<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2881 to 2895.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/news/bury-email"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/november-2010-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/internet-new-billion"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy/privacy-cloud-computing"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/doc-2.0"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/identity-crisis"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/october-2010-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/internet-szabadon"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/uid-project-concern"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/new-facebook-features"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/events/technical-aspects-of-uid"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/stiff-resistance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/september-2010-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/internet-at-liberty-conference"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/events/unesco-open-forum"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/news/bury-email">
    <title>Time to bury e-mail?</title>
    <link>https://cis-india.org/news/bury-email</link>
    <description>
        &lt;b&gt;Earlier this week, Mark Zuckerberg, founder of Facebook, had a simple message to the world: email is outdated since it can no longer handle the sort of digital communication that we’ve got used to. Facebook Messages, which integrates email, SMS, instant messaging and social networking, is the way forward, he claimed.&lt;/b&gt;
        
&lt;p&gt;Zuckerberg isn’t the first one to point out the limitations of email. Last year Google too said that email, a technology invented in the ’60s, was not equipped to serve our current needs. “Wave is what email would look like if it were invented today,” Google proclaimed during the launch of Google Wave.&lt;/p&gt;
&lt;p&gt;As it turned out, Wave was a great product but served an entirely different purpose — collaboration. While this made sense at the enterprise level, it didn’t offer much added value to email users engaging in one-to-one conversations. Google Wave today is defunct since users didn’t buy into Google’s argument. Will Facebook Messages suffer the same fate?&lt;/p&gt;
&lt;p&gt;The answer depends a lot on whether users face the problem that Zuckerberg claims they do. “A lot of people are trying to solve the problem of email. But I don’t know what that problem is,” says Mahesh Murthy, CEO, Pinstorm, a digital marketing agency. According to Murthy, there are three main issues with email: storage space, spam filtering and prioritising messages. And modern email services such as Gmail have evolved to address these concerns.&lt;/p&gt;
&lt;p&gt;Facebook obviously thinks otherwise. According to the company we need one inbox for all our digital communication, which includes emails, chats and SMS. Second, messages from your Facebook contacts will be considered more important and will go into Social Inbox. All other messages will go into a separate folder. Third, messages will be threaded according to people and not subject lines as is the case with Gmail and other email services.&lt;/p&gt;
&lt;p&gt;According to Gaurav Mishra, head, social media practise, MS&amp;amp;L Group, these are compelling reasons to start using Facebook Messages. But enough to ditch your email account? Not quite, say experts.&lt;/p&gt;
&lt;p&gt;“Integration is a marketing myth,” says Nishant Shah, director, Centre for Internet and Society, a Bangalore-based research organisation, “Many of us like to keep our information in different silos. We have heard of young people getting fired from their jobs because they were not able to keep personal information compartmentalised.”&lt;/p&gt;
&lt;p&gt;Secondly, giving greater priority to messages from people in your contact list may be misplaced. “The nature of conversation on Facebook is casual and the criticality of a message and hence the need for an immediate response may not be that high,” points out Murthy. An email from, say, a client or a prospective recruiter who may not be on your friends list, may be more critical.&lt;/p&gt;
&lt;p&gt;There’s no doubting that Facebook Messages could change the way we conduct our casual conversations. But email serves basic and universal needs. For example, while introducing the new service, Zuckerberg pointed out how school kids felt email was too slow. According to Shah, however, it is important to understand what the kids found email slow for. A movie plan can be made quicker through SMS, but the same kids might submit their assignments via email.&lt;/p&gt;
&lt;p&gt;Of course, Zuckerberg has not claimed that Facebook Messages will be an email — or more specifically Gmail — killer. But Facebook’s PR machinery would have known how the media would react. By undermining the very concept of email — one of Google’s strongest products — Facebook has managed to make Google look like the hero of yesteryears.&lt;/p&gt;
&lt;p&gt;Analysts agree that Facebook Messages is really about retaining users on its website — if Facebook can give its users a reason to spend more time on its website rather than that of an email service, it can serve more ads. “It is about economics. But Facebook is trying to turn it into a cultural argument,” says Shah.&lt;/p&gt;
&lt;p&gt;Still, one thing is certain; Facebook Messages will not suffer the same fate as Google Wave, partly because it is simply an update (and a rather good one) to an existing feature within Facebook. But it is far from a replacement to email. As Mishra puts it, “I will not close down my existing email ids. But I will start using Facebook to message my relatives and friends. It is going to be the future of messaging, not the future of email.”&lt;/p&gt;
&lt;p&gt;Read the original in &lt;a class="external-link" href="http://www.dnaindia.com/scitech/report_time-to-bury-e-mail_1469662"&gt;DNA&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/bury-email'&gt;https://cis-india.org/news/bury-email&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-02T07:30:10Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/november-2010-bulletin">
    <title>November 2010 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/november-2010-bulletin</link>
    <description>
        &lt;b&gt;Greetings from the Centre for Internet and Society! &lt;/b&gt;
        &lt;h3&gt;&lt;b&gt;News Updates&lt;/b&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;The internet’s new billion: New web users — in countries like Brazil and China — are changing the culture of the internet.&lt;a href="http://bit.ly/hKUb5n" target="_blank"&gt;&lt;br /&gt;http://bit.ly/hKUb5n&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;‘Piracy is now a mainstream political phenomenon': “Piracy has become a mainstream political phenomenon,” said Sunil Abraham, executive director of the Centre for Internet and Society in the city. The piracy that he was referring to was not the piracy of the high seas but the piracy of intellectual property.&lt;a href="http://bit.ly/gMC1Br" target="_blank"&gt;&lt;br /&gt;http://bit.ly/gMC1Br&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Open standards policy in India: A long, but successful journey: Last week, India became another major country to join the growing, global open standards movement. After three years of intense debate and discussion, India's Department of IT in India finalized its Policy on Open Standards for e-Governance, joining the ranks of emerging economies like Brazil, South Africa and others. This is a historic moment and India's Department of Information Technology (DIT) deserves congratulations for approving a policy that will ensure the long-term preservation of India's e-government data.&lt;a href="http://bit.ly/dGo6Qo" target="_blank"&gt;&lt;br /&gt;http://bit.ly/dGo6Qo&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Information, the world's new capital - Digital Natives: Information is the new capital and currency of the world, Nishant Shah, of the India-based Digital Natives with a Cause, told Bizcommunity.com yesterday, 10 November 2010, as the three-day workshop on digital and internet technologies that brought together young delegates from nine African countries ended in Johannesburg, South Africa. "If the 20th century was the age of the industrial revolution, the 21st century is now actually the age of the knowledge information," Shah said.&lt;a href="http://bit.ly/dpXIKY" target="_blank"&gt;&lt;br /&gt;http://bit.ly/dpXIKY&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;What it means to be a child today: They move seamlessly between reality and virtual reality. The digital landscape they inhabit comprises generations — not of family — but of technology such as Web 2.0, 3G, PS4 and iPhone5. Their world has moved beyond their neighbourhood, school and childhood friends to encompass a 500-channel television universe, the global gaming village, the endless internet. These are the children born in the last decade and half — possibly the first generation that has never known a world without hi-tech.&lt;a href="http://bit.ly/cz3nBJ" target="_blank"&gt;&lt;br /&gt;http://bit.ly/cz3nBJ&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Report: Digitally Open: Innovation and Open Access Forum, 23 Oct 2010, Doha, Qatar: A summary of the event "Digitally Open: Innovation and Open Access Forum" held in Doha.&lt;a href="http://bit.ly/catHoi" target="_blank"&gt;&lt;br /&gt;http://bit.ly/catHoi&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;DOC 2.0: A Resources Sharing Mela by NGO Documentation Centres: A Resource Sharing Mela and Meet of DCM (Document Centres Meet) at the Centre for Education &amp;amp; Documentation in Domlur, Bangalore.&lt;a href="http://bit.ly/dnwQMf" target="_blank"&gt;&lt;br /&gt;http://bit.ly/dnwQMf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Wi-Fi Direct promises range, bandwidth higher than Bluetooth: Sharing, printing and connecting for Wi-Fi devices is going to be more convenient than ever with soon-to-be-launched technology Wi-Fi Direct, which enables devices to connect to each other without a conventional Wi-Fi hub. This article by Ramkumar Iyer was published in the Hindu on 31 October 2010.&lt;a href="http://bit.ly/aUul9f" target="_blank"&gt;&lt;br /&gt;http://bit.ly/aUul9f&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Access to Knowledge in the Age of Intellectual Property: Access to Knowledge in the Age of Intellectual Property charts the rise of the access to knowledge movement, a movement in which Open Society Foundations have played a key role. It maps the vast terrain of legal, cultural, and technical issues that activists and thinkers aligned to the movement negotiate every day.&lt;a href="http://bit.ly/9nkQFM" target="_blank"&gt;&lt;br /&gt;http://bit.ly/9nkQFM&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Social Mashup!: Save the Date Join us to meet India’s most passionate, innovative, and curious start-up social entrepreneurs for two groundbreaking days of conversations, connections and inspiration. This event will be held on 2-3 December 2010 at the Indian School of Business in Hyderabad.&lt;a href="http://bit.ly/bKKcar" target="_blank"&gt;&lt;br /&gt;http://bit.ly/bKKcar&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt; Digitally Open: Innovation and Open Access Forum: Promoting Openness in Today's Digital World&lt;a href="http://bit.ly/961Ieg" target="_blank"&gt;&lt;br /&gt;http://bit.ly/961Ieg&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Crisis for identity or identity crisis?: The hurry with which the government is pushing its most ambitious project to assign a number (UID) to every citizen without any feasibility study or public debate has raised many questions. &lt;a href="http://bit.ly/8Zt9mf" target="_blank"&gt;http://bit.ly/8Zt9mf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;b&gt;Upcoming Event&lt;/b&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Identity, Identification and Media Representation in Video Game Play: An Audience Reception Study: Adrienne Shaw from the Annenberg School of communications, who is a visiting fellow at MICA is giving a public talk on research on representation in video games on 27 November 2010 at the Centre for Internet and Society in Bangalore.&lt;a href="http://bit.ly/909xkU" target="_blank"&gt;&lt;br /&gt;http://bit.ly/909xkU&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Research&lt;/b&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;My Bubble, My Space, My Voice Workshop - Perspective and Future&lt;br /&gt;The second workshop for the “Digital Natives with a Cause?” research project named “My Bubble, My Space, My Voice” took place at the Link Center of Wits University, in Johannesburg, South Africa from 6 November 2010 to 9 November 2010. Samuel Tettner, Digital Natives Co-cordinator shares his perspective on the workshop.&lt;a href="http://bit.ly/bPX6Xd" target="_blank"&gt;&lt;br /&gt;http://bit.ly/bPX6Xd&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Archive and Access: Call for Review&lt;br /&gt;The Archive and Access research project by Rochelle Pinto, Aparna Balachandran and Abhijit Bhattacharya is a part of the Researchers @ Work Programme at the Centre for Internet and Society, Bangalore. The project that attempts to look at the ways in which the notion of the archive, the role of the archivist and the relationship between the state and private archives that has undergone a transition with the emergence of Internet technologies in India has been put up for public review. &lt;a href="http://bit.ly/d4o809" target="_blank"&gt;http://bit.ly/d4o809&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Just Where We Like It&lt;br /&gt;The micro space for status updates might become the new public space for discussion. Nishant Shah's column on Digital Natives was published in the Sunday Eye of the Indian Express on 21 November 2010.&lt;a href="http://bit.ly/96cK8q" target="_blank"&gt;&lt;br /&gt;http://bit.ly/96cK8q&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Taking It to the Streets&lt;br /&gt;The previous posts in the Beyond the Digital series have discussed the distinct ways in which young people today are thinking about their activism. The fourth post elaborates further on how this is translated into practice by sharing the experience of a Blank Noise street intervention: Y ARE U LOOKING AT ME?&lt;a href="http://bit.ly/ciyiiR" target="_blank"&gt;&lt;br /&gt;http://bit.ly/ciyiiR&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Talking Back without "Talking Back"&lt;br /&gt;The activism of digital natives is often considered different from previous generations because of the methods and tools they use. However, reflecting on my conversations with The Blank Noise Project and my experience in the ‘Digital Natives Talking Back’ workshop in Taipei, the difference goes beyond the method and can be spotted at the analytical level – how young people today are thinking about their activism.&lt;a href="http://bit.ly/bHAvDE" target="_blank"&gt;&lt;br /&gt;http://bit.ly/bHAvDE&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;The 'Beyond the Digital' Directory&lt;br /&gt;For the past few months, Maesy Angelina has been sharing the insights gained from her research with Blank Noise on the activism of digital natives. The ‘Beyond the Digital’ directory offers a list of the posts on the research based on the order of its publication.&lt;a href="http://bit.ly/b3TK3C" target="_blank"&gt;&lt;br /&gt;http://bit.ly/b3TK3C&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;First Thing First&lt;br /&gt;Studies often focus on how digital natives do their activism in identifying the characteristics of youth digital activism and dedicate little attention to what the activism is about. The second blog post in the Beyond the Digital series reverses this trend and explores how the Blank Noise Project articulates the issue it addresses: street sexual harassment.  &lt;a href="http://bit.ly/cM1HFf" target="_blank"&gt;&lt;br /&gt;http://bit.ly/cM1HFf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Change has come to all of us&lt;br /&gt;The general focus on a digital generational divide makes us believe that generations are separated by the digital axis, and that the gap is widening. There is a growing anxiety voiced by an older generation that the digital natives they encounter — in their homes, schools and universities and at workplaces — are a new breed with an entirely different set of vocabularies and lifestyles which are unintelligible and inaccessible. It is time we started pushing the boundaries of what it means to be a digital native.&lt;a href="http://bit.ly/9J82YY" target="_blank"&gt;&lt;br /&gt;http://bit.ly/9J82YY&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Accessibility&lt;/b&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;e-Accessibility Policy Handbook for Persons with Disabilities&lt;br /&gt;The Centre for Internet and Society is proud to announce the launch of its first publication, the “e-Accessibility Policy Handbook for Persons with Disabilities" in collaboration with the G3ict (Global Initiative for Inclusive Information Communication Technologies) and ITU (International Telecommunications Union), and sponsored by the Hans Foundation. The handbook is compiled and edited by Nirmita Narasimhan. Dr. Hamadoun I. Toure, Secretary-General, International Telecommunication Union has written the preface, Dr. Sami Al-Basheer, Director, ITU-D has written the introduction and Axel Leblois, Executive Director, G3ict has written the foreword.&lt;a href="http://bit.ly/gfKNYO" target="_blank"&gt;&lt;br /&gt;http://bit.ly/gfKNYO&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Intellectual Property&lt;/b&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Statement of CIS on the Work of the Committee in the 21st SCCR&lt;br /&gt;The twenty-first session of the Standing Committee on Copyright and Related Rights was held in Geneva from 8 to 12 November 2010. Nirmita Narasimhan attended the conference and represented the Centre for Internet and Society.&lt;a href="http://bit.ly/fJVNPI" target="_blank"&gt;&lt;br /&gt;http://bit.ly/fJVNPI&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;We’ve All Got Some Baggage&lt;br /&gt;America’s newest trade agreement is not going to kill only iPods. The article appeared in the Tehelka Magazine Vol 7, Issue 45, Dated November 13, 2010 &lt;a href="http://bit.ly/cVrpWd" target="_blank"&gt;&lt;br /&gt;http://bit.ly/cVrpWd&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Internet Governance&lt;/b&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Consumer Privacy - How to Enforce an Effective Protective Regime?&lt;br /&gt;In a typical sense, when people think of themselves as consumers, they just think about what they purchase, how they purchase and how they use their purchase. But while doing this exercise we are always exchanging personally identifiable information, and thus our privacy is always at risk. In this blog post, Elonnai Hickok and Prashant Iyengar through a series of questions look through the whole concept of consumer privacy at the national and international levels. By placing a special emphasis on Indian context, this post details the potential avenues of consumer privacy in India and states the important elements that should be kept in mind when trying to find at an effective protective regime for consumer privacy.&lt;a href="http://bit.ly/eEs5Qx" target="_blank"&gt;&lt;br /&gt;http://bit.ly/eEs5Qx&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;CIS Responds to Privacy Approach Paper&lt;br /&gt;A group of officers was created to develop a framework for a privacy legislation that would balance the need for privacy protection, security, sectoral interests, and respond to the domain legislation on the subject. Shri Rahul Matthan of Tri Legal Services prepared an approach paper for the legal framework for a proposed legislation on privacy. The approach paper is now being circulated for seeking opinions of the group of officers and is also being placed on the website of the Department of Personnel and Training for seeking public views on the subject. The Privacy India team at CIS responded to the approach paper and has called for the need for a more detailed study of statutory enforcement models and mechanisms in the creation of privacy legislation.&lt;a href="http://bit.ly/eVTwVC" target="_blank"&gt;&lt;br /&gt;http://bit.ly/eVTwVC&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Privacy and Banking: Do Indian Banking Standards Provide Enough Privacy Protection&lt;br /&gt;Banking is one of the most risky sectors as far as privacy is concerned due to the highly sensitive and personal nature of information which is often exchanged, recorded and retained. Although India has RBI guidelines and legislations to protect data, this blog post looks at the extent of those protections, and what are the areas that still need to be addressed.&lt;a href="http://bit.ly/flq09V" target="_blank"&gt;&lt;br /&gt;http://bit.ly/flq09V&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Privacy and Telecommunications: Do We Have the Safeguards?&lt;br /&gt;All of you often come across unsolicited and annoying telemarketing calls/ SMS's, prank calls, pestering calls for payment, etc. Do we have any safeguards against them? This blog post takes a look at the various rules and regulations under Indian law to guard our privacy and confidentiality.&lt;a href="http://bit.ly/hnTwKp" target="_blank"&gt;&lt;br /&gt;http://bit.ly/hnTwKp&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Privacy, Free/Open Source, and the Cloud&lt;br /&gt;A look into the questions that arise in concern to privacy and cloud computing, and how open source plays into the picture.&lt;a href="http://bit.ly/awpCyF" target="_blank"&gt;&lt;br /&gt;http://bit.ly/awpCyF&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Privacy Concerns in Whole Body Imaging: A Few Questions&lt;br /&gt;Security versus Privacy...it is a question that the world is facing today when it comes to using the Whole Body Imaging technology to screen a traveller visually in airports and other places. By giving real life examples from different parts of the world Elonnai Hickok points out that even if the Government of India eventually decides to advocate the tight security measures with some restrictions then such measures need to balanced against concerns raised for personal freedom. She further argues that privacy is not just data protection but something which must be viewed holistically and contextually when assessing new policies.&lt;a href="http://bit.ly/9rvQPt" target="_blank"&gt;&lt;br /&gt;http://bit.ly/9rvQPt&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;American Bar Association Online Privacy Conference: A Report&lt;br /&gt;On 10 November 2010, I attended an American Bar Association online conference on 'Regulating Privacy Across Borders in the Digital Age: An Emerging Global Consensus or Vive la Difference'. The panelists addressed many important global privacy challenges and spoke about the changes the EU directive is looking to take.  &lt;a href="http://bit.ly/dy41zc" target="_blank"&gt;&lt;br /&gt;http://bit.ly/dy41zc&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Telecom&lt;/b&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;3G Life&lt;br /&gt;You can video chat, stream music and watch TV on your phone. Offering high-speed internet access, 3G would change the world of mobile computing. Nishant Shah's article was published in the Indian Express on 14 November 2010.&lt;a href="http://bit.ly/gyxaW2" target="_blank"&gt;&lt;br /&gt;http://bit.ly/gyxaW2&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Ideology and ICT Policies&lt;br /&gt;For better policies, decision-makers need to know their own and others’ biases, and consider what others are doing, writes Shyam Ponappa in an article published in the Business Standard on 4 November 2010. &lt;a href="http://bit.ly/dbl3Ai" target="_blank"&gt;&lt;br /&gt;http://bit.ly/dbl3Ai&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Looking forward to your feedback. Please feel free to write to us for any queries or details required. If you do not wish to receive these emails, please do write to us and we will unsubscribe your mail ID from the mailing list.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/november-2010-bulletin'&gt;https://cis-india.org/about/newsletters/november-2010-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>CISRAW</dc:subject>
    

