<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="http://editors.cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>http://editors.cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 11 to 25.
        
  </description>
  
  
  
  
  <image rdf:resource="http://editors.cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="http://editors.cis-india.org/raw/web-politics"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/raw/web-cultures-posts"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/raw/web-cultures"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/events/understanding-aadhaar-and-its-new-challenges-may-26-27-2016"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/events/uidai-and-welfare-services-exclusion-and-countermeasures-aug-27"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/files/uidai-and-welfare-services-exclusion-and-countermeasures"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/telecom/blog/trai-consultation-on-differential-pricing-for-data-services"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/Members/tito_dutta.jpg"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/the-last-chance-for-a-welfare-state-doesnt-rest-in-the-aadhaar-system"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/raw/aakash-tablet-and-technological-imaginaries-of-education-in-india-excerpt"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/a2k/telugu-wikipedia"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/about/people/CIS_TM.jpeg"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/openness/sumandro-c-open-access-dialogues-2013"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/Members/subodh_kulkarni.jpg"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/openness/comments-on-the-telangana-state-open-data-policy-2016"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="http://editors.cis-india.org/raw/web-politics">
    <title>Web Politics</title>
    <link>http://editors.cis-india.org/raw/web-politics</link>
    <description>
        &lt;b&gt;In the recent years, the Indian cyberspace has experienced a rising volume of political content, communication, and interactions. This cluster focuses on questions arising from the various forms that social, cultural, economic, and technological power takes in its online articulations, such as web-based political practices of social activists, policy advocates, change-makers, marginalised groups, and mainstream political parties in India. We are especially interested in the political expressions and activities of 'digital natives' and young users of the Internet; and the conceptualisations, articulations, and actualisations of 'change,' and the related emerging visions of political forms and social transformation, in the online discourse in India.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Projects&lt;/h2&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="http://cis-india.org/digital-natives"&gt;Digital Natives&lt;/a&gt; (2009-2012)&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/digital-natives/making-change"&gt;Making Change&lt;/a&gt; (2014)&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Publications&lt;/h2&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="http://cis-india.org/digital-natives/blog/dnbook"&gt;Digital Natives without a Cause?&lt;/a&gt;, a book series edited by Nishant Shah and Fieke Jansen&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/digital-natives/blog/position-papers"&gt;Digital Natives with a Cause? Thinkathon: Position Papers&lt;/a&gt; edited by Nishant Shah, Josine Stremmelaar and Fieke Jansen&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/digital-natives/blog/digital-natives-with-a-cause-a-report"&gt;Digital Natives with a Cause? A Report&lt;/a&gt; by Nishant Shah and Sunil Abraham&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/digital-natives/stirrup-and-the-ground"&gt;Between the Stirrup and the Ground: Relocating Digital Activism&lt;/a&gt; by Nishant Shah and Fieke Jansen&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/digital-activism-in-asia-reader"&gt;Digital Activism in 
Asia Reader&lt;/a&gt; (ongoing)&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Recent Posts&lt;/h2&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/raw/web-politics'&gt;http://editors.cis-india.org/raw/web-politics&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2015-08-28T06:21:38Z</dc:date>
   <dc:type>Collection</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/raw/web-cultures-posts">
    <title>Web Cultures - Posts</title>
    <link>http://editors.cis-india.org/raw/web-cultures-posts</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/raw/web-cultures-posts'&gt;http://editors.cis-india.org/raw/web-cultures-posts&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2019-03-13T01:08:17Z</dc:date>
   <dc:type>Collection</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/raw/web-cultures">
    <title>Web Cultures</title>
    <link>http://editors.cis-india.org/raw/web-cultures</link>
    <description>
        &lt;b&gt;This cluster focuses on questions arising from the social, political, and material dimensions of the web-based interactions, communities, and cultures. Our interests range across the topics of digital activism and practices and discourses of social change, forms and norms of online communities, experiences of body and intimacy, structures of violence and affect, and device cultures and materiality of interfaces. &lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Projects&lt;/h2&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="http://cis-india.org/raw/the-spaces-of-digital"&gt;&lt;strong&gt;The Spaces of Digital&lt;/strong&gt;&lt;/a&gt; (ongoing)&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/digital-humanities/blogs/interface-intimacies/interface-intimacies"&gt;&lt;strong&gt;Interface Intimacies&lt;/strong&gt;&lt;/a&gt; (ongoing)&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/digital-natives/making-change"&gt;&lt;strong&gt;Making Change&lt;/strong&gt;&lt;/a&gt; (2014)&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/digital-natives"&gt;&lt;strong&gt;Digital Natives&lt;/strong&gt;&lt;/a&gt; (2009-2012)&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Publications&lt;/h2&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="http://cis-india.org/raw/digital-activism-in-asia-reader"&gt;&lt;strong&gt;Digital Activism in Asia Reader&lt;/strong&gt;&lt;/a&gt; edited by Nishant Shah, P.P. Sneha, and Sumandro Chattapadhyay&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/between-the-stirrup-and-the-ground-relocating-digital-activism"&gt;&lt;strong&gt;Between the Stirrup and the Ground: Relocating Digital Activism&lt;/strong&gt;&lt;/a&gt; by Nishant Shah and Fieke Jansen&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/material-cyborgs-asserted-boundaries-formulating-the-cyborg-as-a-translator"&gt;&lt;strong&gt;Material Cyborgs; Asserted Boundaries: Formulating the Cyborg as a Translator&lt;/strong&gt;&lt;/a&gt; by Nishant Shah&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/digital-natives/blog/digital-natives-with-a-cause-a-report"&gt;&lt;strong&gt;Digital Natives with a Cause? A Report&lt;/strong&gt;&lt;/a&gt; by Nishant Shah and Sunil Abraham&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/digital-natives/blog/position-papers"&gt;&lt;strong&gt;Digital Natives with a Cause? Thinkathon: Position Papers&lt;/strong&gt;&lt;/a&gt; edited by Nishant Shah, Josine Stremmelaar, and Fieke Jansen&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/digital-natives/blog/dnbook"&gt;&lt;strong&gt;Digital Natives without a Cause?&lt;/strong&gt;&lt;/a&gt;, a book series edited by Nishant Shah and Fieke Jansen&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Recent Posts&lt;/h2&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/raw/web-cultures'&gt;http://editors.cis-india.org/raw/web-cultures&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2016-05-05T09:56:57Z</dc:date>
   <dc:type>Collection</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/events/understanding-aadhaar-and-its-new-challenges-may-26-27-2016">
    <title>Understanding Aadhaar and its New Challenges, May 26-27, 2016</title>
    <link>http://editors.cis-india.org/internet-governance/events/understanding-aadhaar-and-its-new-challenges-may-26-27-2016</link>
    <description>
        &lt;b&gt;A workshop on “Understanding Aadhaar and its New Challenges” is being organised by the Centre for Studies in Science Policy, Jawaharlal Nehru University, and the Centre for Internet and Society, during May 26-27. It is also supported by the Centre for Communication Governance at NLU Delhi, Free Software Movement of India, Knowledge Commons, PEACE, and Center for Advancement of Public Understanding of Science &amp; Technology. This is a legal and technical workshop to be attended by various key researchers and practitioners to discuss the current status of the implementation of the project, in the context of the passing of the Act and the various ongoing cases.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h1&gt;Workshop Programme&lt;/h1&gt;
&lt;h3&gt;First Day, May 26&lt;/h3&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;9:00-9:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Registration&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;9:30-10:00&lt;/td&gt;
