<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="http://editors.cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>http://editors.cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 201 to 215.
        
  </description>
  
  
  
  
  <image rdf:resource="http://editors.cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="http://editors.cis-india.org/a2k/blogs/two-faced-frand-licensing-and-injunctive-relief-in-icts"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/telecom/blog/business-standard-december-6-2017-shyam-ponappa-the-tragedy-of-the-unused-commons"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/files/technology-behind-big-data.pdf"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/technology-behind-big-data"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/sc-judgment-in-shreya-singhal-what-it-means-for-intermediary-liability"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/telecom/blog/organizing-india-blogspot-october-11-2012-shyam-ponappa-the-supreme-court-delivers"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/a2k/blogs/the-sti-policy-proposes-a-transformative-open-access-approach-for-india"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/the-state-of-secure-messaging"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/india-together-june-26-2013-snehashish-ghosh-the-state-is-snooping-can-you-escape"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/spies-we-trust"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/events/lecture-tour-by-sagie-chetty"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/what-will-be-the-role-of-ict-in-indias-judical-reform-process"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/accessibility/blog/the-road-to-financial-inclusion"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/accessibility/blog/right-to-read-campaign"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/events/the-right-to-information-the-right-to-knowledge"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="http://editors.cis-india.org/a2k/blogs/two-faced-frand-licensing-and-injunctive-relief-in-icts">
    <title>The two-faced FRAND: Licensing and injunctive relief in ICTs </title>
    <link>http://editors.cis-india.org/a2k/blogs/two-faced-frand-licensing-and-injunctive-relief-in-icts</link>
    <description>
        &lt;b&gt;Important takeaways from the Indo-Europe Conference on Building a Sustainable IPR-ICT Ecosystem for Promoting Innovation, held in Bangalore in November 2015. Ericsson and the Indian Cellular Association presented an interesting set of views on FRAND licensing as well as injunctive relief, from seemingly opposite ends of the spectrum.&lt;/b&gt;
        &lt;p&gt;For the schedule, and more information, visit: &lt;a class="external-link" href="http://www.ict-ipr.in/sipeit/conference"&gt;http://www.ict-ipr.in/sipeit/conference&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;Ericsson’s position on patenting &lt;/span&gt;&lt;/h2&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;-- Companies file numerous patent applications every year but 95% of all granted patents are never commercialised. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;-- Ericsson manages to commercialise less than 5 percent of its patents.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;-- A patent application could be rejected because it is not inventive or novel enough. Sometimes, a competitor manages to file for or obtain a patent for the same or similar technology a few days before Ericsson. Hence, it becomes prior art and Ericsson is unable to apply for a patent. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;-- Monetising patents is a challenge because the technology they pertain to may not be good enough to be implemented. Either that, or nobody in the market wants the technology. There is no business aspect to it.&lt;strong&gt; &lt;/strong&gt;&lt;/span&gt;&lt;strong&gt;&lt;span&gt;Thus, patenting is expensive but but filing patents is a trial-and-error activity, which makes patenting financially cumbersome.&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;-- Ericsson feels the need to file a lot of patents, so that some of those patents could be useful from a business perspective. The rest are not commercialised.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;-- The number of patents filed are rising in certain countries, but the numbers are misleading. Some patents are of poor quality and/ or unusable for commercialisation.&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;-- Ericsson gets approximately 5,000 inventions per year but files patent applications for only around 1,500 to 1,600, as the rest of the inventions do not have a business aspect to it. That is, Ericsson does not believe that the invention has good business potential or that there is little way for the market to adapt to it. &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;-- When companies invest heavily on research and development, and when they try to get (what will later become a) standardised technology released into the market, they should get fair returns on investment.&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;-- Indian companies need to invest in IPR. They need to do trial-and-error with respect to patenting. Only then, perhaps, some returns will accrue to them from owning patents.&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;-- Monetisation is besides selling products. It's a side effect of investment in research and development.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;Ericsson’s position on FRAND licensing&lt;/span&gt;&lt;/h2&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;-- No company apart from non-practising entities (NPEs) make all or most of its money from licensing. Ericsson makes most of its money from its products and not patents. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;-- A large number of companies such as Ericsson have inventors based in India but the patents get registered abroad, [that is, the patents are not filed by the Indian subsidiary of Ericsson].&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;-- &lt;/span&gt;&lt;strong&gt;&lt;span&gt;The percentage fee charged for a FRAND license is a low, single-digit number. &lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;-- It's a wrong conception that FRAND licensing is very expensive and will shut down Indian companies. If there were no FRAND agreements, no Indian company would be able to put out a phone in the market.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;-- It’s a wrong notion that FRAND agreements are prohibiting any company from the market. Indian companies will not be thrown out of the market by FRAND companies or companies that possess a lot of patents. No Indian company would be able to make and sell a phone if FRAND terms didn’t exist.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;-- &lt;strong&gt;Ericsson is called a patent troll because it doesn’t make mobile phones anymore, but Ericsson built the technology it patented [unlike other patent trolls who buy and gather patents].&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;-- Ericsson has entered into more than licensing 100 agreements worldwide. Many of its licensees are repeat licensees.&lt;/span&gt;&lt;/p&gt;
&lt;p id="docs-internal-guid-4f920544-b271-1bd0-cde5-919b2b7c321e" dir="ltr"&gt;&lt;span&gt;-- &lt;strong&gt;The average selling price (ASP) of China-made phones sold in India is USD 50. This money goes to China. The ASP of high-end phones elsewhere is USD 250. Thus, a royalty of USD 15, calculated on the sale price of the end product, is not high.&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;Ericsson’s position on SEP litigation in India and injunctions&lt;/span&gt;&lt;/h2&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;-- Nobody starts litigation in order to render an injunction in the end. The idea is to get the other party to the table and negotiate reasonable terms.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;-- &lt;/span&gt;&lt;strong&gt;&lt;span&gt;Litigation without injunction is a toothless tiger.&lt;/span&gt;&lt;span&gt; The 'licensee' has the financial upper hand of not paying the licensor. So the former can keep prolonging negotiations.&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;-- When hold-out happens during licensing negotiations, litigation is used as a last resort. Injunctions are one of the possible outcomes of litigation.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;-- India should play the SEP game. 5G development starts in January 2016 and India should try to get a stake in the development. Indian companies should try to get high quality patents.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;&lt;span&gt;[&lt;span id="docs-internal-guid-7d58a686-b1b1-3c63-f6ae-d317a187703b"&gt;This suggestion seems to be for homegrown Indian companies as Ericsson also stated during the conference that, “A large number of companies such as Ericsson have inventors based in India but the patents get registered abroad”, that is, the patents are not filed by the Indian subsidiary of Ericsson.]&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: center; "&gt;&lt;span&gt;*****&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;Indian Cellular Association on injunctive relief,  SEPs and FRAND licensing rates&lt;br /&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;p dir="ltr"&gt;&lt;span&gt; -- When the standard setting process is  collaborative, it is not logical to apply injunctive relief. It is  against the ethos of the community.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;--Telecommunication was the first industry to create monopolies, that is, standardisation in order to serve the customer better.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;-- [With reference to SEP infringement litigation happening in  India], the so-called infringer is not in league/ not competing with  anything the patent holder is making and/ or selling.&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;-- The Competition Act in India is a wide-ranging  law. It is not a restrictive trade practices act or a monopolies act.  Patents are out of the purview of competition.&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;-- If a rights holder has acquired dominance as a  part of the standard setting process, it is undoubtedly dominant. But if  the rights holder's market practices are fair, then it is not violating  any provisions of the Competition Act.&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;-- India has a “demographic dividend”. Legacy patent  holders should look at India differently, and consider our purchasing  power. If technology has to proliferate, then consumers in India cannot  be burdened with the same royalties as the developed world.&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;-- We are trying to strengthen the TSDSI, India's indigenous standards development body [so that India can have a stake in international standards development].&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;-- The size of the global smartphone market today  [2015] is USD 500 billion; India's mobile phone market is worth USD 16  billion. The mobile phone market share of China is pegged at USD 110  billion.&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p id="docs-internal-guid-7d58a686-b24c-352b-bfd3-d6b26ac7a9d8" dir="ltr"&gt;&lt;span&gt;--  The mobile phone market in India will be worth USD 100 billion as of  the year 2022 or 2023. For SEP royalties that reward the innovation of  all the SEP holders, what will be the amount of royalty outflow? If the  outflow is USD 500 billion [in the year 2022 or 2023], then the FRAND  percentage be 0.5, which is not a single-digit number, unlike what was  stated by Ericsson's representative.&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;-- In the projected figure of USD 100 billion, &lt;span id="docs-internal-guid-7d58a686-b259-5f5a-3e52-9c4a2f5bf957"&gt;USD  30 billion accounts for display, USD 5 billion accounts for Lithium-ion  battery, USD 5 billion for communication protocol, and the complete  chipset stack for around USD 10 billion. If the FRAND rate were to be  determined as a percentage of the price of the smallest practising  component of the [finished]&lt;/span&gt; device, then it would be, say, 2% of  USD 10 billion. If the FRAND rate were to be determined as a percentage  of the end product, it would be 0.5% of USD 100 billion. But, &lt;strong&gt;if the  FRAND percentage were a single-digit number, which could also be 9, then  all the manufacturers except the rights holders would be snuffed out. &lt;/strong&gt;China's  mobile market is at USD 110 billion now and is projected to be at USD  400 billion in 2022, will be paying around USD 1 billion in total  royalty outflows.&lt;span id="docs-internal-guid-7d58a686-b267-9e65-539f-9bacaa7b48df"&gt; &lt;/span&gt;&lt;span id="docs-internal-guid-7d58a686-b267-9e65-539f-9bacaa7b48df"&gt; &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p id="docs-internal-guid-4f920544-b2a5-a0f4-a732-f19269164fc5" dir="ltr"&gt;&lt;span&gt;&lt;span id="docs-internal-guid-7d58a686-b267-9e65-539f-9bacaa7b48df"&gt;--  We also need to evaluate macro costs of research and development  globally. How many times, how much, and for how many years do we need to  reward innovation? What is the right return amount for inventors? All  this will come up for serious debate with the patent office, the  Competition Commission of India, the companies, and with the ministries.  To ensure equitable growth and a level playing field, all these  entities need to get involved.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;-- There is deep distrust of rights holders due to opaqueness in their operations. For example, injunctive relief was sought against a small importer in an Indian court. The royalty rate demanded happened to be half of that demanded from another Indian importer in the same court against an interim injunction. The rights holder then claimed that the email sent to the former importer was a mistake and it revised the rates so that it was equal for both importers. &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;&lt;span&gt;&lt;i&gt;[This seems to be a reference to Ericsson suing Saral Communications for patent infringement in the Delhi High Court around the same time that Micromax complained to the Competition Commission of India alleging abuse of its dominant positon by Ericsson. The interim royalty rates quoted to Saral were half of the rates that Micromax was ordered to pay, rendering Ericsson's conduct discriminatory and in violation of FRAND. Ericsson subsequently claimed that the rates conveyed to Saral via email were a mistake and asked for the same interim royalty rates as it from Micromax. For more details refer to, &lt;a class="external-link" href="http://www.fosspatents.com/2014/03/court-document-reveals-discriminatory.html"&gt;Court document reveals discriminatory royalty demands by Ericsson for its wireless patents. &lt;/a&gt;&lt;/i&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;&lt;span&gt;&lt;i&gt;This is also an indication that the market practices of certain rights holders are not consistent, which not only results in a trust deficit but prevents the implementation of a harmonised FRAND rate across the world.] &lt;br /&gt;&lt;/i&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: center; "&gt;&lt;span&gt;&lt;span&gt;****&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;&lt;span&gt;Injunctive relief and FRAND licensing in Europe&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;-- According to the German Patent Act, there is automatic injunction as a consequence of patent infringement. No injunctive relief is granted for SEPs anymore in Germany, if certain conditions are fulfilled by the willing licensee.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;-- Long-standing provisions exist in Germany for calculating royalties when multiple patents and multiple patent holders exist. FRAND licensing for one patent is useless. There should be FRAND for the whole complex. &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;-- As per the Huawei decision of the European Court of Justice, dated 16 July 2015, a willing licensee can make an offer for the price it wishes to pay to use a patent under the condition that it deposits an amount in the bank as a security for the licensor. Then the licensor cannot enforce the injunction anymore.&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: center; "&gt;&lt;span&gt;****&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;Open data in patenting &lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;If the data available with patent offices across the world is made publicly accessible by the respective governments in a way that it is possible to search, understand, and visualise it, then there could be an explosion in innovation.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;The trade-off between access and innovation&lt;/span&gt;&lt;/h2&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Inexpensive phones of sub-standard quality break down or stop working sooner than good quality phones. This also destroys incentives for innovators who want to bring high quality phones into the market. So the inexpensive, low-quality phones is a trade-off between having access to mobile phones today and experiencing the fruits of innovation tomorrow. &lt;strong&gt;The Hatch Waxman Act in the US addresses this issue by allowing imitators to come into the economy through an authorised mechanism, which also restores some incentives for innovation.&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;The tradeoff is also addressed better by implementing an evidence-based approach instead of a one-size-fits-all solution. Some regions require an emphasis on access. In other places that do not lack access due to their geographical location and clusters of innovators, IPRs can be implemented more strictly. Such a segmented approach to regions and product-markets can be crafted into policy.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;The challenge of harmonisation&lt;/span&gt;&lt;/h2&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Denmark does not have a dedicated intellectual property office. Work on IP is integrated in the government offices for trade, growth, economy, and so on. IPR is strongly interlaced with competition law in the country. &lt;strong&gt;Similarly, the Department of Telecom, Department of Health, the Indian Patent Office and the Competition Commission of India should work in tandem to avoid conflict in the way they address cases and issues.&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h2 dir="ltr"&gt;&lt;span&gt; &lt;/span&gt;&lt;span&gt;Patenting for universities&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;Indian university do not carry out patenting as much as their counterparts in other countries. The DieTY has schemes for supporting patent filing by universities and academic institutions. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Number of patents granted annually to:&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Xingua University, China: 1,000&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;MIT, United States: 4,000&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;IIT and IISC, India: Between 100 and 200&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;Technology areas and number of SEPs in Europe&lt;/span&gt;&lt;/h2&gt;
&lt;p id="docs-internal-guid-7d58a686-b1b4-a37d-f2ae-7182f21bda20" dir="ltr"&gt;&lt;span&gt;Telecom via public network: 4,284&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;IT and Internet: 534&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Audio/ video systems, coding, et cetera.: 221&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Security, cryptography, biometrics: 182&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;(Source: &lt;span id="docs-internal-guid-7d58a686-b1b5-2260-14d7-cc444e9011c9"&gt;Competition Policy Brief, June 2014, Issue 8, Standard Essential Patents, European Commission)&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: center; "&gt;&lt;span&gt;&lt;span&gt;***&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: left; "&gt;&lt;span&gt;&lt;span&gt;&lt;i&gt;All comments in square brackets and italics by the author.&lt;/i&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/a2k/blogs/two-faced-frand-licensing-and-injunctive-relief-in-icts'&gt;http://editors.cis-india.org/a2k/blogs/two-faced-frand-licensing-and-injunctive-relief-in-icts&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>rohini</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Pervasive Technologies</dc:subject>
    