   <dc:date>2012-08-07T11:46:10Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/internet-new-billion">
    <title>The internet’s new billion</title>
    <link>https://cis-india.org/news/internet-new-billion</link>
    <description>
        &lt;b&gt;New web users — in countries like Brazil and China — are changing the culture of the internet.&lt;/b&gt;
        
&lt;p&gt;The harried mother had little wish to visit an internet cafe with two squirmy boys in tow, but she said there was no choice.&lt;/p&gt;
&lt;p&gt;New to this potholed neighborhood on the city’s northern edge, Fabina da Silva, 31, needed to enroll her sons in school. Registering online was the only way.&lt;/p&gt;
&lt;p&gt;“If it wasn’t a necessity, I wouldn’t be here,” da Silva said on a recent afternoon as her 6-year-old, Lucas, thumped his toy Sponge Bob on the mouse pad beside her. “Nowadays, internet in Brazil is a necessity.”&lt;/p&gt;
&lt;p&gt;Brazil has long been a bellwether nation for emerging-market internet trends and it’s riding a wave that will soon sweep the globe. The newest billion people to venture online are doing so in developing countries rather than North America or Europe.&lt;/p&gt;
&lt;p&gt;And whether those newcomers are getting online for fun or because they must, they’re doing so en masse. For businesses nimble enough to serve markets as diverse as Brazil, Russia, India, China and Indonesia, the shift promises a staggering number of new customers.&lt;/p&gt;
&lt;p&gt;But internet trend-watchers say there’s more at stake than the emergence of a worldwide class of digital consumers. The new users are changing the culture of the internet itself. Researchers say the web as it was originally, if idealistically, conceived — a largely free, monolingual space where a shared digital culture prevailed — may soon be a distant memory. And it’s happening remarkably fast.&lt;/p&gt;
&lt;p&gt;“Potentially explosive” is how Marcos Aguiar describes the growth. He’s a senior partner at the Boston Consulting Group’s Sao Paulo office who co-authored a report released in September called “The Internet’s New Billion.” It concludes the number of web users in developing-world “BRICI” countries — Brazil, Russia, India, China and Indonesia — will jump from 610 million this year to 1.2 billion by 2015.&lt;/p&gt;
&lt;p&gt;When the internet crossed the billion-user threshold just five years ago, the developed world commanded a 60-40 majority online, according to the United Nations’ International Telecommunications Union. Today, that proportion has roughly reversed.&lt;/p&gt;
&lt;p&gt;The new users are younger, poorer and more numerous than ever before, BCG’s analysts said, and increasing numbers will need web access and won't be able to afford broadband in their living room.&lt;/p&gt;
&lt;p&gt;As Fabina da Silva pecked away on a keyboard to register her sons for school, she was in many ways typical of low-income Brazilian users. Those who don’t have web access at home often pay small fees to use ad hoc cybercafes known here as “LAN houses.” Many began as rooms full of connected computers, or local area networks, for multi-player gaming, but their customer base has since broadened.&lt;/p&gt;
&lt;p&gt;In India, those following the trend say a huge portion of the new billion will enter the web via mobile devices.&lt;/p&gt;
&lt;p&gt;“If you look at our broadband figures in India, it’s quite pathetic,” said Sunil Abraham, director of the Centre for Internet and Society, a think tank in Bangalore. “And less than 1 percent of the population has ever accessed the internet.”&lt;/p&gt;
&lt;p&gt;But recently, many Indian telecommunication firms have begun giving out free data plans with their mobile devices — a move Sunil said will instantly send millions of Indians onto the internet. “The moment an end user acquires a smart phone they become a data user because they’re not paying for it,” he said. “But they’re not coming onto the internet like you and I know.”&lt;/p&gt;
&lt;p&gt;Instead, phone companies only provide access to a few sites, such as Wikipedia and Facebook Zero, a stripped-down mobile version of the social networking site that omits photos but allows messaging and status updates. “They’re coming onto a network that, from the beginning, is a complete walled garden,” he said.&lt;/p&gt;
&lt;p&gt;The new walls dividing regions of the internet aren’t likely to stop there. Even as more users join the web worldwide, they are increasingly separated by language. What the nearly 400 million users in China experience as the internet is vastly different than the web surfed by Americans. Much of the software and websites on the Chinese web are produced domestically in the local language. That’s also how it works in Russia and Indonesia.&lt;/p&gt;
&lt;p&gt;Some observers say this difference has political consequences. “Many of the local companies provide far better service than the likes of Google and Facebook in those markets,” said Evgeny Morozov, a digital technology researcher at Stanford University. “But also those local websites are much easier to censor because the corporate entities behind those sites all have some domestic presence.”&lt;/p&gt;
&lt;p&gt;Morozov is author of an up-coming book “The Net Delusion: The Dark Side of Internet Freedom,” and he said there’s a dark side to be found in the internet’s new billion, too. Because poorer users resort to more centralized methods for getting online — cybercafes, cell-phone towers — their activity will be much easier to monitor.&lt;/p&gt;
&lt;p&gt;“The fact that so much of this is happening in cybercafes and mobile devices actually empowers the government because those two things are much easier to control than a desktop computer in your house,” Morozov said.&lt;/p&gt;
&lt;p&gt;Morozov is also skeptical of notions that greater diversity of cultures online will lead to more cultural dialogue. “There is very little interaction between communities and it’s not because the tools are lacking. It’s just that modern-day Indians and modern-day Russians have nothing to talk about most of the time,” he said. “There may simply be no demand for joining that global village.”&lt;/p&gt;
&lt;p&gt;More optimistic web scholars argue there will be cultural conversations, but bridging the gaps between communities will take effort. “The internet has become a bunch of interlinked but linguistically distinct and culturally specific spaces,” said Ethan Zuckerman, a senior researcher at Harvard University’s Berkman Center for Internet and Society. “There’s some interface between them but there’s a lot less than there was years back when we were sort of pretending that this was one great global space.”&lt;/p&gt;
&lt;p&gt;Instead of becoming the world’s biggest tool for cultural exchange, Zuckerman said the web could become its principal medium for mutual misunderstanding. “We’re mostly talking to people like ourselves rather than talking across cultural boundaries,” Zuckerman said. “And when we do cross cultural boundaries, it’s often in a way where we’re overhearing something that really pisses us off.”&lt;/p&gt;
&lt;p&gt;Take for example the 2005 scandal after a Danish newspaper posted cartoons depicting the prophet Mohammed, sparking riots across the Muslim world. Zuckerman said such incidents may become routine. “It’s a problem of unseen audiences,” he said. “We always have to be aware there are other audiences out there listening, and they’re particularly listening for mentions of themselves.”&lt;/p&gt;
&lt;p&gt;For a more amusing and recent online snafu, Zuckerman prefers citing a topic that went viral on the micro-blogging site Twitter this summer. The topic, the Brazilian Portuguese phrase “Cala boca, Galvao,” was mysterious to many English-speaking users. Asked to explain, a few mischievous Brazilians claimed the Galvao was a rare Amazon bird being slaughtered to extinction for its colorful feathers. For everyone who re-tweeted the phrase, so the pranksters claimed, 10 cents would be donated to a global effort to save the bird.&lt;/p&gt;
&lt;p&gt;The encouragement helped catapult the phrase into the ranks of Twitter’s top-trending topics, or most-repeated phrases worldwide last June. But in reality, Galvao was the first name of Galvao Bueno, a Brazilian sports commentator on the Globo network, whose pronouncements during the World Cup had irritated many of his compatriots. In Brazilian Portuguese, “Cala boca” roughly means, “shut up.”&lt;/p&gt;
&lt;p&gt;“There’s an entirely different conversation going on that’s so incomprehensible to Americans that the Brazilians make fun of us when we try to understand,” Zuckerman said. “In many ways that sort of characterizes for me what’s going on with the contemporary ‘net.'”&lt;/p&gt;
&lt;p&gt;But Zuckerman still believes virtual borders can be crossed. In 2005, he co-founded Global Voices, an aggregator and translator of blogs from around the world, in part to help the next billion web users communicate.&lt;/p&gt;
&lt;p&gt;“These billion users are sort of proxy for the global middle class,” he said. “They’re an increasing economic force, an increasing cultural force, and they are the people we need to negotiate with and have a conversation with if we want to address problems like climate change.”&lt;/p&gt;
&lt;p&gt;In the run-down Engenho da Rainha neighborhood in Rio de Janeiro, some of the LAN house customers seemed more interested in using the web to play games than solve the world’s problems.&lt;/p&gt;
&lt;p&gt;One wiry teen in a blue baseball cap barely glanced away from his screen to answer questions. “I’ll spend all day, all night on the internet if I’m allowed,” said Carlos Wallace Cruz, 16. “I’d say I’m 98 percent addicted.”&lt;/p&gt;
&lt;p&gt;Cruz’s drug of choice isn’t likely to ring a bell with Americans his age. It’s a video game available only on Orkut, a Google social networking site, wildly popular in Brazil and India but less so in the United States.&lt;/p&gt;
&lt;p&gt;When a visitor asked if he ever spent time on Orkut’s much more famous rival site, Cruz responded with earnest puzzlement.&lt;/p&gt;
&lt;p&gt;“What’s Facebook?” he asked.&lt;/p&gt;
&lt;p&gt;Read the original in the &lt;a class="external-link" href="http://www.globalpost.com/dispatch/brazil/101112/internet-growth-web-traffic"&gt;Global Post&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/internet-new-billion'&gt;https://cis-india.org/news/internet-new-billion&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-02T07:31:19Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy/privacy-cloud-computing">
    <title>Privacy, Free/Open Source, and the Cloud </title>
    <link>https://cis-india.org/internet-governance/blog/privacy/privacy-cloud-computing</link>
    <description>
        &lt;b&gt;A look into the questions that arise in concern to privacy and cloud computing, and how open source plays into the picture. &lt;/b&gt;
        
