expeditiously remove or disable access to that material on that resource without vitiating the evidence in any manner. In pursuance of Section 79(2)(c), the Central Government has also framed the Information Technology (Intermediaries Guidelines) Rules, 2011, which came into effect on 11.04.2011. Rule 4 of these Rules, when read along with Rule 2(d), casts obligation on an intermediary on whose computer system, copyright infringing content has been &lt;i&gt;stored, hosted or published&lt;/i&gt;, to &lt;i&gt;disable&lt;/i&gt; such information within thirty six hours from when it is brought to actual knowledge of the existence of such content by any affected person.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One way of understanding and interpreting in harmonious fashion, the provisions of the IT Act and the Rules therein and the recent amendments to the Copyright Act, is to contend that the issue of infringement of copyright by “mere conduit” ISPs is governed by Section 52(1)(b), which completely absolves them of any liability, while that of enforcement of copyright through the medium of such ISPs is governed by the IT Act. This bifurcation suffers from the difficulty that Section 79 of the IT Act is not an enforcement provision. It is a provision meant to exempt intermediaries from certain kinds of liability, in the same way as Section 52 of the Copyright Act. This provision, read with Section 81, makes it clear that the IT Act does not speak to liability for copyright infringement. From this, it has to necessarily follow that all issues pertaining to liability for such infringement have to be decided by the provisions of the Copyright Act. Therefore, the scheme in the IT Act read with the Intermediaries Guidelines Rules cannot confer additional liability for copyright infringement on ISPs where the Copyright Act exempts them from liability. More to the point, the intermediary cannot be liable for copyright infringement in the event of non-compliance with Section 79(3) or Rule 4 of the Intermediaries Guidelines Rules read with Section 79(1)(c) of the IT Act. Rule 4 of the Intermediaries Guidelines Rules, 2011, to the extent that it renders intermediaries outside the protective ambit of Section 79(1) upon failure to disable access to copyrighted content, is of no relevance as “mere conduits” have already been exempted from liability under Section 52(1)(b). Moreover, since these provisions in the IT Act do not deal with enforcement measures such as injunction orders from the court to disable access to infringing content in particular or infringing websites in general, it would be wrong to contend that the scheme in India is similar to the one in the United Kingdom where the issue of infringement has been divorced from that of enforcement.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To conclude, Section 52(1)(b) is a blanket “mere conduit” exemption from liability for copyright infringement that stands uninfluenced by the presence of Section 79 of the IT Act or the Intermediaries Guidelines Rules. In the absence of a legislative scheme for enforcement in India akin to Section 97A of the UK Copyright, Designs and Patents Act 1988, Indian Courts cannot grant an injunction directing such “mere conduit” ISPs to block access to websites in general or infringing content in particular and any such action is not even maintainable in law post the insertion of Section 52(1)(b). The decision to the contrary in the &lt;i&gt;R.K.Productions &lt;/i&gt;case is incorrect.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. [2011] EWHC 1981 (Ch.). Hereinafter referred to as &lt;i&gt;Newzbin2.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. European Parliament and Council Directive 2000/31/EC on certain legal aspects of information society services, in particular electronic commerce, in the Internal Market (8 June 2000). This Directive was transposed into the domestic law in UK by the Electronic Commerce (EC Directive) Regulations 2002, SI 2002/2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. European Parliament and Council Directive 2001/29/EC on the harmonisation of certain aspects of copyright and related rights in the information society (22 May 2001).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. European Parliament and Council Directive 2004/48/EC on the enforcement of intellectual property rights (29 April 2004). This Directive was transposed into the UK domestic law primarily by the Intellectual Property (Enforcement, etc.) Regulations 2006, SI 2006/1028.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. Hereinafter referred to as the IT Act.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/john-doe-orders-isp-blocking-websites-copyright-3'&gt;https://cis-india.org/a2k/blogs/john-doe-orders-isp-blocking-websites-copyright-3&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>ananth</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Copyright</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2014-02-14T05:13:36Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/john-doe-orders-isp-blocking-websites-copyright-2">
    <title>Can Judges Order ISPs to Block Websites for Copyright Infringement? (Part 2)</title>
    <link>https://cis-india.org/a2k/blogs/john-doe-orders-isp-blocking-websites-copyright-2</link>
    <description>
        &lt;b&gt;In a three-part study, Ananth Padmanabhan examines the "John Doe" orders that courts have passed against ISPs, which entertainment companies have used to block dozens, if not hundreds, of websites.  In this, the second part, he looks at the law laid down by the U.S. Supreme Court and the Delhi High Court on secondary and contributory copyright infringement, and finds that those wouldn't allow Indian courts to grant "John Doe" orders against ISPs.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;In the second part of his study, Ananth Padmanabhan proceeds to examine applying a general theory of secondary or contributory copyright infringement against ISPs. He traces the basis for holding a third party liable as a contributory by closely examining the decisions of the U.S. Supreme Court in Sony Corp. v Universal City Studios&lt;a href="#fn1" name="fr1"&gt;[1] &lt;/a&gt;and MGM Studios, Inc. v Grokster, Ltd.&lt;a href="#fn2" name="fr2"&gt;[2] &lt;/a&gt;and concludes that this basis does not hold good in the case of a mere conduit intermediary such as an ISP.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. 464 U.S. 417 (1984). Hereinafter referred to as &lt;i&gt;Betamax&lt;/i&gt;.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. 545 U.S. 913 (2005). Hereinafter referred to as &lt;i&gt;Grokster.&lt;/i&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;Primary and Secondary Infringement&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Liability for copyright infringement can either be primary or secondary in character. In the case of ISPs, liability as primary infringers does not arise at all, and it is in their capacity as conduit pipes facilitating the transmission of information that they could be held secondarily liable. Even in such cases, the contention of copyright owners is that once the ISP is notified of infringing content, it has the primary responsibility of preventing access to such content. This contention is essentially rooted in a theory of secondary infringement based on knowledge and awareness, and the means to prevent further infringement.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The controversy around a suitable model of secondary infringement is reflected in two judicial pronouncements – separated by a gap of more than two decades – delivered by the U.S. Supreme Court. In &lt;i&gt;Sony Corp. v Universal City Studios&lt;/i&gt;,[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;] the US Supreme Court held that the manufacturers of home video recording devices known in the market as Betamax would not be liable to copyright owners for secondary infringement since the technology was capable of substantially non-infringing and legitimate purposes. The U.S. Supreme Court even observed that these time-shifting devices would actually enhance television viewership and hence find favour with majority of the copyright holders too. The majority did concede that in an appropriate situation, liability for secondary infringement of copyright could well arise. In the words of the Court, “&lt;i&gt;vicarious liability is imposed in virtually all areas of the law, and the concept of contributory infringement is merely a species of the broader problem of identifying the circumstances in which it is just to hold one individual accountable for the actions of another&lt;/i&gt;”. However, if vicarious liability had to be imposed on the manufactures of the time-shifting devices, it had to rest on the fact that they sold equipment with constructive knowledge of the fact that their customers &lt;i&gt;may&lt;/i&gt; use that equipment to make unauthorized copies of copyrighted material. In the view of the Court, there was no precedent in the law of copyright for the imposition of vicarious liability merely on the showing of such fact.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Notes of dissent were struck by Justice Blackmun, who wrote an opinion on behalf of himself and three other judges. The learned Judge noted that there was no private use exemption in favour of making of copies of a copyrighted work and hence, unauthorised time-shifting would amount to copyright infringement. He also concluded that there was no fair use in such activity that would exempt it from the purview of infringement. The dissent held the manufacturer liable as a contributory infringer and reasoned that the test for contributory infringement would only be whether the contributory infringer had &lt;i&gt;reason to know or believe &lt;/i&gt;that infringement would take place and &lt;i&gt;not whether he actually knew of the same&lt;/i&gt;. Off-the-air recording was not only a foreseeable use for the Betamax, but also its intended use, for which Sony would be liable for copyright infringement.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This dissent has considerably influenced the seemingly contrarian position taken by the majority in the subsequent decision, &lt;i&gt;MGM Studios, Inc. v Grokster, Ltd.&lt;/i&gt;&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; This case called into question the liability of websites that facilitated peer-to-peer (P2P) file-sharing. Re-formulating the test for copyright infringement, the US Supreme Court held that ‘&lt;i&gt;one who distributes a device with the object of promoting its use to infringe copyright, as shown by clear expression or other affirmative steps taken to foster infringement, is liable for the resulting acts of infringement by third parties&lt;/i&gt;’. In re-drawing the boundaries of contributory infringement, the Court observed that contributory infringement is committed by any person who intentionally induces or encourages direct infringement, and vicarious infringement is committed by those who profit from direct infringement while declining to exercise their right to limit or stop it. When an article of commerce was good for nothing else but infringement, there was no legitimate public interest in its unlicensed availability and there would be no injustice in presuming or imputing intent to infringe in such cases. This doctrine would at the same time absolve the equivocal conduct of selling an item with substantial lawful as well as unlawful uses and would limit the liability to instances of more acute fault than the mere understanding that some of the products shall be misused, thus ensuring that innovation and commerce are not unreasonably hindered.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Court distinguished the case at hand from &lt;i&gt;Betamax&lt;/i&gt;, and noted that there was evidence here of active steps taken by the respondents to encourage direct copyright infringement, such as advertising an infringing use or instructing how to engage in an infringing use. This evidence revealed an affirmative intent that the product be used to infringe, and an &lt;i&gt;active &lt;/i&gt;encouragement of infringement. Without reversing the decision in &lt;i&gt;Betamax&lt;/i&gt;, but holding that it was misinterpreted by the lower court, the Court observed that &lt;i&gt;Betamax&lt;/i&gt; was not an authority for the proposition that whenever a product was capable of substantial lawful use, the producer could never be held liable as a contributory for the use of such product for infringing activity by third parties.&lt;i&gt; &lt;/i&gt;In the view of the Court, &lt;i&gt;Betamax &lt;/i&gt;did not displace other theories of secondary liability.&lt;i&gt; &lt;/i&gt;This other theory of secondary liability applicable to the case at hand was held to be the inducement rule, as per which any person who distributed a device with the object of promoting its use to infringe copyright, as evidenced by clear expression or other affirmative steps taken to foster infringement, would be liable for the resulting acts of infringement by third parties. However, the Court clarified that &lt;i&gt;mere knowledge of infringing potential or of actual infringing uses would not be enough&lt;/i&gt; under this rule to subject a distributor to liability. Similarly, ordinary acts incident to product distribution, such as offering customers technical support or product updates, support liability etc. would not by themselves attract the operation of this rule. The inducement rule, instead, premised liability on &lt;i&gt;purposeful, culpable expression and conduct&lt;/i&gt;, and thus did nothing to compromise &lt;i&gt;legitimate&lt;/i&gt; commerce or discourage innovation having a &lt;i&gt;lawful&lt;/i&gt; promise.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These seemingly divergent views on secondary infringement expressed by the U.S. Supreme Court are of significant relevance for India, due to the peculiar language used in the Indian Copyright Act, 1957.&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section 51 of the Act, which defines infringement, bifurcates the two types of infringement – ie. primary and secondary infringement – without indicating so in as many words. While Section 51(a)(i) speaks to primary infringers, 51(a)(ii) and 51(b) renders certain conduct to be secondary infringement. Even here, there is an important distinction between 51(a)(ii) and 51(b). The former exempts the alleged infringer from liability if he could establish that &lt;i&gt;he was not aware and had no reasonable ground for believing that &lt;/i&gt;the communication to the public, facilitated through the use of his “place”, would amount to copyright infringement. The latter on the other hand permits no such exception. Thus, any person, who makes for sale or hire, or by way of trade displays or offers for sale or hire, or distributes for the purpose of trade, or publicly exhibits by way of trade, or imports into India, any infringing copies of a work, shall be liable for infringement, without any specific &lt;i&gt;mens rea&lt;/i&gt; required to attract such liability. It is in the context of the former provision, ie. 51(a)(ii) that the liability of certain file-sharing websites for copyright infringement has arisen.&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Mere Conduit ISPs – Secondary Infringement Absent&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In &lt;i&gt;MySpace&lt;/i&gt;, the Delhi High Court examined the liability for secondary infringement on the part of a website that provides a platform for file-sharing. While holding the website liable, the Single Judge considered material certain facts such as the revenue model of the defendant, which depended largely on advertisements displayed on the webpages, and automatically generated advertisements that would come up for a few seconds before the infringing video clips started playing. Shockingly, the Court even considered relevant the fact that the defendant did provide for safeguards such as hash block filters, take down stay down functionality, and rights management tools operational through fingerprinting technology, to prevent or curb infringing activities being carried on in their website. This, in the view of the Court, made it evident that the defendant had a &lt;i&gt;reasonable apprehension or belief &lt;/i&gt;that the acts which were being carried on in the website &lt;i&gt;could&lt;/i&gt; infringe someone else’s copyright including that of the plaintiff. The logic employed by the Court to attribute liability for secondary infringement on file-sharing websites is befuddling and reveals complete disregard for the degree of regulatory authority available on the internet even where the space, i.e., the website, is supposedly “under the control” of a person. However, a critical examination of this decision is not relevant in understanding the liability of mere conduit ISPs. This is for the reason that none of the factual considerations relied on by the Single Judge to justify imposition of liability on a file-sharing website under Section 51(a)(ii) arise when the defendant is an ISP that only provides the path for content-neutral transmission of data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This was completely ignored by the Madras High Court in &lt;i&gt;R.K.Productions v. B.S.N.L.&lt;/i&gt;,&lt;a href="#fn6" name="fr6"&gt;[6] &lt;/a&gt;where the producers of the Tamil film “3”, which enjoyed considerable pre-release buzz due to its song “Kolaveri Di”, sought an omnibus order of injunction against all websites that host torrents or links facilitating access to, or download of, this film. Though this was worded as a John Doe plaint by branding the infringers as unknown administrators of different torrent sites and so on, the real idea was to look to the resources and wherewithal of the known defendants, ie. the ISPs, to block access to the content hosted by the unknown defendants.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This prompted the ISPs to file applications under Or. VII, Rule 11 of the Civil Procedure Code, seeking rejection of the plaint on the ground that the suit against them was barred by law. The Single Judge of the Madras High Court dismissed these applications for rejection of the plaint, after accepting the contention that the ISPs are necessary parties to the suit as the act of piracy occurs through the channel or network provided by them. The High Court heavily, and incorrectly, relied on MySpace without appreciating the distinction between a mere conduit ISP and a file-sharing website such as MySpace or YouTube, as regards their respective roles and responsibilities, the differing degrees of regulatory control over content enjoyed by them, and most importantly, the recognition and formalisation of these distinctions in the Copyright Act, 1957, vide the Copyright (Amendment) Act, 2012.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. 464 U.S. 417 (1984). Hereinafter referred to as Betamax.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. 545 U.S. 913 (2005). Hereinafter referred to as Grokster.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. Hereinafter the Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. &lt;i&gt;Super Cassette Industries Ltd. v MySpace Inc.&lt;/i&gt;, MIPR 2011 (2) 303 (hereinafter referred to as &lt;i&gt;MySpace&lt;/i&gt;). This decision of the Delhi High Court has been rightly criticised. &lt;i&gt;See &lt;/i&gt;&lt;a href="https://cis-india.org/a2k/blogs/super-cassettes-v-my-space"&gt;http://cis-india.org/a2k/blog/super-cassettes-v-my-space&lt;/a&gt; (last accessed on 24.03.2013).&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/john-doe-orders-isp-blocking-websites-copyright-2'&gt;https://cis-india.org/a2k/blogs/john-doe-orders-isp-blocking-websites-copyright-2&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>ananth</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Copyright</dc:subject>
    