&lt;td&gt;Prof. Dinesh Abrol - &lt;em&gt;Welcome&lt;/em&gt;&lt;br /&gt;Self-introduction and expectations of participants&lt;br /&gt;Dr. Usha Ramanathan - &lt;em&gt;Overview of the Workshop&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10:00-11:00&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Current Status of Aadhaar&lt;/strong&gt;&lt;br /&gt;Dr. Usha Ramanathan, Legal Researcher, New Delhi - &lt;em&gt;What the 2016 Law Says, and How it Came into Being&lt;/em&gt;&lt;br /&gt;S. Prasanna, Advocate, New Delhi - &lt;em&gt;Status and Force of Supreme Court Orders on Aadhaar&lt;/em&gt;&lt;br /&gt;Discussion&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:00-11:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Tea Break&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:30-13:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Direct Benefits Transfers&lt;/strong&gt;&lt;br /&gt;Prof. Reetika Khera, Indian Institute of Technology, Delhi - &lt;em&gt;Welfare Needs Aadhaar like a Fish Needs a Bicycle&lt;/em&gt;&lt;br /&gt;Prof. Ram Kumar, Tata Institute of Social Sciences, Mumbai - &lt;em&gt;Aadhaar and the Social Sector: A critical analysis of the claims of benefits and inclusion&lt;/em&gt;&lt;br /&gt;Ashok Rao, Delhi Science Forum - &lt;em&gt;Cash Transfers Study&lt;/em&gt;&lt;br /&gt;Discussion&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13:30-14:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Lunch&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14:30-16:00&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Aadhaar: Science, Technology, and Security&lt;/strong&gt;&lt;br /&gt;Prof. Subashis Banerjee, Deptt of Computer Science &amp;amp; Engineering, IIT, Delhi - &lt;em&gt;Privacy and Security Issues Related to the Aadhaar Act&lt;/em&gt;&lt;br /&gt;Pukhraj Singh, former National Cyber Security Manager, Aadhaar, New Delhi - &lt;em&gt;Aadhaar: Security and Surveillance Dimensions&lt;/em&gt;&lt;br /&gt;Discussion&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;16:00-16:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Tea Break&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;16:30-17:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Aadhaar - International Dimensions&lt;/strong&gt;&lt;br /&gt;Prof. Chinmayi Arun, Center for Communication Governance, National Law University, Delhi - &lt;em&gt;Biometrics and Mandatory IDs in other parts of the world&lt;/em&gt;&lt;br /&gt;Dr. Gopal Krishna, Citizens Forum for Civil Liberties - &lt;em&gt;International Dimensions of Aadhaar
&lt;/em&gt;&lt;br /&gt;Discussion&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;17:30-18:00&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;High Tea&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;18:00-19:00&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Video Presentations&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;tbody&gt;&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Second Day, May 27&lt;/h3&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;9:30-11:00&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Privacy, Surveillance, and Ethical Dimensions of Aadhaar&lt;/strong&gt;&lt;br /&gt;Prabir Purkayastha, Free Software Movement of India, New Delhi - &lt;em&gt;Surveillance Capitalism and the Commodification of Personal Data&lt;/em&gt;&lt;br /&gt;Arjun Jayakumar, SFLC - &lt;em&gt;Surveillance Projects Amalgamated&lt;/em&gt;&lt;br /&gt;Col Mathew Thomas, Bengaluru
 - &lt;em&gt;The Deceit of Aadhaar&lt;/em&gt;&lt;br /&gt;Discussion&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:00-11:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Tea Break&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:30-10:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Aadhaar: Broad Issues - I&lt;/strong&gt;&lt;br /&gt;Prof. G Nagarjuna, Homi Bhabha Center for Science Education, Tata Institute of Fundamental Research, Mumbai - &lt;em&gt;How to prevent linked data in the context of Aadhaar&lt;/em&gt;&lt;br /&gt;Dr. Anupam Saraph, Pune - &lt;em&gt;Aadhaar and Moneylaundering&lt;/em&gt;&lt;br /&gt;Discussion&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13:00-13:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Video Presentations&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13:30-14:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Lunch&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14:30-15:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Aadhaar: Broad Issues - II&lt;/strong&gt;&lt;br /&gt;Prof. MS Sriram, Visiting Faculty, Indian Institute of Management, Bangalore - &lt;em&gt;Financial lnclusion&lt;/em&gt;&lt;br /&gt;Nikhil Dey, MKSS, Rajasthan (TBC) - &lt;em&gt;Field witness: Technology on the Ground&lt;/em&gt;&lt;br /&gt;Prof. Himanshu, Centre for Economic Studies &amp;amp; Planning, JNU - &lt;em&gt;UID Process and Financial Inclusion&lt;/em&gt;&lt;br /&gt;Discussion&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15:30-16:00&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Conclusion&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;tbody&gt;&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/events/understanding-aadhaar-and-its-new-challenges-may-26-27-2016'&gt;http://editors.cis-india.org/internet-governance/events/understanding-aadhaar-and-its-new-challenges-may-26-27-2016&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Biometrics</dc:subject>
    

   <dc:date>2016-05-26T10:29:43Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/events/uidai-and-welfare-services-exclusion-and-countermeasures-aug-27">
    <title>UIDAI and Welfare Services: Exclusion and Countermeasures (Bangalore, August 27)</title>
    <link>http://editors.cis-india.org/internet-governance/events/uidai-and-welfare-services-exclusion-and-countermeasures-aug-27</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society (CIS) invites you to a one day workshop, on Saturday, August 27, 2016, to discuss, raise awareness of, and devise countermeasures to exclusion due to implementation of  UID-based verification for and distribution of welfare services. We look forward to making this a forum for knowledge exchange and a learning opportunity for our friends and colleagues.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Invitation&lt;/h3&gt;
&lt;p&gt;&lt;a href="http://cis-india.org/internet-governance/files/uidai-and-welfare-services-exclusion-and-countermeasures/at_download/file"&gt;Download&lt;/a&gt; (PDF)&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Venue&lt;/h3&gt;
&lt;p&gt;Institution of Agricultural Technologists, No. 15, Queen’s Road, Bangalore, 560 052.&lt;/p&gt;
&lt;p&gt;Location on Google Map: &lt;a href="https://www.google.com/maps/place/Institution+of+Agricultural+Technologists/" target="_blank"&gt;https://www.google.com/maps/place/Institution+of+Agricultural+Technologists/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Agenda&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;10:00-10:30&lt;/strong&gt; Tea and Coffee&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;10:30-11:00&lt;/strong&gt; Introductions and Updates from Delhi Workshop&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;11:00-12:45&lt;/strong&gt; Reconfiguration of Welfare Governance by UIDAI&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;12:45-14:00&lt;/strong&gt; Lunch&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;14:00-15:00&lt;/strong&gt; Updates on Ongoing Cases against UIDAI&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;15:00-15:15&lt;/strong&gt; Tea and Coffee&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;15:15-16:45&lt;/strong&gt; Open Discussion on Countering Welfare Exclusion&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;16:45-17:00&lt;/strong&gt; Tea and Coffee&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/events/uidai-and-welfare-services-exclusion-and-countermeasures-aug-27'&gt;http://editors.cis-india.org/internet-governance/events/uidai-and-welfare-services-exclusion-and-countermeasures-aug-27&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Exclusion</dc:subject>
    
    
        <dc:subject>Digital Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital India</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Welfare Governance</dc:subject>
    
    
        <dc:subject>UID</dc:subject>
    

   <dc:date>2016-08-22T13:25:03Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/files/uidai-and-welfare-services-exclusion-and-countermeasures">
    <title>UIDAI and Welfare Services: Exclusion and Countermeasures</title>
    <link>http://editors.cis-india.org/internet-governance/files/uidai-and-welfare-services-exclusion-and-countermeasures</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/files/uidai-and-welfare-services-exclusion-and-countermeasures'&gt;http://editors.cis-india.org/internet-governance/files/uidai-and-welfare-services-exclusion-and-countermeasures&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2016-08-22T13:23:24Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/telecom/blog/trai-consultation-on-differential-pricing-for-data-services">
    <title>TRAI Consultation on Differential Pricing for Data Services - Post-Open House Discussion Submission</title>
    <link>http://editors.cis-india.org/telecom/blog/trai-consultation-on-differential-pricing-for-data-services</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society sent this submission to the Telecom Regulatory Authority of India (TRAI)  following the Open House Discussion on Differential Pricing of Data Services, held in Delhi on February 21, 2016.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Download the submission document: &lt;a href="https://github.com/cis-india/website/raw/master/docs/CIS_TRAI-Differential-Pricing_Submission_2015.01.25.pdf"&gt;PDF&lt;/a&gt;.&lt;/h4&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Post-Open House Discussion Submission to TRAI&lt;/h3&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Dear Ms. Kotwal,&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This is to heartily congratulate TRAI once again for taking several steps, including the Open House Discussion, to ensure that various opinions about the topic of ‘differential pricing for data services’ are presented and are responded to - and are all in full public view.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This brief note is to &lt;strong&gt;a)&lt;/strong&gt; add to the positions and arguments submitted previously by the Centre for Internet and Society (CIS), India, &lt;strong&gt;b)&lt;/strong&gt; put in writing our comments during the Open House Discussion (January 21, 2016), and &lt;strong&gt;c)&lt;/strong&gt; respond to other comments shared at the same event. We have six points to share in this note:&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;ol style="text-align: justify;"&gt;
