<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2701 to 2715.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/comments-national-policy-information-technology"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/p2p-throttling-and-dns-hijacking"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/droidcon-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/netizen-report"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/once-a-flash"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/learn-yourself"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/comments-draft-national-policy-on-electronics"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/india-statement-un-cirp"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/analysis-dit-response-2nd-rti-blocking"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/dit-response-2nd-rti-blocking"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/vanishing-fingerprints-put-uid-in-question"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/privacy-sexual-minorities"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/sixth-annual-meeting-igf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/media-economics-workshop"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-india-chronicles"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/comments-national-policy-information-technology">
    <title>Comments on the National Policy of Information Technology</title>
    <link>https://cis-india.org/internet-governance/comments-national-policy-information-technology</link>
    <description>
        &lt;b&gt;The NPIT 2011 has the laudable goal of making India a ‘knowledge economy with a global role’ by developing and deploying ICT solutions in all sectors to foster development within India and at a global level. The policy identifies several praiseworthy goals such as the promotion of open standards and open technologies, accessibility for persons with disabilities, affordable ICT services, transparency, accountability, technology development for Indian languages, placing data in public domain for use and value addition, using social media to engage with citizens and investing in indigenous R&amp;D and capacity building. We deeply appreciate this initiative of the Department of Information Technology and offer below brief comments to strengthen the draft.&lt;/b&gt;
        
&lt;h3&gt;Mission&lt;/h3&gt;
&lt;p&gt;It may be important to have one mission which is more citizen centric, for instance, to use ICT to empower and mainstream underprivileged sections of the population such as persons with disabilities, economically disadvantaged people, etc. All of the missions currently listed are related to making India an IT hub and around economic/commercial indicators and the focus on the human development aspect seems to be lacking.&lt;/p&gt;
&lt;h3&gt;Objectives&lt;/h3&gt;
&lt;p&gt;Objectives 8 and 9 which are dealing with government services could specifically mention accessibility. While access for persons with disabilities is covered in objective 12, it does not imply inherent accessibility of all government services, but merely an enablement of those which are required.&lt;/p&gt;
&lt;h3&gt;Enforcement Mechanism&lt;/h3&gt;
&lt;p&gt;While the policy has several commendable goals, there is little indication as to how it will be sought to be implemented. It would be helpful to have clear mention of the responsible authorities and execution mechanisms, including a mechanism for periodic review to ensure that all security, standards and quality guidelines and timelines are met.&lt;/p&gt;
&lt;h3&gt;Development of Language Technologies&lt;/h3&gt;
&lt;p&gt;Since the development of language technologies is extremely crucial to ensure that ICT access is possible for persons in both rural and urban areas, affordability should be stressed as a key aspect of this research and open source solutions may come out of public funded research.&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/comments-national-policy-information-technology'&gt;https://cis-india.org/internet-governance/comments-national-policy-information-technology&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-11-09T10:28:31Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/p2p-throttling-and-dns-hijacking">
    <title>TRAI urged to take action against P2P throttling and DNS hijacking</title>
    <link>https://cis-india.org/internet-governance/p2p-throttling-and-dns-hijacking</link>
    <description>
        &lt;b&gt;On 4 November 2010, Anand had sent a complaint letter to the Telecom Regulatory Authority of India (TRAI) regarding unethical practices adopted by Internet Service Providers (ISPs), particularly Airtel. The letter was sent by post and through an e-mail. It was addressed to the Advisor, CN &amp; IT, TRAI. Anand got no help from the ISP and the reply from TRAI (No. 340-1\2010-CA/VOLv) stated that he contact the nodal officer. We have reproduced below the complaint letter that Anand sent to TRAI.&lt;/b&gt;
        
&lt;p&gt;The Advisor,&lt;br /&gt;CN &amp;amp; IT, TRAI&lt;br /&gt;New Delhi&lt;/p&gt;
&lt;div&gt;Respected Sir,&lt;/div&gt;
&lt;div&gt;&lt;br /&gt;I wanted to bring to your notice some unethical marketing practices being adopted by Airtel in their broadband market.&lt;/div&gt;
&lt;div&gt;&lt;br /&gt;ISPs &amp;nbsp;in India, &amp;nbsp;especially Airtel and Tata &amp;nbsp;have recently started to use Domain Name System (DNS) &amp;nbsp;hijacking where they redirect a misspelled or a non-existent website to their own site — where they serve advertisements to make money and these get redirected to Airtel or Tata whenever you connect &amp;nbsp;to the Internet. The reply from the Internet Corporation for Assigned Names and Numbers (ICANN) was: "DNS hijacking practice violates the RFC standard for DNS (NXDOMAIN) responses, and can potentially open users to cross-scripting attacks. According to ICANN, the international body responsible for administering top level domain names has published a memorandum highlighting its concerns, affirming that ICANN strongly discourages the use of DNS redirection, wildcards, synthesized responses and any other form of NXDOMAIN substitution in existing Generic Top Level Domains (GTLDs), Country-Code Top Level Domains (CCTLDs) and any other level in the DNS tree for registry-class domain names." See for example,&amp;nbsp;&lt;a class="external-link" href="http://goo.gl/lZ2r6"&gt;http://goo.gl/lZ2r6&lt;/a&gt; or&amp;nbsp;&lt;a class="external-link" href="http://goo.gl/fDLNC"&gt;http://goo.gl/fDLNC&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Our ISPs are violating international regulations and exposing the customer to phishing and hacking. Here are their rules: RFC 2308 - Negative Caching of DNS Queries (DNS NCACHE) (rfc2308). See &lt;a class="external-link" href="http://goo.gl/QrKLs"&gt;http://goo.gl/QrKLs&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;I hope TRAI fines Airtel for their unethical practices. Now even toll free customer complaint numbers are no longer toll free. They charge 50 paise per call.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;One of the most dangerous things that Airtel and Tata have done is to secretly throttle internet traffic particularly of peer-to-peer (P2P) protocol and not telling the customers, thereby violating the Consumer Protection Act, 1986. In October 2010, Airtel and Tata began using &lt;a class="external-link" href="http://goo.gl/YLLEJ"&gt;Elitecore's networking bandwidth tool NetVertex to throttle net traffic&lt;/a&gt;.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;This violates net neutrality principle and could make the internet a cable television system where for different protocols different tariffs would be charged. Please watch&lt;a class="external-link" href="http://goo.gl/WY31Z"&gt; this clip on net neutrality&lt;/a&gt;.&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Since January 2011 Airtel is throttling P2P speeds to 256k from 10 a.m. to 11 p.m. If a user has 1\2\4 mbps connection, his\her speeds are being throttled to 256 k. The only legal proof that customers have is the results from this site which tells if your connection is being throttled for specific protocols (for example, http, ftp, torrent, video streaming, email, etc) known as &lt;a class="external-link" href="http://goo.gl/LoWU"&gt;glasnost&lt;/a&gt; test.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;br /&gt;This forum has many Airtel users complaining about this. For example: &lt;a class="external-link" href="http://goo.gl/Utd72"&gt;http://goo.gl/Utd72&lt;/a&gt;, &lt;a class="external-link" href="http://goo.gl/uLZdg"&gt;http://goo.gl/uLZdg&lt;/a&gt;, &lt;a class="external-link" href="http://goo.gl/bfgaE"&gt;http://goo.gl/bfgaE&lt;/a&gt; and &lt;a class="external-link" href="http://goo.gl/S7lIQ"&gt;http://goo.gl/S7lIQ&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;&lt;br /&gt;Sir P2P is controversial as it used to download copyright works but P2P is also used for legitimate files like Linux OS or Legit P2P streaming. Some torrent sites only provide legit torrents, for example,&lt;a class="external-link" href="http://www.mininova.org/"&gt;mininova&lt;/a&gt;.&lt;/div&gt;
&lt;div&gt;&lt;br /&gt;In 2006 TRAI had a &lt;a class="external-link" href="http://goo.gl/Rb9s3"&gt;consultation paper on network neutrality&lt;/a&gt; para 3.6.2. In the reply, organisations like Google, Skype and Microsoft &lt;a class="external-link" href="http://goo.gl/qy5g7"&gt;recommended&lt;/a&gt; that network neutrality be made a law. See the&amp;nbsp;Google &lt;a class="external-link" href="http://goo.gl/mJAE"&gt;letter for network neutrality&lt;/a&gt; of August 2010.&lt;/div&gt;
&lt;div&gt;&lt;br /&gt;In 2011 the TRAI-NGN said that they have not found any ISP violating this but I have been writing to TRAI since October 2010 to warn them about the impending &lt;a class="external-link" href="http://www.trai.gov.in/NGN/ReportNGN.doc"&gt;2 tier internet which is coming to India&lt;/a&gt;, page 91.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;br /&gt;Like the Federal Communications Commission (FCC) which fined Comcast ISP in USA $ 16 million for secretly blocking P2P, TRAI should at least codify network neutrality as a simple sentence stating "All internet traffic irrespective of protocols and carrier shall be treated as neutral" and fine Airtel via Telecom Disputes Settlement Appellate Tribunal for violating Consumer Protection Act, 1986.&lt;/div&gt;
&lt;div&gt;&lt;br /&gt;&lt;a class="external-link" href="http://goo.gl/hKCN3"&gt;FCC passed diluted rules&lt;/a&gt; and TRAI should not copy FCC.&amp;nbsp;I hope TRAI takes action against illegal secret P2P throttling and DNS hijacking.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;Yours respectfully,&lt;/div&gt;
&lt;div&gt;Anand&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/p2p-throttling-and-dns-hijacking'&gt;https://cis-india.org/internet-governance/p2p-throttling-and-dns-hijacking&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Anand Priya Singh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-03-27T06:07:30Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/droidcon-india">
    <title>Droidcon India, first Android Conference in Bangalore</title>
    <link>https://cis-india.org/internet-governance/events/droidcon-india</link>
    <description>
        &lt;b&gt;HasGeek is happy to announce the forthcoming Droidcon India on the 18th and 19th of November 2011 at the MLR Convention Centre in Bangalore. Droidcon.com, Bangalore Android User Group, MobileMonday Bangalore, Medianama, Android Advices and the Centre for Internet and Society are the event partners.&lt;/b&gt;
        
&lt;p&gt;Droidcon is India’s first international Android conference and is part of the world’s largest series of Android conferences, with other editions in London, Bucharest (Romania), Brussels, Amsterdam and Berlin. Droidcon India is a response to the booming market for Android, which has seen sales increase by 888.88 per cent in 2010, and reach nearly 50 per cent market share worldwide.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Organized &lt;em&gt;by&lt;/em&gt; developers &lt;em&gt;for&lt;/em&gt; developers, the multi-track two day event will provide a rich variety of content for delegates by attracting the best speakers in the Android community. HasGeek expects the participation of over 400 delegates, including students, developers, UX and UI designers, and people with strong interests in the Android ecosystem, both from India and beyond.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The sessions will be presented in an informal environment that gives everyone a chance to be heard. The theme for the conference covers a range of topics that include building well designed apps, dealing with device diversity, performance optimization, NFC, Arduino, and usage in the Enterprise. For more details about session topics visit&amp;nbsp;&lt;a class="external-link" href="http://goo.gl/F9bEB"&gt;http://goo.gl/F9bEB&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;For registrations and tickets, visit&amp;nbsp;&lt;a class="external-link" href="http://goo.gl/pmXpJ"&gt;http://goo.gl/pmXpJ&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Following the first day conference on November 18, there will be an after party for this event which will be held at the CounterCulture restaurant.&lt;/p&gt;
&lt;p&gt;For more information on tickets and registrations, contact Zainab Bawa @&amp;nbsp;&lt;a class="external-link" href="mailto:zainab@hasgeek.in"&gt;zainab@hasgeek.in&lt;/a&gt;&amp;nbsp;or call @&amp;nbsp;+91 99454 73641.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/droidcon-india'&gt;https://cis-india.org/internet-governance/events/droidcon-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event Type</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-11-24T04:17:12Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/netizen-report">
    <title>Netizen Report: Transparency Edition</title>
    <link>https://cis-india.org/news/netizen-report</link>
    <description>
        &lt;b&gt;Global Voices Online has carried a feature story, "Netizen Report: Transparency Edition". We at CIS had filed an RTI application about website blocking. This is reflected in this article by Rebecca MacKinnon which was posted online on 7 November 2011.&lt;/b&gt;
        