    
        <dc:subject>Piracy</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2014-03-06T16:48:18Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/call-for-essays-studying-internet-in-india-2016">
    <title> Call for Essays: Studying Internet in India</title>
    <link>https://cis-india.org/raw/call-for-essays-studying-internet-in-india-2016</link>
    <description>
        &lt;b&gt;As Internet makes itself comfortable amidst everyday lives in India, it becomes everywhere and everyware, it comes in 40 MBPS Unlimited and in chhota recharges – though no longer in zero flavour – the Researchers at Work (RAW) programme at the Centre for Internet and Society invites abstracts for essays that explore how do we study internet in India today. &lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Submission deadline extended to &lt;strong&gt;Sunday, July 03&lt;/strong&gt;.&lt;/h3&gt;
&lt;hr /&gt;
&lt;img src="https://github.com/cis-india/website/raw/master/img/RAW_Morpheus-Meme-Digital-Genre.png" alt="What if I told you memes are a new digital genre?" /&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h6&gt;Source: &lt;a href="http://leonardoflores.net/blog/new-digital-genres-writing-for-social-media/"&gt;Leonardo Flores&lt;/a&gt;.&lt;/h6&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;How do we move beyond a fascination with new digital things and interfaces that we engage with on the internet, which are increasingly becoming the objects and sites of our research and creative practices? How do we engage with these on their own terms, and perhaps also against the grain? What "new" is being brought in, performed, and afforded by these digital artefacts in our daily lives? How can our concerns and practices benefit from developing an awareness of their aesthetics, functions, and politics?&lt;/p&gt;
&lt;p&gt;This call is for researchers, workers, and others interested in closely – or from a distance – commenting on these topics and questions.&lt;/p&gt;
&lt;p&gt;Please send abstracts (200 words) to &lt;a href="mailto:raw@cis-india.org"&gt;raw@cis-india.org&lt;/a&gt; by &lt;strong&gt;Sunday, July 03, 2016&lt;/strong&gt;. The subject of the email should be 'Studying Internet in India.'&lt;/p&gt;
&lt;p&gt;We will select up to 10 abstracts and announce them on &lt;strong&gt;Tuesday, July 05, 2016&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;The selected authors will be asked to submit the final longform essay (3,000-4,000 words) by &lt;strong&gt;Sunday, July 31, 2016&lt;/strong&gt;. The final essays will be published on the RAW Blog. The authors will be offered an honourarium of Rs. 6,000.&lt;/p&gt;
&lt;p&gt;We understand that not all essays can be measured in words. The authors are very much welcome to work with text, images, sounds, videos, code, and other mediatic forms that the internet offers. We will not be running a Word Count on the final 'essay.' The basic requirement is that the 'essay' must offer an &lt;em&gt;argument&lt;/em&gt; – through text, or otherwise.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/call-for-essays-studying-internet-in-india-2016'&gt;https://cis-india.org/raw/call-for-essays-studying-internet-in-india-2016&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Studies</dc:subject>
    
    
        <dc:subject>RAW Blog</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Notices</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2016-07-04T12:48:15Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/call-for-essays-studying-internet-in-india">
    <title>Call for Essays: Studying Internet in India</title>
    <link>https://cis-india.org/raw/call-for-essays-studying-internet-in-india</link>
    <description>
        &lt;b&gt;As Internet makes itself comfortable amidst everyday lives in India, it becomes everywhere and everyware, it comes in 40 MBPS Unlimited and in chhota recharges – and even in zero flavour – the Researchers at Work (RAW) programme at the Centre for Internet and Society invites abstracts for essays that explore what it means to study Internet(s) in India today.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;We are interested in the many experiences of Internet(s) in India; its histories and archaeologies; how we use it to read, write, create, relate, learn, and share; the data that is produced, and the data that is consumed; the spaces that are created, and the spaces that are inhabited; the forms that political expressions take on the Web; and of course, where and how should one be studying Internet(s) in India?&lt;/p&gt;
&lt;p&gt;This call is for researchers, workers, and others interested in closely – or from a distance – commenting on these topics and questions.&lt;/p&gt;
&lt;p&gt;Please send abstracts (200 words) to &lt;a href="mailto:raw@cis-india.org"&gt;raw@cis-india.org&lt;/a&gt; by &lt;strong&gt;Sunday, April 26, 2015&lt;/strong&gt;. The subject of the email should be 'Studying Internet in India.'&lt;/p&gt;
&lt;p&gt;We will select up to 10 abstracts and announce them on &lt;strong&gt;Friday, May 01, 2015&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;The selected authors will be asked to submit the final longform essay (2,500-3,000 words) by &lt;strong&gt;Sunday, May 31, 2015&lt;/strong&gt;. The final essays will be published on the RAW Blog. The authors will be offered an honourarium of Rs. 5,000.&lt;/p&gt;
&lt;p&gt;We understand that not all essays can be measured in words. The authors are very much welcome to work with text, images, sounds, videos, code, and other mediatic forms that the Internet offers. We will not be running a Word Count on the final 'essay.' The basic requirement is that the 'essay' must offer an &lt;em&gt;argument&lt;/em&gt; – through text, or otherwise.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/call-for-essays-studying-internet-in-india'&gt;https://cis-india.org/raw/call-for-essays-studying-internet-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Studies</dc:subject>
    
    
        <dc:subject>RAW Blog</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Notices</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2015-08-28T07:09:39Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/call-for-essays-list">
    <title>Call for Essays — #List</title>
    <link>https://cis-india.org/raw/call-for-essays-list</link>
    <description>
        &lt;b&gt;The researchers@work programme at CIS invites abstracts for essays that explore social, economic, cultural, political, infrastructural, or aesthetic dimensions of the ‘list’. We have selected 4 abstracts among those received before August 31, 2019, and are now accepting and evaluating further submissions on a rolling basis.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;img src="https://raw.githubusercontent.com/cis-india/website/master/img/CIS_r%40w_CallForEssays_List_Open.png" alt="Call for essays on #List, abstracts are considered on a rolling basis" /&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;For the last several years, #MeToo and #LoSHA have set the course for rousing debates within feminist praxis and contemporary global politics. It also foregrounded the ubiquitous presence of the list in its various forms, not only on the internet but across diverse aspects of media culture. Much debate has emerged about specificities and implications of the list as an information artefact, especially in the case of #LoSHA and NRC - its role in creation and curation of information, in building solidarities and communities of practice, its dependencies on networked media infrastructures, its deployment by hegemonic entities and in turn for countering dominant discourses.&lt;/p&gt;
&lt;p&gt;From Mailing Lists to WhatsApp Broadcast Lists, lists have been the very basis of multi-casting capabilities of the early and the recent internets. The list - in terms of list of people receiving a message, list of machines connecting to a router or a tower, list of ‘friends’ and ‘followers’ ‘added’ to your social media persona - structures the open-ended multi-directional information flow possibilities of the internet. It simultaneously engenders networks of connected machines and bodies, topographies of media circulation, and social graphs of affective connections and consumptions.&lt;/p&gt;
&lt;p&gt;As a media format that is easy to create, circulate, and access (as seen in the number of rescue and relief lists that flood the web during national disasters) or one that is essential in classification and cross-referencing (such as public records and memory institutions), the list becomes an essential trope to understand new media forms today, as the skeletal frame on which much digital content and design is structured and also consumed through.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;What new subjectivities - indicative of different asymmetries of power/knowledge - do list-making, and being listed, engender? How are they hegemonic or intersectional?&lt;/li&gt;
&lt;li&gt;What new modes of questioning and meaning-making have manifested today in various practices of list-making?
What modalities of creation and circulation of lists affords their authority; what makes them legitimate information artefacts, or contentious forms of knowledge?&lt;/li&gt;
&lt;li&gt;How and when do lists became digital, where are lists on paper? How do we understand their ephemerality or robustness; are they medium or message?&lt;/li&gt;
&lt;li&gt;Are there cultural economies of lists, list-making, and getting listed? Who decides, and who gets invisibilized on lists?&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Call for Essays&lt;/h2&gt;
&lt;p&gt;We invite abstracts for essays that explore social, economic, cultural, political, infrastructural, or aesthetic dimensions of the ‘list’.&lt;/p&gt;
&lt;p&gt;Please submit the abstracts by &lt;strong&gt;Friday, August 23, 2019&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;We will select 10 abstracts and announce them on Friday, August 30. The selected authors are expected to submit a full  draft of the essay (of 2000-3000 words) by Monday, September 30. We will share editorial suggestions with the authors, and the final versions of the essays will be published on the &lt;a href="https://medium.com/rawblog" target="_blank"&gt;researchers@work blog&lt;/a&gt; from November onwards. We will offer Rs. 5,000 as honorarium to all selected authors.&lt;/p&gt;
&lt;p&gt;Please submit the abstract (300-500 words), and a short biographic note, in a single text file with the title of the essay and your name via email sent to &lt;a href="mailto:raw@cis-india.org"&gt;raw@cis-india.org&lt;/a&gt;, with the subject line of ‘List’.&lt;/p&gt;
&lt;p&gt;Authors are very much welcome to work with text, images, sounds, videos, code, and other mediatic forms that the internet offers.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/call-for-essays-list'&gt;https://cis-india.org/raw/call-for-essays-list&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sneha-pp</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>List</dc:subject>
    
    
        <dc:subject>RAW Blog</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Call for Essays</dc:subject>
    