   <dc:date>2016-03-16T02:37:02Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/telecom/blog/business-standard-december-6-2017-shyam-ponappa-the-tragedy-of-the-unused-commons">
    <title>The tragedy of the unused commons</title>
    <link>http://editors.cis-india.org/telecom/blog/business-standard-december-6-2017-shyam-ponappa-the-tragedy-of-the-unused-commons</link>
    <description>
        &lt;b&gt;Hope for the good sense and guts to handle it.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published by &lt;a class="external-link" href="http://www.business-standard.com/article/opinion/the-tragedy-of-the-unused-commons-117120601490_1.html"&gt;Business Standard&lt;/a&gt; on December 6, 2017 and in the &lt;a class="external-link" href="http://organizing-india.blogspot.in/2017/12/the-tragedy-of-unused-commons.html"&gt;Organizing India Blogspot&lt;/a&gt; on the same day.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;“The tragedy of the commons” as you may recall, refers in economics to the overexploitation of shared resources because of unregulated access. The tragedy results from shared resources being depleted or degraded because users pursue their own interests, contrary to the common good. This leads to unsustainable depletion or degradation. The atmosphere and oceans are examples of such shared resources.&lt;br /&gt;&lt;br /&gt;There are also reverse situations, in which resources that are available for the benefit of society are unused, to the detriment of the common good. In such cases, there are opportunity costs from disuse that result in detriments, because the benefits of use are foregone. India’s abundant sunlight is a good example. Given its abundance, a reasonable expectation might be that extensive innovation and market organisation would be focused on harvesting this potential energy. Alas, India is a laggard in innovation relating to solar power.&lt;br /&gt;&lt;br /&gt;Another resource that is neither depleted nor degraded by usage but underused is radio frequency spectrum. The opportunity cost for unused spectrum is therefore even greater than for a degradable mineral resource such as coal, resulting in an extreme tragedy of unused commons.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Some Issues Need Resolution&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;The situation today is that swathes of spectrum are unused because of our inability, perhaps unwillingness, to develop the appropriate regulations and organisation to benefit from them. This is true of all unused and underused radio frequency spectrum, although some of it is the most useful means for broadband connectivity&lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=broadband+connectivity" target="_blank"&gt; &lt;/a&gt;for the majority of our rural and semi-urban population. It would also give more urban users less expensive access. For both sets, judicious use would enhance productivity and improve living conditions.&lt;br /&gt;The entire thrust of the Digital India initiative requires these enabling policies and procedures, that is, the administrative rules and regulations that would enable the use of presently unused and therefore wasted spectrum. There are, of course, many other steps required than merely putting in place the regulations. The market structures and organisation have to be created under government leadership with other stakeholders in industry and civil society that would permit sustainable use of “the commons” — namely, the spectrum, if it were a shared resource instead of being apportioned in silos.&lt;br /&gt;&lt;br /&gt;At present, private operators in this sector, except one, have too much debt, very low profitability, and insufficient network coverage. Services can be good in some locations, but countrywide, are spotty and not universally accessible. Yet, operators apparently want auctions, not now but at some time in the future (perhaps next year), for the essential resource that is &lt;b&gt;&lt;i&gt;the&lt;/i&gt;&lt;/b&gt; prerequisite for building the coverage that they don’t have although sorely needed, as it has been for years. While clearly impractical because of how auctions soak up capital, limiting subsequent investment in networks because of the deprivation of capital, operators reportedly want this in order to reduce competitive threats. &lt;br /&gt;&lt;br /&gt;Another baffling aspect of our reality is that the administration and regulator took no effective action to prevent the destruction of existing market structures in the telecom sector when there was a disruptive new entrant. With overwhelming resources from unrelated activities, unsustainable strategies and tactics could be construed as jeopardising India’s current and future productivity. Meanwhile, the administration and the regulator dithered, debating theoretical concepts of what constitutes anticompetitive or predatory activity, and the judiciary remained on the sidelines.&lt;br /&gt;&lt;br /&gt;Yet another aspect of puzzling inactivity is that there have been no steps to test certain promising technologies for permitting their use through appropriate policies in India, such as TV White Space or the development of MIMO — Multiple-Input-Multiple-Output — using arrays of antennas, yielding (a) greater throughput (b) over longer distances (c) to more users, thereby improving spectrum capacity for broadband. While initial tests for TV White Space, conducted after a delay of several years, have been promising (disclosure: the author was associated with some), proposals for larger follow-up trials have stalled. Without these, policymakers can’t even consider policies that would enable the development and use of TV White Space devices for extending optical fibre from gram panchayats to hundreds of thousands of village users.&lt;br /&gt;&lt;br /&gt;In the press, confusing articles short on facts make policy formulation even more difficult and risky in this already technically and financially complex space. One instance is an article about Maharashtra’s Village Social Transformation initiative avoiding TV White Space because this technology has problems with security clearance, in addition to Foreign Contribution Regulation Act clearance for Microsoft’s sponsorship of the pilot. The fact that the problem in India is in getting permission to use TV White Space for purposes other than for Doordarshan’s broadcasts finds no mention. The security risk in these frequencies is the same as in other frequencies, and transmission in any band can be monitored.&lt;br /&gt;&lt;br /&gt;Another article suggests the government is considering allocating a high-speed wireless frequency band of unused spectrum (V band or 60 GHz, which is like short-range wireless optic fibre) on a first come, first served basis “which is a gross violation of the Supreme Court order”. Somewhere down the page is a surmise that since the Broadband India Forum is advocating de-licencing of this band and foreign companies support it, this “means that it should be allocated without auction on first come, first served basis”. The Broadband India Forum in its white paper clearly recommends aligning with an international standard, the Harmonised European Standard.1&lt;br /&gt;&lt;sup&gt;&lt;/sup&gt; According to this, low power equipment within specified emission limits in this band doesn’t need a licence. Wi-Fi is de-licenced spectrum that is open access and not allocated. Other de-licenced spectrum would not need to be allocated either, although in India, bands such as 60 GHz could be restricted to authorised operators.&lt;br /&gt;&lt;br /&gt;It needs government intervention to cut the Gordian knot and initiate discussions on pooling spectrum for networks and working out practicable, sustainable options. Here’s hoping good sense and guts will help to make a start.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;em&gt;Shyam (no-space) Ponappa at gmail dot com&lt;/em&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;1: "V band - 60 GHz: The Key to Affordable Broadband in India"&lt;br /&gt;White Paper by Broadband India Forum, November 9, 2016&lt;a href="http://www.broadbandindiaforum.com/img/White%20Paper%20on%20V-BAND%20Revised%20Final.pdf"&gt;http://www.broadbandindiaforum.com/img/White%20Paper%20on%20V-BAND%20Revised%20Final.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/telecom/blog/business-standard-december-6-2017-shyam-ponappa-the-tragedy-of-the-unused-commons'&gt;http://editors.cis-india.org/telecom/blog/business-standard-december-6-2017-shyam-ponappa-the-tragedy-of-the-unused-commons&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Shyam Ponappa</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Telecom</dc:subject>
    