&lt;p&gt;Here at Global Voices Advocacy we believe that transparency by governments and companies about how and when censorship and surveillance takes place is a base-line requirement if the Internet is ever to be governed in a manner that is compatible with free expression, dissent, and citizens' right to organize and assemble. Thus we applaud Google's latest &lt;a class="external-link" href="http://www.google.com/transparencyreport/"&gt;Transparency Report &lt;/a&gt;- the company's fourth such report detailing government requests for user data and content removal, as well as the traffic flows (or lack thereof) to Google webistes across the world since July 2009. The new data for &lt;a class="external-link" href="http://www.google.com/transparencyreport/governmentrequests/#2011-06"&gt;January-June 2011 &lt;/a&gt;contains more detail than in the past, including data on how Google responded to the requests and whether they were honored. The data comes with a list of caveats including that automated content removal is not logged and that some data cannot be released due to local law. Nonetheless, we hope that Google's data will provide an interesting snap shot of the state of Internet affairs and the data could be used to hold governments accountable to their censorship activities. We believe that if all Internet companies disclosed similar data, the world would be further on its way to being a better place. Many articles have been written analyzing the data. A few of them include:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;TechPresident: &lt;a class="external-link" href="http://techpresident.com/blog-entry/google-data-shows-government-internet-surveillance-far-outstrips-wiretap-requests"&gt;Google Data Shows Government Internet Surveillance Far Outstrips Wiretap Requests&lt;/a&gt;&lt;/li&gt;&lt;li&gt;WIRED: &lt;a class="external-link" href="http://www.wired.com/threatlevel/2011/10/google-data-requests"&gt;U.S. Requests for Google User Data Spike 29 Percent in Six Months&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Huffington Post:The 13 Countries That Request The Most User Data From Google&lt;/li&gt;&lt;li&gt;CNet: &lt;a class="external-link" href="http://www.huffingtonpost.com/2011/11/01/google-user-data-countries-requests_n_1070313.html"&gt;Google: Governments seek more about you than ever&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;br /&gt;Adding to the publicly available data about censorship around the world, the Open Net Initiative has &lt;a class="external-link" href="http://opennet.net/blog/2011/11/oni-summarized-global-internet-filtering-data-now-available-download"&gt;released its research data on global Internet filtering&lt;/a&gt;, covering seventy-four countries.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Thuggery&lt;/strong&gt;: Read the latest news on GVA about bloggers jailed in Egypt, Syria, and Kuwait and spread the word.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Surveillance&lt;/strong&gt;: As &lt;a class="external-link" href="http://advocacy.globalvoicesonline.org/2011/10/10/bluecoat-us-technology-surveilling-syrian-citizens-online/"&gt;GVA&lt;/a&gt; and others have recently reported, 13 Internet filtering devices produced by the California-based company Blue Coat have made their way to &lt;strong&gt;Syria&lt;/strong&gt;.&amp;nbsp;&lt;a class="external-link" href="http://online.wsj.com/article/SB10001424052970203687504577001911398596328.html"&gt; According to the Wall Street Journal&lt;/a&gt;, Blue Coat executives say that the company will not sell the devices to countries that are under embargo by the United States, and that the devices found in Syria had been sold to a dealer who claimed they were destined for Iraq.&lt;/p&gt;
&lt;p&gt;The Wall Street Journal has had several other items related to the role of companies in global surveillance, including a report on how China's Huawei &lt;a class="external-link" href="http://online.wsj.com/article/SB10001424052970204644504576651503577823210.html"&gt;has been peddling &lt;/a&gt;its mobile phone tracking and censoring equipment to &lt;strong&gt;Iran&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;In &lt;strong&gt;India&lt;/strong&gt;, Research in Motion &lt;a class="external-link" href="http://online.wsj.com/article/SB10001424052970204505304577001592335138870.html#ixzz1cxcl5IIg"&gt;has set up a facility &lt;/a&gt;in Mumbai to help the Indian government carry out lawful surveillance of its BlackBerry services including the messenger chat service, but the WSJ reports that India still has no method to intercept and decode BlackBerry enterprise email.&lt;/p&gt;
&lt;p&gt;In &lt;strong&gt;Russia&lt;/strong&gt;, bloggers' influence &lt;a class="external-link" href="http://www.rferl.org/content/russian_bloggers_gain_prominence_kremlin_takes_notice/24357352.html"&gt;has apparently made the Kremlin nervous&lt;/a&gt;. Reporters Without Borders has condemned plans by the Russian government to deploy new software to track “extremist” content on the web, highlighting concerns about an over-broad definition of “extremist,” and the arbitrary and disproportionate approach to punishment and sanctions against websites. For more on the Russian Internet be sure to follow Global Voices' &lt;a class="external-link" href="http://globalvoicesonline.org/-/special/runet-echo/"&gt;Runet Echo Project&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Moving on the &lt;strong&gt;United States&lt;/strong&gt;, The Guardian has a &lt;a class="external-link" href="http://www.guardian.co.uk/technology/2011/nov/01/governments-hacking-techniques-surveillance"&gt;fascinating report &lt;/a&gt;on the super-secret Intelligence Support Systems World Americas conference held recently in Washington DC, at which surveillance professionals shared the latest surveillance technologies and innovations that they don't want you to know about. Hacktivist and friend of GVA &lt;a class="external-link" href="http://advocacy.globalvoicesonline.org/2009/12/14/interview-with-jacob-appelbaum-from-tor/"&gt;Jacob Appelbaum &lt;/a&gt;managed to get in, but was thrown out.&lt;/p&gt;
&lt;p&gt;On a more positive note in the &lt;strong&gt;United States&lt;/strong&gt;, the Washington Post reports that since 2009 many Internet companies &lt;a class="external-link" href="http://www.washingtonpost.com/world/national-security/fbi-going-to-court-more-often-to-get-personal-internet-usage-data/2011/10/25/gIQAM7s2GM_story.html?wpisrc=nl_headlines"&gt;have been more assertive &lt;/a&gt;about challenging “national security letters” from the FBI requesting information about users.&lt;/p&gt;
&lt;p&gt;The Guardian reports that Civil liberties and privacy groups in the &lt;strong&gt;United Kingdom&lt;/strong&gt; &lt;a class="external-link" href="http://www.guardian.co.uk/uk/2011/oct/30/metropolitan-police-mobile-phone-surveillance"&gt;have raised concerns &lt;/a&gt;about the deployment by the London Metropolitan Police of a "covert &lt;a class="external-link" href="http://www.guardian.co.uk/uk/surveillance"&gt;surveillance&lt;/a&gt; technology that can masquerade as a mobile phone network, transmitting a signal that allows authorities to shut off phones remotely, intercept communications and gather data about thousands of users in a targeted area."&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.techdirt.com/articles/20111021/11554216450/eu-politician-wants-internet-surveillance-built-into-every-operating-system.shtml"&gt;Techdirt reports &lt;/a&gt;on the &lt;strong&gt;European Union&lt;/strong&gt;'s desire to have a “black box' built in to operating systems that would store a record of all of the computer's internet usage. The EU argues that this ability would be useful in cracking down on child pornography.&amp;nbsp; The system that the EU is looking at as a possible candidate for role of ‘black box' is called LogBox. &lt;a class="external-link" href="http://www.fabioghioni.net/blog/2011/10/20/internet-e-l%E2%80%99arbitrio-assoluto-sui-dati-dei-service-provider-presentata-al-parlamento-l%E2%80%99iniziativa-per-un-sistema-di-controllo-sotto-garante/"&gt;The developer of LogBox &lt;/a&gt;claims that the device is for preserving the freedoms and privacy of internet users, although Techdirt points out the fact that this device does little to ‘protect' the privacy of online users, it in fact, would make anonymous actions on the internet much more difficult and would provide governments and law enforcement a huge set of data on every internet user.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Censorship&lt;/strong&gt;: The chief executives of &lt;strong&gt;China&lt;/strong&gt;'s 39 top Internet, telecom, and computer companies &lt;a class="external-link" href="http://www.ft.com/cms/s/09d9a5ba-0886-11e1-9fe8-00144feabdc0,Authorised=false.html?_i_location=http%3A%2F%2Fwww.ft.com%2Fcms%2Fs%2F0%2F09d9a5ba-0886-11e1-9fe8-00144feabdc0.html&amp;amp;_i_referer=http%3A%2F%2Fadvocacy.globalvoicesonline.org%2F2011%2F11%2F07%2Fnetizenreport-transparency%2F#axzz1cxn3nQD5"&gt;have agreed to &lt;/a&gt;“strengthen self-control, self-restraint and strict self-discipline” in order to “contain the tendency of spreading online rumours, pornography, fraud and other illegal, harmful information on the internet.” The move comes amidst a &lt;a class="external-link" href="http://www.voanews.com/english/news/asia/China-to-Tighten-Controls-on-Internet-Social-Media-133062308.html"&gt;broader crackdown &lt;/a&gt;on &lt;a class="external-link" href="http://www.nytimes.com/2011/10/27/world/asia/china-imposes-new-limits-on-entertainment-and-bloggers.html?_r=1"&gt;the Internet and social media&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;In &lt;strong&gt;India&lt;/strong&gt;, the Bangalore-based Centre for Internet and Society &lt;a href="https://cis-india.org/internet-governance/blog/analysis-dit-response-2nd-rti-blocking" class="external-link"&gt;submitted a right to information request &lt;/a&gt;to the government's Department of Information Technology, asking for more information about website blocking. Based on &lt;a href="https://cis-india.org/internet-governance/dit-response-2nd-rti-blocking" class="external-link"&gt;DIT's response &lt;/a&gt;the Centre observes that “The data provided by the government seemingly conflicts with the data released by the likes of Google." Their conclusion: "Either the DIT is not providing us all the relevant information on blocking, or is not following the law."&lt;/p&gt;
&lt;p&gt;Courts in &lt;a class="external-link" href="http://www.edri.org/edrigram/number9.19/belgium-isp-blocking-pirate-bay"&gt;&lt;strong&gt;Belgium&lt;/strong&gt;&lt;/a&gt; and&lt;a class="external-link" href="https://torrentfreak.com/finnish-isp-ordered-to-block-the-pirate-bay-111026/"&gt; &lt;strong&gt;Finland&lt;/strong&gt; &lt;/a&gt;have ordered ISPs to block the Pirate Bay.&lt;/p&gt;
&lt;p&gt;The &lt;strong&gt;U.S.&lt;/strong&gt; House Judiciary Committee has recently proposed a&lt;a class="external-link" href="http://judiciary.house.gov/hearings/pdf/112%20HR%203261.pdf"&gt; bill &lt;/a&gt;aimed at protecting intellectual property online that some critics describe as the &lt;a class="external-link" href="http://censorshipinamerica.com/2011/10/26/internet-censorship-protect-ip-renamed-e-parasites-act-would-create-the-great-firewall-of-america/"&gt;beginning of a "Great Firewall of America"&lt;/a&gt;.&lt;a class="external-link" href="https://www.eff.org/deeplinks/2011/10/disastrous-ip-legislation-back-%E2%80%93-and-it%E2%80%99s-worse-ever"&gt; The Electronic Frontier Foundation &lt;/a&gt;and others have detailed the bill's problems, including lack of due process, near certainty of over-blocking and abuse, imposition of excessive liability on Internet intermediaries, global legitimization of DNS censorship and potential fragmentation of the Internet, among other things. It is considered even worse than its evil fraternal twin in the Senate, the &lt;a class="external-link" href="https://secure.wikimedia.org/wikipedia/en/wiki/Protect_IP_Act"&gt;PROTECT IP Act &lt;/a&gt;which is also opposed by many tech companies and non-profit groups. Despite such opposition, the bill draws relatively &lt;a class="external-link" href="http://opinion.latimes.com/opinionla/2011/10/technology-a-bipartisan-attempt-to-regulate-the-internet.html"&gt;broad support from lawmakers&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Net Neutrality: South Africa&lt;/strong&gt;n technology journalist Jan Vermeulen ran the &lt;a class="external-link" href="http://mybroadband.co.za/news/broadband/36728-how-much-does-your-isp-shape-your-downloads.html"&gt;M-Lab's Glasnost Test on South African ISP's&lt;/a&gt; to see whether their stated bandwith shaping policies match up with reality.&lt;/p&gt;
&lt;p&gt;The growth of bandwidth intensive internet applications in South Korea has made Net Neutrality &lt;a class="external-link" href="http://koreajoongangdaily.joinsmsn.com/news/article/Article.aspx?aid=2943014"&gt;an important issue there&lt;/a&gt;. &lt;strong&gt;South Korea&lt;/strong&gt;n ISP's are reporting that it is becoming increasingly difficult to maintain neutral practices with content. The three largest telecommunications companies in Korea are worried by the rise of &lt;a class="external-link" href="http://www.samsung.com/us/smarttv/index.html?cid=ppc_smt_goo_Smart+TV+-+Awareness_Smart+TV_smart+tv&amp;amp;K_CLICKID=5b86c4c9-6936-eac8-bbe5-00004db65f45"&gt;Smart TV's&lt;/a&gt;, which use Internet connections as opposed to traditional cable or satellite links to provide content. The ISP's want to charge companies varying amounts depending on the type and amount of content sent.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Internet Governance&lt;/strong&gt;: ICANN held its &lt;a class="external-link" href="http://dakar42.icann.org/"&gt;42nd public meeting in Dakar, Senegal &lt;/a&gt;late last month. Wendy Seltzer &lt;a class="external-link" href="http://advocacy.globalvoicesonline.org/2011/11/05/icann-why-the-registrar-accreditation-agreement-matters-for-free-speech/"&gt;reported here on GVA &lt;/a&gt;why the seemingly arcane debates about domain name registrar accreditation is important. Konstantinos Komaitis, an active member of ICANN's &lt;a class="external-link" href="https://community.icann.org/display/gnsononcomstake/Home"&gt;Non-Commercial Stakeholder Group &lt;/a&gt;(Global Voices is also a member),&lt;a class="external-link" href="http://www.komaitis.org/1/post/2011/10/icann-41-the-fight-over-multistakeholderism.html"&gt; describes the struggle &lt;/a&gt;that is taking place took place between governments and other ICANN stakeholders over whether some stakeholders are more equal than others within ICANN's multi-stakeholder governance model.&amp;nbsp; Kieren McCarthy at dotNext also has an&lt;a class="external-link" href="http://news.dot-nxt.com/2011/10/24/governments-registrars-fight"&gt; in-depth report and analysis &lt;/a&gt;on the clash between governments and registrars over law enforcement regarding domain names. Over at the Internet Governance Project Milton Mueller &lt;a class="external-link" href="http://blog.internetgovernance.org/blog/_archives/2011/11/6/4934244.html"&gt;takes an in-depth look &lt;/a&gt;at the politics surrounding the Non-Commercial Stakeholder Group and related constituencies, and the fight for civil society representation at ICANN.&lt;/p&gt;
&lt;p&gt;India has &lt;a class="external-link" href="http://www.thehindu.com/sci-tech/internet/article2604526.ece"&gt;published a formal proposal &lt;/a&gt;to put the UN in charge of overseeing Internet governance. For different analyses by three Internet governance wonks see&lt;a class="external-link" href="http://news.dot-nxt.com/2011/10/27/india-proposes-government-control-internet"&gt; Kieren McCarthy&lt;/a&gt;, &lt;a class="external-link" href="http://blog.internetgovernance.org/blog/_archives/2011/10/29/4929042.html"&gt;Milton Mueller&lt;/a&gt;, and &lt;a class="external-link" href="http://igfwatch.org/discussion-board/indias-proposal-for-a-un-committee-for-internet-related-policies-cirp#mlYafW43YceAy1o6AicM_g"&gt;Jeremy Malcolm&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;The International Telecommunications Union has approved a new protocol for relaying biometric information. The protocol is intended to enable doctors to communicate data about patients safely and is geared towards developing countries where the access to medical care in rural areas is poor and communication between clinics and doctors would provide better patient care. You can read the full &lt;a class="external-link" href="http://www.itu.int/ITU-T/newslog/Using+Telecommunication+To+Transfer+Biometric+Information.aspx"&gt;press release here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Netizen Power&lt;/strong&gt;: Lee Yoo Eun at Global Voices reports that the October 26th Seoul mayoral election was swayed by the use of twitter. Read the &lt;a class="external-link" href="http://globalvoicesonline.org/2011/10/27/south-korea-tweeting-elections-against-all-odds/"&gt;full article here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;African entrepreneur Herman Chinery-Hesse gave a speech at the Tech 4 Africa conference highlighting what the rise of Internet Communication Technologies has done for Africa.&amp;nbsp; A synopsis of his talk can be found on the Tech4Africa.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sovereigns of Cyberspace&lt;/strong&gt;: Facebook has introduced a &lt;a class="external-link" href="https://threatpost.com/en_us/blogs/facebook-testing-guardian-angels-feature-getting-locked-accounts-102811"&gt;new “guardian angel” feature &lt;/a&gt;to help users restore locked accounts.&lt;/p&gt;
&lt;p&gt;The &lt;a class="external-link" href="http://www.edri.org/edrigram/number9.21/austrian-big-brother-awards-2011"&gt;13th Austrian Big Brother Awards &lt;/a&gt;were held on October 25th in Vienna. “Winners” included the CEO of Telekom Austria, the Ministers of Interior and Justice, and the head of the anti-terror police unit. Mark Zuckerberg received the “lifelong menace” award and a “Defender of Liberty” award went to the creators of the “&lt;a class="external-link" href="http://europe-v-facebook.org/"&gt;Europe versus Facebook&lt;/a&gt;” campaign.&lt;/p&gt;
&lt;p&gt;The&lt;a class="external-link" href="https://www.rightscon.org/"&gt; Silicon Valley Human Rights Conference &lt;/a&gt;was held in San Francisco in late October (see GVA's report, Jillian York's report, and The Economist's) and released the &lt;a class="external-link" href="http://www.rightscon.org/2011/10/silicon-valley-human-rights-standards/"&gt;Silicon Valley Standard&lt;/a&gt;, a set of 15 principles that technology companies should follow in order to protect human rights.&lt;/p&gt;
&lt;p&gt;China's Weibo &lt;a class="external-link" href="http://technode.com/2011/10/30/sina-weibo-launching-english-version-soon-with-the-partnership-of-flipboard-and-instagram/"&gt;plans to launch an English version &lt;/a&gt;in partnership with Flipboard and Instagram. Will they agree to follow the Silicon Valley Standard?&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Security Alert&lt;/strong&gt;: The security researcher Barnaby Jack has found it possible to conduct a &lt;a class="external-link" href="http://www.infosecurity-magazine.com/view/21601/barnaby-jack-hacks-diabetes-insulin-pump-live-at-hacker-halted/"&gt;blind attack on insulin pumps&lt;/a&gt;.&amp;nbsp; While there have been no reports of anyone being harmed by such an attack, this highlights how far behind security technologies are when it comes to wireless devices that are embedded in critical infrastructure and medicine.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Publications&lt;/strong&gt;:&lt;a class="external-link" href="http://themonkeycage.org/blog/2011/10/22/digital-cameras-reduce-electoral-corruption/"&gt; Digital Cameras Reduce Electoral Corruption &lt;/a&gt;by Michael Callen and James Long.&lt;/p&gt;
&lt;p&gt;Events: Check out this &lt;a class="external-link" href="https://www.google.com/calendar/embed?src=openinternetdigest%40gmail.com&amp;amp;ctz=America/New_York"&gt;handy calendar of Internet-related events&lt;/a&gt; around the world, courtesy of Internews!&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Access Contested: Security, Identity, and Resistance in Asian Cyberspace&lt;/em&gt;, by the OpenNet Initiative, to be officially released in December. Part I of the book (including a chapter by yours truly) can be read online or downloaded &lt;a class="external-link" href="http://citizenlab.org/2011/09/access-contested-is-now-available/"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Note: This report was compiled with considerable help from Ted Eby and Weiping Li.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Read the original article &lt;a class="external-link" href="http://advocacy.globalvoicesonline.org/2011/11/07/netizenreport-transparency/"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/netizen-report'&gt;https://cis-india.org/news/netizen-report&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>RTI</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-11-09T04:31:48Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/once-a-flash">
    <title>Once Upon  A Flash</title>
    <link>https://cis-india.org/internet-governance/once-a-flash</link>
    <description>
        &lt;b&gt;It was a dark and stormy evening. A young man in a dark blue Adidas jacket, collar turned up, eyes under green-black shades, hopped off a motorbike, tucked his thumbs into the front pockets of his low-slung retro jeans and surreptitiously made his way through a road thronging with rush-hour traffic and irate pedestrians yelping on their cellphones. He skipped across death traps with skilled ease: leaping over potholes, jumping over halfdug trenches, avoiding the occasional pair of doggy jaws that longed to mate with his ankles, ignoring the bikers who were using the pavements as new lanes for driving towards a honking traffic jam bathed in an orange and red neon that made the road look like a piece of burnt toast with dollops of vicious jam on it.&lt;/b&gt;
        &lt;p&gt;After five minutes of brisk walking, he slowed down as if he had reached just where he wanted to be – nowhere in particular. On his left were the large Acropolis buildings, towering over the world from their gated existence, structured in pompous Greek columns and facades of granite, stone and marble. On his right, on the other side of the road, if you looked over the metal head of the traffic, you could see the small roadside restaurant that announced fresh fish at cheap rates, sitting cosily under a starved-looking tree, happily encroaching upon the pavement, forcing the pedestrians to disembark, navigate the traffic and then come back to the relative safety of the footpath.&lt;/p&gt;
&lt;p&gt;Caught between these two ironies, he stayed put for a while, glancing at his chor bazaar Rado model that flashed on his left wrist. He headed towards the mall that rose in glass and neon, false curves and studious lines across the quickly staining sky of a Saturday evening. As he walked into the mall, the automatic doors that sensed his corporeal presence opened up for him and the girl in a polka-dotted blue-and-red dress threw him the smile that desk attendants save for strangers. The gush of cold airconditioned air and the noises of window shoppers greeted him to ease; mannequins in windows, draped in the latest fashions and various states of undress, winked at him; the smell of freshly brewed coffee came and enveloped him. He headed with ungrim determination towards the round performance area in the mall centre. Like many other hangers-out he too loitered without apparent intent around it, just another boy out on a Saturday evening.&lt;/p&gt;
&lt;p&gt;Suddenly his cell phone buzzed. His alarm sounded in loud tones to blend with the Britney Spears playing on the mall sound system. He fished out a bright bumblebee-yellow bandana and tied it to his head. As he did that, the performance area turned into a sea of people wearing varied shades of yellow, blasting their cell phone alarms at full volume till all you could hear was a grating disharmony that would have caused comment on a railway station in India. The phones soon faded and a group of about 70 people formed a human ring, holding hands, their heads swathed in yellow, and sang at the top of their voices the first two stanzas of Hum Honge Kamyaab – the Hindi rendering of the famous song We Shall Overcome. Once the song sank into a bewildered silence, the people in yellow bandanas fell on their knees, raised their hands towards heaven and roared with laughter before quickly pulling off their headgear and dispersing, leaving an empty space and a gawking audience who just had their first dose of a ‘flashmob’ – a group of people who assemble together, suddenly, in a public place, perform an unexpected sets of choreographed actions and disperse without as much as a by your leave or with your leave.&lt;/p&gt;
&lt;p&gt;Flashmobs trace their history to the early 18th century industrialisation, when a group of women working in the labour shops&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt;in Australia used coded messages to meet and discuss the problems they had in their workplaces. These meetings were organised at random, and the women used the very technologies of production that they engaged with at work on a daily basis to fight the oppression and the injustice of the people at the top. The first modern flashmob, however, is attributed to Bill Wasik, editor of Harper’s Magazine, who, after the first failed attempt (May, 2003), managed to pull a successful flashmob where 200 people swarmed over the mezzanine floor of the Manhattan departmental store Macy’s, pretending to buy a ‘love rug’ for their commune where they supposedly all lived together; they left a bewildered audience and a bemused store staff behind them (3rd June, 2003).&lt;/p&gt;
&lt;p&gt;Organise, congregate, act, disperse – that is the anatomy of a flash mob. A polymorphous set of people are brought together through the commonality of subscribing to similar technological interfaces or gadgetry. Random e-mails, short messages (sms) on cell phones, discrete messages embedded in public works of art or media, blogs and wikis have now been successfully used to conjure these tenuous group formations that temporarily transform the space that they arrive at – flash sites – into something that neither the audience they perform to nor the state can comprehend, thus producing that space in a condition of social and physical illegality.&lt;/p&gt;
&lt;h3&gt;In The Name of Fun&lt;/h3&gt;
&lt;p&gt;One of the most overarching icons of a globalised economy has been the credit card – virtual money that has changed the way we think of money, capital and transactions. Visa Power, as the advertisement goes, is looked upon as the quintessential rhetoric of economic globalisation, where the power to change and to create is manifested through the processes of consumption. While technology has been heavily implicated in the creation of this new invisible money, it has remained on the background. The swiping of the card – the physical act of buying without ‘paying’ has become such a naturalised event that the technology it adopts or the networks it creates are not very visible... Flash mobs, in their construction, execution and ramifications, foreground technology as one of the most powerful tools of creating new formations of grouping and networking that, through their deliberately devised unintelligibility, transform the spaces they occupy.&lt;/p&gt;
&lt;p&gt;This is the story of the first flashmob in India, and how it can be understood through the tropes of illegality, enchantment and transformation. The story starts a little before the flashmob itself. In the year 2000, a shopping mall in Mumbai created a furore amongst the public. It was the first ‘genuine’ shopping mall in India. The first space that claimed mallhood was in Bangalore – Kemp Fort, but it was more a large shopping store rather than a mall. This first all American shopping mall – Crossroads, with its promises of unlimited pleasure and brand-tagged shopping – attracted the largest crowd in its opening week. Everybody wanted to see what the mall was like. Everybody was curious about this space. Everybody wanted to be a part of this exclusive zone that clearly demonstrated that modernity and progress had finally come to us. Then everybody found out that they were not allowed to enter the mall. As the director of the mall pointed out in his interview with The Times of India, (23rd August, 2000), “Crossroads is not meant for everybody".&lt;/p&gt;
&lt;p&gt;In those days when cell phones were still a novelty and definitely a curio for the upper classes, and when pagers were still struggling for a mass market, Crossroads passed a stipulation which restricted people not carrying a cell phone or a credit card from entering the mall. If you were still eager to enter the space, you paid extra fees of Rs 50 per head and thus made amends for not carrying a cell phone or a credit card. This was the first time a ‘public’ space made it very clear that the public it was looking for and attempting to effectively create was not “everybody”. The issue was talked about, shouted about, screamed at and criticised by all wings of the media, who passionately analysed this instance of discriminatory practices based  on socioeconomics. Later, a PIL (Public Interest Litigation) was filed against the mall; it lost, and had to throw its doors open to “everybody” who had been clamouring to get in ever since they found out they were not allowed to enter.&lt;/p&gt;
&lt;p&gt;On 4 October 2003, the mall again came into limelight in a manner it had not accounted for. This time it was initiated by an e-mail. About 5,000 original mailers went off to people all around Mumbai and even beyond the city, asking them to have a look at a new blog for Mumbai flashmobs. The blog posted a form asking for name, e-mail address and mobile number. On 3 October several cell phones rang, asking people who had submitted their details in the form to check their inboxes. The eager participants glided to their accounts to find a mail that agonisingly chalked out the time and space of the meeting venue – a flash site. The information was also sent by sms to all members who had volunteered. And then at exactly 5 pm a group of about a hundred participants entered Crossroads. They screamed at the top of their voices and sold imaginary shares belonging to Reliance India. They performed the garba. In the middle of dancing they all froze. And then without so much as a word, after two minutes of historic histrionics, they opened their umbrellas and dispersed, leaving a trail of bewilderment and confusion, as an audience of over a thousand watched with their jaws on the floor.&lt;/p&gt;
&lt;p&gt;This was India’s first recorded flashmob. A large crowd of people who did not know each other, did not have any largely political purpose in mind and did not really intend to extend the flashmob contact into relationships, got together to perform a set of ridiculous actions at Crossroads, thus marking it as the first flash site in India. Ironically, the group that converted the mall into mayhem consisted of whom Anne Balsamo calls the hyperreal people – people whose identities are created by the hypervisual and extra physical aesthetics of the digital technologies that they deploy - who were once the only legitimate owners of the space of that mall. This first flashmob sparked off many others all around the nation – most of them marking out spaces such as multiplexes, shopping malls, gaming parlours, body shops, large commercial roads and shopping complexes as their flashsite.&lt;/p&gt;
&lt;p&gt;Bill Wasik, the creator of the first flashmob in Manhattan, in a recent interview,&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt; looked upon the flashmob experiment as a study in behavioural psychology of people he called “hipsters” – people who would join ‘new’ or ‘cool’ things for no reason or investment but to be visible in the new trends and social fads. To a large extent, Wasik’s surface analysis seems to hold true. While flashmobs have been used as a political weapon by several groups and activists in many areas of human rights, queer rights, feminism, political democracy, etc., flashmobs fundamentally exist, like pre-Raphaelite art, for a solipsist reason. Bijoy Venugopal, who produced one of the most celebrated accounts of the Crossroads flashmob&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt;, mentions how it was all about having some “serious fun”. Increasingly, the flashmob organisers in and around the country have disavowed any ideological moorings for the gathering, and forcibly shelve it into the realms of entertainment or leisure. Following the banning of flashmobs in cities like Mumbai and Bangalore (Mid-day, 9th oct. 2003), even though they have invoked the right to freedom of speech and expression, the organisers and the participants have largely produced justifications by claiming to have no political agenda or inclinations in the construction or execution of flashmobs.&lt;/p&gt;
&lt;p&gt;In this repeated disavowal of the political, one can read the desire for re-enchantment that flashmobs and mobsters bring with them. Flashsites, defined by the organising of the flashmobs, are usually sites of globalised consumption – an enchanted world of brand names and designer lifestyles that can make you feel as perpetually disoriented as Alice in Wonderland. These sites serve as the symbols of enchantment in the logic of the city.&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; The new urban enchantment and mode of fantasy is located in the circuits of consumerism where, with plastic money and unlimited credit, the consuming citizen can buy all that the heart desires. However, flashmobs, outside these networks of consumption, and constituted by the same people who fit the bill of the citizen as imagined and promoted by the state and the market as they embrace globalisation and its technologies, demand a re-enchantment of the city. They force us to acknowledge the need for such public spaces to be accessible to all, and provide a strong critique of the easily accepted globalised dream in which the state is so heavily investing. Flashmobs become a manifestation of how tenuously networked, fragile communities, their collaboration inspired and enabled by cyberspatial technologies, can contest the very forces that promote and proliferate these technologies. Flashmobs become a site upon which the drama of globalisation, consumption, state and space is discursively and recursively enacted.&lt;/p&gt;
&lt;h3&gt;In The Name of The Law&lt;/h3&gt;
&lt;p&gt;That flashmobs are in a condition of illegality is perhaps one of the easiest claims to prove. The very fact that the Mumbai Police, after the first series of flashmobs, invoked Section 37(1) of the Bombay Police Act in the name of security and safety, clearly states how flashmobs are considered outside the law in the most literal sense of the word. The then Mumbai Police Deputy Commissioner of Police, Amitabh Gupta, contacted Rohit Tikmany, organiser of the first flashmob and moderator of the flashmob blogging community (&lt;a class="external-link" href="http://www.mumbaimobs.org/"&gt;http://www.mumbaimobs.org/&lt;/a&gt;), asking him to shut down the site and stop all further attempts at organising flashmobs. Following the ban in Mumbai, cities such as Ahmedabad, Bangalore and Delhi have enacted similar bans within the city limits. These censoring forces look at flashmobs as potentially destabilising elements that can be ‘misused’ for violent acts such as riots and bombings by fundamentalist organisations.&lt;/p&gt;
&lt;p&gt;However, of greater interest is the way in which flashmobs manage to reproduce flashsites in conditions of social and physical illegality by creative deliberate structures of transient unintelligibility. The leisure infrastructure of malls and multiplexes, cafes and large shopping complexes, gaming zones and commercial roads of consumption, are all aimed at the new citizenry that comes into being with these new urban economies falling into place. These spaces are not only legitimate spaces of self-expression through consumption, but also authorised spaces of public assembly and gathering. They promote an ethos of incessant consumption where the individual is also installed as a consumable product that relates to others in the processes of consumption. They are the locations where brands, accessories and lifestyles all come together as the figureheads of a sanitised economy which strives to make opaque the surrounding subcultures of piracy, theft, copying and distributing that emerge around such nodal points.&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; To belong to the space of a mall or a shopping complex, one needs to almost automatically endorse the original, the authentic, the expensive, as a way of making a conscious statement of style and lifestyle. These potential flashsites become the spaces that the state legitimises as the most visible and sanitised form of urbanisation in contemporary cities.&lt;/p&gt;
&lt;p&gt;However, flashmobs definitely subvert the sanctity or the sanity of such spaces by compelling them to suddenly introject disruptive conditions of unintelligibility. Flashmobs force the other participants of the space to enter into a narrative of confusion and chaos; of turbulence, thus rendering the space of consumption incomprehensible for the short time that the flashmob unfolds. Moreover, flashmobs do not fall under globalisation’s rhetoric of consumption, and do not require any special access powers or consumption rites, thus defying the discriminatory protocols that such spaces put in motion under the uneasily hovering sign “Rights of Admission Reserved”. Flashmobs, by rejecting the very use and expectation of the space, in spite of the heavy surveillance, state opposition and hi-tech policing, are able to distort the formulaic narratives of the space, thus creating alternative structures of resistance, of transformation, of transition. State apparatus gets completely paralysed when faced with such a radical reconfiguring, and thus goes out of its way to put a special ban upon flashmobs in a city where even a small defeat in a cricket match, or various emotional events such a public mourning or celebration, bring together crowds much louder, more aggressive, tenuous and destructive than conventional flashmobs. The transient illegality that flashmobs produce is not only at the level of the law but also at the level of legibility and comprehension.&lt;/p&gt;
&lt;p&gt;"What do the mobsters do when they come together for a flashmob?" is a wrong question to ask. While the actions of the mobsters might be bizarre and lacking in meaning, often uninformed by any obvious ideology, flashmobs do produce new modes of signification and networking patterns, unprecedented in modern history. The ephemeral nature of the flashmobs, the improbably pseudonymous identities of the participants, the technologically mediated communication and networking patterns, all hint towards a certain notion of technosociality, where the social world around us is profoundly affected by the technologies that we adopt. In these unexpected eruptions, flashmobs create a new relationship between actors, audience and the spaces that they inhabit, including all the three into the circuits of digital technologies. As a form of radical localised performance, flashmobs offer a way to question the hierarchical intentionality of the spaces that they transform; they embody new ways in which technologies interface with our daily life, producing new forms of technosocial living.&lt;/p&gt;
&lt;p&gt;This paper was published in Academia.edu. Click &lt;a class="external-link" href="http://cis-india.academia.edu/NishantShah/Papers"&gt;here&lt;/a&gt; to read the original. Download the file &lt;a href="https://cis-india.org/internet-governance/once-upon-a-flash" class="internal-link" title="Once Upon A Flash"&gt;here&lt;/a&gt;. [PDF, 129 kb]&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;].These were probably the precedents to the modern day sweat shops that have characterized  Globalisation in the 21st century. The ‘labour shops’ were large stone and concrete buildings which housed workers working around the clock towards incessant production. Women and children were often preferred because they were given lesser wages than men and considered more easily malleable.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;].The transcript of the interview is available at &lt;a class="external-link" href="http://www.laweekly.com/ink/04/37/features-bemis.php"&gt;http://www.laweekly.com/ink/04/37/features-bemis.php&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;].Venugopal, himself a prolific blogger, blogged about the flashmobs at &lt;a class="external-link" href="http://www.laweekly.com/ink/04/37/features-bemis.php"&gt;http://www.laweekly.com/ink/04/37/features-bemis.php&lt;/a&gt;&lt;a href="http://www.laweekly.com/ink/04/37/features-bemis.php"&gt;http://www.laweekly.com/ink/04/37/features-bemis.php&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. Po Bronson, in his spectacular analysis of the Silicon Valley in The Nudist on the Late Shift, talks about how in a post-industrial city, the quantifiable icons of enchantment and progress – large factories, smoke spewing chimneys and huge barricaded stone and iron constructions have given way to small and homelike offices which are almost human and hence negligible. In his search for the new symbols of enchantment, Bronson conjures the figure of the nudist on the late shift – an eccentric double billionaire who works and lives in a cubicle and rides on the crest of the IT boom. In the case of third world countries like India, these symbols might well be these new sites of consumption that have come with globalization.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;].One of the more exciting facets of digital technologies and globalization has been the debate over property, ownership and theft. Easy duplication of brands and bypassing the traditional circuits of distribution or sale of property have created the glorified figure of the pirate who straddles the worlds of the legal and the illegal, the digital and the physical, the ephemeral and the tactical with great ease. Within the sanctuarised spaces of malls and shopping complexes, these referents to the other world of cheap duplicates and mobile consumables hang uneasily. There is a constant attempt at establishing the original and the legitimate over the fake or copied replicas which are available in the grey markets that emerge around them.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/once-a-flash'&gt;https://cis-india.org/internet-governance/once-a-flash&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-12-14T10:23:52Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/learn-yourself">
    <title>Learn It Yourself</title>
    <link>https://cis-india.org/news/learn-yourself</link>
    <description>
        &lt;b&gt;The peer-to-peer world of online learning encourages conversations and reciprocal learning, writes Nishant Shah in an article published in the Indian Express on 30 October 2011. &lt;/b&gt;
        
