<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2861 to 2875.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/news/social-media"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/clicktivism-a-brave-new-world-order"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/events/brave-new-medium"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/unique-identity-crisis"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/nel-suk"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/tweet-and-poke"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/december-2010-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/events/privacy-matters"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy/uid-reflects-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/kids-music-fashion-on-net"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy/privacy-wikilileaks-whistleblowers"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/police-agency-targetted"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/self-regulation"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy/privacy_callforpapers"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/dsci-information-summit"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/news/social-media">
    <title>Getting Connected</title>
    <link>https://cis-india.org/news/social-media</link>
    <description>
        &lt;b&gt;Nishant Shah of the Centre for Internet &amp; Society talks about the growing adoption of social media, and what can constitute a "social media network" &lt;/b&gt;
        
&lt;p&gt;See the video in livemint &lt;a class="external-link" href="http://videos.livemint.com/video/5223036-getting-connected"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/social-media'&gt;https://cis-india.org/news/social-media&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-01T17:03:14Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/clicktivism-a-brave-new-world-order">
    <title>Clicktivism &amp; a brave new world order</title>
    <link>https://cis-india.org/news/clicktivism-a-brave-new-world-order</link>
    <description>
        &lt;b&gt;THE FIRST decade of this century has been one of accelerated change. The proliferation of the Internet has ushered in ubiquitous transformations in the way we live. And yet, the more things change, the more they remain the same.&lt;/b&gt;
        
&lt;p&gt;Certain human values remain sacred. As a result, more and more people have come out to voice their support for equality, justice and non-discrimination. The last ten years have seen the rise of individuals empowered by the Internet to effect change around them. Across the world people have used the power of the digital revolution to fight for issues that are relevant to them. From human rights advocacy to fighting corruption, from mobilising masses for greater participation in the electoral process to campaigning to save the environment, cyber activism has taken many shapes. These instances are shaped as much by the peoples intentions as they are by the regional contexts of the interventions. You too can become a cyber activist, but first, you must first grasp the four principles that power the participation of citizens in the processes of social change and political transformation.&lt;/p&gt;
&lt;h3&gt;&amp;nbsp;The FOAF Phenomenon&lt;/h3&gt;
&lt;p&gt;As our lives become more networked because of Facebook, Twitter and Orkut, our contact lists have become more prolific and diverse than the little black book of phone numbers. We have always belonged to different groups, but now digital networks have introduced a phenomenon that is popularly called Friend of a Friend (FOAF). When you add people to your social network, you gain access to their networks and groups, forming weak but significant ties. Most people in the networks inherit at least seven levels of FOAF, thus expanding the scope of their reach. This ability to disseminate messages and ideas across a vast number of people — going viral — is the basis of cyber activism.&lt;/p&gt;
&lt;h3&gt;Power of Clicktivism&lt;/h3&gt;
&lt;p&gt;In the digital world, people who might not have the time or resources to participate directly in causes they believe in, find a way of being valuable. Platforms such as Twitter and Tumblr offer participants the ability to relay information and messages to create awareness. People who think of clicktivism as a way of shirking responsibilities in the real world fail to recognise that these clickers have been behind mass mobilisations of opinions and resources.&lt;/p&gt;
&lt;h3&gt;Virtual Reality Imitates Life&lt;/h3&gt;
&lt;p&gt;Cyber activism does not mean that the actions remain confined to online spaces. Most successful cyber activism campaigns collapse the real life-virtual reality differences. They seamlessly work in the physical and digital domains, playing on the strengths of both the spaces. They invite and mobilise people to perform actions that range from signing petitions and participating in policy making, to performing random acts of kindness and coordinating flash-mobs as signs of protest.&lt;/p&gt;
&lt;h3&gt;No Information Fatigue Please!&lt;/h3&gt;
&lt;p&gt;Even as we droop with information fatigue, there is no denying that the information highway has given us new ways of thinking about the world around us. It is easy now to find an audience for our opinions through blogging platforms such as Wordpress and Blogspot, and the rise of user-generated content sites like Wikipedia and YouTube enable people to question their own assumptions. As a multiplicity of ideas emerge, it paves the way for the rise of a more conscious citizen, aware of their rights and keen for change. At the end of the day, cyber activism is a reminder of the fact change, like charity, begins at home. And the Internet helps in building S.M.A.R.T. (Simple. Moral. Accountable.&lt;/p&gt;
&lt;p&gt;Responsible. Transparent) structures that empower citizens to stand up for what they think is right. It reminds us that there is power in words and that powerful words can lead to transformative actions. Cyber activism foregrounds the fact that we do not inherit the world from our ancestors, we borrow it from the future generations, and that we have the power to protect and preserve it.&lt;/p&gt;
&lt;p&gt;Read the original article in Mail Today &lt;a class="external-link" href="http://epaper.mailtoday.in/showstory.aspx?queryed=9&amp;amp;querypage=28&amp;amp;boxid=15431546&amp;amp;parentid=46837&amp;amp;eddate=Jan%20%202%202011%2012:00AM&amp;amp;issuedate=NaNundefinedundefined"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/clicktivism-a-brave-new-world-order'&gt;https://cis-india.org/news/clicktivism-a-brave-new-world-order&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-02T01:02:51Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/events/brave-new-medium">
    <title>CIS to Screen Subasri’s film “Brave New Medium”</title>
    <link>https://cis-india.org/events/brave-new-medium</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS) will host a screening of a film “Brave New Medium,” at 6 p.m. on Monday, 10 January 2011. The film is directed by Subasri Krishnan. &lt;/b&gt;
        
&lt;p&gt;"Brave New Medium" documents the complicated dynamics of Internet and censorship across different parts of&amp;nbsp; South-East Asia. It looks at how human rights activists in the region use the Internet as a tool of resistance. The film also examines ways of understanding censorship beyond the lens of the banning and the banned.&lt;/p&gt;
&lt;h3&gt;Subasri Krishnan&lt;/h3&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/krishnan.jpg/image_preview" alt="Subasri Krishnan" class="image-inline image-inline" title="Subasri Krishnan" /&gt;&lt;/p&gt;
&lt;p&gt;Subasri Krishnan has been an independent film-maker for the past 6 years.&amp;nbsp; She has directed a number of commissioned non-fiction films on issues ranging from Gender, Micro-Finance, Governance, Farmer’s Suicides to NREGA and the Right to Freedom of Expression. She has just completed&amp;nbsp; a film on Internet Censorship in both democratic and non-democratic countries in South-East Asia. Currently she is working on a research/film project on the idea of official identity documents and the notion of personhood, especially in the context of UIDAI.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In 2008, Subasri was awarded the prestigious George Washington International Documentary Filmmaker Fellowship. Subasri graduated from the Mass Communication Research Centre at Jamia Millia Islamia.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/brave-new-medium'&gt;https://cis-india.org/events/brave-new-medium&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-04T07:21:09Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/unique-identity-crisis">
    <title>Would it be a unique identity crisis ?</title>
    <link>https://cis-india.org/news/unique-identity-crisis</link>
    <description>
        &lt;b&gt;The UID project will centralise a humongous amount of data but the fear is that it might fall into the wrong hands.&lt;/b&gt;
        