   <dc:date>2018-01-05T14:50:56Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/files/technology-behind-big-data.pdf">
    <title>The Technology Behind Big Data</title>
    <link>http://editors.cis-india.org/internet-governance/files/technology-behind-big-data.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/files/technology-behind-big-data.pdf'&gt;http://editors.cis-india.org/internet-governance/files/technology-behind-big-data.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2016-12-02T01:23:26Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/technology-behind-big-data">
    <title>The Technology behind Big Data</title>
    <link>http://editors.cis-india.org/internet-governance/blog/technology-behind-big-data</link>
    <description>
        &lt;b&gt;The authors undertakes a high-level literature review of the most commonly used technological tools and processes in the big data life cycle. The big data life cycle is a conceptual construct that can be used to study the various stages that typically occur in collecting, storing and analysing big data, along with the principles that can govern these processes.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/technology-behind-big-data.pdf/view"&gt;Download the Paper&lt;/a&gt; (PDF, 277 kb)&lt;/h4&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify;"&gt;Introduction&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;Defining big data is a disputed area in the field of computer science&lt;a name="_ftnref1" href="#_ftn1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, there is some consensus on a basic structure to its definition&lt;a name="_ftnref2" href="#_ftn2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;. Big data is data that is collected in the form of datasets that has three main criteria: size, variety &amp;amp; velocity, all of which operate at an immense scale&lt;a name="_ftnref3" href="#_ftn3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;. It is ‘big’ in size, often running into petabytes of information, has vast variety within its components, and is created, captured and analysed at an incredibly rapid velocity. All of this also makes big data difficult to handle using traditional technological tools and techniques.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This paper will attempt to perform a high-level literature review of the most commonly used technological tools and processes in the big data life cycle. The big data life cycle is a conceptual construct that can be used to study the various stages that typically occur in collecting, storing and analysing big data, along with the principles that can govern these processes. The big data life cycle consists of four components, which will also be the key structural points of the paper, namely: Data Acquisition, Data Awareness, Data Analytics &amp;amp; Data Governance.&lt;strong&gt;&lt;sup&gt;4&lt;/sup&gt; &lt;/strong&gt;The paper will focus on the aspects that the author believes are relevant for analysing the technological impact of big data on both technology itself and society at large.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Scope: &lt;/strong&gt;The scope of the paper is to study the technology used in big data using the "Life Cycle of Big Data" as model structure to categorise &amp;amp; study the vast range of technologies that are involved in big data. However, the paper will be limited to the study of technology related directly to the big data life cycle. It shall specifically exclude the use/utilisation of big data from its scope since big data is most often being fed into other, unrelated technologies for consumption leading to rather limitless possibilities.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Goal:&lt;/strong&gt; Goal of the paper is twofold: a.) to use the available literature on the technological aspects of big data, to perform a brief overview of the technology in the field and b.) to frame the relevant research questions for studying the technology of big data and its possible impact on society.&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;Data Acquisition&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;Acquiring big data has two main sub components to it, the first being sensing the existence of the data’ itself and the second, the stage of collecting and storing this data. Both of these subcomponents are incredibly diverse fields, with lots of rapid change occurring in the technology utilised to carry out these tasks. The section will provide a brief overview of the subcomponents and then discuss the technology used to fulfil the tasks.&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;Data Sensing&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;Data does not exist in a vacuum and is always created as a part of a larger process, especially in the aspect of modern technology. Therefore, the source of the data itself plays a vital role in determining how it can be captured and analysed in the larger scheme of things. Entities constantly emit information into the environment that can be utilised for the purposes of big data, leading to two main kinds of data: data that is “born digital” or “born analogue.”&lt;a name="_ftnref4" href="#_ftn4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Born Digital Data&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Information that is “born digital,” is created, by a user or by a digital system, specifically for use by a computer or data‐processing system. This is a vast range of information and newer fields are being added to this category on a daily basis. It includes, as a short, indicative list: email and text messaging, any form of digital input, including keyboards, mouse interactions and touch screens, GPS location data, data from daily home appliances (Internet of Things), etc. All of this data can be tracked and tagged to users as well as be aggregated to form a larger picture, massively increasing the scope of what may constitute the ‘data’ in big data.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Some indicative uses of how such born digital data is catalogued by technological solutions on the user side, prior to being sent for collection/storage are:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;a.) Cookies - There are small, often just text, files that are left on user devices by websites in order to that visit, task or action (for example, logging into an email account) with a subsequent event.&lt;a name="_ftnref5" href="#_ftn5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; (for example, revisiting the website)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;b.) Website Analytics&lt;a name="_ftnref6" href="#_ftn6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; - Various services, such as Google Analytics, Piwik, etc., can use JavaScript and other web development languages to record a very detailed, intimate track of a user's actions on a website, including how long a user hovers above a link, the time spent on the website/application and in some cases, even the time spent specific aspects of the page.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;c.) GPS&lt;a name="_ftnref7" href="#_ftn7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; - With the almost pervasive usage of smartphones with basic location capabilities, GPS sensors on these devices are used to provide regular, minute driven updates to applications, operating systems and even third parties about the user's location. Modern variations such as A-GPS can be used to provide basic positioning information even without satellite coverage, vastly expanding the indoor capabilities of location collection.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;All of these instances of sensing born digital data are common terms, used in daily parlance by billions of people from all over the world, which is a symbolic of just how deeply they have pervaded into our daily lifestyle. Apart from privacy &amp;amp; security concerns this in turn also leads to an exponential increase in the data available to collect for any interested party.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Sensor Data&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Information is said to be&amp;nbsp; “analogue” when it contains characteristics of the physical world, such as images, video, heartbeats, etc.&amp;nbsp; Such information becomes electronic when processed by a “sensor,” a device that can record physical phenomena and convert it into digital information. Some examples to better illustrate information that is born analogue but collected via digital means are:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;a.) Voice and/or video content on devices - Apart from phone calls and other forms communication, video and voice based interactions have started to regularly be captured to provide enhanced services. These include Google Now&lt;a name="_ftnref8" href="#_ftn8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, Cortana&lt;a name="_ftnref9" href="#_ftn9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and other digital assistants as well as voice guided navigation systems in cars, etc.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;b.) Personal health data such as heartbeats, blood pressure, respiration, velocity, etc. - This personal, potentially very powerful information is collected by dedicated sensors on devices such as Fitbit&lt;a name="_ftnref10" href="#_ftn10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, Mi Band&lt;a name="_ftnref11" href="#_ftn11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, etc. as well as by increasingly sophisticated smartphone applications such as Google Fit that can do so without any special device.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;c.) Camera on Home Appliances - Cameras and sensors on devices such as video game consoles (Kinect&lt;a name="_ftnref12" href="#_ftn12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; being a relevant example) can record detailed human interactions, which can be mined for vast amounts of information apart from carrying out the basic interactions with the devices itself.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;While not as vast a category as born digital data, the increasingly lower costs of technology and ubiquitous usage of digital, networked devices is leading to information that was traditionally analogue in nature to be captured for use at a rapidly increasing rate.&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;Data Collection &amp;amp; Storage&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;Traditional data was normally processed using the Extract, Transform, Load (ETL) methodology, which was used to collect the data from outside sources, modify the data to fit needs, and then upload the data into the data storage system for future use.&lt;a name="_ftnref13" href="#_ftn13"&gt;&lt;sup&gt;&lt;sup&gt;[13]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Technology such as spreadsheets, RDBMS databases, Structured Query Languages (SQL), etc. were all initially used to carry out these tasks, more often than not manually. &lt;a name="_ftnref14" href="#_ftn14"&gt;&lt;sup&gt;&lt;sup&gt;[14]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;However, for big data, the methodology traditionally followed is both inefficient and insufficient to meet the demands of modern use. Therefore, the Magnetic, Agile, Deep (MAD) process is used to collect and store data&lt;a name="_ftnref15" href="#_ftn15"&gt;&lt;sup&gt;&lt;sup&gt;[15]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;a name="_ftnref16" href="#_ftn16"&gt;&lt;sup&gt;&lt;sup&gt;[16]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;. The needs and benefits of such a system are: attracting all the data sources regardless of their quality (magnetic), logical and physical contents of storage systems adapting to the rapid data evolution in big data (agile) and complex algorithmic statistical analysis required of big data on a very short notice&lt;a name="_ftnref17" href="#_ftn17"&gt;&lt;sup&gt;&lt;sup&gt;[17]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;. (deep)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The technology used to perform data storage using the MAD process requires vast amount of processing power, which is very difficult to create in a single, physical space/unit for nonstate or research entities, who cannot afford supercomputers. Therefore, most solutions used in big data rely on two major components to store data: distributed systems and Massive Parallel Processing&lt;a name="_ftnref18" href="#_ftn18"&gt;&lt;sup&gt;&lt;sup&gt;[18]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; (MPP) that run on non-relational (in-memory) database systems. Database performance and reliability is traditionally gauged using pure performance metrics (FLOPS per second, etc.) as well as the Atomicity, consistency, isolation, durability (ACID) criteria.&lt;a name="_ftnref19" href="#_ftn19"&gt;&lt;sup&gt;&lt;sup&gt;[19]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The most commonly used database systems for big data applications are given below. The specific operational qualities and performance of each of these databases is beyond the scope of this review but the common criteria that makes them well suited for big data storage have been delineated below.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Non-relational databases&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Databases traditionally used to be structured entities that operated solely on the ability to correlate information stored in them using explicitly defined relationships. Even prior to the advent of big data, this outlook was turning out to be a limiting factor in how large amounts of stored information could be leveraged, this led to the evolution of non relational database systems. Before going into them in detail, a basic primer on their data transfer protocols will be helpful in understanding their operation.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;A protocol is a model that structures instructions in a particular manner so that it can be reproduced from one system to another&lt;a name="_ftnref20" href="#_ftn20"&gt;&lt;sup&gt;&lt;sup&gt;[20]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;a name="_ftnref21" href="#_ftn21"&gt;&lt;sup&gt;&lt;sup&gt;[21]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;. The protocols which govern technology in the case of big data have gone through many stages of evolution, starting off with simple HTML based systems&lt;a name="_ftnref22" href="#_ftn22"&gt;&lt;sup&gt;&lt;sup&gt;[22]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, which then evolved to XML driven SOAP systems&lt;a name="_ftnref23" href="#_ftn23"&gt;&lt;sup&gt;&lt;sup&gt;[23]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, which led to JavaScript Object Notation, or JSON&lt;a name="_ftnref24" href="#_ftn24"&gt;&lt;sup&gt;&lt;sup&gt;[24]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, the currently used form for in most big database systems. JSON is an open format used to transfer data objects, using human-readable text and is the basis for most of the commonly used non-relational database management systems. Examples of Non-relational databases also known as NoSQL databases, include MongoDB&lt;a name="_ftnref25" href="#_ftn25"&gt;&lt;sup&gt;&lt;sup&gt;[25]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, Couchbase&lt;a name="_ftnref26" href="#_ftn26"&gt;&lt;sup&gt;&lt;sup&gt;[26]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, etc. They were developed for both managing as well as storing unstructured data. They aim for scaling, flexibility, and simplified development. Such databases rather focus on the high-performance scalable data storage, and allow tasks to be written in the application layer instead of databases specific languages, allowing for greater interoperability.&lt;a name="_ftnref27" href="#_ftn27"&gt;&lt;sup&gt;&lt;sup&gt;[27]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;In-Memory Databases&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;In order to overcome performance limitation of traditional database systems, some modern databases now use in-memory databases. These systems manage the data in the RAM memory of the server, thus eliminating storage disk input/output. This allows for almost realtime responses from the database, in comparisons to minutes or hours required on traditional database systems. This improvement in the performance is so massive that, entirely new applications are being developed for using IMDB systems.&lt;a name="_ftnref28" href="#_ftn28"&gt;&lt;sup&gt;&lt;sup&gt;[28]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; These IMDB systems are also being used for advanced analytics on big data, especially to increase the access speed to data and increase the scoring rate of analytic models for analysis.&lt;a name="_ftnref29" href="#_ftn29"&gt;&lt;sup&gt;&lt;sup&gt;[29]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Examples of IMDB include VoltDB&lt;a name="_ftnref30" href="#_ftn30"&gt;&lt;sup&gt;&lt;sup&gt;[30]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, NuoDB&lt;a name="_ftnref31" href="#_ftn31"&gt;&lt;sup&gt;&lt;sup&gt;[31]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, SolidDB&lt;a name="_ftnref32" href="#_ftn32"&gt;&lt;sup&gt;&lt;sup&gt;[32]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and Apache Spark&lt;a name="_ftnref33" href="#_ftn33"&gt;&lt;sup&gt;&lt;sup&gt;[33]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;Hybrid Systems&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;These are the two major systems used to store data prior to it being processed or analysed in a big data application. However, the divide between data storage and data management is a slim one and most database systems also contain various unique attributes that cater them to specific kinds of analysis. (as can be seen from the IMDB example above) One example of a very commonly used Hybrid system that deals with storage as well as awareness of the data is Apache Hadoop&lt;sup&gt;33&lt;/sup&gt;, which is detailed below.&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;Apache Hadoop&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;Hadoop consists of two main components: the HDFS for the big data storage, and MapReduce for big data analytics, each of which will be detailed in their respective section.&lt;/p&gt;
&lt;ol style="text-align: justify;"&gt;
&lt;li&gt;The HDFS&lt;a name="_ftnref34" href="#_ftn34"&gt;&lt;sup&gt;&lt;sup&gt;[34]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;a name="_ftnref35" href="#_ftn35"&gt;&lt;sup&gt;&lt;sup&gt;[35]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; storage function in Hadoop provides a reliable distributed file system, stored across multiple systems for processing &amp;amp; redundancy reasons. The file system is optimized for large files, as single files are split into blocks and spread across systems known as cluster nodes.&lt;a name="_ftnref36" href="#_ftn36"&gt;&lt;sup&gt;&lt;sup&gt;[36]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Additionally, the data is protected among the nodes by a replication mechanism, which ensures availability even if any node fails. Further, there are two types of nodes: Data Nodes and Name Nodes.&lt;a name="_ftnref37" href="#_ftn37"&gt;&lt;sup&gt;&lt;sup&gt;[37]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Data is stored in the form of file blocks across the multiple Data Nodes while the Name Node acts as an intermediary between the client and the Data Node, where it directs the requesting client to the particular Data Node which contains the requested data.&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;This operating structure for storing data also has various variations within Hadoop such as HBase for key/value pair type queries (a NoSQL based system), Hive for relational type queries, etc. Hadoop’s redundancy, speed, ability to run on commodity hardware, industry support and rapid pace of development have led to it being almost co-equivalently associated with big data.&lt;a name="_ftnref38" href="#_ftn38"&gt;&lt;sup&gt;&lt;sup&gt;[38]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;Data Awareness&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;Data Awareness, in the context of big data, is the task of creating a scheme of relationships within a set of data, to allow different users of the data to determine a fluid yet valid context and utilise it for their desired tasks.&lt;a name="_ftnref39" href="#_ftn39"&gt;&lt;sup&gt;&lt;sup&gt;[39]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; It is a relatively new field, in which most of the work is currently being done on semantic structures to allow data to gain context in an interoperable format, in contrast to the current system where data is given context using unique, model specific constructs.&lt;a name="_ftnref40" href="#_ftn40"&gt;&lt;sup&gt;&lt;sup&gt;[40]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; (such as XML Schemes, etc.)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Some of the original work on this field was carried out in the form of utilising the Resource Description Framework (RDF), which was built primarily to allow describing of data in a portable manner, especially being agnostic towards platforms and systems for Semantic Web at the W3C. SPARQL is the language used to implement RDF based designs but both largely remain underutilised in both the public domain as well as big data. Authors such as Kurt&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Cagle&lt;a name="_ftnref41" href="#_ftn41"&gt;&lt;sup&gt;&lt;sup&gt;[41]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and Bob DuCharme&lt;a name="_ftnref42" href="#_ftn42"&gt;&lt;sup&gt;&lt;sup&gt;[42]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; predict its explosion in the next couple of years. Companies have also started realising the value of interoperable context, with Oracle Spatial&lt;a name="_ftnref43" href="#_ftn43"&gt;&lt;sup&gt;&lt;sup&gt;[43]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and IBM’s DB2&lt;a name="_ftnref44" href="#_ftn44"&gt;&lt;sup&gt;&lt;sup&gt;[44]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; already including RDF and SPARQL support in the past 3 years.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;While underutilised, the rapid developments taking place in the field will make the impact that data awareness may have on big data as big as Hadoop and maybe even SQL. Some aspects of it are already beginning to be used in Artificial Intelligence, Natural Language Processing, etc. with tremendous scope for development.&lt;a name="_ftnref45" href="#_ftn45"&gt;&lt;sup&gt;&lt;sup&gt;[45]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;Data Processing &amp;amp; Analytics&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;Data Processing largely has three primary goals: a. determines if the data collected is internally consistent; b. make the data meaningful to other systems or users using either metaphors or analogy they can understand; and (what many consider most importantly) provide predictions about future events and behaviours based upon past data and trends.&lt;a name="_ftnref46" href="#_ftn46"&gt;&lt;sup&gt;&lt;sup&gt;[46]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Being a very vast field with rapidly changing technologies governing its operation, this section will largely concentrate on the most commonly used technologies in data analytics.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Data analytics requires four primary conditions to be met in order to carry out effective processing: fast, data loading, fast query processing, efficient utilisation of storage and adaptivity to dynamic workload patterns. The analytical model most commonly associated with meeting this criteria and with big data in general is MapReduce, detailed below. There are other, more niche models and algorithms (such as Project Voldemort&lt;a name="_ftnref47" href="#_ftn47"&gt;&lt;sup&gt;&lt;sup&gt;[47]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; used by LinkedIn), which are used in big data but they are beyond the scope of the review, and more information about them can be read at article linked in the previous citation. (Reference architecture and classification of technologies, products and services for big data system)&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;MapReduce&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;MapReduce is a generic parallel programming concept, derived from the “Map” and “Reduce” of functional programming languages, which makes it particularly suited for big data operations. It is at the core of Hadoop&lt;a name="_ftnref48" href="#_ftn48"&gt;&lt;sup&gt;&lt;sup&gt;[48]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, and performs the data processing and analytics functions in other big data systems as well.&lt;a name="_ftnref49" href="#_ftn49"&gt;&lt;sup&gt;&lt;sup&gt;[49]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The fundamental premise of MapReduce is scaling out rather than scaling up, i.e., (adding more numerical resources, rather than increasing the power of a single system)&lt;a name="_ftnref50" href="#_ftn50"&gt;&lt;sup&gt;&lt;sup&gt;[50]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;MapReduce operates by breaking a task down into steps and executing the steps in parallel, across many systems. This comes with two advantages, a reduction in the time needed to finish the task and also a decrease in the amount of resources one has to expend to perform the task, in both power and energy. This model makes it ideally suited for the large data sets and quick response times required of big data operations generally.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The first step of a MapReduce job is to correlate the input values to a set of keys/value pairs as output. The “Map” function then partitions the processing tasks into smaller tasks, and assigns them to the appropriate key/value pairs.&lt;a name="_ftnref51" href="#_ftn51"&gt;&lt;sup&gt;&lt;sup&gt;[51]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; This allows unstructured data, such as plain text, to be mapped to a structured key/value pair. As an example, the key could be the punctuation in a sentence and the value of the pair could be the number of occurrences of the punctuation overall. This output of the Map function is then passed on “Reduce” function.&lt;a name="_ftnref52" href="#_ftn52"&gt;&lt;sup&gt;&lt;sup&gt;[52]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Reduce then collects and combines this output, using identical key/value pairs, to provide the final result of the task.&lt;a name="_ftnref53" href="#_ftn53"&gt;&lt;sup&gt;&lt;sup&gt;[53]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; These steps are carried using the Job Tracker &amp;amp; Task Tracker in Hadoop but different systems have different methodologies to carry out similar tasks.&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;Data Governance&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;Data Governance is the act of managing raw big data as well as the processed information that arises from big data in order to meet legal, regulatory and business imposed requirements. While there is no standardized format for data governance, there have been increasing call with various sectors (especially healthcare) to create such a format to ensure reliable, secure and consistent big data utilisation across the board. The following tactics and techniques have been utilised or suggested for data governance, with varying degrees of success:&lt;/p&gt;
&lt;ol style="text-align: justify;"&gt;
&lt;li&gt;&lt;strong&gt;Zero-knowledge systems&lt;/strong&gt;: This technological proposal maintains secrecy with respect to the low-level data while allowing encrypted data to be examined for certain higherlevel abstractions.&lt;a name="_ftnref54" href="#_ftn54"&gt;&lt;sup&gt;&lt;sup&gt;[54]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; For the system to be zero-knowledge, the client’s system will have to encrypt the data and send it to the storage provider. Due to this, the provider stores the data in the encrypted format and cannot decipher the same unless he/she is in possession of the key which will decrypt the data into plaintext. This allows the individual to store his data with a storage provider while also maintaining anonymity of the details contained in such information. However, these are currently just beginning to be used in simple situations. As of now, they are not expandable to unstructured and complex cases and have to be developed marginally before they can be used for research and data mining purposes.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Homomorphic encryption&lt;/strong&gt;: Homomorphic encryption is a privacy preserving technique which performs searches and other computations over data that is encrypted while also protecting the individual’s privacy.&lt;a name="_ftnref55" href="#_ftn55"&gt;&lt;sup&gt;&lt;sup&gt;[55]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; This technique has however been considered to be impractical and is deemed to be an unlikely policy alternative for near future purposes in the context of preserving privacy in the age of big data.&lt;a name="_ftnref56" href="#_ftn56"&gt;&lt;sup&gt;&lt;sup&gt;[56]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Multi-party computation&lt;/strong&gt;: In this technique, computation is done on encrypted distributed data stores.&lt;a name="_ftnref57" href="#_ftn57"&gt;&lt;sup&gt;&lt;sup&gt;[57]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; This mechanism is closely related to homomorphic encryption where individual data is kept private using encryption algorithms called “collusion-robust” while the same is used to calculate statistics.&lt;a name="_ftnref58" href="#_ftn58"&gt;&lt;sup&gt;&lt;sup&gt;[58]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The parties involved are aware of some private data and each of them use a protocol which produces results based on the information they are aware of and the information they are not aware of, without revealing the data they are not already aware of.&lt;a name="_ftnref59" href="#_ftn59"&gt;&lt;sup&gt;&lt;sup&gt;[59]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Multi-party computations thus help in generating useful data for statistical and research purposes without compromising the privacy of the individuals.&lt;/li&gt;&lt;/ol&gt;
&lt;ol style="text-align: justify;"&gt;
&lt;li&gt;&lt;strong&gt;Differential Privacy&lt;/strong&gt;: Although this technological development is related to encryption, it follows a different technique. Differential privacy aims at maximizing the precision of computations and database queries while reducing the identifiability of the data owners who have records in the database, usually through obfuscation of query results.&lt;a name="_ftnref60" href="#_ftn60"&gt;&lt;sup&gt;&lt;sup&gt;[60]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; This is widely applied today in the existence of big data in order to ensure preservation of privacy while trying to reap the benefits of large scale data collection.&lt;a name="_ftnref61" href="#_ftn61"&gt;&lt;sup&gt;&lt;sup&gt;[61]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Searchable encryption&lt;/strong&gt;: Through this mechanism, the data subject can make certain data searchable while minimizing exposure and maximizing privacy.&lt;a name="_ftnref62" href="#_ftn62"&gt;&lt;sup&gt;&lt;sup&gt;[62]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The data owner can make his information available through search engines by providing the data in an encrypted format but by adding tags consisting of certain keywords which can be deciphered by the search engine. This encrypted data shows up in the search results when searched with these particular keywords but can only be read when the person is in possession of the key which is required for decrypting the information.&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;This technique of encryption provides maximum security to the individual’s data and preserves privacy to the greatest possible extent.&lt;/p&gt;
&lt;ol style="text-align: justify;"&gt;
&lt;li&gt;&lt;strong&gt;K-anonymity&lt;/strong&gt;: The property of k-anonymity is being applied in the present day in order to preserve privacy and avoid re-identification.&lt;a name="_ftnref63" href="#_ftn63"&gt;&lt;sup&gt;&lt;sup&gt;[63]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; A certain data set is said to possess the property of k-anonymity if individual specific data can be released and used for various purposes without re-identification. The analysis of the data should be carried out without attributing the data to the individual to whom it belongs and should give scientific guarantees for the same.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Identity Management Systems&lt;/strong&gt;: These systems enable the individuals to establish and safeguard their identities, explain those identities with the help of attributes, follow the activity of their identities and also delete their identities if they wish to.&lt;a name="_ftnref64" href="#_ftn64"&gt;&lt;sup&gt;&lt;sup&gt;[64]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; It uses cryptographic schemes and protocols to make anonymous or pseudonymous the identities and credentials of the individuals before analysing the data.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Privacy Preserving Data Publishing&lt;/strong&gt;: This is a method in which the analysts are provided with the individual’s personal information with the ability to decipher particular information from the database while preventing the inference of certain other information which might lead to a breach of privacy.&lt;a name="_ftnref65" href="#_ftn65"&gt;&lt;sup&gt;&lt;sup&gt;[65]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Data which is essential for the analysis will be provided for processing while sensitive data will not be disclosed. This tool primarily focuses on microdata.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Privacy Preserving Data Mining&lt;/strong&gt;: This mechanism uses perturbation methods and randomization along with cryptography in order to permit data mining on a filtered version of the data which does not contain any form of sensitive information. PPDM focuses on data mining results unlike PPDP.&lt;a name="_ftnref66" href="#_ftn66"&gt;&lt;sup&gt;&lt;sup&gt;[66]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;/li&gt;&lt;/ol&gt;
&lt;h2 style="text-align: justify;"&gt;Conclusion&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;Studying the technology surrounding big data has led to two major observations: the rapid pace of development in the industry and the stark lack of industry standards or government regulations directed towards big data technologies. These observations have been the primary motivating factor for framing further research in the field. Understanding how to deal with big data technologically, rather than just the potential regulation of possible harms after the technological processes have been performed might be critical for the human rights dialogue as these processes become even more extensive, opaque and technologically complicated.&lt;/p&gt;
&lt;hr style="text-align: justify;" /&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn1" href="#_ftnref1"&gt;[1]&lt;/a&gt; EMC: Data Science and Big Data Analytics. In: EMC Education Services, pp. 1–508 (2012)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn2" href="#_ftnref2"&gt;[2]&lt;/a&gt; Bakshi, K.: Considerations for Big Data: Architecture and Approaches. In: Proceedings of the IEEE Aerospace Conference, pp. 1–7 (2012)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn3" href="#_ftnref3"&gt;[3]&lt;/a&gt; Adams, M.N.: Perspectives on Data Mining. International Journal of Market Research 52(1), 11–19 (2010) &lt;sup&gt;4&lt;/sup&gt; Elgendy, N.: Big Data Analytics in Support of the Decision Making Process. MSc Thesis, German University in Cairo, p. 164 (2013)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn4" href="#_ftnref4"&gt;[4]&lt;/a&gt; Big Data and Privacy: A Technological Perspective - President’s &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Council of Advisors on Science and&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Technology (May 2014)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn5" href="#_ftnref5"&gt;[5]&lt;/a&gt; Chen, Hsinchun, Roger HL Chiang, and Veda C. Storey. "Business Intelligence and Analytics: From Big Data to Big Impact." MIS quarterly 36.4 (2012): 1165-1188.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn6" href="#_ftnref6"&gt;[6]&lt;/a&gt; Chandramouli, Badrish, Jonathan Goldstein, and Songyun Duan. "Temporal analytics on big data for web advertising." 2012 IEEE 28th international conference on data engineering. IEEE, 2012.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn7" href="#_ftnref7"&gt;[7]&lt;/a&gt; Laurila, Juha K., et al. "The mobile data challenge: Big data for mobile computing research." Pervasive Computing. No. EPFL-CONF-192489. 2012.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn8" href="#_ftnref8"&gt;[8]&lt;/a&gt; Lazer, David, et al. "The parable of Google flu: traps in big data analysis." &lt;em&gt;Science&lt;/em&gt; 343.6176 (2014): 12031205.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn9" href="#_ftnref9"&gt;[9]&lt;/a&gt; &lt;em&gt;ibid&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn10" href="#_ftnref10"&gt;[10]&lt;/a&gt; Banaee, Hadi, Mobyen Uddin Ahmed, and Amy Loutfi. "Data mining for wearable sensors in health monitoring systems: a review of recent trends and challenges." &lt;em&gt;Sensors&lt;/em&gt; 13.12 (2013): 17472-17500.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn11" href="#_ftnref11"&gt;[11]&lt;/a&gt; &lt;em&gt;ibid&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn12" href="#_ftnref12"&gt;[12]&lt;/a&gt; Chung, Eric S., John D. Davis, and Jaewon Lee. "Linqits: Big data on little clients." &lt;em&gt;ACM SIGARCH Computer Architecture News&lt;/em&gt;. Vol. 41. No. 3. ACM, 2013.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn13" href="#_ftnref13"&gt;[13]&lt;/a&gt; Kornelson, Kevin Paul, et al. "Method and system for developing extract transform load systems for data warehouses." U.S. Patent No. 7,139,779. 21 Nov. 2006.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn14" href="#_ftnref14"&gt;[14]&lt;/a&gt; Henry, Scott, et al. "Engineering trade study: extract, transform, load tools for data migration." &lt;em&gt;2005 IEEE Design Symposium, Systems and Information Engineering&lt;/em&gt;. IEEE, 2005.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn15" href="#_ftnref15"&gt;[15]&lt;/a&gt; Cohen, Jeffrey, et al. "MAD skills: new analysis practices for big data." &lt;em&gt;Proceedings of the VLDB Endowment&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn16" href="#_ftnref16"&gt;[16]&lt;/a&gt; .2 (2009): 1481-1492.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn17" href="#_ftnref17"&gt;[17]&lt;/a&gt; Elgendy, Nada, and Ahmed Elragal. "Big data analytics: a literature review paper." &lt;em&gt;Industrial Conference on Data Mining&lt;/em&gt;. Springer International Publishing, 2014.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn18" href="#_ftnref18"&gt;[18]&lt;/a&gt; Wu, Xindong, et al. "Data mining with big data." &lt;em&gt;IEEE transactions on knowledge and data engineering&lt;/em&gt; 26.1 (2014): 97-107.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn19" href="#_ftnref19"&gt;[19]&lt;/a&gt; Supra Note 17&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn20" href="#_ftnref20"&gt;[20]&lt;/a&gt; Hu, Han, et al. "Toward scalable systems for big data analytics: A technology tutorial." &lt;em&gt;IEEE Access&lt;/em&gt; 2 (2014):&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn21" href="#_ftnref21"&gt;[21]&lt;/a&gt; -687.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn22" href="#_ftnref22"&gt;[22]&lt;/a&gt; Kurt Cagle, Understanding the Big Data Lifecycle - LinkedIn Pulse (2015)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn23" href="#_ftnref23"&gt;[23]&lt;/a&gt; Coyle, Frank P. &lt;em&gt;XML, Web services, and the data revolution&lt;/em&gt;. Addison-Wesley Longman Publishing Co., Inc., 2002.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn24" href="#_ftnref24"&gt;[24]&lt;/a&gt; Pautasso, Cesare, Olaf Zimmermann, and Frank Leymann. "Restful web services vs. big'web services: making the right architectural decision." &lt;em&gt;Proceedings of the 17th international conference on World Wide Web&lt;/em&gt;. ACM, 2008.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn25" href="#_ftnref25"&gt;[25]&lt;/a&gt; Banker, Kyle. &lt;em&gt;MongoDB in action&lt;/em&gt;. Manning Publications Co., 2011&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn26" href="#_ftnref26"&gt;[26]&lt;/a&gt; McCreary, Dan, and Ann Kelly. "Making sense of NoSQL." &lt;em&gt;Shelter Island: Manning&lt;/em&gt; (2014): 19-20.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn27" href="#_ftnref27"&gt;[27]&lt;/a&gt; &lt;em&gt;ibid&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn28" href="#_ftnref28"&gt;[28]&lt;/a&gt; Zhang, Hao, et al. "In-memory big data management and processing: A survey." &lt;em&gt;IEEE Transactions on Knowledge and Data Engineering&lt;/em&gt; 27.7 (2015): 1920-1948.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn29" href="#_ftnref29"&gt;[29]&lt;/a&gt; &lt;em&gt;ibid&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn30" href="#_ftnref30"&gt;[30]&lt;/a&gt; &lt;em&gt;ibid&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn31" href="#_ftnref31"&gt;[31]&lt;/a&gt; Supra Note 20&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn32" href="#_ftnref32"&gt;[32]&lt;/a&gt; Ballard, Chuck, et al. &lt;em&gt;IBM solidDB: Delivering Data with Extreme Speed&lt;/em&gt;. IBM Redbooks, 2011.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn33" href="#_ftnref33"&gt;[33]&lt;/a&gt; Shanahan, James G., and Laing Dai. "Large scale distributed data science using apache spark." &lt;em&gt;Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining&lt;/em&gt;. ACM, 2015. &lt;sup&gt;33&lt;/sup&gt; Shvachko, Konstantin, et al. "The hadoop distributed file system." &lt;em&gt;2010 IEEE 26th symposium on mass storage systems and technologies (MSST)&lt;/em&gt;. IEEE, 2010.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn34" href="#_ftnref34"&gt;[34]&lt;/a&gt; Borthakur, Dhruba. "The hadoop distributed file system: Architecture and design." &lt;em&gt;Hadoop Project Website&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn35" href="#_ftnref35"&gt;[35]&lt;/a&gt; .2007 (2007): 21.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn36" href="#_ftnref36"&gt;[36]&lt;/a&gt; &lt;em&gt;ibid&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn37" href="#_ftnref37"&gt;[37]&lt;/a&gt; &lt;em&gt;ibid&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn38" href="#_ftnref38"&gt;[38]&lt;/a&gt; Zikopoulos, Paul, and Chris Eaton. &lt;em&gt;Understanding big data: Analytics for enterprise class hadoop and streaming data&lt;/em&gt;. McGraw-Hill Osborne Media, 2011.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn39" href="#_ftnref39"&gt;[39]&lt;/a&gt; Bizer, Christian, et al. "The meaningful use of big data: four perspectives--four challenges." &lt;em&gt;ACM SIGMOD Record&lt;/em&gt; 40.4 (2012): 56-60.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn40" href="#_ftnref40"&gt;[40]&lt;/a&gt; Kaisler, Stephen, et al. "Big data: issues and challenges moving forward." &lt;em&gt;System Sciences (HICSS), 2013 46th Hawaii International Conference on&lt;/em&gt;. IEEE, 2013.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn41" href="#_ftnref41"&gt;[41]&lt;/a&gt; Supra Note 21&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn42" href="#_ftnref42"&gt;[42]&lt;/a&gt; DuCharme, Bob. "What Do RDF and SPARQL bring to Big Data Projects?." &lt;em&gt;Big Data&lt;/em&gt; 1.1 (2013): 38-41.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn43" href="#_ftnref43"&gt;[43]&lt;/a&gt; Zhong, Yunqin, et al. "Towards parallel spatial query processing for big spatial data." &lt;em&gt;Parallel and &lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Distributed Processing Symposium Workshops &amp;amp; PhD Forum (IPDPSW), 2012 IEEE 26th International&lt;/em&gt;. IEEE, 2012.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn44" href="#_ftnref44"&gt;[44]&lt;/a&gt; Ma, Li, et al. "Effective and efficient semantic web data management over DB2." &lt;em&gt;Proceedings of the 2008 ACM SIGMOD international conference on Management of data&lt;/em&gt;. ACM, 2008.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn45" href="#_ftnref45"&gt;[45]&lt;/a&gt; Lohr, Steve. "The age of big data." &lt;em&gt;New York Times&lt;/em&gt; 11 (2012).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn46" href="#_ftnref46"&gt;[46]&lt;/a&gt; Pääkkönen, Pekka, and Daniel Pakkala. "Reference architecture and classification of technologies, products and services for big data systems." &lt;em&gt;Big Data Research&lt;/em&gt; 2.4 (2015): 166-186.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn47" href="#_ftnref47"&gt;[47]&lt;/a&gt; Sumbaly, Roshan, et al. "Serving large-scale batch computed data with project voldemort." &lt;em&gt;Proceedings of the 10th USENIX conference on File and Storage Technologies&lt;/em&gt;. USENIX Association, 2012.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn48" href="#_ftnref48"&gt;[48]&lt;/a&gt; Bar-Sinai, Michael. "Big Data Technology Literature Review." &lt;em&gt;arXiv preprint arXiv:1506.08978&lt;/em&gt; (2015).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn49" href="#_ftnref49"&gt;[49]&lt;/a&gt; ibid&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn50" href="#_ftnref50"&gt;[50]&lt;/a&gt; Condie, Tyson, et al. "MapReduce Online." &lt;em&gt;Nsdi&lt;/em&gt;. Vol. 10. No. 4. 2010.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn51" href="#_ftnref51"&gt;[51]&lt;/a&gt; Supra Note 47&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn52" href="#_ftnref52"&gt;[52]&lt;/a&gt; Dean, Jeffrey, and Sanjay Ghemawat. "MapReduce: a flexible data processing tool." &lt;em&gt;Communications of the ACM&lt;/em&gt; 53.1 (2010): 72-77.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn53" href="#_ftnref53"&gt;[53]&lt;/a&gt; ibid&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn54" href="#_ftnref54"&gt;[54]&lt;/a&gt; Big Data &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; and &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Privacy: &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; A &amp;nbsp;&amp;nbsp; Technological Perspective, &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; White &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; House,&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;https://www.whitehouse.gov/sites/default/files/microsites/ostp/PCAST/pcast_big_data_and_privacy__may_2014&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn55" href="#_ftnref55"&gt;[55]&lt;/a&gt; Tene, Omer, and Jules Polonetsky. "Big data for all: Privacy and user control in the age of analytics." &lt;em&gt;Nw. J. Tech. &amp;amp; Intell. Prop.&lt;/em&gt; 11 (2012): xxvii.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn56" href="#_ftnref56"&gt;[56]&lt;/a&gt; Big Data &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; and &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Privacy: &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; A &amp;nbsp;&amp;nbsp; Technological Perspective, &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; White &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; House,&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;https://www.whitehouse.gov/sites/default/files/microsites/ostp/PCAST/pcast_big_data_and_privacy__may_2014&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn57" href="#_ftnref57"&gt;[57]&lt;/a&gt; Privacy by design in big data, ENISA&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn58" href="#_ftnref58"&gt;[58]&lt;/a&gt; Big Data &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; and &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Privacy: &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; A &amp;nbsp;&amp;nbsp; Technological Perspective, &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; White &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; House,&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;https://www.whitehouse.gov/sites/default/files/microsites/ostp/PCAST/pcast_big_data_and_privacy__may_2014&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn59" href="#_ftnref59"&gt;[59]&lt;/a&gt; Id&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn60" href="#_ftnref60"&gt;[60]&lt;/a&gt; Id&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn61" href="#_ftnref61"&gt;[61]&lt;/a&gt; Tene, Omer, and Jules Polonetsky. "Privacy in the age of big data: a time for big decisions." &lt;em&gt;Stanford Law Review Online&lt;/em&gt; 64 (2012): 63.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn62" href="#_ftnref62"&gt;[62]&lt;/a&gt; Lane, Julia, et al., eds. &lt;em&gt;Privacy, big data, and the public good: Frameworks for engagement&lt;/em&gt;. Cambridge University Press, 2014.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn63" href="#_ftnref63"&gt;[63]&lt;/a&gt; Crawford, Kate, and Jason Schultz. "Big data and due process: Toward a framework to redress predictive privacy harms." &lt;em&gt;BCL Rev.&lt;/em&gt; 55 (2014): 93.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn64" href="#_ftnref64"&gt;[64]&lt;/a&gt; http://homes.esat.kuleuven.be/~sguerses/papers/DanezisGuersesSurveillancePets2010.pdf&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn65" href="#_ftnref65"&gt;[65]&lt;/a&gt; Seda Gurses and George Danezis, A critical review of 10 years of privacy technology, August 12th 2010, http://homes.esat.kuleuven.be/~sguerses/papers/DanezisGuersesSurveillancePets2010.pdf&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn66" href="#_ftnref66"&gt;[66]&lt;/a&gt; Id&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/technology-behind-big-data'&gt;http://editors.cis-india.org/internet-governance/blog/technology-behind-big-data&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Geethanjali Jujjavarapu and Udbhav Tiwari</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2016-12-04T09:53:43Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/sc-judgment-in-shreya-singhal-what-it-means-for-intermediary-liability">
    <title>The Supreme Court Judgment in Shreya Singhal and What It Does for Intermediary Liability in India?</title>
    <link>http://editors.cis-india.org/internet-governance/blog/sc-judgment-in-shreya-singhal-what-it-means-for-intermediary-liability</link>
    <description>
        &lt;b&gt;Even as free speech advocates and users celebrate the Supreme Court of India's landmark judgment striking down Section 66A of the Information Technology Act of 2000, news that the Central government has begun work on drafting a new provision to replace the said section of the Act has been trickling in.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The SC judgement in upholding the constitutionality of Section  69A (procedure for blocking websites) and in reading down Section 79 (exemption from liability of intermediaries) of the IT Act, raises crucial questions regarding transparency, accountability and under what circumstances may reasonable restrictions be placed on free speech on the Internet. While discussions and analysis of S. 66A continue, in this post I will focus on the aspect of the judgment related to intermediary liability that could benefit from further clarification from the apex court and in doing so, will briefly touch upon S. 69A and secret blocking.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Conditions qualifying intermediary for exemption and obligations not related to exemption&lt;/h3&gt;
&lt;p align="JUSTIFY"&gt;The intermediary liability regime in India is defined under S. 79 and assosciated rules that were introduced to protect intermediaries for liability from user generated content and ensure the Internet continues to evolve as a &lt;i&gt;“marketplace of ideas”&lt;/i&gt;. But as intermediaries may not have sufficient legal competence or resources to deliberate on the legality of an expression, they may end up erring on the side of caution and takedown lawful expression. As a study by Centre for Internet and Society (CIS) in 2012 revealed, the criteria, procedure and safeguards for administration of the takedowns as prescribed by the rules lead to a chilling effect on online free expression.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;S. 69A grants powers to the Central Government to &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;i&gt;&lt;span&gt;“issue directions for blocking of public access to any information through any computer resource”.&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; The 2009 &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;rules &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;allow the blocking of websites by a court order, &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;and &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;sets in place a review committee to review the decision to block websites &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;a&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;s also establishes &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;penalt&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;ies &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;for the intermediary &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;that fails to extend cooperation in this respect. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;There are two key aspects of both these provisions that must be noted:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;a) S. 79 is an exemption provision that qualifies the intermediary for conditional immunity, as long as they fulfil the conditions of the section. The judgement notes this distinction, adding that “&lt;i&gt;being an exemption provision, it is closely related to provisions which provide for offences including S. 69A.”&lt;/i&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;b) S. 69A does not contribute to immunity for the intermediary rather places additional obligations on the intermediary and as the judgement notes &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;i&gt;&lt;span&gt;“intermediary who finally fails to comply with the directions issued who is punishable under sub-section (3) of 69A.”&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; The provision though outside of the conditional immunity liability regime enacted through S. 79  contributes to the restriction of access to, or removing content online by placing liability on intermediaries to block unlawful third party content or information that is being generated, transmitted, received, stored or hosted by them. Therefore restriction requests must fall within the contours outlined in Article 19(2) and include principles of natural justice and elements of due process.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h3 align="JUSTIFY"&gt;Subjective Determination of Knowledge&lt;/h3&gt;
&lt;p align="JUSTIFY"&gt;The provisions for exemption laid down in S. 79 do not apply when they receive &lt;i&gt;“actual knowledge” &lt;/i&gt;of illegal content under section 79(3)(b). Prior to the court's verdict actual knowledge could have been interpreted to mean the intermediary is called upon its own judgement under sub-rule (4) to restrict impugned content in order to seek exemption from liability. Removing the need for intermediaries to take on an adjudicatory role and deciding on which content to restrict or takedown, the SC has read down &lt;i&gt;“actual knowledge”&lt;/i&gt; to mean that there has to be a court order directing the intermediary to expeditiously remove or disable access to content online. The court also read down &lt;i&gt;“upon obtaining knowledge by itself”&lt;/i&gt; and &lt;i&gt;“brought to actual knowledge”&lt;/i&gt; under Rule 3(4) in the same manner as 79(3)(b).&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Under S.79(3)(b) the intermediary must comply with the orders from the executive in order to qualify for immunity. Further, S. 79 (3)(b) goes beyond the specific categories of restriction identified in Article 19(2) by including the term &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;i&gt;&lt;span&gt;“unlawful acts”&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; and places the executive in an adjudicatory role of determining the illegality of content. The government cannot emulate private regulation as it is bound by the Constitution and the court addresses this issue by applying the limitation of 19(2) on unlawful acts, &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;i&gt;&lt;span&gt;“the court order and/or the notification by the appropriate government or its agency must strictly conform to the subject matters  aid down in Article 19(2).”&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;By reading down of S. 79 (3) (b) the court has addressed the issue of  intermediaries &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;complying with tak&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;edown requests from non-government entities and &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;has &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;made government notifications and court orders to be consistent with reasonable restrictions in Article 19(2). This is an important clarification from the court, because this places limits on the private censorship of intermediaries and the invisible censorship of opaque government takedown requests as they must &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;and should &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;adhere, to &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;the &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;boundaries set by Article 19(2).&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Procedural Safeguards&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;The SC does not touch upon other parts of the rules and in not doing so, has left significant procedural issues open for debate. It is relevant to bear in mind and as established above, S. 69A blocking and restriction requirements for the intermediary are part of their additional obligations and do not qualify them for immunity. The court ruled in favour of upholding S. 69A as constitutional on the basis that blocking orders are issued when the executive has sufficiently established that it is absolutely necessary to do so, and that the necessity is relatable to only some subjects set out in Article 19(2). Further the court notes that reasons for the blocking orders must be recorded in writing so that they may be challenged through writ petitions. The court also goes on to specify that under S. 69A the intermediary and the 'originator' if identified, have the right to be heard before the committee decides to issue the blocking order. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Under S. 79 the intermediary must also comply with government restriction orders and the procedure for notice and takedown is not sufficiently transparent and lacks procedural safeguards that have been included in the notice and takedown procedures under S. 69. For example, there is no requirement for committee to evaluate the necessity of issuing the restriction order, though the ruling does clarify that these restriction notices must be within the confines of Article 19(2). The judgement could have gone further to directing the government to state their entire cause of action and provide reasonable level of proof (prima facie). It should have also addressed issues such as the government using extra-judicial measures to restrict content including collateral pressures to force changes in terms of service, to promote or enforce so-called "voluntary" practices. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Accountability&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;The judgement could also have delved deeper into issues of accountability such as the need to consider 'udi alteram partem' by providing the owner of the information or the intermediary a hearing prior to issuing the restriction or blocking order nor is an post-facto review or appeal mechanism made available except for the recourse of writ petition. Procedural uncertainty around wrongly restricted content remains, including what limitations should be placed on the length, duration and geographical scope of the restriction. The court also does not address the issue of providing a recourse for the third party provider of information to have the removed information restored or put-back remains unclear. Relatedly, the court also does not clarify the concerns related to frivolous requests by establishing penalties nor is there a codified recourse under the rules presently, for the intermediary to claim damages even if it can be established that the takedown process is being abused.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Transparency&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;The bench in para 113 in addressing S. 79 notes that the intermediary in addition to publishing rules and regulations, privacy policy and user agreement for access or usage of their service has to also inform users of the due diligence requirements including content restriction policy under rule 3(2). However,  the court ought to have noted the differentiation between different categories of intermediaries which may require different terms of use. Rather than stressing a standard terms of use as a procedural safeguard, the court should have insisted on establishing terms of use and content restriction obligations that is proportional to the role of the intermediary and based on the liability accrued in providing the service, including the impact of the restriction by the intermediary both on access and free speech. By placing requirement of disclosure or transparency on the intermediary including what has been restricted under the intermediary's own terms of service, the judgment could have gone a step further than merely informing users of their rights in using the service as it stands presently,  to ensuring that users can review and have knowledge of what information has been restricted and why. The judgment also does not touch upon broader issues of intermediary liability such as proactive filtering sought by government and private parties, an important consideration given the recent developments around the right to be forgotten in Europe and around issues of defamation and pornography in India. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;The judgment, while a welcome one in the direction of ensuring the Internet remains a democratic space where free speech thrives, could benefit from the application of the recently launched Manila principles developed by CIS and others. The Manila Principles is a framework of baseline safeguards and best practices that should be considered by policymakers and intermediaries when developing, adopting, and reviewing legislation, policies and practices that govern the liability of intermediaries for third-party content. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;The court's ruling is truly worth celebrating, in terms of the tone it sets on how we think of free speech and the contours of censorship that exist in the digital space. But the real impact of this judgment lies in the debates and discussions which it will throw open about content removal practices that involve intermediaries making determinations on requests received, or those which only respond to the interests of the party requesting removal. As the Manila Principles highlight a balance between public and private interests can be obtained through a mechanism where power is distributed between the parties involved, and where an impartial, independent, and accountable oversight mechanism exists. &lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/sc-judgment-in-shreya-singhal-what-it-means-for-intermediary-liability'&gt;http://editors.cis-india.org/internet-governance/blog/sc-judgment-in-shreya-singhal-what-it-means-for-intermediary-liability&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jyoti</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Chilling Effect</dc:subject>
    