&lt;p&gt;Technologies and learning have always had a close link. In the past, distance learning programmes of higher education through the postal service, remote education programmes using satellite TV and interactive learning projects using information and communication infrastructure, have all been deployed with varied results in promoting literacy and higher education. In the last two decades, the internet has also joined this technology ecology in trying to provide quality and affordable education to remotely located areas through “citizen service centres” envisioned to reach 6,40,000 Indian villages in the future.&lt;/p&gt;
&lt;p&gt;These technology-based information outreach programmes expand the ability of traditional formal learning centres like universities, to cater to the needs of those who might not have access to learning resources. This vision of networked education relies on existing systems of centralised syllabus making, teacher-to-student information transfer, grade-based evaluation and accreditation systems, and a degree-centred approach to learning.&lt;/p&gt;
&lt;p&gt;I was in New York last week, at an international summit on the future of learning, Mobility Shifts, organised by the New School, where more than 260 speakers from 21 countries discussed the possibility of learning beyond the bounds of the school and university system. Many discussions were around the declining public education system (with huge disinvestment moves from the government), privatisation of education, increasing tuition and fees, and the non-relevance of current education. However, along with this digital expansion of the traditional education system is an emerging trend that challenges the ways in which we understand education and learning – DIY Learning or Do It Yourself Learning.&lt;/p&gt;
&lt;p&gt;DIY Learning is a product of the networked condition. It recognises that as more people get onto digital information networks, there is a possibility of producing peer-to-peer learning conditions, which do not have to follow our accepted models of learning and education.&lt;/p&gt;
&lt;p&gt;We have seen the rise of various decentralised and democratised knowledge repositories like Wikipedia. The search based algorithms of search engines also take into consideration the idea that knowledge is personal. User generated content sites like eHow.com show that the individual learner is not merely a recipient of information and knowledge. Information seeking spaces like Quora have shown that knowledge-sharing communities can incite new conditions of learning. Our contexts, experiences, everyday practices, aspirations etc. equip us with valuable information, which not only shape how we learn but also what we find relevant to learn for ourselves. DIY Learning picks up on the idea that the infrastructure of education is not necessarily designed towards learning. Learning often happens outside the classrooms, in informal conversations.&lt;/p&gt;
&lt;p&gt;Thus DIY Learning offers a new model of learning. It destabilises the established hierarchy of knowledge production and pedagogy and creates an each-one-teach-one model with a twist. Instead of a centralised board of curriculum designer who shape syllabi for the “average” student, you have the possibility of customised, highly individual, interest-based learning curricula where the student is a part of deciding what s/he wants to learn. DIY Learning doesn’t recognise the distinctions between teachers and students, but recognises them as “peers” within a network, encouraging conversations and reciprocal learning rather than information transfer based classroom models. Instead of mass-produced education that caters only to an imagined average, the DIY Learning model recognises that within the same student group, there are different rates and scales of learning, thus offering environments suited to the aptitude of the students.&lt;/p&gt;
&lt;p&gt;Within the DIY Learning model, aspects of education, from the design of curriculum and learning methods, to grading and evaluation are geared towards individual preferences and aspirations.&lt;/p&gt;
&lt;p&gt;Many people think of DIY Learning as an alternative to mainstream learning processes and structures. However, it is perhaps more fruitful to think of DIY Learning as a way of figuring out the problems that beset our traditional educational system. It allows us to rethink the relationships between learning, education, teaching and technologies. It recalibrates the space of the classroom and reconfigures the role of the teacher and the student.&lt;/p&gt;
&lt;p&gt;DIY Learning emphasises that merely building schools and universities is not enough to assure that learning happens. Learning happens through experiences, practice, conversations, internalisations and through making mistakes. DIY Learning offers these possibilities in an education universe that is constantly refusing to take risks, innovate and adapt to the needs of the present. By itself it might not be able to take on the roles and functions of the existing education systems. But it does warn us that we are preparing our students for our pasts rather than their futures. And the time to change is now.&lt;/p&gt;
&lt;p&gt;The original story was published in the Indian Express, it can be read &lt;a class="external-link" href="http://www.indianexpress.com/news/learn-it-yourself/867069/"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/learn-yourself'&gt;https://cis-india.org/news/learn-yourself&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-12-23T05:01:14Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/comments-draft-national-policy-on-electronics">
    <title>CIS Comments on the Draft National Policy on Electronics</title>
    <link>https://cis-india.org/internet-governance/comments-draft-national-policy-on-electronics</link>
    <description>
        &lt;b&gt;These were the comments submitted by CIS to the request for comments put out by the Department of Information Technology on its draft 'National Policy on Electronics'.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The Department of Information Technology must be commended for taking the initiative to create &lt;a class="external-link" href="http://www.mit.gov.in/sites/upload_files/dit/files/Draft-NationalPolicyonElectronics2011_4102011(2).pdf"&gt;this policy&lt;/a&gt; which aims to reduce India’s dependence on other countries for crucial electronic hardware requirements, and to increase Indian production to such a capacity as to not only serve India’s increasing demand for electronics, but to fulfil foreign demand as well.&lt;/p&gt;
&lt;p&gt;We have mainly focused our comments on the implications of the patent regime on this laudable goal.&lt;/p&gt;
&lt;h2 id="technology-transfer"&gt;Technology Transfer&lt;/h2&gt;
&lt;p&gt;An area that the policy is silent on is technology transfer. In relation to technology, the main bargain embedded in the Trade-Related Intellectual Property Rights (TRIPS) Agreement of the WTO was the increase in the level of protection offered under patent laws of developing countries in exchange for increased transfer of technological know-how from the developed countries. While India has increased patent protection in accordance with the TRIPS Agreement, there has been no commensurate transfer of technology from countries which are currently hubs of electronics know-how.&lt;/p&gt;
&lt;p&gt;One important example is China’s policy on transfer of technology along the whole value chain to enable domestic firms to gain technological expertise.&lt;/p&gt;
&lt;p&gt;The Association of American Manufacturing notes, “One of the most potent weapons China has used to move up the value chain is forced technology transfer … It is only through the acquisition (rather than internal development) of sophisticated technologies that Chinese companies have been able to rapidly enter and expand in sophisticated industries ….”&lt;/p&gt;
&lt;p&gt;This insistence on technology transfer as a national policy has served China well, and their experience should be incorporated into India’s National Policy on Electronics. This is not to say that India should not internally develop our own technological capabilities, but that the Indian government must use the policy space available to it to ensure that acquisition of technological capabilities happens alongside.&lt;/p&gt;
&lt;h2 id="outflow-of-foreign-exchange-as-royalties-creating-adverse-balance-of-payments"&gt;Outflow of Foreign Exchange as Royalties Creating Adverse Balance of Payments&lt;/h2&gt;
&lt;p&gt;The latest data from the World Bank shows that our balance of payments is increasing adversely at an alarming rate, and has now reached over USD 2.38 billion.&lt;/p&gt;
&lt;p&gt;Our royalty and licence fee payments have kept on increasing at an astounding rate.&lt;/p&gt;
&lt;h3 id="table-indias-royalty-and-licence-fees-payments-current-usd"&gt;Table: India’s royalty and licence fees payments (current USD)&lt;/h3&gt;
&lt;table class="plain"&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th align="right"&gt;1991&lt;/th&gt;
&lt;th align="right"&gt;2006&lt;/th&gt;
&lt;th align="right"&gt;2007&lt;/th&gt;
&lt;th align="right"&gt;2008&lt;/th&gt;
&lt;th align="right"&gt;2009&lt;/th&gt;
&lt;th align="right"&gt;2010&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td align="right"&gt;49,565,208&lt;/td&gt;
&lt;td align="right"&gt;845,949,436&lt;/td&gt;
&lt;td align="right"&gt;1,159,824,391&lt;/td&gt;
&lt;td align="right"&gt;1,528,826,913&lt;/td&gt;
&lt;td align="right"&gt;1,860,283,808&lt;/td&gt;
&lt;td align="right"&gt;2,437,500,663&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Meanwhile India’s income is gaining slowly and erratically, and in 20100 reached USD 59.6 million.&lt;/p&gt;
&lt;h3 id="table-indias-royalty-and-licence-fees-receipts-current-usd"&gt;Table: India’s royalty and licence fees, receipts (current USD)&lt;/h3&gt;
&lt;table class="plain"&gt;
&lt;thead&gt;
&lt;tr class="header"&gt;
&lt;th align="right"&gt;1991&lt;/th&gt;
&lt;th align="right"&gt;2006&lt;/th&gt;
&lt;th align="right"&gt;2007&lt;/th&gt;
&lt;th align="right"&gt;2008&lt;/th&gt;
&lt;th align="right"&gt;2009&lt;/th&gt;
&lt;th align="right"&gt;2010&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td align="right"&gt;615,525&lt;/td&gt;
&lt;td align="right"&gt;13,445,053&lt;/td&gt;
&lt;td align="right"&gt;30,690,000&lt;/td&gt;
&lt;td align="right"&gt;27,211,957&lt;/td&gt;
&lt;td align="right"&gt;38,128,141&lt;/td&gt;
&lt;td align="right"&gt;59,560,687&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;This bleeds the Indian economy through a very inefficient outflow of capital. Insisting on transfer of technology is an important component in slowing down this trend.&lt;/p&gt;
&lt;h2 id="linking-of-value-chain-and-preferential-treatment"&gt;Linking of Value Chain and Preferential Treatment&lt;/h2&gt;
&lt;p&gt;One important clarification that is needed in the policy (specifically clause IV.1.3) is that “domestically manufactured electronic products” is intended to mean not those products for which the last part of value has been added in India. This way essentially non-Indian products with Indian branding can be seen to be “domestically manufactured electronic products”. The longer the Indian part of the value chain, the more preference it should be given, and holding by Indian companies of essential patent rights (or the availability of greater number of components of the product under royalty-free, FRAND and RAND licences) could be an important criteria. This will also encourage the transfer of technological know-how to Indian firms.&lt;/p&gt;
&lt;h2 id="preferential-treatment"&gt;Preferential Treatment&lt;/h2&gt;
&lt;p&gt;Some may argue that the provision of preferential treatment to domestic manufacturers contravenes the GATT Agreement, however the GATT Agreement itself provides a usable exception in Article 3(8):&lt;/p&gt;
&lt;blockquote class="callout"&gt;
&lt;p&gt;Article III: National Treatment on Internal Taxation and Regulation&lt;/p&gt;
&lt;p&gt;8 (a) The provisions of this Article shall not apply to laws, regulations or requirements governing the procurement by governmental agencies of products purchased for governmental purposes and not with a view to commercial resale or with a view to use in the production of goods for commercial sale.&lt;/p&gt;
&lt;p&gt;(b) The provisions of this Article shall not prevent the payment of subsidies exclusively to domestic producers, including payments to domestic producers derived from the proceeds of internal taxes or charges applied consistently with the provisions of this Article and subsidies effected through governmental purchases of domestic products.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Thus, by crafting any further regulation under this policy to fit within this exception, India would not fall afoul of its obligations under GATT.&lt;/p&gt;
&lt;h2 id="cybersecurity-and-source-code"&gt;Cybersecurity and Source Code&lt;/h2&gt;
&lt;p&gt;An important aspect of the cybersecurity that is discussed in clause IV.5 is the ability to validate the lack of malicious code in the electronics used in strategically important infrastructure. For this, manufacturers must be required to provide the source code as part of government tenders in strategically important infrastructure.&lt;/p&gt;
&lt;h2 id="distinction-between-innovation-and-intellectual-property"&gt;Distinction between Innovation and Intellectual Property&lt;/h2&gt;
&lt;p&gt;The Electronic Development Fund must seek to promote innovation, research and development, and commercialization of products, and must be used to strategically acquire patents. Promotion of patents is not an end in itself, unlike promotion of innovation and ensuring that research and development reaches markets through commercialization. Patents are only a means to an end, and may sometimes be strategically useful, and often stand in way of gaining optimal use of technology by markets due to their monopolistic nature. Thus, it is recommended that “promotion of IP” be dropped from this clause, and instead “promotion of strategic acquirement and use of patents” be substituted in its place.&lt;/p&gt;
&lt;h2 id="national-electronics-mission"&gt;National Electronics Mission&lt;/h2&gt;
&lt;p&gt;The National Electronics Mission should not only have industry participation but also participation from academia and civil society.&lt;/p&gt;
&lt;h2 id="funding"&gt;Funding&lt;/h2&gt;
&lt;p&gt;The issue of funding for the initiatives outlined in this policy must be addressed as well.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/comments-draft-national-policy-on-electronics'&gt;https://cis-india.org/internet-governance/comments-draft-national-policy-on-electronics&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Government Feedback</dc:subject>
    
    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>e-Governance</dc:subject>
    
    
        <dc:subject>Submissions</dc:subject>
    
    
        <dc:subject>Patents</dc:subject>
    

   <dc:date>2011-11-01T00:05:32Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/india-statement-un-cirp">
    <title>India's Statement Proposing UN Committee for Internet-Related Policy</title>
    <link>https://cis-india.org/internet-governance/blog/india-statement-un-cirp</link>
    <description>
        &lt;b&gt;This is the statement made by India at the 66th session of the United Nations General Assembly, in which its proposal for the UN Committee for Internet-Related Policy was presented.&lt;/b&gt;
        
&lt;h2&gt;&lt;br /&gt;&lt;/h2&gt;
&lt;h2&gt;66th Session of the UN General Assembly&lt;/h2&gt;
&lt;h2&gt;New York. October 26, 2011.&lt;br /&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;br /&gt;&lt;/h2&gt;
&lt;h2&gt;Agenda Item 16: Information and Communications&lt;/h2&gt;
&lt;h2&gt;Technologies for Development (ICT): Global Internet Governance&lt;/h2&gt;
&lt;h2&gt;&lt;br /&gt;&lt;/h2&gt;
&lt;h2&gt;Statement by India&lt;br /&gt;&lt;/h2&gt;
&lt;p&gt;&lt;br /&gt;Mr. Chairman,&lt;br /&gt;&lt;br /&gt;We thank the Secretary-General for his report on enhanced cooperation on public policy issues pertaining to the Internet, contained in document A/66/77, which provides a useful introduction to the discussions under this agenda item.&lt;br /&gt;&lt;br /&gt;As a multi-ethnic, multi-cultural and democratic society with an open economy and an abiding culture of pluralism, India emphasizes the importance that we attach to the strengthening of the Internet as a vehicle for openness, democracy, freedom of expression, human rights, diversity, inclusiveness, creativity, free and unhindered access to information and knowledge, global connectivity, innovation and socio-economic growth.&lt;br /&gt;&lt;br /&gt;We believe that the governance of such an unprecedented global medium that embodies the values of democracy, pluralism, inclusion, openness and transparency should also be similarly inclusive, democratic, participatory, multilateral and transparent in nature.&lt;br /&gt;&lt;br /&gt;Indeed, this was already recognized and mandated by the Tunis Agenda in 2005, as reflected in paragraphs 34, 35, 56, 58, 59, 60, 61 and 69 of the Agenda. Regrettably, in the six long years that have gone by, no substantial initiative has been taken by the global community to give effect to this mandate.&lt;br /&gt;&lt;br /&gt;Meanwhile, the internet has grown exponentially in its reach and scope, throwing up several new and rapidly emerging challenges in the area of global internet governance that continue to remain inadequately addressed. It is becoming increasingly evident that the Internet as a rapidly-evolving and inherently global medium, needs quick-footed and timely global solutions and policies, not divergent and fragmented national policies.&lt;br /&gt;&lt;br /&gt;The range and criticality of these pressing global digital issues that continue to remain unaddressed, are growing rapidly with each passing day. It is, therefore, urgent and imperative that a multilateral, democratic participative and transparent global policy-making mechanism be urgently instituted, as mandated by the Tunis Agenda under the process of ‘Enhanced Co-operation’, to enable coherent and integrated global policy-making on all aspects of global Internet governance.&lt;br /&gt;&lt;br /&gt;Operationalizing the Tunis mandate in this regard should not be viewed as an attempt by governments to “take over” or “regulate and circumscribe” the internet. Indeed, any such misguided attempt would be antithetical not only to the internet, but also to human welfare. As a democratic and open society that has historically welcomed outside influences and believes in openness to all views and ideas and is wedded to free dialogue, pluralism and diversity, India attaches great importance to the preservation of the Internet as an unrestricted, open and free global medium that flourishes through private innovation and individual creativity and serves as a vehicle for open communication, access to culture, knowledge, democratization and development.&lt;br /&gt;&lt;br /&gt;India recognizes the role played by various actors and stakeholders in the development and continued enrichment of the internet, and is firmly committed to multi-stakeholderism in internet governance, both at the national and global level. India believes that global internet governance can only be functional, effective and credible if all relevant stake-holders contribute to, and are consulted in, the process.&lt;br /&gt;&lt;br /&gt;Bearing in mind the need for a transparent, democratic, and multilateral mechanism that enables all stakeholders to participate in their respective roles, to address the many cross-cutting international public policy issues that require attention and are not adequately addressed by current mechanisms and the need for enhanced cooperation to enable governments, on an equal footing, to carry out their roles and responsibilities in international public policy issues pertaining to the Internet, India proposes the establishment of a new institutional mechanism in the United Nations for global internet-related policies, to be called the United Nations Committee for Internet-Related Policies (CIRP). The intent behind proposing a multilateral and multi-stakeholder mechanism is not to “control the internet’’ or allow Governments to have the last word in regulating the internet, but to make sure that the Internet is governed not unilaterally, but in an open, democratic, inclusive and participatory manner, with the participation of all stakeholders, so as to evolve universally acceptable, and globally harmonized policies in important areas and pave the way for a credible, constantly evolving, stable and well-functioning Internet that plays its due role in improving the quality of peoples’ lives everywhere.&lt;br /&gt;&lt;br /&gt;The CIRP shall be mandated to undertake the following tasks:&lt;/p&gt;
&lt;ol type="i"&gt;&lt;li&gt;Develop and establish international public policies with a view to ensuring coordination and coherence in cross-cutting Internet-related global issues;&lt;/li&gt;&lt;li&gt;Coordinate and oversee the bodies responsible for technical and operational functioning of the Internet, including global standards setting;&lt;/li&gt;&lt;li&gt;Facilitate negotiation of treaties, conventions and agreements on Internet-related public policies;&lt;/li&gt;&lt;li&gt;Address developmental issues related to the internet;&lt;/li&gt;&lt;li&gt;Promote the promotion and protection of all human rights, namely, civil, political, social, economic and cultural rights, including the Right to Development;&lt;/li&gt;&lt;li&gt;Undertake arbitration and dispute resolution, where necessary; and,&lt;/li&gt;&lt;li&gt;Crisis management in relation to the Internet.&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&lt;br /&gt;The main features of CIRP are provided in the annex to this statement. In brief, the CIRP will comprise 50 Member States chosen on the basis of equitable geographical representation, and will meet annually for two working weeks in Geneva. It will ensure the participation of all relevant stakeholders by establishing four Advisory Groups, one each for civil society, the private sector, inter-governmental and international organizations, and the technical and academic community. The Advisory Groups will provide their inputs and recommendations to the CIRP. The meetings of CIRP and the advisory groups will be serviced by the UNCTAD Secretariat that also services the meetings of the Commission on Science and Technology for Development. The Internet Governance Forum will provide inputs to CIRP in the spirit of complementarity between the two. CIRP will report directly to the General Assembly and present recommendations for consideration, adoption and dissemination among all relevant inter-governmental bodies and international organizations. CIRP will be supported by the regular budget of the United Nations; a separate Fund would be set up by drawing from the domain registration fees collected by various bodies, in order to mainly finance the Research Wing to be established by CIRP to support its activities.&lt;br /&gt;&lt;br /&gt;Those familiar with the discourse on global internet governance since the beginning of the WSIS process at the turn of the millennium, will recognize that neither the mandated tasks of the CIRP, nor its proposed modalities, are new. The Working Group on Internet Governance (WGIG) set up by the UN Secretary- General had explicitly recognized the institutional gaps in global internet governance and had proposed four institutional models in its report to the UN General Assembly in 2005. The contours of the CIRP, as proposed above, reflect the common elements in the four WGIG institutional models. While the excellent report of the WGIG was much discussed and deliberated in 2005, unfortunately, no concrete follow-up action was taken to give effect to its recommendations on the institutional front. We hope that this anomaly will be redressed at least six years later, with the timely establishment of the CIRP.&lt;br /&gt;&lt;br /&gt;In order to operationalize this proposal, India calls for the establishment of an open-ended working group under the Commission on Science and Technology for Development for drawing up the detailed terms of reference for CIRP, with a view to actualizing it within the next 18 months. We are open to the views and suggestions of all Member States, and stand ready to work with other delegations to carry forward this proposal, and thus seek to fill the serious gap in the implementation of the Tunis Agenda, by providing substance and content to the concept of Enhanced Co-operation enshrined in the Tunis Agenda.&lt;br /&gt;&lt;br /&gt;Thank you, Mr. Chairman.&lt;br /&gt;&lt;br /&gt;&amp;nbsp;***&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;h2&gt;Annex&lt;/h2&gt;
&lt;h3&gt;The United Nations Committee for Internet-Related Policies (CIRP)&lt;/h3&gt;
&lt;p&gt;&lt;br /&gt;The United Nations Committee for Internet-Related Policies (CIRP) will have the following features:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Membership&lt;/strong&gt;: The CIRP will consist of 50 Member States of the United Nations, chosen/elected on the basis of equitable geographical representation. It will provide for equitable representation of all UN Member States, in accordance with established UN principles and practices. It will have a Bureau consisting of one Chair, three Vice-Chairs and a Rapporteur.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Meetings&lt;/strong&gt;: The CIRP will meet annually for two working weeks in Geneva, preferably in May/June, and convene additional meetings, as and when required. The UNCTAD Secretariat will provide substantive and logistical support to the CIRP by servicing these meetings.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Multi-stakeholder participation&lt;/strong&gt;: Recognizing the need to involve all stakeholders in Global Internet Governance in their respective roles, the CIRP shall ensure the participation of all stakeholders recognized in the Tunis Agenda. Four Advisory Groups – one each for Civil Society, the Private Sector, Inter-Governmental and International Organisations, and the Technical and Academic Community - will be established, to assist and advise the CIRP. These Groups would be self-organized, as per agreed principles, to ensure transparency, representativity and inclusiveness. The Advisory Groups will meet annually in Geneva and in conjunction with any additional meetings of the CIRP. Their meetings will be held back-to- back with the meetings of the CIRP, so that they are able to provide their inputs and recommendations in a timely manner, to the CIRP.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Reporting&lt;/strong&gt;: The CIRP will report directly to the UN General Assembly annually, on its meetings and present recommendations in the areas of policy and implementation for consideration, adoption and dissemination to all relevant inter-governmental bodies and international organizations. .&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Research Wing&lt;/strong&gt;: The Internet is a rapidly-evolving and dynamic medium that throws up urgent and rapidly-evolving challenges that need timely solutions. In order to deal effectively and prudently with these emerging issues in a timely manner, it would be vital to have a well-resourced Research Wing attached to the CIRP to provide ready and comprehensive background material, analysis and inputs to the CIRP, as required.&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Links with the IGF&lt;/strong&gt;: Recognizing the value of the Internet Governance Forum as an open, unique forum for multi-stakeholder policy dialogue on Internet issues, the deliberations in the IGF along with any inputs, background information and analysis it may provide, will be taken as inputs for consideration of the CIRP. An improved and strengthened IGF that can serve as a purposeful body for policy consultations and provide meaningful policy inputs to the CIRP, will ensure a stronger and more effective complementarity between the CIRP and the IGF.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Budget&lt;/strong&gt;: Like other UN bodies, the CIRP should be supported by the regular budget of the United Nations. In addition, keeping in view its unique multi-stakeholder format for inclusive participation, and the need for a well-resourced Research Wing and regular meetings, a separate Fund should also be set up drawing from the domain registration fees collected by various bodies involved in the technical functioning of the Internet, especially in terms of names and addresses.&lt;br /&gt;&lt;br /&gt;***&lt;/p&gt;
&lt;h3&gt;Excerpts from the Tunis Agenda&lt;/h3&gt;
&lt;p&gt;&lt;br /&gt;Paragraph 34 of the Tunis Agenda defines Internet Governance as “the development and application by governments, the private sector and civil society, in their respective roles, of shared principles, norms, rules, decision-making procedures, and programmes that shape the evolution and use of the Internet”.&lt;br /&gt;&lt;br /&gt;Paragraph 35 reaffirms the respective roles of stakeholders as follows: “(a) Policy authority for Internet-related public policy issues is the sovereign right of States. They have rights and responsibilities for international Internet-related public policy issues”. (b) The private sector has had, and should continue to have, an important role in the development of the Internet, both in the technical an economic fields. (c) Civil society has also played an important role on Internet matters, especially at community level, and should continue to play such a role. (d) Intergovernmental organizations have had, and should continue to have, a facilitating role in the coordination of Internet-related public policy issues. (e) International organizations have also had and should continue to have an important role in the development of Internet-related technical standards and relevant policies.”&lt;br /&gt;&lt;br /&gt;While delineating the respective roles of stakeholders, Paragraph 56 recognizes the need for an inclusive, multi-stakeholder approach by affirming that “The Internet remains a highly dynamic medium and therefore any framework and mechanisms designed to deal with Internet governance should be inclusive and responsive to the exponential growth and fast evolution of the Internet as a common platform for the development of multiple applications”.&lt;br /&gt;&lt;br /&gt;Paragraph 58 recognizes “that Internet governance includes more than Internet naming and addressing. It also includes other significant public policy issues such as, &lt;em&gt;inter alia&lt;/em&gt;, critical Internet resources, the security and safety of the Internet, and developmental aspects and issues pertaining to the use of the Internet”.&lt;br /&gt;&lt;br /&gt;Paragraph 59 further recognizes that “Internet governance includes social, economic and technical issues including affordability, reliability and quality of service”. Paragraph 60 further recognizes that “there are many cross-cutting international public policy issues that require attention and are not adequately addressed by the current mechanisms”.&lt;br /&gt;&lt;br /&gt;Paragraph 61 of the Tunis Agenda therefore concludes that “We are convinced that there is a need to initiate, and reinforce, as appropriate, a transparent, democratic, and multilateral process, with the participation of governments, private sector, civil society and international organisations, in their respective roles. This process could envisage creation of a suitable framework or mechanisms, where justified, thus spurring the ongoing and active evolution of the current arrangements in order to synergize the efforts in this regard”.&lt;br /&gt;&lt;br /&gt;Paragraph 69 further recognizes “the need for enhanced cooperation in the future, to enable governments, on an equal footing, to carry out their roles and responsibilities, in international public policy issues pertaining to the Internet, but not in the day-to-day technical and operational matters, that do not impact on international public policy issues”.&lt;br /&gt;&lt;br /&gt;***&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/india-statement-un-cirp'&gt;https://cis-india.org/internet-governance/blog/india-statement-un-cirp&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance Forum</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-10-31T15:28:04Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/analysis-dit-response-2nd-rti-blocking">
    <title>Analysis of DIT's Response to Second RTI on Website Blocking</title>
    <link>https://cis-india.org/internet-governance/blog/analysis-dit-response-2nd-rti-blocking</link>
    <description>
        &lt;b&gt;In this blog post, Pranesh Prakash briefly analyses the DIT's response to an RTI request on website blocking alongside the most recent edition of Google's Transparency Report, and what it tells us about the online censorship regime in India.&lt;/b&gt;
        