&lt;h3&gt;Introduction&lt;/h3&gt;
&lt;p&gt;Cloud computing, in basic terms,&amp;nbsp; is internet-based computing where shared resources and services are taken from the primary infrastructure of the internet and provided on demand. Cloud computing creates a shared network between major corporations like Google, Microsoft, Amazon and Yahoo. In this way, cloud systems are related to grid computing systems/service- oriented architectures, and create the potential for the entire I.T. infrastructure to be programmable. Because of this, cloud computing establishes a new consumption and delivery standard for IT services based on the internet. It is a new consumption and delivery model, because it is made up of services delivered through common centers and built on servers which act as a point of access for the computing needs of consumers.&amp;nbsp; The access points facilitate the tailoring and delivering of targeted applications and services to consumers.&amp;nbsp; Details are taken from the users, who no longer need to have an understanding of, or control over the technology infrastructure in the cloud that supports their desired application.&lt;/p&gt;
&lt;p&gt;There are both corporate and consumer implications for such a system. For example, according cloud computing lowers the barriers to entry for corporations and new services. It also enables innovative enterprise in locations where there is an insufficient supply of human or other resources through the provision of inexpensive hardware, software, and applications. The consumer, in turn, is provided with information that he or she is projected to be interested in based on information he or she has already “consumed.”&amp;nbsp; Thus, for example: Google has the ability to monitor a person’s consuming habits through searches and to reduce those habits to a pattern which selects applications to display – and consumption of those reinforces the pattern.&lt;/p&gt;
&lt;h3&gt;Privacy Concerns:&lt;/h3&gt;
&lt;p&gt;&amp;nbsp;Though cloud computing can be a useful tool for&amp;nbsp; consumers, corporations, and countries, cloud computing poses significant privacy concerns for all actors involved. For the consumer, a major concern is that future business models may rely on the use of personal data from consumers of cloud services for advertising or behavioral targeting. This concern brings to light the fundamental problem of cloud computing which is that consumers consent to the secondary use of their personal data only when they are signing up for services, and that “consent” is almost automatically generated. How can the cloud assure users that their private data will be properly protected? It is true that high levels of encryption can be (and are) used, and that many companies also take other precautionary measures, but protective measures vary, and the secondary sources that gain access to information may not protect it as well as the initial source.&amp;nbsp; Moreover, even strong protection measures are vulnerable to hackers. As well, what happens if a jurisdiction, like the Indian government, gains access to information about a foreign national?&amp;nbsp;&amp;nbsp; India still does not have a comprehensive data protection law, nor does it have many forms of redress for violations of privacy. How is that individuals information protected?&lt;/p&gt;
&lt;p&gt;These questions give rise to other privacy concerns with respect to the data that is circulated and stored on the cloud, which are the questions of territory, sovereignty, and regulation. Many of these were brought up at the Internet Governance Forum, which took place on the 16th of September including: Which jurisdiction has authority in cases of dispute or digital crime? If you lose data or your data is damaged, stolen, or manipulated, where do you go? Is the violation enforced under local laws, and, if so, under the law of the violator or the law of the violated?&amp;nbsp; If international law, who can access the tribunals, and which tribunals have this jurisdiction?&amp;nbsp; What if a person's data is replicated in two data centres in two different countries? &amp;nbsp;Are the data subject to scrutiny by the officials of all three?&amp;nbsp; Is there a remedy against abuse by any of them?&amp;nbsp; Does it matter whether the country in which the data centre resides does not require a warrant for government access?&amp;nbsp; And how will a consumer know any of that up front?&amp;nbsp; As a corollary, if content is being sent to one country but resides on a data centre in another country, whose data protection standards apply?&amp;nbsp; For example, certain governments in Europe require data retention for limited amount of time for purposes for law enforcement, but other countries may allow retention of data for shorter or longer periods of time.&lt;/p&gt;
&lt;h3&gt;How are privacy, free/open source, and the cloud related ?&lt;/h3&gt;
&lt;p&gt;Eben Moglen, a professor from Columbia law school, and founder and chairman of the Software Freedom Law Center who spoke on cloud computing, privacy, and free/open software at the Indian Institute for science on Thursday September 25, had another solution to the privacy concerns that arise out of the cloud. His lecture explains how the internet has moved from a tool that once promoted equality between people – no servants and no masters – to a tool that reinforces social hierarchies. The reinforcement of these hierarchies is directly related to the language used and communication facilitated between the computer and the individual.&amp;nbsp; Professor Moglen describes how initially, when computers were first introduced to the public, humans spoke directly to computers, and computers responded directly to humans. This open, two-way communication changed when Microsoft, Apple, and IBM removed the language between humans and computers and created proprietary software based on a server-client computing relationship. By removing the language between humans and computers, these corporations dis-empowered individuals. Professor Moglen used this as a springboard to address the privacy concerns that come up in cloud computing. Privacy at its base is the ability of an individual to control access to various aspects of self, such as decisional, informational, and locational. In having the ability to control these factors, privacy consists of a relation between a person and another person or an entity. Professor Moglen postulated that free/open access to code would make the internet an environment where choices over that relationship were still in the hands of an individual, and, among other protections, the individuals could build up their desired levels of privacy.&lt;/p&gt;
&lt;h3&gt;Is free/open software the solution?&lt;/h3&gt;
&lt;p&gt;&amp;nbsp;Eben Moglen's solution to the many privacy concerns that arise out of cloud computing is the application and use of free software/open source by individuals.&amp;nbsp; Unlike some applications on the cloud, open source is free, and once an individual has access to the code, that person can control how a program functions, including how a program uses personal information, and thus the person would be able to protect their privacy. Of course, this presumes that the consumer of the internet is sophisticated enough to access and manipulate code.&amp;nbsp; But even putting that presumption aside, is the ability to write code enough to protect data (will help you protect data better – add more security)?&amp;nbsp; Perhaps if a person could create his own server and bypass the cloud, but this does not seem like an ideal (or practical) solution. Though free/open source is an important element that should be incorporated into cloud computing, free/open source depends on open standards.&amp;nbsp;According to Pranesh Prakash, in his presentation at the Internet Governance Forum, the role of standards in ensuring interoperability is critical to allowing consumers to choose between different devices to access the cloud, to choose between different software clients, and to shift between one service and another. This would include moving information, both the data and the metadata, from one cloud to another. Clouds would need to be able to talk to one another to enable data sharing, and open source is key to this, though it is important to note that if one uses free/open source, they must set up their own infrastructure.&lt;/p&gt;
&lt;h3&gt;Conclusion&lt;/h3&gt;
&lt;p&gt;&amp;nbsp;Even though Moglen believes that free/open source software brings freedom and provides the solution to protect an individual’s privacy in the context of cloud computing, he was not speaking to the specific context of India. To do that, it is important to expand the definitions that one uses of free/open source and privacy, and then to contextualize them.&amp;nbsp; Looking closely at the words “free/open source,” they are not limited to access to a software's code, even though that is free/open source’s base.&amp;nbsp; For the ideology of free/open source to work, access to code is just a key to the puzzle. A person, community, culture and state must understand the purpose of free/open source, know how to use it,&amp;nbsp; and know how it can be applied in order for it to be transformative, liberating, and protective. There needs to be a shared understanding that free/open source is&amp;nbsp; not just about being able to change code, but about a shared commitment to sharing code and making it transparent and accessible. In the United States and other countries,&amp;nbsp; free/open source did not just enter into American society and immediately fix issues of&amp;nbsp; privacy by bringing freedom, as it seems Professor Moglen is suggesting free/open source will do in India.&amp;nbsp;&amp;nbsp;&amp;nbsp; Though Professor Moglen promises freedom and privacy protection through free/open source, perhaps this is not an honest appraisal of the technology.&amp;nbsp; Free/open source, if not equally accessed or misapplied, protects neither freedom nor privacy.&amp;nbsp; As noted above, even if a person has access to code, he can protect data only to a certain extent.&amp;nbsp; Thus, he might think that he has created a privacy wall around information that actually is readily accessible.&amp;nbsp; In other words, free/open source cannot be the only answer to freedom, but instead a piece to a collective answer.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy/privacy-cloud-computing'&gt;https://cis-india.org/internet-governance/blog/privacy/privacy-cloud-computing&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-03-22T05:50:10Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/doc-2.0">
    <title>DOC 2.0:  A Resources Sharing Mela by NGO Documentation Centres</title>
    <link>https://cis-india.org/news/doc-2.0</link>
    <description>
        &lt;b&gt;A Resource Sharing Mela and Meet of DCM (Document Centres Meet) at the Centre for Education &amp; Documentation in Domlur, Bangalore.
 &lt;/b&gt;
        
&lt;h2&gt;Programme&lt;/h2&gt;
&lt;p&gt;18th Nov: 9.30 am to 20th Nov. 2 pm&lt;/p&gt;
&lt;p&gt;Draft 3 ( to be finalised )&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td align="center"&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;
&lt;div align="left"&gt;&lt;strong&gt;For DCMers&lt;/strong&gt;&lt;br /&gt;9.30 pm to 12 noon&lt;br /&gt;
&amp;nbsp;&amp;nbsp; CED Terrace&lt;/div&gt;
&amp;nbsp;
&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;
&lt;div align="left"&gt;&amp;nbsp;&lt;/div&gt;
&lt;strong&gt;Interaction&lt;/strong&gt;&lt;br /&gt;2&amp;nbsp; pm to 4 pm&lt;br /&gt;CED Exhibition Hall&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td align="left"&gt;&lt;strong&gt;Public Session&lt;/strong&gt;&lt;br /&gt;5 pm to 7 pm&lt;br /&gt;CED Terrace&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;18th Nov.&lt;/td&gt;
&lt;td&gt;Multi-Media/New Media. AVs, Photos, Internet - blogs&lt;/td&gt;
&lt;td&gt;Managing Data&lt;br /&gt;&lt;br /&gt;Akshara Class.; Mapping Data: Timbaktu experience- Anne Marie.&lt;/td&gt;
&lt;td&gt;Knowledge in an Internet Era: Role of DCs in Info-digital Society: Avinash Jha -&amp;nbsp; KICS Sharing Session: Chair: Ashish Rajadhaksha&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;19th Nov.&lt;/td&gt;
&lt;td&gt;Print Media&lt;br /&gt;&lt;br /&gt;Training Manuals, Newsletters, Posters etc&lt;br /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Producing Data:&lt;br /&gt;&lt;br /&gt;Data generation tools used by Aalochana in PC4D, Jagori safety audit&lt;br /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Internet : Reclaiming Civil society on the Internet. Public domain V/s copyright: Sunil Abraham:&lt;br /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;20th Nov.&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Interactive Media:&lt;br /&gt;Theatre, Melas?; Yuvati Mela:&amp;nbsp; &lt;br /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Dissemination&lt;br /&gt;Marketing issues: Alvito; Mobile Libraries (Aalochana)&lt;/td&gt;
&lt;td&gt;Ends&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2&gt;Workshop Banner&lt;/h2&gt;
&lt;img src="https://cis-india.org/home-images/bannerdoc20small.png/image_preview" title="DOC2.0" height="202" width="730" alt="DOC2.0" class="image-inline image-inline" /&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
See the original &lt;a class="external-link" href="http://ced.org.in/dcm/index.php?option=com_content&amp;amp;view=category&amp;amp;layout=blog&amp;amp;id=2&amp;amp;Itemid=5"&gt;here&lt;/a&gt;


        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/doc-2.0'&gt;https://cis-india.org/news/doc-2.0&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-02T08:13:51Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/identity-crisis">
    <title>Crisis for identity or identity crisis?</title>
    <link>https://cis-india.org/news/identity-crisis</link>
    <description>
        &lt;b&gt;The hurry with which the government is pushing its most ambitious project to assign a number (UID) to every citizen without any feasibility study or public debate has raised many questions.