   <dc:date>2015-04-17T23:59:34Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/telecom/blog/organizing-india-blogspot-october-11-2012-shyam-ponappa-the-supreme-court-delivers">
    <title>The Supreme Court Delivers </title>
    <link>http://editors.cis-india.org/telecom/blog/organizing-india-blogspot-october-11-2012-shyam-ponappa-the-supreme-court-delivers</link>
    <description>
        &lt;b&gt;Now, the spectrum and licence issues need resolution. On September 27, 2012, the Supreme Court of India delivered the opinion of a bench comprising five Judges on the Presidential Reference regarding the auction of 2G spectrum.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Published in &lt;a class="external-link" href="http://organizing-india.blogspot.in/2012/10/the-supreme-court-delivers.html"&gt;Organizing India Blogspot&lt;/a&gt; on October 11, 2012 and in &lt;a class="external-link" href="http://www.business-standard.com/india/news/shyam-ponappasupreme-court-delivers/488420/"&gt;Business Standard&lt;/a&gt; on October 4, 2012.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Supreme Court’s opinion on the Presidential reference&lt;a href="#fn*" name="fr*"&gt;[*]&lt;/a&gt;dismissed two preposterous claims. One is that it is beyond the ambit of Parliament and the government to formulate economic policies. The second is that the government must allocate resources only through auctions. It’s like the end of a self-destructive nightmare. True, our heedless kleptocracy as a society of rogue politicians, bureaucrats, defence personnel, and complicit citizens, led to this pass. Even so, the anarchic “destructionism” of these claims is as reprehensible as the kleptocracy they seek to tear down. Fortunately, the Supreme Court opinion rose above the populist clamour.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There’s still a mess to clear. The big picture is that the Supreme Court left its decision on spectrum auctions unaddressed. In matters of detail, some points need resolution based on facts. These are discussed below to dispel prevalent myths.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Myth 1: Auctions maximise govt revenues&lt;/h3&gt;
&lt;p&gt;"Auctions may be the best way of maximising revenue…": paragraph 116 of the opinion. This contravenes the evidence after the National Telecom Policy -99, that revenue-sharing maximises government revenues as well as public benefits. It also ignores the many auction failures.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Consider the evidence: auction revenues foregone were estimated at under Rs 20,000 crore for 1999-2007, because the sector was mired in losses and was unable to provide services effectively or pay those dues. By comparison, actual collections from revenue-sharing by March 2007 were more than double, at Rs 40,000 crore. Collections by March 2010 were Rs 80,000 crore. Current annual contributions to government revenues may be about Rs 18,000 crore on Adjusted Gross Revenues estimated at Rs 1,40,000 crore, plus taxes, amounting to perhaps Rs 36,000 crore.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Re public benefits, access to telephony grew from a few million users in 1999 to about 700 million today (excluding around 250 million shadow subscriptions).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An ameliorating caveat in paragraph 12 states: "…if the State arrives at the conclusion … that maximum revenue would be earned by auction of the natural resource in question, then that alone would be the process", and this is expanded in paragraph 119:&lt;br /&gt;&lt;br /&gt;"Where revenue maximisation is not the object of a policy of distribution, the question of auction would not arise. Revenue considerations may assume secondary consideration to developmental considerations."&lt;br /&gt;&lt;br /&gt;This has not prevented erroneous conclusions in the press that auctions are the only valid process, notwithstanding that the conditions stipulated in the order, eg, that government’s actions be “fair, reasonable, non-discriminatory”, were always operative, if not adhered to in instances of abuse, as in the 2G scam.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Myth 2: Maximum govt collections are in the public interest&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Government collections as the public interest criterion may work for colonial powers extorting revenues from subject states, or possibly for utopias whose political economy is so balanced that such cross-subsidisation works. Developing economies like India presumably can and should seek the welfare of their people. The same populists crusading for maximum government collections accuse governments of corruption and waste. This doesn’t provide a coherent approach to infrastructure, where each capital-intensive sector is configured to deliver a specific service. For instance, the energy sector has to deliver power, while telecommunications must deliver communications services. Neither can be expected to deliver toilets or water. Yet, many well-intentioned people seem to nurture such irrational expectations.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The spectrum and broadband link&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The first prerequisite for broadband is high-speed connectivity. The second is reasonably priced services. Our objectives are, therefore: (a) a broadband network, (b) available anywhere (c) at reasonable prices. Our networks are deficient, however, particularly in rural and semi-urban areas. A host of factors are responsible, ranging from limited public sector network rollout, combined with a private sector focus on the most lucrative urban centres, with incentives skewed to voice telephony. Applications need connectivity based on networks that require spectrum.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Problems and solutions&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Consider an application like distance education. The need is for networks and services of high quality (followed by the additional requirement of content). What is apparent is that such applications cannot be effective without the connectivity. So we’re back to the need for networks, of fibre where feasible, and wireless elsewhere. This brings us back to the need for spectrum.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Reviewing facts&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;As regards the facts relating to the 2G judgment deserving review:&lt;br /&gt;The solution the Supreme Court has not considered is that operators need only to use spectrum, for which they can be charged a fee. The evidence of widely available Wi-fi shows that innovation and usage thrive if spectrum is available. The Supreme Court, the government, and the public need to recognise that allocating spectrum to operators is only one way to use spectrum.&lt;br /&gt;&lt;br /&gt;There need be no alienation of spectrum at all, if policies allow open access and charge fees. Then, spectrum could be used like any infrastructure network, eg, airports, highways, or rail, on payment of usage charges. The sharing could be in at least two ways. Operators could pool spectrum for collective use. For this, (i) regulations must allow pooling/active facilities sharing, and (ii) operators must agree on terms and procedures. Another way is for mandatory spectrum sharing using the database-driven systems being implemented in the US by Spectrum Bridge and Telcordia. Similar deployments are planned in the UK, the European Union, and in Singapore. The TV white space is shared because this range is available for sharing, and not because other bands cannot be shared.&lt;br /&gt;&lt;br /&gt;There are immense societal costs of duplication in capital investments in multiple networks, including the last-mile spectrum access, of operators using dedicated networks with limited passive facilities sharing (such as towers), compared with the benefits of open-access to common networks, if policies changed. These would employ active facilities sharing (equipment, and not just construction) to reduce capital equipment, construction costs, energy for towers, carbon emissions from a more limited physical network, possibly reduced radiation from a rationalised network with small cells with lower-powered equipment, and the multiplier effect on the finite available spectrum.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Enormous productivity benefits could accrue through ICT applications in infrastructure such as smart grids for energy, transportation, education, healthcare, and government services, as well as many commercial applications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Supreme Court could also uphold contractual obligations, by discriminating against actual transgressors in the 2G spectrum allocation, while rehabilitating those who operated within the law.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a href="#fr*" name="fn*"&gt;*&lt;/a&gt;].&lt;a class="external-link" href="http://supremecourtofindia.nic.in/outtoday/op27092012.pdf"&gt;http://supremecourtofindia.nic.in/outtoday/op27092012.pdf&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/telecom/blog/organizing-india-blogspot-october-11-2012-shyam-ponappa-the-supreme-court-delivers'&gt;http://editors.cis-india.org/telecom/blog/organizing-india-blogspot-october-11-2012-shyam-ponappa-the-supreme-court-delivers&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Shyam Ponappa</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    