&lt;li&gt;&lt;strong&gt;Forbearance is not an option&lt;/strong&gt;: We are of the opinion that though the data services market has thus far been kept un-monitored and unregulated, and there are several reasons why this situation should not continue any more. Although the reality of differential pricing (that is data packets originating from different sources being priced differently by ISPs) was highlighted with the recent offering of zero rated packs, it is a general practice in the sector, as illustrated by widely available special/curated content packs for the user to consume data from a specified web-based source. It is not surprising that most such special/curated content packs involve an arrangement between the ISP and a prominent leader in the web-content/platform sector, such as Facebook and Twitter. Serious market distorting impacts of such arrangements are imminent if they are allowed to continue without any monitoring, enforced public disclosure, and regulatory actions by a public authority.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Address differential treatment of data, and not only differential pricing&lt;/strong&gt;: Pricing is only of the three ways in which data services can be treated differently by the ISPs depending upon the source of the data packets concerned. The other two ways are: a) differential speed, or throttling of some data packets and prioritisation of the others, and b) differential treatment of data protocols, for example, the blocking of peer-to-peer or voice-over-IP traffic by an ISP. If the public authority decides to only regulate differential pricing of data service, it is highly probable that ISPs may shift to other forms of discrimination between data packets - either in terms of prioritising some data packets over others based upon their origin, or blocking of specific protocols such as voice-over-IP to prevent the functioning of certain web-based services - and continue the market distorting impacts through these other means.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Allow and define reasonable network management practices&lt;/strong&gt;: Reasonable network management has to be allowed to enable the ISPs to manage performance on their network. However, ISPs may not indulge in acts that are harmful to users in the name of reasonable network management. Below is a set of potential guidelines to identify cases when discrimination against classes of data traffic in the name of reasonable network management can be considered justified and permissible:&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;there is an intelligible differentia between the classes which are to be treated differently,&lt;/li&gt;
&lt;li&gt;there is a rational nexus between the differential treatment and the aim of such differentiation,&lt;/li&gt;
&lt;li&gt;the aim sought to be furthered is legitimate, and is related to the security, stability, or efficient functioning of the network, or is a technical limitation outside the control of the ISP, and&lt;/li&gt;
&lt;li&gt;the network management practice is the least harmful technical means that is reasonably available to achieve the aim.&lt;/li&gt;&lt;br /&gt;&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Establish an effective enforcement mechanism&lt;/strong&gt;: TRAI must establish an enforcement mechanism that is open to users [and groups of users] and private sector actors as current forums are insufficient. Clear and simple rules must be established ex-ante, if they are violated - ex-post regulation must be undertaken on the basis of principles listed in the TRAI consultation paper, that is “non-discrimination, transparency, affordable internet access, competition and market entry, and innovation” &lt;a name="fr1"&gt;[1]&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Take regulatory decisions now, but also conduct and commission further research to review and refine the decisions over a defined period of time&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Need for better collection and proactive disclosure of statistics&lt;/strong&gt;: TRAI publishes quarterly performance indicators statistics collected from the telecom companies about telephone, mobile, and internet sectors in India &lt;a name="fr2"&gt;[2]&lt;/a&gt;. It will be very useful for researchers and analysts, and allow for a much more informed public debate on the matter, if the content and form of such data are improved in the following ways:&lt;br /&gt;
&lt;br /&gt;&lt;strong&gt;Content:&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;Please start collection (unless already done) and publication of not only data of average incoming and outgoing MOUs, average of total outgoing SMSs, Average Revenue Per User, and average data usage per GSM and CDMA subscriber, but distributions of the same in terms of user deciles (that is in terms of representative figures for each 10% section of users in ascending order of usage),&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;Provide granular data about data usage across service areas and service providers (the numbers on ‘average data usage’ and total ‘revenue from data usage’ provided at present are very insufficient for the state of public debate),&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;Provide data about internet subscriber base according to network technologies (for both wired and wireless) and the service providers concerned,&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;Provide data about IP-based telephony across service areas and service providers,&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;Provide data separately for the North Eastern states, and&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;Provide granular data (separated from the corresponding state data) for all tier-1 cities.&lt;/div&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;br /&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Form:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;Please do not publish the data only as part of the quarterly reports available in PDF format, but also as independent machine-readable spreadsheet file (preferably in CSV format),&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;Do not only publish quarterly data in separate files, but also provide a combined (all quarters together) dataset that would make it much easier for researchers and analysts to use the data,&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;In some exceptional cases, the data is not provided in the report directly but a diagram containing the data is published &lt;a name="fr3"&gt;[3]&lt;/a&gt;, which should be kindly avoided, and&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;Please publish these statistics as open data, that is in open standards and under open licenses.&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;Further, we request TRAI to explore possibilities of distributed sourcing of data, perhaps from the users themselves, about the actual network usage experiences, including but not limited to signal strength, data transfer speed (incoming and outgoing), frequency of switches between mobile (GSM and CDMA) and wi-fi connectivity, etc.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;References&lt;/h3&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn1"&gt;1&lt;/a&gt;]. http://trai.gov.in/WriteReaddata/ConsultationPaper/Document/CP-Differential-Pricing-09122015.pdf.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn2"&gt;2&lt;/a&gt;]. http://www.trai.gov.in/Content/PerformanceIndicatorsReports/1_1_PerformanceIndicatorsReports.aspx.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn3"&gt;3&lt;/a&gt;]. http://www.trai.gov.in/WriteReadData/PIRReport/Documents/Performance_Indicator_Report_Jun_2015.pdf , sections 1.43 and 1.44 (pp. 31-32).&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/telecom/blog/trai-consultation-on-differential-pricing-for-data-services'&gt;http://editors.cis-india.org/telecom/blog/trai-consultation-on-differential-pricing-for-data-services&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Access</dc:subject>
    
    
        <dc:subject>TRAI</dc:subject>
    
    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>TRAI, OTT</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-03-30T13:13:30Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/Members/tito_dutta.jpg">
    <title>Tito Dutta</title>
    <link>http://editors.cis-india.org/Members/tito_dutta.jpg</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/Members/tito_dutta.jpg'&gt;http://editors.cis-india.org/Members/tito_dutta.jpg&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2018-08-21T06:14:01Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/the-last-chance-for-a-welfare-state-doesnt-rest-in-the-aadhaar-system">
    <title>The Last Chance for a Welfare State Doesn’t Rest in the Aadhaar System</title>
    <link>http://editors.cis-india.org/internet-governance/blog/the-last-chance-for-a-welfare-state-doesnt-rest-in-the-aadhaar-system</link>
    <description>
        &lt;b&gt;Boosting welfare is the message, which is how Aadhaar is being presented in India. The Aadhaar system as a medium, however, is one that enables tracking, surveillance, and data monetisation. This piece by Sumandro Chattapadhyay was published in The Wire on April 19, 2016.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Originally published in and cross-posted from &lt;a href="http://thewire.in/2016/04/19/the-last-chance-for-a-welfare-state-doesnt-rest-in-the-aadhaar-system-30256/"&gt;The Wire&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Once upon a time, a king desired that his parrot should be taught all the ancient knowledge of the kingdom. The priests started feeding the pages of the great books to the parrot with much enthusiasm. One day, the king asked the priests if the parrot’s education has completed. The priests poked the belly of the parrot but it made no sound. Only the rustle of undigested pages inside the belly could be heard. The priests declared that the parrot is indeed a learned one now.&lt;/p&gt;
&lt;p&gt;The fate of the welfare system in our country is quite similar to this parrot from Tagore’s parable. It has been forcefully fed identification cards and other official documents (often four copies of the same) for years, and always with the same justification of making it more effective and fixing the leaks. These identification regimes are in effect killing off the welfare system. And some may say that that has been the actual plan in any case.&lt;/p&gt;
&lt;p&gt;The Aadhaar number has been recently offered as &lt;a href="http://indianexpress.com/article/opinion/columns/aadhaar-project-uidai-last-chance-for-a-welfare-state/"&gt;the ‘last chance’ for the ailing welfare system&lt;/a&gt; – a last identification regime that it needs to gulp down to survive. This argument wilfully overlooks the acute problems with the Aadhaar project.&lt;/p&gt;