&lt;/b&gt;
        
&lt;p&gt;“It will empower all”, declared Prime Minister Manmohan Singh when he issued the first UID card to a villager from Tembhli village in Maharashtra. But as days pass and relevant issues come for public discourse, many people have begun to doubt prime minister’s assurance.&lt;/p&gt;
&lt;p&gt;Unique identification number (UID), named Aadhaar is a 12 digit identification number that the government plans to issue to all citizens that will not only be an identity card but will also serve multiple purposes for its holder.&lt;/p&gt;
&lt;p&gt;Infosys co-founder Nandan Nilekani has been assigned the responsibility to execute this proposal as Chairman of the Unique Identification Authority of India (UIDAI). Mr Nilekani leads a team of 120 people having the task of assigning unique identities to 1.2 billion people. He plans to take Aadhaar beyond being just a 12-digit identification number for every Indian. This ambitious and mammoth project is pitched to handle projects as diverse as a national-highway toll-collection system, a technology backbone for the forthcoming Goods and Services Tax (GST) and reform of the vast public distribution system (PDS) for subsidized foodgrains.&lt;/p&gt;
&lt;p&gt;Government plans to cover 60 per cent of the nation’s population under this project in the next three years starting October this year. This project is intended to collect identification data about all residents in the country. It is said that it will impact the PDS and NREGA programmes, and plug leakages and save the government large sums of money.&lt;/p&gt;
&lt;p&gt;But the UID will not replace ration cards and passports, and is not mandatory as of now. No questions would be asked related to language, caste or religion of the person applying for UID.&lt;/p&gt;
&lt;p&gt;The UID number is linked to the fingerprints and the pattern of the eyes of the person assigned that number. This inimitable biometric data ensures that any given number is linked to only one person. So there is hardly a chance of any misgiving or stealing of rations and wages from the holder. It is believed that soon banks, insurance companies, cell phone providers and hospitals will demand UID number before doing business with you.&lt;/p&gt;
&lt;p&gt;In short, in the future our name, address, bank account numbers, personal information and identity as a whole will be solely linked and governed by those 12 digit number we hold.&lt;/p&gt;
&lt;div class="pullquote"&gt;Critics say that there has been no feasible study conducted about UID project, neither has there been a cost benefit analysis done. To add to it, there are serious concerns about data and identity theft.&lt;/div&gt;
&lt;p&gt;But apart from the buzz about this new project, there is an air of suspicion surrounding it too.&lt;/p&gt;
&lt;p&gt;The launch of the UID has led to a flurry of debate amongst policy-makers, legal experts and civil society at large. In response, Mr Nilekani claims the UID to be “a foolproof project implemented at a low cost”.&lt;/p&gt;
&lt;p&gt;However, some critical issues remain unanswered.&lt;/p&gt;
&lt;p&gt;One of the major objections about UID is that there has been no feasible study conducted, neither has there been a cost benefit analysis done. There is no project document as such.&lt;/p&gt;
&lt;p&gt;To add to it, there are serious concerns about data and identity theft.&lt;/p&gt;
&lt;p&gt;In a world where cyber terrorism is the new threat, and the countries are gearing themselves to protect against such a threat, projects like UID come as an open invitation to terrorist outfits to infiltrate their defences.&lt;/p&gt;
&lt;div&gt;The UID number is linked to fingerprints and the patterns of the holder’s eye. But medical studies show that our eye's iris patterns can change due to aging, disease or malnourishment. More over the government has no alternative option for many millions who fall outside this pattern of identification owing to callused hands, corneal scars and cataract induced by malnourishment. Even as enrollment is poised to begin, authentication is still an unstudied field. Fake fingerprints can very easily be made. Hence, the unique element of these numbers can be tampered.&lt;/div&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;&lt;span class="Apple-style-span"&gt;Recently, Sunil Abraham, Director, Centre for Internet and Society has remarked, “If I leave my fingerprints around, my identity can be stolen and transactions done on my behalf. They could use that number, to share information about anybody.”&lt;/span&gt;&lt;/blockquote&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;A cyber-criminal having access to any person’s identification number can virtually control that person. Telephone numbers, addresses, family history can all be tracked down. Bank accounts can be manipulated and transactions done without the person knowing. Since these days, a lot of money transactions are done through internet, a cyber criminal can easily steal few UID numbers and impersonate those persons to manipulate the bank or credit card accounts.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;In an even uglier scenario, where people might be tracked and judged by their numbers, a criminal’s fingerprints left behind on a scene of crime can be mixed with some one else through a slight manipulation and exchange of UID numbers, making an entirely innocent person a suspect in the eyes of law. Some incompetent or revengeful government officials can also frame innocents for a crime one never committed.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;Human rights activists claim that a tech-savvy person can hack into the system and gain any person’s information from the servers unless the government tightens the defenses. A reminiscence of the Bruce Willis starrer Hollywood blockbuster Die Hard 4, a bunch of techno geeks operating from trailer truck hold the entire United States hostage as they hack into every main frame computing network from transportation, communication, power, defence and individual accounts.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;The number can also be used for real time tracking, profiling, mounting surveillance and ‘convergence’ of information. Apart from the concerns about identity theft, the number can also invade our private space. If in the future insurance companies and hospitals merge their databases, the insurance companies can increase premium, or simply refuse insurance cover to a person who is not keeping well.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Poor labourers and immigrants who are on the move in search of work could also be the victims of the ‘Aadhaar’. In future, in case of card being lost or misplaced, poor labour would be threatened with financial and welfare exclusion. Where being a legal resident is to be closely tied in with having a UID number, it could render the poor vulnerable to exclusion and expulsion by exploitative employers and others.&lt;/div&gt;
&lt;/div&gt;
&lt;div class="pullquote"&gt;Interestingly, few months back in June, UK government scrapped the plans for the controversial 5 billion pounds National Identity Card scheme. The UK government now plans to destroy all information held on the National Identity Register, effectively dismantling the whole system.&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Though Mr Nilekani claims that UID would be a cost effective project, however deeper analysis throws a different story. It is reported that the UIDAI project will cost Rs 45,000 crores to the exchequer in the next 4 years. This does not seem to include the costs that will be incurred by Registrars, Enrollers, additional costs on the PDS system to connect it to the UID, the estimated cost to the end user and to the number holder.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;Defending himself from the flurry of queries, Mr Nilekani has stressed that the identification number is not mandatory for everyone and only those interested can enroll. The project aims to first enroll the poor and uneducated masses promising them better wages and ration schemes. As was reported, the first villager to get the UID card was ‘happy but did not know its benefits’. Critics allege that the reason why Aadhaar is selling itself to millions of poor in the country is to create a foundation of legitimacy to deflect concerns over its possible misuse, unsafe technology and huge costs. Later, with a larger foundation, the UID can be enforced upon all citizens in the near future as the apex identity proof, making everyone vulnerable to several risks described above.&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;The UIDAI project has proceeded so far without any legal authorization. There has been no feasibility study or cost-benefit analysis preceding the setting up of such a pervasive project. All calculations are of the back-of-the envelope variety. Data theft is a very serious threat to every individual and the country as a whole. There are deeply disconcerting facts about the project that should make even a die-hard UID supporter worry about its long term implications.&lt;/span&gt;&lt;br /&gt;&amp;nbsp;&lt;br /&gt;&lt;em&gt;This article has been written by Sushant Sharma. He is a college fresher and avid reader.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Interestingly, few months back in June, UK government scrapped the plans for the controversial 5 billion pounds National Identity Card scheme. The decision came after about 15,000 citizens had already been enrolled and given their numbers. The UK government now plans to destroy all information held on the National Identity Register, effectively dismantling the whole system.&lt;/p&gt;
&lt;p&gt;The UK system like the Indian UID had also started with much fanfare, claiming to save nearly 900 million pounds for the taxpayers. While the project was axed, UK’s Home Secretary Theresa May stated - “It (the identity card project) is intrusive and bullying, ineffective and expensive. It is an assault on individual liberty that does not promise a great good.”&lt;/p&gt;
&lt;p&gt;The same logic implies to the India as well. But instead of scraping this over-hyped-failure-in-the-making project, our Prime Minister claims the UID project “will empower all”. But will it actually? That is for us to decide now.&lt;/p&gt;
&lt;div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Read the original article &lt;a class="external-link" href="http://www.d-sector.org/article-det.asp?id=1396"&gt;here&lt;/a&gt;.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/identity-crisis'&gt;https://cis-india.org/news/identity-crisis&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-02T08:16:30Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/october-2010-bulletin">
    <title>October 2010 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/october-2010-bulletin</link>
    <description>
        &lt;b&gt;Greetings from the Centre for Internet and Society! &lt;/b&gt;
        &lt;h3&gt;&lt;b&gt;News Updates&lt;/b&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Internet, szabadon&lt;br /&gt;A polgárjogi aktivisták konfrontálódtak és panaszkodtak, a Google és a Facebook hárított és panaszkodott az Internet at Liberty konferencián, amelyet kedden és szerdán rendezett a Google és a CEU Budapesten.&lt;a href="http://bit.ly/dwNhRw"&gt;&lt;br /&gt;http://bit.ly/dwNhRw&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Hogyan szűrik a kormányok az internetes tartalmakat?&lt;br /&gt;Az internet szabadságáról tartanak háromnapos konferenciát Budapesten a Google és a Közép-Európai Egyetem (CEU) szervezésében. Kedden az internetes tartalmak szűrése volt a legfontosabb téma a rendezvényen.&lt;a href="http://bit.ly/aFApER"&gt;&lt;br /&gt;http://bit.ly/aFApER&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Konferencia az internetes szólásszabadságról Budapesten&lt;br /&gt;Az internet és szólásszabadság viszonyát vitatják meg Budapesten, a Közép-Európai Egyetem és a Google szervezte, háromnapos konferencián&lt;a href="http://bit.ly/9evwE4"&gt;&lt;br /&gt;http://bit.ly/9evwE4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;How the UID project can be a cause for concern&lt;br /&gt;The Unique Identification Authority of India (UIDAI), headed by Nandan Nilekani, is the UPA government's most ambitious project, where one billion Indians are branded with a unique identity number.&lt;a href="http://bit.ly/bl7INY"&gt;&lt;br /&gt;http://bit.ly/bl7INY&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;In new Facebook features, a comeback for community&lt;br /&gt;Nearly 750 tweets bombard the web every second. Internet traffic is growing by 40 per cent a year. People post 2.5 billion photos on Facebook every month. Every minute, 24 hours of video is uploaded on YouTube. But who owns all that data? Until now, big business was in complete control and used the data to monetise operations. But all that is set to change. With Facebook launching two new features, ‘Groups' and a ‘Download your information,' the community is making a comeback.&lt;a href="http://bit.ly/arEi4V"&gt;&lt;br /&gt;http://bit.ly/arEi4V&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Stiff Resistance Dogs India's ID Plan &lt;br /&gt;An article about the UID project by Indrajit Basu in Asia Times Online.&lt;a href="http://bit.ly/bMcOSs"&gt;&lt;br /&gt;http://bit.ly/bMcOSs&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Data Activism and Grassroots Empowerment in India&lt;br /&gt;Glover Wright of the Center for Internet and Society talks about Data Activism and Grassroots Empowerment in India at the Innovate/Activate Unconference in New York Law School on 24 September 2010.&lt;a href="http://bit.ly/alnjsn"&gt;&lt;br /&gt;http://bit.ly/alnjsn&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;b&gt;Upcoming Events&lt;/b&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Enabling Access to Education through ICT&lt;br /&gt;ICT workshop in Delhi....Registrations open! &lt;a href="http://bit.ly/9flyEK"&gt;&lt;br /&gt;http://bit.ly/9flyEK&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Network Culture: Archaeological and Artistic Interventions Public Seminar – Talk by Kristoffer Gansing and Linda Hilfing&lt;br /&gt;Kristoffer Gansing and Linda Hilfling will give a talk on Network Culture on 8 November 2010 in the Centre for Internet and Society, Bangalore.&lt;a href="http://bit.ly/cEmOZw"&gt;&lt;br /&gt;http://bit.ly/cEmOZw&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Research&lt;/b&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;City in the Internet 1: Geography Imagined (Part 1) &lt;br /&gt;“The estuaries that flirt with the land mass before they finally perish in the vast deep blue ocean beyond were perfect in their shape and grace. And you know what; from top it appears like a surreal landscape that is so restive and peaceful, almost heaven. The countryside is actually very beautiful”, says Pratyush Shankar in his latest blog post. A random conversation between two persons discovering the joys of seeing our existence through Google Earth!&lt;a href="http://bit.ly/9klUn1"&gt;&lt;br /&gt;http://bit.ly/9klUn1&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;A Digital Native coordinating Digital Natives&lt;br /&gt;Samuel Tettner, joined CIS as a Research Coordinator for the Digital Natives project. He has written a blog entry about his experiences in the project.&lt;a href="http://bit.ly/cpJMQq"&gt;&lt;br /&gt;http://bit.ly/cpJMQq&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;You Are Here&lt;br /&gt;Geo-tagging applications are creating new and impromptu communities of true, says Nishant Shah in his column on Digital Natives in the Indian Express.&lt;a href="http://bit.ly/a64kj7"&gt;&lt;br /&gt;http://bit.ly/a64kj7&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;નિશાંત શાહ: ડિજિટલ પેઢીનો ઉદય&lt;br /&gt;‘ડિજિટલ નાગરિક’ તેમને કહેવામાં આવે છે જેણે સામાન્ય જનજીવનમાં ડિજિટલ ટેક્નોલોજીના પ્રવેશ થઈ ગયા બાદ જન્મ લીધો છે. ડિજિટલ નાગરિકો દરેક જગ્યાએ છે. હવે સમય આવી ગયો છે કે આપણે એ જાણવાનો પ્રયાસ કરીએ કે આ લોકો કોણ છે, તેઓ શું કરી રહ્યા છે, તેઓ પોતાના અંગે શું વિચારે છે અને કેવી રીતે તેઓ કશું પણ જાણ્યા વગર આપણા ભવિષ્યને નવો આકાર આપવાનું કામ કરી રહ્યા છે. (A column by Nishant Shah in the Gujarati newspaper Divya Bhaskar)&lt;a href="http://bit.ly/9HnyBa"&gt;&lt;br /&gt;http://bit.ly/9HnyBa&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Digital Natives with a Cause?— Workshop in South Africa—FAQs&lt;br /&gt;The second international Digital Natives Workshop "My Bubble, My Space, My Voice" will be held in Johannesburg from 7 to 9 November 2010. Some frequently asked questions regarding the upcoming workshop are answered in this blog entry.&lt;a href="http://bit.ly/c1XJHO"&gt;&lt;br /&gt;http://bit.ly/c1XJHO&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;The silent rise of the Digital Native&lt;br /&gt;In late August, this year, the world shook for many when they went online (on their computers, PDAs, iPads, laptops) and realised that the comfortable zone of talking, chatting, sharing and doing just about everything else, had suddenly, without a warning, changed overnight (or afternoon, or morning, depending upon the time-zone they lived in). With a single change in its privacy and location settings, Facebook, home to billions of internet hours consisting of relationships, friendships, professional networks, social gaming, entertainment trivia, memories and exchanges, allowed its users to geo-tag themselves when on-the-move.&lt;a href="http://bit.ly/bHY72Y"&gt;&lt;br /&gt;http://bit.ly/bHY72Y&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;The geek shall inherit the earth&lt;br /&gt;Demystifying the mysterious -agents changing the world around you...A column on Digital Natives by Nishant Shah in the Indian Express.&lt;a href="http://bit.ly/aq2BqY"&gt;&lt;br /&gt;http://bit.ly/aq2BqY&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Digital Natives Workshop in South Africa - Call for Participation&lt;br /&gt;The African Commons Project, Hivos and the Centre for Internet and Society have joined hands for organising the second international workshop "My Bubble, My Space, My Voice" in Johannesburg from 07 to 09 November 2010. Send in your applications now!&lt;a href="http://bit.ly/d0rl7E"&gt;&lt;br /&gt;http://bit.ly/d0rl7E&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Telecom&lt;/b&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Broad-basing Broadband&lt;br /&gt;Education and training through the Internet need Commonwealth Games-like crisis management, says Shyam Ponappa in an article on broadband for education and training published in the Business Standard on 7 October 2010.&lt;a href="http://bit.ly/dnMtpU"&gt;&lt;br /&gt;http://bit.ly/dnMtpU&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/october-2010-bulletin'&gt;https://cis-india.org/about/newsletters/october-2010-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>CISRAW</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2012-08-07T12:02:11Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/internet-szabadon">
    <title>Internet, szabadon</title>
    <link>https://cis-india.org/news/internet-szabadon</link>
    <description>
        &lt;b&gt;A polgárjogi aktivisták konfrontálódtak és panaszkodtak, a Google és a Facebook hárított és panaszkodott az Internet at Liberty konferencián, amelyet kedden és szerdán rendezett a Google és a CEU Budapesten.&lt;/b&gt;
        