&lt;h2 id="what-the-dits-response-tells-us-and-what-it-doesnt"&gt;&lt;br /&gt;&lt;/h2&gt;
&lt;h2 id="what-the-dits-response-tells-us-and-what-it-doesnt"&gt;What the DIT's Response Tells Us, and What It Doesn't&lt;/h2&gt;
&lt;p&gt;We at the Centre for Internet and Society had sent in a right to information request to the Department of Information Technology (DIT) asking for more information about website blocking in India. The &lt;a href="https://cis-india.org/internet-governance/dit-response-2nd-rti-blocking" class="internal-link" title="Text of DIT's Response to Second RTI on Website Blocking"&gt;response we got from the DIT&lt;/a&gt; was illuminating in many ways. The following are the noteworthy points, in brief:&lt;/p&gt;
&lt;ul&gt;
    &lt;li&gt;Six government officials, and one politician have so far made requests for 'disabling access' to certain online content under s.69A of the Information Technology (IT) Act.&lt;/li&gt;

    &lt;li&gt;68 individual items have been requested to be blocked, those being 64 websites (domain-level blocking), 1 sub-domain, and 3 specific web pages. Seemingly, none of these requests have been accepted.&lt;/li&gt;

    &lt;li&gt;The data provided by the government seemingly conflicts with the data released by the likes of Google (via its Transparency Report).&lt;/li&gt;

    &lt;li&gt;India's law enforcement agencies are circumventing the IT Act, the Indian Penal Code (IPC), and ultimately the Constitution, by not following proper procedure for removal of online content.&lt;/li&gt;

    &lt;li&gt;Either the DIT is not providing us all the relevant information on blocking, or is not following the law.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 id="conflicting-data-on-censorship-requests"&gt;Conflicting Data on Censorship Requests&lt;/h2&gt;
&lt;p&gt;The latest &lt;a href="http://www.google.com/transparencyreport/governmentrequests/IN/"&gt;Google Transparency Report&lt;/a&gt;, released on October 25, 2011, shows that there were 68 written requests (imaginably taking the form of forceful requests/orders) from Indian law enforcement agencies for removal of 358 items from Google's various. If you take the figures since January 2010, it adds up to over 765.&lt;/p&gt;
&lt;p&gt;However, the official government statistics show only eight separate requests having been made to the&amp;nbsp; DIT (which, under the IT Act, is the only authority that can order the blocking of online content), adding up to a total of 64 websites (domain-level), 1 sub-domain, and 3 specific web pages. Of these only 3 are for Google's services (2 for Blogger, and 1 for YouTube).&lt;/p&gt;
&lt;p&gt;If classified according to presumable reason for seeking of the block, that would be 61 domains hosting adult content; 1 domain (tamil.net.in), 1 sub-domain (ulaginazhagiyamuthalpenn.blogspot.com), and 2 specific pages (video of a speech by Bal Thackeray on YouTube and Wikipedia page for Sukhbir Singh Badal) for political content; 1 for religious content (a blog post titled "Insults against Islam" in Malay); and 1 domain hosting online gambling (betfair.com). It is unclear for why one of the requests was made (topix.net).&lt;sup&gt;&lt;a id="fnref1" class="footnoteRef" name="fnref1" href="#fn1"&gt;1&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;h2 id="content-removal-vs.-content-blocking"&gt;Content Removal vs. Content Blocking&lt;/h2&gt;
&lt;p&gt;Section 69A of the IT Act provides the Central Government the power to "direct any agency of the Government or intermediary to block for access by the public or cause to be blocked for access by the public any information generated, transmitted, received, stored or hosted in any computer resource". The only person through whom this power can be exercised is the 'Designated Officer' (currently Dr. Gulshan Rai of the DIT), who in turn has to follow the procedure laid down in the rules drafted under s.69A ("Information Technology (Procedure and Safeguard for Blocking for Access of Information by Public) Rules, 2009", the 'Blocking Rules').&lt;/p&gt;
&lt;p&gt;Because of this, we see everyone from the Secretary of the Public Law and Order Department of Tamil Nadu to the Joint Commissioner of Police of Mumbai and the State President of the Bharatiya Janata Minority Morcha approaching the Designated Officer for blocking of websites.&lt;/p&gt;
&lt;p&gt;However, as the data from Google shows, there are many times more requests being sent to remove content. The only explanation for this is that an order to 'block for access... or cause to be blocked for access by the public' is taken to be different from an order for removal of content. Nothing in the IT Act, nor in the Blocking Rules actually address this issue.&lt;sup&gt;&lt;a id="fnref2" class="footnoteRef" name="fnref2" href="#fn2"&gt;2&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;Thus, there is a possibility that the forcible removal of content is treated separately from blocking of content. That would mean that while blocking is regulated by the IT Act, forcible removal of content is not. Thus, it would seem that forcible removal of online content is happening without clear regulation or limits.&lt;sup&gt;&lt;a id="fnref3" class="footnoteRef" name="fnref3" href="#fn3"&gt;3&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;h2 id="role-of-the-indian-penal-code-and-code-of-criminal-procedure"&gt;Role of the Indian Penal Code and Code of Criminal Procedure&lt;/h2&gt;
&lt;p&gt;There are existing provisions in the Indian Penal Code that provide the government the power to censor book, pamphlets, and other material on varied grounds, including obscenity, causing of enmity between communities, etc. The police is provided powers to enforce such governmental orders. Section 95 of the Code of Criminal Procedure allows the State Government to declare (through an official notification) certain publications which seem to violate the Indian Penal Code as 'forfeited to the Government' and to issue search warrants for the same. After this the police can enforce that notification.&lt;/p&gt;
&lt;p&gt;It is clear that this is not the case for any of the content removal requests that were sent to Google.&lt;/p&gt;
&lt;h2 id="police-are-defeating-the-constitution-and-the-it-act"&gt;Police Are Defeating the Constitution and the IT Act&lt;/h2&gt;
&lt;p&gt;Therefore, it would seem that law enforcement agencies are operating outside the bounds set up under the Indian Penal Code, the Code of Criminal Procedure, as also the Information Technology Act, when they send requests for removal of content to companies like Google. While a company might comply with it because it appears to them to violate their own terms of service (which generally include a wide clause about content being in accordance with all local laws), community guidelines, etc., it would appear that it is not required under the law to do so if the order itself is not legal.&lt;/p&gt;
&lt;p&gt;However, anecdotal evidence has it that most companies comply with such 'requests' even when they are not under any legal obligation to do so.&lt;/p&gt;
&lt;p&gt;This way the intention of Parliament in enacting s.69A of the IT Act—to regulate government censorship of the Internet and bring it within the bounds laid down in the Constitution—is defeated.&lt;/p&gt;
&lt;h2 id="dit-either-evasive-or-not-following-rules"&gt;DIT Either Evasive or Not Following Rules&lt;/h2&gt;
&lt;p&gt;The DIT did not provide answers on:&lt;/p&gt;
&lt;ul&gt;
    &lt;li&gt;Whether any block ordered by the DIT has ever been revoked&lt;/li&gt;

    &lt;li&gt;On what basis DIT decides which intermediary (web host, ISP, etc.) to send the order of blocking to&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;It also provided the minutes for only one meeting&lt;sup&gt;&lt;a id="fnref4" class="footnoteRef" name="fnref4" href="#fn4"&gt;4&lt;/a&gt;&lt;/sup&gt; of the committee that decides whether to carry out a block, when we had requested for minutes of all the meetings it has ever held. That committee (the Committee for Examination of Requests, constituted under Rule 8(4) of the Blocking Rules) has to consider every single item in every single request forwarded to the Designated Officer, and 68 items were sent to the Designated Officer in 6 requests. Quite clearly something doesn't add up. Either the Committee is not following the Blocking Rules or the DIT is not providing a full reply under the RTI Act.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;div class="footnotes"&gt;
&lt;hr /&gt;
&lt;ol&gt;
      &lt;li id="fn1"&gt;
&lt;p&gt;A request was made to block http://www.topix.net, by the 'Commmissioner, Maharashtra State, Colaba, Mumbai—400001', presumably the Commissioner of State Intelligence Department of Maharashtra, whose office is located in Colaba. &lt;a title="Jump back to footnote 1" class="footnoteBackLink" href="#fnref1"&gt;↩&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;

      &lt;li id="fn2"&gt;
&lt;p&gt;However, the Blocking Rules require the person or the hosting intermediary being contacted for a response. This provides the person/intermediary the opportunity to remove the content voluntarily or to oppose the request for blocking.&lt;/p&gt;
&lt;p&gt;"Rule 8. Examination of request: (1) On receipt of request under rule 6, the Designated Officer shall make all reasonable efforts to identify the person or intermediary who has hosted the information or part thereof as well as the computer resource on which such information or part thereof is being hosted and where he is able to identify such person or intermediary and the computer resource hosting the information or part thereof which have been requested to be blocked for public access, he shall issue a notice by way of letters or fax or e-mail signed with electronic signatures to such person or intermediary in control of such computer resource to appear and submit their reply and clarifications if any, before the committee referred to in rule 7, at a specified date and time, which shall not be less than forty-eight hours from the time of receipt of such notice by such person or intermediary." &lt;a title="Jump back to footnote 2" class="footnoteBackLink" href="#fnref2"&gt;↩&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;

      &lt;li id="fn3"&gt;
&lt;p&gt;While it is possible to imagine that the Indian Penal Code and the Code of Criminal Procedure lay down limits, it is clear from the Google Transparency Report that the requests from removal are not coming based only on court orders, but from the executive and the police. The police have no powers under the IPC or the CrPC to request removal of content without either a public notification issued by the State Government or a court order. &lt;a title="Jump back to footnote 3" class="footnoteBackLink" href="#fnref3"&gt;↩&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;

      &lt;li id="fn4"&gt;
&lt;p&gt;The minutes of the meeting held on August 24, 2010, on the request for blocking of www.betfair.com were sent as 'Annexure III' of the DIT response.&amp;nbsp; This request was not granted.&amp;nbsp; &lt;a title="Jump back to footnote 4" class="footnoteBackLink" href="#fnref4"&gt;↩&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/analysis-dit-response-2nd-rti-blocking'&gt;https://cis-india.org/internet-governance/blog/analysis-dit-response-2nd-rti-blocking&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2011-12-02T09:26:11Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/dit-response-2nd-rti-blocking">
    <title>Text of DIT's Response to Second RTI on Website Blocking</title>
    <link>https://cis-india.org/internet-governance/dit-response-2nd-rti-blocking</link>
    <description>
        &lt;b&gt;CIS had filed a request under the Right to Information Act with the government, asking a number of questions relating to blocking of content under the IT Act.  We have reproduced below the response we got from the government.&lt;/b&gt;
        