&lt;p&gt;Firstly, the ‘last chance’ for a welfare state in India is not provided by implementing a new and improved identification regime (Aadhaar numbers or otherwise), but by enabling citizens to effectively track, monitor, and ensure delivery of welfare, services, and benefits. This ‘opening up’ of the welfare bureaucracy has been most effectively initiated by the Right to Information Act. Instead of a centralised biometrics-linked identity verification platform, which gives the privilege of tracking and monitoring welfare flows only to a few expert groups, an effective welfare state requires the devolution of such privilege and responsibility.&lt;/p&gt;
&lt;p&gt;We should harness the tracking capabilities of electronic financial systems to disclose how money belonging to the Consolidated Fund of India travel around state agencies and departmental levels. Instead, the Aadhaar system effectively stacks up a range of entry barriers to accessing welfare – from malfunctioning biometric scanners, to connectivity problems, to the burden of keeping one’s fingerprint digitally legible under all labouring and algorithmic circumstances.&lt;/p&gt;
&lt;p&gt;Secondly, authentication of welfare recipients by Aadhaar number neither make the welfare delivery process free of techno-bureaucratic hurdles, nor does it exorcise away corruption. Anumeha Yadav has recently documented the emerging &lt;a href="http://scroll.in/article/805909/in-rajasthan-there-is-unrest-at-the-ration-shop-because-of-error-ridden-aadhaar"&gt;‘unrest at the ration shop’ across Rajasthan&lt;/a&gt;, as authentication processes face technical and connectivity delays, people get ‘locked out’ of public services for not having or having Aadhaar number with incorrect demographic details, and no mechanisms exist to provide rapid and definitive recourse.&lt;/p&gt;
&lt;p&gt;RTI activists at the &lt;a href="http://www.snsindia.org/"&gt;Satark Nagrik Sangathan&lt;/a&gt; have highlighted that the Delhi ration shops, using Aadhaar-based authentication, maintain only two columns of data to describe people who have come to the shop – those who received their ration, and those who did not (without any indication of the reason). This leads to erasure-by-design of evidence of the number of welfare-seekers who are excluded from welfare services when the Aadhaar-based authentication process fails (for valid reasons, or otherwise).&lt;/p&gt;
&lt;p&gt;Reetika Khera has made it very clear that using Aadhaar Payments Bridge to directly transfer cash to a beneficiary’s account, in the best case scenario, &lt;a href="http://www.epw.in/journal/2013/05/commentary/cost-benefit-analysis-uid.html"&gt;may only take care of one form of corruption&lt;/a&gt;: deception (a different person claiming to be the beneficiary). But it does not address the other two common forms of public corruption: collusion (government officials approving undue benefits and creating false beneficiaries) and extortion (forceful rent seeking after the cash has been transferred to the beneficiary’s account). Evidently, going after only deception does not make much sense in an environment where collusion and extortion are commonplace.&lt;/p&gt;
&lt;p&gt;Thirdly, the ‘relevant privacy question’ for Aadhaar is not limited to how UIDAI protects the data collected by it, but expands to usage of Aadhaar numbers across the public and private sectors. The privacy problem created by the Aadhaar numbers does begin but surely not end with internal data management procedures and responsibilities of the UIDAI.&lt;/p&gt;
&lt;p&gt;On one hand, the Aadhaar Bill 2016 has reduced the personal data sharing restrictions of the NIAI Bill 2010, and &lt;a href="http://scroll.in/article/806297/no-longer-a-black-box-why-does-the-revised-aadhar-bill-allow-sharing-of-identity-information"&gt;has allowed for sharing of all data except core biometrics (fingerprints and iris scan)&lt;/a&gt; with all agencies involved in authentication of a person through her/his Aadhaar number. These agencies have been asked to seek consent from the person who is being authenticated, and to inform her/him of the ways in which the provided data (by the person, and by UIDAI) will be used by the agency. In careful wording, the Bill only asks the agencies to inform the person about “alternatives to submission of identity information to the requesting entity” (Section 8.3) but not to provide any such alternatives. This facilitates and legalises a much wider collection of personal demographic data for offering of services by public agencies “or any body corporate or person” (Section 57), which is way beyond the scope of data management practices of UIDAI.&lt;/p&gt;
&lt;p&gt;On the other hand, the Aadhaar number is being seeded to all government databases – from lists of HIV patients, of rural citizens being offered 100 days of work, of students getting scholarships meant for specific social groups, of people with a bank account. Now in some sectors, such as banking, inter-agency sharing of data about clients is strictly regulated. But we increasingly have non-financial agencies playing crucial roles in the financial sector – from mobile wallets to peer-to-peer transaction to innovative credit ratings. Seeding of Aadhaar into all government and private databases would allow for easy and direct joining up of these databases by anyone who has access to them, and not at all by security agencies only.&lt;/p&gt;
&lt;p&gt;When it becomes publicly acceptable that &lt;a href="http://indianexpress.com/article/opinion/columns/aadhaar-project-uidai-last-chance-for-a-welfare-state/"&gt;the &lt;em&gt;money bill route&lt;/em&gt; was a ‘remedial’ instrument to put the Rajya Sabha ‘back on track’&lt;/a&gt;, one cannot not wonder about what was being remedied by avoiding a public debate about the draft bill before it was presented in Lok Sabha. The answer is simple: &lt;em&gt;welfare is the message, surveillance is the medium&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;Acceptance and adoption of all medium requires a message, a content. The users are interested in the message. The message, however, is not the business. Think of Free Basics. Facebook wants people with none or limited access to internet to enjoy parts of the internet at zero data cost. Facebook does not provide the content that the users consume on such internet. The content is created by the users themselves, and also provided by other companies. Facebook own and control the medium, and makes money out of all content, including interactions, passing through it.&lt;/p&gt;
&lt;p&gt;The UIDAI has set up a biometric data bank and related infrastructure to offer authentication-as-a-service. As the Bill clarifies, almost all agencies (public or private, national or global) can use this service to verify the identity of Indian residents. Unlike Facebook, the content of these services do not flow through the Aadhaar system. Nonetheless, Aadhaar keeps track of all ‘authentication records’, that is records of whose identity was authenticated by whom, when, and where. This database is gold (data) mine for security agencies in India, and elsewhere. Further, as more agencies use authentication based on Aadhaar numbers, it becomes easier for them to combine and compare databases with other agencies doing the same, by linking each line of transaction across databases using Aadhaar numbers.&lt;/p&gt;
&lt;p&gt;Welfare is the message that the Aadhaar system is riding on. The message is only useful for the medium as far as it ensures that the majority of the user population are subscribing to it. Once the users are enrolled, or on-boarded, the medium enables flow of all kinds of messages, and tracking and monetisation (perhaps not so much in the case of UIDAI) of all those flows. It does not matter if the Aadhaar system is being introduced to remedy the broken parliamentary process, or the broken welfare distribution system. What matters is that the UIDAI is establishing the infrastructure for a universal surveillance system in India, and without a formal acknowledgement and legal framework for the same.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/the-last-chance-for-a-welfare-state-doesnt-rest-in-the-aadhaar-system'&gt;http://editors.cis-india.org/internet-governance/blog/the-last-chance-for-a-welfare-state-doesnt-rest-in-the-aadhaar-system&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Data Systems</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital India</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Biometrics</dc:subject>
    

   <dc:date>2016-04-19T13:18:42Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/raw/aakash-tablet-and-technological-imaginaries-of-education-in-india-excerpt">
    <title>The Aakash Tablet and Technological Imaginaries of Mass Education in Contemporary India (Excerpt)</title>
    <link>http://editors.cis-india.org/raw/aakash-tablet-and-technological-imaginaries-of-education-in-india-excerpt</link>
    <description>
        &lt;b&gt;In a recently published paper, Jahnavi Phalkey and Sumandro Chattapadhyay explore public initiatives in technological solutions for educating the poor and the disadvantaged in independent India. Here is an edited excerpt from the paper that traces the recent history of technological solutions for mass education and unpacking the narrative of ‘failure’ that is associated with the Aakash experiment.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;img src="https://github.com/cis-india/website/raw/master/img/2016.02.14_s-campion-aakash.jpg" alt="Students using &amp;lt;p&amp;gt;Aakash tablet, Anupshahr, Uttar Pradesh. Photograph by Sonali Campion." /&gt;&lt;/p&gt;
&lt;h6&gt;Students at Pardada Pardadi Education Society in Anupshahr, Uttar Pradesh, use the Aakash tablet in class as part of a pilot project introducing the low-cost computer into rural schools. Photograph by Sonali Campion, April 09, 2013: &lt;a href="https://www.flickr.com/photos/sonalicampion/9449250639/"&gt;https://www.flickr.com/photos/sonalicampion/9449250639/&lt;/a&gt;.&lt;/h6&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
In 2010, the Ministry of Human Resource Development (MHRD) of the Government of India launched a set of prototype devices of an affordable tablet computer, the development and production of which were to be supported by the Ministry as part of its larger ICTs for education project. This device later came to be known as the “Aakash” tablet, and the project went through several iterations, between 2010 and 2014, of not only technological re-designs, but also institutional arrangements to design, develop, manufacture, test, and procure the devices.