    
        <dc:subject>Internet Studies</dc:subject>
    

   <dc:date>2019-10-11T17:07:26Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/stil-2020-call">
    <title>Call for Contributions and Reflections: Your experiences in Decolonizing the Internet’s Languages!</title>
    <link>https://cis-india.org/raw/stil-2020-call</link>
    <description>
        &lt;b&gt;Whose Knowledge?, the Oxford Internet Institute, and the Centre for Internet and Society are creating a State of the Internet’s Languages report, as baseline research with both numbers and stories, to demonstrate how far we are from making the internet multilingual. We also hope to offer some possibilities for doing more to create the multilingual internet we want. This research needs the experiences and expertise of people who think about these issues of language online from different perspectives. Read the Call here and share your submission by September 2, 2019.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Cross-posted from the Whose Knowledge? website: &lt;a href="https://whoseknowledge.org/initiatives/callforcontributions/" target="_blank"&gt;Call for Contributions and Reflections&lt;/a&gt;&lt;/h4&gt;
&lt;p&gt;The call is available in &lt;a href="https://whoseknowledge.org/initiatives/callforcontributions/#CIS-AR" target="_blank"&gt;Arabic&lt;/a&gt;, &lt;a href="https://whoseknowledge.org/initiatives/callforcontributions/#CIS-PT" target="_blank"&gt;Brazilian Portuguese&lt;/a&gt;, &lt;a href="#en"&gt;English&lt;/a&gt;, &lt;a href="https://whoseknowledge.org/initiatives/callforcontributions/#CIS-IZ" target="_blank"&gt;IsiZulu&lt;/a&gt;, &lt;a href="https://whoseknowledge.org/initiatives/callforcontributions/#CIS-ES" target="_blank"&gt;Spanish&lt;/a&gt;, and &lt;a href="#ta"&gt;Tamil&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Note:&lt;/strong&gt; This call for contributions is in a few languages right now, but we invite our friends and communities to translate into many more! Please reach out to info (at) whoseknowledge (dot) org with your translations… thank you!&lt;/p&gt;
&lt;hr /&gt;
&lt;img src="https://raw.githubusercontent.com/cis-india/website/master/img/CISraw_WK-OII_DTIL-banner2.png" alt="Call for Contributions and Reflections: Your experiences in Decolonizing the Internet’s Languages!" /&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;blockquote&gt;
&lt;h4 id="en"&gt;“It’s not just the words that will be lost. The language is the heart of our culture; it holds our thoughts, our way of seeing the world. It’s too beautiful for English to explain.”&lt;/h4&gt;
– Potawatomi elder, cited in Robin Wall Kimmerer’s “Braiding Sweetgrass.”&lt;/blockquote&gt;
&lt;p&gt;&lt;strong&gt;The problem:&lt;/strong&gt; The internet we have today is not multilingual enough to reflect the full depth and breadth of humanity. Language is a good proxy for, or way to understand, knowledge – different languages can represent different ways of knowing and learning about our worlds. Yet most online knowledge today is created and accessible only through colonial languages, and mostly English. The UNESCO Report on ‘&lt;a href="https://unesdoc.unesco.org/in/documentViewer.xhtml?v=2.1.196&amp;amp;id=p::usmarcdef_0000232743&amp;amp;file=/in/rest/annotationSVC/DownloadWatermarkedAttachment/attach_import_8df09604-0040-4b44-b53c-110207ac407d%3F_%3D232743eng.pdf&amp;amp;locale=en&amp;amp;multi=true&amp;amp;ark=/ark:/48223/pf0000232743/PDF/232743eng.pdf#685_15_CI_EN_int.indd%3A.7579%3A23" target="_blank"&gt;A Decade of Promoting Multilingualism in Cyberspace&lt;/a&gt;’ (2015) estimated that “out of the world’s approximately 6,000 languages, just 10 of them make up 84.3 percent of people using the Internet, with English and Chinese the dominant languages, accounting for 52 per cent of Internet users worldwide.” More languages become endangered and disappear every year; &lt;a href="http://www.unesco.org/new/en/culture/themes/endangered-languages/atlas-of-languages-in-danger/" target="_blank"&gt;230 languages have become extinct between 1950 and 2010&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;At best, then, 7% of the world’s &lt;a href="https://www.ethnologue.com/statistics" target="_blank"&gt;languages&lt;/a&gt; are captured in published material, and an even smaller fraction of these languages are available online. This is particularly critical for communities who have been historically or currently marginalized by power and privilege – women, people of colour, LGBT*QIA folks, indigenous communities, and others marginalized from the global South (Asia, Africa, Latin America, the Caribbean and Pacific Islands). We often cannot add or access knowledge in our own languages on the internet. This reinforces and deepens inequalities and invisibilities that already exist offline, and denies all of us the richness of the multiple knowledges of the world.&lt;/p&gt;
&lt;p&gt;Some of the issues that shape our abilities to create and share content online in our languages include:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The internet’s infrastructure (hardware, software, platforms, protocols…);&lt;/li&gt;
&lt;li&gt;Content management tools and technologies for translation, digitization, and archiving (voice, machine-learning systems and AI, semantic web…);&lt;/li&gt;
&lt;li&gt;The experience of those who consume and produce information online in different languages (devices like cell phones and laptops, messaging tools, micro-blogging, audio-video…);&lt;/li&gt;
&lt;li&gt;The experience of looking for content in different languages online, through search engines and other tools.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Understanding the range of these issues will help us map the possibilities and concerns around linguistic biases and disparities on the internet.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Who we are:&lt;/strong&gt; We are a group of three research partners who believe that the internet we co-create should support, share, and amplify knowledge in all of the world’s languages. For this to happen, we need to better understand the challenges and opportunities that support or prevent our languages and knowledges from being online. The Centre for Internet and Society (CIS) is a non-profit organisation that undertakes interdisciplinary research on internet and digital technologies from policy and academic perspectives. The areas of focus include digital accessibility for persons with disabilities, access to knowledge, intellectual property rights, openness (including open data, free and open source software, open standards, open access, open educational resources, and open video), internet governance, telecommunication reform, digital privacy, and cyber-security. The &lt;a href="https://www.oii.ox.ac.uk/" target="_blank"&gt;Oxford Internet Institute&lt;/a&gt; is a multidisciplinary research and teaching department of the University of Oxford, dedicated to the social science of the Internet. &lt;a href="https://whoseknowledge.org/" target="_blank"&gt;Whose Knowledge?&lt;/a&gt; is a global campaign to centre the knowledges of marginalized communities – the majority of the world – online.&lt;/p&gt;
&lt;p&gt;Together we are creating a State of the Internet’s Languages report, as baseline research with both numbers and stories, to demonstrate how far we are from making the internet multilingual. We also hope to offer some possibilities for doing more to create the multilingual internet we want.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Why we need YOU:&lt;/strong&gt; This research needs the experiences and expertise of people who think about these issues of language online from different perspectives.&lt;/p&gt;
&lt;p&gt;You may be a person who:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Self-identifies as being from a marginalized community, and you find it difficult to bring your community’s knowledge online because the technology to display your language’s script is hard to access or read&lt;/li&gt;
&lt;li&gt;Works on creating content in languages that are from parts of the world, and from people, who are mostly invisible and unheard online&lt;/li&gt;
&lt;li&gt;Is a techie who works on making keyboards for non-colonial languages&lt;/li&gt;
&lt;li&gt;Is a linguist who tries to bring together communities and technologies in a way that is easy and accessible&lt;/li&gt;
&lt;li&gt;... you may be any of these, all of these, or more!&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;We are looking for your experience online to help us tell the story of how limited the language capacities of the internet are, currently, and how much opportunity there is for making the internet share our knowledges in our many different languages. Most importantly: you don’t have to be an academic or researcher to apply, we particularly encourage people experiencing these issues in their everyday lives and work to contribute!&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Some of the key questions we’d like you to explore:&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;How are you or your community using your language online?&lt;/li&gt;
&lt;li&gt;What do you wish you could create or share in your language online that you can’t today?&lt;/li&gt;
&lt;li&gt;What does content in your language look like online? What exists, what’s missing? (&lt;em&gt;you might think about, for example, news, social media, education or government websites, e-commerce, entertainment, online libraries and archives, self-published content, etc&lt;/em&gt;)&lt;/li&gt;
&lt;li&gt;How and where and using what technologies do you share or create content in your language? (&lt;em&gt;you might think about, for example, video, audio, writing, social media, digitization…whatever formats, tools, processes or websites you use for creating oral, visual, textual, or other forms of content&lt;/em&gt;.)&lt;/li&gt;
&lt;li&gt;What is challenging to create or share on your language online? (&lt;em&gt;you might think about, for example, access, device usability, platforms, websites, apps and other tools, software, fonts, digital literacy, etc when developing digital archives, online language resources, or just making any presence on the web in general for your language&lt;/em&gt;.)&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Submissions:&lt;/h3&gt;
&lt;p&gt;We would love to hear about your and your community’s experiences in response to any or some of the above questions!&lt;/p&gt;
&lt;p&gt;Your contribution could be in the form of a written essay, a visualization or work of art, a video or recorded conversation – we’d be happy to interview you if that’s your preference. We would be happy to accept in any language, and will review the submissions with the support of our multilingual communities and friends.&lt;/p&gt;
&lt;p&gt;Are you interested in participating? Please email &lt;strong&gt;raw [at] cis-india [dot] org&lt;/strong&gt; a short note (of about 300 words) by &lt;strong&gt;2 September at 23:59 IST (Indian Standard Time)&lt;/strong&gt;, briefly outlining your idea along with the following information:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Your name&lt;/li&gt;
&lt;li&gt;Your location – both country of origin and your current location is useful!&lt;/li&gt;
&lt;li&gt;Your language(s)&lt;/li&gt;
&lt;li&gt;Your community or any other background you’d care to share with us&lt;/li&gt;
&lt;li&gt;Which questions you’re interested in addressing, and why&lt;/li&gt;
&lt;li&gt;Your prefered contribution format&lt;/li&gt;
&lt;li&gt;Any requests for how we can best support your participation&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Timeline:&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;By 2nd September 2019:&lt;/strong&gt; Send us your submission note&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;By 1st November 2019:&lt;/strong&gt; Contributors will be notified of selection&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;By 1st December 2019:&lt;/strong&gt; First round of contributions are due. We’ll work with you to finalise contributions by mid January.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Selected contributors will be offered an honorarium of USD 500, and their final works will be published as part of the Decolonising the Internet – Languages Report, in early 2020.&lt;/p&gt;
&lt;hr /&gt;
&lt;h2 id="ta"&gt;பங்களிப்பதற்காக அழைப்பு இணைய மொழி ஆதிக்கச் சூழலை மாற்றியதில் உங்கள்அனுபவம்!&lt;/h2&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;blockquote&gt;
&lt;h4&gt;“மொழி அழிவால் சொற்கள் மட்டும் அழிவதில்லை. நம் பண்பாட்டின் சாரமே மொழி தான். மொழியே நம் எண்ணங்களை வெளிப்படுத்துகிறது. இவ்வுலகத்தை நாம் காண்பதும் மொழிவழியே தான். ஆங்கிலத்தால் அதை ஒருக்காலும் வெளிப்படுத்த முடியாது.”&lt;/h4&gt;
– போட்டோவாடோமி எல்டர் (ராபின் வால் கிம்மெரார் எழுதிய ‘பிரெயிடிங் சுவீட்கிராஸ்’ என்ற நூலில் இருந்து)&lt;/blockquote&gt;
&lt;p&gt;&lt;strong&gt;சிக்கல்:&lt;/strong&gt; மனித குலத்தின் பரந்துவிரிந்த பண்பாட்டுச் சூழலை வெளிப்படுத்தும் அளவுக்கு இன்றைய இணையம் பன்மொழிச் சூழல் கொண்டதாய் இல்லை. தகவல்களை அறிந்துகொள்வதற்கு மொழி ஒரு கருவியாய் இருக்கிறது. ஒவ்வொரு மொழியும் உலகத்தை வெவ்வேறுவிதத்தில் காட்டத்தக்கன. இருந்தபோதும், பெரும்பாலான அறிவுசார் தளங்கள் ஆதிக்க மொழிகளில், குறிப்பாக ஆங்கிலத்தில் அதிகளவில் இருக்கின்றன. ‘இணையவெளியில் பன்மொழிச் சூழலைக் ஊக்குவிக்க பத்தாண்டுகளில் எடுத்த முயற்சி’ (2015) என்ற யுனெசுகோ அறிக்கையில் குறிப்பிட்டுள்ளதாவது: “உலகில் பேசப்படும் சுமார் 6,000 மொழிகளில், வெறும் 10 மொழியை பேசுவோர் மட்டுமே இணையத்தின் 84.3 சதவீதம் பேராக உள்ளனர். இவற்றில், ஆங்கிலமும் மாண்டரின் சீனமும் பேசுவோர் மட்டும் 52 சதவீதத்தினர் என்பது குறிப்பிடத்தக்கது.” ஒவ்வொரு ஆண்டும் அதிகளவிலான மொழிகள் அருகி, அழிந்து வருகின்றன. 1950 – 2010 ஆகிய ஆண்டுகளுக்குள் 230 மொழிகள் அழிந்திருக்கின்றன&lt;/p&gt;
&lt;p&gt;எல்லா உள்ளடக்கத்தையும் கணக்கில் எடுத்தால் கூட, உலகின் 7% மொழிகளில் தான் ஆக்கங்கள் இருக்கின்றன. இவற்றில் சிலவே இணையத்தில் கிடைக்கின்றன. முற்காலத்தில் ஒடுக்கப்பட்டிருந்த பழங்குடியின சமூகத்தினர், அடக்குமுறைக்கு உட்பட்டிருந்த பெண்கள், நிறவெறிக்கு உட்பட்டிருந்தோர், மாற்று பாலின கருத்தியல் கொன்டோர் ஆகியோருக்கான ஆக்கங்கள் வெகு சில. பெரும்பாலானோர் இணையத்தில் தம் தாய்மொழியில் தகவல்களை தேடிப் பெற முடிவதில்லை. தம் மொழியில் கிடைக்கப்பெறாத பெரும்பாலானோருக்கு இவ்வுலகைப் பற்றிய அறிவுசார் ஆக்கங்கள் மறுக்கப்பட்டு, சமமின்மை வெளிப்படுகிறது.&lt;/p&gt;
&lt;p&gt;நம் மொழியிலேயே இணையத்தில் ஆக்கங்களை உருவாக்குவதிலும் பகிர்வதிலும் சில சிக்கல்களை எதிர்நோக்குகிறோம். அவை:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;கட்டமைப்பு வசதிக் குறைபாடு : வன்பொருள், மென்பொருள், இயங்குதளம், மரபுத்தகவு&lt;/li&gt;
&lt;li&gt;உள்ளடக்க மேம்பாட்டுக் கருவிகளும் தொழில்நுட்பங்களும் போதிய அளவில் இல்லாமை: மொழிபெயர்ப்புக் கருவி, மின்மயமாக்கக் கருவி, சேமிப்பகம், செயற்கை நுண்ணறிவு, குரல்வழி உள்ளடக்கம்&lt;/li&gt;
&lt;li&gt;இணையத்தில் பொருட்களை வாங்கிப் பயன்படுத்துவோரின் கருத்துக்களோ, பொருட்களைப் பற்றிய தகவலோ, இணையச் செயலிகளான செய்தியனுப்பல், வலைப்பூ போன்றவையோ தம் மொழியில் இல்லாமை&lt;/li&gt;
&lt;li&gt;தேடுபொறிகளையும் பிற கருவிகளையும் கொன்டு வெவ்வேறு மொழிகளில் ஆக்கங்களைத் தேடிப் பழக்கம் இல்லாமை&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;இச்சிக்கல்களைப் புரிந்துகொள்வதன் மூலம், இணையத்தின் பன்மொழிச் சூழலுக்கான தேவைகளையும் அவற்றிற்கான குறைநிறைகளையும் சரிப்படுத்திக்கொள்ள முடியும்.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;நாங்கள் யார்?:&lt;/strong&gt; உலக மொழிகளிலான ஆக்கங்கள் இணையவெளியில் இடம்பெற உதவவும், ஊக்குவிக்கவும் மூன்று ஆய்வு நிறுவனங்கள் கைகோர்த்துள்ளோம். இதை நடைமுறைப்படுத்துவதற்கு முன், நாம் எதிர்கொள்ளும் சிக்கல்களையும் பெறக்கூடிய வாய்ப்புகளையும் நன்கு அறிந்துகொள்வது அவசியம் என உணர்ந்தோம்.&lt;/p&gt;
&lt;p&gt;1. சென்டர் ஃபார் இன்டர்நெட் அன்ட் சொசைட்டி (the Centre for Internet and Society or CIS) என்ற தன்னார்வல நிறுவனம், இணையத்தையும், மின்மயமாக்கத் தொழில்நுட்பங்களையும் பற்றிய ஆய்வுகளை கொள்கை நோக்கிலும், கல்விசார் நோக்கிலும் செய்கிறது. உடற்குறைபாடு உடையோருக்கு மின்மயமாக்கிய உள்ளடக்கம், அறிவைப் பெறும் சூழல், அறிவுசார் சொத்துரிமை, திறந்தவெளி ஆக்கங்கள், இணையவழி ஆளுகை, தொழில்நுட்பச் சீர்திருத்தம், இணையவெளியில் தனியுரிமை, இணையவெளிப் பாதுகாப்பு போன்ற தலைப்புகளில் இந்நிறுவனம் கவனம் செலுத்துகிறது.&lt;/p&gt;
&lt;p&gt;2. ஆக்சுபோர்டு இன்டர்நெட் இன்ஸ்டிடியூட் என்ற ஆய்வு நிறுவனம் ஆக்சுபோர்டு பல்கலைக்கழகத்தைச் சேர்ந்தது. இது இணையச் சமூகத்துக்காகவே தனித்துவமாக உருவாக்கப்பட்ட துறை.&lt;/p&gt;
&lt;p&gt;3. ஹூஸ் நாலெட்ஜ் என்ற இயக்கம், உலகளவில் ஒடுக்கப்பட்ட சமூகங்களின் அறிவுசார் ஆக்கங்களை இணையவெளியில் கொண்டு வர முயற்சி எடுக்கிறது.&lt;/p&gt;
&lt;p&gt;நாங்கள் மூவரும் இணைந்து, இணையத்தில் பயன்பாட்டிலுள்ள மொழிகளைப் பற்றிய ஆய்வறிக்கையை தயாரிக்கிறோம். புள்ளிவிவரங்களையும், தகவல்களையும் வெளியிட்டு, பன்மொழிச் சூழலில் எந்தளவு பின்தங்கி இருக்கிறோம் என்பதை உணர்த்த உள்ளோம். இணையவெளியில் ஆக்கங்களை வெளியிட எங்களால் முடிந்த சில வாய்ப்புகளையும் வழங்க உள்ளோம்.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;உங்கள் உதவி எங்களுக்கு தேவைப்படுவதன் காரணம்:&lt;/strong&gt; இத்தகைய சிக்கல்களை எதிர்நோக்கி வருவோரின் அனுபவங்களையும், அவர்கள் முயன்ற தீர்வுகளையும் பற்றி அறிந்துகொள்வதே இவ்வாய்வின் நோக்கம்.&lt;/p&gt;
&lt;p&gt;நீங்கள்,&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;ஒடுக்கப்பட்ட சமூகத்தைச் சேர்ந்தவராக உணர்ந்தாலோ, உங்கள் சமூகத்தின் அறிவுசார் உள்ளடக்கங்கள் இணையவெளியில் கிடைப்பதில்லை என்று கருதினாலோ, உங்கள் மொழி எழுத்துவடிவங்கள் அணுகவும், படிக்கவும் ஏற்றவகையில் கணினிமயமாக்கப்படவில்லை என்று உணர்ந்தாலோ,&lt;/li&gt;
&lt;li&gt;தொழில்நுட்பராக இருந்து, ஆதிக்கத்துக்கு உட்பட்டோரின் மொழிகளுக்காக விசைப்பலகைகள் செய்பவராக இருந்தாலோ,&lt;/li&gt;
&lt;li&gt;மொழியியலாளராக இருந்து, பல்வேறு சமூகங்களை ஒருங்கிணைத்து, தொழில்நுட்பத்தை அவர்களுக்கு புரியும் வகையிலும், அணுகும் வகையிலும் கிடைக்கச் செய்தாலோ,&lt;/li&gt;
&lt;li&gt;… உங்களைத் தான் தேடிக் கொன்டிருக்கிறோம்!&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;உங்கள் இணையவெளி அனுபவங்களை எங்களுக்கு தெரிவிப்பதன் மூலம், ஒவ்வொரு மொழிச் சமூகத்தின் நிலையையும் நாங்கள் அறிந்துகொள்ள உதவியாக இருக்கும். அத்துடன், எத்தகைய வாய்ப்புகளை ஏற்படுத்தித் தரலாம் என்றும் நாங்கள் சிந்திக்க உதவியாய் இருக்கும்.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;உங்களிடம் நாங்கள் கேட்க விரும்பும் சில கேள்விகள்:&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;நீங்களும், உங்கள் மொழிச் சமூகத்தினரும் இணையவெளியில் உங்கள் மொழியை எப்படி பயன்படுத்துகிறீர்கள்?&lt;/li&gt;
&lt;li&gt;இன்றைய நிலையில், இணையவெளியில் உங்கள் மொழியைக் கொண்டு செய்ய முடியாதது இருப்பின், அதற்கு என்ன செய்ய விரும்புவீர்கள்?&lt;/li&gt;
&lt;li&gt;இணையவெளியில் உங்கள் மொழியில் என்னென்ன ஆக்கங்கள் இருக்கின்றன, எவை இல்லை? (எடுத்துக்காட்டாக, செய்திகள், சமுக வலைத்தளம், கல்விசார் உள்ளடக்கம், அரசுசார் உள்ளடக்கம், மனமகிழ் வீடியோக்கள், இணையவழி கற்றல், போன்றவை)&lt;/li&gt;
&lt;li&gt;உங்கள் மொழியில் ஆக்கங்களை படைப்பதற்கு எந்த தளத்தை நாடுவீர்கள், எந்த தொழில்நுட்பத்தை பயன்படுத்துவீர்கள்? (எ.கா : ஒளி, ஒலி, உரை, உரைநடை ஒழுங்கமைவு, பிழைத்திருத்திக் கருவி போன்றவை)&lt;/li&gt;
&lt;li&gt;உங்கள் மொழியில் எழுதுவதற்கோ, பகிர்வதற்கோ முயலும் போது என்னென்ன மாதிரியான சிக்கல்களை இணையவெளியில் சந்திக்கிறீர்கள்? (எ.கா: அணுக்கம் இன்மை, கருவியில் எழுத்துரு ஆதரவின்மை, பிழை திருத்த கருவி இன்மை)&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;ஆய்வேடு சமர்ப்பித்தல்:&lt;/h3&gt;
&lt;p&gt;மேற்கண்ட கேள்விகளுக்கு உங்கள் சமூகத்தினரிடமும், உங்களிடமும் அனுபவம் மூலம் விடை கிடைத்திருக்கும் என நம்புகிறோம். அவற்றைப் பற்றி தெரிந்து கொள்ள விரும்புகிறோம்!&lt;/p&gt;
&lt;p&gt;கட்டுரையாகவோ, கலைப்படைப்பாகவோ, பதிவு செய்யப்பட்ட ஆவணமாகவோ, வேறு வடிவிலோ உங்கள் படைப்புகள் இருக்கலாம். நீங்கள் விரும்பினால் உங்களை பேட்டி காணவும் தயாராக இருக்கிறோம். உங்கள் படைப்புகள் எந்த மொழியில் இருந்தாலும் ஏற்போம். எங்களிடமுள்ள பன்மொழிச் சமூகத்திடம் உங்கள் படைப்புகளை கொடுத்து அவற்றை சீராய்வு செய்யச் சொல்வோம்.&lt;/p&gt;
&lt;p&gt;உங்களுக்கு பங்கேற்க விருப்பமா? raw@cis-india.org என்ற மின்னஞ்சல் முகவரிக்கு, செப்டம்பர் இரன்டாம் தேதிக்கு முன்னர் அனுப்புக. 300 சொற்களுக்கு மிகாமல், கீழ்க்காணும் விவரங்களைக்&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;உங்கள் பெயர்&lt;/li&gt;
&lt;li&gt;இருப்பிடம் – பிறந்த நாடும், தற்போது வாழும் நாடும்&lt;/li&gt;
&lt;li&gt;உங்கள் மொழி(கள்)&lt;/li&gt;
&lt;li&gt;உங்கள் சமூகத்தினரைப் பற்றிய தகவல் (அ) நீங்கள் விரும்பும் சமூகத்தினரைப் பற்றிய தகவல்&lt;/li&gt;
&lt;li&gt;எந்தெந்த கேள்விகளுக்கு பதிலளிக்க விரும்புகிறீர்கள், ஏன்&lt;/li&gt;
&lt;li&gt;உங்கள் படைப்பு எந்த வடிவில் உள்ளது&lt;/li&gt;
&lt;li&gt;உங்கள் பங்களிப்பை மேம்படுத்தல் நாங்கள் ஏதும் செய்ய வேண்டுமா&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;காலகட்டம்:&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;2 செப்டம்பர், 2019:&lt;/strong&gt; உங்கள் படைப்புகள் எங்களை வந்தடைய வேண்டிய கடைசி நாள்&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;1 நவம்பர், 2019:&lt;/strong&gt; தேர்ந்தெடுக்கப்பட்ட படைப்பாளர்களிடம் விவரம் தெரிவிக்கப்படும் நாள்&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;1 திசம்பர், 2019:&lt;/strong&gt; முதற்கட்ட பங்களிப்பு நடைபெறும். பங்களிப்பை ஜனவரி மாத மத்தியில் முடிக்க முயற்சி செய்வோம்.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;தேர்ந்தெடுக்கப்பட்ட படைப்பாளிகளுக்கு 500 அமெரிக்க டாலர்கள் ஊக்கத்தொகையாக வழங்கப்படும். நாங்கள் தயாரிக்கும் அறிக்கையில் அவர்களின் படைப்பு வெளியிடப்படும்.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/stil-2020-call'&gt;https://cis-india.org/raw/stil-2020-call&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sneha-pp</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Language</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Digital Knowledge</dc:subject>
    