&lt;p&gt;The Unique Identification (UID) project is already up and running. It’s touted as a watershed in inclusive politics, of bringing people, who by virtue of physical remoteness, their station in society or other liabilities were excluded from the system, back into it. UID Chairman Nandan Nilekani recently said that the aadhaar number will not replace the passport, driving license or the voter identity card and that by 2014, 60 per cent of the country’s population will have the 12-digit UID number. The idea, though it has not been made explicit, is that Aadhaar will eventually become the key document for the common man to navigate the system, whether it is opening a bank account or making a rent agreement to booking a train ticket or applying for a job.&lt;/p&gt;
&lt;p&gt;In fact, there is the implicit danger that sooner than later the original idea of inclusiveness could be turned on its head by denying benefits to people who don’t have the Aadhaar! “There is nothing to ensure that you will continue to receive the same benefits like those who have the UID number. The claim that it is not mandatory is legally correct.&amp;nbsp; But in practice it would not be,” said Prof Sridhar Krishnaswamy of W B University for Juridical Sciences.&lt;/p&gt;
&lt;p&gt;It is a fundamental premise that data subjects ought to have “inalienable moral rights” about the “integrity” of the data collected about them. But even as UID is one of the best things that could have happened to deepen the democratic process in our society, the often un-remarked fact is that the project has also become the biggest industrial collector of personal information. Considering the size and heterogeneity of the Indian population, it becomes as big as Google, and the implications of this are quite frightening.&amp;nbsp; The UID draft bill, which has to be cleared by Parliament for it to become law, has only perfunctorily looked at the dangers posed by such huge and centralized collection of data. It glosses over the issue, content with making conservative noises about “the interlinking of databases”. This only shows how casual our policy makers, even the most enlightened of them, are towards the whole issue of safeguarding privacy.&lt;/p&gt;
&lt;p&gt;The Bangalore-based Centre for Internet and Society (CIS) has analyzed the draft UID bill in considerable depth. They have identified three main areas where the bill needs to be drastically reworked: (i) plugging all loopholes which would enable corporate organizations from accessing information from the Aadhar database for their own commercial or R &amp;amp; D purposes; (ii) stipulating a maximum period for the data to be stored; (iii) to be transparent about the methods it uses to collect, store and disseminate data.&lt;/p&gt;
&lt;p&gt;Prof Krishnaswamy agreed that the UID bill has not taken the corporate threat seriously enough. He contends that the UID authorities should take small, concrete steps that would act as effective safeguards. “In the mobile phone segment, user information is stored only for six months.&amp;nbsp; Now, the government is proposing a similar time cap for ISP too. But when it comes to UID there is no such time limit.&amp;nbsp; It means personal information could be held perpetually,” he explained. All that UID Assistant Director A K Pandey had to say to this was, “if that is it, then we have to live with it.”&lt;/p&gt;
&lt;p&gt;Another worrying aspect of the proposed bill, according to Usha Ramanathan, an activist and expert on identity and digital issues, is its failure to fix accountability on the main players including enrollers, outsourcing companies, and the UDAI authority itself. “The data collector and data controller should be equally held responsible for the protection of data,” she said.&amp;nbsp; However, UID authorities themselves are of the view that the apprehensions are being overplayed. Pandey maintained that there was nothing in the UID that would compromise the privacy of individuals.&amp;nbsp; “You go to a bank or the LIC office and you give whatever information they ask you. But when it comes to UID alone you say the information you give could be dangerous.&amp;nbsp; We don’t quite understand this,” he retorted. He played down the fears that in the central data storage vital information could go corrupt. “We have taken adequate measures to protect it. We will have a backup,” he said.&lt;/p&gt;
&lt;p&gt;The issue of transparency of data collection and storage remains. The CIS analysts feel that the UID should put out a synopsis of the algorithms it will use in collating and protecting data so that the public at large can be reassured of the firewalls that are in place. Then there is also the issue of not having concrete provisions in the UID bill to deal with special cases like whistleblowers and victims of abuse whose identities need to be protected even more carefully.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The UID authority also bypasses the question of whether it is confusing data protection with the larger issue of protection of privacy. A person’s identity is more than her date of birth, surname, religion, fingerprint or even the sum of these. Such information is basically data and allows governments or corporate bodies to provide a person a nominal identity, one that is indispensable if she is to be part of a socio-political system. The state and corporate entities conveniently deny a person her self, thereby reducing her to a subject instead of seeing each individual as a thinking, acting agency.&lt;/p&gt;
&lt;p&gt;Be that as it may, right now the concern of civil society is to make at least protection of data as foolproof as possible. Aadhaar is just one of the projects that pose a threat to the privacy of individual citizens. There is the broader problem of how the Internet and mobile phones, the popularity of social networking sites such as Facebook and Twitter, and the widespread use of credit and debit cards has led to blatant misuse of personal information gathered online, sharing of consumer data without consent and the state’s own Big Brother surveillance. The need for an effective privacy law in India is imperative.&lt;/p&gt;
&lt;p&gt;Read the original in &lt;a class="external-link" href="http://www.bangaloremirror.com/index.aspx?page=article&amp;amp;sectid=81&amp;amp;contentid=20110102201101020220400536210faa"&gt;Bangalore Mirror&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/unique-identity-crisis'&gt;https://cis-india.org/news/unique-identity-crisis&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-01T17:10:30Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/nel-suk">
    <title>Nel suk dei nativi digitali. Perché gli studenti 2.0 hanno bisogno di una bussola per orientarsi</title>
    <link>https://cis-india.org/news/nel-suk</link>
    <description>
        &lt;b&gt;Addio al vecchio sapere lineare fondato sulla parola scritta e sulla trasmissione di conoscenza maestro-alunno: imparare oggi ha la forma di un suk arabo nell'ora di punta. Tra social network, video-racconti su YouTube, la musica di MySpace, il linguaggio sincopato delle chat e le bufale online, gli studenti di nuova generazione hanno bisogno di una bussola per orientarsi. Ma la scuola non c'è. O meglio, non ce la fa: a studenti 2.0 corrispondono spesso istituti scolastici da secolo scorso.&lt;/b&gt;
        
&lt;p&gt;Chi sono questi famigerati "nativi digitali" nati e cresciuti a rivoluzione Internet compiuta? Come ha scritto l'ex direttore del programma Comparative media studies dell' Mit di Boston, Henry Jenkins, la loro cultura è "partecipativa" e si fonda su "produzione e condivisione di creazioni digitali" e una "partnership informale" tra insegnanti e alunni che porta il bambino a sentirsi responsabile del progetto educativo. Il maestro non è più un trasmettitore di conoscenza ma un "facilitatore", che fa da filtro tra il caos della rete e il cervello del piccolo studente.&lt;/p&gt;
&lt;p&gt;"Frequentano gli schermi interattivi fin dalla nascita", spiega Paolo Ferri docente di tecnologie didattiche e teoria e tecnica dei nuovi media all'Università Bicocca di Milano, "e considerano Internet "il principale strumento di reperimento, condivisione e gestione dell'informazione". È la prima generazione (che oggi ha tra gli o e i 12 anni) veramente hi-tech che pensa, apprende e conosce in maniera differente dai suoi fratelli maggiori.&amp;nbsp; "Se per noi imparare significava leggere-studiare-ripetere, per i bambini cresciuti con i videogames vuol dire innanzitutto risolvere i problemi in maniera attiva", spiega Ferri che studia e promuove da anni il "digital learning".&lt;/p&gt;
&lt;p&gt;I bambini cresciuti con consolle e cellulare sono "abituati a vedere la risoluzione di compiti cognitivi come un problema pragmatico", aggiunge. Lynn Clark direttrice dell' Estlow International Center for Journalism and New Media dell'Università di Denver ha condotto un progetto di ricerca su 300 famiglie americane per capire come se la cavano con i media digitali.&lt;/p&gt;
&lt;p&gt;"Grazie ai videogiochi, il sapere dei bambini si nutre di simboli, sfide e modelli sempre diversi di narrazione", spiega Clark che aggiunge: "quando le modalità di apprendimento scolastico sono simili a quelle di un gioco ci sono maggiori chances che gli alunni apprendano volentieri e in fretta". "Se qualcosa può essere visto, ascoltato, suonato, perché dovrebbe essere raccontato a parole?", si chiede Paolo Ferri.&lt;/p&gt;
&lt;p&gt;Nishant Shah, che a 26 anni dirige il Center for Internet and Society di Bangalore in India, lo spiega così via Skype: "La tecnologia dei nostri padri è quella televisiva: un modello analogico che stabilisce ruoli, responsabilità e struttura della produzione, diffusione e consumo di conoscenza. Con l'esplosione del p2p - l'idea di una rete dove non esiste gerarchia e tutto viene condiviso- i ruoli sono messi in discussione dallo studente, che si considera parte attiva nella produzione di sapere e vede i libri come una fonte tra le tante".&lt;/p&gt;
&lt;p&gt;Se è vero che il "l'ha detto Internet" ha assunto tra i bambini l'autorevolezza di una sentenza della Cassazione, è innegabile che la rete sia la patria del vero-simile. "Internet sta ridisegnando i confini della verità - continua Shah - e questo pone grandi sfide per gli educatori del XXI secolo: come si fa a imparare utilizzando fonti che non hanno approvazione istituzionale? Come si può riconoscere un valido provider di conoscenza nel caos online?".&lt;/p&gt;
&lt;p&gt;Anche il professore della Bicocca ammette che "la cut-and-paste culture e la presunzione di veridicità della Rete" tendono ad abbassare la percezione critica degli utenti: "Internet diventa per i bambini "la fonte" a prescindere dall'autorevolezza del sito e da chi scrive", dice.&lt;/p&gt;
&lt;p&gt;Se passa il modello Wikipedia, crolla l'importanza dell'autore. O, come ha scritto l'antropologa Susan D. Blum sul New York Times, "se per lo studente non è fondamentale essere unico, va bene usare parole di altri. Dice cose a cui non crede? Allora è ok scrivere testi su argomenti sconosciuti con l'unico scopo di prendere un buon voto: conoscere è diventato un mezzo per ottenere consensi e socialità".&lt;/p&gt;
&lt;p&gt;Per il momento le iniziative più interessanti di digital learning riguardano i fratelli più grandi. Dal prossimo anno in 2500 campus universitari americani arriverà un software per pc, iPad e telefonini (il costo va dai 30 ai 70 dollari e il maggiore produttore è la Turning Technologies) chiamato "clickers", che permette all'insegnante di verificare il livello di attenzione dello studente - immerso nella navigazione internet - chiedendo feedback sulla tastiera ogni 15 minuti. Il professore di Harvard Charles Nesson ha tenuto un corso virtuale su Second Life, mentre il progetto di educazione civica "YouMedia", sponsorizzato dall'amministrazione di Chicago, promuove l'apprendimento attraverso video-racconti pubblici di libri.&lt;/p&gt;
&lt;p&gt;Nella Woodside High School, in California, gli studenti hanno borse di studio per comprare l'iPad, un centro multimediale da tre milioni di dollari e lezioni su come registrare la musica e usare Internet in maniera responsabile. Grazie ai computer economici del guru informatico Nicholas Negroponte, tutti i bambini uruguaiani delle elementari hanno un pc.&lt;/p&gt;
&lt;p&gt;In Europa - che ha messo la competenza digitale al quarto posto (dopo prima lingua, lingua straniera e matematica e scienze) tra le competenze chiave per l'educazione degli stati membri dell'Unione - il paese più "nativi digitali oriented" è l'Inghilterra, dove la riforma del sistema scolastico voluta dal governo Blair ha ridotto drasticamente il numero degli studenti per classi, favorendo così la personalizzazione dell'insegnamento, e tagliato il numero delle materie. "Sono passati- sottolinea Paolo Ferri - da un modello disciplinare basato sui contenuti a quello per competenze che si regge su un principio: imparare ad imparare". Ferri ricorda che la lavagna interattiva è presente nel 100% delle classi primarie e secondarie inglesi mentre in Italia si punta ad averne una su dieci entro il 2011. Qui la strada è ancora tutta in salita.&lt;/p&gt;
&lt;p&gt;Il ministero dell'Istruzione porta avanti il progetto LIM, che riguarda l'introduzione di lavagne interattive nelle aule, e quello Cl@ssi 2.0 che punta a finanziare con 30mila euro 156 classi (in Italia ci sono circa 25mila scuole) delle scuole medie inferiori per lo sviluppo di progetti innovativi. "C'è una grande carenza di investimenti dall'alto - denuncia Ferri - arginata da qualche dirigente di buona volontà". Per il professore della Bicocca è a livello territoriale, grazie all'autonomia scolastica e alle capacità manageriali e creative di qualche preside, che si vedono i migliori esperimenti.&lt;/p&gt;
&lt;p&gt;A Bollate, un comune di 37 mila abitanti alle porte di Milano, per imparare a usare l'iPad basta chiedere aiuto a un bambino. Nelle aule dell'Istituto di via Brianza - due scuole elementari e due medie inferiori - al posto di quadernetti e matite, da settembre gli alunni usano il tablet computer prodotto dalla Apple.&lt;/p&gt;
&lt;p&gt;Qualche centinaia di chilometri più a Sud, a Reggio Emilia - la città dove tutti vorrebbero avere 3 anni per quel "Reggio Approach", lodato dal New York Times (parole d'ordine: arte, assemblee di classe e respiro globale), che ha fatto guadagnare al capoluogo emiliano il titolo di capitale mondiale degli asili nido - software, dispositivi elettronici e lavagne interattive hanno ormai sostituito seggioloni e orsacchiotti.&lt;/p&gt;
&lt;p&gt;Bollate e Reggio non sono residui di una bizzarra avanguardia pedagogica, il cui simbolo cinematografico è ancora "Bianca" di Nanni Moretti, con le vicende della scuola "Marylin Monroe" dove al posto della foto del presidente della Repubblica c'e' Dino Zoff e i professori giocano alle slot machines e al flipper. Dimostrano piuttosto che ci sono, anche in Italia, presidi e maestri che hanno capito chi sono e come si educano i nativi digitali.&lt;/p&gt;
&lt;p&gt;"Ma il risultato è quella di una cartina dell'innovazione a macchia di leopardo", dichiara Ferri, che tuttavia si dice ottimista. Da un lato perché "nel 2013 andrà in pensione la metà degli insegnanti italiani", dall'altro perché crede nel contagio positivo: "In 10 anni le scuole al passo con le trasformazioni sociali e tecnologiche, e per questo premiate con finanziamenti e alto numero di iscrizioni, avranno costretto le altre ad adeguarsi". Una speranza? No, un dovere. Perché "innovare innovare innovare", il famoso mantra di Hal Varian di Google News, è l'unica chance di sopravvivenza anche per la scuola italiana.&lt;/p&gt;
&lt;p&gt;Read the original article &lt;a class="external-link" href="http://www.ilsole24ore.com/art/cultura/2011-01-01/nativi-digitali-151924.shtml?uuid=AYcB4RwC"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/nel-suk'&gt;https://cis-india.org/news/nel-suk&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-02T01:31:15Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/tweet-and-poke">
    <title>A Tweet and a poke from the CEO</title>
    <link>https://cis-india.org/news/tweet-and-poke</link>
    <description>
        &lt;b&gt;The official grapevine has moved online, and Twitter is the new water-cooler.&lt;/b&gt;
        