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Technological Solutions for Mass Education&lt;/h2&gt;
&lt;p&gt;Our exploration of technological solutions for mass education in India has taken us through a not-so-linear history of projects that have informed the imagination and making of the Aakash project. This include the Satellite Instructional Television Experiment, or SITE (1975); University Grants Commission-led Countrywide Classroom project (1984 -); the Simputer, the first hand-held device developed in India (1998); the Hole in the Wall project developed and led by Sugata Mitra (1999); the Government of India-led EDUSAT (2004); National Programme on Technology Enhanced Learning (2003); and finally, a national online education portal named Sakshat (2006). The Satellite Instructional Television Experiment itself terminated rather quickly, but it led to several versions of television based instruction programmes, most notably  aimed at higher secondary and university students. Instruction in the broadcast-format continues to date, even after the arrival of the internet and the fact it has become the preferred medium for the Indian state. The television has not been replaced, but certainly shadowed by a variety of internet access and computing devices.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Aakash, a “Low Cost Access-Cum-Computing Device”&lt;/h2&gt;
&lt;p&gt;An early official description of the then-nameless tablet as a “low cost access-cum-computing device” is noteworthy &lt;strong&gt;[1]&lt;/strong&gt;. It is difficult to imagine a contemporary computing device that does not also function as an access device (say, to the internet). Where does the need for calling it an “access-cum-computing” device come from? It comes, perhaps, from the hierarchy of priority – the device is primarily an access device, and secondarily can perform the function of a general-purpose computer. An archaeological reading of the assumptions of learning processes embodied in this device reveals an earlier layer of thinking – that of broadcasting educational programmes to television sets via satellite connection. Labelling it as “access-cum-computing” frames the object as being shaped by the residue of the Indian state’s education technological experiences of the past, including that of the SITE initiative.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;“[The] Aakash tablet was my dream but it was not fulfilled”&lt;/h2&gt;
&lt;p&gt;Throughout the short history of the Aakash device, the verdict of “failed innovation” figures prominently – from the early failure of "Sakshat" &lt;strong&gt;[2]&lt;/strong&gt;, to allegations of the Chinese origin of the Aakash device &lt;strong&gt;[3]&lt;/strong&gt;, to manufacturing troubles and under-production of the device &lt;strong&gt;[4]&lt;/strong&gt;, to criticisms of the tablet’s built quality and computing capacity &lt;strong&gt;[5]&lt;/strong&gt;, to mistrust and failed collaborations between parties involved in its production &lt;strong&gt;[6]&lt;/strong&gt;, and intra-governmental criticisms of the implementation process &lt;strong&gt;[7]&lt;/strong&gt;. Moreover, there remained a continuous tension within the government itself regarding the necessity of the project, especially fuelled by (and fuelling) the image of the project as being driven by the dreams of a specific minister &lt;strong&gt;[8]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;To simply describe the Aakash project’s failure as one due to the unbearable heaviness of functions ranging from the technical to the symbolic and political is to fall short of a full explanation. Alongside that narrative of failure, it is critical to foreground the quiet success of the project in establishing the tablet computer as a near-essential and familiarised everyday object for access to educational material. There is an alarming accuracy in the MHRD claim that the Aakash project established a sub $100 tablet market in India – it did, even if it was not for the device they wanted to promote &lt;strong&gt;[9]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;The Device is the Desire&lt;/h2&gt;
&lt;p&gt;We observe that the Aakash project, as well as the ones preceding it, have been driven primarily by a desire to scale up the provision of education. The initiatives towards building delivery infrastructures for such mass-scale provision of education has almost always been accompanied by a larger desire for developing capabilities in space exploration, communication, and computing – the key technologies of twentieth century geopolitics. Our study of the manufacturing of the Aakash tablet, and its surrounding discourses, foreground the technological imagination of the state after liberalisation in India (1991), and its unique arrangements and efforts to create domestic capability of technological innovation in a context of globalised production and communication networks. We see our role as one of recovering the work of technology in the history of education as understood through the interactions between the state, academia, and industry.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Archival Research in (Increasingly) Digital India&lt;/h2&gt;
&lt;p&gt;Documenting the project has been an interesting historical exercise. We have been attentive to documents disappearing from their online locations. One remarkable possibility for archival research opened up by the internet is the (limited, and often uncertain) ability to access materials that are not presently available on a website, but were part of it in the past. This possibility allowed us to access a few crucial government documents that are not directly available on the official websites any more. We have also been attentive to the reiterations and revisions that do not merely overtake or shadow earlier documents. They sometimes erase earlier documents altogether as digital revisions. We do not have access to personal correspondence or internal institutional correspondence relating to the project. We are, however, skeptical of that happening as no protocols for the archiving of digital correspondence is yet in place with the Government of India. Doing recent history of India is becoming an ever more difficult exercise that historians must urgently attend to, if we are to make the present ready to have its own past in the future.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;References&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;[1]&lt;/strong&gt; Ministry of Human Resource Development, Government of India. “The History of Aakash Low Cost Access cum Computing Device.” Sakshat. October 05, 2011. &lt;a href="http://archive.sakshat.ac.in/pdf/Final_Note_Aakash.pdf"&gt;http://archive.sakshat.ac.in/pdf/Final_Note_Aakash.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[2]&lt;/strong&gt; Mukherjee, Arindam. “Bonsai Netbooks.” Outlook. February 16, 2009. &lt;a href="http://www.outlookindia.com/article/Bonsai-Netbooks/239719"&gt;http://www.outlookindia.com/article/Bonsai-Netbooks/239719&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[3]&lt;/strong&gt; Raina, Pamposh, and Mia Li. “India’s ‘Aakash,’ Now Made in China.” The New York Times. November 26, 2012. &lt;a href="http://india.blogs.nytimes.com/2012/11/26/india%E2%80%99s-super-cheap-tablet-now-made-in-china/"&gt;http://india.blogs.nytimes.com/2012/11/26/india%E2%80%99s-super-cheap-tablet-now-made-in-china/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[4]&lt;/strong&gt; Nanda, Prashant K., and Surabhi Agarwal. “Government Close to Giving Up on Aakash Project.” Mint. March 22, 2013. &lt;a href="http://www.livemint.com/Politics/fmEi8gsOSFgOzSTFfLsw6J/Govt-almost-gives-up-on-Aakash-says-no-point-in-hardware-ob.html"&gt;http://www.livemint.com/Politics/fmEi8gsOSFgOzSTFfLsw6J/Govt-almost-gives-up-on-Aakash-says-no-point-in-hardware-ob.html&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[5]&lt;/strong&gt; Chopra, Ritika. “Kapil Sibal's Cheap Aakash Proves to be a Dud.” Mail Today. January 08, 2012. &lt;a href="http://indiatoday.intoday.in/story/kapil-sibal-cheapest-tablet-of-world-aakash-failure/1/167730.html"&gt;http://indiatoday.intoday.in/story/kapil-sibal-cheapest-tablet-of-world-aakash-failure/1/167730.html&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[6]&lt;/strong&gt; Julka, Harsimran. “14 Lakh Aakash Tablets Booked in 14 Days.” The Economic Times. January 03, 2012. &lt;a href="http://economictimes.indiatimes.com/tech/hardware/14-lakh-aakash-tablets-booked-in-14-days/articleshow/11345695.cms"&gt;http://economictimes.indiatimes.com/tech/hardware/14-lakh-aakash-tablets-booked-in-14-days/articleshow/11345695.cms&lt;/a&gt;. Parthasarathi, Ashok. “Cloudy Outlook for Aakash.” The Hindu. May 21, 2012 (Updated: May 22, 2012). &lt;a href="http://www.thehindu.com/opinion/op-ed/article3439629.ece
"&gt;http://www.thehindu.com/opinion/op-ed/article3439629.ece&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[7]&lt;/strong&gt; Comptroller and Auditor General of India, Government of India. Report No. 19 of 2013 - Union Government (Civil) - Report of the Comptroller and Auditor General of India on Compliance Audit Observations. Government of India. 2013. &lt;a href="http://www.cag.gov.in/content/report-no-19-2013-compliance-audit-observations-union-governmentcivil"&gt;http://www.cag.gov.in/content/report-no-19-2013-compliance-audit-observations-union-governmentcivil&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[8]&lt;/strong&gt; At an event in late 2013, Kapil Sibal admitted, “[the] Aakash tablet was my dream but it was not fulfilled, I tried hard...” Quoted in Press Trust of India. “Kapil Sibal: Aakash Tablet is My Unfulfilled Dream.” Financial Express. December 24, 2013. &lt;a href="http://www.financialexpress.com/news/kapil-sibal-aakash-tablet-is-my-unfulfilled-dream/1211284/0 "&gt;http://www.financialexpress.com/news/kapil-sibal-aakash-tablet-is-my-unfulfilled-dream/1211284/0 &lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[9]&lt;/strong&gt; See &lt;strong&gt;[1]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Note:&lt;/strong&gt; This is an edited excerpt from a paper titled ‘The Aakash Tablet and Technological Imaginaries of Mass Education in Contemporary India’ recently published in History and Technology, on 5 February, 2016. The paper can be accessed here: &lt;a href="http://www.tandfonline.com/doi/full/10.1080/07341512.2015.1136142" target="_blank"&gt;http://www.tandfonline.com/doi/full/10.1080/07341512.2015.1136142&lt;/a&gt; (the first 50 downloads are free).&lt;/p&gt;