    
        <dc:subject>Decolonizing the Internet's Languages</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>State of the Internet's Languages</dc:subject>
    
    
        <dc:subject>Digital Humanities</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2019-08-07T12:29:25Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/comments-online-video-report">
    <title>Call for Comments for Report on the Online Video Environment in India</title>
    <link>https://cis-india.org/openness/blog-old/comments-online-video-report</link>
    <description>
        &lt;b&gt;The Open Video Alliance, the Centre for Internet and Society and iCommons are pleased to announce a public call for comments on version 1 of "Online Video Environment in India: A Survey Report".&lt;/b&gt;
        &lt;p&gt;&lt;a href="https://cis-india.org/openness/publications/content-access/online-video-india-survey-v1" class="internal-link" title="The Online Video Environment in India: A Survey Report"&gt;This report&lt;/a&gt; is an outcome of &lt;a href="https://cis-india.org/advocacy/openness/blog/open-video-research" class="external-link"&gt;a research&lt;/a&gt; &lt;a class="external-link" href="http://openvideoalliance.org/2010/04/research-with-centre-for-internet-society-bangalore/?l=en"&gt;project&lt;/a&gt; that seeks to survey the online video environment in India and the  opportunities this new medium presents for creative expression and civic  engagement. This report by Siddharth Chadha, Ben Moskowitz, and Pranesh  Prakash seeks to define key issues in the Indian context and begins to  develop a short-term policy framework to address them.&lt;/p&gt;
&lt;p&gt;The basic assumption of this paper is that the online video medium  should support creative and technical innovation, competition, and  public participation, and that open source technology can help develop  these traits. These assumptions are not elaborated upon here. Instead,  this report looks at questions of “openness” that are not strictly  technological and legal; that are specific to video in India; and that  provide points of entry to a simple policy framework.&lt;/p&gt;
&lt;p&gt;Please do write in to Ben Moskowitz (ben at openvideoalliance.org)  and Pranesh Prakash (pranesh at cis-india.org) with any suggestions,  criticisms, or general comments that you have by January 20, 2011.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/openness/publications/content-access/online-video-india-survey-v1" class="internal-link" title="The Online Video Environment in India: A Survey Report"&gt;Download the paper&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/comments-online-video-report'&gt;https://cis-india.org/openness/blog-old/comments-online-video-report&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Open Video</dc:subject>
    

