<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="http://editors.cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>http://editors.cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 241 to 255.
        
  </description>
  
  
  
  
  <image rdf:resource="http://editors.cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/the-high-level-privacy-conclave"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/the-week-april-18-2015-geetha-hariharan-hazards-of-non-neutral-internet"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/wssf2013-october-15-2013-panel-habit-care-technologies-living-and-laboring-cyborgs"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/national-data-governance-framework-policy"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/arindrajit-basu-september-24-2021-the-geopolitics-of-cyberspace-compendium-of-cis-research"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/livemint-june-22-2015-sunil-abraham-the-generation-of-e-emergency"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/international-school-on-digital-transformation"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/research/conferences/conference-blogs/picnic"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/www-deccan-chronicle-sep-16-2012-sunil-abraham-the-five-monkeys-and-ice-cold-water"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/a2k/blogs/epw-vol-xlviii-42-october-19-2013-sunil-abraham-the-fight-for-digital-sovereignty"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/the-fifth-elephant"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/draft-electronic-delivery-services"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/newslaundry-elonnai-hickok-and-shweta-mohandas-january-14-2019-dna-bill-has-a-sequence-of-problems-that-need-to-be-resolved"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/a2k/blogs/giswatch-december-9-2016-sunil-abraham-and-vidushi-marda-digital-protection-of-traditional-knowledge-questions-raised-by-traditional-knowledge-digital-library-in-india"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/indian-express-march-20-2016-nishant-shah-digital-is-political"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="http://editors.cis-india.org/internet-governance/the-high-level-privacy-conclave">
    <title>The High Level Privacy Conclave</title>
    <link>http://editors.cis-india.org/internet-governance/the-high-level-privacy-conclave</link>
    <description>
        &lt;b&gt;India in dire need of privacy law; experts say government is ironically creating huge national security risks in attempts to prevent crime and terrorism.&lt;/b&gt;
        
&lt;p&gt;Privacy India, the Centre for Internet and Society and the Society in Action Group, with support from Privacy International, have spent 18 months studying the state of privacy across India, conducting consultations in Kolkata, Bangalore, Ahmedabad, Guwahati, Chennai and Mumbai. Today, the results of their research were discussed by representatives from government, industry, media and civil society at a high-level conclave in Delhi. In attendance were Manish Tewari MP, Microsoft Director of Corporate Affairs Deepak Maheshwari and P.K.H. Tharakan former Chief of the Research and Analysis Wing. A privacy symposium open to the general public will be held tomorrow afternoon at the Indian International Centre.&lt;/p&gt;
&lt;p&gt;The 130-page long Country report details how government bodies like the National Technical Research Organization (NTRO) engage in pervasive and frequently unauthorized wiretapping, listening in on the private conversations of politicians and ordinary citizens alike. The Cabinet Secretary himself, in a report last year, noted that a body like the Central Board of Direct Taxes should never have been authorized to conduct telephone tapping, as the Supreme Court had long ago made clear. Privacy problems are arising from UID, NPR, and other e-governance projects that involve the creation of databases and the collection of personal information. Indian citizens are losing the ability to control who has access to their information, what that information says about them and how that information is used.&lt;/p&gt;
&lt;p&gt;Overall, the study paints a picture of a dysfunctional system, with multiple pieces of legislation dealing with sectoral privacy-related issues like health, banking, phone tapping etc and no overarching legal guarantee of privacy. As Manish Tewari observed today, there is a nationwide lack of understanding about new technologies and judges are very rarely technologically literate. This has created a situation in which the government's efforts to fight crime and terrorism by intercepting communications has horribly backfired. By building backdoors into communications systems to allow lawful access, and by restricting cryptography to a 40-bit limit, the authorities have created serious vulnerabilities in India's communications system that can be easily exploited by any malicious third party or foreign government.&lt;/p&gt;
&lt;p&gt;Gus Hosein, Executive Director of Privacy International: "In their efforts to preserve and defend democratic society, India has undermined the very thing it wanted to protect. Both citizens and state are now at serious risk of being spied upon by anyone with a small amount of technological know-how and a computer."&lt;/p&gt;
&lt;p&gt;Usha Ramanathan, social and political activist, said: "In the name of state transparency, government projects are in fact rendering citizens transparent to the State, rather than the other way round. A comprehensive privacy law for India cannot come soon enough."&lt;/p&gt;
&lt;h2&gt;Privacy India&lt;/h2&gt;
&lt;p&gt;Privacy India was established in 2010 with the objective of raising awareness, sparking civil action and promoting democratic dialogue around privacy challenges and violations in India. One of our goals is to build consensus towards the promulgation of comprehensive privacy legislation in India through consultations with the public, policymakers, legislators and the legal and academic community.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/the-high-level-privacy-conclave'&gt;http://editors.cis-india.org/internet-governance/the-high-level-privacy-conclave&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Natasha Vaz</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-03-01T06:09:21Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/the-week-april-18-2015-geetha-hariharan-hazards-of-non-neutral-internet">
    <title>The Hazards of a Non-neutral Internet</title>
    <link>http://editors.cis-india.org/internet-governance/blog/the-week-april-18-2015-geetha-hariharan-hazards-of-non-neutral-internet</link>
    <description>
        &lt;b&gt;Spurred by recent events, India’s policy circles are dancing to the complex tunes of net neutrality. Airtel came under fire for pricing calls made over the Internet differentially; it has since withdrawn this plan. Airtel and Reliance Communications are caught in the storm as Airtel Zero and Internet.org, the Facebook-spearheaded product for low-cost Internet access, face stiff criticism for violating net neutrality. Companies like Flipkart, which earlier supported these products, have stepped back and are throwing their weight behind net neutrality. The Department of Telecommunications has set up a six-member panel to consult on net neutrality. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;A modified version of the blog entry was published as an article titled "&lt;a class="external-link" href="http://week.manoramaonline.com/cgi-bin/MMonline.dll/portal/ep/theWeekContent.do?programId=1073754899&amp;amp;contentId=18716696"&gt;A must for free speech&lt;/a&gt;" in the Week on April 18, 2015&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Responding to concerns, the Telecom Regulatory Authority of India (TRAI) released a consultation paper on OTT services on March 27, 2015. TRAI has called for public comments to be sent by April 24, 2015, and counter-comments to be sent by May 8, 2015. The TRAI consultation paper raises several crucial issues, including net neutrality. Given the heightened interest in the issue, let us two steps back and revisit the basics about net neutrality.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What is net neutrality?