&lt;p&gt;Cross-posted from &lt;a href="http://blogs.lse.ac.uk/southasia/2016/02/12/the-aakash-tablet-and-technological-imaginaries-of-mass-education-in-contemporary-india/" target="_blank"&gt;South Asia @ LSE Blog&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/raw/aakash-tablet-and-technological-imaginaries-of-education-in-india-excerpt'&gt;http://editors.cis-india.org/raw/aakash-tablet-and-technological-imaginaries-of-education-in-india-excerpt&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Education Technology</dc:subject>
    
    
        <dc:subject>Internet Histories</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    

   <dc:date>2016-02-14T10:11:09Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/a2k/telugu-wikipedia">
    <title>Telugu Wikipedia Projects</title>
    <link>http://editors.cis-india.org/a2k/telugu-wikipedia</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/a2k/telugu-wikipedia'&gt;http://editors.cis-india.org/a2k/telugu-wikipedia&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2015-12-15T09:03:11Z</dc:date>
   <dc:type>Collection</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/about/people/CIS_TM.jpeg">
    <title>Tasneem Mewa</title>
    <link>http://editors.cis-india.org/about/people/CIS_TM.jpeg</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/about/people/CIS_TM.jpeg'&gt;http://editors.cis-india.org/about/people/CIS_TM.jpeg&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2020-02-17T09:56:52Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/openness/sumandro-c-open-access-dialogues-2013">
    <title> Sumandro C - Open Access Dialogues - Strategic Issues Emerging from the Comments of Indian Participants </title>
    <link>http://editors.cis-india.org/openness/sumandro-c-open-access-dialogues-2013</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/openness/sumandro-c-open-access-dialogues-2013'&gt;http://editors.cis-india.org/openness/sumandro-c-open-access-dialogues-2013&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2015-10-11T04:34:19Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/Members/subodh_kulkarni.jpg">
    <title>Subodh Kulkarni</title>
    <link>http://editors.cis-india.org/Members/subodh_kulkarni.jpg</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/Members/subodh_kulkarni.jpg'&gt;http://editors.cis-india.org/Members/subodh_kulkarni.jpg&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2018-08-21T07:08:21Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/openness/comments-on-the-telangana-state-open-data-policy-2016">
    <title>Submitted Comments on the Telangana State Open Data Policy 2016</title>
    <link>http://editors.cis-india.org/openness/comments-on-the-telangana-state-open-data-policy-2016</link>
    <description>
        &lt;b&gt;Last month, the Information Technology, Electronics &amp; Communications Department of the Government of Telangana released the first public draft of the Telangana State Open Data Policy 2016, and sought comments from various stakeholders in the state and outside. The draft policy not only aims to facilitate and provide a framework for proactive disclosure of data created by the state government agencies, but also identify the need for integrating such a mandate within the information systems operated by these agencies as well. CIS is grateful to be invited to submit its detailed comments on the same. The submission was drafted by Anubha Sinha and Sumandro Chattapadhyay.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Download the submitted document: &lt;a href="http://cis-india.org/openness/files/cis-telangana-state-open-data-policy-v-1-submission/at_download/file"&gt;PDF&lt;/a&gt;.&lt;/strong&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;&lt;strong&gt;1. Preliminary&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;1.1.&lt;/strong&gt; This submission presents comments and recommendations by the Centre for Internet and Society (“CIS”) &lt;strong&gt;[1]&lt;/strong&gt; on the proposed draft of the Telangana Open Data Policy 2016 (“the draft policy”). This submission is based on Version 1 of the draft policy shared by the Information Technology, Electronics &amp;amp; Communications Department, Government of Telangana (“the ITE&amp;amp;C Department”).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;1.2.&lt;/strong&gt; CIS commends the ITE&amp;amp;C Department for its generous efforts at seeking inputs from various stakeholders to draft an open data policy for the state of Telangana. CIS is thankful for this opportunity to provide a clause-by-clause submission.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;2. The Centre for Internet and Society&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;2.1.&lt;/strong&gt; The Centre for Internet and Society, CIS, is a non-profit organisation that undertakes interdisciplinary research on internet and digital technologies from policy and academic perspectives. The areas of focus include digital accessibility for persons with diverse abilities, access to knowledge, intellectual property rights, openness (including open data, free and open source software, open standards, open access, open educational resources, and open video), internet governance, telecommunication reform, digital privacy, and cyber-security. The academic research at CIS seeks to understand the reconfiguration of social processes and structures through the internet and digital media technologies, and vice versa.&lt;/p&gt;
&lt;p&gt;2.2. This submission is consistent with CIS’ commitment to safeguarding general public interest, and the interests and rights of various stakeholders involved. The comments in this submission aim to further the principle of citizens’ right to information, instituting openness-by-default in governmental activities, and to realise the various kinds of public goods that can emerge from greater availability of open (government) data. The submission is limited to those clauses that most directly have an impact on these principles.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;3. Comments and Recommendations&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;em&gt;This section presents comments and recommendations directed at the draft policy as a whole, and in certain places, directed at specific clauses of the draft policy.&lt;/em&gt;&lt;/p&gt;
&lt;h3&gt;3.1. Defining the Scope of the Policy in the Preamble&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.1.1.&lt;/strong&gt; CIS observes and appreciates that the ITE&amp;amp;C Department has identified the open data policy as a catalyst for, and as dependent upon, a larger transformation of the information systems implemented in the state, to specifically ensure that these information systems.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.1.2.&lt;/strong&gt; CIS commends the endeavour of the draft policy to share data in open and machine-readable standards. To further this, it will be useful for the preamble to explicitly mandate proactive disclosure in both human-readable and machine-readable formats, using open standards, and under open license(s).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.1.3.&lt;/strong&gt; CIS recommends that the draft policy state the scope of the policy at the outset, i.e. in the Preamble section of the document. This will provide greater clarity to the stakeholders who are trying to ascertain applicability of the draft policy to their data.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.1.4.&lt;/strong&gt; CIS commends the crucial mandate of creating data inventory within every state government ministry / department. We further recommend that the draft policy also expressly states the need to make these inventories publicly accessible.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.1.5.&lt;/strong&gt; CIS commends the draft policy’s aim to build a process to engage with data users for better outcomes. We suggest that the draft policy also enumerates the “outcomes” of such engagement, in order to provide more clarity. We recommend that these “outcomes” include greater public supply of open government data in an effective, well-documented, timely, and responsible manner.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.1.6.&lt;/strong&gt; Further, CIS suggests that the draft policy define “information centric and customer centric data” to provide more clarity to the document, as well as its scope and objectives.&lt;/p&gt;
&lt;h3&gt;3.2. Provide Legal and Policy References&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.2.1.&lt;/strong&gt; Strengthening transparency, predictability, and legal certainty of rules benefits all stakeholders. Thus, as far as possible, terms in the draft policy should use pre-existing legal definitions. In case of ambiguities arising after the implementation of the policy, consistency in definitions will also lead to greater interpretive certainty. It must be noted that good quality public policies which promote legal certainty, lead to better implementation.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.2.2.&lt;/strong&gt; CIS observes that the draft policy re-defines various terms in Section 4 that have already been defined in National Data Sharing and Accessibility Policy (“NDSAP”) 2012 &lt;strong&gt;[2]&lt;/strong&gt;, the Right to Information 2005 (“RTI Act”) &lt;strong&gt;[3]&lt;/strong&gt;, and IT (Reasonable  security  practices  and  procedures  and sensitive personal data or information) Rules 2011 &lt;strong&gt;[4]&lt;/strong&gt;. We strongly recommend that the draft policy uses the pre-existing definitions in these acts, rules, and policies.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.2.3.&lt;/strong&gt; Further, CIS observes that while certain sections accurately reflect definitions and parts from other acts, rules and policies, such sections are not referenced back to the latter. These sections include, but are not limited to: Sections 3, 7, 8, 4 (definitions of Data set, Data Archive, Negative list, Sensitive Personal data). We strongly recommend that accurate legal references be added to the draft policy after careful study of the language used.&lt;/p&gt;