   <dc:date>2012-12-14T12:12:14Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/open-government-data-report">
    <title>Call for Comments for Report on Open Government Data in India</title>
    <link>https://cis-india.org/openness/blog-old/open-government-data-report</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society is pleased to announce a public call for comments on the Report on Open Government Data in India prepared by Glover Wright, Pranesh Prakash, Sunil Abraham and Nishant Shah.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This report situates the current move towards open government data in India in the context of the country’s growingly sophisticated information and communications technology (ICT) practices as well as the Right to Information Act. It relies primarily on conversations—both on the record and off—with government officials, businesses, civil society organizations, and individual activists. For background it relies on a review of the literature relevant to OGD and RTI generally, to present a snapshot of where India stands now in respect to OGD, and to predict where it is likely to go in the near future. It seeks to understand what “open government data” means in an Indian context, and what effects institutionalized open data practices and ideas might have on Indian society. Finally, it suggests certain technical and policy strategies for developing, promoting, and implementing, and maintaining a robust open government data policy in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Please do write in to Pranesh Prakash (pranesh at cis-india.org) with any suggestions, criticisms, or general comments that you have by 30 January 2011.&lt;/p&gt;
&lt;p&gt;Download the complete report &lt;a class="internal-link" href="http://www.cis-india.org/openness/publications/ogd-report" title="Open Government Data Report"&gt;here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/open-government-data-report'&gt;https://cis-india.org/openness/blog-old/open-government-data-report&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Data</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2013-03-01T05:50:49Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/breaking-down-section-66-a-of-the-it-act">
    <title>Breaking Down Section 66A of the IT Act</title>
    <link>https://cis-india.org/internet-governance/blog/breaking-down-section-66-a-of-the-it-act</link>
    <description>
        &lt;b&gt;Section 66A of the Information Technology Act, which prescribes 'punishment for sending offensive messages through communication service, etc.'  is widely held by lawyers and legal academics to be unconstitutional. In this post Pranesh Prakash explores why that section is unconstitutional, how it came to be, the state of the law elsewhere, and how we can move forward.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Back in February 2009 (after the IT Amendment Act, 2008 was hurriedly passed on December 22, 2008 by the Lok Sabha, and a day after by the Rajya Sabha&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt; but before it was &lt;a class="external-link" href="http://deity.gov.in/sites/upload_files/dit/files/downloads/itact2000/act301009.pdf"&gt;notified on October 27, 2009&lt;/a&gt;) I had written that &lt;a href="https://cis-india.org/internet-governance/resources/section-66A-information-technology-act" class="external-link"&gt;s.66A&lt;/a&gt; is "patently in &lt;a href="https://cis-india.org/internet-governance/publications/it-act/short-note-on-amendment-act-2008/" class="external-link"&gt;violation of Art. 19(1)(a) of the Constitution of India&lt;/a&gt;":&lt;/p&gt;
&lt;p class="visualClear" style="text-align: justify; "&gt;Section 66A which punishes persons for sending offensive messages is overly broad, and is patently in violation of Art. 19(1)(a) of our Constitution. The fact that some information is "grossly offensive" (s.66A(a)) or that it causes "annoyance" or "inconvenience" while being known to be false (s.66A(c)) cannot be a reason for curbing the freedom of speech unless it is directly related to decency or morality, public order, or defamation (or any of the four other grounds listed in Art. 19(2)). It must be stated here that many argue that John Stuart Mill's harm principle provides a better framework for freedom of expression than Joel Feinberg's offence principle. The latter part of s.66A(c), which talks of deception, is sufficient to combat spam and phishing, and hence the first half, talking of annoyance or inconvenience is not required. Additionally, it would be beneficial if an explanation could be added to s.66A(c) to make clear what "origin" means in that section. Because depending on the construction of that word s.66A(c) can, for instance, unintentionally prevent organisations from using proxy servers, and may prevent a person from using a sender envelope different from the "from" address in an e-mail (a feature that many e-mail providers like Gmail implement to allow people to send mails from their work account while being logged in to their personal account). Furthermore, it may also prevent remailers, tunnelling, and other forms of ensuring anonymity online. This doesn't seem to be what is intended by the legislature, but the section might end up having that effect. This should hence be clarified.&lt;/p&gt;
&lt;p class="visualClear" style="text-align: justify; "&gt;I stand by that analysis. But given that it is quite sparse, in this post I will examine s.66A in detail.&lt;/p&gt;
&lt;p class="visualClear" style="text-align: justify; "&gt;Here's what s. 66A of the IT (Amendment) Act, 2008 states:&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;&lt;b&gt;66A. Punishment for sending offensive messages through communication service, etc.,&lt;br /&gt;&lt;/b&gt;Any person who sends, by means of a computer resource or a communication device,—&lt;br /&gt;(a) any information that is grossly offensive or has menacing character;&lt;br /&gt;(b) any information which he knows to be false, but for the purpose of causing annoyance, inconvenience,     danger, obstruction, insult, injury, criminal intimidation, enmity, hatred, or ill will, persistently by making use of such computer resource or a communication device,&lt;br /&gt;(c) any electronic mail or electronic mail message for the purpose of causing annoyance or inconvenience or to deceive or to mislead the addressee or recipient about the origin of such messages&lt;br /&gt;&lt;br /&gt;shall be punishable with imprisonment for a term which may extend to three years and with fine.&lt;br /&gt;&lt;br /&gt;Explanation: For the purposes of this section, terms "electronic mail" and "electronic mail message" means a message or information created or transmitted or received on a computer, computer system, computer resource or communication device including attachments in text, images, audio, video and any other electronic record, which may be transmitted with the message.&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;A large part of s.66A can be traced back to s.10(2) of the UK's Post Office (Amendment) Act, 1935:&lt;/p&gt;
&lt;p align="JUSTIFY" class="callout"&gt;If any person —&lt;br /&gt;(a)  sends any message by telephone which is grossly offensive or of an indecent, obscene, or menacing character; or&lt;br /&gt;(b) sends any message by telephone, or any telegram, which he knows to be false, for the purpose of causing annoyance, inconvenience, or needless anxiety to any other person; or&lt;br /&gt;(c) persistently makes telephone calls without reasonable cause and for any such purposes as aforesaid;&lt;br /&gt;he shall be liable upon summary conviction to a fine not exceeding ten pounds, or to imprisonment for a term not exceeding one month, or to both such fine and imprisonment.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Section 66A bears a striking resemblance to the three parts of this law from 1935, with clauses (b) and (c) being merged in the Indian law into a single clause (b) of s.66A, with a whole bunch of new "purposes" added. Interestingly, the Indian Post Office Act, 1898, was never amended to add this provision.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The differences between the two are worth exploring.&lt;/p&gt;
&lt;h3 align="JUSTIFY"&gt;Term of Punishment&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The first major difference is that the maximum term of imprisonment in the 1935 Act is only one month, compared to three years in s.66A of the IT Act. It seems the Indian government decided to subject the prison term to hyper-inflation to cover for the time. If this had happened for the punishment for, say, criminal defamation, then that would have a jail term of up to 72 years!  The current equivalent laws in the UK are the Communications Act, 2003 (s. 127) and the &lt;a class="external-link" href="http://www.legislation.gov.uk/ukpga/1988/27/section/1"&gt;Malicious Communications Act&lt;/a&gt; 1988 (s.1) for both of which the penalty is up to 6 months' imprisonment or to a maximum fine of £5000 or both. What's surprising is that in the Information Technology (Amendment) Bill of 2006, the penalty for section 66A was up to 2 years, and it was changed on December 16, 2008 through an amendment moved by Mr. A. Raja (the erstwhile Minister of Communications and IT) to 3 years. Given that parts of s.66A(c) resemble nuisance, it is instructive to note the term of punishment in the Indian Penal Code (IPC) for criminal nuisance: a fine of Rs. 200 with no prison term.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;"Sending" vs. "Publishing"&lt;/h3&gt;
&lt;p align="JUSTIFY"&gt;J. Sai Deepak, a lawyer, has made an interesting point that &lt;a class="external-link" href="http://thedemandingmistress.blogspot.in/2012/11/does-section-66a-of-information.html"&gt;the IT Act uses "send" as part of its wording, and not "publish"&lt;/a&gt;. Given that, only messages specifically directed at another would be included. While this is an interesting proposition, it cannot be accepted because: (1) even blog posts are "sent", albeit to the blog servers — s.66A doesn't say who it has to be sent to; (2) in the UK the Communications Act 2003 uses similar language and that, unlike the Malicious Communication Act 1988 which says "sends to another person", has been applied to public posts to Twitter, etc.; (3) The explanation to s.66A(c) explicitly uses the word "transmitted", which is far broader than "send", and it would be difficult to reconcile them unless "send" can encompass sending to the publishing intermediary like Twitter.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Part of the narrowing down of s.66A should definitely focus on making it applicable only to directed communication (as is the case with telephones, and with the UK's Malicious Communication Act), and not be applicable to publishing.&lt;/p&gt;
&lt;h3 align="JUSTIFY"&gt;Section 66A(c)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Section 66A(c) was also inserted through an amendment moved by Mr. Raja on December 16, 2008, which was passed by the Lok Sabha on December 22, 2008, and a day after by the Rajya Sabha. (The version introduced in Parliament in 2006 had only 66A(a) and (b).) This was done in response to the observation by the Standing Committee on Information Technology that there was no provision for spam. Hence it is clear that this is meant as an anti-spam provision. However, the careless phrasing makes it anything but an anti-spam provision. If instead of "for the purpose of causing annoyance or inconvenience or to deceive or to mislead the addressee or recipient about the origin of such messages" it was "for the purpose of causing annoyance and inconvenience and to deceive and to mislead the addressee or recipient about the origin of such messages", it would have been slightly closer to an anti-spam provision, but even then doesn't have the two core characteristics of spam: that it be unsolicited and that it be sent in bulk. (Whether only commercial messages should be regarded as spam is an open question.) That it arise from a duplicitous origin is not a requirement of spam (and in the UK, for instance, that is only an aggravating factor for what is already a fine-able activity).&lt;br /&gt;&lt;br /&gt;Curiously, the definitional problems do not stop there, but extend to the definitions of "electronic mail" and "electronic mail message" in the 'explanation' as well.  Those are so vast that more or less anything communicated electronically is counted as an e-mail, including forms of communication that aren't aimed at particular recipients the way e-mail is.&lt;br /&gt;&lt;br /&gt;Hence, the anti-spam provision does not cover spam, but covers everything else. This provision is certainly unconstitutional.&lt;/p&gt;
&lt;h3 class="visualClear" style="text-align: justify; "&gt;Section 66A(b)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Section 66A(b) has three main elements: (1) that the communication be known to be false; (2) that it be for the purpose of causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred or ill will; (3) that it be communicated persistently. The main problem here is, of course, (2). "Annoyance" and "inconvenience", "insult", "ill will" and "hatred" are very different from "injury", "danger", and "criminal intimidation".  That a lawmaker could feel that punishment for purposes this disparate belonged together in a single clause is quite astounding and without parallel (except in the rest of the IT Act). That's akin to having a single provision providing equal punishment for calling someone a moron ("insult") and threatening to kill someone ("criminal intimidation"). While persistent false communications for the purpose of annoying, insulting, inconveniencing, or causing ill will should not be criminalised (if need be, having it as a civil offence would more than suffice), doing so for the purpose of causing danger or criminal intimidation should. However, the question arises whether you need a separate provision in the IT Act for that. Criminal intimidation is already covered by ss. 503 and 506 of the IPC. Similarly, different kinds of causing danger are taken care of in ss.188, 268, 283, 285, 289, and other provisions. Similarly with the other "purposes" listed there, if, for instance, a provision is needed to penalise hoax bomb threats, then the provision clearly should not be mentioning words like "annoyance", and should not be made "persistent". (At any rate, s. 505(1) of the IPC suffices for hoax bomb threats, so you don't need a separate provision in the IT Act).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I would argue that in its current form this provision is unconstitutional, since there is no countervailing interest in criminalising false and persistent "insults", etc., that will allow those parts of this provision to survive the test of 'reasonableness' under Art.19(2). Furthermore, even bits that survive are largely redundant. While this unconstitutionality could be cured by better, narrower wording, even then one would need to ensure that there is no redundancy due to other provisions in other laws.&lt;/p&gt;
&lt;h3&gt;Section 66A(a)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In s.66A(a), the question immediately arises whether the information that is "grossly offensive" or "menacing" need to be addressed at someone specific and be seen as "grossly offensive" or "menacing" by that person, or be seen by a 'reasonable man' test.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Additionally, the term "grossly offensive" will have to be read in such a heightened manner as to not include merely causing offence.  The one other place where this phrase is used in Indian law is in s.20(b) of the Indian Post Office Act (prohibiting the sending by post of materials of an indecent, obscene, seditious, scurrilous, threatening, or grossly offensive character).  The big difference between s.20(b) of the IPO Act and s.66A of the IT Act is that the former is clearly restricted to one-to-one communication (the way the UK's Malicious Communication Act 1988 is).  Reducing the scope of s.66A to direct communications would make it less prone to challenge.&lt;br /&gt;&lt;br /&gt;Additionally, in order to ensure constitutionality, courts will have to ensure that "grossly offensive" does not simply end up meaning "offensive", and that the maximum punishment is not disproportionately high as it currently is.  Even laws specifically aimed at online bullying, such as the UK's Protection from Harassment Act 1997, can have unintended effects. As George Monbiot notes, the "first three people to be prosecuted under [the Protection from Harassment Act] were all peaceful protesters".&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Constitutional Arguments in Importing Laws from the UK&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The plain fact is that the Indian Constitution is stronger on free speech grounds than the (unwritten) UK Constitution, and the judiciary has wide powers of judicial review of statutes (i.e., the ability of a court to strike down a law passed by Parliament as 'unconstitutional'). Judicial review of statutes does not exist in the UK (with review under its EU obligations being the exception) as they believe that Parliament is supreme, unlike India. Putting those two aspects together, a law that is valid in the UK might well be unconstitutional in India for failing to fall within the eight octagonal walls of the reasonable restrictions allowed under Art.19(2). That raises the question of how they deal with such broad wording in the UK.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Genealogy of UK Law on Sending 'Indecent', 'Menacing', 'Grossly Offensive' Messages&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Quoting from the case of DPP v. Collins [2006] UKHL 40 [6]:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The genealogy of [s. 127(1) of the Communication Act] may be traced back to s.10(2)(a) of the Post Office (Amendment) Act, 1935, which made it an offence to send any message by telephone which is grossly offensive or of an indecent, obscene or menacing character. That subsection was reproduced with no change save of punctuation in s.66(a) of the Post Office Act 1953. It was again reproduced in s.78 of the Post Office Act 1969, save that "by means of a public telecommunication service" was substituted for "by telephone" and "any message" was changed to "a message or other matter". Section 78 was elaborated but substantially repeated in s.49(1)(a) of the British Telecommunications Act 1981 and was re-enacted (save for the substitution of "system" for "service") in s.43(1)(a) of the Telecommunications Act 1984. Section 43(1)(a) was in the same terms as s.127(1)(a) of the 2003 Act, save that it referred to "a public telecommunication system" and not (as in s.127(1)(a)) to a "public electronic communications network". Sections 11(1)(b) of the Post Office Act 1953 and 85(3) of the Postal Services Act 2000 made it an offence to send certain proscribed articles by post.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the above quotation talks about s.127(1) it is equally true about s.127(2) as well. In addition to that, in 1988, the &lt;a class="external-link" href="http://www.legislation.gov.uk/ukpga/1988/27/section/1"&gt;Malicious Communications Act&lt;/a&gt;&lt;a class="external-link" href="http://www.legislation.gov.uk/ukpga/1988/27/section/1"&gt;&lt;/a&gt; (s.1) was passed to prohibit one-to-one harassment along similar lines.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UK's Post Office Act was eclipsed by the Telecommunications Act in 1984, which in turn was replaced in 2003 by the Communications Act. (By contrast, we still stick on to the colonial Indian Post Office Act, 1898.)  Provisions from the 1935 Post Office Act were carried forward into the Telecommunications Act (s.43 on the "improper use of public telecommunication system"), and subsequently into s.127 of the Communications Act ("improper use of public electronic communications network").  Section 127 of the Communications Act states:&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;127. Improper use of public electronic communications network&lt;br /&gt;(1) A person is guilty of an offence if he — &lt;br /&gt;(a) sends by means of a public electronic communications network a message or other matter that is grossly offensive or of an indecent, obscene or menacing character; or&lt;br /&gt;(b) causes any such message or matter to be so sent.&lt;br /&gt;(2) A person is guilty of an offence if, for the purpose of causing annoyance, inconvenience or needless anxiety to another, he —&lt;br /&gt;(a) sends by means of a public electronic communications network, a message that he knows to be false,&lt;br /&gt;(b) causes such a message to be sent; or&lt;br /&gt;(c) persistently makes use of a public electronic communications network.&lt;br /&gt;(3) A person guilty of an offence under this section shall be liable, on summary conviction, to imprisonment for a term not exceeding six months or to a fine not exceeding level 5 on the standard scale, or to both.&lt;br /&gt;(4) Subsections (1) and (2) do not apply to anything done in the course of providing a programme service (within the meaning of the Broadcasting Act 1990 (c. 42)).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Currently in the UK there are calls for repeal of s.127. In a separate blog post I will look at how the UK courts have 'read down' the provisions of s.127 and other similar laws in order to be compliant with the European Convention on Human Rights.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Comparison between S. 66A and Other Statutes&lt;/h3&gt;
&lt;p&gt;Section 144, IPC, 1860&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Power to issue order in urgent cases of nuisance or  apprehended danger&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;...&lt;b&gt;obstruction, annoyance or injury&lt;/b&gt; to any person lawfully employed, or &lt;b&gt;danger &lt;/b&gt;to human life, health or safety,  or a disturbance of the public tranquillity&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Babulal Parate v. State of Maharastra and Ors. [1961 AIR SC 884] (Magistrates order under s. 144 of the Cr. PC, 1973 was in violation of Art.19(1)(a) of the Constitution).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;A special thanks is due to Snehashish Ghosh for compiling the below table.&lt;br /&gt;&lt;/i&gt;&lt;/p&gt;