&lt;p&gt;– Célunk a szabad, nyílt és biztonságos internet. A Google igyekszik maximalizálni az információhoz való szabad hozzáférést, bár néha hibázunk. Útelágazáshoz érkeztünk, valószínű, hogy az internet korlátozottabb lesz, és a felhasználókat megfosztják hatalmuktól. 2002-ben még csak négy, 2010-ben már 40 ország – köztük Irán, Törökország, Oroszország és Kína – kormánya blokkol tartalmat a neten. Azon vannak, hogy kiépítésék saját, államilag támogatott és feltehetően cenzúrázott keresőiket. A Google célja, hogy a net szabad maradjon – röviden ezt mondta David Google Drummond, a Google jogi igazgatója, egyben a Google egyik alelnöke a Google és a CEU és a Google által szervezett nemzetközi konferencián, az Internet at Liberty 2010-en kedden Budapesten.&lt;br /&gt;&lt;br /&gt;Hát ezért kár volt ilyen messzire jönni.&lt;/p&gt;
&lt;p&gt;De még mielőtt a hallgatóság egy emberként a laptopjába bújt volna, hogy a Farmville-ben bekkelje ki az elkövetkező két napot, szerencsére kiderült, hogy a jelenlévők között akad rengeteg polgárjogi aktivista, netes szabadságharcos és született privacymániás a világ minden részéről. Ők gondoskodtak róla, hogy személyes, országos, sőt globális volumenű panaszaikkal árnyalják a süppedő padlószőnyegből és az erdei gigantposzterből áradó, felelősségteljes corporate derűt.&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/DavidDrummer.jpg/image_preview" alt="David Drummond, Senior Vice President, Google" class="image-inline image-inline" title="David Drummond, Senior Vice President, Google" /&gt;&lt;/p&gt;
&lt;p&gt;„Az internet önmagában nem változtat meg semmit. Ki kell menni az utcára, és a vérünkkel kell fizetnünk!”; „Legalább mondják meg, mi a szart csinálnak!”; „Tudja maga, milyen rendőrségünk van nekünk Pakisztánban?” - ilyen és ehhez hasonló hozzászólások árnyékolták be a felelősségteljes corporate derűt. Amely a sötét fellegek ellenére egészen kedd estig kitartott; de ne szaladjunk ennyire előre.&lt;/p&gt;
&lt;h3&gt;A jó, a csúf és az illegális&lt;/h3&gt;
&lt;p&gt;Az internetes szólásszabadság története a jó, a csúf és az illegális története, mondta a konferencia első beszélgetésén Rob Faris, a Harvard Berkman internetes központjának kutatási igazgatója és a nyílt internetért ügyködő OpenNet Initiative munkatársa. A legfontosabb feladat Faris szerint eldönteni azt, hol húzódik a határ a csúf, de még törvényes, és az illegális tartalom között. Erre a legjobb példa a netes pornó helyzete az Egyesült Államokban: az USA Legfelsőbb Bírósága kétszer is megsemmisítette a betiltást célzó törvényeket, és most ott tart az ügy, hogy csak az iskolákban és a könyvtárakban elérhetetlen a pornó, egyébként alkotmányos védelmet élvez. Nem úgy, mint Indiában, de ne szaladjunk ennyire előre.&lt;/p&gt;
&lt;p&gt;Faris szerint ugyanakkor világszerte mostanában jelennek meg az internetszabályozás második generációs módszerei, amelyek között ott vannak a szerzői jogi alapon benyújtott eltávolítási kérelmek, sőt az aktivisták és a médiaszájtok ellen intézett kibertámadások is. Az egyes országok kormányai finomítottak szűrési módszereiken, Bahreinben és Jemenben például a választások idején csak speciális szájtokat és információt blokkoltak, Argentína eljutott odáig, hogy néhány éve sikerült a Yahooból elérhetetlenné tennie a Diego Maradonára vonatkozó találatokat. Faris konklúziója: nemzetközi megoldásokra van szükség. De ne szaladjunk ennyire előre.&lt;/p&gt;
&lt;h3&gt;Panaszfal extra&lt;/h3&gt;
&lt;p&gt;Nem kellett sok idő hozzá, hogy a konferencia egyetlen hatalmas panaszfallá változzon, vicces és kevésbé vicces panaszrohamokkal. A kirgiz meghívott, Tattu Mambetalieva elmondta, hogy Kirgizisztánban kevesen neteznek, mert drága. Sunil Abraham, az indiai meghívott elmondta, hogy náluk blokkolják a pornót, különös tekintettel a Savita Bhabhi kalandjait ábrázoló &lt;a class="external-link" href="http://kirtu.com/index.php"&gt;képregénysorozatra&lt;/a&gt; &lt;strong&gt;[Warning: Not safe for work - adult content]&lt;/strong&gt;. Sazad Ahmad, a pakisztáni meghívott elmondta, hogy a náluk a kormány blaszfémiára hivatkozva blokkol, de mindig kiderül, hogy politikai okok állnak a háttérben.&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/MadeleineMorris.jpg/image_preview" alt="Madeleine Morris moderál a BBC-től. A Twitteren mad_morris " class="image-inline image-inline" title="Madeleine Morris moderál a BBC-től. A Twitteren mad_morris " /&gt;&lt;/p&gt;
&lt;p align="left"&gt;Egy szíriai aktivista arra panaszkodott, hogy a tunéziai kormány 12 millió dollárért vett a netes forgalom ellenőrzésére szolgáló szervert, és hogy a fejlődő országokban a tartalomszűrésre használt szoftvert nyugatról szerzik be. Egy jemeni aktivista arra panaszkodott, hogy a yemenportal.net-et blokkolja a kormányzat, és hogy a világ semmit nem tud az országban zajló tömegtüntetésekről, nem beszélve a helyi LGBT-közösségéről és a rockegyüttesekről. Tunéziában az a probléma, hogy ha tömegmegmozdulás szerveződik a neten, húszezren feliratkoznak ugyan rá, de csak tízen mennek el. Törökország több száz szájtot blokkol, köztük a YouTube-ot és a Google számos szolgáltatását (Docs, Books, Translate). Azerbajdzsánban két bloggert bebörtönöztek írásaik miatt, és azért nem engedik ki őket, mert nem számítanak újságírónak. A Facebook törli a szoptató anyákról készült képeket, és a Wikipédián az emberi anatómiát taglaló szócikkeket illusztráló fotókat egyre gyakrabban váltják fel rajzok.&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/SurfingatLiberty.jpg/image_preview" alt="Surfing at Liberty" class="image-inline image-inline" title="Surfing at Liberty" /&gt;&lt;/p&gt;
&lt;p align="left"&gt;Csodák csodájára a panaszok úgy pattantak le a jelen lévő politikusokról, diplomatákról és üzletemberekről, mint eltévedt golflabda a moha lepte kőkerítésről: a Facebook, a Google és a francia külügyminisztérium jelen lévő képviselői, részben tehát a közvetlen címzettek végig ügyesen hárítottak. Folyamatosan hangoztatták, milyen irtózatosan nehéz dolguk van ebben az egyre globálisabb világban, ahol diktatúrák és demokráciák között kell zsonglőrködniük, mindenkinek a kedvében járniuk, és ők mindent megtesznek ugyan, de hát Kína, ugye. Meg Irán. Főleg Irán. Így aztán nem hozott érdemi vitát a Facebook és a Google közös színpadi szereplése sem, pedig a két cég magas szinten képviseltette magát: a Google-től Drummond, a Facebooktól egyenesen Lord Richard Allan, Hallam bárója, volt brit parlamenti képviselő jött el Budapestre, akivel &lt;a class="external-link" href="http://index.hu/tech/2010/09/22/hogyan_kuzd_a_facebook_a_mellekkel/"&gt;interjút is készítettünk&lt;/a&gt; [2].&lt;/p&gt;
&lt;h3 align="left"&gt;Még a kritikus sem kritizál&lt;/h3&gt;
&lt;p align="left"&gt;„Nem áll szándékomban a privacy-vel kapcsolatos kritikát megfogalmazni”, mondta nekik kérdésnek látszó expozéjában Marc Rotenberg, az Electronic Privacy Information Center (EPIC) igazgatója, akitől joggal lehetett várni, hogy rendesen megszorongatja a Google és a Facebook tökét. Rotenberg a két cég képviselőihez intézett beszédében annyit mondott, hogy nem feltétlenül hasznos a szólásszabadságot és a magánszférát két ütköző, egymással kiegyensúlyozandó területként felfogni. Szerinte a kettő inkább kiegészíti egymást: az anonim véleménynyilvánítás joga például olyan terület, ahol kéz a kézben jár a magánszférához fűződő jog és a szólásszabadság.&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/DavidDrummondLordRichard.jpg/image_preview" alt="David Drummond (Google) és Lord Richard Allan (Facebook)" class="image-inline image-inline" title="David Drummond (Google) és Lord Richard Allan (Facebook)" /&gt;&lt;/p&gt;
&lt;p align="left"&gt;Rotenberg szerint még a privacy semmibe vételével folyamatosan vádolt Facebook sem az ördögtől való, olyannyira, hogy ő maga is fent van rajta. „A Facebook olyan, mint a telefon vagy az email. Használjuk csak politikai aktivizmusra, de legyünk tisztában a hiányosságaival” - mondta Rotenberg, aki szerint a kritikánál többet használ a dialógus.&lt;/p&gt;
&lt;p align="left"&gt;Mindeközben Lord Allan of Hallam szorgalmasan jegyzetelt az általa csak fPadként emlegetett, Facebook-kék színű füzetbe, Drummond a Google-től pedig atyai stílusban oktatta: „Sok-sok hibát fognak még elkövetni – mondta a Google főjogásza a brit bárónak. – De idővel majd beletanulnak”.&lt;/p&gt;
&lt;p align="left"&gt;A példátlan kultúrdialógus-kényszerben szinte elsikkadt az egyik legeredetibb résztvevő, Jevgenyij Morozov mondanivalója, pedig Morozov a techvilág jelenleg talán legnépszerűtlenebb álláspontját képviseli: azt hangoztatja, hogy az internet hozzásegíti a diktatúrákat ahhoz, hogy megerősítsék saját hatalmukat A belorusz származású blogger, újságíró és kutató általában szkeptikusan gondolkodik az internet demokratizáló hatásáról. Morozov, aki a tavalyi TED konferencián egész &lt;a class="external-link" href="http://www.ted.com/talks/evgeny_morozov_is_the_internet_what_orwell_feared.html"&gt;előadást&lt;/a&gt; [3]&amp;nbsp; tartott arról, hogyan élnek vissza a diktatúrák a modern technológiai eszközök és a web általában jótékonynak tartott adományaival, azt mondja, hogy az internet egyszerre autonóm erő, és egyszerre a hatalom eszköze. A kutató szerint túlságos leegyszerűsítés a kérdést az aktivisták és a kormányok közötti harcra lebontani. Először meg kell érteni a kultúra, a vallás, a nacionalizmus közötti kapcsolatokat, és csak utána kitalálni, hogyan vonatkoztatható mindez az internetre. A tanulság: tovább kell tanulmányozni a kérdést. Morozov nézeteit nem mindenki osztotta, egy hozzászóló szerint például Iránban kifejezetten jót tesz, hogy a bloggerek fényképeznek, írnak és az anyagot feltöltik a netre, legalább el tudják mondani, hogy a világ figyeli őket. És ez már önmagában reményt kelt.&lt;/p&gt;
&lt;p align="left"&gt;Read the original in &lt;strong&gt;&lt;a class="external-link" href="http://index.hu/tech/2010/09/22/internet_szabadon/"&gt;index&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/internet-szabadon'&gt;https://cis-india.org/news/internet-szabadon&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-02T09:25:49Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/uid-project-concern">
    <title>How the UID project can be a cause for concern</title>
    <link>https://cis-india.org/news/uid-project-concern</link>
    <description>
        &lt;b&gt;The Unique Identification Authority of India (UIDAI), headed by Nandan Nilekani, is the UPA government's most ambitious project, where one billion Indians are branded with a unique identity number. &lt;/b&gt;
        &lt;p&gt;Prime Minister Manmohan Singh&amp;nbsp; handed over the first of the Aadhaar cards at Tembhli village in Nandurbar district of Maharashtra. This mammoth project aims to provide Indian residents with a unique 12-digit identification number that will serve multiple purposes.&lt;/p&gt;
&lt;p&gt;Given the reach and the impact of such an exercise there is much excitement around the Unique Identity (UID) number (also known as Aadhaar) drive, along with some confusion.&lt;/p&gt;
&lt;p&gt;However, there remains some concerns of identity theft.&lt;/p&gt;
&lt;p&gt;For example, the number is linked to their fingerprints and the patterns in their eyes. Since those markers are unique to each of us, no one will steal their rations and wages again. They will be issued only after verification. But our eye's Iris patterns change, with age, disease or malnourishment. Fake fingerprints can very easily be made. Hence, the unique element of these numbers can be tampered.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Sunil Abraham, Director, Centre for Internet and Society said, “If I leave my fingerprints around, my identity can be stolen and transactions done on my behalf.”&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;Activists claim that in a few years, banks, insurance companies, cell phone providers and hospitals will demand UID number before doing business with you. They could use that number, to share information about anybody.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;Hence, Abraham said, “An insurance company and a hospital can merge databases. If you have AIDS or TB, they can bump up your premium, or refuse you cover.”&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Usha Ramanathan, lawyer said, “Say I go to Srinagar six times in a month. That information could be accessed by the government because the airlines asked for my number before booking a ticket. And that could make me a suspect. There's something wrong in being treated as a suspect for no other reason, than state paranoia.”&lt;/p&gt;
&lt;p&gt;Interestingly, even though India seems excited about this project, Britain recently stopped attempts at biometric based identification systems, after warnings that such a database could easily be hacked.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;See the &lt;a class="external-link" href="http://ibnlive.in.com/videos/132833/how-the-uid-project-can-be-a-cause-for-concern.html"&gt;video&lt;/a&gt; here.&lt;br /&gt;See the original coverage in &lt;a class="external-link" href="http://ibnlive.in.com/news/how-the-uid-project-can-be-a-cause-for-concern/132375-3.html"&gt;IBN Live&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/uid-project-concern'&gt;https://cis-india.org/news/uid-project-concern&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-04-09T12:59:02Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/new-facebook-features">
    <title>In new Facebook features, a comeback for community </title>
    <link>https://cis-india.org/news/new-facebook-features</link>
    <description>
        &lt;b&gt;Nearly 750 tweets bombard the web every second. Internet traffic is growing by 40 per cent a year. People post 2.5 billion photos on Facebook every month. Every minute, 24 hours of video is uploaded on YouTube. But who owns all that data? Until now, big business was in complete control and used the data to monetise operations. But all that is set to change. With Facebook launching two new features, ‘Groups' and a ‘Download your information,' the community is making a comeback.&lt;/b&gt;
        