   <dc:date>2012-12-21T09:57:57Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/a2k/blogs/the-sti-policy-proposes-a-transformative-open-access-approach-for-india">
    <title>The STI Policy Proposes a Transformative Open Access Approach for India</title>
    <link>http://editors.cis-india.org/a2k/blogs/the-sti-policy-proposes-a-transformative-open-access-approach-for-india</link>
    <description>
        &lt;b&gt;Anubha Sinha explains what the draft national Science, Technology and Innovation policy means for open access to scientific literature for Indians. This article was first published in The Wire Science on January 21, 2021.&lt;/b&gt;
        
&lt;p&gt;Indians may soon be able to read scientific papers for free.&lt;/p&gt;
&lt;p&gt;Reading scientific papers is currently an expensive affair. Many 
scientific journals charge a couple of hundred dollars for a single 
article. Under a proposed ‘One Nation, One Subscription’ plan of India’s
 fifth (draft) Science, Technology and Innovation (&lt;a href="https://dst.gov.in/draft-5th-national-science-technology-and-innovation-policy-public-consultation"&gt;STI&lt;/a&gt;)
 Policy, the government will negotiate with journal publishers to enable
 access for everyone. The policy also suggests that research produced in
 Indian publicly funded institutions be made freely accessible to 
everyone, at the time of publication.&lt;/p&gt;
&lt;p&gt;These proposals are a big shift in how we learn and do science, as a country. The previous edition of the policy (&lt;a href="https://icar.org.in/files/sti-policy-eng-07-01-2013.pdf"&gt;2013&lt;/a&gt;)
 did not even recognise affordability or availability of scientific 
literature as problems. While ‘One Nation, One Subscription’ could 
alleviate this issue partly, its success will depend largely on how 
negotiations with publishers materialise. The approach is uncommon: it 
has been tried in two countries, with limited success, as I &lt;a href="https://science.thewire.in/the-sciences/india-research-publishing-open-access-one-nation-one-subscription-k-vijayraghavan/"&gt;discussed here&lt;/a&gt;, in an analysis of the idea’s feasibility.&lt;/p&gt;
&lt;p&gt;While it is crucial for people to be able to access locked-in research, 
it is equally important to address the practices that prevent research 
from being openly accessible in the first place.&lt;/p&gt;
&lt;p&gt;The STI policy prescribes a green open access (OA) approach to ensure 
that research output and data produced with public funds are immediately
 accessible to the people – as opposed to taxpayers funding the research
 and paying again to access the results. Under green OA, researchers 
will be obligated to place their publications and data in online 
repositories, without any restrictions on how the output may be used.&lt;/p&gt;
&lt;p&gt;Individual research and funding agencies, such as the Departments of 
Science &amp;amp; Technology and of Biotechnology, the Indian Council of 
Agricultural Research and the Wellcome Trust adopted green OA a while 
ago. A national STI policy stands to provide an extra impetus to adopt 
and enforce it.&lt;/p&gt;
&lt;p&gt;These promising shifts come at a time when the biggest research publishers have launched a &lt;a href="https://science.thewire.in/the-sciences/academic-publishing-access-elsevier-sci-hub-alexandra-elbakyan-libgen-copyright-claims-delhi-high-court/"&gt;copyright infringement lawsuit&lt;/a&gt;
 in India to block Sci-Hub and LibGen on the Indian web. Sci-Hub and 
LibGen host copyrighted and paywalled research articles and ebooks. 
Anyone can download this material for free from their servers. As such, 
these ‘shadow libraries’ serve a vital function for everyone, and the 
Delhi high court &lt;a href="https://spicyip.com/2021/01/issues-in-scihub-case-a-matter-of-public-importance.html"&gt;has already deemed&lt;/a&gt;
 this litigation to be one of public importance. The Indian scientific 
research community will be intervening as well. While the case will 
proceed at its own pace, it would definitely be in the public interest 
for the STI policy to implement green OA as a mandatory requirement.&lt;/p&gt;
&lt;p&gt;It is also notable that the policymaking process was a &lt;a href="https://science.thewire.in/the-sciences/sti-policy-2020-dst-psa-ease-of-doing-research"&gt;collaborative effort&lt;/a&gt;
 by academics, scientists and policymakers. There were multiple thematic
 consultative rounds with stakeholders. It has been heartening to see 
the results of a democratic consultation reflected in our national open 
access approach.&lt;/p&gt;
&lt;div&gt;However, as is the case with high-level policies, bringing meaningful
 implementation often requires more operational and committed work at 
all levels. It would be a shame to not capitalise on the direction and 
vision of OA as described in the policy.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;p&gt;Access this article on The Wire Science &lt;a class="external-link" href="https://science.thewire.in/the-sciences/the-sti-policy-proposes-a-transformative-open-access-approach-for-india/"&gt;here&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/a2k/blogs/the-sti-policy-proposes-a-transformative-open-access-approach-for-india'&gt;http://editors.cis-india.org/a2k/blogs/the-sti-policy-proposes-a-transformative-open-access-approach-for-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sinha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Access</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2021-04-28T17:22:43Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/the-state-of-secure-messaging">
    <title>The State of Secure Messaging</title>
    <link>http://editors.cis-india.org/internet-governance/blog/the-state-of-secure-messaging</link>
    <description>
        &lt;b&gt;A look at the protections provided by and threats posed to secure communication online.&lt;/b&gt;
        