&lt;table class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Section&lt;/th&gt;&lt;th&gt;Term(s)/phrase(s) used in 66A&lt;/th&gt;&lt;th&gt;Term(s)/ phrase(s) used in similar sections&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Section 66A (heading)&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Punishment for sending offensive messages through communication service, etc&lt;/td&gt;
&lt;td&gt;Section 127, CA, 2003, "Improper use of public electronic communications network"&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Section 66A(a)&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Any person who sends, by means of a computer resource or a communication device&lt;/td&gt;
&lt;td&gt;Section 1(1), MCA 1988, "Any person who sends to another person..."&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Section 66A(a)&lt;/td&gt;
&lt;td&gt;Grossly offensive&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Section 1(1)(a)(i), MCA 1988; &lt;br /&gt;Section 127(1)(a),CA, 2003; &lt;br /&gt;Section 10(2)(a), Post Office (Amendment) Act, 1935*; &lt;br /&gt;Section 43(1)(a), Telecommunications Act 1984*;&lt;br /&gt; Section 20, India Post Act 1898&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Section 66A(a)&lt;/td&gt;
&lt;td&gt;Menacing character&lt;/td&gt;
&lt;td&gt;Section127(1)(a),CA, 2003&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Section 66A(b)&lt;/td&gt;
&lt;td&gt;Any information which he knows to be false&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Section 1(1)(a)(iii), MCA 1988 "information which is false and known or believed to be false by the sender"; &lt;br /&gt;Section 127(2)(a), CA, 2003, "a message that he knows to be false"&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: justify; "&gt;
&lt;td&gt;Section 66A(b)  “purpose of...” &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Causing annoyance&lt;/td&gt;
&lt;td&gt;Section127(2), CA, 2003&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Inconvenience&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Section 127 (2), CA, 2003&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;Danger&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;Insult&lt;/td&gt;
&lt;td&gt;Section 504, IPC, 1860&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;Injury&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Section 44 IPC, 1860, "The word 'injury' denotes any harm whatever illegally caused to any person, in body, mind, reputation or property."&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;Criminal intimidation&lt;/td&gt;
&lt;td&gt;Sections 503 and 505 (2), IPC, 1860&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;Enmity, hatred or ill-will&lt;/td&gt;
&lt;td&gt;Section 153A(1)(a), IPC, 1860&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;Persistently by making use of such computer resource or a communication device&lt;/td&gt;
&lt;td&gt;Section 127(2)(c), CA, 2003, "persistently makes use of a public electronic communications network."&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Section 66A(c)&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Deceive or to mislead&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;-&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;b&gt;Notes&lt;/b&gt;&lt;br /&gt;MCA 1988: &lt;a class="external-link" href="http://www.legislation.gov.uk/ukpga/1988/27/section/1"&gt;Malicious Communications Act&lt;/a&gt; (s.1)&lt;br /&gt;CA: &lt;a class="external-link" href="http://www.legislation.gov.uk/ukpga/2003/21/section/127"&gt;Communications Act 2003&lt;/a&gt; (s.127)&lt;br /&gt;*Replaced by Communications Act 2003&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. The Information Technology (Amendment) Bill, 2008, was one amongst the eight bills that were passed in fifteen minutes on December 16, 2008.&lt;br /&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. Inserted vide Information Technology Amendment Act, 2008.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This was re-posted in &lt;a class="external-link" href="http://www.outlookindia.com/article.aspx?283149"&gt;Outlook &lt;/a&gt;(November 28, 2012)&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/breaking-down-section-66-a-of-the-it-act'&gt;https://cis-india.org/internet-governance/blog/breaking-down-section-66-a-of-the-it-act&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2012-12-14T09:51:17Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/big-data-in-india-benefits-harms-and-human-rights-a-report">
    <title>Big Data in India: Benefits, Harms, and Human Rights - Workshop Report</title>
    <link>https://cis-india.org/internet-governance/big-data-in-india-benefits-harms-and-human-rights-a-report</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society held a one-day workshop on “Big Data in India: Benefits, Harms and Human Rights” at India Habitat Centre, New Delhi on the 1st of October, 2016.  This report is a compilation of the the issues discussed, ideas exchanged and challenges recognized during the workshop. The objective of the workshop was to discuss aspects of big data technologies in terms of harms, opportunities and human rights. The discussion was designed around an extensive study of current and potential future uses of big data for governance in India, that CIS has undertaken over the last year with support from the MacArthur Foundation.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Contents&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#1"&gt;&lt;strong&gt;Big Data: Definitions and Global South Perspectives&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#2"&gt;&lt;strong&gt;Aadhaar as Big Data&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#3"&gt;&lt;strong&gt;Seeding&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#4"&gt;&lt;strong&gt;Aadhaar and Data Security&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#5"&gt;&lt;strong&gt;Aadhaar’s Relational Arrangement with Big Data Scheme&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#6"&gt;&lt;strong&gt;The Myths surrounding Aadhaar&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#7"&gt;&lt;strong&gt;IndiaStack and FinTech Apps&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#8"&gt;&lt;strong&gt;Problems with UID&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h2 id="1"&gt;Big Data: Definitions and Global South Perspectives&lt;/h2&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;“Big Data” has been defined by multiple scholars till date. The first consideration at the workshop was to discuss various definitions of big data, and also to understand what could be considered Big Data in terms of governance, especially in the absence of academic consensus. One of the most basic ways to define it, as given by the National Institute of Standards and Technology, USA, is to take it to be the data that is beyond the computational capacity of current systems. This definition has been accepted by the UIDAI of India. Another participant pointed out that Big Data is not only indicative of size, but rather the nature of data which is unstructured, and continuously flowing. The Gartner definition of Big Data relies on the three Vs i.e. Volume (size), Velocity (infinite number of ways in which data is being continuously collected) and Variety (the number of ways in which data can be collected in rows and columns).&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The presentation also looked at ways in which Big Data is different from traditional data. It was pointed out that it can accommodate diverse unstructured datasets, and it is ‘relational’ i.e. it needs the presence of common field(s) across datasets which allows these fields to be conjoined. For e.g., the UID in India is being linked to many different datasets, and they don’t constitute Big Data separately, but do so together. An increasingly popular definition is to define data as “Big Data” based on what can be achieved through it. It has been described by authors as the ability to harness new kinds of insight which can inform decision making. It was pointed out that CIS does not subscribe to any particular definition, and is still in the process of coming up with a comprehensive definition of Big Data.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Further, discussion touched upon the approach to Big Data in the Global South. It was pointed out that most discussions about Big Data in the Global South are about the kind of value that it can have, the ways in which it can change our society. The Global North, on the other hand, &amp;nbsp;has moved on to discussing the ethics and privacy issues associated with Big Data.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;After this, the presentation focussed on case studies surrounding key Central Government initiatives and projects like Aadhaar, Predictive Policing, and Financial Technology (FinTech).&lt;/p&gt;
&lt;h2 id="2"&gt;Aadhaar as Big Data&lt;/h2&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;In presenting CIS’ case study on Aadhaar, it was pointed out that initially, Aadhaar, with its enrollment dataset was by itself being seen as Big Data. However, upon careful consideration in light of definitions discussed above, it can be seen as something that enables Big Data. The different e-governance projects within Digital India, along with Aadhaar, constitute Big Data. The case study discussed the Big Data implications of Aadhaar, and in particular looked at a ‘cradle to grave’ identity mapping through various e-government projects and the datafication of various transaction generated data.&lt;/p&gt;
&lt;h2 id="3"&gt;Seeding&lt;/h2&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Any digital identity like Aadhaar typically has three features: 1. Identification i.e. a number or card used to identify yourself; 2. Authentication, which is based on your number or card and any other digital attributes that you might have; 3. Authorisation: As bearers of the digital identity, we can authorise the service providers to take some steps on our behalf. The case study discussed ‘seeding’ which enables the Big Data aspects of Digital India. In the process of seeding, different government databases can be seeded with the UID number using a platform called Ginger. Due to this, other databases can be connected to UIDAI, and through it, data from other databases can be queried by using your Aadhaar identity itself. This is an example of relationality, where fractured data is being brought together. At the moment, it is not clear whether this access by UIDAI means that an actual physical copy of such data from various sources will be transferred to UIDAI’s servers or if they will &amp;nbsp;just access it through internet, but the data remains on the host government agency’s server. An example of even private parties becoming a part of this infrastructure was raised by a participant when it was pointed out that Reliance Jio is now asking for fingerprints. This can then be connected to the relational infrastructure being created by UIDAI. The discussion then focused on how such a structure will function, where it was mentioned that as of now, it cannot be said with certainty that UIDAI will be the agency managing this relational infrastructure in the long run, even though it is the one building it.&lt;/p&gt;
&lt;h2 id="4"&gt;Aadhaar and Data Security&lt;/h2&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;This case study also dealt with the sheer lack of data protection legislation in India except for S.43A of the IT Act. The section does not provide adequate protection as the constitutionality of the rules and regulations under S.43A is ambivalent. More importantly, it only refers to private bodies. Hence, any seeding which is being done by the government is outside the scope of data protection legislation. Thus, at the moment, no legal framework covers the processes and the structures being used for datasets. Due to the inapplicability of S.43A to public bodies, questions were raised as to the existence of a comprehensive data protection policy for government institutions. Participants answered the question in the negative. They pointed out that if any government department starts collecting data, they develop their own privacy policy. There are no set guidelines for such policies and they do not address concerns related to consent, data minimisation and purpose limitation at all. Questions were also raised about the access and control over Big Data with government institutions. A tentative answer from a participant was that such data will remain under the control of &amp;nbsp;the domain specific government ministry or department, for e.g. MNREGA data with the Ministry of Rural Development, because the focus is not on data centralisation but rather on data linking. As long as such fractured data is linked and there is an agency that is responsible to link them, this data can be brought together. Such data is primarily for government agencies. But the government is opening up certain aspects of the data present with it for public consumption for research and entrepreneurial purposes.The UIDAI provides you access to your own data after paying a minimal fee. The procedure for such access is still developing.&lt;/p&gt;
&lt;h2 id="5"&gt;Aadhaar’s Relational Arrangement with Big Data Scheme&lt;/h2&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The various Digital India schemes brought in by the government were elucidated during the workshop. It was pointed out that these schemes extend to myriad aspects of a citizen’s daily life and cover all the essential public services like health, education etc. This makes Aadhaar imperative even though the Supreme Court has observed that it is not mandatory for every citizen to have a unique identity number. The benefits of such identity mapping and the ecosystem being generated by it was also enumerated during the discourse. But the complete absence of any data ethics or data confidentiality principles make us unaware of the costs at which these benefits are being conferred on us. Apart from surveillance concerns, the knowledge gap being created between the citizens and the government was also flagged. Three main benefits touted to be provided by Aadhaar were then analysed. The first is the efficient delivery of services. This appears to be an overblown claim as the Aadhaar specific digitisation and automation does not affect the way in which employment will be provided to citizens through MNREGA or how wage payment delays will be overcome. These are administrative problems that Aadhaar and associated technologies cannot solve. The second is convenience to the citizens. The fallacies in this assertion were also brought out and identified. Before the Aadhaar scheme was rolled in, ration cards were issued based on certain exclusion and inclusion criteria.. The exclusion and inclusion criteria remain the same while another hurdle in the form of Aadhaar has been created. As India is still lacking in supporting infrastructure such as electricity, server connectivity among other things, Aadhaar is acting as a barrier rather than making it convenient for citizens to enroll in such schemes.The third benefit is fraud management. Here, a participant pointed out that this benefit was due to digitisation in the form of GPS chips in food delivery trucks and electronic payment and not the relational nature of Aadhaar. Aadhaar is only concerned with the linking up or relational part. About deduplication, it was pointed out how various government agencies have tackled it quite successfully by using technology different from biometrics which is unreliable at the best of times.&lt;/p&gt;
&lt;h2 id="6"&gt;The Myths surrounding Aadhaar&lt;/h2&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The discussion also reflected on the fact that &amp;nbsp;Aadhaar is often considered to be a panacea that subsumes all kinds of technologies to tackle leakages. However, this does not take into account the fact that leakages happen in many ways. A system should have been built to tackle those specific kinds of leakages, but the focus is solely on Aadhaar as the cure for all. Notably, participants &amp;nbsp;who have been a part of the government pointed out how this myth is misleading and should instead be seen as the first step towards a more digitally enhanced country which is combining different technologies through one medium.&lt;/p&gt;
&lt;h2 id="7"&gt;IndiaStack and FinTech Apps&lt;/h2&gt;
&lt;h3 id="71"&gt;What is India Stack?&lt;/h3&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The focus then shifted to another extremely important Big Data project, India Stack, being conceptualised and developed &amp;nbsp;by a team of private developers called iStack, for the NPCI. It builds on the UID project, Jan Dhan Yojana and mobile services trinity to propagate and develop a cashless, presence-less, paperless and granular consent layer based on UID infrastructure to digitise India.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;A participant pointed out that the idea of India Stack is to use UID as a platform and keep stacking things on it, such that more and more applications are developed. This in turn will help us to move from being a ‘data poor’ country to a ‘data rich’ one. The economic benefits of this data though as evidenced from the TAGUP report - a report about the creation of National Information Utilities to manage the data that is present with the government - is for the corporations and not the common man. The TAGUP report openly talks about privatisation of data.&lt;/p&gt;
&lt;h3 id="72"&gt;Problems with India Stack&lt;/h3&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The granular consent layer of India Stack hasn’t been developed yet but they have proposed to base it on MIT Media Lab’s OpenPDS system. The idea being that, on the basis of the choices made by the concerned person, access to a person’s personal information may be granted to an agency like a bank. What is more revolutionary is that India Stack might even revoke this access if the concerned person expresses a wish to do so or the surrounding circumstances signal to India Stack that it will be prudent to do so. It should be pointed out that the the technology required for OpenPDS is extremely complex and is not available in India. Moreover, it’s not clear how this system would work. Apart from this, even the paperless layer has its faults and has been criticised by many since its inception, because an actual government signed and stamped paper has been the basis of a claim.. In the paperless system, you are provided a Digilocker in which all your papers are stored electronically, on the basis of your UID number. However, it was brought to light that this doesn’t take into account those who either do not want a Digilocker or UID number or cases where they do not have access to their digital records. How in such cases will people make claims?&lt;/p&gt;
&lt;h3 id="73"&gt;A Digital Post-Dated Cheque: It’s Ramifications&lt;/h3&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;A key change that FinTech apps and the surrounding ecosystem want to make is to create a digital post-dated cheque so as to allow individuals to get loans from their mobiles especially in remote areas. This will potentially cut out the need to construct new banks, thus reducing the capital expenditure , while at the same time allowing the credit services to grow. The direct transfer of money between UID numbers without the involvement of banks is a step to further help this ecosystem grow. Once an individual consents to such a system, however, automatic transfer of money from one’s bank accounts will be affected, regardless of the reason for payment. This is different from auto debt deductions done by banks presently, as in the present system banks have other forms of collateral as well. The automatic deduction now is only affected if these other forms are defaulted upon. There is no knowledge as to whether this consent will be reversible or irreversible. As Jan Dhan Yojana accounts are zero balance accounts, the account holder will be bled dry. The implication of schemes such as “Loan in under 8 minutes” were also discussed. The advantage of such schemes is that transaction costs are reduced.The financial institution can thus grant loans for the minimum amount without any additional enquiries. It was pointed out that this new system is based on living on future income much like the US housing bubble crash. Interestingly, in Public Distribution Systems, biometrics are insisted upon even though it disrupts the system. This can be seen as a part of the larger infrastructure to ensure that digital post-dated cheques become a success.&lt;/p&gt;
&lt;h3 id="74"&gt;The Role of FinTech Apps&lt;/h3&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;FinTech ‘apps’ are being presented with the aim of propagating financial inclusion. The Technology Advisory Group for Unique Projects report stated that as managing such information sources is a big task, just like electricity utilities, a National Information Utilities (NIU) should be set up for data sources. These NIUs as per the report will follow a fee based model where they will be charging for their services for government schemes. The report identified two key NIUs namely the National Payments Corporation of India (NPCI) and the Goods and Services Tax Network (GSTN). The key usage that FinTech applications will serve is credit scoring. The traditional credit scoring data sources only comprised a thin file of records for an individual, but the data that FinTech apps collect - &amp;nbsp;a person’s UID number, mobile number. and bank account number all linked up, allow for a far &amp;nbsp;more comprehensive credit rating. Government departments are willing to share this data with FinTech apps as they are getting analysis in return. Thus, by using UID and the varied data sources that have been linked together by UID, a ‘thick file’ is now being created by FinTech apps. Banking apps have not yet gone down the route of FinTech apps to utilise Big Data for credit scoring purposes.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt; &amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The two main problems with such apps is that there is no uniform way of credit scoring. This distorts the rate at which a person has to pay interest. The consent layer adds another layer of complication as refusal to share mobile data with a FinTech app may lead to the app declaring one to be a risky investment thus, subjecting that individual to a &amp;nbsp;higher rate of interest .&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;h3 id="75"&gt;Regulation of FinTech Apps and the UID Infrastructure&lt;/h3&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt; India Stack and the applications that are being built on it, generate a lot of transaction metadata that is very intimate in nature. The privacy aspects of the UID legislation doesn't cover such data. The granular consent layer which has been touted to cover this still has to come into existence. Also, Big Data is based on sharing and linking of data. Here, privacy concerns and Big Data objectives clash. Big Data by its very nature challenges privacy principles like data minimisation and purpose limitation.The need for regulation to cover the various new apps and infrastructure which are being developed was pointed out.&lt;/p&gt;