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the simplest terms, net neutrality is the principle by which the carrier (telco/ISP like Reliance, Airtel) is prohibited from discriminating between any two ‘packets’ of data carried over its network. That is, ISPs ought not treat data packets differently, no matter what the content, source or price.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It follows, then, that when packets are given differential treatment, the principle of net neutrality is violated. As Centre for Internet and Society’s Sunil Abraham explains, differential treatment may occur in many ways: &lt;span&gt;first&lt;/span&gt;, carriers may provide consumers with free access to certain websites or web content, while charging the sender or destination; &lt;span&gt;second&lt;/span&gt;, ISPs may throttle traffic of one website/company to give it priority over other sites (the website will then load faster than others); &lt;span&gt;third&lt;/span&gt;, ISPs may refuse access to some websites unless consumers or content-providers pay extra charges. Other violations abound too; this list is merely illustrative.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Diversity, Innovation &amp;amp; Competition: The Costs of Net Non-neutrality&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Let us take zero-rating to explore the impacts of a net neutrality violation. In &lt;i&gt;Internet.org&lt;/i&gt; and &lt;i&gt;Airtel Zero&lt;/i&gt;, companies like Facebook and Flipkart (prior to the latter’s withdrawal) pay to provide users with free access to their cluster of websites; these are examples of “zero-rating”. Telcos and content-providers like Facebook argue that this is crucial to expand Internet access in price-sensitive markets like India. While this is an important consideration, zero-rating can have detrimental impacts on free speech and diversity, competition and innovation. It can result in “walled gardens” and a diversity-trap, where the only sites we can access are the walled gardens of curated information compiled by Facebook and the like.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Today, we can access an unprecedented variety of content across freely accessible platforms. We pay for our Internet connections and for data, but the content we access is neither set nor monitored by ISPs or content-providers, unless legally mandated to do so under Section 69 of Information Technology Act, 2000. Our freedom to access and receive diverse information is not curated by the companies themselves (as Facebook would in &lt;i&gt;Internet.org&lt;/i&gt;) or their ability to pay ISPs to carry traffic. But with zero-rating, preferential access or traffic throttling, content diversity will suffer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Of course, impact of receding diversity of content may not be felt in the short term, if access is made the priority. However, if net non-neutrality is allowed to continue in perpetuity, this may result in corporate curation and censorship of content. Moreover, since established players can better shell out the money needed for zero-rated or prioritised access, new companies and start-ups may find their entry blocked. Such a possibility is vexing for innovation, as greater costs will disincentivise smaller players from entering the market. There is also an impact on competition: entrenched players who can afford to pay carriers will dig their heels deeper, and become the sole curators of content. This is censorship by market design.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Access and Self-preservation, say the Telcos&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some telecom operators and ISPs argue that zero-rating is essential for universal access to data services, a dream of the Digital India mission. They also stress that OTTs like Whatsapp, Viber, Skype and others are free-riding on their networks and usurping their revenue, since it is the telcos and not OTTs who pay licence fees and spectrum charges. Finally, telcos and ISPs say that treating packets differently is a form of network and traffic management; such management is crucial to an efficient and open Internet, and is an age-old practice of operators.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Of course, traffic and network management practices &lt;i&gt;do &lt;/i&gt;exist, and operators do block or manage speeds during congestion periods or when there are security threats. As users, we also experience different Internet speeds depending on the hardware and software employed by operators, the time of day, the type of content accessed (video/ audio/ text), etc. As Christopher Yoo says, operators should be free to experiment with network management practices (‘network diversity’) so long as consumers and competition suffer no detriment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But as reports show, net non-neutrality practices have negative impacts on speech diversity, innovation and competition, among others. Any proposal to grant legal recognition to net non-neutrality practices like zero-rating, traffic-prioritization or others, which depend on the consumer or content-provider’s ability to pay and result in differential treatment of data packets, must answer these concerns and provide safeguards. In &lt;i&gt;Shreya Singhal&lt;/i&gt;, the Supreme Court affirmed the value of freedom of speech and diversity; saying that “…a culture of open dialogue is important”, the Court declared that “…we need to tolerate unpopular views”. Internet companies and telcos provide the platforms to make such views available. Through traffic prioritization and zero-rating, and by chilling innovation and competition, net neutrality violations can stifle speech diversity. The Department of Telecom and TRAI must remember this when debating a net neutrality regulation.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/the-week-april-18-2015-geetha-hariharan-hazards-of-non-neutral-internet'&gt;http://editors.cis-india.org/internet-governance/blog/the-week-april-18-2015-geetha-hariharan-hazards-of-non-neutral-internet&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>geetha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-05-27T16:07:36Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/wssf2013-october-15-2013-panel-habit-care-technologies-living-and-laboring-cyborgs">
    <title>The Habit of Care: Technologies of Living and Laboring Cyborgs at World Social Science Forum 2013</title>
    <link>http://editors.cis-india.org/news/wssf2013-october-15-2013-panel-habit-care-technologies-living-and-laboring-cyborgs</link>
    <description>
        &lt;b&gt;The World Social Science Forum 2013 organized by International Social Science Council will take place in Palais des Congrès de Montréal, Canada from October 13 to 15, 2013. Dr. Nishant Shah is participating in the event as a panelist and will speak on "The Habit of Care: Technologies of Living and Laboring Cyborgs".&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://www.wssf2013.org/panel-comit%C3%A9/habit-care-technologies-living-and-laboring-cyborgs-0"&gt;This was published on the World Science Forum website&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Within the larger discourse around digital cultures, much attention is given to care. Care infrastructure includes physical infrastructure of access to remote spaces, regulatory and policy environments to control the digital spaces, redesigned geographies to house the new populations created by the ICT industries, and is discussed in disciplines as varied as Artificial Intelligence and Climate Change. Care Technologies find obvious resonances with the Foucaultian idea of ‘Technologies of the Self’, reminding us of the normative nature of measurement, cognition, discipline and punishment that is an inherent part of care.&lt;br /&gt;&lt;br /&gt;The responses to Care Technologies and the Labor of Caring are not uniform. Some clearly identify the emergence of Care Technologies as a new form of alienation of labour, leading to discrimination and inequity. Others celebrate the ways in which the penetrative nature of the digital – from deep space probes to the sub-molecular conception of the human – allow us to imagine social interactions and our relationships with our own bodies in new ways.&lt;br /&gt;&lt;br /&gt;In all the discourse around Care, there is silence about its form, function and nature. While attention is given to infrastructure, labour, politics, production and the intelligibility of care practices, we haven’t yet tried to fathom the conditions and generation of care, relegating it to the realm of the private and the subjective. Combining practice and theory, in different parts of the Global South, and inspired by gender and sexuality studies, this panel looks at Care as a Habit. We focus on the ‘care of technologies’, showing how the forced separation of care and technology needs to be revisited to look at conditions of being human, being social and being political. Working through diverse geographical and political contexts, the panel illustrates the tensions in understanding and engaging with Care and why there is a need to find new vocabularies and relationships to deal with this area.&lt;/p&gt;