&lt;p&gt;&lt;em&gt;This blogpost was edited by Gurshabad Grover and Amber Sinha.&lt;/em&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;The current benchmark for secure communication online is 
end-to-end encrypted messaging. It refers to a method of encryption 
wherein the contents of a message are only readable by the devices of 
the individuals, or endpoints, participating in the communication. All 
other Internet intermediaries such as internet service providers, 
internet exchange points, undersea cable operators, data centre 
operators, and even the messaging service providers themselves cannot 
read them. This is achieved through cryptographic &lt;a href="https://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange"&gt;mechanisms&lt;/a&gt;
 that allow independent devices to establish a shared secret key over an
 insecure communication channel, which they then use to encrypt and 
decrypt messages. Common examples of end-to-end encrypted messaging are 
applications like Signal and WhatsApp.&lt;/p&gt;
&lt;p dir="ltr"&gt;This post attempts to give at-risk individuals, concerned 
citizens, and civil society at large a more nuanced understanding of the
 protections provided and threats posed to the security and privacy of 
their communications online.&lt;/p&gt;
&lt;h4 dir="ltr"&gt;Threat Model&lt;/h4&gt;
&lt;p dir="ltr"&gt;The first step to assessing security and privacy is to 
identify and understand actors and risks. End-to-end encrypted messaging
 applications consider the following threat model:&lt;/p&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Device compromise: Can happen physically through loss or 
theft, or remotely. Access to an individual’s device could be gained 
through technical flaws or coercion (&lt;a href="https://www.eff.org/wp/digital-privacy-us-border-2017"&gt;legal&lt;/a&gt;, or &lt;a href="https://xkcd.com/538/"&gt;otherwise&lt;/a&gt;). It can be temporary or be made persistent by installing &lt;a href="https://citizenlab.ca/2019/10/nso-q-cyber-technologies-100-new-abuse-cases/"&gt;malware&lt;/a&gt; on the device.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Network monitoring and interference: Implies access to data
 in transit over a network. All Internet intermediaries have such 
access. They may either actively interfere with the communication or 
passively &lt;a href="https://www.theatlantic.com/international/archive/2013/07/the-creepy-long-standing-practice-of-undersea-cable-tapping/277855/"&gt;observe&lt;/a&gt; traffic.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Server compromise: Implies access to the web server hosting
 the application. This could be achieved through technical flaws, 
insider access such as an employee, or through coercion (&lt;a href="https://en.wikipedia.org/wiki/Investigatory_Powers_Act_2016"&gt;legal&lt;/a&gt;, or otherwise).&amp;nbsp;&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p dir="ltr"&gt;End-to-end encrypted messaging aims to offer complete 
message confidentiality and integrity in the face of server and network 
compromise, and some protections against device compromise. These are 
detailed below.&lt;/p&gt;
&lt;h4 dir="ltr"&gt;Protections Provided&lt;/h4&gt;
&lt;p dir="ltr"&gt;Secure messaging services guarantee certain properties. For
 mature services that have received adequate study from researchers, we 
can assume them to be sound, barring implementation flaws which are 
described later.&lt;/p&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Confidentiality: The contents of a message are kept private and the ciphers used are &lt;a href="https://pthree.org/2016/06/19/the-physics-of-brute-force/"&gt;practically&lt;/a&gt; unbreakable by adversaries.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Integrity: The contents of a message cannot be modified in transit.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Deniability: Aims to mimic unrecorded real-world 
conversations where an individual can deny having said something. 
Someone in possession of the chat transcript cannot &lt;em&gt;cryptographically&lt;/em&gt;
 prove that an individual authored a particular message. While some 
applications feature such off-the-record messaging capabilities, the 
legal applicability of such mechanisms is &lt;a href="https://debian-administration.org/users/dkg/weblog/104"&gt;debatable&lt;/a&gt;.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Forward and Future Secrecy: These properties aim to limit 
the effects of a temporary compromise of credentials on a device. 
Forward secrecy ensures messages collected over the network, which were 
sent before the compromise, cannot be decrypted. Future secrecy ensures 
messages sent post-compromise are protected. These mechanisms are easily
 circumvented in practice as past messages are usually stored on the 
device being compromised, and future messages can be obtained by gaining
 persistent access during compromise. These properties are meant to 
protect individuals &lt;a href="https://hal.inria.fr/hal-01966560/document"&gt;aware&lt;/a&gt; of these limitations in exceptional situations such as a journalist crossing a border.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;h4 dir="ltr"&gt;Shortcomings&lt;/h4&gt;
&lt;p dir="ltr"&gt;While secure messaging services offer useful protections 
they also have some shortcomings. It is useful to understand these and 
their mitigations to minimise risk.&lt;/p&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Metadata: Information about a communication such as &lt;strong&gt;who&lt;/strong&gt; the participants are, &lt;strong&gt;when&lt;/strong&gt; the messages are sent, &lt;strong&gt;where&lt;/strong&gt; the participants are located, and &lt;strong&gt;what&lt;/strong&gt;
 the size of a message is can offer important contextual information 
about a conversation. While some popular messaging services &lt;a href="https://signal.org/blog/sealed-sender/"&gt;attempt&lt;/a&gt;
 to minimize metadata generation, metadata leakage, in general, is still
 considered an open problem because such information can be gleaned by 
network monitoring as well as from server compromise. Application 
policies around whether such data is stored and for how long it is 
retained can improve privacy. There are also &lt;a href="https://ricochet.im/"&gt;experimental&lt;/a&gt; approaches that use techniques like onion routing to hide metadata.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Authentication: This is the process of asserting whether an
 individual sending or receiving a message is who they are thought to 
be. Current messaging services trust application servers and cell 
service providers for authentication, which means that they have the 
ability to replace and impersonate individuals in conversations. 
Messaging services offer advanced features to mitigate this risk, such 
as notifications when a participant’s identity changes, and manual 
verification of participants’ security keys through other communication 
channels (in-person, mail, etc.).&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Availability: An individual’s access to a messaging service
 can be impeded. Intermediaries may delay or drop messages resulting in 
what is called a denial of service attack. While messaging services are 
quite resilient to such attacks, governments may censor or completely 
shut down Internet access.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Application-level gaps: Capabilities offered by services in
 addition to messaging, such as contact discovery, online status, and 
location sharing are often &lt;a href="https://www.forbes.com/sites/thomasbrewster/2017/01/22/whatsapp-facebook-backdoor-government-data-request/"&gt;not covered&lt;/a&gt;
 by end-to-end encryption and may be stored by the application server. 
Application policies around how such information is gathered and 
retained affect privacy.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Implementation flaws and backdoors: Software or hardware 
flaws (accidental or intentional) on an individual’s device could be 
exploited to circumvent the protections provided by end-to-end 
encryption. For mature applications and platforms, accidental flaws are 
difficult and &lt;a href="https://arstechnica.com/information-technology/2019/09/for-the-first-time-ever-android-0days-cost-more-than-ios-exploits/"&gt;expensive&lt;/a&gt; to exploit, and as such are only accessible to Government or other 
powerful actors who typically use them to surveil individuals of 
interest (and not for mass surveillance). Intentional flaws or backdoors
 introduced by manufacturers may also be present. The only defence 
against these is security researchers who rely on manual inspection to 
examine software and network interactions to detect them.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;h4 dir="ltr"&gt;Messaging Protocols and Standards&lt;/h4&gt;
&lt;p dir="ltr"&gt;In the face of demands for exceptional access to encrypted 
communication from governments, and risks of mass surveillance from both
 governments and corporations, end-to-end encryption is important to 
enable secure and private communication online. The signal protocol, 
which is open and adopted by popular applications like WhatsApp and 
Signal, is considered a success story as it brought end-to-end 
encryption to over a billion users and has become a de-facto standard.&lt;/p&gt;
&lt;p dir="ltr"&gt;However, it is unilaterally developed and controlled by a single organisation. Messaging Layer Security (or &lt;a href="https://datatracker.ietf.org/wg/mls/about/"&gt;MLS&lt;/a&gt;)
 is a working group within the Internet Engineering Task Force (IETF) 
that is attempting to standardise end-to-end encryption through 
participation of individuals from corporations, academia, and civil 
society. The draft protocol offers the standard security properties 
mentioned above, except for deniability which is still being considered.
 It incorporates novel research that allows it to scale efficiently for 
large groups up to thousands of participants, which is an improvement 
over the signal protocol. MLS aims to increase adoption further by 
creating open standards and implementations, similar to the Transport 
Layer Security (TLS) protocol used to encrypt much of the web today. 
There is also a need to look beyond end-to-end encryption to address its
 shortcomings, particularly around authentication and metadata leakage.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/the-state-of-secure-messaging'&gt;http://editors.cis-india.org/internet-governance/blog/the-state-of-secure-messaging&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>divyank</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Encryption</dc:subject>
    
    
        <dc:subject>IETF</dc:subject>
    

   <dc:date>2020-07-17T08:12:15Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/india-together-june-26-2013-snehashish-ghosh-the-state-is-snooping-can-you-escape">
    <title>The State is Snooping: Can You Escape?</title>
    <link>http://editors.cis-india.org/internet-governance/blog/india-together-june-26-2013-snehashish-ghosh-the-state-is-snooping-can-you-escape</link>
    <description>
        &lt;b&gt;Blanket surveillance of the kind envisaged by India's Centralized Monitoring System achieves little, but blatantly violates the citizen's right to privacy; Snehashish Ghosh explores why it may be dangerous and looks at potential safeguards against such intrusion. &lt;/b&gt;
        &lt;p&gt;&lt;span style="text-align: justify; "&gt;The Snowden Leaks have made it amply clear that the covert surveillance conducted by governments is no longer covert. Information by its very nature is prone to leaks. The discretion lies completely in the hands of the personnel handling your data or information. Whether it is through knowledge obtained by an intelligence analyst about the US Government conducting indiscriminate surveillance, or hackers infiltrating a secure system and leaking personal information, stored information has a tendency to come out in the open sooner or later.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="text-align: justify; "&gt;This raises the question whether, with the advancement of technologies, we should trust our personal information and data with computers. Should we have more stringent laws and procedural safeguards to protect our personal information? Of course, the broader question that remains is whether we have a ‘Right to be Forgotten’.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Similar to PRISM in the US, India is also implementing a Centralized Monitoring System (CMS) which would have the capabilities to conduct multiple privacy-intrusive activities, ranging from call data record analysis to location based monitoring. Given the circumstances and the current revelations by a whistleblower in the US, it is more than imperative to take a closer look at the surveillance technologies which are being deployed by India and question what implications it might have in the future.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Technological shift and procedural safeguards&lt;br /&gt;&lt;/strong&gt;The need for procedural safeguards was brought to light in the Supreme Court case, when news reports surfaced about the tapping of politicians' phones by the CBI. The Court while deciding on the issue of phone tapping in the case of &lt;i&gt;People’s Union of Civil Liberties v. Union of India&lt;/i&gt; (1996), observed that the Indian Telegraph Act, 1885 is an ancient legislation and does not address the issue of telephone tapping. Thereafter, the court issued guidelines, which were implemented by the Government by amending and inserting Rule 419A of the Indian Telegraph Rules, 1951. These procedural safeguards ensure that due process will be followed by any law enforcement agency, while conducting surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section 5(2) of the Indian Telegraph Act, 1885 grants the power to the Government to conduct surveillance provided that there is an occurrence of any public emergency or public safety. If and only if the conditions of public safety and public emergency are compromised, and if the concerned authority is convinced that it is expedient to issue such an order for interception in the interest of “the sovereignty and integrity of India, the security of the State, friendly relations with foreign States or public order or for preventing incitement to the commission of an offence” is surveillance legitimized. The same was reaffirmed by the Supreme Court in the 1996 judgment on wire tapping.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Now, as the Government of India is planning to launch a new technology, the Centralized Monitoring System (CMS) which would snoop, track and monitor communication data flowing through telecom and data networks, the question arises: can we have procedural safeguards which would protect our right to privacy against technologies such as the CMS?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The key component of a procedural safeguard is human discretion; either a court authorization or an order from a high ranking government official is necessary to conduct targeted surveillance and the reasons for conducting surveillance have to be recorded in writing. This is the procedure which is ordinarily followed by law enforcement agencies before conducting any form of surveillance. However, with the computational turn, governments have resorted to practices which would do away with the human discretion. Dragnet surveillance allows for blanket surveillance. Before getting to the problems in evolving a due process for systems like CMS, it is imperative to examine the capabilities of the system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Centralized Monitoring System and death of due process&lt;/strong&gt; &lt;br /&gt;Setting up of a CMS was conceptualized in India after the 2008 Mumbai attacks. It was further consolidated and found a place in the Report of the Telecom Working Group on the Telecom Sector for the Twelfth Five Year Plan (2012-2017). The Report was published in August, 2011 and goes into the details of the CMS.&lt;/p&gt;
&lt;blockquote class="pullquote" style="text-align: justify; "&gt;When machines and robots are deployed to conduct blanket surveillance and impinge on the most fundamental right to life and liberty, and also violate the basic tenets of due process, then much cannot be done by way of procedures. What then do we resort to, is the primary question. Can there be a compromise between the right to privacy and security? &lt;br /&gt;&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;The Report indicates that the technology will cater to “the requirements of security management for law enforcement agencies for interception, monitoring, data analysis/mining, antiâ€socialâ€networking using the country’s telecom infrastructure for unlawful activities.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The CMS will also be capable of running algorithms for interception of connection oriented networks, algorithms for interception of voice over internet protocol (VoIP), video over IP and GPS based monitoring systems. These algorithms would be able to intercept any communication without any intervention from the telecom or internet service provider. It would also have the capability to intercept and analyze data on any communication network as well as to conduct location based monitoring by tracking GPS locations. Given such capabilities, it is clear that a computer system will be sifting through the internet/communication data and will conduct surveillance as instructed through algorithms. This would include identifying patterns, profiling and also storing data for posterity. Moreover, the CMS will have direct access to the telecommunication infrastructure and would be monitoring all forms of communication.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With the introduction of CMS, state surveillance will shift to blanket surveillance from the current practice of targeted surveillance which can be carried out under specific circumstances that are well defined in the law and in judgments. Moreover, when it comes to current means of surveillance, there are well-defined procedures under the law which have the ability to prevent misuse of the surveillance systems. This is not to say that the current procedural safeguards under the laws are not prone to abuse, but if implemented properly, there is less chance of them being misused. Furthermore, with strong privacy and data protection laws, unlawful and illegal surveillance can be minimized.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the current legal framework, with respect to surveillance, if CMS is implemented then it will be in violation of the fundamental right to privacy and freedom of speech as guaranteed under our Constitution. It will be also in contravention of the procedural safeguards laid down in the Supreme Court judgement and the Rule 419A of Indian Telegraph Rules, thereof. Strong privacy laws and data protection laws may be put in place, which are completely absent now. But at the end of the day, a machine will be spying on every citizen of India or anyone using any communication services, without any specific targets or suspects.&lt;br /&gt;&lt;br /&gt;In the People’s Union of Civil Liberties v. Union of India (1996), the Supreme Court laid down that “the substantive law as laid down in Section 5(2) of the [Indian Telegraph Act, 1885] must have procedural backing so that the exercise of power is fair and reasonable.” But with technologies such as CMS, it will be very difficult to have any form of procedural backing because the system would do away with human discretion which happens to be a key ingredient of any legal procedure.&lt;br /&gt;&lt;br /&gt;The argument which can be made in favour of CMS, if any, is that a machine will be going through personal data and it will not be available to any personnel or law enforcement agency without authorization and therefore, it will adhere to the due process. However, such a system will be keeping track of all personal information. Right to privacy is the right to be left alone and any incursion on this fundamental right can only be allowed in special cases, in cases of public emergency or threat of public safety. So, electronic blanket surveillance without human intervention also amounts to violation of the substantive law, which specifically allows surveillance only to be conducted under certain conditions, and not through a system such as CMS that is designed to keep a constant watch on everyone, irrespective of the fact whether there is a need to do so.&lt;br /&gt;&lt;br /&gt;Additionally, there exists a strong, pre-established notion that whatever comes out of a computer is bound to be true and authentic and there cannot be any mistakes. We have witnessed this in the past where an IT professional from Bangalore was arrested and detained by the Maharashtra Police for posting derogatory content on Orkut about Shivaji. Later, it was found that the records acquired from the Internet Service Provider were incorrect and the individual had been arrested and detained illegally.&lt;br /&gt;&lt;br /&gt;Telephone bills, credit card bills coming out from a computer system are often held to be authentic and error-free. With UID, our identity has been reduced to a number and biometrics stored in a database corresponding to that number. It is this trust in anything which comes out of a computer or a machine that can lead to massive abuse of the system in the absence of any form of checks and balance in place. Artificial things taking control over human lives and our almost unflinching trust in technology will not only cause gross violations of privacy but will also be the death of due process and basic human rights as we know it.&lt;br /&gt;&lt;br /&gt;In this regard, due emphasis should be given to the landmark Supreme Court judgment in the case of Maneka Gandhi v. Union of India (1978) which deals with issues related to due process and privacy. It states that "procedure which deals with the modalities of regulating, restricting or even rejecting a fundamental right falling within Article 21 has to be fair, not foolish, carefully designed to effectuate, not to subvert, the substantive right itself. Thus, understood, ‘procedure’ must rule out anything arbitrary, freakish or bizarre. A valuable constitutional right can be canalised only by canalised processes".&lt;br /&gt;&lt;br /&gt;When machines and robots are deployed to conduct blanket surveillance and impinge on the most fundamental right to life and liberty and also violate the basic tenets of due process, then much cannot be done by way of procedures. What then do we resort to, is the primary question. Can there be a compromise between the right to privacy and security?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;A no-win situation&lt;br /&gt;&lt;/strong&gt;In reality, dragnet surveillance or blanket surveillance is not very useful for gathering valuable intelligence to prevent instances of threat to national security, public safety and public emergency. For example, if the CMS is used to mine data, analyse content related to anti-social activities and even if the system is 99 per cent accurate, the remaining 1 per cent which is a false positive happens to be a large set. So, 1 out of every 100 individuals identified as an anti-social element by CMS may actually be an innocent citizen. Given the possibility of false positives and which may be more than 1 per cent, the number of innocent citizens caught in the terrorist net would be much higher.&lt;br /&gt;&lt;br /&gt;Even though blanket surveillance or dragnet surveillance can keep a tab on everyone, it is nearly impossible for an algorithm to separate the terrorists from the rest. Moreover, the data set collected by the machine is too big for any human analyst, to actually analyze and identify the terrorist in the midst of a deluge of information. Therefore, the argument that a system like CMS will ensure security in lieu of minor intrusions of privacy is a flawed one. Implementation of CMS will not really ensure security but will be a case of blatant violation of individual’s right to privacy anyway.&lt;br /&gt;&lt;br /&gt;What is perhaps more shocking is that not only will CMS be futile in preventing security breaches or neutralizing security threats, it will on the contrary expose individual Indian citizens to breach of personal security. If personal data and information are stored for future reference through a centralized mechanism, which is also the case with UID, it will be highly susceptible to attacks and security threats. It will be a Pandora’s Box with a potential to create havoc the moment someone is able to gain access to the information with intention to misuse that. Leaking of personal information and data on a large scale can be detrimental to society and give rise to instances of public emergency.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;The ‘Right to be Forgotten’&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;div id="stcpDiv"&gt;
&lt;p align="justify"&gt;Currently,   the European Union is engulfed in the debate on the “Right to be  Forgotten”  laws. The Right to be Forgotten finds its origins in the  French Law &lt;i&gt;le droit Ã  l’oubli &lt;/i&gt;or the right of  oblivion, where  a convict who has served his sentence can object to the  publication of  facts of his conviction and imprisonment or penalty. This law  has a  new found meaning in the context of social media and the internet, where   we have the right to delete all our personal information permanently.  This is  an important issue which India should debate and discuss, as we  live in an era  where privacy comes at a cost.&lt;/p&gt;
&lt;p align="justify"&gt;On  the one hand, technology has made it easier to  track, trace, monitor and snoop,  on the other it has also seen  innovation in the field of encryption and  anonymity tools. Encryption  tools such as Open PGP exist online, which can  secure information from  third party access. Tor Browser, allows an user to surf  the web  anonymously. The use of such technologies should be encouraged as there   is no law which prohibits their use. If systems are being built to spy  on us,  it will be better if we use technologies which protect our  personal information  from such surveillance technologies.&lt;/p&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/india-together-june-26-2013-snehashish-ghosh-the-state-is-snooping-can-you-escape'&gt;http://editors.cis-india.org/internet-governance/blog/india-together-june-26-2013-snehashish-ghosh-the-state-is-snooping-can-you-escape&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>snehashish</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-04-29T15:09:18Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/spies-we-trust">
    <title>The Spies We Trust: Third Party Service Providers and Law Enforcement Surveillance</title>
    <link>http://editors.cis-india.org/internet-governance/spies-we-trust</link>
    <description>
        &lt;b&gt;Christopher Soghoian's dissertation was submitted to the faculty of the Graduate School in partial fulfillment of the requirements for the degree "Doctor of Philosophy" in the School of Informatics, Department of Computer Science, Indiana University
&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/spies-we-trust'&gt;http://editors.cis-india.org/internet-governance/spies-we-trust&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2012-07-31T04:47:48Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/events/lecture-tour-by-sagie-chetty">
    <title>The South African Telecommunications Sector: Poised for Change</title>
    <link>http://editors.cis-india.org/events/lecture-tour-by-sagie-chetty</link>
    <description>
        &lt;b&gt;CIS in collaboration with the LINK Centre, Graduate School of Public and Development Management,
University of the Witwatersrand, South Africa and in association with different institutions across India is organizing a Lecture Tour by Sagie Chetty from 19th Oct to 30th Oct.&lt;/b&gt;
        