&lt;p&gt;The office grapevine has moved online, and Twitter is the new water cooler.&amp;nbsp; Social media may be all the rage, and every company may want in, but for the majority of Indian companies grappling with the phenomenon, it is proving too tempestuous a beast to control.&lt;/p&gt;
&lt;p&gt;From India alone, for instance, 18 million unique visitors logged on to Facebook in May, each of them posting multiple status messages that often dealt with their places of work. Ban these practices all you like, experts say, but employees will still find ways to log on to social media. Better, then, to ride the wave rather than risk going down with it.&lt;/p&gt;
&lt;p&gt;Some Indian companies have already begun to learn this the hard way. When Infosys Technologies Ltd announced its IRace (Infosys Role and Career Enchancement) programme in April, changing the company’s hierarchy drastically, disgruntled employees lashed out at their company on blogs and Facebook.&lt;/p&gt;
&lt;p&gt;“The company couldn’t do much then, because they didn’t have a social media policy in place,” says Mahesh Murthy, CEO of Pinstorm Consulting and a social media expert. Murthy mentions another large financial services firm that fired employees for commenting on Orkut about internal incentive programmes.&lt;/p&gt;
&lt;p&gt;The time has arrived, then, for companies to institute social media policies—to define, in a sense, what sort of tweet is appropriate and what will earn a black mark. But Indian firms trying to do just this are emerging with very mixed results.&lt;/p&gt;
&lt;p&gt;There are, on the one hand, the fast adopters. Technology and media companies that were the first to run head-on into social media were also, not surprisingly, the first to put basic guidelines in place.&lt;/p&gt;
&lt;p&gt;Wipro Ltd and HCL Technologies Ltd not only have social media policies, they also promote communication and events for their employees on these media. A couple of months ago, the Spirit of Wipro run was promoted in real-time on Twitter and on its official Facebook page. “Wipro became one of the first companies to hold a Twitter conference, for our joint CEO to discuss our diversity initiatives,” says Rajan Kohli, Wipro’s chief marketing officer.&lt;/p&gt;
&lt;p&gt;Also Read The Future of the Internet (&lt;a class="external-link" href="http://www.livemint.com/articles/keywords.aspx?kw=India%20Internet"&gt;Complete Series&lt;/a&gt;)&lt;/p&gt;
&lt;p&gt;HCL has named digital ambassadors who use their social networks and online personas to share ideas and help the company reach out. In HCL’s annual exercise to articulate the company’s vision, employees communicate with the CEO through Facebook. Infosys has formulated its own social media policy now, and is preparing to roll it out over the next six months.&lt;/p&gt;
&lt;p&gt;The other early adopter has been the media sector. As traditional media houses have started to build digital presences, conglomerates such as HT Media Ltd and Bennet, Coleman and Co. Ltd specify what a journalist’s digital avatar can and cannot say online. (Mint has an extensive social media policy for its employees.) Print journalists typically cannot reveal their employer on their Facebook or Twitter pages, or post original opinions.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;But here’s the catch with such a strategy: The Internet is a hard place to be anonymous. “If you are a well-known writer, even if you don’t identify yourself, people can easily put two and two together,” says Nishant Shah, of the Centre for Internet and Society (CIS). “Policies like that are hard to implement and don’t really make sense.”&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;To be sure, there are exceptions; Open, the weekly magazine, looks at Facebook and Twitter as channels to direct traffic to its online content. “We have no policy of employees not identifying themselves on social media or associating themselves with the magazine,” says Rajesh Jha, a deputy editor at &lt;em&gt;Open&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;Another surprisingly prompt responder to social media trends has been the education sector. While most institutions don’t have restrictive policies for public platforms such as Facebook, Twitter and blogs, some have gone in a different direction and created closed networks. Shah argues that a closed network has the same features—and issues—as open social media.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;“These are again peer-to-peer platforms, where teachers and students interact with each other, and any communication has a large audience and gets recorded for posterity,” he says. “This makes it as much of a social medium as Facebook or Twitter.”&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Bangalore’s Christ University has created an institutional repository for every single submission made by students and faculty. Test grades and lesson plans are posted online, and students and teachers communicate through the system. The Indian Institute of Management, Bangalore, has completely digitized its classrooms, so that write-ups on every lesson are available online. Students and teachers co-develop curricula through its platform as well.&lt;/p&gt;
&lt;p&gt;One sector that has been slow to respond to these trends is the outsourcing sector. With annual attrition rates of 50-60%, these firms focus more on turnaround than on investment. Social media websites are typically banned altogether in call centres.&lt;/p&gt;
&lt;p&gt;As social media evolves, ways to leverage it do as well. Large telecom firms such as Bharti Airtel Ltd, Tata Teleservices Ltd and Alcatel-Lucent use Facebook for research and development. Supriya Dhanda, Alcatel-Lucent’s head of human resources, says that her firm encourages “senior leaders...to keep blogs active and use them to promote key messages on strategy, people and operating mechanisms”.&lt;/p&gt;
&lt;p&gt;In the US, a couple of smaller firms have been able to harness social media in innovative ways. Best Buy, an electronics retail chain, aggregates employee activity online, whether on blogs or Twitter, onto a platform called Best Buy Connect. Zappos, which sells shoes and bags online, has a similar Twitter aggregation tool that pulls any tweet mentioning the company. Employees are encouraged to post on the firm’s Facebook and YouTube pages, and its CEO, Tony Hsieh, has at least a million followers on Twitter.&lt;/p&gt;
&lt;p&gt;But Murthy doesn’t necessarily think that Indian firms need to follow in the wake of US firms such as Intel, IBM and CNN, which have clearly defined social media policies. “First, the US is a litigious country and most social media policies there are circumscribed by what corporate lawyers allow employees to say and not say,” he says. “Two, Indian firms can actively use social media as a global marketing tool, especially because it involves no media costs. In the US, firms still look at it largely as a...customer-service function.”&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Shah adds that India doesn’t have a clearly installed legal privacy framework, unlike the US or Australia. “What is public space and what is private is still largely a subject of interpretation,” Shah says. “So we will evolve our own path.”&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Read the original in Livemint &lt;a class="external-link" href="http://www.livemint.com/2010/12/30212513/A-Tweet-and-a-poke-from-the-CE.html?h=B"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/tweet-and-poke'&gt;https://cis-india.org/news/tweet-and-poke&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-02T01:30:17Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/december-2010-bulletin">
    <title>December 2010 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/december-2010-bulletin</link>
    <description>
        &lt;b&gt;Greetings from the Centre for Internet and Society! It gives us immense pleasure to present regular updates on the progress of our research on the mainstream Internet media. In this issue of we bring our latest project updates, news and media coverage:&lt;/b&gt;
        &lt;h2&gt;&lt;b&gt;Researchers@Work&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;RAW is a multidisciplinary research initiative. CIS believes that in order to understand the contemporary concerns in the field of Internet and society, it is necessary to produce local and contextual accounts of the interaction between the Internet and socio-cultural and geo-political structures. To build original research knowledge base, the RAW programme has been collaborating with different organisations and individuals to focus on its three year thematic of Histories of the Internets in India. Monographs arising from these projects are now online for public review:&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Pornography &amp;amp; the Law&lt;/b&gt;&lt;br /&gt;This monograph attempts to unravel the relations between pornography, technology and the law in the shifting context of the contemporary. Deadline for review expires on 15 Jan 2011.&lt;a href="http://bit.ly/f1sQsi"&gt;&lt;br /&gt;http://bit.ly/f1sQsi&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Re:wiring Bodies&lt;br /&gt;&lt;/b&gt;Dr. Asha Achutan historicises the attitudes, imaginations and policies that have shaped the Science-Technology debates in India, to particularly address the ways in which emergence of Internet Technologies have shaped notions of gender and body in India. Deadline for review expires on 15 Jan 2011.&lt;a href="http://bit.ly/gYCP1C"&gt;&lt;br /&gt;http://bit.ly/gYCP1C&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;The Leap of Rhodes or, How India Dealt with the Last Mile Problem — An Inquiry into Technology and Governance&lt;/b&gt;&lt;br /&gt;The project has fed into many different activities in teaching, in examining processes of governance and in looking at user behaviour. The deadline for peer review expires on 15 Jan 2011.&lt;a href="http://bit.ly/iiYJp1"&gt;&lt;br /&gt;http://bit.ly/iiYJp1&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;New Blog Entries&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Internet, Society and Space in Indian Cities&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://bit.ly/h3lWzS"&gt;From the Stock Market to Neighbourhood Mohalla&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://bit.ly/hU6GTL"&gt;Transforming Urbanscapes: ATM in cities&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Queer Histories of the Internet&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://bit.ly/hqrjqc"&gt;A Detour: The Internet and Forms of Narration: A Short Note&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Digital Natives&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;CIS has interest in developing Digital Identities as a core research area and looks at practices, policies and scholarships in the field to explore relationships between Internet, technology and identity.&lt;/p&gt;
&lt;h3&gt;Columns on Digital Natives&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A fortnightly column on ‘Digital Natives’ authored by Nishant Shah is featured in the Sunday Eye, the national edition of Indian Express, Delhi, from 19 September 2010 onwards. The following articles were published in the Indian Express recently:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://bit.ly/ig08Dr"&gt;Make a Wish&lt;/a&gt; [published on 19 December 2010]&lt;/li&gt;
&lt;li&gt;&lt;a href="http://bit.ly/hRHUYu"&gt;Play Station&lt;/a&gt; [published on 5 December 2010]&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Workshop&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The third and final workshop in the Digital Natives with a Cause? research project will take place in Santiago, Chile, from the 8 to 10 February. Open Call and FAQs for the workshop are online:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://bit.ly/emKslL"&gt;Digital Natives with a Cause? Workshop in Santiago – An Open Call&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://bit.ly/eCu2it"&gt;Digital Natives with a Cause? Workshop in Santiago – Some FAQs&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Publication&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Position papers from the Thinkathon conference held at Hague from 6 to 8 December have been published:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://bit.ly/eVYR2h"&gt;Digital Natives with a Cause? Thinkathon: Position Papers&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Accessibility&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Estimates of the percentage of the world's population that is disabled vary considerably. But what is certain is that if we count functional disability, then a large proportion of the world's population is disabled in one way or another. At CIS we work to ensure that the digital technologies, which empower disabled people and provide them with independence, are allowed to do so in practice and by the law. To this end, we support web accessibility guidelines, and change in copyright laws that currently disempower the persons with disabilities.&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;National Award&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Nirmita Narasimhan got a National Award for Empowerment of Persons with Disabilities from the Government of India on 3 December 2010. The award was presented by Smt. Pratibha Patil, President of India under the Role Model category. The event was telecast live on Doordarshan.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://bit.ly/fKG9MH"&gt;Nirmita Narasimhan wins National Award&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Conference Report&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;An international conference on Enabling Access to Education through ICT was held in New Delhi from 27 to 29 October 2010. The full report of the conference is published online:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://bit.ly/eDHXyq"&gt;Enabling Access to Education through ICT - Conference Report&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;New Blog Entries&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://goo.gl/ddMBN"&gt;Accessibility at CIS – Looking back at 2010&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://bit.ly/igUi8H"&gt;G3ict-GW Global Policy Forum: "ICT Accessibility: A New Frontier for Disability Rights"&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Intellectual Property&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Copyright, patents and trademarks are the most important components on the Internet. CIS believes that access to knowledge and culture is essential as it promotes creativity and innovation and bridges the gaps between the developed and developing world positively. Hence, the campaigns for an international treaty on copyright exceptions for print-impaired, advocating against PUPFIP Bill, calls for the WIPO Broadcast Treaty to be restricted to broadcast, questioning the demonization of 'pirates', and supporting endeavours that explore and question the current copyright regime. Our latest endeavour has resulted into these:&lt;/p&gt;
&lt;h3&gt;New Blog Entries&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://bit.ly/glBYTS"&gt;Problems Remain with Standing Committee's Report on Copyright Amendments&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://bit.ly/hq9OZO"&gt;CIS Submission on Draft Patent Manual 2010&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Openness&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;CIS believes that innovation and creativity should be fostered through openness and collaboration and is committed towards promotion of open standards, open access, and free/libre/open source software, its latest involvement have yielded these results:&lt;/p&gt;
&lt;h3&gt;Reports&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://bit.ly/eKUKIY"&gt;Call for Comments for Report on the Online Video Environment in India&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://goo.gl/wr8Td"&gt;Call for Comments for Report on Open Government Data in India&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Event&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://bit.ly/hQAUkg"&gt;Wikipedia Meetup in Bangalore, This time in TERI&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;b&gt;Privacy&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;CIS is doing a couple of projects, one Privacy in Asia which is supported by Privacy International, UK and the other on Privacy and Identity which is funded by Ford Foundation and managed by the Centre for Study of Culture and Society. The project is a research inquiry into the history of privacy in India and how it shapes the contemporary debates around technology mediated identity projects like &lt;i&gt;Aadhar&lt;/i&gt;.&lt;/p&gt;
&lt;h3&gt;New Blog Entries&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://bit.ly/hYUmVK"&gt;The Privacy Rights of Whistleblowers&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://bit.ly/hcP9lI"&gt;UID &amp;amp; Privacy - A Call for Papers&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://bit.ly/esjtL7"&gt;Should Ratan Tata be Afforded the Right to Privacy?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://bit.ly/h0Vdz3"&gt;DSCI Information Security Summit 2010 – A Report&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Telecom&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The growth in telecommunications in India has been impressive. While the potential for growth and returns exist, a range of issues need to be addressed for this potential to be realized. One aspect is more extensive rural coverage and the second aspect is a countrywide access to broadband which is low at about eight million subscriptions. Both require effective and efficient use of networks and resources, including spectrum. It is imperative to resolve these issues in the common interest of users and service providers. CIS campaigns to facilitate this.&lt;/p&gt;
&lt;h3&gt;Articles by Shyam Ponappa&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Shyam Ponappa is a Distinguished Fellow at CIS. He writes regularly on Telecom issues in the Business Standard and these articles are mirrored on the CIS website as well.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://bit.ly/fNADQo"&gt;Take 'Model T' for Telecom&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;News &amp;amp; Media Coverage&lt;/b&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://bit.ly/h8TJwF"&gt;An online community platform for people with different needs&lt;/a&gt; (Sify News, 12 December 2010)&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://bit.ly/fF3Y6V"&gt;Self-regulation in media and society meet to gain legal perspectives&lt;/a&gt; (Indiantelevision.com, 13 December 2010)&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://bit.ly/e3gZGz"&gt;This Is All India Radia&lt;/a&gt; (Outlook, 6 December 2010)&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://bit.ly/gYrF7h"&gt;'Pakistan' hackers target India's top police agency&lt;/a&gt; (Google News, 4 December 2010)&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://bit.ly/gBMFzY"&gt;Intellectual Property Rights as seen in a graphic novel&lt;/a&gt; (TimeOut Bengaluru, 1 December 2010)&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://bit.ly/fa4qcy"&gt;The Niira Radia Tapes: Scrutinizing the Snoopers&lt;/a&gt; (The Wall Street Journal, 29 November 2010)&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://bit.ly/gWEkKw"&gt;Mobile banking set to get a boost from IMPS&lt;/a&gt; (The Hindu, 28 November 2010)&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://bit.ly/gjyNbF"&gt;UID elicits mixed response&lt;/a&gt; (Deccan Herald, 23 November 2010)&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://bit.ly/hcrAd2"&gt;Time to bury e-mail?&lt;/a&gt; (DNA, 21 November 2010)&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Follow us elsewhere&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Get short, timely messages from us on &lt;a href="http://twitter.com/cis_india"&gt;Twitter&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Follow CIS on &lt;a href="http://identi.ca/main/remote?nickname=cis"&gt;identi.ca&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Join the CIS group on &lt;a href="http://www.facebook.com/group.php?gid=28535315687"&gt;Facebook&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Visit us at &lt;a href="http://www.cis-india.org"&gt;www.cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Looking forward to hearing from you. Please feel free to write to us for any queries or details required. If you do not wish to receive these emails, please do write to us and we will unsubscribe your mail ID from the mailing list.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/december-2010-bulletin'&gt;https://cis-india.org/about/newsletters/december-2010-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>CISRAW</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2012-08-07T11:28:02Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/events/privacy-matters">
    <title>Privacy matters</title>
    <link>https://cis-india.org/events/privacy-matters</link>
    <description>
        &lt;b&gt;Privacy India invites individuals to attend “Privacy Matters”, a one-day conference on 23 January 2011 at the WB National University of Juridical Sciences (NUJS) Law School in Kolkata.  Privacy India, Society in Action Group and the Centre for Internet &amp; Society have joined hands to organize this.&lt;/b&gt;
        