&lt;h3&gt;More control over data&lt;/h3&gt;
&lt;p&gt;If Facebook CEO Mark Zuckerberg is to be believed, users now have more control over who sees their data and how much. They can also bundle up their entire social graph (as a zip file) and walk away to another service.&lt;/p&gt;
&lt;p&gt;‘Groups' tries to tackle one of Facebook's long-standing problems. On Facebook, everyone, from your boss to your long-lost school friend, is a “friend.” And this means annoying, sometimes embarrassing situations.&lt;/p&gt;
&lt;p&gt;An easy way to form small private groups on a social network, as we do in real life, is the “biggest problem in social networking,” Mr. Zuckerberg told journalists after the announcement.&lt;/p&gt;
&lt;p&gt;The Groups feature allows you to form small circles of friends. Up to 300 Groups per user are allowed, and the tool also allows Group chat and emails. The groups can be open, closed, or secret, depending on the privacy settings.&lt;/p&gt;
&lt;p&gt;Gaurav Mishra, Director (Digital and Social Media), MS&amp;amp;L Group, Asia-Pacific, says this step is important for Facebook, given the rising competition in social networking.&lt;/p&gt;
&lt;p&gt;With alternatives on the horizon, such as Diaspora, which is being designed as an open-source, privacy-conscious social network, and Google's plans to integrate social networking elements into its services through ‘Google Me,' Facebook has to take up this “strategic pre-emptive move,” says Mr. Mishra.&lt;/p&gt;
&lt;p&gt;But the Groups feature comes with its own baggage. It is not ‘opt in.' A friend can add you to the Group, and you get to decide whether you want to be in it or not. It appears that in the trade-off between giving the user more control and encouraging use, Facebook has chosen the latter.&lt;/p&gt;
&lt;p&gt;Users will also have to be prepared for more noise as the new features offer a mirage of secure conversation space that will encourage them to share more personal details.&lt;/p&gt;
&lt;p&gt;“The amount of sharing will go up massively and will be completely addictive,” Mr. Zuckerberg predicted.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Sunil Abraham, Executive Director, Centre for Internet and Society, says: “Facebook has always taken a more promiscuous approach to configuring our social behaviour online, the primary motivation being the maximisation of user transactions and consequently profits.”&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;According to him, the logic of adding a user to a group without seeking permission first makes a lot of assumptions, including that you check your account regularly to do early damage control and that your friends follow best security practices.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;“I would warn people not to do anything on a Facebook group — open, closed or secret — that they would not do on email.”&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Read the original in the&lt;a class="external-link" href="http://www.hindu.com/2010/10/10/stories/2010101055841600.htm"&gt; Hindu&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/new-facebook-features'&gt;https://cis-india.org/news/new-facebook-features&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-02T09:58:34Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/events/technical-aspects-of-uid">
    <title>Technical Aspects of UID: A Public Talk </title>
    <link>https://cis-india.org/events/technical-aspects-of-uid</link>
    <description>
        &lt;b&gt;Prof. K Gopinath from Indian Institute of Science and Sunil Abraham from the Centre for Internet and Society will give a lecture on the technical aspects of UID on 20 October 2010 at the Centre for Internet and Society in Bangalore.&lt;/b&gt;
        
&lt;p&gt;Prof. Gopinath and Sunil Abraham will give a lecture on the technical challenges in realizing UID-like systems. Given the publicly available information, the speakers will evaluate the realizability of an online pan-India UID system and identify some issues that may need to be addressed.&lt;/p&gt;
&lt;h2&gt;About Prof. K Gopinath&lt;/h2&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/copy_of_gopi.jpg/image_preview" alt=" K Gopinath" class="image-inline image-inline" title=" K Gopinath" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;K Gopinath&lt;/strong&gt; is a professor in computer science and automation at the Indian Institute of Science in Bangalore. His research interests are in operating systems and related systems such as security. To know more about Prof. Gopinath, visit his &lt;a class="external-link" href="http://drona.csa.iisc.ernet.in/~gopi/"&gt;homepage&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;About Sunil Abraham&lt;/h2&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/sunil.jpg/image_preview" alt="Sunil Abraham" class="image-inline image-inline" title="Sunil Abraham" /&gt;&lt;br /&gt;&lt;strong&gt;Sunil Abraham&lt;/strong&gt;&amp;nbsp;is the executive director of the Centre for Internet and Society (CIS),in Bangalore. He is the founder of Mahiti, a social enterprise aiming to reduce the cost and complexity of information and communication technology for the voluntary sector by using free software. &amp;nbsp;For three years, Sunil also managed the International Open Source Network, a project of United Nations Development Programme's Asia-Pacific Development Information Programme, serving 42 countries in the Asia-Pacific region.&amp;nbsp;&lt;/p&gt;
VIDEOS

&lt;embed src="http://blip.tv/play/AYKJvloA" type="application/x-shockwave-flash" width="250" height="250" allowscriptaccess="always" allowfullscreen="true"&gt;&lt;/embed&gt;

&lt;embed src="http://blip.tv/play/AYKJwUcA" type="application/x-shockwave-flash" width="250" height="250" allowscriptaccess="always" allowfullscreen="true"&gt;&lt;/embed&gt;

&lt;embed src="http://blip.tv/play/AYKJ4VgA" type="application/x-shockwave-flash" width="250" height="250" allowscriptaccess="always" allowfullscreen="true"&gt;&lt;/embed&gt;

&lt;embed src="http://blip.tv/play/AYKKj2IA" type="application/x-shockwave-flash" width="250" height="250" allowscriptaccess="always" allowfullscreen="true"&gt;&lt;/embed&gt;

&lt;embed src="http://blip.tv/play/AYKJ5CEA" type="application/x-shockwave-flash" width="250" height="250" allowscriptaccess="always" allowfullscreen="true"&gt;&lt;/embed&gt;

&lt;embed src="http://blip.tv/play/AYKJ5xIA" type="application/x-shockwave-flash" width="250" height="250" allowscriptaccess="always" allowfullscreen="true"&gt;&lt;/embed&gt;

&lt;embed src="http://blip.tv/play/AYKJ6hAA" type="application/x-shockwave-flash" width="250" height="250" allowscriptaccess="always" allowfullscreen="true"&gt;&lt;/embed&gt;

&lt;embed src="http://blip.tv/play/AYKJ62wA" type="application/x-shockwave-flash" width="250" height="250" allowscriptaccess="always" allowfullscreen="true"&gt;&lt;/embed&gt;

&lt;embed src="http://blip.tv/play/AYKJ7TAA" type="application/x-shockwave-flash" width="250" height="250" allowscriptaccess="always" allowfullscreen="true"&gt;&lt;/embed&gt;

&lt;embed src="http://blip.tv/play/AYKKiisA" type="application/x-shockwave-flash" width="250" height="250" allowscriptaccess="always" allowfullscreen="true"&gt;&lt;/embed&gt;

&lt;embed src="http://blip.tv/play/AYKKi20A" type="application/x-shockwave-flash" width="250" height="250" allowscriptaccess="always" allowfullscreen="true"&gt;&lt;/embed&gt;

&lt;embed src="http://blip.tv/play/AYKKjVAA" type="application/x-shockwave-flash" width="250" height="250" allowscriptaccess="always" allowfullscreen="true"&gt;&lt;/embed&gt;

&lt;embed src="http://blip.tv/play/AYKKjgsA" type="application/x-shockwave-flash" width="250" height="250" allowscriptaccess="always" allowfullscreen="true"&gt;&lt;/embed&gt;

&lt;embed src="http://blip.tv/play/AYKKjkAA" type="application/x-shockwave-flash" width="250" height="250" allowscriptaccess="always" allowfullscreen="true"&gt;&lt;/embed&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/technical-aspects-of-uid'&gt;https://cis-india.org/events/technical-aspects-of-uid&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-04T07:23:15Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/stiff-resistance">
    <title>Stiff Resistance Dogs India's ID Plan</title>
    <link>https://cis-india.org/news/stiff-resistance</link>
    <description>
        &lt;b&gt;An article about the UID project by Indrajit Basu in Asia Times Online.&lt;/b&gt;
        