&lt;div class="field-field-panel-coordinator field-type-userreference field"&gt;
&lt;div class="field-items"&gt;
&lt;div class="odd field-item"&gt;
&lt;div class="field-label-inline-first"&gt;&lt;b&gt;Coordinator&lt;/b&gt;:&lt;/div&gt;
Dr. Nishant Shah&lt;/div&gt;
&lt;div class="even field-item"&gt;Dr. Radhika Gajjala&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="field-field-panel-coord1-institution field-type-text field"&gt;
&lt;div class="field-items"&gt;
&lt;div class="odd field-item"&gt;
&lt;div class="field-label-inline-first"&gt;&lt;b&gt;Organization/Institution&lt;/b&gt;:&lt;/div&gt;
Centre for Internet and Society and Bowling Green State University&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="field-field-schedule field-type-datestamp field"&gt;
&lt;div class="field-items"&gt;
&lt;div class="odd field-item"&gt;
&lt;div class="field-label-inline-first"&gt;&lt;b&gt;Schedule&lt;/b&gt;:&lt;/div&gt;
&lt;span class="date-display-single"&gt;Tuesday, October 15, 2013 - &lt;span class="date-display-start"&gt;09:00&lt;/span&gt;&lt;span class="date-display-separator"&gt; - &lt;/span&gt;&lt;span class="date-display-end"&gt;10:45&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="field-field-room field-type-text field"&gt;
&lt;div class="field-items"&gt;
&lt;div class="odd field-item"&gt;
&lt;div class="field-label-inline-first"&gt;&lt;b&gt;Room&lt;/b&gt;:&lt;/div&gt;
&lt;/div&gt;
&lt;div class="odd field-item"&gt;520AD&lt;/div&gt;
&lt;hr /&gt;
&lt;h2 class="odd field-item"&gt;&lt;a class="external-link" href="http://http//www.wssf2013.org/speaker/nishant-shah"&gt;Nishant Shah&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Dr. Nishant Shah is the co-founder and Research Director at the Centre for Internet and Society, Bangalore, India. He is an International Tandem Partner at the Centre for Digital Cultures, Leuphana University, Germany and a Knowledge Partner with the Hivos Knowledge Programme, The Netherlands. He is committed to producing infrastructure, frameworks and collaborations in the global south to understand and analyse the ways in which the emergence of digital technologies have shaped the contemporary social, political and cultural milieu. He edits a series of monographs on ‘Histories of Internet(s) in India’ that examine the complicated relationship that technologies have with questions of gender, sexuality, body, city, governance, archiving and gaming. He was the principle researcher for a research programme that produced the four-volume anthology ‘Digital AlterNatives With a Cause?’, examining the ways in which young people’s relationship with digital technologies produces changes in their immediate environments. Nishant is on the steering committee of the MacArthur Foundation’s Digital Media and Learning Project (USA) as well as on the Media Art Histories collective (Latvia). He is involved with the Inter-Asia Cultural Studies Consortium (Taiwan/S. Korea/Hong Kong) and the global Network of Centres for Internet and Society housed at the Berkman Centre for Internet &amp;amp; Society, USA. He is committed to encouraging multi-stakeholder dialogue and hence regularly does public consultations and trainings for civil society and NGOs, governments, academic partners and private corporate entities. He is a regular speaker at events like Re:publica and Video Vortex and a columnist with India’s leading English language newspaper The Indian Express. His academic and research publications reflect his political stance on open access and open knowledge infrastructure and are all available for free download and distribution under open license.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Schedule Overview&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Saturday, October 12&lt;br /&gt;&lt;/b&gt;15:00-18:00 Pre-Registration&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Sunday, October 13 (Day 1)&lt;/b&gt;&lt;br /&gt;09:00-19:30  Registration&lt;br /&gt;11:00-12:45  &lt;a href="http://www.wssf2013.org/panel-comit%C3%A9/participatory-dynamics-change"&gt;Plenary I&lt;/a&gt;&lt;br /&gt;11:30-17:00  Exhibition Opens&lt;br /&gt;13:00-14:45  Panel Session 1&lt;br /&gt;15:00-16:45  Panel Session 2&lt;br /&gt;17:30           Opening Ceremony and Reception&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Monday, October 14 (Day 2)&lt;/b&gt;&lt;br /&gt;08:30-17:30  Registration&lt;br /&gt;09:30-17:00  Exhibition Opens&lt;br /&gt;09:00-10:45  Panel Session 3&lt;br /&gt;11:00-12:45  Plenary II &lt;br /&gt;13:00-14:45  Panel Session 4&lt;br /&gt;15:00-16:45  Panel Session 5&lt;br /&gt;17:00-18:45  Panel Session 6&lt;br /&gt;20:00           Movie Night with the NFB&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Tuesday, October 15 (Day 3)&lt;/b&gt;&lt;br /&gt;08:30-17:30  Registration&lt;br /&gt;09:30-17:00  Exhibition Opens&lt;br /&gt;09:00-10:45  Panel Session 7&lt;br /&gt;11:00-12:45 Panel Session 8&lt;br /&gt;13:00-14:45  Awards Luncheon&lt;br /&gt;15:00-16:45  Panel Session 9&lt;br /&gt;17:00-18:45  &lt;a href="http://www.wssf2013.org/panel-comit%C3%A9/digital-technologies-production-and-distribution-knowledge"&gt;Plenary III&lt;/a&gt;&lt;br /&gt;18:45          Closing Ceremony and Reception&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/wssf2013-october-15-2013-panel-habit-care-technologies-living-and-laboring-cyborgs'&gt;http://editors.cis-india.org/news/wssf2013-october-15-2013-panel-habit-care-technologies-living-and-laboring-cyborgs&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Habits of Living</dc:subject>
    
    
        <dc:subject>Digital Humanities</dc:subject>
    

   <dc:date>2013-08-28T09:19:43Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/national-data-governance-framework-policy">
    <title>The Government’s Increased Focus on Regulating Non-Personal Data: A Look at the Draft National Data Governance Framework Policy </title>
    <link>http://editors.cis-india.org/internet-governance/blog/national-data-governance-framework-policy</link>
    <description>
        &lt;b&gt;Digvijay Chaudhary and Anamika Kundu wrote an article on the National Data Governance Framework Policy. It was edited by Shweta Mohandas.&lt;/b&gt;
        &lt;h2&gt;Introduction&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Non Personal Data (‘NPD’) can be &lt;a href="https://www.taylorfrancis.com/chapters/edit/10.4324/9780429022241-8/regulating-non-personal-data-age-big-data-bart-van-der-sloot"&gt;understood&lt;/a&gt; as any information not relating to an identified or identifiable natural person. The origin of such data can be both human and non-human. Human NPD would be such data which has been anonymised in such a way that the person to whom the data relates cannot be re-identified. Non-human NPD would mean any such data that did not relate to a human being in the first place, for example, weather data. There has been a gradual demonstrated interest in NPD by the government in recent times. This new focus on regulating non personal data can be owed to the economic incentive it provides. In its report, the Sri Krishna committee, released in 2018 agreed that NPD holds considerable strategic or economic interest for the nation, however, it left the questions surrounding NPD to a future committee.