&lt;p&gt;The conference will focus on discussing the challenges to privacy that India is currently facing. The right to privacy in India has been a neglected area of study and engagement. Although sectoral legislation deals with privacy issues, e.g., the TRAI Act for telephony or RBI Guidelines for Banks, India does not as yet have a &lt;em&gt;horizontal&lt;/em&gt; legislation that deals comprehensively with privacy across all contexts. This lack of uniformity has led to ironically imbalanced results. In India today one has a stronger right to privacy over telephone records than over one’s own medical records.&amp;nbsp; The absence of a minimum guarantee of privacy is felt most heavily by marginalized communities, including HIV patients, children, women, sexuality minorities, prisoners, etc. – people who most need to know that sensitive information is protected.&lt;/p&gt;
&lt;p&gt;The emergence of information and communications technologies over the past two decades has radically transformed the speed and costs of access to information. However, this enhanced climate of access to information has been a mixed blessing. Whilst augmenting our access to knowledge, this new networked information economy has also now made it much easier, quicker, and cheaper to gain access to intimate personal information about individuals than ever before. As people expose more and more of their lives to others through the use of social networks, reliance on mobile phones, global trade, etc., there has emerged a heightened risk of privacy violations in India.&amp;nbsp; As privacy continues to be a growing concern for individuals, nations, and the international community, it is critical that India understands and addresses the questions, challenges, implications and dilemmas that violations of privacy pose.&lt;/p&gt;
&lt;h3&gt;Who We Are&lt;/h3&gt;
&lt;p&gt;Privacy India was set up in collaboration with the Centre for Internet &amp;amp; Society (CIS), Bangalore and Society in Action Group (SAG), under the auspices of the international organization ‘Privacy International’.&amp;nbsp; Privacy International is a non-profit group that provides assistance to civil society groups, governments, international and regional bodies and the media and the public in a number of countries (see www.privacyinternational.org).&amp;nbsp; Its Advisory Board is made up of distinguished intellectuals, academicians, thinkers and activists such as Noam Chomsky, the late Harold Pinter, and others, and it has collaborated with organizations such as the American Civil Liberties Union (ACLU).&lt;/p&gt;
&lt;p&gt;Download the &lt;a href="https://cis-india.org/advocacy/igov/privacy-nujs-conference" class="internal-link" title="Privacy Conference at NUJS"&gt;poster&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;" Privacy Matters" Conference Agenda&lt;/h3&gt;
&lt;table class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Time &lt;br /&gt;&lt;/th&gt;
&lt;th&gt;Item&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;10:30 &lt;br /&gt;11:00&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Welcome: Rajan Gandhi&lt;br /&gt;a.&amp;nbsp;&amp;nbsp; &amp;nbsp;Who is PI &lt;br /&gt;b.&amp;nbsp;&amp;nbsp; &amp;nbsp;What are our objectives &lt;br /&gt;c.&amp;nbsp;&amp;nbsp; &amp;nbsp;Why is privacy important in India &lt;br /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:00 &lt;br /&gt;11:30&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Keynote: Sudhir Krishnaswamy&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:30&amp;nbsp; 11:45&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Tea Break&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:45 &lt;br /&gt;1:00&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Session I: Prashant Iyengar and Elonnai Hickok &lt;br /&gt;a.&amp;nbsp;&amp;nbsp; &amp;nbsp;Personal privacy: Violations and Indian legislation that addresses these violations &lt;br /&gt;
&lt;blockquote&gt;
&lt;ul&gt;&lt;li&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Case study: Nira Radia and wiretapping &lt;/li&gt;&lt;/ul&gt;
&lt;/blockquote&gt;
b.&amp;nbsp;&amp;nbsp; &amp;nbsp;Informational privacy: Violations and Indian legislation that addresses these violations &lt;br /&gt;
&lt;blockquote&gt;
&lt;ul&gt;&lt;li&gt;&amp;nbsp;Case study: The proposed data protection legislation in India &lt;/li&gt;&lt;/ul&gt;
&lt;/blockquote&gt;
c.&amp;nbsp;&amp;nbsp; &amp;nbsp;What is the existing vacuum in Indian legislation&amp;nbsp; concerning&amp;nbsp; privacy &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1:00&amp;nbsp; &lt;br /&gt;2:00&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Lunch &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2:00&lt;br /&gt;3:30&lt;/td&gt;
&lt;td&gt;Session II: Prashant Iyengar, Deva Prasad, Amba Kak &lt;br /&gt;a.&amp;nbsp;&amp;nbsp; &amp;nbsp;Identity and privacy: why does it matter &lt;br /&gt;b.&amp;nbsp;&amp;nbsp; &amp;nbsp;International approaches to identity &lt;br /&gt;c.&amp;nbsp;&amp;nbsp; &amp;nbsp;The UID and privacy &amp;nbsp;&lt;br /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3:30 &lt;br /&gt;3:45&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Tea Break&lt;br /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3:45 &lt;br /&gt;4:30&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Open discussion and opinion sharing&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;strong&gt;&lt;a href="https://cis-india.org/advocacy/igov/privacy-nujs-conference" class="internal-link" title="Privacy Conference at NUJS"&gt;VIDEOS&lt;br /&gt;&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYKkt04A"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYKkukgA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYKmo38A"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYKm4S0A"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYKn3R8A"&gt;&lt;/embed&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/privacy-matters'&gt;https://cis-india.org/events/privacy-matters&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-04T07:22:24Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy/uid-reflects-india">
    <title>Does the UID Reflect India? </title>
    <link>https://cis-india.org/internet-governance/blog/privacy/uid-reflects-india</link>
    <description>
        &lt;b&gt;On December 17th the Campaign for No UID held a press conference and public meeting in Bangalore. Below is a summary and analysis of the events. &lt;/b&gt;
        