&lt;p&gt;CIS in collaboration with the LINK Centre, Graduate School of Public and Development Management, University of the Witwatersrand, South Africa and in association with different&amp;nbsp;institutions across India is organizing a Lecture Tour on: &lt;br /&gt;“The South African Telecommunications Sector: Poised for Change” By Sagie Chetty, Senior Manager, Eskom, South Africa. &lt;br /&gt;It will be our pleasure to have you join us for the talks.&lt;/p&gt;
&lt;p&gt;The Co-hosts, Dates and the Venues for the Talk are given below –&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Co-Host: Indian Institute of Technology, Madras&lt;br /&gt;Date: 19th October, 2009 at 3.30pm&lt;br /&gt;Venue – IIT-M, Chennai&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;Co-Host: Indian Institute of Technology, Bombay&lt;br /&gt;Date: 20th October, 2009 at 4.00pm&lt;br /&gt;Venue – IIT-B, Mumbai&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;Co-Host: International Institute of Information Technology, Bangalore&lt;br /&gt;Date: 23rd October, 2009 at 4.00pm&lt;br /&gt;Venue – IIIT-B, Bangalore&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;Co-Host: Indira Gandhi National Open University, Delhi&lt;br /&gt;Date: 26th October, 2009 at 3.00pm&lt;br /&gt;Venue – IGNOU, Delhi&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;Co-Host: National Institute of Science Technology and Development Studies, Delhi&lt;br /&gt;Date: 27th October, 2009 at 3.00pm&lt;br /&gt;Venue – NISTADS, Delhi&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;Co-Host: CCMG - Jamia Millia Islamia, New Delhi&lt;br /&gt;Date: 29th October, 2009 at 2.00pm&lt;br /&gt;Venue – CCMG - Jamia Millia Islamia, New Delhi&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;About the Speaker:&lt;/h3&gt;
&lt;p&gt;Sagie Chetty is a Senior Manager in Eskom, South Africa’s largest electricity utility. Sagie spent the first part of his career at Eskom as Information Manager in the Generation Division. In that time he was responsible for information systems strategy development and implementation. Some of the key projects he has been involved in are the implementation of SAP Plant Maintenance, Business Intelligence systems and other bespoke Information Systems for Generation Power Stations.&lt;/p&gt;
&lt;p&gt;&lt;img src="http://editors.cis-india.org/home-images/Sagie%20Chetty..jpg/image_preview" alt="Sagie Chetty" class="image-inline" title="Sagie Chetty" /&gt;&lt;/p&gt;
&lt;h3&gt;Abstract of the Lecture: The South African Telecommunications Sector: Poised for Change&lt;/h3&gt;
&lt;p&gt;With a gross domestic product of over $506 billion (PPP, 2008) South Africa is one of the leading economies on the African continent. Only Nigeria with a GDP of $328 billion and Egypt with a GDP of $453 billion currently rival the South African economy. The economy is strong in manufacturing and agriculture, but is still based significantly on mining of gold, diamonds, platinum, coal and iron ore. Its main trading partner is the European Union. Bilateral trade with India amounts to $6, 2 billion (2008) with the balance of trade in South Africa’s favour to the value of about $1 billion.&lt;br /&gt;Although one of the leading economies in Africa, South Africa’s Information and Communications (ICT) sector has not shown the concomitant level of development that reflects its economic position in Africa. ICT usage – telephony and Internet – has historically been low, and electronic transactions are utilised largely by business.&amp;nbsp; There are a number of reasons for this; however the high cost of telecommunications is certainly a contributing factor. The high cost is attributed largely to policy and regulatory failure in the telecommunications sector. The sector is characterized by powerful incumbent telecoms operators that thwart competition and further entrench their dominant market positions. The consequence is that the high telecommunications costs impact access, affordability and the cost of doing business for the region.&lt;br /&gt;Recent developments in the telecommunications sector, however could spell the end to high costs if policy and regulatory actions do not hinder competition. South African consumers can in the very near future look forward to lower telecommunications prices with the laying of new undersea cables, a new national backbone to compete with the existing one, new satellite ventures to provide the backhaul between cellular and broadband towers, a landmark court decision allowing value added network service providers (VANS) to build their own networks and the imminent entry of the incumbent telecommunications fixed line operator into the mobile arena. It is an opportune time for policy makers and regulators to take bold steps to free up the sector and open it up for true competition.&lt;br /&gt;Lines that historically demarcated fixed, mobile, voice, data are blurring, causing shifts in market structures. However, currently the market is structured around the incumbent Telkom for fixed lines services and Vodacom and MTN for mobile services. A second PSTN, Neotel has been licensed but is only offering limited services. A third mobile operator, Cell C is operating but has yet to gain any significant market share. &lt;br /&gt;&lt;br /&gt;The talk is open to all and there are no registration or entry fees. &lt;br /&gt;Please let us know if you require any further details.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
VIDEOS

&lt;iframe src="http://blip.tv/play/AYLRmR8A.html" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;&lt;embed type="application/x-shockwave-flash" src="http://a.blip.tv/api.swf#AYLRmR8A" style="display:none"&gt;&lt;/embed&gt;


        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/events/lecture-tour-by-sagie-chetty'&gt;http://editors.cis-india.org/events/lecture-tour-by-sagie-chetty&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>radha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Telecom</dc:subject>
    

   <dc:date>2011-10-21T09:59:51Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/what-will-be-the-role-of-ict-in-indias-judical-reform-process">
    <title>The Role of ICT in Judicial Reform- An Exploration</title>
    <link>http://editors.cis-india.org/internet-governance/blog/what-will-be-the-role-of-ict-in-indias-judical-reform-process</link>
    <description>
        &lt;b&gt;A seminar held this month by the Communications and Manufacturing Association of India (CMAI) explored the role that information and communication technology can assume in the process of India's judicial reform efforts.  The broad consensus among panelists was that “law is not keeping pace with technology”.  However, whether technology will be harnessed to actually facilitate much needed transparency and access to the justice system, or be simply used to improve efficiency within the judicial branch still remains unclear.&lt;/b&gt;
        