&lt;p&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Government of India&lt;br /&gt;&lt;/strong&gt;&lt;strong&gt;&lt;span class="Apple-style-span"&gt;&lt;strong&gt;Ministry of Communications &amp;amp; Information Technology&lt;br /&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/strong&gt;&lt;strong&gt;Department of Information Technology&lt;br /&gt;&lt;/strong&gt;&lt;strong&gt;Electronics Niketan, 6 CGO Complex,&lt;br /&gt;&lt;/strong&gt;&lt;strong&gt;New Delhi-110003&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;No: 14(12)/2011-ESD&lt;br /&gt;10.6.2011&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Shri Pranesh Prakash,&lt;br /&gt;&lt;/strong&gt;&lt;strong&gt;Centre for Internet and Society,&lt;br /&gt;&lt;/strong&gt;&lt;strong&gt;194, 2C Cross, Domlur Stage II,&lt;br /&gt;&lt;/strong&gt;&lt;strong&gt;Bangalore - 560071&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Subject: Request for information under RTI Act, 2005.&lt;/p&gt;
&lt;p&gt;Sir,&lt;br /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; Reference your request dated 13 May 2011, which was received in this office on 18.5.2011 on the above subject.&lt;br /&gt;&amp;nbsp;&lt;br /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;The information as received from the custodian of information is attached herewith (Annexure-I, II and III).&lt;br /&gt;&amp;nbsp;&lt;br /&gt;&amp;nbsp; &amp;nbsp;Yours faithfully,&lt;br /&gt;&amp;nbsp;&amp;nbsp; (A.K.Kaushik)&lt;br /&gt;&amp;nbsp; &amp;nbsp;Additional Director &amp;amp; CPIO&lt;br /&gt;&amp;nbsp; &amp;nbsp;Cyber Laws &amp;amp; E-Security Division&lt;br /&gt;&amp;nbsp; &amp;nbsp;Tel: 011-24364803&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;&amp;nbsp;Annexure I&lt;/h2&gt;
&lt;h3&gt;&amp;nbsp;&lt;strong&gt;Reply to Shri Pranesh Prakash&lt;/strong&gt;&lt;/h3&gt;
&lt;div style="text-align: left;"&gt;
&lt;ol&gt;&lt;li&gt;How many orders have been issued for blocking of computer resources prior to the coming into force of the Information Technology (Amendment) Act, 2008 (i.e., before October 27, 2009) under the Information Technology Act, 2000, or any other law for the time being in force.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Reply&lt;/strong&gt; - Five orders were issued for blocking access to web content.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Please provide a list of all the websites for which the DIT has issued blocking orders and the dates on which each website was blocked.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Reply&lt;/strong&gt; - The following websites have been blocked pursuant to court orders&lt;br /&gt;&lt;br /&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Sl&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Website&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Date of issuing&amp;nbsp;direction by designated&amp;nbsp;officer&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1.&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://www.zone.h.org/"&gt;www.zone-h.org&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;08.03.2010&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2.&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://donotdiall00.webs.com"&gt;http://donotdiall00.webs.com&amp;nbsp;&lt;/a&gt;&amp;nbsp;(IP 216.52.115.50)&lt;/td&gt;
&lt;td&gt;&amp;nbsp;08.08.2010&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3.&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://www.bloggernews.net/124029"&gt;www.bloggernews.net/124029&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;15.11.2010&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4.&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://www.google.co.in/#hl=en&amp;amp;source=hp&amp;amp;biw=-1276&amp;amp;bih=843&amp;amp;=dr+babasaheb+ambedkar+wallpaper&amp;amp;aq=4&amp;amp;aqi=gl0&amp;amp;aql=&amp;amp;oq=dr+babas&amp;amp; gs_ rfai=&amp;amp;fp=e791fe993fa412ba"&gt;http://www.google.co.in/#hl=en&amp;amp;source=hp&amp;amp;biw=-1276&amp;amp;bih=843&amp;amp;=dr+babasaheb+ambedkar+wallpaper&amp;amp;aq=4&amp;amp;aqi=gl0&amp;amp;aql=&amp;amp;oq=dr+babas&amp;amp; gs_ rfai=&amp;amp;fp=e791fe993fa412ba&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;20.12.2010&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5.&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://www.cinemahd.net/desktopenhancements/wallpaper/23945-wallpapers-beautiful-girl-wallpaper.html"&gt;http://www.cinemahd.net/desktopenhancements/wallpaper/23945-wallpapers-beautiful-girl-wallpaper.html&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;20.12.2010&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;6.&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://www.chakpak.com/find/images/kamasutra-hindi-movie"&gt;http://www.chakpak.com/find/images/kamasutra-hindi-movie&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;20.12.2010&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;7.&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://www.submitlink.khatana.net/2010/09/jennifer-stano-is-engaged-to.html"&gt;http://www.submitlink.khatana.net/2010/09/jennifer-stano-is-engaged-to.html&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;20.12.2010&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;8.&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://www.result.khatana.net/2010/11/im-no-panty-girl-yana-gupta-wardrobe.html"&gt;http://www.result.khatana.net/2010/11/im-no-panty-girl-yana-gupta-wardrobe.html&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;20.12.2010&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;9.&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://www.facebook.com/pages/I-Hate-Ambedkar/172025102828076"&gt;http://www.facebook.com/pages/I-Hate-Ambedkar/172025102828076&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;25.02.2011&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10.&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://www.indvbav.org/"&gt;&amp;nbsp;&lt;/a&gt;&lt;a class="external-link" href="http://www.indybay.org/"&gt;www.indybay.org&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;17.03.2011&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11.&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;a class="external-link" href="http://www.arizona.indymedia.org/"&gt;www.arizona.indymedia.org&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;17.03.2011&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/li&gt;&lt;li&gt;Please provide a list of all the persons to whom such orders were issued.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Reply&lt;/strong&gt; - The directions were issued to Department of Telecommunications.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Please provide a list of all the requests for blocking of information that have been received by the Designated Officer under the Information Technology (Procedures and Safeguards for Blocking Access of Information by Public) Rules, 2009 ("Rules").&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Please provide a list of all persons/authorities from whom the Designated Officer under the Rules has received requests for blocking of information and the dates these requests were received.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Reply 4 &amp;amp; 5&lt;/strong&gt; - The details are given in Annexure-II.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Please provide the files on all the complaints and requests that have been rejected,&amp;nbsp;including file noting.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Please provide the files on all the complaints and requests that have been&amp;nbsp;accepted, including file noting.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Please provide the files on all the complaints and requests that are still being&amp;nbsp;processed (e.g. more information has been sought on the request), including file notings.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Reply 6,7 &amp;amp; 8&lt;/strong&gt; - Files are available in section and can be viewed.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Please provide us copies of the minutes of all meetings held by the Committee for&amp;nbsp;Examination of Requests under Rule 8(4) of the Rules.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Please provide copies of all the recommendations of the Committee for Examination&amp;nbsp;of requests under Rule 8(4) of the Rules.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Reply 9 &amp;amp; 10&lt;/strong&gt; - &amp;nbsp;Copy of the minutes/recommendation of the meeting of the Committee is&amp;nbsp;at Annexure III.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Please provide us the dates and copies of the minutes of all meetings held by the&amp;nbsp;Review Committee under Rule 14 of the Rules to periodically review the blocked&amp;nbsp;resources.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Please provide us copies of all the findings of the Review Committee.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;If the Review Committee has not met, please provide us the reason for the meetings&amp;nbsp;not happenings as per the requirement of Rule 14 of the Rules.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Reply 11, 12 &amp;amp; 13&lt;/strong&gt; - This meeting is coordinated by Department of Telecommunications&amp;nbsp;and DIT is not in possession of details.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Does "intermediary" in Rule 13 include intermediaries not located in India?&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Reply&lt;/strong&gt; -&amp;nbsp;Such type of information is not permitted under RTI Act as per DOPT OM No. 1/7/2009 - IR dated 1st June 2009.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Has any block ordered by the DIT ever been revoked by the DIT or any other&amp;nbsp;governmental authority?&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Reply&lt;/strong&gt; - Such questions are not permitted under RTI Act as per DOPT OM No. 1 /7/2009&amp;nbsp;IR dated 1st June 2009.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;On what basis does the DIT decide whether the appropriate intermediary is the person&amp;nbsp;who has put up content, the web host, or the different Internet service providers in India?&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Reply&lt;/strong&gt; - Such type of information is not permitted under RTI Act as per DOPT OM No. 1/7/2009 - IR dated 1st June 2009.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Does Rule 16 of the Rules override the Right to Information Act?&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Reply&lt;/strong&gt; - Such type of information is not admissible under RTI Act as per DOPT OM No. 1/7/2009 - IR dated 1st June 2009.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;If the answer to the previous question is yes, please provide any correspondence with any legal officer who provided the DIT advice that it could override the Right to Information Act through delegated legislation.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Reply&lt;/strong&gt; - Such type of information is not admissible under RTI Act as per DOPT OM No. 1/7/2009 - IR dated 1st June 2009.&lt;/li&gt;&lt;/ol&gt;
&lt;/div&gt;
&lt;h2&gt;&lt;br /&gt;&lt;/h2&gt;
&lt;h2&gt;Annexure II&lt;/h2&gt;
&lt;h3&gt;&amp;nbsp;&lt;span class="Apple-style-span"&gt;Request received by Designated Officer&amp;nbsp;&lt;/span&gt;&lt;/h3&gt;
&lt;div style="text-align: left;"&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Website&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Date of receipt of request &lt;/strong&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Request by&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/www.tamil.net.in" class="external-link"&gt;www.tamil.net.in&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;29.03.2010&lt;/td&gt;
&lt;td&gt;Secretary Public (Law &amp;amp; Order) Deptt.&lt;br /&gt;Secretariat, Chennai 600 009&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a class="external-link" href="http://www.betfair.com/"&gt;www.betfair.com&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;28.06.2010&lt;/td&gt;
&lt;td&gt;Sr. Inspector, Cyber Crime Cell, &lt;br /&gt;Mumbai&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a class="external-link" href="https://www.youtube.com/watch?v=tHUNESaC0E4"&gt;http://www.youtube.com/ch?&lt;span class="Apple-style-span"&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="external-link" href="https://www.youtube.com/watch?v=tHUNESaC0E4"&gt;wat&lt;/a&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="https://www.youtube.com/watch?v=tHUNESaC0E4"&gt;v=tHUNESaC0E4&lt;/a&gt;&lt;/span&gt;&lt;/td&gt;
&lt;td&gt;05.07.2010&lt;/td&gt;
&lt;td&gt;Jt. Commissioner of Police (Crime), &lt;br /&gt;Mumbai&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a class="external-link" href="http://ulaginazhagiyamuthalpenn.blogspot.com"&gt;http://ulaginazhagiyamuthalpenn.blogspot.com&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;21.07.2010&lt;/td&gt;
&lt;td&gt;Principal Secretary, &lt;br /&gt;IT Department, &lt;br /&gt;Chennai–600 009&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/en.wikipedia.org/Wiki/Sukhbir Singh Badal" class="external-link"&gt;en.wikipedia.org/Wiki/Sukhbir Singh Badal&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;11.08.2010&lt;/td&gt;
&lt;td&gt;Principal Secretary to Govt. of Punjab, &lt;br /&gt;Dept. of IT, &lt;br /&gt;Chandigarh&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a class="external-link" href="http://www.exbii.com"&gt;http://www.exbii.com&lt;/a&gt;&lt;br /&gt;&lt;a class="external-link" href="http://www.topix.net/"&gt;http://www.topix.net&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;05.10.2010&lt;/td&gt;
&lt;td&gt;Commissioner, &lt;br /&gt;Maharashtra State, &lt;br /&gt;Colaba, Mumbai–400 001&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a class="external-link" href="http://ashsyumul.blogspot.com/2009/12/penginaan-terhadap-islam.html"&gt;http://ashsyumul.blogspot.com/2009/12/penginaan-terhadap-islam.html&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;20.08.2010&lt;/td&gt;
&lt;td&gt;Shri Haneef Ali, &lt;br /&gt;State President, &lt;br /&gt;Bharatiya Janata Minority Morcha, &lt;br /&gt;Andhra Pradesh&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.angelsofindia.com/"&gt;http://www.angelsofindia.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.adult-gals.com/"&gt;http://www.adult-gals.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indianangels.net/"&gt;http://www.indianangels.net/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.arabexposed.com/"&gt;http://www.arabexposed.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indiamafia.com/"&gt;http://indiamafia.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indianasfuckers.com/"&gt;http://www.indianasfuckers.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indianpronvideos.in/"&gt;http://www.indianpronvideos.in/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.peterporntube.com/"&gt;http://www.peterporntube.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.bollywood-sex.net/"&gt;http://www.bollywood-sex.net/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indianworldsex.com/"&gt;http://www.indianworldsex.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://indianhomevideo.com/"&gt;http://indianhomevideo.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://indian-pakistani-girls.com/"&gt;http://indian-pakistani-girls.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://indianvidz.com/"&gt;http://indianvidz.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indianparadise.net/"&gt;http://indianparadise.net/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://bollywoodscandals.net/"&gt;http://bollywoodscandals.net/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://indiansexpics.net/"&gt;http://indiansexpics.net/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indian-hardcore-movies.com/"&gt;http://www.indian-hardcore-movies.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.bollywoodnudesex.net/"&gt;http://www.bollywoodnudesex.net/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.bangmyindianwife.com/"&gt;http://www.bangmyindianwife.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indian-angel-teens.com/"&gt;http://www.indian-angel-teens.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://south-indian-sex.com/"&gt;http://south-indian-sex.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indianseduction.com/"&gt;http://www.indianseduction.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indiansexuniversity.com/"&gt;http://www.indiansexuniversity.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indianpassion.com/"&gt;http://www.indianpassion.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://fuckmyindianass.com/"&gt;http://fuckmyindianass.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indiansexwebcams.com/"&gt;http://indiansexwebcams.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://exoticpics4u.com/"&gt;http://exoticpics4u.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indianfreesexmovies.com/"&gt;http://www.indianfreesexmovies.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.newsindiansexmovies.com/"&gt;http://www.newsindiansexmovies.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.peterporn.net/"&gt;http://www.peterporn.net/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.3xindianmovies.com/"&gt;http://www.3xindianmovies.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.amateur-indian-girls.com/"&gt;http://www.amateur-indian-girls.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.bollywoodhardcore.net/"&gt;http://www.bollywoodhardcore.net&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://indiansexpost.com/"&gt;http://www. indiansexpost.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.desi-amateurs.com/"&gt;http://www.desi-amateurs.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.3xasianmovies.com/"&gt;http://www.3xasianmovies.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://allindiansex.com/"&gt;http://allindiansex.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indiapornmovies.com/"&gt;http://www.indiapornmovies.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.3xindiansex.com/"&gt;http://www.3xindiansex.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indianxclips.com/"&gt;http://www.indianxclips.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://indiansexvideos.org/"&gt;http://indiansexvideos.org&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.pureindianporn.com/"&gt;http://www.pureindianporn.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://indian-porn-sex.com/"&gt;http://indian-porn-sex.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.newsindianpornmovies.com/"&gt;http://www.newsindianpornmovies.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://juicyindiangirls.com/"&gt;http://juicyindiangirls.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www/hardcoreindiansex.net/"&gt;http://www/hardcoreindiansex.net&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://bollywoodboobs.com/"&gt;http://bollywoodboobs.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://indianmovietgp.com/"&gt;http://indianmovietgp.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.365indian.com/"&gt;http://www.365indian.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indian-sex-hoes.com/"&gt;http://www.indian-sex-hoes.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indian-sex-photos.net/"&gt;http://www.indian-sex-photos.net/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indian-free-sex.com/"&gt;http://www.indian-free-sex.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indian-sex-movies.org/"&gt;http://www.indian-sex-movies.org&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://ww.tamil-sex-movies.net/"&gt;http://ww.tamil-sex-movies.net/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indianteens.org/"&gt;http://www.indianteens.org/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://secredir.com/?sov=rook-sexyindianbooty.com"&gt;http://www.sexyindianbooty.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indianposing.com/"&gt;http://www.indianposing.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.pornhub.com/"&gt;http://www.pornhub.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indianpornhub.com/"&gt;http://www.indianpornhub.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;a class="external-link" href="http://www.exvideos.com"&gt;http://www.exvideos.com&amp;nbsp;&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;25.11.2010&lt;/td&gt;
&lt;td&gt;Jt.Commissioner of Police (Crime), Mumbai&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;h2&gt;Annexure III&lt;/h2&gt;
&lt;h3&gt;&lt;span class="Apple-style-span"&gt;Minutes of the meeting held on 24-08-2010 for the request for blocking of website &lt;a class="external-link" href="http://www.betfair.com/"&gt;www.betfair.com&lt;/a&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;div&gt;A meeting of "Committee for examination of request"&amp;nbsp;constituted under the provisions of Information Technology&amp;nbsp;(Procedure and Safeguards for Blocking for Access of Information by Public) Rules, 2009&amp;nbsp;under section 69A of the Information Technology Act, 2000 was held on 24.08.2010 at&amp;nbsp;Electronics Niketan. New Delhi to examine the Request sent by Government of Maharashtra to block the website&amp;nbsp;&lt;a class="external-link" href="http://www.betfair.com"&gt;www.betfair.com&lt;/a&gt;. The meeting was participated by the following members:&lt;/div&gt;
&lt;ol&gt;&lt;li&gt;Dr. Gulshan Rai, Group Coordinator, Department of Information Technology&lt;/li&gt;&lt;li&gt;Shri Dharmendra Sharma, Joint Secretary, Ministry of Home Affairs&lt;/li&gt;&lt;li&gt;Shri Arvind Kumar, Joint Secretary, Ministry of Information &amp;amp; Broadcasting&lt;/li&gt;&lt;li&gt;Shri Ashok C. Prakash, Additional L.A., Department of Legal Affairs&lt;/li&gt;&lt;li&gt;Shri B.J. Srinath, Sr. Director, CERT-In&lt;/li&gt;&lt;/ol&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;p&gt;The Committee discussed the case and observed that Govt. of Maharashtra has requested for blocking of website &lt;a class="external-link" href="http://www.betfair.com"&gt;www.betfair.com&lt;/a&gt; on the grounds of "public order". The Committee also noted the reply from Cyber Crime Cell, Mumbai that no case has been registered against &lt;a class="external-link" href="http://www.betfair.com"&gt;www.betfair.com&lt;/a&gt;. Further, no details suggesting the "impact" of the said site on public order has been made available by the State Government.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Keeping in view the directions of the Hon'ble High Court to dispose the application strictly as per law, the Committee assessed that based on the data/facts/details provided by Government of Maharashtra and Cyber Crime Cell, Mumbai, violation of section 69A of the Information Technology Act, 2000 is not being established.&amp;nbsp;&lt;/p&gt;
&lt;p class="callout"&gt;&lt;strong&gt;Download a scanned version of the letter received from the DIT office &lt;a href="https://cis-india.org/internet-governance/request-for-website-blocking.pdf" class="internal-link" title="Request for Blocking of Websites"&gt;here&lt;/a&gt; &lt;/strong&gt;[PDF, 1.74 MB]&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/dit-response-2nd-rti-blocking'&gt;https://cis-india.org/internet-governance/dit-response-2nd-rti-blocking&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>RTI</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2011-10-28T14:37:34Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/vanishing-fingerprints-put-uid-in-question">
    <title>India’s vanishing fingerprints put UID in question</title>
    <link>https://cis-india.org/news/vanishing-fingerprints-put-uid-in-question</link>
    <description>
        &lt;b&gt;A curious situation has come to light at the UID (unique identity) enrolment centres. Call it the phenomenon of vanishing fingerprints. You see, our unique fingerprints don’t necessarily last a lifetime and they can be damaged or destroyed and, in some cases, even non-existent. And that is not the best scenario for the first-of-its-kind project that endeavours to create a unique identity for India’s billion-plus population based on fingerprints and iris scans (or biometric data).&lt;/b&gt;
        