&lt;h3&gt;Introduction&lt;/h3&gt;
&lt;p&gt;Scientifically speaking, we are each unique.&amp;nbsp; We have unique bodies and minds, and these give rise to unique understandings,&amp;nbsp; interactions, and perceptions. Despite being unique, we can be put into different categories and classes, one of which is a culture.&amp;nbsp; A culture is defined by its values, which are reflected in its legal system. Consequently legal systems are always changing – bills are constantly being amended, passed, and retracted in order to make the governing legal structure reflect the ethos of that society. Thus, when analyzing a piece of legislation it is important to ask if that bill is meaningful in a way that&amp;nbsp;&amp;nbsp; reflects the ideas, values, attitudes, and expectations that a society has.&amp;nbsp; This is the&amp;nbsp; question that Usha Ramanathan, Mathew Thomas, and others in the Campaign for No UID have been asking about the UID project, and&amp;nbsp; urged the public to ask the same question in the press conference and public meeting held on the 17th of December. According to the Campaign for No UID, the project and Bill fail to reflect and meet the current needs that exist in India. The UID Bill, the proposed legislation for the project, authorizes the creation of a centralized database of unique identification numbers that are to be issued to every resident of India. The numbers will act as identity. Recently, the Bill was sent to the Parliamentary Standing Committee on Finance, and is scheduled to be enacted in early 2011.&amp;nbsp; The UID project is attempting to create a technological solution to the identification problem in India. It is well-known that India faces challenges in identifying its citizens and residents. Individuals either have no identification – restricting their access to society and benefits -- or, in some cases, they have multiple identities, therefore taking advantage of society at the expense of others, or a person does not have any identification – therefore escaping civil duties.&amp;nbsp; The confusing identity system that exists in India has many negative drawbacks including the facilitation of corruption, illegal immigration, and possible security threats. The UID project attempts to provide a system of identity that is based on individuals’ biometrics, and that places the whole of India on a grid through the issuance of 12 digit &lt;em&gt;Aadhaar&lt;/em&gt; numbers. The Campaign for NO UID&amp;nbsp; does not deny the need for an efficient identity system, is not against technology, and does not deny that the current identity system has problems.&amp;nbsp; Instead, it believes that the project does not adequately address the issues at hand, while at the same time creating a real prospect of harmful ramifications.&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Benefits for the Poor&lt;/h3&gt;
&lt;p&gt;Though the UID project only gives identity to an individual, it has been envisioned as a means of ensuring the delivery of benefits to the poor. According to the World Bank, within India 41% of the population lives below the poverty line, and targeting the need to ensure benefits for the poor is an appropriate vision. Furthermore, as reflected in the Right to Food Act, there is a cultural understanding and expectation that the State needs to work to bring benefits to the poor. The point that Ms. Ramanathan draws attention to, though, is that the goal of bringing benefits to the poor is just a vision. The project and the Bill are not structured in a way that guarantee benefits to the poor. Instead, by trying to include the perception of this benefit, the language of the Bill has become too broad. The wide-sweeping language allows room for abuse of how information that is collected will be used.&lt;/p&gt;
&lt;h3&gt;Appropriate Methodology&lt;/h3&gt;
&lt;p&gt;Ms. Ramanathan also questions the methodology of the UID project. The collection of biometrics is not an absolute insurer of identity, in the way that DNA would be. A person’s biometrics are in fact very public. They are left on anything one touches, and can easily be reproduced for use by others. Identity theft is thus easily accomplished if biometrics are the only safeguard. Realistically, the vast majority of India’s population would not know what to do or how to seek redress if identities were stolen – indeed, many would not even be aware of the fact that their identity had been stolen. Thus, the project establishes a hierarchy of vulnerability. Those who understand and have access to technology and the legal system are better able to protect their identity (or abuse another’s), and the rest of the population&amp;nbsp; is at the mercy of the people who possess that knowledge and those connections.&lt;/p&gt;
&lt;h3&gt;Legal Questions&lt;/h3&gt;
&lt;p&gt;Ms. Ramanathan also brought up a few legal issues with the UID Bill. Most importantly she pointed out that the UID project is not legal, yet enrollment of individuals has been taking place. Not only is this action undemocratic, but it is presumptuous of the UIDAI to assume that their project will have legal validity. Another legal issue raised by Ms. Ramanathan was in concern with the compulsory nature of the &lt;em&gt;Aadhaar&lt;/em&gt; number. Legally the UID Bill does not make the &lt;em&gt;Aadhaar&lt;/em&gt; number compulsory. Instead, the project is structured in such a way that the UID number is socially compulsory.&amp;nbsp; Ms. Ramanathan argues that this is unfair of the UIDAI. If the number were to be truly voluntary, the UID would need to include clauses that prohibit the denial of goods, services, entitlements and benefits for lack of a UID number.&amp;nbsp; An individual would need to be able to access benefits with alternative forms of identification before the &lt;em&gt;Aadhaar&lt;/em&gt; number would be truly voluntary.&lt;/p&gt;
&lt;h3&gt;Does India Comprehend what the UID Could Bring?&lt;/h3&gt;
&lt;p&gt;Another fear voiced by Mrs. Ramanathan in her presentation was the level of public comprehension. Even though the project will touch the lives of every human being who comes to India, the majority of the Indian population has not thought through why they support or do not support the project, and most do not comprehend the dangerous implications of the UID project. Connections are not being made and clearly publicized about how the project could be used in the future.&amp;nbsp; For example, once everyone has a set of personal data that is uploaded on a centralized database, there is a new concern over that data. What is happening to it, who is using it, what is it being used for, who is seeing it, who is analyzing it, what happens if that data is lost? One of the serious implications of the project is&amp;nbsp; its’ threat to anonymity.&amp;nbsp; Anonymity results when the personal identity, or personally identifiable information of a person is not known.&amp;nbsp; Anonymity already exists today in Indian society by default.. This will change, though, with the UID. One’s body will become a traceable marker that will be readily identifiable to law enforcement and other agencies. By issuing numbers to each person, that will be used for every transaction – it will be possible to create a map of the population and tag information about individuals in a way that changes the relationship between the state and the people. Though it is true India could benefit from a lesser degree of anonymity. For instance corruption might be easier to control. The Bill takes no steps, though, to ensure under what conditions anonymity will be preserved. Thus, the project has the potential to be widely misused for intensive surveillance and the policing of populations – not just for illegal activity but for disfavored or unpopular activity as well.&lt;/p&gt;
&lt;h3&gt;Conclusion&lt;/h3&gt;
&lt;p&gt;One way to avoid the misuse of data is through the adherence to privacy standards such as how data should be processed, transferred etc. India does not of yet have such a privacy law, and such principles are not reflected in the text of the Bill itself. The fact that the UID bill and project bring into focus principles that are not yet fully reflected in the social and legal framework of society can be problematic. On one hand this Bill can push India to adopt those principles, in which case a data protection and privacy bill must be enacted, and awareness must be raised.&amp;nbsp; On the other hand, the Bill can simply overshadow the populace, allowing significant violations of privacy and anonymity to take place with no assurance of redress.&amp;nbsp; As Ms. Ramanathan noted, even though the project is not reflective of Indian society, the way in which the project is being marketed is. The project has been tied to the image of Nandan Nilekani, and the message is clear: the project must be good. The Campaign for No UID is asking the public to look beyond the face of the project, and consider whether or not this is the India they imagine.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy/uid-reflects-india'&gt;https://cis-india.org/internet-governance/blog/privacy/uid-reflects-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-03-22T05:45:32Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/kids-music-fashion-on-net">
    <title>Mothers discuss kids, music, fashions, on Net</title>
    <link>https://cis-india.org/news/kids-music-fashion-on-net</link>
    <description>
        &lt;b&gt;Among the many conversations about behavioural problems seen among teenage children and the benefits of organic foods, there is one that raves about a baby-sitter who takes care of pets too, and one that reviews newly opened art classes in the city. These are not the usual face-to-face discussions among women at a gathering, but threads that run on parenting websites and ‘mommy' blogs that have captured the imagination of many mothers in Chennai.