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;History of NPD Regulation&lt;/h2&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;In 2020, the Ministry of Electronics and Information Technology (‘MEITY’) constituted an expert committee (‘NPD Committee’) to study various issues relating to NPD and to make suggestions on the regulation of non-personal data. The NPD Committee differentiated NPD into human and non-human NPD, based on the data’s origin. Human NPD would include all information that has been stripped of any personally identifiable information and non-human NPD meant any information that did not contain any personally identifiable information in the first place (eg. weather data). The final report of the NPD Committee is awaited but the Committee came out with a &lt;a href="https://static.mygov.in/rest/s3fs-public/mygov_160922880751553221.pdf"&gt;revised draft&lt;/a&gt; of its recommendations in December 2020. In its December 2020 report, the NPD Committee proposed the creation of a National Data Protection Authority (‘NPDA’) as it felt this is a new and emerging area of regulation. Thereafter, the Joint Parliamentary Committee  on the Personal Data Protection Bill, 2019 (‘JPC’) came out with its &lt;a href="http://164.100.47.193/lsscommittee/Joint%20Committee%20on%20the%20Personal%20Data%20Protection%20Bill,%202019/17_Joint_Committee_on_the_Personal_Data_Protection_Bill_2019_1.pdf"&gt;version of the Data Protection Bill &lt;/a&gt;where it amended the short title of the PDP Bill 2019 to Data Protection Bill, 2021 widening the ambit of the Bill to include all types of data. The JPC report focuses only on human NPD, noting that non-personal data is essentially derived from one of the three sets of data - personal data, sensitive personal data, critical personal data - which is either anonymized or is in some way converted into non-re-identifiable data.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;On February 21, 2022,  the Ministry of Electronics and Information Technology (‘MEITY’) came out with the &lt;a href="https://www.meity.gov.in/content/draft-india-data-accessibility-use-policy-2022"&gt;Draft India Data Accessibility and Use Policy, 2022&lt;/a&gt; (‘Draft Policy’). The Draft Policy was strongly criticised mainly due to its aims to monetise data through its sale and licensing to body corporates. The Draft Policy had stated that anonymised and non-personal data collected by the State that has “&lt;a href="https://www.medianama.com/2022/06/223-new-data-governance-policy-privacy/"&gt;undergone value addition&lt;/a&gt;” could be sold for an “appropriate price”. During the Draft Policy’s consultation process, it had been withdrawn several times and then finally removed from the website.&lt;a href="https://www.meity.gov.in/writereaddata/files/Draft%20India%20Data%20Accessibility%20and%20Use%20Policy_0.pdf"&gt; The National Data Governance Framework Policy&lt;/a&gt; (‘NDGF Policy’) is a successor to this Draft Policy. There is a change in the language put forth in the NDGF Policy from the Draft Policy, where the latter mainly focused on monetary growth. The new NDGF Policy aims to regulate anonymised non-personal data (‘NPD’) kept with governmental authorities and make it accessible for research and improving governance. It wishes to create an ‘India Datasets programme’ which will consist of the aforementioned datasets. While  MEITY has opened the draft for public comments, is a need to spell out the procedure in some ways for stakeholders to draft recommendations for the NDGF policies in an informed manner. Through this piece, we discuss the NDGF Policy in terms of issues related to the absence of a comprehensive Data Protection Framework in India and the jurisdictional overlap of authorities under the NDGF Policy and DPB.&lt;/p&gt;
&lt;h2 dir="ltr" style="text-align: justify; "&gt;What the National Data Governance Framework Policy Says&lt;/h2&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Presently in India, NPD is stored in a variety of governmental departments and bodies. It is difficult to access and use this stored data for governmental functions without modernising collection and management of governmental data. Through the NDGF Policy, the government aims to build an Indian data storehouse of anonymised non-personal datasets and make it accessible for both improving governance and encouraging research. It imagines the establishment of an Indian Data Office (‘IDO’)  set up by MEITY , which shall be responsible for consolidating data access and sharing of non-personal data across the government. In addition, it also mandates a Data Management Unit for every Ministry/department that would work closely with the IDO. IDO will also be responsible for issuing protocols for sharing NPD. The policy further imagines an Indian Data Council (‘IDC’) whose function would be to define frameworks for important datasets, finalise data standards, and Metadata standards and also review the implementation of the policy. The NDGF Policy has provided a broad structure concerning the setting up of anonymisation standards, data retention policies, data quality, and data sharing toolkit. The NDGF Policy states that these standards shall be developed and notified by the IDO or MEITY or the Ministry in question and need to be adhered to by all entities.&lt;/p&gt;
&lt;h2 dir="ltr" style="text-align: justify; "&gt;The Data Protection Framework in India&lt;/h2&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;The report adopted by the JPC, felt that it is simpler to enact a single law and a single regulator to oversee all the data that originates from any data principal and is in the custody of any data fiduciary. According to the JPC, the draft Bill deals with various kinds of data at various levels of security. The JPC also recommended that since the Data Protection Bill (‘DPB’) will handle both personal and non-personal data, any further policy / legal framework on non-personal data may be made a part of the same enactment instead of any separate legislation. The draft DPB states that what is to be done with the NDP shall be decided by the government from time to time according to its policy. As such, neither the DPB, 2021 nor the NDGF Policy go into details of regulating NPD but only provide a broad structure of facilitating free-flow of NPD, without taking into account the &lt;a href="https://cis-india.org/internet-governance/cis-comments-revised-npd-report/view"&gt;specific concerns&lt;/a&gt; that have been raised since the NPD committee came out with its draft report on regulating NPD dated December 2020.&lt;/p&gt;
&lt;h2 dir="ltr" style="text-align: justify; "&gt;Jurisdictional overlaps among authorities and other concerns&lt;/h2&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Under the NDGF policy, all guidelines and rules shall be published by a body known as the Indian Data Management Office (‘IDMO’). The IDMO is set to function under the MEITY and work with the Central government, state governments and other stakeholders to set standards. Currently, there is no sign of when the DPB will be passed as law. According to the JPC, the reason for including NPD within the DPB was because of the impossibility to differentiate between PD and NPD. There are also certain overlaps between the DPB and the NDGF which are not discussed by the NDGF. NDGF does not discuss the overlap between the IDMO and Data Protection Authority (‘DPA’) established under the DPB 2021.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Under the DPB, the DPA is tasked with specifying codes of practice under clause 49. On the other hand, the NDGF has imagined the setting up of IDO, IDMO, and the IDC, which shall be responsible for issuing codes of practice such as data retention, and data anonymisation, and data quality standards. As such, there appears to be some overlap in the functions of the to-be-constituted DPA and the NDGF Policy.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Furthermore, while the NDGF Policy aims to promote openness with respect to government data, there is a conflict with &lt;a href="https://opengovdata.org/"&gt;open government data (‘OGD’) principle&lt;/a&gt;s when there is a price attached to such data. OGD is data which is collected and processed by the government for free use, reuse and distribution. Any database created by the government must be publicly accessible to ensure compliance with the OGD principles.&lt;/p&gt;