&lt;p&gt;	The Indian
judiciary is facing mounting pressures to reform its apparatus.  Even the judiciary itself has come
to recognize, &lt;a class="external-link" href="http://lawcommissionofindia.nic.in/reports/report230.pdf"&gt;on the books&lt;/a&gt;, that change is long overdue.&lt;a class="sdfootnoteanc" name="sdfootnote1anc" href="#sdfootnote1sym"&gt;&lt;/a&gt;
Some &lt;a class="external-link" href="http://www.judicialreforms.org/files/PRS%20study%20on%20pendency%202009.pdf"&gt;estimates&lt;/a&gt; have it that it would require almost three years to clear the current backlog of cases in High Courts&lt;a class="sdfootnoteanc" name="sdfootnote2anc" href="#sdfootnote2sym"&gt;&lt;/a&gt;.
 While technocrats herald that the enormous backlog of cases may
eventually be the death knell for India's judicial branch, reform
efforts must go beyond achieving the speedier delivery of justice
and work towards tackling other inadequacies of the system if “access to
justice for all”(1) is to become a reality.&lt;/p&gt;
&lt;p&gt;	The rural penetration of courts in
India is extremely low, which significantly limits access to justice for
the many citizens living far beyond the district courts of city
centers.  An extremely low
judge to population ratio in India only contributes further to the
already high incidence of pending cases, making delays in justice a
regular occurrence.  Mr. P.K. Malhotra from the Department of Legal
Affairs has noted that increased
litigation within the government has also caused a stark increase in
the number of pending cases&lt;a class="sdfootnoteanc" name="sdfootnote3anc" href="#sdfootnote3sym"&gt;&lt;/a&gt;.
 While the need for reform can be demonstrated quite clearly on a
practical level, the right to information (RTI) movement has also
provided further impetus for reform on a more fundamental level. Well organized citizens are now &lt;a class="external-link" href="http://www.judicialreforms.org/"&gt;demanding
the right&lt;/a&gt; to a more transparent and accountable judiciary.&lt;/p&gt;
&lt;p&gt;	As e-government initiatives continue
to transform the nature of
India's bureaucracy and enhance the quality of government
services, there is a mood of great optimism that ICT will also come
to play a central role in judicial reform efforts.  Speakers at the
seminar enthusiastically cited innovative practices such as
Singapore's “paperless court” which makes a compelling case for
automation.&amp;nbsp; Notable success in implementing
ICT in the judiciary have also been achieved in Canada,
Australia, and in several countries across Latin America.  This is
not to say, however, that the appropriation of ICT
is uniform in every case.  Variables such as political will and
context, institutional capacity and reform goals all
play a role in shaping the outcome.&amp;nbsp; Plans
could, for example, take more of an operational approach by
prioritizing the improved efficiency and the rationalization of
resources by implementing electronic case
management systems.  Other strategies may be designed and implemented from an access
perspective, seeking to restore faith in the justice system by
increasing transparency and accountability.  This could be done, for
example, by installing video technology in court rooms, or publishing legal
information online.&lt;/p&gt;
&lt;p&gt;	At
the seminar, India's consortium of well-organized and highly
ambitious
technocrats were not shy in suggesting the many ways ICT may be used
to transform the judicial system, and, additionally, the many ways
such an endeavor provides the IT sector with “new opportunities”.&amp;nbsp; Dr M. Veerappa Moily, Union Minister for Law and
Justice, has proposed for India a centrally funded and administered National
Judicial Technology Program.&amp;nbsp; Such a program aims to use ICT in the courtrooms to free the legal system of  “historical inefficiencies".&amp;nbsp; It
is of no doubt that ICT can reduce the
duplicity of the paper world and make courts more green through
electronic case filing and video conferencing.  Online case filing
systems can increase speed in which citizens can have their cases heard, and real time access to
online repositories of legal information drastically expedites
the case cycle.&lt;/p&gt;
&lt;p&gt;	Mr. C P Gurnani, CEO of Tech Mahindra
made the bold assertion that with ICT, India's 300  year case backlog
can be reduced to three years, in a span of only three years (2). Features of this newly envisioned e-justice system
include the use of video hearings to reduce transportation costs,
case filing operation systems, RFID based file tracking, and the
creation of a publicly accessible and easily searchable e-library.   
While others were much less optimistic than Mr. Gurani and recognize
that the use of ICT in the reform process is “no instant coffee”,
the question of whether or not ICT can be a strategically appropriated in the Indian
context still remains.&lt;/p&gt;
&lt;p&gt;	Optimistic accounts of how ICT will increase
access to justice, incorporate the marginalized into the law-making
process, and increase judicial transparency and accountability all sounds uncomfortably techno-utopian.  While ICT should facilitate the reform process, past
experiences have shown that the over zealous use of technology has too-often resulted in less than impressive results (3)&lt;a class="sdfootnoteanc" name="sdfootnote4anc" href="#sdfootnote4sym"&gt;&lt;/a&gt;. To ensure that the reform process in India is not driven mainly by the IT sector, it is important that the use of technology remains complimentary to
a sound national judicial reform strategy.&amp;nbsp; An abundant supply of technical
support with little demand for the reform process from within the judicial branch may spell disappointing results for all stakeholders.  Seeing that
India's first seminar discussing the role of IT in the judiciary has been organized by the IT industry, it is safe to
assume that reform strategies are being crystallized through the gaze
of technocrats rather than the judiciary itself.
Technology has an important role to play, but
India's technocrats may be jumping the gun.&lt;/p&gt;
&lt;p&gt;	Many deep-seated challenges must be
overcome before the use of ICT can be truly transformative.  Often cited
is the level of resistance judicial cultures express towards externally imposed change.  Quite logically, those required to make
change are also those who may have the most
to lose in the short-term by doing so.  Similarly,  it is also
difficult garnering the levels of political support judicial reforms require to be effective.&amp;nbsp; Because the judiciary is such a highly politicized apparatus, efforts to fundamentally transform the system will require the support of a vast number of stakeholders &lt;a class="sdfootnoteanc" name="sdfootnote5anc" href="#sdfootnote5sym"&gt;&lt;/a&gt;.
 The low level of technological literacy which exists among India's
judges is also problematic.  Not only will members of the
judiciary be open to new ways of doing business, they will also have
to be diligent in adopting a new skill-set in which they may be more
than a decade behind in acquiring.&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;Other
deep-rooted limitations of India's judicial system are
becoming increasingly apparent today.  Questions surrounding access to justice
remain deeply embedded in the asymmetries of class power, which are often reinforced by the political nature of the judiciary.  Constitutional law
in India also remains unstable, as the principles informing judicial action have become
increasingly less clear (5).  Furthermore, the courts have come to
maintain a disproportionate share of power and influence in the
Indian political sphere (6).&lt;a class="sdfootnoteanc" name="sdfootnote6anc" href="#sdfootnote6sym"&gt;&lt;/a&gt; It is questionable if ICT can work to ameliorate some of these malignancies, or if its use will
only come to reinforce them.&amp;nbsp; If technology is appropriated in a way which serves to make the judicial process more
transparent and accountable, protect the rights of citizens, and
provide greater and more equitable access to justice, it may be safe
to assume that a more tech-savvy judiciary is a positive development for citizens.&amp;nbsp; Publishing legal information online, for example, currently allows for greater
transparency in the law making process and allows dialogue on
important issues of governance and citizenship.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;However, it is almost unnecessary to
reiterate that such outcomes are not guaranteed.&amp;nbsp; Technology is
often seen as neutral– the evaluative outcome of its
application remains dependent on numerous variable factors.  Most important is whether or not the government provides
a legal framework conducive to the appropriation of ICT in ways which
are considered to further the public interest.  It may be useful to
view the successful appropriation of ICT to judicial reform as a cumulative process, each
step being a precondition to the other.  It is clear to see how basic
infrastructure such as civil courts in rural areas must be in place
before the use of ICT can facilitate access to justice for
individuals who remain peripheral to the legal system. 
Similarly, one would assume that laws would have to first be to
be nondiscriminatory to all members of society before it could it can be widely accepted that more technology will better safeguard our rights and freedoms.&lt;/p&gt;
&lt;p&gt;	Without a legal framework which is considered to be socially just, greater speed of the judicial process, aided by technology, may become a tool which enables the judiciary to act more arbitrarily, more efficiency.&amp;nbsp;&amp;nbsp; This could be troubling for individuals who are already marginalized by certain policies or legal practices.&amp;nbsp; Technology can also make it possible for judges
to insulate themselves from the necessary checks and balances required in the law-making process.&amp;nbsp; While Mr Gurani stated that ICT can help preserve judicial independence, it is questionable if the use of technology is an appropriate strategy to mitigate politicization of the judicial branch.&amp;nbsp; Any
frivolous efforts to spearhead the reform process through the introduction
of ICT without the required commitment of judges and policy makers may be
naïve at best.  At worst, it could serve to reinforce what judicial
bodies believe they do well without critically re-examining the
fundamental roles, norms and principles of the Indian judicial system
itself.&lt;/p&gt;
&lt;p&gt;	Online case-filing services may
unintentionally, due to cost or lack of awareness, erect further
barriers to justice for individuals who traditionally remained
outside of the sphere of access.&amp;nbsp; In the same vein, if ICT is favored for use in criminal rather than civil courts,
technology may simply become a tool used to sentence people, more quickly.&amp;nbsp; This scenario sits quite polemic to visions of technology&amp;nbsp; serving as a tool to empower individuals to better assert their rights and seek justice.
 Foreshadowing the role ICT may play in the future of India's judicial reform process, SPANCO Technologies is currently piloting the use of
video technology in criminal courts.&amp;nbsp; Furthermore, &lt;a class="sdfootnoteanc" name="sdfootnote7anc" href="#sdfootnote7sym"&gt;&lt;/a&gt;India's judiciary has made several attempts to insulate itself from
the provisions of the RTI act, indicating that new laws, and even new technologies, may not be able to change practice.&amp;nbsp; There are also strong doubts looming that the
Gramin Nyayalayas Act will be successful in leveraging the required
financial support needed to construct civil courts in rural
areas.&amp;nbsp; Without the basic building blocks, it is difficult to envision how a National
Judicial Technology Program will be successful in bringing "justice" to all who are awaiting it. &amp;nbsp; Such instances serve as a light warning that technology,
even within a favorable legal framework, may not necessarily spell a more accessible, transparent and accountable justice system.&lt;/p&gt;
&lt;p&gt;A well-functioning judicial system is required to keep up with the
demands of modern democratic society.&amp;nbsp; It is unquestionable that technology can play an influential role in ensuring that the relationship
between citizens and the government is strong and communicative. 
However, it is important to ask under what conditions may it be beneficial to implement technology’s
use.  Inferring from last week’s
seminar, proposals and rationale behind potential reforms were made
from an economic perspective; how ICT can be used to see that cases
are filed and judgments are delivered more quickly to improve efficiency and rationalize resources.&amp;nbsp; Whether 
technology will be appropriated to facilitate a more equitable
justice system is unknown, but it is certain that such will require a coherent national reform strategy with long-term political backing.&amp;nbsp; Short-shorted technological fixes may improve India's judicial efficiency in the short term, but may, however, overshadow opportunities to bring about a more transparent and accountable system in the long-term.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Notes&lt;/p&gt;
&lt;p&gt;1. This was a notion emphasized often throughout the seminar.&lt;/p&gt;
&lt;p&gt;2. Where these estimates were drawn is unknown.&lt;/p&gt;
&lt;p&gt;3. For a concise account of how the use of ICT may be misappropriated in the judicial reform process, see E-Justice: Towards a Strategic Use of ICT in Judicial Reform by Waleed H. Malik&lt;/p&gt;
&lt;p&gt;4. For an interesting account of India's judicial system, see "The Rise of Judicial Sovereignty" by Pratap Bhanu Mehta in "The State of India's Democracy", Oxford University Press, 2009.&lt;/p&gt;
&lt;p&gt;5. Pratap Bhanu Mehta.&lt;/p&gt;
&lt;p&gt;6. Ibid.&lt;/p&gt;
&lt;h1 class="western"&gt;&lt;/h1&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/what-will-be-the-role-of-ict-in-indias-judical-reform-process'&gt;http://editors.cis-india.org/internet-governance/blog/what-will-be-the-role-of-ict-in-indias-judical-reform-process&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>rebecca</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>e-governance</dc:subject>
    

   <dc:date>2011-08-02T07:17:22Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/accessibility/blog/the-road-to-financial-inclusion">
    <title>The Road to Financial Inclusion</title>
    <link>http://editors.cis-india.org/accessibility/blog/the-road-to-financial-inclusion</link>
    <description>
        &lt;b&gt;It is increasingly frustrating to hear about wonderful steps being taken for financial inclusion within the private sector which completely ignores the question of inclusion of persons with disabilities. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Those of us working in the disabilities sector and those who live with the reality of disability know how difficult it is for persons with disabilities to even open bank accounts independently, and for those who are allowed to open bank accounts on their own, access to added services like ATM cards, chequebooks, internet banking — facilities which many of us take for granted — becomes a matter of discretion of bank managerial staff. The &lt;a href="http://editors.cis-india.org/accessibility/blog/banking-and-accessibility-in-india-report"&gt;CIS Report on Banking Accessibility&lt;/a&gt; is a seminal document on the problems being faced on accessibility to banking, and it was hoped that the Reserve Bank of India would take cognizance of the numerous issued raised within it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On May 21, 2014, the Reserve Bank of India issued a &lt;a href="http://rbidocs.rbi.org.in/rdocs/notification/PDFs/DB13NT0514FS.pdf"&gt;notification&lt;/a&gt; mandating all scheduled banks to take necessary steps to provide all existing ATMs / future ATMs with ramps for the same to be accessible for persons with disabilities, and provided further that the height of the ATMs should not create an impediment in their use by wheelchair users. The onus is on banks to provide this, and in cases where such changes are not practicable, this requirement may be dispensed with, for reasons recorded and displayed in branches or ATMs concerned. The requirements for ramps at entrances is also extended to bank branches (wherever feasible). The notification also notes the failure of Banks to ensure that at least 1/3rd of all their ATMs are "talking" ATMs with Braille keypads as per the &lt;a href="http://www.rbi.org.in/scripts/NotificationUser.aspx?Id=4923&amp;amp;Mode=0"&gt;2009 Circular&lt;/a&gt; and now mandates that all ATMs installed from July 1,&lt;sup&gt;&lt;/sup&gt; 2014 shall be talking ATMs with Braille Keypads.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The 2014 Notification goes one step forward and makes special provisions for providing magnifying glasses for persons with low vision in order to assist them in the carrying out of banking transactions. Banks should maintain a list of facilities for persons with disabilities and make this information available for customers prominently. On the May 27, a similar Notification, &lt;a href="http://rbidocs.rbi.org.in/rdocs/notification/PDFs/ATR270514FC.pdf"&gt;extending similar provisions to Regional Rural Banks&lt;/a&gt;, was published.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What does this mean for accessibility and banking? Definitely, the circulars come as a big boost to accessibility, particularly with regard to ATM facilities. ATM Machines which are designed to accommodate persons with disabilities do make a huge difference, though many, many persons have reported not even being given access to these facilities on account of their disabilities which has not been addressed in these circulars.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Additionally, it does not appear that non compliance is actionable, as Banks are merely advised to report the progress made in this regard periodically to their respective Customer Service Committee of the Board and ensure compliance. As pointed out above, reasons for non compliance are merely to be recorded and displayed. The procedures to approach the Ombudsman do not include accessible measures, and this continues to allow bank staff to act with impunity in denying banking facilities for persons with disabilities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Despite actively intervening in the eventual &lt;a href="http://rbi.org.in/scripts/PublicationReportDetails.aspx?UrlPage=&amp;amp;ID=760#9"&gt;Report of the Technical Committee on Banking of the RBI&lt;/a&gt;, disability rights activists have found that the banking industry has not been receptive to the needs of persons with disabilities. From this background, the RBI Notifications are a welcome start, though slightly premature — what is of utmost urgency on the part of the RBI is a categorical statement that no person with disability who comes to the bank to open a bank account will be denied access to the same. Additional tools which can be extremely beneficial to persons with disabilities, including mobile and internet banking, must be made accessible and available to persons with disabilities. It is also important for basic training on disability and communication be made part of syllabus for training of banking officials, and that regular interactions and training is encouraged for bank officials. It would be useful for all bank branches, and all departments of the RBI, to have an accessibility officer, a bank official given the additional responsibility of ensuring accessibility of the bank branch or the Department as the case may be, who is given specialized training in matters relating to accessibility. This would go a long way in ensuring that financial inclusion leaves no one behind.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/accessibility/blog/the-road-to-financial-inclusion'&gt;http://editors.cis-india.org/accessibility/blog/the-road-to-financial-inclusion&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>salelkar</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Accessibility</dc:subject>
    

   <dc:date>2014-06-03T06:46:18Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/accessibility/blog/right-to-read-campaign">
    <title>The Right to Read Campaign, now in Delhi</title>
    <link>http://editors.cis-india.org/accessibility/blog/right-to-read-campaign</link>
    <description>
        &lt;b&gt;The Right to Read campaign, this time in Delhi, the national capital of the country has been announced. This is the third in the series. The previous two held in Calcutta and Chennai were highly successful and Delhi too promises quite a lot.  &lt;/b&gt;
        
&lt;p&gt;About 70 million Indians are unable to read printed material owing to various forms of disabilities. According to industry estimates, around 80,000-100,000 books get published every year in India of which only about 700 are made available for these persons. Technologies like screen readers make it possible for persons with disabilities to access knowledge in alternate formats like Braille, e-text, audio, large print, et cetera. Yet people are unable to convert books into accessible formats thanks to the provisions of the Indian Copyright Act, 1957.&lt;/p&gt;
&lt;p&gt;India needs to change the situation quickly and put an end to the shortage of books and enable these 70 million persons to participate in social life. For this we need to make use of the developments in technology which makes it possible for all persons to access knowledge and enable them to live a life of social inclusion and participation on par with the rest of society. People with disabilities too have a right to access information like other persons- let copyright laws recognize the diverse needs of persons with disabilities and open up the gates of knowledge to all.&lt;/p&gt;
&lt;h3&gt;Objectives of the Right to Read Campaign&lt;/h3&gt;
&lt;ul&gt;&lt;li&gt;To expedite copyright law reform by informing policy makers on the necessity and nature of amendment. This has to be made to the Indian Copyright Act 1957 to give effect to the rights of persons with disabilities.&amp;nbsp;&lt;/li&gt;&lt;li&gt;To raise awareness on the issue amongst the parliamentarians, members of the judiciary, educationalists, publishers and the public.&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;The Campaign&lt;/h3&gt;
&lt;p&gt;The Indian campaign is a part of the global Right to Read campaign which was started by the World Blind Union in 2008. It is a nationwide campaign and seeks to:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Accelerate change in the copyright law;&lt;/li&gt;&lt;li&gt;Raise public awareness on the issue of access to reading for the print-impaired; and&lt;/li&gt;&lt;li&gt;Gather Indian support for the Treaty for the Blind proposed by the World Blind Union at the World Intellectual Property Organization (WIPO).&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/accessibility/blog/right-to-read-campaign'&gt;http://editors.cis-india.org/accessibility/blog/right-to-read-campaign&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    

   <dc:date>2011-08-17T08:45:56Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/events/the-right-to-information-the-right-to-knowledge">
    <title>The Right to Information, The Right to Knowledge (Talk by Sam Pitroda &amp; Carl Malamud)</title>
    <link>http://editors.cis-india.org/events/the-right-to-information-the-right-to-knowledge</link>
    <description>
        &lt;b&gt;On October 15, 2017, Sam Pitroda and Carl Malamud will speak on open data and knowledge in India.&lt;/b&gt;
        &lt;p&gt;HasGeek and NUMA Bangalore are co-organizing a talk by two eminent internet pioneers — Sam Pitroda and Carl Malamud — on open data and knowledge in India.  Pranesh Prakash of CIS will introduce the speakers and their work.&lt;/p&gt;
&lt;h2&gt;The Right to Information, The Right to Knowledge&lt;/h2&gt;
&lt;p&gt;Sam Pitroda and Carl Malamud will talk about their efforts in India, the U.S., and many other countries to help promote universal access to knowledge. They'll discuss the constitutional underpinnings of this right in India and some of the information they've been making available, including 3 lakh books from the Digital Library of India, 19,000 official standards from the Bureau of Indian Standards, and a raft of other resources such as the entire Collected Works of Mahatma Gandhi.&lt;/p&gt;
&lt;p&gt;They will discuss how key laws such as the Right to Information make this possible but will focus more on how the world of open source and the Internet can turn that promise into a reality. Universal access to knowledge is the great unmet promise of our times, and they will talk about what we can all do to make this dream possible.&lt;/p&gt;
&lt;h3&gt;About the speakers&lt;/h3&gt;
&lt;p&gt;Dr. Sam Pitroda was a senior advisor to Prime Ministers Rajiv Gandhi and Manmohan Singh and is widely credited for having led India’s telecommunications and technology revolutions in the 1980s. Dr. Pitroda holds 20 honorary PhDs, close to 100 worldwide patents, and helped create the first digital PBXs in the 1960s.&lt;/p&gt;
&lt;p&gt;Carl Malamud started the first radio station on the Internet and is considered one of the pioneers of the U.S. open government movement. Carl runs Public.Resource.Org, an NGO which has placed hundreds of millions of pages of government information online, including all 19,000 Indian Standards. &lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/events/the-right-to-information-the-right-to-knowledge'&gt;http://editors.cis-india.org/events/the-right-to-information-the-right-to-knowledge&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2018-02-14T12:19:16Z</dc:date>
   <dc:type>Event</dc:type>
   </item>




</rdf:RDF>