&lt;h2 id="8"&gt;Problems with UID&lt;/h2&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;It has been observed that any problem present with Aadhaar is usually labelled as a teething problem, it’s claimed that it will be solved in the next 10 years. But, this begs the question - why is the system online right now?&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Aadhaar is essentially a new data condition and a new exclusion or inclusion criteria. Data exclusion modalities as observed in Rajasthan after the introduction of biometric Point of Service (POS) machines at ration shops was found to be 45% of the population availing PDS services. This number also includes those who were excluded from the database by being included in the wrong dataset. There is no information present to tell us how many actual duplicates and how many genuine ration card holders were weeded out/excluded by POS.&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;It was also mentioned that any attempt to question Aadhaar is considered to be an attempt to go back to the manual system and this binary thinking needs to change. Big Data has the potential to benefit people, as has been evidenced by the scholarship and pension portals. However, Big Data’s problems arise in systems like PDS, where there is centralised exclusion at the level of the cloud. Moreover, the quantity problem present in the PDS and MNREGA systems persists. There is still the possibility of getting lesser grains and salary even with analysis of biometrics, hence proving that there are better technologies to tackle these problems. Presently, the accountability mechanisms are being weakened as the poor don’t know where to go to for redressal. Moreover, the mechanisms to check whether the people excluded are duplicates or not is not there. At the time of UID enrollment, out of 90 crores, 9 crore were rejected. There was no feedback or follow-up mechanism to figure out why are people being rejected. It was just assumed that they might have been duplicates.&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Another problem is the rolling out of software without checking for inefficiencies or problems at a beta testing phase. The control of developers over this software, is so massive that it can be changed so easily without any accountability.. The decision making components of the software are all proprietary like in the the de-duplication algorithm being used by the UIDAI. Thus, this leads to a loss of accountability because the system itself is in flux, none of it is present in public domain and there are no means to analyse it in a transparent fashion..&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;These schemes are also being pushed through due to database politics. On a field study of NPR of citizens, another Big Data scheme, it was found that you are assumed to be an alien if you did not have the documents to prove that you are a citizen. Hence, unless you fulfill certain conditions of a database, you are excluded and are not eligible for the benefits that being on the database afford you.&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Why is the private sector pushing for UIDAI and the surrounding ecosystem?&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Financial institutions stand to gain from encouraging the UID as it encourages the credit culture and reduces transaction costs.. Another advantage for the private sector is perhaps the more obvious one, that is allows for efficient marketing of products and services..&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The above mentioned fears and challenges were actually observed on the ground and the same was shown through the medium of a case study in West Bengal on the smart meters being installed there by the state electricity utility. While the data coming in from these smart meters is being used to ensure that a more efficient system is developed,it is also being used as a surrogate for income mapping on the basis of electricity bills being paid. This helps companies profile neighbourhoods. The technical officer who first receives that data has complete control over it and he can easily misuse the data. This case study again shows that instruments like Aadhaar and India Stack are limited in their application and aren’t the panacea that they are portrayed to be.&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;A participant &amp;nbsp;pointed out that in the light of the above discussions, the aim appears to be to get all kinds of data, through any source, and once you have gotten the UID, you link all of this data to the UID number, and then use it in all the corporate schemes that are being started. Most of the problems associated with Big Data are being described as teething problems. The India Stack and FinTech scheme is coming in when we already know about the problems being faced by UID. The same problems will be faced by India Stack as well.&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Can you opt out of the Aadhaar system and the surrounding ecosystem?&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The discussion then turned towards whether there can be voluntary opting out from Aadhaar. It was pointed out that the government has stated that you cannot opt out of Aadhaar. Further, the privacy principles in the UIDAI bill are ambiguously worded where individuals &amp;nbsp;only have recourse for basic things like correction of your personal information. The enforcement mechanism present in the UIDAI Act is also severely deficient. There is no notification procedure if a data breach occurs. . The appellate body ‘Cyber Appellate Tribunal’ has not been set up in three years.&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;CCTNS: Big Data and its Predictive Uses&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;What is Predictive Policing?&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The next big Big Data case study was on the &amp;nbsp;Crime and Criminal Tracking Network &amp;amp; Systems (CCTNS). Originally it was supposed to be a digitisation and interconnection scheme where police records would be digitised and police stations across the length and breadth of the country would be interconnected. But, in the last few years some police departments of states like Chandigarh, Delhi and Jharkhand have mooted the idea of moving on to predictive policing techniques. It envisages the use of existing statistical and actuarial techniques along with many other tropes of data to do so. It works in four ways: 1. By predicting the place and time where crimes might occur; 2. To predict potential future offenders; 3. To create profiles of past crimes in order to predict future crimes; 4. Predicting groups of individuals who are likely to be victims of future crimes.&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;How is Predictive Policing done?&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;To achieve this, the following process is followed: 1. Data collection from various sources which includes structured data like FIRs and unstructured data like call detail records, neighbourhood data, crime seasonal patterns etc. 2. Analysis by using theories like the near repeat theory, regression models on the basis of risk factors etc. 3. Intervention&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Flaws in Predictive Policing and questions of bias&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;An obvious weak point in the system is that if the initial data going into the system is wrong or biased, the analysis will also be wrong. Efforts are being made to detect such biases. An important way to do so will be by building data collection practices into the system that protect its accuracy. The historical data being entered into the system is carrying on the prejudices inherited from the British Raj and biases based on religion, caste, socio-economic background etc.&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;One participant brought about the issue of data digitization in police stations, and the impact of this haphazard, unreliable data on a Big Data system. This coupled with paucity of data is bound to lead to arbitrary results. An effective example was that of black neighbourhoods in the USA. These are considered problematic and thus they are policed more, leading to a higher crime rate as they are arrested for doing things that white people in an affluent neighbourhood get away with. This in turn further perpetuates the crime rate and it becomes a self-fulfilling prophecy. In India, such a phenomenon might easily develop in the case of migrants, de-notified tribes, Muslims etc. &amp;nbsp;A counter-view on bias and discrimination was offered here. One participant pointed out that problems with haphazard or poor quality of data is not a colossal issue as private companies are willing to fill this void and are actually doing so in exchange for access to this raw data. It was also pointed out how bias by itself is being used as an all encompassing term. There are multiplicities of biases and while analysing the data, care should be taken to keep it in mind that one person’s bias and analysis might and usually does differ from another. Even after a computer has analysed the data, the data still falls into human hands for implementation.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The issue of such databases being used to target particular communities on the basis of religion, race, caste, ethnicity among other parameters was raised. Questions about control and analysis of data were also discussed, i.e. whether it will be top-down with data analysis being done in state capitals or will this analysis be done at village and thana levels as well too. It was discussed as topointed out how this could play a major role in the success and possible persecutory treatment of citizens, as the policemen at both these levels will have different perceptions of what the data is saying. . It was further pointed out, that at the moment, there’s no clarity on the mode of implementation of Big Data policing systems. Police in the USA have been seen to rely on Big Data so much that they have been seen to become ‘data myopic’. For those who are on the bad side of Big Data, in the Indian context, laws like preventive detention can be heavily misused.There’s a very high chance that predictive policing due to the inherent biases in the system and the prejudices and inefficiency of the legal system will further suppress the already targeted sections of the society. A counterpoint was raised and it was suggested that contrary to our fears, CCTNS might lead to changes in our understanding and help us to overcome longstanding biases.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Open Knowledge Architecture as a solution to Big Data biases?&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The conference then mulled over the use of ‘Open Knowledge’ architecture to see whether it can provide the solution to rid Big Data of its biases and inaccuracies if enough eyes are there. It was pointed out that Open Knowledge itself can’t provide foolproof protection against these biases as the people who make up the eyes themselves are predominantly male belonging to the affluent sections of the society and they themselves suffer from these biases.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Who exactly is Big Data supposed to serve?&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The discussion also looked at questions such as who is this data for? Janata Information System (JIS), is a concept developed by MKSS &amp;nbsp;where the data collected and generated by the government is taken to be for the common citizens. For e.g. MNREGA data should be used to serve the purposes of the labourers. The raw data as is available at the moment, usually cannot be used by the common man as it is so vast and full of information that is not useful for them at all. It was pointed out that while using Big Data for policy planning purposes, the actual string of information that turned out to be needed was very little but the task of unravelling this data for civil society purposes is humongous. By presenting the data in the right manner, the individual can be empowered. The importance of data presentation was also flagged. It was agreed upon that the content of the data should be for the labourer and not a MNC, as the MNC has the capability to utilise the raw data on it’s own regardless.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Concerns about Big Data usage&lt;/p&gt;
&lt;ol&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Participants pointed out that &amp;nbsp;privacy concerns are usually brushed under the table due to a belief that the law is sufficient or that the privacy battle has already been lost. &amp;nbsp;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;In the absence of knowledge of domain and context, Big Data analysis is quite limited. Big Data’s accuracy and potential to solve problems needs to be factually backed.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The narrative of Big Data often rests on the assumption that descriptive statistics take over inferential statistics, thus eliminating the need for domain specific knowledge. It is claimed that the data is so big that it will describe everything that we need to know.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Big Data is creating a shift from a deductive model of scientific rigour to an inductive one. In response to this, a participant offered the idea that troves of good data allow us to make informed questions on the basis of which the deductive model will be formed. A hybrid approach combining both deductive and inductive might serve us best.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The need to collect the right data in the correct format, in the right place was also expressed.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Potential Research Questions &amp;amp; Participants’ Areas of Research&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Following this discussion, participants brainstormed to come up with potential areas of research and research questions. They have been captured below:&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Big Data, Aadhaar and India Stack:&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;ol&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Has Aadhaar been able to tackle illegal ways of claiming services or are local negotiations and other methods still prevalent?&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Is the consent layer of India Stack being developed in a way that provides an opportunity to the UID user to give informed consent? The OpenPDS and its counterpart in the EU i.e. the My Data Structure were designed for countries with strong privacy laws. Importantly, they were meant for information shared on social media and not for an individual’s health or credit history. India is using it in a completely different sphere without strong data protection laws. What were the granular consent layer structures present in the West designed for and what were they supposed to protect?&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The question of ownership of data needs to be studied especially in context of &amp;nbsp;a globalised world where MNCs are collecting copious amounts of data of Indian citizens. What is the interaction of private parties in this regard?&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Big Data and Predictive Policing:&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;ol&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;How are inequalities being created through the Big Data systems? Lessons should be taken from the Western experience with the advent of predictive policing and other big data techniques - they tend to lead to perpetuation of the current biases which are already ingrained in the system.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;It was also pointed out how while studying these topics and anything related to technology generally, we become aware of a divide that is present between the computational sciences and social sciences. This divide needs to be erased if Big Data or any kind of data is to be used efficiently. There should be a cross-pollination between different groups of academics. An example of this can be seen to be the ‘computational social sciences departments’ that have been coming up in the last 3-4 years.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Why are so many interim promises made by Big Data failing? A study of this phenomenon needs to be done from a social science perspective. This will allow one to look at it from a different angle.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Studying Big Data:&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;ol&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;What is the historical context of the terms of reference being used for Big Data? The current Big Data debate in India is based on parameters set by the West. For better understanding of Big Data, it was suggested that P.C. Mahalanobis’ experience while conducting the Indian census, (which was the Big Data of that time) can be looked at to get a historical perspective on Big Data. This comparison might allow us to discover questions that are important in the Indian context. It was also suggested that rather than using ‘Big Data’ as a catchphrase &amp;nbsp;to describe these new technological innovations, we need to be more discerning.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;What are the ideological aspects that must be considered while studying Big Data? What does the dialectical promise of technology mean? It was contended that every time there is a shift in technology, the zeitgeist of that period is extremely excited and there are claims that it will solve everything. There’s a need to study this dialectical promise and the social promise surrounding it.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Apart from the legitimate fears that Big Data might lead to exclusion, what are the possibilities in which it improve inclusion too?&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The diminishing barrier between the public and private self, which is a tangent to the larger public-private debate was mentioned.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;How does one distinguish between technology failure and process failure while studying Big Data? &amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Big Data: A Friend?&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;In the concluding session, the fact that the Big Data moment cannot be wished away was acknowledged. The use of analytics and predictive modelling by the private sector is now commonplace and India has made a move towards a database state through UID and Digital India. The need for a nuanced debate, that does away with the false equivalence of being either a Big Data enthusiast or a luddite is crucial.&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;A participant offered two approaches to solving a Big Data problem. The first was the Big Data due process framework which states that if a decision has been taken that impacts the rights of a citizen, it needs to be cross examined. The efficacy and practicality of such an approach is still not clear. The second, slightly paternalistic in nature, was the approach where Big Data problems would be solved at the data science level itself. This is much like the affirmative algorithmic approach which says that if in a particular dataset, the data for the minority community is not available then it should be artificially introduced in the dataset. It was also &amp;nbsp;suggested that carefully calibrated free market competition can be used to regulate Big Data. For e.g. a private personal wallet company that charges higher, but does not share your data at all can be an example of such competition. &amp;nbsp;&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Another important observation was the need to understand Big Data in a Global South context and account for unique challenges that arise. While the convenience of Big Data is promising, its actual manifestation depends on externalities like connectivity, accurate and adequate data etc that must be studied in the Global South.&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;While the promises of Big Data are encouraging, it is also important to examine its impacts and its interaction with people's rights. Regulatory solutions to mitigate the harms of big data while also reaping its benefits need to evolve.&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p&gt;&lt;span id="docs-internal-guid-90fa226f-6157-27d9-30cd-050bdc280875"&gt;&lt;/span&gt;&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/big-data-in-india-benefits-harms-and-human-rights-a-report'&gt;https://cis-india.org/internet-governance/big-data-in-india-benefits-harms-and-human-rights-a-report&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Vidushi Marda, Akash Deep Singh and Geethanjali Jujjavarapu</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Human Rights</dc:subject>
    