&lt;h2 dir="ltr" style="text-align: justify; "&gt;Conclusion&lt;/h2&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Streamlining datasets across different authorities is a huge challenge for the government and hence the NGDF policy in its current draft requires a lot of clarification. The government can take inspiration from the European Union which in 2018, came out with a principles-based approach coupled with self-regulation on the framework of the free flow of non-personal data. The &lt;a href="https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52019DC0250&amp;amp;from=EN"&gt;guidance&lt;/a&gt; on the free-flow of non-personal data defines non-personal data based on the origin of data - data which originally did not relate to any personal data (non-human NPD) and data which originated from personal data but was subsequently anonymised (human NPD). The &lt;a href="https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52019DC0250&amp;amp;from=EN"&gt;regulation&lt;/a&gt; further realises the reality of mixed data sets and regulates only the non-personal part of such datasets and where the datasets are inextricably linked, the GDPR would apply to such datasets. Moreover, any policy that seeks to govern the free flow of NPD ought to make it clear that in case of re-identification of anonymised data, such re-identified data would be considered personal data. The DPB, 2021 and the NGDF, both fail to take into account this difference.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/national-data-governance-framework-policy'&gt;http://editors.cis-india.org/internet-governance/blog/national-data-governance-framework-policy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Digvijay Chaudhary and Anamika Kundu</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Data</dc:subject>
    
    
        <dc:subject>Open Government Data</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2022-06-30T13:24:35Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/arindrajit-basu-september-24-2021-the-geopolitics-of-cyberspace-compendium-of-cis-research">
    <title>The Geopolitics of Cyberspace: A Compendium of CIS Research</title>
    <link>http://editors.cis-india.org/internet-governance/blog/arindrajit-basu-september-24-2021-the-geopolitics-of-cyberspace-compendium-of-cis-research</link>
    <description>
        &lt;b&gt;Cyberspace is undoubtedly shaping and disrupting commerce, defence and human relationships all over the world. Opportunities such as improved access to knowledge, connectivity, and innovative business models have been equally met with nefarious risks including cyber-attacks, disinformation campaigns, government driven digital repression, and rabid profit-making by ‘Big Tech.’ Governments have scrambled to create and update global rules that can regulate the fair and equitable uses of technology while preserving their own strategic interests.&lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;With a rapidly digitizing economy and clear interests in shaping global rules that favour its strategic interests, India stands at a crucial juncture on various facets of this debate. How India governs and harnesses technology, coupled with how India translates these values and negotiates its interests globally, will surely have an impact on how similarly placed emerging economies devise their own strategies. The challenge here is to ensure that domestic technology governance as well as global engagements genuinely uphold and further India’s democratic fibre and constitutional vision.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Since 2018, researchers at the Centre for Internet and Society have produced a body of research including academic writing, at the intersection of geopolitics and technology covering global governance regimes on trade and cybersecurity, including their attendant international law concerns, the digital factor in bilateral relationships (with a focus on the Indo-US and Sino-Indian relationships). We have paid close focus to the role of emerging technologies in this debate, including AI and 5G as well as how private actors in the technology domain, operating across national jurisdictions, are challenging and upending traditionally accepted norms of international law, global governance, and geopolitics.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The global fissures in this space matter fundamentally for individuals who increasingly use digital spaces to carry out day to day activities: from being unwitting victims of state surveillance to harnessing social media for causes of empowerment to falling prey to state-sponsored cyber attacks, the rules of cyber governance, and its underlying politics. Yet, the rules are set by a limited set of public officials and technology lawyers within restricted corridors of power. Better global governance needs more to be participatory and accessible. CIS’s research and writing has been cognizant of this, and attempted to merge questions of global governance with constitutional and technical questions that put individuals and communities centre-stage.&lt;/p&gt;
&lt;p&gt;Research and writing produced by CIS researchers and external collaborators from 2018 onward is detailed in the appended compendium.&lt;/p&gt;
&lt;h2&gt;Compendium&lt;/h2&gt;
&lt;h3&gt;Global cybersecurity governance and cyber norms&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Two decades since a treaty governing state behaviour in cyberspace was mooted by Russia, global governance processes have meandered along. The security debate has often been polarised along “Cold War” lines but the recent amplification of cyberspace governance as developmental, social and economic has seen several new vectors added to this debate. This past year two parallel processes at the United Nations General Assembly’s First Committee on Disarmament and International Security-United Nations Group of Governmental Experts (UN-GGE) and the United Nations Open Ended Working Group managed to produce consensus reports but several questions on international law, norms and geopolitical co-operation remain. India has been a participant at these crucial governance debates. Both the substance of the contribution, along with its implications remain a key focus area for our research.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Edited Volumes&lt;/em&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Karthik Nachiappan and Arindrajit Basu &lt;a href="https://www.india-seminar.com/2020/731.htm"&gt;India and Digital World-Making&lt;/a&gt;, &lt;em&gt;Seminar &lt;/em&gt;731, 1 July 2020 &lt;em&gt;(featuring contributions from Manoj Kewalramani, Gunjan Chawla, Torsha Sarkar, Trisha Ray, Sameer Patil, Arun Vishwanathan, Vidushi Marda, Divij Joshi, Asoke Mukerji, Pallavi Raghavan, Karishma Mehrotra, Malavika Raghavan, Constantino Xavier, Rajen Harshe' and Suman Bery&lt;/em&gt;)&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;em&gt;&lt;br /&gt;Long-Form Articles&lt;/em&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Arindrajit Basu and      Elonnai Hickok, &lt;a href="https://cis-india.org/internet-governance/blog/arindrajit-basu-and-elonnai-hickok-november-30-2018-cyberspace-and-external-affairs"&gt;&lt;em&gt;Cyberspace      and External Affairs: A Memorandum for India&lt;/em&gt;&lt;/a&gt; (Memorandum,      Centre for Internet and Society, 30 Nov 2018) &lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/the-potential-for-the-normative-regulation-of-cyberspace-implications-for-india"&gt;&lt;em&gt;The Potential for the Normative Regulation of Cyberspace&lt;/em&gt;&lt;/a&gt;&lt;em&gt; &lt;/em&gt;(White Paper, Centre for Internet and Society,      30 July 2018) &lt;/li&gt;
&lt;li&gt;Arindrajit Basu and      Elonnai Hickok &lt;a href="https://cis-india.org/internet-governance/blog/conceptualizing-an-international-security-regime-for-cyberspace"&gt;&lt;em&gt;Conceptualizing      an International Security Architecture for cyberspace&lt;/em&gt;&lt;/a&gt;&lt;em&gt; &lt;/em&gt;(Briefings of the Global      Commission on the Stability of Cyberspace, Bratislava, Slovakia, May 2018)&lt;/li&gt;
&lt;li&gt;Sunil      Abraham, Mukta Batra, Geetha Hariharan, Swaraj Barooah, and Akriti      Bopanna,&lt;a href="https://cis-india.org/internet-governance/files/indias-contribution-to-internet-governance-debates"&gt; India's contribution to internet governance debates&lt;/a&gt; (NLUD Student Law Journal, 2018)&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&lt;em&gt;&lt;br /&gt;Blog Posts and Op-eds&lt;/em&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Arindrajit Basu, Irene Poetranto, and Justin Lau, &lt;a href="https://carnegieendowment.org/2021/05/19/un-struggles-to-make-progress-on-securing-cyberspace-pub-84491"&gt;The UN struggles to make progress in cyberspace&lt;/a&gt;&lt;em&gt;, Carnegie Endowment for International Peace&lt;/em&gt;, May 19th, 2021&lt;/li&gt;