&lt;p&gt;Tembhali is little known beyond its neighborhood in northern Maharashtra. Yet, as Manmohan Singh and Sonia Gandhi descended by on Wednesday, the tiny hamlet with less than 1,500 residents suddenly became the center of attraction in the global arena of e-governance.&lt;/p&gt;
&lt;p&gt;India's prime minister and the ruling Congress party's leader were helicoptered in to officially flag India's most ambitious attempt to transform the way the state reaches its citizens - and also the world's largest identity program.&lt;/p&gt;
&lt;p&gt;The so-called Unique Identification (UID) mission, which has been dubbed locally as "Aadhar" ("foundation"), the project will create unique biometric identification numbers for each and every one of India's 1.2 billion people.&lt;/p&gt;
&lt;p&gt;Ambitious yet highly controversial, UID numbers will be linked to fingerprints, iris scans, personal information, a microchip for easy scanning, and more. Led by a new government agency called the Unique Identification Authority of India (UIDAI), the project is spearheaded by Nandan Nilekeni, one of India's most famous techie-entrepreneurs as the co-founder of Infosys, who has been given ministerial powers and a magnanimous (rumored to be US$3 billion or more) budget to implement the grand plan.&lt;/p&gt;
&lt;p&gt;According to Nilekeni, among the scores of advantages for the country's people, the millions of India's poor who are without access to the government's plethora of welfare schemes would benefit the most from the new identification system. Much like the mobile telephony, the UID number would connect the poor to the broader and advancing economy of India, he says.&lt;/p&gt;
&lt;p&gt;"The government has taken up this project for two reason; one is there are large number of Indians specially those who are urban migrants and rural poor who do not have any form of acknowledged existence by the state and therefore they face the challenge of harassment in their lives. They do not get access to public services either. So the one of the main purposes of this program is to make life easier for the millions of poor, migrants and marginalized (expected to be over 300 million) people. As well as to give inclusion to them," said Nilekeni.&lt;/p&gt;
&lt;p&gt;The other is to make all government welfare schemes far more efficient by ensuring that they reach "each and every deserving poor", he says.&lt;/p&gt;
&lt;p&gt;Even as the impoverished tribal farming community in Tembhali - many of whom do not even own the land they till - wonder how a unique identity, as Manmohan declared on Wednesday, "can change their lives", UID is meeting stiff resistance from civil liberties groups, privacy advocates, and legal eagles.&lt;/p&gt;
&lt;p&gt;Critics condemn the UID as a blatant intrusion to privacy, a tool that will increase bureaucracy and corruption, and say that in addition to being hugely expensive and even illegal, the UID goes against basic human values.&lt;/p&gt;
&lt;p&gt;"This project, has been initiated without any prelude: there is no project document; there is no feasibility study; there has been no cost-to-benefit analysis and there are serious concerns about data and identity theft," said Gopal Krishna, Member Citizens Forum for Civil Liberties.&lt;/p&gt;
&lt;p&gt;Worse, Krishna added, a project "that could change the status of the people in this country, with regard to security and constitutional rights has been initiated without any legal authorization; just on the basis of an executive order".&lt;/p&gt;
&lt;p&gt;The strongest opposition to the project has been generated by the fact that it aims to create a huge digital database containing sensitive personal information in one central location. This is a security risk of "immense" proportions, according to critics.&lt;/p&gt;
&lt;p&gt;"Given that the country has hardly any capability in securing its digital database, and an absence of privacy laws, UID's plans of storing its data in one centralized database is an immense risk," said Sunil Abraham, an activist at the People Union for Civil Liberties. "The trouble with a centralized infrastructure is that if it is compromised, then all of it will be compromised, which can result in the collapse of the country's information systems."&lt;/p&gt;
&lt;p&gt;Nilekeni deflects these criticisms, saying that the UID Authority will use "the best expertise for security and we also have a policy of proactively publishing strategy policy report and committee reports on our website as well." But arguments against the project stretch on.&lt;/p&gt;
&lt;p&gt;"The other opposition is the use of biometrics for ID," says Abraham. "Our fear is that most parts of the country do not have power and if the system mandates that every time a rural resident has to prove his identity biometrically for say collecting subsidized food, chances are that the process will be slower and more prone to failure because of lack of infrastructure."&lt;/p&gt;
&lt;p&gt;That, according to critics, could give rise to newer complication or even manipulation of the biometric data - and hence an additional opportunity for corruption.&lt;/p&gt;
&lt;p&gt;"A typical unlettered person does not understand the complexities of biometric data collection and verification," says Jiti Nichani, a researcher and an advocate, Alternative Law Forum. "Given the rampant bureaucracy and corruption in the country, this would give yet another reason for the corrupt to siphon off the largesse of a welfare scheme elsewhere; corruption will increase manifold as a consequence."&lt;/p&gt;
&lt;p&gt;Still, its flip side is not really devoid of selling points; some of UID's beneficial characteristics are undeniable.&lt;/p&gt;
&lt;p&gt;For one, experts say, for every rupee spent on the government's welfare schemes, lack of identity of a poor Indian results in just 15 paisa reaching them. UID then can really revolutionize the way government services are delivered.&lt;/p&gt;
&lt;p&gt;Besides, inability to prove identity is not only one of the biggest barriers that prevent the poor from accessing benefits and subsidies, or stymie the government from reaching out to the deserving. It also stops the government formulating appropriate welfare polices, plugging leakages, and above all, eliminating fraud and duplicate identities.&lt;/p&gt;
&lt;p&gt;UID, say its proponents, will no longer allow someone to represent themselves differently across a number of agencies, which could solve a lot these problems.&lt;/p&gt;
&lt;p&gt;"A UID will enable the poor grab the right to education, get jobs on migration, get medical benefits and even open a bank account and get a mobile phone connection," said Nilekni. "The transformative capability of the UID scheme can be enormous."&lt;/p&gt;
&lt;p&gt;Nevertheless, providing an identity to one billion plus Indians in a country so devoid of basic infrastructure is a Herculean task.&lt;/p&gt;
&lt;p&gt;Its real challenge may not lie in the concerns that critics have raised, but perhaps in the politics of governance and its reforms. Experts say the success of the project depends on the effective use of political authority, and how Nilekeni and Manmohan manage to address corruption in the political and official systems.&lt;/p&gt;
&lt;p&gt;Nilekeni though is undaunted. "I am aware that there are a lot of challenges and this is a humongous project," he said. "But there is a lot of political will and support, and the government is firmly convinced that this project could change the face of India."&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Read the original in &lt;a class="external-link" href="http://www.atimes.com/atimes/South_Asia/LJ01Df02.html"&gt;Asia Times Online&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Note&lt;/strong&gt;: &lt;em&gt;Sunil Abraham does not work for People's Union for Civil Liberties&lt;/em&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/stiff-resistance'&gt;https://cis-india.org/news/stiff-resistance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-02T09:59:06Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/september-2010-bulletin">
    <title>September 2010 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/september-2010-bulletin</link>
    <description>
        &lt;b&gt;Greetings from the Centre for Internet and Society! In this bulletin we bring you updates of our research, news and media coverage and announcement of events organised in the month of September 2010.&lt;/b&gt;
        &lt;h2&gt;&lt;b&gt;News Updates&lt;/b&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Conference: Internet at Liberty 2010: This conference is being held in Budapest from 20 to 22 September 2010. It is co-sponsored by Google and Central European University. Sunil Abraham and Anja Kovacs are attending the conference. &lt;a href="http://bit.ly/afo0WY" target="_blank"&gt;&lt;br /&gt;http://bit.ly/afo0WY&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt; INDIA Fears of Privacy Loss Pursue Ambitious ID Project: Fears about loss of privacy are being voiced as India gears up to launch an ambitious scheme to biometrically identify and number each of its 1.2 billion inhabitants. &lt;a href="http://bit.ly/dnJDRu" target="_blank"&gt;&lt;br /&gt;http://bit.ly/dnJDRu&lt;/a&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Innovate / Activate: The event will be held on 24 and 25 September 2010 at New York Law School. &lt;a href="http://bit.ly/cbICFq" target="_blank"&gt;http://bit.ly/cbICFq&lt;/a&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Webinar: Closed for Business: A Global Panel Discusses International Copyright Laws and Their Impact on the Open Internet &lt;a href="http://bit.ly/a3ZFBw" target="_blank"&gt;&lt;br /&gt;http://bit.ly/a3ZFBw&lt;/a&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The madness of software patents &lt;br /&gt;India’s patent law excludes software per se, yet over a thousand patents have been granted, writes Lata Jishnu in an article published in Down to Earth. &lt;a href="http://bit.ly/cpHd7R" target="_blank"&gt;&lt;br /&gt;http://bit.ly/cpHd7R&lt;/a&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Why piracy is tough to rein in &lt;br /&gt;“Video market is being treated as a poor cousin of the film industry” &lt;a href="http://bit.ly/aDUpiY" target="_blank"&gt;&lt;br /&gt;http://bit.ly/aDUpiY&lt;/a&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Transparency and MDGs: the Role of the Media and Technology &lt;br /&gt;Key quotes from sixth panel &lt;a href="http://bit.ly/b3a0YC" target="_blank"&gt;&lt;br /&gt;http://bit.ly/b3a0YC&lt;/a&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Copyright bill restricts Net access &lt;br /&gt;Law to curb piracy may fetter creativity &lt;a href="http://bit.ly/cFj3rD" target="_blank"&gt;&lt;br /&gt;http://bit.ly/cFj3rD&lt;/a&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;科技改變社會 數位原生代計畫 &lt;br /&gt;The Chinese language press covered the Digital Natives workshop in Taipei. &lt;a href="http://bit.ly/bPhEO4" target="_blank"&gt;&lt;br /&gt;http://bit.ly/bPhEO4&lt;/a&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;科技改變社會數位原生代掀波 &lt;br /&gt;The Chinese press published an article on Digital Natives. &lt;a href="http://bit.ly/bHaQor" target="_blank"&gt;&lt;br /&gt;http://bit.ly/bHaQor&lt;/a&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Information is Beautiful hacks in India with David Cameron &lt;br /&gt;The Prime Minister took some of the UK's top hackers and data experts with him to India this week. David McCandless was with them. &lt;a href="http://bit.ly/dr3AJ2" target="_blank"&gt;&lt;br /&gt;http://bit.ly/dr3AJ2&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;b&gt;Events&lt;/b&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;International Conference on Enabling Access to Education through ICT: ICT workshop in New Delhi from 27th to 29th October, 2010...Registrations open!&lt;a href="http://bit.ly/9flyEK" target="_blank"&gt;&lt;br /&gt;http://bit.ly/9flyEK&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;A Talk by Philipp Schmidt: Philip Schmidt of Peer 2 Peer University will be giving a lecture at the Centre for Internet and Society, Bangalore on 6 October, 2010. &lt;a href="http://bit.ly/aVyzMq" target="_blank"&gt;&lt;br /&gt;http://bit.ly/aVyzMq&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;b&gt;Research&lt;/b&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;On Talking Back: A Report on the Taiwan Workshop: What does it mean to Talk Back? Who do we Talk Back against? Are we alone in our attempts or a part of a larger community? How do we use digital technologies to find other peers and stake-​holders? What is the language and vocabulary we use to successfully articulate our problems? How do we negotiate with structures of power to fight for our rights? These were the kind of questions that the Talking Back workshop held in the Institute of Ethnology, Academia Sinica in Taiwan from 16 to 18 August 2010 posed. &lt;a href="http://bit.ly/daE4dM" target="_blank"&gt;&lt;br /&gt;http://bit.ly/daE4dM&lt;/a&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The Binary: City and Nature: A continuation of the last post wherein I am looking at various other representation of the city in both classical and popular medium, today I am writing my views on the analysis of certain Miniature paintings. &lt;a href="http://bit.ly/b5FP5D" target="_blank"&gt;&lt;br /&gt;http://bit.ly/b5FP5D&lt;/a&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Of the State and the Governments - The Abstract, the Concrete and the Responsive: This post examines the concepts of state and government to lay the ground for understanding responsiveness enforced through transparency discourses and the deployment of ICTs, the Internet and e-governance programmes. It also lays the context for understanding why and how ICTs. Internet and e-governance have been deployed in India for improving government-citizen interfaces, eliminating middlemen, delivering services electronically and for introducing a range of similar reforms to institute transparency and a responsive state. &lt;a href="http://bit.ly/cNLKcY" target="_blank"&gt;&lt;br /&gt;http://bit.ly/cNLKcY&lt;/a&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The Responsive State --- Introduction to the Series: This post is an introduction to a series of posts on the concept of the 'responsive state'. In this series, I try to explain the various meanings that the term responsiveness has come to acquire when it is used in relation with the discourses surrounding transparency and the deployment of ICTs and the Internet to enforce transparency and thereby create a responsive state. Understanding the notion of responsiveness requires us to revisit and analyze certain concepts and the relations that have been drawn between concepts such as state, government, politics, administration, transparency, effectiveness, government-citizen interface, ICTs and effectiveness, among others. &lt;a href="http://bit.ly/agBOiq" target="_blank"&gt;&lt;br /&gt;http://bit.ly/agBOiq&lt;/a&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Attentional Capital in Online Gaming: The Currency of Survival &lt;br /&gt;This blog post by Arun Menon discusses the concepts of production, labour and race in virtual worlds and their influence on the production of attention as a currency. An attempt is made to locate attentional capital, attentional repositories and attention currencies within gaming to examine 'attention currencies and its trade and transactions in virtual worlds. A minimal collection of attention currencies are placed as central and as a pre-requisite for survival in MMOs in much the same way that real currency become a necessity for survival. The approach is to locate attentional capital through different perspectives as well as examine a few concepts around virtual worlds. &lt;a href="http://bit.ly/aaGZj8" target="_blank"&gt;&lt;br /&gt;http://bit.ly/aaGZj8&lt;/a&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;What's in a Name? Or Why Clicktivism May Not Be Ruining Left Activism in India, At Least for Now: In a recent piece in the Guardian titled “Clicktivism Is Ruining Leftist Activism”, Micah White expressed severe concern that, in drawing on tactics of advertising and marketing research, digital activism is undermining “the passionate, ideological and total critique of consumer society”. His concerns are certainly shared by some in India: White's piece has been circulating on activist email lists where people noted with concern that e-activism may be replacing “the real thing” even in this country. But is the situation in India really this dire? &lt;a href="http://bit.ly/9a3I0G" target="_blank"&gt;&lt;br /&gt;http://bit.ly/9a3I0G&lt;/a&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Sexuality, Queerness and Internet technologies in Indian context: This blog post lays out the discursive construction of sexuality and queerness as intelligible domains in the Indian context while engaging with ideas of visibility, representation, exclusion, publicness, criminality, difference, tradition, experience, and community that have come into use with the critical responses to queer identities and practices in India. &lt;a href="http://bit.ly/byfPye" target="_blank"&gt;&lt;br /&gt;http://bit.ly/byfPye&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;b&gt;Accessibility&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Enabling Access to Education through ICT - A Conference in Delhi: The Centre for Internet and Society (CIS), Bangalore in cooperation with the Global Initiative for Inclusive ICT (G3ICT), a flagship advocacy organization of the UN Global Alliance on ICT and Development (UN-GAID), the International Telecommunications Union (ITU), UNESCO, Digital Empowerment Foundation, Society for Promotion of Alternative Computing and Employment and the Deafway Foundation is organizing an international conference, Enabling Access to Education through ICT in New Delhi from 27 to 29 October 2010. The event is sponsored by Hans Foundation. Registration for the conference has begun. &lt;a href="http://bit.ly/bmrkf7" target="_blank"&gt;&lt;br /&gt;http://bit.ly/bmrkf7&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;b&gt;Access to Knowledge&lt;br /&gt;&lt;/b&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Pre-grant Opposition Filed for a Software Patent Application by Blackberry Manufacturers: A pre-grant opposition was filed against a software patent application filed in the patent office by Certicom, a wholly owned subsidiary of Research in Motion (RIM), manufacturers of Blackberry. The opposition was filed on August 31, 2010 by the Software Freedom Law Centre which has recently expanded its operations to India. This exciting development was announced by Mishi Choudhary from SFLC on the lines of the seminar on “Software Patents and the Commons” organised on 1 September 2010 in Delhi jointly by SFLC, the Centre for Internet and Society, the Society for Knowledge Commons and Red Hat. Filing more such oppositions to software patents in India was in the pipeline and this is just the beginning of a movement to take on monopolisation of knowledge and ideas through patenting software, the organisers said. &lt;a href="http://bit.ly/9wE1Xs" target="_blank"&gt;&lt;br /&gt;http://bit.ly/9wE1Xs&lt;/a&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;First Post-Bilski Decision - Software Patent Rejected: In the first decision post-Bilski, the Board of Patents Appeals and Interferences (BPAI) rejected a software patent claimed by Hewlett-Packard. The ruling in this case has buttressed the fact that the Bilski decision furthered the cause of narrowing the patentability of software even though the Supreme Court of the United States totally avoided mentioning software patents or the applicability of the machine or transformation test for software patents in its decision. &lt;a href="http://bit.ly/cnPw7E" target="_blank"&gt;&lt;br /&gt;http://bit.ly/cnPw7E&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The Bilski Case - Impact on Software Patents: The Supreme Court of the United States gave its decision in Bilski v Kappos on 28 June, 2010. In this case the petitioners’ patent application sought protection for a claimed invention that explains how commodities buyers and sellers in the energy market can protect, or hedge, against the risk of price changes. The Court in affirming the rejection by the Court of Appeals for the Federal Circuit also held that the machine- or-transformation test is not necessarily the sole test of patentability. The Court’s ruling of abstract ideas as unpatentable and its admission that patents do not necessarily promote innovation and may sometimes limit competition and stifle innovation have provided a ray of hope. In the light of the developments, the Bilski decision as far as patentability of software is concerned may not be totally insignificant, says Krithika Dutta Narayana.&lt;a href="http://bit.ly/bjrPGh" target="_blank"&gt;&lt;br /&gt;http://bit.ly/bjrPGh&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;b&gt;Openness&lt;/b&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt; Free Access to Law—Is it here to Stay? An Environmental Scan Report: The following is a preliminary project report collaboratively collated by the researchers of the "Free Access to Law" research study. This report aims to highlight the trends, as well as the risks and opportunities, for the sustainability of Free Access to Law initiatives in each of the country examined. &lt;a href="http://bit.ly/9VVzkk" target="_blank"&gt;&lt;br /&gt;http://bit.ly/9VVzkk&lt;/a&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Open Access to Science and Scholarship - Why and What Should We Do?: The National Institute of Advanced Studies held the eighth NIAS-DST  training programme on “Multidisciplinary Perspectives on Science,  Technology and Society” from 26 July to 7 August, 2010. The theme of the  project was ‘Knowledge Management’. Dr. MG Narasimhan and Dr. Sharada  Srinivasan were the coordinators for the event. Professor Subbiah  Arunachalam made a presentation on Open Access to Science and  Scholarship. &lt;a href="http://bit.ly/ciohYy" target="_blank"&gt;&lt;br /&gt;http://bit.ly/ciohYy&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;b&gt;Internet Governance&lt;/b&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Moldova Online: An Interview with Victor Diaconu: In this interview for Russian Cyberspace, set up with the help of Sunil Abraham (Executive Director at the Centre for Internet and Society in Bangalore, India), computer software professional Victor Diaconu explains the nature of Internet use, state control and the development of blogging and social media platforms in Moldova. Victor works at Computaris in Chisinau. He is Moldova educated, and has travelled to several western countries (including lengthy stays to US, UK) to learn about and understand what there is to be done in Moldova. Sudha Rajagopalan interviewed Victor Diaconu. &lt;a href="http://bit.ly/cgIvXT" target="_blank"&gt;&lt;br /&gt;http://bit.ly/cgIvXT&lt;/a&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Presentation of the UID project by Ashok Dalwai – A Report: On Tuesday, 7 September 2010, Ashok Dalwai, the Deputy Director General of the Unique Identification of India (UIDAI), gave a lecture at the Indian Institute for Science in Bangalore. Representing the UID Authority, his presentation explained the vision of the project and focused on the challenges involved in demographic and biometric identification, the technology adopted, and the enrolment process. Elonnai Hickok gives a report of his presentation in this blog post. &lt;a href="http://bit.ly/aAy5DG" target="_blank"&gt;&lt;br /&gt;http://bit.ly/aAy5DG&lt;/a&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Beyond Access as Inclusion: On 13 September, the day before the fifth Internet Governance Forum opens, CIS is co-organised in Vilnius a meeting on Internet governance and human rights. One of the main aims of this meeting was to call attention to the crucial, yet in Internet governance often neglected, indivisibility of rights. In this blog post, Anja Kovacs uses this lens to illustrate how it can broaden as well reinvigorate our understanding of what remains one of the most pressing issues in Internet governance in developing countries to this day: that of access to the Internet. &lt;a href="http://bit.ly/cgS9py" target="_blank"&gt;&lt;br /&gt;http://bit.ly/cgS9py&lt;/a&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Summary of UID Public Meeting, August 25 2010: A summary of the "No UID" public meeting that took place on Aug. 25th at the Constitution Club, New Dehli. &lt;a href="http://bit.ly/9epHTz" target="_blank"&gt;&lt;br /&gt;http://bit.ly/9epHTz&lt;/a&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;No UID Campaign in New Delhi - A Report: The Unique Identification (UID) Bill is not pro-citizen. The scheme is deeply undemocratic, expensive and fraught with unforseen consequences. A public meeting on UID was held at the Constitution Club, Rafi Marg in New Delhi on 25 August, 2010. The said Bill came under scrutiny at the meeting which was organised by civil society groups from Mumbai, Bangalore and Delhi campaigning under the banner of "No UID". The speakers brought to light many concerns, unanswered questions and problems of the UID scheme. &lt;a href="http://bit.ly/97HwbS" target="_blank"&gt;&lt;br /&gt;http://bit.ly/97HwbS&lt;/a&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Wherever you are, whatever you do: Facebook recently launched a location-based service called Places. Privacy advocates are resenting to this new development. Sunil Abraham identifies the three prime reasons for this outcry against Facebook. The article was published in the Indian Express on 23 August, 2010. &lt;a href="http://bit.ly/adXVjB" target="_blank"&gt;&lt;br /&gt;http://bit.ly/adXVjB&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;b&gt;Telecom&lt;/b&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;What a highway can do: Despite signs of transformational change, we need more - SOPs and quality &lt;a href="http://bit.ly/deUbmU" target="_blank"&gt;http://bit.ly/deUbmU&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/september-2010-bulletin'&gt;https://cis-india.org/about/newsletters/september-2010-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>CISRAW</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2012-08-10T07:22:30Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/internet-at-liberty-conference">
    <title>Conference: Internet at Liberty 2010</title>
    <link>https://cis-india.org/news/internet-at-liberty-conference</link>
    <description>
        &lt;b&gt;This conference is being held in Budapest from 20 to 22 September 2010. It is co-sponsored by Google and Central European University. Sunil Abraham and Anja Kovacs are attending the conference.&lt;/b&gt;
        