&lt;/b&gt;
        
&lt;p&gt;Many parenting forums register more than a thousand threads of interaction each every day from the city alone, with a variety of localised pages on Yahoo, Facebook, and netlog dedicated to facilitate communication between mothers.&lt;/p&gt;
&lt;p&gt;Baby growth charts, immunisation schedules, home-made remedies, reviews of schools, summer camps, information on doctors and a collection of articles from the mothers themselves — these forums have it all.&lt;/p&gt;
&lt;p&gt;Many mothers feel that going through related threads on various parenting sites before attending the PTA meetings helps to know what rest of the parents feel about issues.&lt;/p&gt;
&lt;p&gt;“My daughter does not like me talking to her classmates' parents at meetings; discussing online helps to talk to parents without the interference of children,” says Shobana Mahadevan, a blogger and a mother.&lt;/p&gt;
&lt;p&gt;Discussing concerns, especially those regarding increase in fees, change in examination patterns, homework, and school announcements with hundreds of other mothers on the internet helps them understand matters at hand and form opinions, she says.&lt;/p&gt;
&lt;p&gt;Many of these forums have threads on car-pooling in selected areas where parents decide on turns to drop children at schools.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Subbiah Arunachalam, a distinguished fellow at the Centre for Internet and Society, says that with the computer finding its way into many urban households, an increasing number of mothers are focussing more on their children's performance in school.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;The social network they form on the net provides the mothers a platform to be “collectively enlightened” about everything from culinary innovations to popular music and fashion trends, he says.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;On “Babycentre”, a forum that monitors child's growth and gives regular inputs on expected child behaviour, Sangeetha Vijay (38), mother of a two-year-old says,&lt;/p&gt;
&lt;p&gt;“It is like an elderly person helping you get prepared for everything from teething problems to allergies in children.”&lt;br /&gt;&lt;br /&gt;Many mothers say that though communication on parenting forums starts out as a medium to interact with those who share similar concerns, it soon goes beyond the confines of the internet. “We have groups of ‘internet mothers' who often meet, hold competitions and spend time together,” says Penithia Selvi (32), mother of a five year old girl.&lt;/p&gt;
&lt;p&gt;“These sites and blogs give mothers a platform to write, discuss their interests and talk openly, which is a priceless experience,” she adds.&lt;/p&gt;
&lt;p&gt;“It is very much an urban phenomenon,” says Savithri. J., child counsellor with schools, “Since many working mothers have access to the internet for more hours, they try tracking their children's activities, and also explore the net in their own way,” she says. Many concerns such as addiction to gaming seen among children, are better discussed with mothers who experience similar problems, says Ranjitha Kumaran (32).&lt;/p&gt;
&lt;p&gt;“Since mothers as young as 23 to those in their sixties share their experiences on these sites, the issues are approached with a lot of sensitivity and understanding,” she says.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Read the original in the &lt;a class="external-link" href="http://www.thehindu.com/sci-tech/internet/article979462.ece"&gt;Hindu&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/kids-music-fashion-on-net'&gt;https://cis-india.org/news/kids-music-fashion-on-net&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-02T01:25:28Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy/privacy-wikilileaks-whistleblowers">
    <title>The Privacy Rights of Whistleblowers </title>
    <link>https://cis-india.org/internet-governance/blog/privacy/privacy-wikilileaks-whistleblowers</link>
    <description>
        &lt;b&gt;The recent disclosures from Wikileaks have shown that the right to information, whistle-blowing, and privacy are interconnected. This note looks at the different ways in which the three are related, as well as looking at the benefits and drawbacks to Wikileaks in terms of privacy. &lt;/b&gt;
        