&lt;li&gt;Andre’ Barrinha and Arindrajit Basu, &lt;a href="https://directionsblog.eu/could-cyber-diplomacy-learn-from-outer-space/"&gt;Could cyber diplomacy learn from outer space&lt;/a&gt;, &lt;em&gt;EU Cyber Direct&lt;/em&gt;, 20th April 2021&lt;/li&gt;
&lt;li&gt;Arindrajit Basu and Pranesh Prakash&lt;strong&gt;, &lt;/strong&gt;&lt;a href="https://www.thehindu.com/opinion/lead/patching-the-gaps-in-indias-cybersecurity/article34000336.ece"&gt;Patching the gaps in India’s cybersecurity&lt;/a&gt;, &lt;em&gt;The Hindu, &lt;/em&gt;6th March 2021&lt;/li&gt;
&lt;li&gt;Arindrajit Basu and Karthik Nachiappan, &lt;a href="https://www.leidensecurityandglobalaffairs.nl/articles/will-india-negotiate-in-cyberspace"&gt;Will India negotiate in cyberspace?&lt;/a&gt;, Leiden Security and Global Affairs blog,December 16, 2020&lt;/li&gt;
&lt;li&gt;Elizabeth Dominic, &lt;a href="https://cis-india.org/internet-governance/blog/the-debate-over-internet-governance-and-cyber-crimes-west-vs-the-rest"&gt;The debate over internet governance and cybercrimes: West vs the rest?&lt;/a&gt;,&lt;em&gt; Centre for Internet and Society, &lt;/em&gt;June 08, 2020&lt;/li&gt;
&lt;li&gt;Arindrajit Basu, &lt;a href="https://www.lawfareblog.com/indias-role-global-cyber-policy-formulation"&gt;&lt;em&gt;India’s role in Global Cyber Policy Formulation&lt;/em&gt;&lt;/a&gt;&lt;em&gt;, Lawfare, Nov 7, 2019&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;Pukhraj Singh, &lt;a href="https://cis-india.org/internet-governance/blog/guest-post-before-cyber-norms-let2019s-talk-about-disanalogy-and-disintermediation"&gt;Before cyber norms,let's talk about disanalogy and disintermediation&lt;/a&gt;, &lt;em&gt;Centre for Internet and Society, &lt;/em&gt;Nov 15th, 2019&lt;/li&gt;
&lt;li&gt;Arindrajit Basu and Karan Saini, &lt;a href="https://mwi.usma.edu/setting-international-norms-cyber-conflict-hard-doesnt-mean-stop-trying/"&gt;Setting International Norms of Cyber Conflict is Hard, But that Doesn’t Mean that We Should Stop Trying&lt;/a&gt;&lt;em&gt;, Modern War Institute, &lt;/em&gt;30th Sept, 2019&lt;/li&gt;
&lt;li&gt;Arindrajit Basu, &lt;a href="https://www.orfonline.org/expert-speak/politics-by-other-means-fostering-positive-contestation-and-charting-red-lines-through-global-governance-in-cyberspace-56811/"&gt;&lt;em&gt;Politics by other means: Fostering positive contestation and charting red lines through global governance in cyberspace&lt;/em&gt;&lt;/a&gt;&lt;em&gt; (Digital Debates, &lt;/em&gt;Volume 6, 2019&lt;em&gt;)&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;Arindrajit Basu&lt;em&gt;, &lt;/em&gt;&lt;a href="https://thewire.in/trade/will-the-wto-finally-tackle-the-trump-card-of-national-security"&gt;Will the WTO Finally Tackle the ‘Trump’ Card of National Security?&lt;/a&gt;&lt;em&gt; (The Wire, &lt;/em&gt;8th May 2019&lt;em&gt;)&lt;/em&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;em&gt;Policy Submissions&lt;/em&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Arindrajit Basu, &lt;a href="https://cis-india.org/internet-governance/blog/cis-comments-on-pre-draft-of-the-report-of-the-un-open-ended-working-group"&gt;CIS Submission to OEWG &lt;/a&gt;(Centre for Internet and Society, Policy      Submission, 2020)&lt;/li&gt;
&lt;li&gt;Aayush      Rathi, Ambika Tandon, Elonnai Hickok, and Arindrajit Basu. “&lt;a href="https://cis-india.org/internet-governance/blog/cis-submission-to-un-high-level-panel-on-digital-cooperation"&gt;CIS Submission to UN High-Level Panel on Digital      Cooperation&lt;/a&gt;.” Policy submission. Centre for Internet and      Society, January 2019.&lt;/li&gt;
&lt;li&gt;Arindrajit      Basu,Gurshabad Grover, and Elonnai Hickok. “&lt;a href="https://cis-india.org/internet-governance/blog/arindrajit-basu-gurshabad-grover-elonnai-hickok-january-22-2019-response-to-gcsc-on-request-for-consultation"&gt;Response to GCSC on Request for Consultation: Norm      Package Singapore&lt;/a&gt;.” Centre for Internet and Society, January      17, 2019.&lt;/li&gt;
&lt;li&gt;Arindrajit Basu and Elonnai Hickok. &lt;a href="https://cis-india.org/internet-governance/files/gcsc-response."&gt;Submission of Comments to the GCSC Definition of      ‘Stability of Cyberspace&lt;/a&gt; (Centre for Internet and Society,      September 6, 2019)&lt;/li&gt;&lt;/ol&gt;
&lt;ol&gt;&lt;/ol&gt;
&lt;h3&gt;Digital Trade and India's Political Economy&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;The modern trading regime and its institutions were born largely into a world bereft of the internet and its implications for cross-border flow and commerce. Therefore, regulatory ambitions at the WTO have played catch up with the technological innovation that has underpinned the modern global digital economy. Driven by tech giants, the “developed” world has sought to restrict the policy space available to the emerging world to impose mandates regarding data localisation, source code disclosure, and taxation - among other initiatives central to development. At the same time emerging economies have pushed back, making for a tussle that continues to this day. Our research has focussed both on issues of domestic political economy and data governance,and the implications these domestic issues have on how India and other emerging economies negotiate at the world stage.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Long-Form articles and essays&lt;/em&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Arindrajit Basu, Elonnai Hickok and Aditya Chawla,&lt;em&gt; &lt;/em&gt;&lt;a href="https://cis-india.org/internet-governance/blog/the-localisation-gambit-unpacking-policy-moves-for-the-sovereign-control-of-data-in-india"&gt;&lt;strong&gt;T&lt;/strong&gt;&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/the-localisation-gambit-unpacking-policy-moves-for-the-sovereign-control-of-data-in-india"&gt;he Localisation Gambit: Unpacking      policy moves for the sovereign control of data in India&lt;/a&gt;&lt;em&gt; (&lt;/em&gt;Centre for Internet and Society&lt;em&gt;, &lt;/em&gt;March 19, 2019)&lt;strong&gt;&lt;em&gt; &lt;/em&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Arindrajit Basu,&lt;a href="about:blank"&gt;Sovereignty in a datafied world: A framework for      Indian diplomacy&lt;/a&gt; in Navdeep Suri and Malancha Chakrabarty (eds) &lt;em&gt;A 2030 Vision for India’s Economic      Diplomacy &lt;/em&gt;(Observer Research Foundation 2021) &lt;/li&gt;
&lt;li&gt;Amber Sinha, Elonnai Hickok, Udbhav Tiwari and      Arindrajit Basu, &lt;a href="https://cis-india.org/internet-governance/files/mlat-report"&gt;Cross Border Data-Sharing and India &lt;/a&gt;(Centre      for Internet and Society, 2018)&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&lt;em&gt;Blog posts and op-eds &lt;/em&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Arindrajit Basu,&lt;a class="external-link" href="http://www.hinrichfoundation.com/research/article/wto/can-the-wto-build-consensus-on-digital-trade/"&gt; Can the WTO build consensus on digital trade,&lt;/a&gt; Hinrich Foundation,October 05,2021&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Amber Sinha, &lt;a href="https://thewire.in/tech/twitter-modi-government-big-tech-new-it-rules"&gt;The power politics behind Twitter versus Government of India&lt;/a&gt;, &lt;em&gt;The Wire&lt;/em&gt;, June 03, 2021&lt;/li&gt;
&lt;li&gt;Karthik Nachiappan and Arindrajit Basu, &lt;a href="https://www.thehindu.com/opinion/op-ed/shaping-the-digital-world/article32224942.ece?homepage=true"&gt;Shaping the Digital World&lt;/a&gt;, &lt;em&gt;The Hindu&lt;/em&gt;, 30th July 2020&lt;/li&gt;
&lt;li&gt;Arindrajit Basu and Karthik Nachiappan, &lt;a href="https://www.india-seminar.com/2020/731/731_arindrajit_and_karthik.htm"&gt;&lt;em&gt;India and the global battle for data governance&lt;/em&gt;&lt;/a&gt;, Seminar 731, 1st July 2020&lt;/li&gt;
&lt;li&gt;Amber Sinha and Arindrajit Basu, &lt;a href="https://scroll.in/article/960676/analysis-reliance-jio-facebook-deal-highlights-indias-need-to-revisit-competition-regulations"&gt;Reliance Jio-Facebook deal highlights India’s need to revisit competition regulations&lt;/a&gt;, &lt;em&gt;Scroll&lt;/em&gt;, 30th April 2020&lt;/li&gt;