&lt;h3&gt;3.3. Need for More Focused Objective Statement&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.3.1.&lt;/strong&gt; While the draft policy has a very comprehensive statement of its objectives, including "&lt;em&gt;all issues related to data in terms of the available scope of sharing and accessing spatial and non-spatial data under broad frameworks of standards and interoperability&lt;/em&gt;," it may consider offering a more focused statement of its key objective, which is to provide a policy framework for proactive disclosure of government data by the various agencies of the Government of Telangana.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.3.2.&lt;/strong&gt; Further, the objective statement must clearly state that the policy enables publication of data created by the agencies of the Government of Telangana, and/or by private agencies working in partnership with public agencies, using public funds as open data (that is, using open standards, and under open license). The present version of the objective statement mentions "&lt;em&gt;sharing&lt;/em&gt;" and "&lt;em&gt;accessing&lt;/em&gt;" the data concerned under "&lt;em&gt;broad frameworks of standards and interoperability&lt;/em&gt;" but does not make it clear if such shared data will be available in open standards, under open licenses, and for royalty-free adaptation and redistribution by the users concerned.&lt;/p&gt;
&lt;h3&gt;3.4. Suggestions related to the Definitions&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.4.1.&lt;/strong&gt; The term “Data” has not been defined in accordance with NDSAP 2012. We suggest that the definition provided in NDSAP is followed so as to ensure legal compatibility.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.4.2.&lt;/strong&gt; The term “Sensitive Personal Data” seems to have been defined on the basis of the definition provided in the IT (Reasonable  security  practices  and  procedures  and sensitive personal data or information) Rules 2011. Please add direct reference so as to make this clear. We further suggest that the term “Personal Information”, also defined in the same IT Rules, is also included and referred to in the draft policy, so that not only Sensitive Personal Data is barred from disclosure under this policy, but also Personal Information (that is "&lt;em&gt;any information that relates to a natural person, which, either directly or indirectly, in combination with other information available or likely to be available with a body corporate, is capable of identifying such person&lt;/em&gt;") &lt;strong&gt;[5]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.4.3.&lt;/strong&gt; The term “Negative List” is defined in a manner that allows the state government ministries and agencies to identify which data are to be considered as non-shareable without any reference to an existing policy framework that list acceptable grounds for such identification. The term must be defined more restrictively, as this definition can allow an agency to avoid disclosure of data that may not be legally justifiable as non-shareable or sensitive. Thus, we recommend a more limited definition which may draw upon the RTI Act 2005, and specifically consider the factors mentioned in Sections 8 and 9 of the Act as the (only) set of acceptable reasons for non-disclosure of government data.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.4.4.&lt;/strong&gt; The terms “Shareable Data” and “Sensitive Data” are used in several places in the draft policy but are not defined in Section 4. Both these terms are defined in NDSAP 2012. We suggest that both these terms be listed in Section 4, in accordance with the respective definitions provided in NDSAP 2012.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.4.5.&lt;/strong&gt; The terms “Data Archive”, “Data Acquisition”, “Raw Data”, “Standards-Compliant Applications”, and “Unique Data” are defined in Section 4, but none of these terms appear elsewhere in the draft policy. We suggest that these terms are either better integrated into the document, or may not be defined at all.&lt;/p&gt;
&lt;h3&gt;3.5. Rename Section 6 to Focus on Implementation of the Policy&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.5.1.&lt;/strong&gt; Though the Section 6 is named as “Shareable Data”, it instead categorically lists down how the policy is to be implemented. This is a very welcome step, but the Section title should reflect this purpose of the Section.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.5.2.&lt;/strong&gt; The decision proposed in the draft policy to make it mandatory for "&lt;em&gt;each funding organization&lt;/em&gt;" to "&lt;em&gt;highlight data sharing policy as preamble in its RFPs as well as Project proposal formats&lt;/em&gt;" is much appreciated and commendable. For a clearer and wider applicability of this measure, we recommend that this responsibility should apply to all state government agencies, including agencies where the state government enjoys significant stake, and all public-private partnerships entered into by the state government agencies, and not only to "&lt;em&gt;funding organizations&lt;/em&gt;" (a term that has also not been defined in the draft policy).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.5.3.&lt;/strong&gt; While the Section details out various measures and steps of implementation of the policy, it does not clarify which agency and/or committee would have the authority and responsibility to coordinate, monitor, facilitate, and ensure these measures and steps. Not only governmental representatives but also non-governmental representatives may be considered for such a committee.&lt;/p&gt;
&lt;h3&gt;3.6. Host All Open Government Data in the State Portal&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.6.1.&lt;/strong&gt; We observe that the Section 6 indicates that  , the designated domain for the open government data portal for the state of Telangana, will only store metadata related to the proactive disclosed data sets but not the data sets themselves. This is further clarified in Section 10. We strongly urge the ITE&amp;amp;C Department to reconsider this decision to not to store the actual open data sets in the state open government data portal itself but in the departmental portals. A central archive of the open data assets, hosted by the state open government data portal, will allow for more effective and streamlined management of the open data assets concerned, including their systematic backing-up, better security and integrity, permanent and unique disclosure, and rule-driven updation. This would also reduce the burden upon all the government agencies, especially those that do not have a substantial IT team, to run independent department-specific open data portals.&lt;/p&gt;
&lt;h3&gt;3.7. Reconsider the Section on Data Classification&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.7.1.&lt;/strong&gt; While it is clear that the Section 7 on Data Classification follows the classification of various data sets created, managed, and/or hosted by government agencies offered in the NDSAP 2012, it is not very clear what role this classification plays in functioning and implementation of the draft policy. While Open Access and Registered Access data may both be considered as open government data that is to be proactively disclosed by the state government agencies via the state open government data portal, the Restricted Access data overlaps with the kinds of data already included in the Negative List defined in the draft policy (and elsewhere, like the RTI Act 2005). Further, the final sentence in this Section ensures that all data users provide appropriate attribution of the source(s) of the data set concerned, which (though is an important statement) should not be part of this Section on Data Classification. We suggest reconsideration of inclusion of this Section.&lt;/p&gt;
&lt;h3&gt;3.8. Reconsider the Section on Technology for Sharing and Access&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.8.1.&lt;/strong&gt; While it is clear that the Section 8 on Technology for Sharing and Access is adapted from the Section 9 of the NDSAP 2012, the text in this Section seems to be not fully compatible with other statements in this draft policy. For example, the Section states that "&lt;em&gt;[t]his integrated repository will hold data of current and historical nature and this repository over a period of time will also encompass data generated by various State Government departments&lt;/em&gt;." However, the draft policy states in Section 10 that "&lt;em&gt;data.telangana.gov.in will only have the metadata and data itself will be accessed from the portals of the departments&lt;/em&gt;."&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.8.2.&lt;/strong&gt; We strongly urge the ITE&amp;amp;C Department to revise this Section through close discussion with the NDSAP Project Management Unit, National Informatics Centre, which is the technical team responsible for developing and managing the  portal, since the present version of this Section lists the original feature set of the  portal as envisioned in 2012 but does not reflect the most recent feature set that has been already implemented in the portal concerned.&lt;/p&gt;