&lt;h3&gt;Introduction&lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;In a recent interview, the Canadian Privacy Commissioner was quoted as saying “Information and the manipulation of information is the key to power. Those who can control the information can influence society enormously.” History and present-day society have both proven the truth in this statement. It is one among many reasons that the right to information is important to uphold. In India, and in other countries, there are statutes – in India, the Right To Information Act – that entitles the public to request and receive information that pertains to public bodies and their conduct, information that is publicly available because it is intrinsically related to the public interest.&amp;nbsp; An entirely separate but equally critical way in which the public is kept informed is through whistle-blowing. Traditionally, whistle-blowing is any disclosure made in the name of public interest.&amp;nbsp; Recent events such as the Ratan Tata case and the leaks of US diplomatic cables have brought to light the relationship between the public’s right to information, the rights of whistleblowers, and the rights of individuals to privacy. These recent cases have shown that the right to information, whistle-blowing, and the right to privacy are interconnected, because privacy can provide individuals with the means to sustain autonomy against potentially overwhelming forces of government and persons who might have mixed motivations. The right to information and whistle-blowing are means by which the government is held accountable to the public if they violate the law or the public trust. The Wikileaks case and the Ratan Tata case raise important questions about when those two interests need to give way to private interests. One of the key questions that Wikileaks raises is:&amp;nbsp;if&amp;nbsp; whistleblowing is supposed to be disclosure in the public interest -- i.e., to protect the public – should disclosure of personal information be permissible only if a person can demonstrate that he/she is trying to remedy or avoid actual wrongdoing rather than simply publishing information that is "interesting to the public?"&lt;/p&gt;
&lt;h3&gt;What is a Whistleblower and how does a Whistleblower Benefit from Wikileaks? &lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;Whistleblowing is the modern counterpart to “informers” – people who reveal others’ wrongdoing. Much whistleblowing occurs by going "up the chain" in a person's own department or agency or company.&amp;nbsp; If the person is reporting wrongdoing and the person ultimately goes to the authorities about illegal activity, the individual reporting the leak can sometimes get immunity for his or her own actions, can sometimes collect part of the penalties, and can under certain statutes in some countries even bring suit if the company retaliates against him -- for example, by firing him.&amp;nbsp; In this way traditional whistleblowing places the responsibility for legal and ethical conduct on employees who are better situated to see wrongdoing than outsiders would be. In many countries, a person may present information of a whistleblowing nature to a judicial body. The judicial body then determines the validity of the information, the degree of public interest involved, and the proper form of redress to be taken. The judicial body offers legal protection to the whistleblower.&amp;nbsp; Another method of whistleblowing is to leak information to the press.&amp;nbsp; Once information is in the public domain – at least if there is freedom of press -- the information can no longer be covered up. Neither the right to free press, nor the right to protection as a whistleblower is universal. The current critique of the Indian Whistle Blowing Bill is that the right to protection will not be ensured. A Times of India article issued in September 2010&amp;nbsp; pointed out that the Whistle Blowing Act’s biggest weakness is that the Bill’s Central Vigilance&amp;nbsp; Commission is designated to play both the role as competent authority to deal with complaints file by whistleblowers and as the tribunal to protect whistleblowers. Structuring the power to allow one body to fulfil both functions runs the risk of bias and could breed distrust that would cause people to avoid the system altogether. The article complained that the Bill has no teeth, and that even if the Commission believes that the whistleblowing is valid, it is able only to give advice rather than actually to prosecute individuals. The article recites extreme instances in which individuals have blown the whistle and paid for it with their lives. For example: in 2005 a manager of the Indian Oil Corporation was killed after exposing a scheme in adulterated petrol, and in 2010 an RTI activist was killed after exposing land scams in Mahrashtra.&amp;nbsp;&amp;nbsp; In these situations, Wikileaks is an interesting and powerful tool for individuals who either do not want to leak their information to a judicial body or are not protected if they do so in their own country. Leaking information to Wikileaks is in one sense analogous to leaking information to the press, but it is not precisely the same because it is not a news media outlet, but instead is a way for a person to post information on a mass media outlet. It should be noted, however, that informants who leak to Wikileaks are not afforded the same immunity that individuals who leak to authorities are granted. When an individual shares documents or information with Wikileaks, the site in turn acts as a platform to publish the information on the web and with the press.&amp;nbsp; Being an independent entity that is neither tied down to a certain territory, government, or entity – Wikileaks has the pull of non-bias. But the strength of Wikileaks is also its weakness.&amp;nbsp; When 250,000 diplomatic cables were posted, there was no one who understood the context of the content to monitor to ensure that everything was appropriate to post.&amp;nbsp; As a result, the information was transmitted to an audience who normally would not be entitled to it.&amp;nbsp; By doing so, the leaked information placed individual diplomats in precarious positions that could potentially put them in harm’s way and unnecessarily damage their reputations, as well as putting the reputation of the United States on the line.&lt;/p&gt;
&lt;h3&gt;Privacy and Whistleblowing&lt;/h3&gt;
&lt;p&gt;As a result the United States is looking to press charges against Julian Assange, founder of Wikileaks,&amp;nbsp; for espionage.&amp;nbsp; The way in which Wikileaks leaked information&amp;nbsp; and the nature of the leak has brought privacy into the picture. When looking at the act of whistleblowing through the lens of privacy, there are obvious privacy concerns for the whistleblower, for the person or entity whose information has been leaked, and for possible third parties involved.&amp;nbsp; Paul Chadwick, the Victorian Privacy Commissioner, pointed out that for the whistleblower the main privacy concerns include the individual’s identity, safety, and reputation. For the alleged wrongdoer the privacy concerns include: identity, safety, employment, and liberty (where sanctions may include imprisonment). For third parties, reputation and safety can both be jeopardized by disclosures by whistleblowers. The Wikileaks leaks squarely present the question whether intent should be brought into the analysis of privacy and whistleblowers.&amp;nbsp; If a whistleblower is disclosing with the intent protect the public, the protections afforded to this person should weigh differently against the privacy interests of alleged wrongdoers and third parties than for someone who is simply defining the public interest as “interesting to the public,” or, worse, as seen in the false leak by Pakistan against India, is looking to leak information to disrupt public interest.&amp;nbsp; Even though Wikileaks works to protect the anonymity of individuals who leak information, it is not bound by any law to protect the privacy of individuals involved in the leak. The concept behind Wikileaks is important. By interacting with government information, it has the ability to bring accountability and transparency to governments, but the only regulation over Wikileaks is internal (and thus inherently subjective).&amp;nbsp; Wikileaks needs to change its structure to take into account leaks shared without the intent of protecting the public interest and even then needs to monitor to prevent leaks that could place individuals in precarious situations or damage reputations with no validating information.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Sources:&lt;/h3&gt;
&lt;ul&gt;&lt;li&gt;&amp;nbsp;http://www.ctv.ca/generic/generated/static/business/article1833688.html&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;&amp;nbsp;Chadwick, Paul. Whistleblowing, Transparency, and Privacy: Aspects of the relationship between Victoria’s Whistleblowers Protection Act and the Information Privacy Act. &lt;/li&gt;&lt;/ul&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy/privacy-wikilileaks-whistleblowers'&gt;https://cis-india.org/internet-governance/blog/privacy/privacy-wikilileaks-whistleblowers&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-03-22T05:47:16Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/police-agency-targetted">
    <title>'Pakistan' hackers target India's top police agency</title>
    <link>https://cis-india.org/news/police-agency-targetted</link>
    <description>
        &lt;b&gt;Cyber-attackers who identified themselves as the "Pakistan Cyber Army" have hacked the website of India's top police agency, officials said on Saturday. The website of the Central Bureau of Investigation (CBI) was hacked by programmers who left a message saying that the attack was in revenge for similar Indian assaults on Pakistani sites, Press Trust of India said. The hackers signed their message on the Indian police website: "Long Live Pakistan."&lt;/b&gt;
        
&lt;p&gt;CBI authorities said they were working to restore the site, which offered information to the public.&lt;/p&gt;
&lt;p&gt;The spokeswoman said she could not comment on Indian media reports that more than 200 other Indian sites had also been attacked by Pakistani hackers.&lt;/p&gt;
&lt;p&gt;"We came to know the CBI site had been compromised Friday night," the spokeswoman told AFP, asking not to be named. "It will take us a couple of days to restore the site."&lt;/p&gt;
&lt;p&gt;She said she could not immediately say who was responsible for the attack.&lt;/p&gt;
&lt;p&gt;The CBI has "registered a case" and is investigating the attack, she said.&lt;/p&gt;
&lt;p&gt;The message posted on the CBI site said the attack was "in response to the Pakistani websites hacked by 'Indian Cyber Army'," the Press Trust of India (PTI) reported.&lt;/p&gt;
&lt;p&gt;"Hacked hahaa funny," the message said. "Let us see what you investigating agency so called CBI can do" (sic).&lt;/p&gt;
&lt;p&gt;Hackers had also infiltrated the server of the National Informatics Centre (NIC), which maintains most of the government's websites, PTI reported.&lt;/p&gt;
&lt;p&gt;In August, a group also calling itself the "Pakistan Cyber Army" hacked into the website of independent Indian MP Vijay Mallya, a flamboyant liquor baron, who is also head of Kingfisher Airlines.&lt;/p&gt;
&lt;p&gt;The group claims to have hacked a number of Indian websites in recent years, including India's state-run Oil and Natural Gas Corporation, in retaliation for Indian hackers accessing Pakistan sites.&lt;/p&gt;
&lt;p&gt;Indian IT specialists have long lamented what they say is a lack of awareness about Internet security across the country, including in the corridors of power.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Sunil Abraham, executive director of the Bangalore-based Centre for Internet and Society, said it would have been easy for attackers to get into the CBI public site as it was "not a particularly sensitive" one.&lt;/p&gt;
&lt;p&gt;The Indian government "has a very low level of cyber awareness and cyber security. We don't take cyber security as seriously as the rest of the world," he said.&lt;/p&gt;
&lt;p&gt;He added that the government needed to "make at least 10 times the current level of investment to get their standards to match the rest of the world."&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;According to the Indian Computer Emergency Response Team, a government agency that tracks IT security issues, more than 3,600 Indian websites were hacked in the first six months of this year.&lt;/p&gt;
&lt;p&gt;Read the original news &lt;a class="external-link" href="http://www.google.com/hostednews/afp/article/ALeqM5jFVJWh2e2-i7-ll6pAuGUOsETcbQ?docId=CNG.eb6f793d7e091dc5315bb6b6cbcea713.551"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/police-agency-targetted'&gt;https://cis-india.org/news/police-agency-targetted&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-02T01:26:57Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/self-regulation">
    <title>Self-regulation in media and society meet to gain legal perspectives</title>
    <link>https://cis-india.org/news/self-regulation</link>
    <description>
        &lt;b&gt;With electronic media generally expressing its opposition to government imposed regulations, a two-day workshop is being organised here from tomorrow on 'Comparative Perspectives on Media Self-Regulation and Society'.&lt;/b&gt;
        