&lt;li&gt;Arindrajit Basu and Amber Sinha, &lt;a href="https://thediplomat.com/2020/04/the-realpolitik-of-the-reliance-jio-facebook-deal/"&gt;The realpolitik of the Reliance-Jio Facebook deal&lt;/a&gt;, &lt;em&gt;The Diplomat&lt;/em&gt;, 29th April 2020&lt;/li&gt;
&lt;li&gt;Arindrajit Basu, &lt;a href="https://thediplomat.com/2020/01/the-retreat-of-the-data-localization-brigade-india-indonesia-and-vietnam/"&gt;&lt;em&gt;The Retreat of the Data Localization Brigade: India, Indonesia, Vietnam&lt;/em&gt;&lt;/a&gt;&lt;em&gt;, The Diplomat&lt;/em&gt;, Jan 10, 2020&lt;/li&gt;
&lt;li&gt;Amber Sinha and Arindrajit Basu, &lt;a href="https://www.epw.in/engage/article/politics-indias-data-protection-ecosystem"&gt;&lt;em&gt;The Politics of India’s Data Protection Ecosystem&lt;/em&gt;&lt;/a&gt;, &lt;em&gt;EPW Engage&lt;/em&gt;, 27 Dec 2019&lt;/li&gt;
&lt;li&gt;Arindrajit Basu and Justin Sherman, &lt;a href="https://www.lawfareblog.com/key-global-takeaways-indias-revised-personal-data-protection-bill"&gt;Key Global Takeaways from India’s Revised Personal Data Protection Bill&lt;/a&gt;, &lt;em&gt;Lawfare&lt;/em&gt;, Jan 23, 2020&lt;/li&gt;
&lt;li&gt;Nikhil Dave,“&lt;a href="https://cis-india.org/internet-governance/geo-economic-impacts-of-the-coronavirus-global-supply-chains-part-i"&gt;Geo-Economic Impacts of the Coronavirus: Global Supply Chains&lt;/a&gt;.” &lt;em&gt;Centre for Internet and Society&lt;/em&gt; , June 16, 2020.&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;International Law and Human Rights&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;International law and human rights are ostensibly technology neutral, and should lay the edifice for digital governance and cybersecurity today. Our research on international human rights has focussed on global surveillance practices and other internet restrictions employed by a variety of nations, and the implications this has for citizens and communities in India and similarly placed emerging economies. CIS researchers have also contributed to, and commented on World Intellectual Property Organization negotiations at the intersection of international Intellectual Property (IP) rules and the human rights.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Long-form article&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt; &lt;/em&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Arindrajit Basu, &lt;a href="https://cis-india.org/internet-governance/extra-territorial-surveillance-and-the-incapacitation-of-human-rights"&gt;Extra Territorial Surveillance      and the incapacitation of international human rights law&lt;/a&gt;, 12 NUJS LAW REVIEW 2 (2019)&lt;/li&gt;
&lt;li&gt;Gurshabad Grover and Arindrajit Basu, ”&lt;a href="https://cyberlaw.ccdcoe.org/wiki/Scenario_24:_Internet_blockage"&gt;Internet Blockage&lt;/a&gt;”(Scenario contribution to NATO CCDCOE Cyber      Law Toolkit,2021)&lt;/li&gt;
&lt;li&gt;Arindrajit Basu and Elonnai Hickok, &lt;a href="https://www.ijlt.in/journal/conceptualizing-an-international-framework-for-active-private-cyber-defence"&gt;Conceptualizing an international      framework for active private cyber defence &lt;/a&gt;(Indian Journal of Law and Technology, 2020)&lt;/li&gt;&lt;li&gt;Arindrajit Basu,&lt;a class="external-link" href="http://www.orfonline.org/wp-content/uploads/2021/10/Digital-Debates__CyFy2021.pdf"&gt;Challenging the dogmatic inevitability of extraterritorial state surveillance &lt;/a&gt;in Trisha Ray and Rajeswari Pillai Rajagopalan (eds) Digital Debates: CyFy Journal 2021 (New Delhi:ORF and Global Policy Journal,2021)&lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&lt;em&gt;Blog Posts and op-eds&lt;/em&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Arindrajit Basu, “&lt;a href="https://www.medianama.com/2020/08/223-american-law-on-mass-surveillance-post-schrems-ii/"&gt;Unpacking US Law And Practice On Extraterritorial Mass Surveillance In Light Of Schrems II&lt;/a&gt;”, &lt;em&gt;Medianama&lt;/em&gt;, 24th August 2020&lt;/li&gt;
&lt;li&gt;Anubha Sinha, “World Intellectual Property Organisation: Notes from the Standing Committee on Copyright Negotiations (&lt;a href="https://cis-india.org/a2k/blogs/wipo-sccr-41-notes-from-day-1"&gt;Day 1&lt;/a&gt;, &lt;a href="https://cis-india.org/a2k/blogs/wipo-sccr-41-notes-from-day-2"&gt;Day 2&lt;/a&gt;, &lt;a href="https://cis-india.org/a2k/blogs/wipo-sccr-41-notes-from-day-3-and-day-4-1"&gt;Day 3 and 4&lt;/a&gt;)”, July 2021&lt;/li&gt;&lt;li&gt;Raghav Ahooja and Torsha Sarkar,&lt;a class="external-link" href="http://www.lawfareblog.com/how-not-regulate-internet-lessons-indian-subcontinent"&gt;How (not) to regulate the internet:Lessons from the Indian Subcontinent&lt;/a&gt;,Lawfare,September 23,2021,&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;Bilateral Relationships&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Technology has become a crucial factor in shaping bilateral and plurilateral co-operation and competition. Given the geopolitical fissures and opportunities since 2020, our research has focussed on how technology governance and cybersecurity could impact the larger ecosystem of Indo-China and India-US relations. Going forward, we hope to undertake more research on technology in plurilateral arrangements, including the Quadrilateral Security Dialogue. &lt;/em&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Arindrajit Basu and Justin Sherman, &lt;a href="https://thediplomat.com/2021/03/the-huawei-factor-in-us-india-relations/"&gt;The Huawei Factor in US-India Relations&lt;/a&gt;,&lt;em&gt;The Diplomat&lt;/em&gt;, 22 March 2021&lt;/li&gt;
&lt;li&gt;Aman Nair, “&lt;a href="https://cis-india.org/internet-governance/blog/tiktok-it2019s-time-for-biden-to-make-a-decision-on-his-digital-policy-with-china"&gt;TIkTok: It’s Time for Biden to Make a Decision on His Digital Policy with China&lt;/a&gt;,” &lt;em&gt;Centre for Internet and Society&lt;/em&gt;, January 22, 2021,&lt;/li&gt;
&lt;li&gt;Arindrajit Basu and Gurshabad Grover, &lt;a href="https://thediplomat.com/2020/10/india-needs-a-digital-lawfare-strategy-to-counter-china/"&gt;India Needs a Digital Lawfare Strategy to Counter China&lt;/a&gt;, &lt;em&gt;The Diplomat&lt;/em&gt;, 8th October 2020&lt;/li&gt;
&lt;li&gt;Anam Ajmal, &lt;a href="https://timesofindia.indiatimes.com/blogs/toi-edit-page/the-app-ban-will-have-an-impact-on-the-holding-companies-global-power-projection-begins-at-home/"&gt;The app ban will have an impact on the holding companies...global power projection begins at home&lt;/a&gt;, &lt;em&gt;Times of India&lt;/em&gt;, July 7th, 2020 (Interview with Arindrajit Basu)&lt;/li&gt;
&lt;li&gt;Justin Sherman and Arindrajit Basu, &lt;a href="https://thediplomat.com/2020/03/trump-and-modi-embrace-but-remain-digitally-divided/"&gt;Trump and Modi embrace, but remain digitally divided&lt;/a&gt;, &lt;em&gt;The Diplomat&lt;/em&gt;, March 05th, 2020&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;Emerging Technologies&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Governance needs to keep pace with the technological challenges posed by emerging technologies, including 5G and AI. To do so an interdisciplinary approach that evaluates these scientific advances in line with the regimes that govern them is of utmost importance. While each country will need to regulate technology through the lens of their strategic interests and public policy priorities, it is clear that geopolitical tensions on standard-setting and governance models compels a more global outlook.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Long-Form reports&lt;/em&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Anoushka Soni and Elizabeth Dominic,&lt;a href="https://cis-india.org/internet-governance/legal-and-policy-implications-of-autonomous-weapons-systems"&gt; Legal and Policy implications of Autonomous weapons systems&lt;/a&gt; (Centre for Internet and Society, 2020)&lt;/li&gt;
&lt;li&gt;Aayush Rathi, Gurshabad Grover, and Sunil Abraham,&lt;a href="https://cis-india.org/internet-governance/blog/regulating-the-internet-the-government-of-india-standards-development-at-the-ietf"&gt; Regulating the internet: The Government of India &amp;amp; Standards Development at the IETF&lt;/a&gt; (Centre for Internet and Society, 2018)&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&lt;em&gt;Blog posts and op-eds&lt;/em&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Aman Nair, &lt;a href="https://cis-india.org/internet-governance/blog/would-banning-chinese-telecom-companies-make-5g-secure-in-india"&gt;Would banning Chinese telecom companies make India 5G secure in India?&lt;/a&gt; &lt;em&gt;Centre for Internet and Society&lt;/em&gt;, 22nd December 2020&lt;/li&gt;