&lt;h3&gt;3.9. Current Legal Framework (Section 9) should List to Relevant Acts, Rules, Policies, and Guidelines&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.9.1.&lt;/strong&gt; CIS observes that the draft policy attempts to lay out the applicable legal framework in Section 2 and 9 of the draft policy, and submits that the legal framework is incomplete and recommends that the draft policy lists all the following relevant acts, rules, policies and guidelines:&lt;/p&gt;
&lt;ol type="A"&gt;
&lt;li&gt;National Data Sharing and Accessibility Policy, 2012&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Right to Information Act, 2005&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Information Technology Act, 2002&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011.&lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;3.9.2.&lt;/strong&gt; CIS submits that apart from the policies mentioned above, the implementation of the draft policy is intricately linked to concepts of "open standards," "open source software," "open API," and "right to information." These concepts are governed by specific acts and policies, and are applicable to government owned data, as follows:&lt;/p&gt;
&lt;ol type="A"&gt;
&lt;li&gt;&lt;strong&gt;Adoption of Open Standards:&lt;/strong&gt; CIS observes that the draft policy draws on the importance of building information systems for interoperability and greater information accessibility. Interoperability is achieved by appropriate implementation of open standards. Thus, CIS submits that the Policy on Open Standards for e-Governance &lt;strong&gt;[6]&lt;/strong&gt; which establishes the guidelines for usage of open standards to ensure seamless interoperability, and the Implementation Guidelines of the National Data Sharing and Accessibility Policy, 2012 &lt;strong&gt;[7]&lt;/strong&gt; should be mentioned in the draft policy.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Adoption of Open Source Software:&lt;/strong&gt; The Policy on Adoption of Open Source Software for Government of India states that the "&lt;em&gt;Government of India shall endeavour to adopt Open Source Software in all e-Governance systems implemented by various Government organizations, as a preferred option in comparison to Closed Source Software&lt;/em&gt; &lt;strong&gt;[8]&lt;/strong&gt;." As the draft policy proposed to guide the development of information systems to share open data is being developed and implemented both by the Government of Telangana and by other agencies (academic, commercial, and otherwise), it must include an explicit reference and embracing of  this mandate for adoption of Open Source Software, for reasons of reducing expenses, avoiding vendor lock-ins, re-usability of software components, enabling public accountability, and greater security of software systems.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Implementation of Open APIs:&lt;/strong&gt; CIS observes that the draft policy refers to Standard compliant applications in Section 4. CIS suggests that final version of the policy refer to and operationalise the Policy on Open Application Programming Interfaces (APIs) for Government of India &lt;strong&gt;[9]&lt;/strong&gt;. This will ensure that the openly available data is available to the public, as well as  to all the government agencies, in a structured digital format that is easy to consume and use on one hand, and is available for various forms of value addition and innovation on the other. Refer to Official Secrets Act, 1923: The Official Secrets Act penalises a person if he/she "&lt;em&gt;obtains, collects, records or publishes or communicates to other person any secret official code or password, or any sketch, plan, model, article or note or other document or information which is calculated to be or might be or is intended to be, directly or indirectly, useful to an enemy for which relates to a matter the disclosure of which is likely to affect the sovereignty and integrity of India, the security of the State or friendly relations with foreign States&lt;/em&gt; &lt;strong&gt;[10]&lt;/strong&gt;." CIS submits that this Act should be referred to in this context of ensuring non-publication of the aforementioned data.&lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;h3&gt;3.10. Mandate a Participatory Process for Developing the Implementation Guidelines&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.10.1.&lt;/strong&gt; We highly appreciate and welcome the fact that the draft policy emphasises rapid operationalisation of the policy by mandating that the ITE&amp;amp;C Department will prepare a detailed implementation guideline within 6 months of the notification of this policy, and all state government departments will publish at least 5 high value datasets within the next three months. Just as an addition to this mandate, we would like to propose that it can be suggested that the ITE&amp;amp;C Department undertakes a participatory process, with contributions from both government agencies and non-government actors, to develop this implementation guideline document. We believe that opening up government data in an effective and sustainable manner, for most government agencies, involves a systematic change in how the agency undertakes day-to-day data management practices. Hence, to develop productive and practical implementation guidelines, the ITE&amp;amp;C Department needs to gather insights from the other state government agencies regarding their existing data (and metadata) management practices &lt;strong&gt;[11]&lt;/strong&gt;. Further, participation of the non-government actors in this process is crucial to ensure that the implementation guidelines appropriately identify the high value data sets, that is data sets that should be published on a priority basis.&lt;/p&gt;
&lt;h3&gt;3.11. Defer the Decision about Roles of Data Owners, Generators, and Controllers&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.11.1.&lt;/strong&gt; As the draft policy does not specifically define the terms “Data Owners”, “Data Generators”, and “Data Controllers”, and the Section 11 only briefly describes some of the roles of these types of actors, we suggest removal of this discussion and the decision regarding the specific roles and functions of the Data Owners / Generators / Controllers from the draft policy itself. It will be perhaps more appropriate and effective to define these terms, as well as their roles and functions, in the implementation guidelines to be prepared by the ITE&amp;amp;C Department after the notification of the open data policy, since these terms relate directly to the final designing of the implementation process.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.12.&lt;/strong&gt; CIS is grateful to the ITE&amp;amp;C Department for this opportunity to provide comments, and would be honoured to provide further assistance on the matter.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Endnotes&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;[1]&lt;/strong&gt; See: &lt;a href="http://cis-india.org/" target="_blank"&gt;http://cis-india.org/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[2]&lt;/strong&gt; See: &lt;a href="http://data.gov.in/sites/default/files/NDSAP.pdf" target="_blank"&gt;http://data.gov.in/sites/default/files/NDSAP.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[3]&lt;/strong&gt; See: &lt;a href="http://rti.gov.in/webactrti.htm" target="_blank"&gt;http://rti.gov.in/webactrti.htm&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[4]&lt;/strong&gt; See: &lt;a href="http://meity.gov.in/sites/upload_files/dit/files/GSR313E_10511(1).pdf" target="_blank"&gt;http://meity.gov.in/sites/upload_files/dit/files/GSR313E_10511(1).pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[5]&lt;/strong&gt; See Section 2 (1) (i) of IT (Reasonable security practices and procedures and sensitive personal data or information) Rules 2011.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[6]&lt;/strong&gt; See: &lt;a href="https://egovstandards.gov.in/sites/default/files/Published%20Documents/Policy_on_Open_Standards_for_e-Governance.pdf" target="_blank"&gt;https://egovstandards.gov.in/sites/default/files/Published%20Documents/Policy_on_Open_Standards_for_e-Governance.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[7]&lt;/strong&gt; See: &lt;a href="https://data.gov.in/sites/default/files/NDSAP_Implementation_Guidelines_2.2.pdf" target="_blank"&gt;https://data.gov.in/sites/default/files/NDSAP_Implementation_Guidelines_2.2.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[8]&lt;/strong&gt; See: &lt;a href="http://deity.gov.in/sites/upload_files/dit/files/policy_on_adoption_of_oss.pdf" target="_blank"&gt;http://deity.gov.in/sites/upload_files/dit/files/policy_on_adoption_of_oss.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[9]&lt;/strong&gt; See: &lt;a href="http://deity.gov.in/sites/upload_files/dit/files/Open_APIs_19May2015.pdf" target="_blank"&gt;http://deity.gov.in/sites/upload_files/dit/files/Open_APIs_19May2015.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[10]&lt;/strong&gt; See: &lt;a href="http://www.archive.india.gov.in/allimpfrms/allacts/3314.pdf" target="_blank"&gt;http://www.archive.india.gov.in/allimpfrms/allacts/3314.pdf&lt;/a&gt;, Sections 2 (2) and 3 (1) (c).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[11]&lt;/strong&gt; A similar process was undertaken by the IT Department of the Government of Sikkim when developing the implementation guideline document. The ITE&amp;amp;C Department may consider discussing the matter with the said department to exchange relevant learnings.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/openness/comments-on-the-telangana-state-open-data-policy-2016'&gt;http://editors.cis-india.org/openness/comments-on-the-telangana-state-open-data-policy-2016&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Data</dc:subject>
    
    
        <dc:subject>Open Government Data</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Policies</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2016-09-01T05:49:51Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