&lt;p&gt;To find out more,&lt;em&gt; Firstpost &lt;/em&gt;visited five UID centres in the North West district, which incidentally has the highest enrolments (619,571 and counting) among Delhi’s nine districts since the show hit the road in February 2011, and one centre in North Delhi.&lt;/p&gt;
&lt;p&gt;The officials at the Unique Identification Authority of India (UIDAI) will tell you that there is no overemphasising the importance of the quality of biometric data to the success of the super ambitious UID, now known as Aadhar project. If the quality of a person’s biometric data is poor, it automatically compromises the authentication of that data by him when he wants to access a service based on his UID.&lt;/p&gt;
&lt;p&gt;So what happens when the data – fingerprints, for instance – are inherently unreliable on account of various biological and socio-economic reasons, some of which are especially relevant to the Indian context.&lt;/p&gt;
&lt;p style="text-align: left;"&gt;&lt;img src="https://cis-india.org/home-images/uid2.jpg/image_preview" alt="uid 2" class="image-inline" title="uid 2" /&gt;&lt;/p&gt;
&lt;p&gt;The UIDAI’s Committee on Biometrics in a December 2009 was rather forthright about its reservations on the fingerprint reliability. Titled Biometrics Design Standards For UID Applications (page 4, para 4), it stated, "….two factors however, raise uncertainty about the accuracy that can be achieved through fingerprints. First, retaining efficacy while scaling the database size from fifty million to a billion has not been adequately analysed. Second, fingerprint quality, the most important variable for determining de-duplication accuracy, has not been studied in depth in the Indian context." (Emphasis added).&lt;/p&gt;
&lt;p&gt;The findings on the ground were revelatory. Operators and technical experts at the UID enrolment centres confirmed to Firstpost that they routinely came across cases where fingerprints had been damaged/destroyed/underdeveloped. And such cases, they said, were more common among senior citizens, those involved in manual labour (who handle rough objects, for instance) and children (mostly below 10 years of age).&lt;/p&gt;
&lt;p&gt;Here is an example that &lt;em&gt;Firstpost &lt;/em&gt;observed.&lt;/p&gt;
&lt;p&gt;Batuli, 72, arrived at around noon at the Basti Vikas Kendra, now also a UID centre, in Mangol Puri to get herself a ‘smart card’ everyone has been talking about. (The 'Aadhar' brand name hasn’t caught on in these parts of Delhi, with everyone insisting on calling it the 'smart card'.)&lt;/p&gt;
&lt;p&gt;The helpful operator with the fancy gadgets helps Batuli to her seat. After her photo is taken, Batuli is asked to place four fingers — one hand at a time — on a green-lit device. Right hand, then left hand.&lt;/p&gt;
&lt;p&gt;She is, however, asked to repeat the exercise a second time for the left hand. The operator explains. "In some case, we have to scan the fingerprints and Iris multiple times. If it doesn’t pass the required quality percentage of 70 per cent (the quality is indicated in percentage terms on the computer screen that is connected to the fingerprint machine, see pic), we repeat the exercise up to four times."&lt;/p&gt;
&lt;p&gt;Batuli’s hands are then wiped using a cloth and placed back on the device. The exercise is repeated a fourth and final time. But still the same result. 'Fail', declares the reading on the operator’s computer.&lt;/p&gt;
&lt;p&gt;An operator at the next station, says, "In the case of senior citizens, Iris scans also sometime fail. It registers weakly when the retina is damaged."&lt;/p&gt;
&lt;p&gt;(Enrolment centres are run by private companies on contracts given by registrars chosen by the UIDAI. Strategic Outsourcing is one such company and it runs many of centres in the North West and South West districts of Delhi.)&lt;/p&gt;
&lt;p&gt;The project coordinator of the UID enrolment centre working out of the Destitute Welfare Trust, an NGO in Sultanpuri, too, confirmed that he was aware of the problem of damaged fingerprints and the challenge it posed in getting good quality fingerprint data.&lt;/p&gt;
&lt;p&gt;"The hands of children are very soft and in some cases fingerprints are not yet fully developed. Also, children tend to have sweaty hands and this can interfere with the quality of fingerprints. Extremely dry hands also pose problems. We have to often, wipe the hands or provide lotion to improve the quality of fingerprints," said a technical expert working with Strategic Outsourcing.&lt;/p&gt;
&lt;p&gt;While the number of attempts, as prescribed by the UIDAI, to get a stronger finger print when the result reads 'fail' is four, operators report that sometimes attempts go up to 10 to 15. (The machine picks up the strongest impression of the attempts made). They say they didn’t anticipate such a problem and it was only when they started enrolments in January that they were confronted with such a scenario. “Now, of course, everybody knows about it."&lt;/p&gt;
&lt;p&gt;'Everybody' implies those who are directly involved in collecting biometric data. An operator from another private company Smartchip working in a JJ (slum) colony in the North Delhi district of Model town, revealed similar problems on being probed. &amp;nbsp;"A fingerprint strength of 70 percent or more is pass. About 10 per cent of the cases we get every day register the 'fail' reading. What can we do? In the case of stone cutters, for instance, the fingers are completely smooth, the fingerprints are completely wiped out."&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;span class="Apple-style-span"&gt;&lt;img src="https://cis-india.org/home-images/copy6_of_copy5_of_copy4_of_copy3_of_copy2_of_copy_of_uid3.jpg/image_preview" alt="uid 3" class="image-inline image-inline" title="uid 3" /&gt;&amp;nbsp;&lt;/span&gt;&lt;/td&gt;
&lt;td&gt;&lt;span class="Apple-style-span"&gt;So what are the implications of poor quality fingerprints for the UID project? The UIDAI admitted that it could provide challenges to authentication.&lt;br /&gt;&lt;br /&gt;In an email response to Firstpost, Sujata Chaturvedi, UIDAI’s Deputy Director General for the Delhi region said, "It could provide some challenges in de-duplication although that has been mitigated to a large extent by the decision of the UIDAI to go in for iris an additional de-duplication factor… Also to be noted is the fact that normally not all fingers are equally de-graded. So UIDAI is evolving a protocol to inform the residents about their good quality fingerprints as part of the Aadhaar letter so that they are aware of the finger to use for authentication."&amp;nbsp;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span class="Apple-style-span"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;But not everyone is convinced. Sunil Abraham is the executive director of Centre for Internet and Society (CIS), which has written seven open letters to the Standing Committee on the Finance Branch (before which is the National Identification Authority of India Bill, 2010) asking the committee to consider their research on the UID project and change aspects of the Bill and the project.&lt;/p&gt;
&lt;p&gt;The seventh letter sent last week, says Abraham, provides statistical analysis that demonstrates how the UID will never be able to create a unique database.&lt;/p&gt;
&lt;div class="pullquote"&gt;"In CIS’s seventh open letter to the finance committee, statistical analysis reveals that UIDAI tender specification is 1,000 times less accurate than it should be to have a reasonable chance of building a truly unique database. This analysis depends on high quality biometrics. With poor biometric quality the problem of de-duplication is compounded."&lt;/div&gt;
&lt;p&gt;When UIDAI was asked what the percentage of the population enrolled (all India and Delhi) had recorded below-standard fingerprint quality, no specific data was forthcoming.&lt;/p&gt;
&lt;p&gt;Chaturvedi wrote, "Currently the population with very poor quality fingerprints is a very small percentage. It must also be remembered that this population is scattered all over the country."&lt;/p&gt;
&lt;p&gt;In India, even a small percentage translates to millions of people. "Small percentage could mean absolutely anything. Why can’t they be more specific? One percent in the Indian context is 12 million people," said Abraham.&lt;/p&gt;
&lt;p&gt;On how the UIDAI was dealing with challenge of poor fingerprint quality, Chaturvedi said, "Even amongst the populace that has damaged/destroyed/underdeveloped fingerprints, chances are very high that they would have at least one good fingerprint that could be used for authentication. Second, UIDAI is also starting to actively develop iris authentication ecosystem. Fingerprint authentication and iris authentication could supplement each other to ensure a universal coverage."&lt;/p&gt;
&lt;p&gt;She added that Aadhaar authentication will supplement and work in conjunction with existing authentication systems to strengthen the overall authentication rather than replace completely the existing authentication systems.&lt;/p&gt;
&lt;p&gt;That begs the question, as Abraham puts it, "If the UIDAI is not going to replace existing forms of authentication it is not clear why the government is spending all this money on unproven biometric technology."&lt;/p&gt;
&lt;p&gt;Chaturvedi, however, maintained that the initial PoC (proof of concept) study that was taken up in Andhra Pradesh, Karnataka and Jharkhand collected about 60,000 enrolments indicated that the biometric accuracy levels necessary for de-duplication of all residents of India are achievable.&lt;/p&gt;
&lt;p&gt;"The PoC results also indicated the time needed for capture of biometrics in typical rural conditions is small enough to support large scale enrolment. Over and above the initial PoC, the UIDAI has currently completed over 5 crore enrolments for which Aadhaars have been generated. This experience reinforces the initial PoC results that the de-duplication accuracy is sufficient and sustainable to enrol the rest of the population."&lt;/p&gt;
&lt;p&gt;The original article is written by Pallavi Polanki. It was published in Firstpost on October 24, 2011 and can be read &lt;a class="external-link" href="http://www.firstpost.com/politics/aadhar-indias-vanishing-fingerprints-put-unique-identity-in-question-115144.html/2"&gt;here&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/vanishing-fingerprints-put-uid-in-question'&gt;https://cis-india.org/news/vanishing-fingerprints-put-uid-in-question&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-10-26T10:05:13Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/privacy-sexual-minorities">
    <title>Privacy &amp; Sexual Minorities</title>
    <link>https://cis-india.org/internet-governance/privacy-sexual-minorities</link>
    <description>
        &lt;b&gt;Danish Sheikh examines the status of sexual minorities in the light of privacy framework in India. Culling out some real life examples based on various studies, media reports and judgments from the Supreme Court and the High Courts of Delhi and Allahabad, the research brings to light the privacy violations being committed by both individuals as well as state authorities. The research concludes by saying that privacy doesn’t necessarily encompass a one-size-fits-all approach, and can raise as many questions as it answers.&lt;/b&gt;
        &lt;h2 style="text-align: justify; "&gt;Defining Privacy&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;In examining the status of sexual minorities vis-à-vis the privacy framework in India, this research takes into account a definition of privacy that encompasses protection against physical interference with a person and their property as well as the state of being free from intrusion in one’s private life or affairs.&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt; This involves an understanding of privacy violations being committed by both an individual as well as the State. On the one hand is the extent to which a private individual is entitled to personal information about another individual and on the other is the extent to which government authorities can intrude into the private life of a citizen to keep watch over his or her movements or exercise control over personal choices.&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;No mention of sexuality and privacy in India can stand without a nod to Section 377 of the Indian Penal Code (IPC). In 1860, with the institution of the IPC by Lord Macaulay, section 377 criminalized homosexuality by putting forth that, "carnal intercourse against the order of nature"&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt; was to be punishable by law. While this archaic law stands even today, it was read down significantly in a landmark Delhi High Court judgment in 2009&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; which will be referred to later. As stated in an open letter by Vikram Seth and a host of others and endorsed by Amartya Sen, the law has been used to "systematically arrest, prosecute, terrorize and blackmail sexual minorities. It has spawned public intolerance and abuse, forcing tens of millions of gay and bisexual men and women to live in fear and secrecy at tragic cost to themselves and their families."&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; When understood in its conception as non-interference by the State, as the right to be left alone,&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt; privacy isn’t necessarily an empowering right for lesbian, gay, bisexual and transgender (LGBT) persons. For one, the claim to privacy when it comes to same-sex acts tends to get construed as a claim for secrecy: it is to carry out purportedly "clandestine" acts that the sexual minority community wants refuge from the State. The same strategy can further backfire when claims for heightened scrutiny might in fact be requested, such as in discrimination actions.&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt; A zonal understanding of privacy also subverts the fact that many instances of expression of identity happen in the public sphere.&lt;a href="#fn8" name="fr8"&gt;[8]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For a while, privacy jurisprudence hinged on this idea of privacy as a negative right by disallowing infringement of a person’s right to a private life by the State. This understanding may be located in an international regime which has for a while insisted on dividing civil and political rights at one side, and social and economic rights on the other. With this split, what was institutionalized was the idea that civil and political rights were as such "negative" rights, while social and economic rights were "positive" in their content. In effect, the presumption that stood was that while states needed to expand resources to uphold social and economic rights, no such correlative obligation required observance in respect of civil and political rights.&lt;a href="#fn9" name="fr9"&gt;[9]&lt;/a&gt; Recent human rights conventions such as the Convention on the Rights of Persons with Disabilities acknowledge the flaw in this understanding, based on the reasoning that both civil and political rights and social and economic rights give rise to positive and negative duties.&lt;a href="#fn10" name="fr10"&gt;[10]&lt;/a&gt; The Naz Foundation&lt;a href="#fn11" name="fr11"&gt;[11]&lt;/a&gt; judgment propels the understanding of privacy as a positive right. It’s easy enough to split the analysis in this study neatly with the judgment which, in the course of declaring unconstitutional the aforementioned IPC provision, discussed at length the right to privacy, exploring it as a function of dignity. To divide what the Delhi High Court said about the right into three parts — first, they discussed privacy as dealing with persons and not places,&lt;a href="#fn12" name="fr12"&gt;[12]&lt;/a&gt; implying that the right to privacy is not only a claim to space from state intervention but that it protects the autonomy of the private will and a person’s freedom of choice and action, second, they tied it in with dignity and connected it with the value and worth of all individuals,&lt;a href="#fn13" name="fr13"&gt;[13]&lt;/a&gt; and third, they talked of the right to privacy as being based on one’s autonomous identity. In the context of privacy, this means that it is "the inner sanctum of the person such as his/her family life, sexual preference and home environment which is shielded from erosion by conflicting rights of the community."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While there will be a bit of a before-Naz/after-Naz tint to the analysis, it is important to appreciate that the nature of privacy discourse when it comes to sexual minorities remains somewhat murky even after the grand affirmation that the judgment provided. A large part of this of course is concerned with society struggling to catch up with the developments in the law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Before moving on to the next chapter, I’ll unpack the term "sexual minority" to delineate the different communities that will feature in the course of this paper, whilst also attempting to renegotiate the idea of privacy contextually. Using Arvind Narrain’s seminal monograph Queer as a template,&lt;a href="#fn14" name="fr14"&gt;[14]&lt;/a&gt; the term gay will be employed to describe a man who is attracted to another man emotionally, sexually or physically; a lesbian woman is attracted to women emotionally, sexually or romantically; while someone who is bisexual maintains that attraction towards members of both sexes. A transgender person assumes the gender identity of the opposite sex; within Indian discourse they are called as &lt;i&gt;hijras&lt;/i&gt;, constituted of a transgender person who is biologically male and takes on the gender role of a female. The &lt;i&gt;hijra&lt;/i&gt; community in India maintains a unique form of social organization within its parallel society. We then have the term "eunuch", used in a more derogatory fashion, which medically refers to a castrated male, and is sometimes employed in India to refer to the &lt;i&gt;hijras&lt;/i&gt;. Another South Asian constructed identity is that of the &lt;i&gt;kothi&lt;/i&gt; — a male homosexual who is feminized and takes a passive/receptive role in sex.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The next section of this study will look at a string of privacy concerns of sexual minorities in India as sourced from various studies and media reports. The analysis pauses at the interplay of rights surrounding the transgender community in particular: how do issues of recognition of their particular category impact members of the community?  The subsequent section jumps past the timeline of the Naz Foundation judgment to understand the kind of changes – if at all – that the high court’s words have effected when it comes to this idea of privacy.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Privacy Rights and Wrongs&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The incidents highlighted in this chapter took place before the Delhi High Court altered the way we conceived of queer rights in general and privacy in particular. Two issues permeate this analysis: one, the notion of criminality hovering above queer identity, and two, the somewhat one-dimensional idea of privacy that existed then. A third, more complex issue in the context of the &lt;i&gt;hijra&lt;/i&gt; community becomes the idea that one conception of privacy may not always be the most empowering for a community, and the subsequent negotiations that have to be made in that sphere.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;Entrapment: The Lucknow Incidents&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In July of 2001, a set of raids: first on a public park frequented by the men who have sex with men (MSM)&lt;a href="#fn15" name="fr15"&gt;[15]&lt;/a&gt; community, and next on the offices of two NGOs working on safe sex issues led to the arrests of ten people. The operation was conducted on the basis of an FIR filed with a Lucknow police station wherein it was alleged that a certain Suresh had sodomized the complainant. Notable in the incident was the climate of homophobia stoked by the media which indulged in sensationalizing headlines,&lt;a href="#fn16" name="fr16"&gt;[16]&lt;/a&gt; with the magistrate concerned further refusing bail to the men. In denial of bail, instead of siding with the relevant law, the magistrate clearly proceeded on the basis of his perceptions regarding homosexuality: "they…are polluting the entire society by encouraging the young persons and abetting them for committing the offence of sodomy."&lt;a href="#fn17" name="fr17"&gt;[17]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If we were to extend the Supreme Court’s reasoning in the catena of surveillance cases vis-a-vis privacy starting from &lt;i&gt;Kharak Singh v. State of U.P.&lt;/i&gt;, &lt;a href="#fn18" name="fr18"&gt;[18]&lt;/a&gt; it is clear that the NGO members’ right to privacy was violated by the way of unwarranted search and seizure operations carried out by the police. As the court said in &lt;i&gt;Govind v. State of M.P.,&lt;/i&gt;&lt;a href="#fn19" name="fr19"&gt;[19]&lt;/a&gt; domiciliary visits and picketing by the police should be reduced to the clearest cases of danger to community security. While the judges were referring to matters relating to follow-up from a conviction/release from prison, it seems evident that a higher standard should be given to cases where such prior conviction itself hasn’t taken place.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As for the accused, Narrain notes how the response of the State and media ended up harming them, regardless of the final judicial decision. &lt;a href="#fn20" name="fr20"&gt;[20]&lt;/a&gt; The public hearings meant that in Lucknow, their sexual identities became public, with a definite impact on their future prospects and present perceptions. The question, as Narrain poses, is the issue of the suitability of the courts to protect the rights of people who are still in the closet. If approaching the courts means compulsory 'outing' with all its attendant negative outcomes, how does one articulate the rights of such a minority?&lt;a href="#fn21" name="fr21"&gt;[21]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are thus three major facets of privacy violation here: the police’s lawlessness resulting in the primary intrusion; the media’s sensationalization which harshly exposed the accused to the public glare; and finally, the magistrate’s bias which legitimized these privacy violations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Yet another set of arrests took place in the city, this time in 2006, with the police in Lucknow arresting four men under section 377 for allegedly having sex in a public park. News reports revealed pictures of all the four men with their names and home addresses.&lt;a href="#fn22" name="fr22"&gt;[22]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first information report (FIR) here contradicted the investigation of a fact finding team of activists and lawyers: it emerged that none of the men were actually involved having public sex, with the story by the police being a completely fabricated one. It turned out that one of the men had been arrested by the police on their knowledge about his homosexuality, following which his contacts were tapped to stage an entrapment of the other three men.&lt;a href="#fn23" name="fr23"&gt;[23]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This notion of raiding homosexual gatherings was taken to its extreme by a police raid on a gay party in the outskirts of Mumbai in 2008, in the course of which six persons were detained. "…. neither was he able to give a satisfactory explanation for organizing the party," said the API on questioning the event organizer.&lt;a href="#fn24" name="fr24"&gt;[24]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In these instances of interplay between criminal procedure, media ethics and judicial process, it is worth questioning whether general reforms in those areas will positively affect privacy rights of sexual minorities in particular. Unwarranted searches and arrests are barely an uncommon occurrence in the country, neither is the fact of accounts of people’s sexual behaviour finding themselves very publicly outed in the media, and nor, again, are accounts of judges overlooking police excesses rare. It’s a bit difficult to make an exact value judgment over what kinds of privacy violations is more damning, in a society that takes its sexual mores quite seriously, be they with regard to hetero or homosexual sex. More than anything though, that just makes the need for across the board reforms in these areas more urgent, and sharpens the kind of alliances across communities that would be required to effect change. Of course, this kind of advocacy can only happen in an atmosphere where homosexuality continues to be decriminalized – the fate of the Naz Foundation appeal before the Supreme Court is of paramount importance.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;Gender Identity and Transgender Issues&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A survey of the situation regarding the transgender community in India throws up a fascinating picture of instances where seemingly positive sounding regulation doesn't always serve its intended effects – when such "positive sounding" regulation does happen at all. To start with, there is the question of the status of the transgender community in India itself – a PUCL report&lt;a href="#fn25" name="fr25"&gt;[25]&lt;/a&gt; notably documented, and numerous reports and articles&lt;a href="#fn26" name="fr26"&gt;[26]&lt;/a&gt; have affirmed, the reality of the transgender community today as one of harassment, abuse, and sexual violence. These accounts reveal a deep-rooted fear inculcated by mainstream society of sexual and gender non-conformity, which manifests itself in the refusal of basic citizenship rights to these communities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The PUCL report gives a detailed account of harassment by the police in public places, at home, in police stations, and instances of entrapment similar to the Lucknow cases. Instead of reiterating that aspect which would simply involve repeating the above analysis, this section will look into other gender-specific issues that arise with respect to the community and the multiple questions these give rise to:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Transgender Toilets&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first example relates to efforts by the Chennai Municipal Corporation to build toilets specifically for the transgender population,&lt;a href="#fn27" name="fr27"&gt;[27]&lt;/a&gt; in a move stated as being part of a pilot project to recognize the considerable community in South and Central Chennai. Each lavatory in these toilets was to contain male, as well as female urinals. In the words of the municipal commissioner, the scheme was aimed at "extending recognition to the community and mainstreaming them", and more facilities could be built if the public responded well to the idea.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The reaction from the community was mixed at best: sure, it was regarded as a positive move to the extent that not every person who identified themselves as transgender had undergone sex change; simultaneously, the city saw one section of the community fearing the move as a step towards discrimination and isolation. "I don’t agree with this. We want to mingle with the mainstream. We don’t want to be separated like this," said Aasha Bharati, president of the Aravanigal Association. The idea of privacy here is at odds with something else the community is striving for: inclusion. The fear then was of one kind of recognition trumping another. What would a policy maker then privilege? Would this possibly be a better short-term move, as we move towards a future understanding of not being disabled by difference, or would the ideal of privacy trump even that?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The way this issue has played out in the Indian context stands in interesting contrast to cases in America. A bill in Maine which would allow restroom owners in business establishments and institutions from mandating what gender persons would use what washroom was met with sharp opposition from the transgender community on claims of dignity and privacy.&lt;a href="#fn28" name="fr28"&gt;[28]&lt;/a&gt; For a person who, say, externally had strongly masculine features, but identified as a woman, two options existed: either break the law and walk discreetly into the male compartment – or risk the outrage of other women as she walked into their compartment and was faced with their indignation of having a "man" use their toilet. In such an instance, there stand two rival conceptions of privacy: one in which respecting privacy would, somewhat ironically, stand as a transgender person’s right to assert their distinct identity in public without fear, versus a conception of privacy as anonymity – their right not to be compelled to make a political statement in the course of going about their daily lives.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Now that kind of issue wouldn’t come up in the Indian context for a large section of the transgender community simply owing to the hyper-visibility of the &lt;i&gt;hijras&lt;/i&gt;. For all its contemporary stigmatization, the &lt;i&gt;hijra&lt;/i&gt; community is a discernible one in public with an acknowledged history. &lt;i&gt;Hijras&lt;/i&gt; have won elections in India, and are very much an acknowledged part of public space.&lt;a href="#fn29" name="fr29"&gt;[29]&lt;/a&gt; To that extent, privacy isn’t quite the overriding concern here in the way that it might be in the West – one might even say that the lack of such a conception can in this particular case be somewhat empowering.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Passport Forms&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The next example concerns gender-sensitivity when it comes to passport forms.&lt;a href="#fn30" name="fr30"&gt;[30]&lt;/a&gt; The Ministry of External Affairs moved to allow for the option of entering a person's sex as "E" instead of either "M" or "F", the "E" then standing for "Eunuch". At the time of introduction of this category there was a degree of ambivalence: it was not available on the form itself, instead being listed as an option only in the rules. As activists noted however, it was a victory in the sense of being the first official recognition of the community. The particular category of recognition was problematic: for one the term "eunuch" would only reasonably represent one part of the transgender population; for another, large sections of the community would consider that term insulting. The government subsequently made an ameliorative measure by changing the category to "Other".&lt;a href="#fn31" name="fr31"&gt;[31]&lt;/a&gt; Again, the logical privacy question that would arise here would be regarding one's desire to be identified as transgendered in the first place. Similar to the toilets example, the issue would play out differently in India in many cases, given the hyper-visibility of the &lt;i&gt;hijra&lt;/i&gt; community which provides an instant marker for a &lt;i&gt;hijra&lt;/i&gt;, and subsequently ensures that there isn’t really a privacy violation when it comes to such kind of identification.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Of course, this declaration of otherness leads to issues for someone uncomfortable with disclosing transgender identity as such, and wanting to perform maleness or femaleness specifically. Would marking either the "M" or "F" column be considered an illegality?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Recognition – and Resolving Privacy&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Where official recognition is clearly ameliorative, it doesn't always stay. Following years of struggle, the community was given recognition in Andhra Pradesh under the Minorities Welfare Department. It was short-lived, however: protests by religious minority groups forced the government to go back on its decision.&lt;a href="#fn32" name="fr32"&gt;[32]&lt;/a&gt; The kind of privacy violations that the &lt;i&gt;hijra&lt;/i&gt; community suffers in India are thus in stark contrast to the kinds suffered by members of the gay and lesbian community: where one side deals with its invisibility, the other contends with the problems of its hyper-visibility. &lt;i&gt;Hijras&lt;/i&gt; walk about as constant targets of police intrusion.  A gay man or lesbian woman wouldn’t necessarily face those issues at the same level, except in instances where public sex is involved. The exceptions to even that are incidents of entrapment such as the Lucknow case, but it is evident that it is the &lt;i&gt;hijra&lt;/i&gt; community which deals with such police action much more than the others. What is also uniquely empowering for the community is this very aspect of their identity, this ever-present identification. The kind of fears of disclosure and blackmail that someone who fears outing might face fizzle out in the case of the &lt;i&gt;hijras&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The discourse gets complicated when you take up the identities of non-&lt;i&gt;hijra&lt;/i&gt; transgendered persons: there are the female-to-male transgendered identities of Thirunambigal in Tamil Nadu, Magaraidu in Andhra Pradesh and Gandabasaka in Karnataka – as well as male to female identities such as the Jogappas in Northern Karnataka, and Jogathas in Andhra Pradesh.&lt;a href="#fn33" name="fr33"&gt;[33]&lt;/a&gt; The idea of hyper-visibility which is so crucial to locating a sense of empowerment for the &lt;i&gt;hijra&lt;/i&gt; community in their lack of loss of privacy disappears here. The discussion here then springs back to the U.S. example of transgender toilets, and the complications that arise when external identity doesn’t necessarily match the internal one.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Medical Establishment&lt;/b&gt;&lt;a href="#fn34" name="fr34"&gt;[34]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Relevant to this section of the study is the understanding of privacy under the ambit of autonomy. Referring to Naz Foundation, instead of using liberty to describe and support privacy as under Article 21 of the Constitution of India, the court refers to autonomy holding that "exercise of autonomy enables an individual to attain fulfillment, grow in self-esteem and form relationships of his or her choice and fulfill all legitimate goals that he/she may set."&lt;a href="#fn35" name="fr35"&gt;[35]&lt;/a&gt;;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The medical establishment in India constantly undermines that autonomy by its treatment of homosexuality as a disease, and of LGBT persons as "others". LGBTs in India have often been detained in clinics against their will and subjected to treatment including shock therapy aimed at curing them.&lt;a href="#fn36" name="fr36"&gt;[36]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2001, the National Human Rights Commission (NHRC) admitted a complaint from a patient at the All Indian Institute of Medical Sciences, alleging psychiatric abuse at the hands of the consulting doctor, having been put on a four year course of drugs and told he had to be "cured" of his homosexuality. The NHRC finally chose to reject the complaint, with informal conversations with the chairman showing his belief that till section 377 was read down, nothing could be done. &lt;a href="#fn37" name="fr37"&gt;[37]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to Vinay Chandran, Executive Director of the Swabhava Trust, medicine in India continues to be obsessed with curing homosexuality, with health professionals in many places still offering behavioural therapy including electric shock treatment as well as psychiatric drugs and hormones in order to "cure" patients of homosexual desire. Vinay reports that a couple of psychiatrists in Bangalore mentioned that there were possibilities of discovering which gene determines sexual preference and scientifically suppressing it.&lt;a href="#fn38" name="fr38"&gt;[38]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Of course quacks exist across the spectrum, and medicinal malpractice is barely limited to serving disastrous advice/ treatment to persons "afflicted" with homosexuality. For understanding how the debate moves beyond merely unqualified doctors, we have to factor in the category of ego-dystonic homosexuality, which is endorsed by the WHO. Here, the gender identity or sexual preference of the individual is not in doubt, but the individual wishes it were different and seeks treatment.&lt;a href="#fn39" name="fr39"&gt;[39]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The way a number of psychiatrists’ engage with the situation is summed up by the statement: "it’s not my job to tell him that it’s okay to be gay." No, the psychiatrist’s job it seems is to attempt to "cure" the oft-acknowledged incurable.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The fundamental factor not taken into account is that it is very often the environment that surrounds expression of homosexual identity that the patient is concerned about, as opposed to merely the idea of being LGBT. The relationship between patient and doctor is a fiduciary one, premised on absolute trust. In consulting a doctor, the patient entrusts fundamental decision making powers to the practitioner. The medical professional is often unable to comprehend the question of choice. This in turn results in effectively infringing the patient’s autonomy: the component of attaining fulfillment, the growth in self-esteem that the Delhi High Court elaborated on is robbed in the process of stifling sexuality, even when it is something the patient specifically requests the doctor for.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Lesbian  Unions&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Maya Sharma, in her book Loving Women locates the stories of a number of working-class lesbian women struggling to be with each other against the odds.&lt;a href="#fn40" name="fr40"&gt;[40]&lt;/a&gt; In a vein that parallels the reaction elicited to inter-religious or inter-caste marriages in a number of regions, it is often the honour of a family/village that is invoked in opposition to the demands of two people who want to be each other. One incident involves a woman who "dares" to elope with another being beaten and stripped, having her face blackened and being paraded around a village with a garland of shoes on her neck. Sahayatrika, a lesbian women's collective in Kerala has documented 24 cases of lesbian couple suicides in Kerala during the period between 1996 and 2004.&lt;a href="#fn41" name="fr41"&gt;[41]&lt;/a&gt; Earlier this year, two sets of lesbian couples committed suicide within a month of each – one in Sonarpur,.&lt;a href="#fn42" name="fr42"&gt;[42]&lt;/a&gt; and the other in Nandigram.&lt;a href="#fn43" name="fr43"&gt;[43]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sexuality has often been used as a means for controlling women. The immoral/ tainted woman when placed in contrast with the idealized image of the model Indian woman is an image played out in various daily social interactions. In carrying out the agenda of control, the act of agency displayed by women who choose to step out of the heterosexual woodwork is a direct threat to that very system. The acts of family members in attempting to separate lesbian unions display a lack of respect for autonomy and for the private decisions of the women concerned. The feelings of fear, shame and isolation experienced by women who dare to explore their sexuality are compounded by instances of persecution by the family. The state is further complicit in numerous documented instances with the police often working with the family to track down the runaway brides and get them back home to familial watch under lock and key.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Privacy again battles with privacy in this realm: an oft-heard feminist critique of privacy hinges on the idea that privacy can be dangerous for women when it is used to cover up repression and physical harm to them by creation of the public/private divide.&lt;a href="#fn44" name="fr44"&gt;[44]&lt;/a&gt; The private realm is premised on non-intervention by the State. In this instance however, it is another aspect of privacy that needs to be valued, and one that even calls for state intervention: the aforementioned act of autonomy.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;Privacy in the Time of Naz&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The examples up until now have been coloured with a pre-Naz conception of privacy and queer rights – this chapter takes up two incidents post the judgment that captured the public imagination. First is the sting operation carried out on an Allahabad Muslim University professor that began a chain of events leading to his death; the second is an "expose" on the gay community carried by TV9. In both incidents, the "Spectre of Naz" &lt;a href="#fn45" name="fr45"&gt;[45]&lt;/a&gt; looms in the background, in many ways acting as an empowering, legitimizing force.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Allahabad Muslim University Sting Operation&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In February 2010, newspapers widely reported the story of Dr. Shrinivas Ramchandra Siras a 64 year-old Reader &amp;amp; Chairman, Department of Modern Indian Languages, Aligarh Muslim University (AMU) being filmed having consensual sex with another adult male. When the video was made public, AMU suspended Siras for immoral sexual activity.&lt;a href="#fn46" name="fr46"&gt;[46]&lt;/a&gt; The implications of the suspension both in terms of the perception of homosexuality as immoral despite the judgment of the Delhi High Court as well as the disturbing nature of the occurrence of the filming of Dr. Siras in the privacy of his home prompted a nationwide outrage.&lt;a href="#fn47" name="fr47"&gt;[47]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On April 1 of the same year, the Allahabad High Court ordered AMU to reinstate Siras, holding that his right to privacy had been violated, stating "the right of privacy is a fundamental right, needs to be protected and that unless the conduct of a person, even if he is a teacher is going to affect and has substantial nexus with his employment, it may not be treated as misconduct."&lt;a href="#fn48" name="fr48"&gt;[48]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Then comes the news that Uttar Pradesh police had arrested two of those who broke into Siras’ house and filmed him. Many university officials were also charged with criminal offences. As Vinay Sitapati notes, none of this could have happened in a context where gay sex was illegal. In that context, it would have been Siras who was the criminal, and the additional wrongs done simply irrelevant – "this is not how the story was supposed to pan out. Those who broke into Siras’s house and AMU (and there are allegations that they are one and the same) assumed that Siras’s transgressions were so repellent, that their own would be forgiven." The judicial narrative — of a victimized Siras, a callous administration and criminal house-breakers — owes much to the Delhi High Court’s view that Siras’s sexual choice was legitimate.&lt;a href="#fn49" name="fr49"&gt;[49]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Going back to the understanding that the right to privacy is integrally linked to the notion of autonomy and the right to live with dignity ‒ it is this most fundamental of Constitutional safeguards that the AMU authorities clearly colluded in negating by being complicit in the sting operation and subsequently suspending Dr. Siras. A press release by the AMU authorities demonstrated a continuing disrespect for privacy: "the university respects the privacy of a teacher living in its premises but it also expects everyone to behave in a respectful manner giving due regard to its valued cultural ethos and the campus sensitivity including their neighbours concerns and to the great moral credentials that AMU has been nurturing since its inception."&lt;a href="#fn50" name="fr50"&gt;[50]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The TV9 “Expose”&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In February of 2011, the news channel TV9 aired what it called an expose on the Hyderabad gay community titled "Gay Culture in Hyderabad". The video starts by worrying about how gay culture in Hyderabad is "increasing drastically". Following this, footage of a gay club is shown, without any attempt to blank out faces. The show then puts itself in the mode of investigative journalism, as TV9 sets itself the target of exposing the "truth" about gay culture in the city.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Next, viewers are informed about gay dating websites, with the anchor taking special care to inform viewers that it is software employees and students who mostly "fall prey" to this gay culture. Then, in an astonishingly blunt violation of privacy, pictures of men on one dating site are flashed on the screen, accompanied by conversations between the concerned man and a TV9 journalist soliciting sex. "While some do it for new pleasures, some get spoilt by friends, others do it for the crave of money and the remaining are vowed by the lust some of them have changed it into a business by capturing teenager's mind and get them into hell."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The video recording of the telecast on YouTube was taken off the site following a sustained protest from users of the site. Notices for legal action were sent to TV9 offices, including a detailed petition from Adhikaar, a Delhi based NGO. Two questions were primarily asked on LGBT mailing lists across the country&lt;a href="#fn51" name="fr51"&gt;[51]&lt;/a&gt;: first, regarding how safe establishing one’s homosexual identity online, or attending gay parties would be anymore, and secondly, whether a protest should take place, and what the nature of the same should be.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As highlighted by the petition drafted by Adhikaar, a Delhi-based NGO, this act of TV9 was violative of Code 6 of the News Broadcasters Association Code which deals with matters of privacy, and states:&lt;a href="#fn52" name="fr52"&gt;[52]&lt;/a&gt;&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;"As a rule channels must not intrude on private lives, or personal affairs of individuals, unless there is a clearly established larger and identifiable public interest for such a broadcast. The underlying principle that news channels abide by is that the intrusion of the private spaces, records, transcripts, telephone conversations and any other material will not be for salacious interest, but only when warranted in the public interest."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;By way of entrapping a set of gay men through calling them and asking them pointed personal questions about their sexual lives, TV9 was further in violation of Code 9 (Self-Regulation Section) of the News Broadcasters Association which deals with sting operations and which states:&lt;a href="#fn53" name="fr53"&gt;[53]&lt;/a&gt;&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;"As a guiding principle, sting and undercover operations should be a last resort of news channels in an attempt to give the viewer comprehensive coverage of any news story. News channels will not allow sex and sleaze as a means to carry out sting operations, the use of narcotics and psychotropic substances or any act of violence, intimidation, or discrimination as a justifiable means in the recording of any sting operation."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A month later, the News Broadcasting Standards Authority, New Delhi censured TV9 and ordered it to pay a fine of Rs.1,00,000 and broadcast an apology in prime time both in English and in Telugu. The Authority determined that TV9 has violated the codes of ethics and broadcasting standards.&lt;a href="#fn54" name="fr54"&gt;[54]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Justice JS Verma called the story a sensationalized depiction of gay culture in Hyderabad and the story needlessly violated the privacy of individuals, with possible alternate sexual orientation. He also pointed out that alternate sexual orientation is no longer considered as a taboo or a criminal act. The channel was directed to run an apology for three consecutive days beginning the Monday next, in prime time with the following text:&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;"TV9 apologizes for the story “Gay Culture Rampant in Hyderabad” telecast on this channel on 22 February, 2011 from3.11 p.m. to 3.17 p.m. particularly since the story invaded the privacy of certain persons and was in violation of the Code of Ethics &amp;amp; Broadcasting Standards of the News Broadcasters Association. Any hurt or harm caused to any person thereby is sincerely regretted."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Again, it must be noted that the order of the NBSA would not have been possible in a context where gay sex was illegal: it is that very notion that allowed the Authority to move past the issue of homosexuality and instead delve into the merits of the actual harm done here.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Conclusion&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;It is possible to mount an argument that nothing has really changed post-Naz. The AMU’s attitude even in the face of the flak it received after the sting operation was phlegmatic at best: a summary statement saying that while it respected his privacy, it also expected a certain degree of behavior keeping in line with its "valued cultural ethos". Reactions like this threaten to lock the idea of privacy into a closed epistemic loop of judicial discourse: the courts might go hoarse extolling the significance of privacy, but it is for nought if the AMU decides it can still walk away with its flagrant violation of basic civil liberties. Or perhaps the frenzy generated by the incident will work as a deterrent factor to future institutions fixing their moral gaze upon their members. The strength of an incident as precedent can only be gauged effectively by how its future echoes use it as a reference point.&lt;/p&gt;
&lt;div class="pullquote" style="text-align: justify; "&gt;&lt;b&gt;Meanwhile, what do these stories tell us about privacy? &lt;/b&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;The issues faced by the transgender community tell us that privacy doesn’t necessarily encompass a one-size-fits-all approach, and can raise as many questions as it answers. The issues faced by the Lucknow NGOs narrate a tale of institutionalized disrespect for privacy that has marginally more devastating consequences for the homosexual community by the spectre of outing. The issues faced by lesbian women evidence yet another need for breaching the public/private divide, demonstrating how the protection of the law might be welcome in the family sphere regardless of the bull-in-a-china-shop&lt;a href="#fn55" name="fr55"&gt;[55]&lt;/a&gt; prophecies of doom. Alternate sexual orientation and gender identity might bring the community under a common rubric, but distilling the components of that rubric is essential for engaging in any kind of useful understanding of the community and the kind of privacy violations it suffers – or engage with situations when the lack of privacy is empowering.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;b&gt;Selected incidents reported from 2001-2011&lt;/b&gt;&lt;/h2&gt;
&lt;table class="plain" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;1&lt;/td&gt;
&lt;td&gt;NGO charged with running gay club&lt;/td&gt;
&lt;td&gt;8 July 2001&lt;/td&gt;
&lt;td&gt;Times of India&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://goo.gl/MNHzw"&gt;http://goo.gl/MNHzw&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2&lt;/td&gt;
&lt;td&gt;Homosexuality okay if practiced in private&lt;/td&gt;
&lt;td&gt;14 September 2011&lt;/td&gt;
&lt;td&gt;Sify News&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://goo.gl/iF3PQ"&gt;http://goo.gl/iF3PQ&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3&lt;/td&gt;
&lt;td&gt;Male callers harass lesbian helpline&lt;/td&gt;
&lt;td&gt;26 October 2003&lt;/td&gt;
&lt;td&gt;Mid Day Mumbai&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://goo.gl/Xf0fj"&gt;http://goo.gl/Xf0fj&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4&lt;/td&gt;
&lt;td&gt;Lesbian marriages, born of a legal loophole, stir debate in India&lt;/td&gt;
&lt;td&gt;4 February 2005&lt;/td&gt;
&lt;td&gt;DesPardes&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://goo.gl/O30Hf"&gt;http://goo.gl/O30Hf&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5&lt;/td&gt;
&lt;td&gt;Third sex finds a place on Indian passport forms&lt;/td&gt;
&lt;td&gt;10 March 2005&lt;/td&gt;
&lt;td&gt;Telegraph&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://goo.gl/nBQIt"&gt;http://goo.gl/nBQIt&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;6&lt;/td&gt;
&lt;td&gt;Lesbian couple sparks debate in Uttar Pradesh state&lt;/td&gt;
&lt;td&gt;9 April 2005&lt;/td&gt;
&lt;td&gt;Sify News&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://goo.gl/9GxuF"&gt;http://goo.gl/9GxuF&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;7&lt;/td&gt;
&lt;td&gt;The Indian city of Chennai is set to build toilets for trans people&lt;/td&gt;
&lt;td&gt;July 2005&lt;/td&gt;
&lt;td&gt;Pink News&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://goo.gl/52Llq"&gt;http://goo.gl/52Llq&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;8&lt;/td&gt;
&lt;td&gt;Homosexual gangs&lt;/td&gt;
&lt;td&gt;3 January 2006&lt;/td&gt;
&lt;td&gt;Pioneer&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://goo.gl/NX2NP"&gt;http://goo.gl/NX2NP&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;9&lt;/td&gt;
&lt;td&gt;Nihal was used to homosexual sex since 1986&lt;/td&gt;
&lt;td&gt;4 January 2006&lt;/td&gt;
&lt;td&gt;Dainik Jagran&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://goo.gl/NX2NP"&gt;http://goo.gl/NX2NP&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10&lt;/td&gt;
&lt;td&gt;Ain’t no cure for love&lt;/td&gt;
&lt;td&gt;6 June 2006&lt;/td&gt;
&lt;td&gt;India Together&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://goo.gl/V9Vjn"&gt;http://goo.gl/V9Vjn&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11&lt;/td&gt;
&lt;td&gt;Police bust gay party&lt;/td&gt;
&lt;td&gt;4 February 2008&lt;/td&gt;
&lt;td&gt;Times of India&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://goo.gl/n2nyz"&gt;http://goo.gl/n2nyz&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12&lt;/td&gt;
&lt;td&gt;Aligarh Muslim University professor suspended for being gay&lt;/td&gt;
&lt;td&gt;18 February 2010&lt;/td&gt;
&lt;td&gt;Times of India&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://goo.gl/D8LuD"&gt;http://goo.gl/D8LuD&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13&lt;/td&gt;
&lt;td&gt;Class monitors&lt;/td&gt;
&lt;td&gt;8 March 2010&lt;/td&gt;
&lt;td&gt;Outlook&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://goo.gl/Q2dkV"&gt;http://goo.gl/Q2dkV&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14&lt;/td&gt;
&lt;td&gt;Aligarh gay professor found dead, may have killed self&lt;/td&gt;
&lt;td&gt;8 April 2010&lt;/td&gt;
&lt;td&gt;Times of India&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://goo.gl/FyeIz"&gt;http://goo.gl/FyeIz&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15&lt;/td&gt;
&lt;td&gt;AMU professor a victim of clash between ‘tradition’ and privacy&lt;/td&gt;
&lt;td&gt;25 February 2010&lt;/td&gt;
&lt;td&gt;The Hindu&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://goo.gl/AtiJW"&gt;http://goo.gl/AtiJW&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;16&lt;/td&gt;
&lt;td&gt;Criminal case registered against six in gay professor case&lt;/td&gt;
&lt;td&gt;10 April 2010&lt;/td&gt;
&lt;td&gt;India Today&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://goo.gl/LfwDI"&gt;http://goo.gl/LfwDI&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;17&lt;/td&gt;
&lt;td&gt;AMU Prof promised money for sex: Rickshaw-puller&lt;/td&gt;
&lt;td&gt;19 April 2010&lt;/td&gt;
&lt;td&gt;Times of India&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://goo.gl/aXmBz"&gt;http://goo.gl/aXmBz&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;18&lt;/td&gt;
&lt;td&gt;Varsity paid for sting on gay professor&lt;/td&gt;
&lt;td&gt;19 February 2010&lt;/td&gt;
&lt;td&gt;India Today&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://goo.gl/cyQxL"&gt;http://goo.gl/cyQxL&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;19&lt;/td&gt;
&lt;td&gt;TV channel outs gay men, women in Hyderabad&lt;/td&gt;
&lt;td&gt;24 February 2010&lt;/td&gt;
&lt;td&gt;NDTV&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://goo.gl/w6NG4"&gt;http://goo.gl/w6NG4&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;20&lt;/td&gt;
&lt;td&gt;News Broadcasting Standards Authority censures TV9 over privacy violations&lt;/td&gt;
&lt;td&gt;25 March 2011&lt;/td&gt;
&lt;td&gt;Privacy India&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://goo.gl/rY7bT"&gt;http://goo.gl/rY7bT&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;21&lt;/td&gt;
&lt;td&gt;In a first, Gurgaon Court recognizes lesbian marriage&lt;/td&gt;
&lt;td&gt;29 July 2011&lt;/td&gt;
&lt;td&gt;Times of India&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://goo.gl/70KPr"&gt;http://goo.gl/70KPr&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Notes&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;].Madhavi Goradia Divan, Facets of Media Law, Eastern Book Company, Lucknow, 2006.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;].For instance, an HIV positive man’s right to marry as discussed in &lt;i&gt;Mr. X v. Hospital Z&lt;/i&gt;, 1998 (8) SCC 296.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;].Section 377, Indian Penal Code.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;].(2009) 160 DLT 277.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;].&lt;a class="external-link" href="http://www.openletter377.com/"&gt;http://www.openletter377.com/&lt;/a&gt;, last accessed 20 October 2007.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;].Olmstead v. U.S., 277 U.S. 438, 478 (1928) (Brandeis, J., dissenting).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;].Cathy Harris, Outing Privacy Litigation:  Towards a Contextual Strategy for Lesbian and Gay Rights, 65 Geo. Wash. L. Rev. 248.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;].Ibid.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;].Amita Dhanda, Constructing a New Human Rights Lexicon : Convention on the Rights of Persons with Disabilities, Year 5  No. 8 Sao Paulo June 2008.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;].See Henry Shue, Basic Rights Subsistence Affluence and US Foreign Policy, Princeton University Press, 2nd ed. 1996.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;].&lt;i&gt;Naz Foundation v. Government of NCT, Delhi&lt;/i&gt;, 160 (2009) DLT 277.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr12" name="fn12"&gt;12&lt;/a&gt;].Ibid., 47.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr13" name="fn13"&gt;13&lt;/a&gt;].Ibid., 26, 83, 113.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr14" name="fn14"&gt;14&lt;/a&gt;].Arvind Narrain, Queer: Law and Despised Sexualities in India, Books for Change, 2004.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr15" name="fn15"&gt;15&lt;/a&gt;].Men who have sex with men.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr16" name="fn16"&gt;16&lt;/a&gt;]."Gay Club Supplied Boys to Politicians"; "Gay Culture Started in UP in 1998 Itself", The Times of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr17" name="fn17"&gt;17&lt;/a&gt;].Criminal Misc. Case No. 2054/2001, as taken from Arvind Narrain, Queer: Law and Despised Sexualities in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr18" name="fn18"&gt;18&lt;/a&gt;].AIR 1963 SC 1295; it was Justice Subba Rao’s minority decision here that laid the foundation for the right to privacy in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr19" name="fn19"&gt;19&lt;/a&gt;].1975 (2) SCC 148.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr20" name="fn20"&gt;20&lt;/a&gt;]. Arvind Narrain, Queer: Law and Despised Sexualities in India, Books for Change, 2004.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr21" name="fn20"&gt;21&lt;/a&gt;].Ibid.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr21" name="fn21"&gt;21&lt;/a&gt;].Alok Gupta, Section 377 and the Dignity of Indian Homosexuals, &lt;a class="external-link" href="http://www.iglhrc.org/binary-data/ATTACHMENT/file/000/000/15-1.pdf"&gt;http://www.iglhrc.org/binary-data/ATTACHMENT/file/000/000/15-1.pdf&lt;/a&gt;, last accessed on 9 August 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr22" name="fn22"&gt;22&lt;/a&gt;].Ibid.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr23" name="fn23"&gt;23&lt;/a&gt;].&lt;a class="external-link" href="http://timesofindia.indiatimes.com/Mumbai/Police_bust_gay_party/articleshow/2753740.cms"&gt;http://timesofindia.indiatimes.com/Mumbai/Police_bust_gay_party/articleshow/2753740.cms&lt;/a&gt;, last accessed on 8 August 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr24" name="fn24"&gt;24&lt;/a&gt;].Human Rights Violations in the Transgender Community: A Report by PUCL-K, 2nd ed. 2005.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr25" name="fn25"&gt;25&lt;/a&gt;].&lt;a class="external-link" href="http://www.guardian.co.uk/world/2008/jul/04/india-gender"&gt;http://www.guardian.co.uk/world/2008/jul/04/india-gender&lt;/a&gt;, last accessed on 9 August 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr26" name="fn26"&gt;26&lt;/a&gt;].&lt;a class="external-link" href="http://www.pinknews.co.uk/news/articles/2005-11518.html"&gt;http://www.pinknews.co.uk/news/articles/2005-11518.html&lt;/a&gt;, last accessed on 10 August 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr27" name="fn27"&gt;27&lt;/a&gt;].Transgender people deserve privacy, dignity, in public bathrooms, Maine Opinion, available at &lt;a class="external-link" href="http://bangordailynews.com/2011/05/17/opinion/transgender-people-deserve-privacy-dignity-in-public-bathrooms/"&gt;http://bangordailynews.com/2011/05/17/opinion/transgender-people-deserve-privacy-dignity-in-public-bathrooms/&lt;/a&gt;, last accessed on 20 August 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr28" name="fn28"&gt;28&lt;/a&gt;].Transgender people deserve privacy, dignity, in public bathrooms, Maine Opinion, available at &lt;a class="external-link" href="http://bangordailynews.com/2011/05/17/opinion/transgender-people-deserve-privacy-dignity-in-public-bathrooms/"&gt;http://bangordailynews.com/2011/05/17/opinion/transgender-people-deserve-privacy-dignity-in-public-bathrooms/&lt;/a&gt;, last accessed on 20 August 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr29" name="fn29"&gt;29&lt;/a&gt;].Siddharth Narrain, Being a Eunuch, available at &lt;a class="external-link" href="http://www.countercurrents.org/gen-narrain141003.htm"&gt;http://www.countercurrents.org/gen-narrain141003.htm&lt;/a&gt;, last accessed on 20 August 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr30" name="fn30"&gt;30&lt;/a&gt;].&lt;a class="external-link" href="http://webcache.googleusercontent.com/search?q=cache:gLqrElQbWboJ:infochangeindia.org/human-rights/news/-third-sex-finds-a-place-on-indian-passport-forms.html+PASSPORT+APPLICATION+INDIA+gender&amp;amp;cd=4&amp;amp;hl=en&amp;amp;ct=clnk&amp;amp;gl=in&amp;amp;source=www.google.co.in"&gt;http://webcache.googleusercontent.com/search?q=cache:gLqrElQbWboJ:infochangeindia.org/human-rights/news/-third-sex-finds-a-place-on-indian-passport-forms.html+PASSPORT+APPLICATION+INDIA+gender&amp;amp;cd=4&amp;amp;hl=en&amp;amp;ct=clnk&amp;amp;gl=in&amp;amp;source=www.google.co.in&lt;/a&gt;, last accessed on 9 August 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr31" name="fn31"&gt;31&lt;/a&gt;].&lt;a class="external-link" href="http://passport.gov.in/cpv/ppapp1.pdf"&gt;http://passport.gov.in/cpv/ppapp1.pdf&lt;/a&gt;, last accessed on 9 August 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr32" name="fn32"&gt;32&lt;/a&gt;].&lt;a class="external-link" href="http://www.ndtv.com/article/india/andhra-pradesh-government-gives-in-to-sexuality-bias-71454"&gt;http://www.ndtv.com/article/india/andhra-pradesh-government-gives-in-to-sexuality-bias-71454&lt;/a&gt;, last accessed on 8 August 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr33" name="fn33"&gt;33&lt;/a&gt;].Gee Ameena Suleiman, Non-Hijra Transgenders Struggle for Identity, Daily News and Analysis, available at &lt;a class="external-link" href="http://www.dnaindia.com/lifestyle/report_non-hijra-transgenders-struggle-for-identity_1588421"&gt;http://www.dnaindia.com/lifestyle/report_non-hijra-transgenders-struggle-for-identity_1588421&lt;/a&gt;, last accessed on 25 August 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr34" name="fn34"&gt;34&lt;/a&gt;].Arvind Narrain and Vinay Chandran, It’s Not My Job to tell you It’s okay to be Gay – Medicalisation of Homosexuality: A Queer Critique, available at http://www.altlawforum.org/gender-and-sexuality/publications/medicalizationfinal.rtf/at_download/file&lt;a class="external-link" href="http://www.altlawforum.org/gender-and-sexuality/publications/medicalizationfinal.rtf/at_download/file"&gt;http://www.altlawforum.org/gender-and-sexuality/publications/medicalizationfinal.rtf/at_download/file&lt;/a&gt;, last accessed on 20 August 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr35" name="fn35"&gt;35&lt;/a&gt;].160 (2009) DLT 277.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr36" name="fn36"&gt;36&lt;/a&gt;].&lt;a class="external-link" href="http://www.unhcr.org/refworld/pdfid/4b6fe2110.pdf"&gt;http://www.unhcr.org/refworld/pdfid/4b6fe2110.pdf&lt;/a&gt;, last accessed 9 August 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr37" name="fn37"&gt;37&lt;/a&gt;].Arvind Narrain. and Tarunabh Khaitan, Medicalisation of Homosexuality : A Human Rights Approach, as taken from Bina Fernandez (ed.), Humjinsi: A Resource Book on Lesbian, Gay and Bisexual Rights in India (New Delhi : India Centre for Human Rights and the Law, 2002).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr38" name="fn38"&gt;38&lt;/a&gt;].Vinay Chandran, Ain’t no cure for love, India Together, last accessed on 8 August 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr39" name="fn39"&gt;39&lt;/a&gt;].Supra n. 32.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr40" name="fn40"&gt;40&lt;/a&gt;].Maya Sharma, Loving Women: Being Lesbian in Unprivileged India, Yoda Press, 2006.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr41" name="fn41"&gt;41&lt;/a&gt;].India: Second NGO Shadow Report on CEDAW, November 2006, available at &lt;a class="external-link" href="http://www.iwraw-ap.org/resources/pdf/India%20Shadow%20report.pdf"&gt;http://www.iwraw-ap.org/resources/pdf/India%20Shadow%20report.pdf&lt;/a&gt;, last accessed on 10 September 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr42" name="fn42"&gt;42&lt;/a&gt;].&lt;a class="external-link" href="http://articles.timesofindia.indiatimes.com/2011-01-24/kolkata/28367047_1_girls-suicide-lesbian-couple"&gt;http://articles.timesofindia.indiatimes.com/2011-01-24/kolkata/28367047_1_girls-suicide-lesbian-couple&lt;/a&gt;, last accessed on 10 September 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr43" name="fn43"&gt;43&lt;/a&gt;].&lt;a class="external-link" href="http://articles.timesofindia.indiatimes.com/2011-02-22/kolkata/28624865_1_lesbian-couple-suicide-field"&gt;http://articles.timesofindia.indiatimes.com/2011-02-22/kolkata/28624865_1_lesbian-couple-suicide-field&lt;/a&gt;, last accessed on 10 September 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr44" name="fn44"&gt;44&lt;/a&gt;].Saptarshi Mandal, Right to Privacy in Naz Foundation: A Counter-Heteronormative Critique, 3 NUJS L. Rev. 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr45" name="fn45"&gt;45&lt;/a&gt;].Vinay Sitapati, The Spectre of Naz, as available at &lt;a class="external-link" href="http://www.indianexpress.com/news/the-spectre-of-naz/609695/0"&gt;http://www.indianexpress.com/news/the-spectre-of-naz/609695/0&lt;/a&gt;, last accessed on 9 August 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr46" name="fn46"&gt;46&lt;/a&gt;].&lt;a class="external-link" href="http://articles.timesofindia.indiatimes.com/2010-02-18/india/28118769_1_shrinivas-ramchandra-siras-rickshaw-puller-amu-campus"&gt;http://articles.timesofindia.indiatimes.com/2010-02-18/india/28118769_1_shrinivas-ramchandra-siras-rickshaw-puller-amu-campus&lt;/a&gt;, last accessed on 11 August 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr47" name="fn47"&gt;47&lt;/a&gt;]. Arvind Narrain, et al, Policing Morality at AMU: An Independent Fact-Finding Report,  available at &lt;a class="external-link" href="http://www.fridae.com/newsfeatures/2010/03/10/9724.policing-morality-at-amu-an-independent-fact-finding-report?n=sea&amp;amp;nm=amu"&gt;http://www.fridae.com/newsfeatures/2010/03/10/9724.policing-morality-at-amu-an-independent-fact-finding-report?n=sea&amp;amp;nm=amu&lt;/a&gt;, last accessed on 11 August 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr48" name="fn48"&gt;48&lt;/a&gt;].&lt;i&gt;Dr. Shrinivas Ramchandra Siras &amp;amp; Ors v. The Aligarh Muslim University &amp;amp; Ors&lt;/i&gt;, Civil Misc. Writ Petition No.17549 of 2010.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr49" name="fn49"&gt;49&lt;/a&gt;].Vinay Sitapati, The Spectre of Naz, as available at &lt;a class="external-link" href="http://www.indianexpress.com/news/the-spectre-of-naz/609695/0"&gt;http://www.indianexpress.com/news/the-spectre-of-naz/609695/0&lt;/a&gt;, last accessed on 9 August 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr50" name="fn50"&gt;50&lt;/a&gt;]. Supra n. 32&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr51" name="fn51"&gt;51&lt;/a&gt;].&lt;a class="external-link" href="mailto:lgbt-india@yahoogroups.com"&gt;Lgbt-india@yahoogroups.com&lt;/a&gt;. This is possibly the most prolific mailing list for LGBT persons in the country, and is constantly active with atleast 4-5 mails being exchanged per day.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr52" name="fn52"&gt;52&lt;/a&gt;].Code of Ethics and Broadcasting Standards of the News Broadcasters Association.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr53" name="fn53"&gt;53&lt;/a&gt;].Code 9, Code of Ethics and Broadcasting Standards of the News Broadcasters Association.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr54" name="fn54"&gt;54&lt;/a&gt;].TV9 Ordered to Air Apology for Sting  available at &lt;a class="external-link" href="http://www.dnaindia.com/lifestyle/report_tv9-ordered-to-air-apology-for-sting_1527622"&gt;http://www.dnaindia.com/lifestyle/report_tv9-ordered-to-air-apology-for-sting_1527622&lt;/a&gt;, last accessed on 10 September 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr55" name="fn55"&gt;55&lt;/a&gt;].“Introduction of constitutional law in the home … is like introducing a bull in a china shop. It will prove to be a ruthless destroyer of the marriage institution”, Rohatgi, J. in &lt;i&gt;Harvinder Kaur v. Harmander Singh Choudhry&lt;/i&gt;, AIR 1984 Del 66.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;* The author, Danish Sheikh works with the Alternative Law Forum in Bangalore, India. &lt;/b&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/privacy-sexual-minorities'&gt;https://cis-india.org/internet-governance/privacy-sexual-minorities&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Danish Sheikh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-09-20T09:22:44Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/sixth-annual-meeting-igf">
    <title>Sixth Annual Meeting of the Internet Governance Forum, Nairobi: A Summary</title>
    <link>https://cis-india.org/internet-governance/blog/sixth-annual-meeting-igf</link>
    <description>
        &lt;b&gt;The sixth annual meeting of the Internet Governance Forum was held from 27 to 30 September 2011 at the United Nations Office in Nairobi, Kenya. Sunil Abraham participated in six workshops: Privacy, Security, and Access to Rights: A Technical and Policy Analyses, Use of Digital Technologies for Civic Engagement and Political Change: Lessons Learned and Way Forward, The Impact of Regulation: FOSS and Enterprise, Proprietary Influences in Free and Open Source Software: Lessons to Open and Universal Internet Standards, Access and Diversity of Broadband Internet Access and Putting Users First: How Can Privacy be Protected in Today’s Complex Mobile Ecosystem?&lt;/b&gt;
        