&lt;p&gt;The conference &lt;strong&gt;Internet at Liberty 2010&lt;/strong&gt; will explore creative ways to address the boundaries of online free expression, the complex relationship among technology, economic growth and human rights, ways in which dissidents and governments are using the Internet, the role of Internet intermediaries, and pressing policy and legal issues such as privacy and cybersecurity. &amp;nbsp;The event will bring together grassroots global activists alongside representatives of NGOs, academic centers, governments and corporations. The Centre for Media and Communication Studies is&amp;nbsp;playing a core role in the organisation of the event.&lt;/p&gt;
&lt;p&gt;Download the &lt;a href="https://cis-india.org/advocacy/openness/internet-liberty" class="internal-link" title="Internet at Liberty, 2010"&gt;agenda&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;For further information, see&amp;nbsp;&lt;a class="external-link" href="http://www.cmcs.ceu.hu/news/conference-internet-liberty-2010"&gt;CMCS website&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Also see, &lt;a class="external-link" href="https://www.events-google.com/google/frontend/reg/thome.csp?pageID=17227&amp;amp;eventID=79"&gt;Internet at Liberty 2010 website&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/internet-at-liberty-conference'&gt;https://cis-india.org/news/internet-at-liberty-conference&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-02T10:00:01Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/events/unesco-open-forum">
    <title>UNESCO's Open Forum</title>
    <link>https://cis-india.org/events/unesco-open-forum</link>
    <description>
        &lt;b&gt;As UNESCO organized Freedom of Expression related workshops, this Open Forum will be
dedicated to other key IGF topics, notably multilingualism in cyberspace, open access to
scientific information, open educational resources, and accessibility for marginalized groups.
In addition, UNESCO will take this opportunity to announce new initiatives and share
experiences with participants. The interactive panel format will start with brief presentations from experts, followed by a moderated discussion with participants.&lt;/b&gt;
        
&lt;p&gt;&lt;strong&gt;Organizer:&lt;/strong&gt; UNESCO&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Moderator:&lt;br /&gt;&lt;/strong&gt;Mr Jānis Kārkliņš, Assistant Director-General for Communication and Information, UNESCO&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Opening by Mr Jānis Kārkliņš&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Introductory remarks&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Mr Nitin Desai, Chair of the Internet Governance Forum (IGF) will speak about:&amp;nbsp;The future of the IGF and UNESCO’s opportunities&lt;/li&gt;&lt;li&gt;Mr Rod Beckstrom, CEO ICANN, on cooperation with UNESCO, next steps&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;1. &lt;strong&gt;Multilingualism in cyberspace&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Proposed speakers:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Mr Baher Esmat, Manager, Regional Relations – Middle East, ICANN&lt;/li&gt;&lt;li&gt;Mr Daniel Pimienta, President of FUNREDES (Fundacion Redes y Desarrollo)&amp;nbsp;Saint Domingue, Dominican Republic&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;em&gt;Open discussion&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;2. &lt;strong&gt;Open access to scientific information and open educational resources&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Proposed speakers:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Mr Indrajit Banerjee, Director, Information Society Division, Communication and&amp;nbsp;Information Sector, UNESCO&lt;/li&gt;&lt;li&gt;Mr Abel Packer, Director of the SciELO.org Open Access (OA) initiative&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;em&gt;Open discussion&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;3. &lt;strong&gt;An initiative on developing inclusive information policies using ICTs in education for&amp;nbsp;&lt;/strong&gt;&lt;strong&gt;persons with disabilities&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Proposed speakers:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Mr Axel Leblois, Executive Director, the Global Initiative for Inclusive Information&amp;nbsp;and Communications Technologies 9G3ict), An Advocacy Initiative of the United&amp;nbsp;Nations Global Alliance for ICT and Development&lt;/li&gt;&lt;li&gt;Ms Anja Kovacs, Centre for Internet and Society (India)&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;em&gt;Open discussion&lt;/em&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/unesco-open-forum'&gt;https://cis-india.org/events/unesco-open-forum&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-05T03:58:47Z</dc:date>
   <dc:type>Event</dc:type>
   </item>




</rdf:RDF>