    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Artificial Intelligence</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Machine Learning</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Digital India</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Information Technology</dc:subject>
    
    
        <dc:subject>E-Governance</dc:subject>
    

   <dc:date>2016-11-18T12:58:19Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/big-data-reproductive-health-india-mcts">
    <title>Big Data and Reproductive Health in India: A Case Study of the Mother and Child Tracking System</title>
    <link>https://cis-india.org/raw/big-data-reproductive-health-india-mcts</link>
    <description>
        &lt;b&gt;In this case study undertaken as part of the Big Data for Development (BD4D) network, Ambika Tandon evaluates the Mother and Child Tracking System (MCTS) as data-driven initiative in reproductive health at the national level in India. The study also assesses the potential of MCTS to contribute towards the big data landscape on reproductive health in the country, as the Indian state’s imagination of health informatics moves towards big data.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Case study: &lt;a href="https://github.com/cis-india/website/raw/master/bd4d/CIS_CaseStudy_AT_BigDataReproductiveHealthMCTS.pdf" target="_blank"&gt;Download&lt;/a&gt; (PDF)&lt;/h4&gt;
&lt;hr /&gt;
&lt;h3&gt;Introduction&lt;/h3&gt;
&lt;p&gt;The reproductive health information ecosystem in India comprises of a range of different databases across state and national levels. These collect data through a combination of manual and digital tools. Two national-level databases have been launched by the Ministry of Health and Family Welfare - the Health Management Information System (HMIS) in 2008, and the MCTS in 2009. 4 The MCTS focuses on collecting data on maternal and child health. It was instituted due to reported gaps in the HMIS, which records monthly data across health programmes including reproductive health. There are several other state-level initiatives on reproductive health data that have either been subsumed into, or run in
parallel with, the MCTS.&lt;/p&gt;
&lt;p&gt;With this case study, we aim to evaluate the MCTS as data-driven initiative in reproductive health at the national level. It will also assess its potential to contribute towards the big data landscape on reproductive health in the country, as the Indian state’s imagination of health informatics moves towards big data. The methodology for the case study involved a desk-based review of existing literature on the use of health information systems globally, as well as analysis of government reports, journal articles, media coverage, policy documents, and other material on the MCTS.&lt;/p&gt;
&lt;p&gt;The first section of this report details the theoretical framing of the case study, drawing on the feminist critique of reproductive data systems. The second section maps the current landscape of reproductive health data produced by the state in India, with a focus on data flows, and barriers to data collection and analysis at the local and national level. The case of abortion data is used to further the argument of flawed data collection systems at the
national level. Section three briefly discusses the state’s imagination of reproductive health policy and the role of data systems through a discussion on the National Health Policy, 2017 and the National Health Stack, 2018. Finally, we make some policy recommendations and identify directions for future research, taking into account the ongoing shift towards big data globally to democratise reproductive healthcare.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/big-data-reproductive-health-india-mcts'&gt;https://cis-india.org/raw/big-data-reproductive-health-india-mcts&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>ambika</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Data Systems</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Reproductive and Child Health</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Publications</dc:subject>
    
    
        <dc:subject>BD4D</dc:subject>
    
    
        <dc:subject>Healthcare</dc:subject>
    
    
        <dc:subject>Big Data for Development</dc:subject>
    

   <dc:date>2019-12-06T04:57:55Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