&lt;p&gt;The workshop will explore international and comparative perspectives on media regulation as it affects current and the future role of information in society, Star India said in a statement.&lt;/p&gt;
&lt;p&gt;The workshop will explore contemporary issues around media self-regulation in India from the differing perspectives of academics, bureaucrats and politicians, industry leaders, civil society and legal experts. In light of the current controversies in the media, including growing demands for content regulation on India's entertainment channels, as well as debates over media ethics, this will be a highly relevant and contemporary workshop.&lt;/p&gt;
&lt;p&gt;The University of Oxford's Programme in Comparative Media Law and Policy (PCMLP) in collaboration with the National Law University- New Delhi, the National University of Juridical Sciences- Kolkata, and the Annenberg School for Communication, University of Pennsylvania, with support from Star India .&lt;/p&gt;
&lt;p&gt;Information and Broadcasting Minister Ambika Soni, Ministry Joint Secretary Arvind Kumar, and National Commission for Women member Secretary Zohra Chatterjee will be speaking at the workshop.&lt;/p&gt;
&lt;p&gt;Among other expected speakers are ex-chief justice of India JS Verma who had drawn up a code for the electronic media on behalf of the News Broadcasters Association, academician Professor Satish Deshpande, former Central Board of Film Certification chairperson Anupam Kher, Centre for Internet and Society's Sunil Abraham, senior columnist Sevanti Ninan, BAG Films and Media CMD and President of the Association of Radio Operators of India (AROI) Anurradha Prasad, senior advocates Prashant Bhushanand Siddharth Luthra, TV Today Executive Director and CEO and IBF Vice President G Krishnan and NDTV CEO KVL Narayan Rao.&lt;/p&gt;
&lt;p&gt;Leading international researchers and experts in media regulation, Professor Monroe E Price from the University of Pennsylvania, Jonathan Blake of Covington and Burling, and Professor Wolfgang Shulz from the Hans Bredow Institute will be a part of this Seminar.&lt;/p&gt;
&lt;p&gt;Star India will be represented by COO Sanjay Gupta, EVP and General Counsel Deepak Jacob and EVP (Marketing and Communications) Anupam Vasudev.&lt;/p&gt;
&lt;p&gt;The workshop is aimed at bringing together diverse views of academics, bureaucrats, policy makers, industry leaders, civil society and legal experts.&lt;/p&gt;
&lt;p&gt;"In light of the current controversies in the media fraternity around the world, this workshop will deal with increased demands for content regulation on entertainment channels in India, as well as current debates on media ethics," the Star India release said.&lt;/p&gt;
&lt;p&gt;Read the original news &lt;a class="external-link" href="http://www.indiantelevision.com/headlines/y2k10/dec/dec105.php"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/self-regulation'&gt;https://cis-india.org/news/self-regulation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-02T01:22:15Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy/privacy_callforpapers">
    <title> UID &amp; Privacy - A Call for Papers </title>
    <link>https://cis-india.org/internet-governance/blog/privacy/privacy_callforpapers</link>
    <description>
        &lt;b&gt;Privacy India is inviting individuals to author short papers focused on Unique Identity (UID) and Privacy. Selected candidates will have their papers published on the CIS website, and their transportation and accommodation  provided for the “Privacy Matters” conference being held in Kolkata on 22 January 2010. &lt;/b&gt;
        
&lt;h3&gt;Topic&lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;Privacy and the UID&lt;/p&gt;
&lt;h3&gt;Submission Deadline&lt;/h3&gt;
&lt;p&gt; By 15 January 2010 to admin@privacyindia.org&lt;/p&gt;
&lt;h3&gt;Word Length&lt;/h3&gt;
&lt;p&gt; 3,000-5,000 words&lt;/p&gt;
&lt;h3&gt;Topic Summary&lt;/h3&gt;
&lt;p&gt;The &lt;em&gt;Aadhaar&lt;/em&gt; scheme, or Unique Identity (UID) scheme is a plan to provide citizens identity cards that are tied to their unique biometric data – such as their fingerprints or retinal scans. Although the most frequently cited justification for this project is to ensure the secure delivery of relief to beneficiaries of government aid schemes, it is clear that the uses to which it will be put exceed this narrow mandate.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;As India embarks on one of its most ambitious techno-administrative projects to date, there is surprisingly little clarity or introspection into the implications of having such a concentrated identity locked into a single card. In particular it appears that the grave threats to privacy the scheme poses have not received due attention. Although the final draft UID Bill circulated by the UIDAI in October 2010 contains some provisions that reference privacy, there seems to be a tacit assumption that privacy is an expendable or at least a less-desirable privilege that can be attended to fully once the scheme is in fully in place.&lt;/p&gt;
&lt;p&gt;We invite individuals to author short inter-disciplinary papers that engage various topics on the theme of Privacy and the UID, including but not limited to the following:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&amp;nbsp;&amp;nbsp; Comparative studies on privacy and national identity card schemes in other countries&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;&amp;nbsp;&amp;nbsp; Privacy and the UID Bill &lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;&amp;nbsp; How will a project such as the UID change the relationship between the state, the individual, and the market? &lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Selected candidates will have their papers published on the CIS website, and their transportation and accommodation&amp;nbsp; provided for the “Privacy Matters” conference being held in Kolkata on January 22nd 2010.&lt;/p&gt;
&lt;h3&gt;Who We Are&lt;/h3&gt;
&lt;p&gt; Privacy India was set up with the collaboration of the Centre for Internet and Society (CIS) and Society in Action Group (SAG), under the auspices of the international organization ‘Privacy International’. Privacy International is a non-profit group that provides assistance to civil society groups, governments, international and regional bodies, the media and the public in a number of countries (see &lt;a class="external-link" href="http://www.privacyinternational.org/"&gt;www.privacyinternational.org&lt;/a&gt;). Privacy India's objective is to raise awareness, spark civil action and promoting democratic dialogue around privacy challenges and violations in India. In furtherance of this goal we aim to draft and promote an over-arching privacy legislation in India by drawing upon legal and academic resources and consultations with the public.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy/privacy_callforpapers'&gt;https://cis-india.org/internet-governance/blog/privacy/privacy_callforpapers&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-03-21T10:03:44Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/dsci-information-summit">
    <title>DSCI Information Security Summit 2010 – A Report</title>
    <link>https://cis-india.org/internet-governance/blog/dsci-information-summit</link>
    <description>
        &lt;b&gt;On 2 and 3 December 2010, the DSCI Information Security Summit 2010 took place in the Trident Hotel, Chennai. The two day summit included a broad spectrum of speakers/panels and topics, ranging from Securing Data &amp; Systems to how to leverage the Cloud. The key speakers were Mr. Gulshan Rai, Director General, CERT-In, DIT, Mr. Rajeev Kapoor, Joint Secretary, DoPT, Govt. of India, Mr. Vakul Sharma, Advocate, Supreme Court of India and Dr. Kamlesh Bajaj, CEO, DSCI. Elonnai Hickok attended the summit.&lt;/b&gt;
        
&lt;p&gt;Day one commenced with keynote address given by Jeffery Carr, Principal, GreyLogic, US who spoke about the gravity and risk that businesses and countries are facing in the digital age. A prominent theme in every presentation throughout the day was that India is facing both serious changes and challenges in light of evolving technology and global standards.&amp;nbsp; A few specific challenges addressed were: encryption standards, the cloud, and securing business transactions. During the panel on encryption standards it was pointed out that India desperately needs a clear and comprehensive policy on encryption standards. Not only will this serve to facilitate transactions in India, but it will increase trade as foreign countries will have an enforced policy to ensure them that India is a safe destination to export to. The panel addressing the cloud focused on the challenges that businesses are facing in terms of the cloud in the Indian context. The three main challenges to the Cloud are:&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;data security and privacy&lt;/li&gt;&lt;li&gt;compliance requirements&lt;/li&gt;&lt;li&gt;legal and contractual requirements&amp;nbsp; &lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;It was pointed out that in particular the Indian legal environment is serving as an obstacle to businesses wishing to move to the cloud, because of policies such as 40 bit encryption, and the Indian Telecom licensing policy which do not permit data transfer outside the cloud. Discussed also were measures that organisations have adopted to address data protection challenges in the cloud including: Including security &amp;amp; privacy clauses in the contractual agreement, making the Cloud service provider liable for a data breach, and auditing the services of Cloud service providers. Further information about the Cloud in the Indian context can be found in the DSCI report on &lt;em&gt;Data Protection Challenges in Cloud Computing: An Indian Perspective&lt;/em&gt;. In the session on Securing Business Transactions, the challenge of protecting data and transactions was addressed. Many approaches were presented which explained how securing systems has moved away from using security enables software to security embedded hardware. The first day concluded with a presentation of DSCI Study Reports, including their recent study on the State of Data Security and Privacy in the Indian BPO Industry, Service Provider Assessment Framework – A Study Report, and the DSCI Security Framework.&lt;/p&gt;
&lt;p&gt;The second day included presentations and panel discussions on privacy, the economics of security, and security technologies.&amp;nbsp; The presentation on privacy presented many different viewpoints which ranged from the stance that India has been taking the right steps towards securing individuals privacy, and in contrast, that India has seen a dilution of privacy standards in the recent years. Contributing to the panel on privacy, Vakul Sharma, Supreme Court Advocate created a timeline of privacy in India, dispelling the popular belief that India does not have a history of privacy. Mr. Sharma closed his presentation with a challenge to those who believe that India does not have adequate privacy protections - to return to the clauses in the ITA, see if they are indeed being followed, and then assess if India does not have adequate privacy protection. The panel on the Economics of Security spoke about the rising costs of security in the wake of cyber crime, and the rising cost of not adequately protecting one’s business. In the session on Technology Challenges to Fight Data Breaches and Cyber Crimes a debate evoked on current measures taken by industry and government to fight cyber crime, and steps that still need to be taken. Opening the session was a presentation by Mr. West, member of the National Cyber Forensics Training and Alliance. His presentation introduced a new approach taken by the States in which key stakeholders including students and local law enforcement were engaged when tracking down cyber criminals. Mr. West demonstrated the success of the program, and explained how such an approach could be easily adapted in India. From different comments made by the panel and audience it was clear from this session that there is a need for the Indian government to be more invested in funding and supporting smaller cybercrime initiatives. Closing the day was a panel on E-Security for the next five years including the application and enforcement of DSCI’s best practices for a Security and Privacy Framework.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The event was sponsored by: Trusted Computing Group, Computer Associates, McAfee, Verizon Business, Tata Consultancy Services, Deloitte, (ISC)2, BlackBerry, ACS, CSC, Microsoft, RSA, and Intel.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/dsci-information-summit'&gt;https://cis-india.org/internet-governance/blog/dsci-information-summit&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-03-21T10:04:22Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