&lt;h3&gt;Privacy, Security, and Access to Rights: A Technical and Policy Analyses&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Workshop No. 219&lt;/strong&gt;&lt;br /&gt;The workshop was moderated by Kim Pham, Expression Technologies, Civil Society (United States). The panel members included Carlos Affonso Pereira de Souza, Centro de Technologica e Socieda (Brazil), Christopher Soghoian, Indiana University (United States), Karen Reilly, Tor Project, Technical/Civil Society (United States) and Sunil Abraham, Centre for Internet and Society (India).&lt;br /&gt;See the workshop details &lt;a class="external-link" href="http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=Workshops2011View&amp;amp;wspid=219"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;Use of Digital Technologies for Civic Engagement and Political Change: Lessons Learned and Way Forward&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Workshop No. 184&lt;/strong&gt;&lt;br /&gt;The workshop was moderated by Katim S Touray Council Vice Chair, Free Software and Open Source Foundation for Africa and Member, ICANN Board of Directors. Fouad Bajwa of Gerry Morgan Foundation (Pakistan) was the remote moderator. Nnenna Nwakanma of Nnenna.org, Simeon Oriko of @TheKuyuProject &amp;amp;@StorySpaces, Wael Khalil, Activist and Sunil Abraham of the Centre for Internet &amp;amp; Society were the panel members. Nishant Shah from the Centre for Internet &amp;amp; Society participated remotely from Bangalore.&amp;nbsp;&lt;br /&gt;See the workshop details &lt;a class="external-link" href="http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=Workshops2011View&amp;amp;wspid=184"&gt;here&lt;/a&gt;&lt;br /&gt;See the entire transcription &lt;a class="external-link" href="http://www.intgovforum.org/cms/component/content/article/71-transcripts-/873-ei-workshop-80184-use-of-digital-technologies-for-civic-engagement-and-political-change-lessons-learned-"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;The Impact of Regulation: FOSS and Enterprise&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Workshop No. 211&lt;/strong&gt;&lt;br /&gt;The workshop was moderated by Dorothy Gordon, Director General, AITI-KACE, Judy Okite was the remote moderator. The panel members were Satish Babu, ICFOSS, India, Yves Miezan Ezo, Smile Training, Manager, (France), Sunil Abraham, Executive Director, Centre for Internet &amp;amp; Society, Bangalore, Evans Ikua, FOSS Certification Manager, ict@innovation program.&amp;nbsp;&lt;br /&gt;See the workshop details &lt;a class="external-link" href="http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=Workshops2011View&amp;amp;wspid=211"&gt;here&lt;/a&gt;&lt;br /&gt;See the entire transcription &lt;a class="external-link" href="http://www.intgovforum.org/cms/component/content/article/71-transcripts-/842-28-september-2011-ad-workshop-73211-foss-as-an-instrument-for-accessible-development-the-impact-of-regulation-open-source-and-enterprise"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;Proprietary Influences in Free and Open Source Software: Lessons to Open and Universal Internet Standards&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Workshop No. 201&lt;/strong&gt;&lt;br /&gt;The workshop was moderated by Alejandro Pisanty, Director General for Academic Computing Services of the National University of Mexico (UNAM), Mexico. Tracy Hackshaw, Computer Society of Trinadad and Tobago, Trinadad and Tobago, Venkatesh Hariharan, Head of Public Policy and Government Affairs at Google, India and Scott O Bradner, University Technology Security Officer, Harvard University, USA were the panel members.&lt;br /&gt;See the workshop details &lt;a class="external-link" href="http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=WSProposals2011View&amp;amp;wspid=201"&gt;here&lt;/a&gt;&lt;br /&gt;See the entire transcription &lt;a class="external-link" href="http://www.intgovforum.org/cms/component/content/article/108-transcripts/835-28-september-2011-other-201-proprietary-influences-in-free-and-open-source-software-lessons-to-open-and-universal-internet-standards"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;Access and Diversity of Broadband Internet Access&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Workshop No. 113&lt;/strong&gt;&lt;br /&gt;The workshop was moderated by N Ravi Shanker, Addl Secy, Department of Information Technology, Ministry of Information Technology, Government of India (Chair). Abhishek Singh, Director, Department of Information Technology, Ministry of Information Technology, Government of India, Venkatesh Hariharan, Head of Public Policy and Government &amp;nbsp;Relations, Google India and Sunil Abraham, Executive Director, The Centre for Internet and Society, India were the panel members.&lt;br /&gt;See the workshop details&lt;a class="external-link" href="http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=Workshops2011View&amp;amp;wspid=113"&gt; here&lt;/a&gt;&lt;br /&gt;See the entire transcription &lt;a class="external-link" href="http://www.intgovforum.org/cms/component/content/article/71-transcripts-/811-ad-feeder-workshop-113-access-and-diversity-of-broadband-internet-access-"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;Putting users First: How can Privacy be Protected in Today’s Complex Mobile Ecosystem?&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Workshop No. 75&lt;/strong&gt;&lt;br /&gt;This workshop was moderated by Ambassador David Gross, Partner, Wiley Rein LLP, Yiannis Theodorou, Regulatory Policy Manager, GSMA was the remote moderator. The panel members included Pat Walshe, Director of Privacy-GSMA), Jeff Brueggeman (Vice President-Publiy Policy AT&amp;amp;T), Patrick Ryan, Policy Counsel, Open Internet for Google Inc, Ms Juliana Rotich, Executive Director of Ushahidi Inc, Sunil Abraham, Executive Director, The Centre for Internet and Society (India) and Ian Brown, co-director of Oxford University's Information Security and Privacy Programme.&lt;br /&gt;See the workshop details&lt;a class="external-link" href="http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=Workshops2011View&amp;amp;wspid=75"&gt; here&lt;/a&gt;&lt;br /&gt;See the entire transcription &lt;a class="external-link" href="http://www.intgovforum.org/cms/component/content/article/108-transcripts/870-sop-75-putting-users-first-how-can-privacy-"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/sixth-annual-meeting-igf'&gt;https://cis-india.org/internet-governance/blog/sixth-annual-meeting-igf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-10-24T09:09:14Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/media-economics-workshop">
    <title>Ninth Workshop on Media Economics</title>
    <link>https://cis-india.org/news/media-economics-workshop</link>
    <description>
        &lt;b&gt;The Higher School of Economics and the New Economic School have joined hands to organize the ninth workshop on media economics in Moscow on October 28 and 29, 2011. All events are scheduled to take place in Marriott Courtyard, a hotel in the centre of Moscow within 10-minute walking distance from the Kremlin, the Red Square, and the Bolshoi Theatre.&lt;/b&gt;
        
&lt;h2&gt;Workshop Program&lt;/h2&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;Friday, October 28, 2011&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;8:00 a.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;&lt;em&gt;Morning coffee&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;8:45 a.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;&lt;em&gt;Opening remarks&lt;/em&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;h3&gt;Media markets - 1: Newspapers, Mergers, and Diversity&lt;/h3&gt;
&lt;div&gt;9:00 a.m.&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Michal MASIKA, University of Munich&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;Free commuter newspapers and the market for paid-for daily newspapers&lt;/em&gt;"&lt;/div&gt;
&lt;div&gt;Discussant: Sergey V. Popov, Higher School of Economics&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;9:40 a.m.&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Lapo FILISTRUCCHI, Tilburg University and University of Florence&lt;/div&gt;
&lt;div&gt;Tobias J. Klein, Tilburg University&lt;/div&gt;
&lt;div&gt;Thomas Michielsen, Tilburg University&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;Merger Simulation in a Two-Sided Market: The Case of the Dutch Daily &amp;nbsp; Newspapers&lt;/em&gt;"&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Discussant: Lars Sørgard, Norwegian School of Economics&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;10:20 a.m.&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Lisa GEORGE, Hunter College, City University of New York&lt;/div&gt;
&lt;div&gt;Felix Oberholzer-Gee, Harvard Business School&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;Diversity in Local Television News&lt;/em&gt;"&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Discussant: François Keslair, Paris School of Economics&amp;nbsp;&lt;/div&gt;
&lt;div&gt;11:00 a.m.&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;&lt;em&gt;Coffee break&amp;nbsp;&lt;/em&gt;&lt;/div&gt;
&lt;h3&gt;&amp;nbsp;&lt;span class="Apple-tab-span"&gt;&lt;/span&gt;Media markets and Internet - 1: Advertising and Search Engines&lt;/h3&gt;
&lt;div&gt;11:30 a.m.&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Alexandre de CORNIÈRE, Paris School of Economics&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;Search advertising&lt;/em&gt;"&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Discussant: Simon Anderson, University of Virginia&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;12:10 p.m.&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Alexander WHITE, Tsinghua University School of Economics and Management&lt;/div&gt;
&lt;div&gt;Kamal Jain, Microsoft Research&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;The Attention Economy of Search and Web Advertisement&lt;/em&gt;"&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Discussant: Sergei Izmalkov, New Economic School &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/div&gt;
&lt;div&gt;12:50 p.m.&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;&lt;em&gt;Lunch&lt;/em&gt;&amp;nbsp;&lt;/div&gt;
&lt;h3&gt;&lt;span class="Apple-tab-span"&gt;&lt;/span&gt;Political Economy - 1: Media, Elites, and the Groups of Influence&amp;nbsp;&lt;/h3&gt;
&lt;div&gt;2:00 p.m.&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Leopoldo FERGUSSON, Universidad de Los Andes&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;Media Markets, Special Interests, and Voters&lt;/em&gt;"&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Discussant: Alexei V. Zakharov, Higher School of Economics &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/div&gt;
&lt;div&gt;2:40 p.m.&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;David STRÖMBERG, IIES at Stockholm University&lt;/div&gt;
&lt;div&gt;Ben Qin, IIES at Stockholm University&lt;/div&gt;
&lt;div&gt;Yanhui Wu, USC Marshall School of Business&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;Determinants of Media Capture in China&lt;/em&gt;"&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Discussant: Maria Petrova, New Economic School&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;3:20 p.m.&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Daniel STONE, Oregon State University&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;Media and Gridlock&lt;/em&gt;"&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Discussant: Elena Panova, Academy of National Economy and Gaidar Institute&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;4:00 p.m.&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;&lt;em&gt;Coffee break&amp;nbsp;&lt;/em&gt;&lt;/div&gt;
&lt;h3&gt;&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Media markets and Internet - 2: Internet Effects and Offline Media Markets&lt;/h3&gt;
&lt;div&gt;4:30 p.m.&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Joel WALDFOGEL, University of Minnesota&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;Bye, Bye, Miss American Pie? The Supply of New Recorded Music since Napster&lt;/em&gt;"&lt;/div&gt;
&lt;div&gt;Discussant: Ruben Enikolopov, New Economic School&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;5:10 p.m.&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Ignacio FRANCESCHELLI, Northwestern University&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;When the Ink is Gone: The Impact of Internet on News Coverage&lt;/em&gt;"&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Discussant: Ruben Durante, Sciences Po Paris &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/div&gt;
&lt;div&gt;5:50 p.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;&lt;em&gt;Adjourn&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;7:00 p.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;&lt;em&gt;Dinner&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;&amp;nbsp;&lt;/div&gt;
&lt;h2&gt;Saturday October 29th&lt;/h2&gt;
&lt;div&gt;8:00 a.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;&lt;em&gt;Morning Coffee&lt;/em&gt;&lt;/div&gt;
&lt;h3&gt;&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Media markets - 2: Interactions in Traditional and Digital Media Industry&lt;/h3&gt;
&lt;div&gt;9:00 a.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Harald Nygård Bergh, Norwegian School of Economics&lt;/div&gt;
&lt;div&gt;Hans Jarle KIND, Norwegian School of Economics&lt;/div&gt;
&lt;div&gt;Bjørn-Atle Reme, Norwegian School of Economics&lt;/div&gt;
&lt;div&gt;Lars Sørgard, Norwegian School of Economics&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;Competition between Content Distributors in Two-Sided Markets&lt;/em&gt;"&lt;/div&gt;
&lt;div&gt;Discussant: Guido Friebel, Goethe University Frankfurt &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;9:40 a.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Larbi Alaoui, Universitat Pompeu Fabra&lt;/div&gt;
&lt;div&gt;Fabrizio GERMANO, Universitat Pompeu Fabra&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;Time Scarcity and the Market for News&lt;/em&gt;"&lt;/div&gt;
&lt;div&gt;Discussant: Sergei Guriev, New Economic School &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/div&gt;
&lt;div&gt;10:20 a.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;&lt;em&gt;Coffee break&lt;/em&gt;&lt;/div&gt;
&lt;h3&gt;&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Political Economy - 2: Media Effects&lt;/h3&gt;
&lt;div&gt;10:50 a.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Francesco Drago, University of Naples&lt;/div&gt;
&lt;div&gt;Tommaso Nannicini, Bocconi University&lt;/div&gt;
&lt;div&gt;Francesco SOBBRIO, IMT Lucca&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;Newspapers, Local News and Electoral Politics&lt;/em&gt;"&lt;/div&gt;
&lt;div&gt;Discussant: Ekaterina Zhuravskaya, Paris School of Economics &amp;nbsp; &amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/div&gt;
&lt;div&gt;11:30 p.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Julia CAGÉ, Harvard University&lt;/div&gt;
&lt;div&gt;François Keslair, Paris School of Economics&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;Trash Media and the Decline of Turnout: Theory and Evidence from Local Media Competition in France, 1944-2010&lt;/em&gt;"&lt;/div&gt;
&lt;div&gt;Discussant: Francesco Sobbrio, IMT Lucca &amp;nbsp; &amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;12:10 p.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Parallel events (choose your favorite):&lt;/div&gt;
&lt;div&gt;Lunch &amp;nbsp;- or -&amp;nbsp;&lt;/div&gt;
&lt;h3&gt;Global New Media Policy&lt;/h3&gt;
&lt;div&gt;Roundtable (with refreshments, RSVP required, more details here)&lt;/div&gt;
&lt;div&gt;Pedro MIZUKAMI, FGV Center for Technology and Society, Rio de Janeiro, Brazil&lt;/div&gt;
&lt;div&gt;Sunil ABRAHAM, Centre for Internet and Society, Bangalore, India&lt;/div&gt;
&lt;div&gt;Bruce ETLING and Robert FARIS, Berkman Center for Internet and Society, Harvard University, United States&lt;/div&gt;
&lt;div&gt;Marina ZHUNICH, Google Russia&amp;nbsp;&lt;/div&gt;
&lt;h3&gt;&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Media markets - 3: Media Bias&lt;/h3&gt;
&lt;div&gt;2:00 p.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Stefano DELLAVIGNA, UC Berkeley&lt;/div&gt;
&lt;div&gt;Alec Kennedy, San Francisco Federal Reserve Bank&lt;/div&gt;
&lt;div&gt;“Does Media Concentration Lead to Biased Coverage? Evidence from Movie Reviews”&lt;/div&gt;
&lt;div&gt;Discussant: Joel Waldfogel, University of Minnesota &amp;nbsp; &amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;2:40 p.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Matthias HEINZ, Goethe University Frankfurt&lt;/div&gt;
&lt;div&gt;Guido Friebel, Goethe University Frankfurt&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;Media bias against foreign owners: Downsizing&lt;/em&gt;"&lt;/div&gt;
&lt;div&gt;Discussant: Olga Kuzmina, New Economic School &amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/div&gt;
&lt;div&gt;3:20 p.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;&lt;em&gt;Break&lt;/em&gt;&lt;/div&gt;
&lt;h3&gt;&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Future Directions of Research in Media Economics&lt;/h3&gt;
&lt;div&gt;3:30 p.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;&lt;em&gt;Roundtable&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;Simon ANDERSON, University of Virginia&lt;/div&gt;
&lt;div&gt;Stefano DELLAVIGNA, UC Berkeley&lt;/div&gt;
&lt;div&gt;Lisa GEORGE, Hunter College, City University of New York&lt;/div&gt;
&lt;div&gt;David STRÖMBERG, IIES at Stockholm University&lt;/div&gt;
&lt;div&gt;4:45 p.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;&lt;em&gt;Farewell reception&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;The above agenda was published in Higher School of Economics website, &lt;a class="external-link" href="http://www.hse.ru/mew/program"&gt;click here&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/div&gt;
&lt;iframe src="http://www.youtube.com/embed/WUL21Zc8UnU" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/media-economics-workshop'&gt;https://cis-india.org/news/media-economics-workshop&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-11-28T09:12:24Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-india-chronicles">
    <title>Growing Wikipedia: The India Chronicles</title>
    <link>https://cis-india.org/news/the-india-chronicles</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
&lt;p&gt;Tory Read, a professional researcher, writer and journalist was commissioned by the Wikimedia Foundation to create a vivid description of its work in India. This was done in the interest of transparency and to ensure that it captured lessons from this new approach. Tory travelled for a couple of weeks across Mumbai, Pune, Bangalore and some towns in Kerala — attending community meet-ups speaking with a host of individual community members in these cities. Tory has given a journalistic account and analysis, based on document review, interviews and observations conducted between November 2010 and June 2011, including 16 days in India in June 2011.The views expressed herein are his own and do not necessarily reflect the views of Wikimedia Foundation.&lt;/p&gt;
&lt;p&gt;Sunil Abraham, Executive Director of the Centre for Internet and Society has been quoted in this report. The following are some direct quotes extracted out from this report:&lt;/p&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;"Feuding and flaming is an integral part of free software culture.” “You can’t imagine a mailing list without flaming." [The Chapter and the Community Tangle, page 16]&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;"The crisis on the mailing list was ultimately a great thing.” “There was conflict, dozens of offline conversations, private and public negotiation and airing of views and doubts, followed by a public commitment to work together for a shared purpose." [Necessity Breeds Collaboration, page 19]&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;"The Foundation’s job is having meetings and growing and holding the consensus." "It should&amp;nbsp;be creating situations in which trust is gained, and you do this through radical transparency and participation. The point of the Foundation’s work is to build the community." [For the Foundation, page 24]&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Download the entire report &lt;a href="https://cis-india.org/internet-governance/india-chronicles.pdf" class="internal-link" title="The India Chronicles"&gt;here&lt;/a&gt;&amp;nbsp;[PDF, 2.9 MB]&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-india-chronicles'&gt;https://cis-india.org/news/the-india-chronicles&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-10-14T09:17:08Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