&lt;li&gt;Arindrajit Basu and Justin Sherman&lt;strong&gt;, &lt;/strong&gt;&lt;a href="https://www.lawfareblog.com/two-new-democratic-coalitions-5g-and-ai-technologies"&gt;Two New Democratic Coalitions on 5G and AI Technologies&lt;/a&gt;, &lt;em&gt;Lawfare&lt;/em&gt;, 6th August 2020&lt;/li&gt;
&lt;li&gt;Nikhil Dave, &lt;a href="https://cis-india.org/internet-governance/blog/the-5g-factor."&gt;The 5G Factor: A Primer&lt;/a&gt;, &lt;em&gt;Centre for Internet and Society,&lt;/em&gt; July 20, 2020.&lt;/li&gt;
&lt;li&gt;Gurshabad Grover, &lt;a href="https://indianexpress.com/article/opinion/columns/huawei-ban-india-united-states-china-5755232/"&gt;The Huawei bogey&lt;/a&gt; &lt;em&gt;Indian Express&lt;/em&gt;, May 30th, 2019&lt;/li&gt;
&lt;li&gt;Arindrajit Basu and Pranav MB, &lt;a href="https://cis-india.org/internet-governance/blog/what-is-the-problem-with-2018ethical-ai2019-an-indian-perspective"&gt;What is the problem with 'Ethical AI'?:An Indian perspective&lt;/a&gt;, Centre for Internet and Society, July 21, 2019&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt; &lt;/em&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;(This compendium was drafted by Arindrajit Basu with contributions from Anubha Sinha. Aman Nair, Gurshabad Grover, and&amp;nbsp; Pranav MB reviewed the draft and provided vital insight towards its conceptualization and compilation&lt;/em&gt;. Dishani Mondal and Anand Badola provided important inputs at earlier stages of the process towards creating this compendium)&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/arindrajit-basu-september-24-2021-the-geopolitics-of-cyberspace-compendium-of-cis-research'&gt;http://editors.cis-india.org/internet-governance/blog/arindrajit-basu-september-24-2021-the-geopolitics-of-cyberspace-compendium-of-cis-research&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>arindrajit</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cyberspace</dc:subject>
    

   <dc:date>2021-11-15T14:48:49Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/livemint-june-22-2015-sunil-abraham-the-generation-of-e-emergency">
    <title>The generation of e-Emergency</title>
    <link>http://editors.cis-india.org/internet-governance/blog/livemint-june-22-2015-sunil-abraham-the-generation-of-e-emergency</link>
    <description>
        &lt;b&gt;The next generation of censorship technology is expected to be ‘real-time content manipulation’ through ISPs and Internet companies. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in &lt;a class="external-link" href="http://www.livemint.com/Politics/pL8oDtSth36hkoDvIjILLJ/The-generation-of-eEmergency.html"&gt;Livemint&lt;/a&gt; on June 22, 2015.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Censorship during the Emergency in the 1970s was done by clamping down on the media by intimidating editors and journalists, and installing a human censor at every news agency with a red pencil. In the age of both multicast and broadcast media, thought and speech control is more expensive and complicated but still possible to do. What governments across the world have realized is that traditional web censorship methods such as filtering and blocking are not effective because of circumvention technologies and the Streisand effect (a phenomenon in which an attempt to hide or censor information proves to be counter-productive). New methods to manipulate the networked public sphere have evolved accordingly. India, despite claims to the contrary, still does not have the budget and technological wherewithal to successfully pull off some of the censorship and surveillance techniques described below, but thanks to Moore’s law and to the global lack of export controls on such technologies, this might change in the future.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;First, mass technological-enabled surveillance resulting in self-censorship and self-policing. The coordinated monitoring of Occupy protests in the US by the Department of Homeland Security, the Federal Bureau of Investigation (FBI) counter-terrorism units, police departments and the private sector showcased the bleeding edge of surveillance technologies. Stingrays or IMSI catchers are fake mobile towers that were used to monitor calls, Internet traffic and SMSes. Footage from helicopters, drones, high-res on-ground cameras and the existing CCTV network was matched with images available on social media using facial recognition technology. This intelligence was combined with data from the global-scale Internet surveillance that we know about thanks to the National Security Agency (NSA) whistle-blower &lt;a class="external-link" href="http://www.livemint.com/Search/Link/Keyword/Edward%20Snowden"&gt;Edward Snowden&lt;/a&gt;, and what is dubbed “open source intelligence” gleaned by monitoring public social media activity; and then used by police during visits to intimidate activists and scare them off the protests.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Second, mass technological gaming—again, according to documents released  by Snowden, the British spy agency, GCHQ (Government Communications  Headquarters), has developed tools to seed false information online,  cast fake votes in web polls, inflate visitor counts on sites,  automatically discover content on video-hosting platform and send  takedown notices, permanently disable accounts on computers, find  private photographs on Facebook, monitor Skype activity in real time and  harvest Skype contacts, prevent access to certain websites by using  peer-to-peer based distributed denial of service attacks, spoof any  email address and amplify propaganda on social media. According to &lt;i&gt;The Intercept&lt;/i&gt;,  a secret unit of GCHQ called the Joint Threat Research Intelligence  Group (JTRIG) combined technology with psychology and other social  sciences to “not only understand, but shape and control how online  activism and discourse unfolds”. The JTRIG used fake victim blog posts,  false flag operations and honey traps to discredit and manipulate  activists.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Third, mass human manipulation. The exact size of the Kremlin troll army  is unknown. But in an interview with Radio Liberty, St. Petersburg  blogger Marat Burkhard (who spent two months working for Internet  Research Agency) said, “there are about 40 rooms with about 20 people  sitting in each, and each person has their assignments.” The room he  worked in had each employee produce 135 comments on social media in  every 12-hour shift for a monthly remuneration of 45,000 rubles.  According to Burkhard, in order to bring a “feeling of authenticity”,  his department was divided into teams of three—one of them would be a  villain troll who would represent the voice of dissent, the other two  would be the picture troll and the link troll. The picture troll would  use images to counter the villain troll’s point of view by appealing to  emotion while the link troll would use arguments and references to  appeal to reason. In a day, the “troika” would cover 35 forums.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The next generation of censorship technology is expected to be  “real-time content manipulation” through ISPs and Internet companies. We  have already seen word filters where blacklisted words or phrases are  automatically expunged. Last week, Bengaluru-based activist Thejesh GN  detected that Airtel was injecting javascript into every web page that  you download using a 3G connection. Airtel claims that it is injecting  code developed by the Israeli firm Flash Networks to monitor data usage  but the very same method can be used to make subtle personalized changes  to web content. In China, according to a paper by Tao Zhu et al titled &lt;i&gt;The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions&lt;/i&gt;,  “Weibo also sometimes makes it appear to a user that their post was  successfully posted, but other users are not able to see the post. The  poster receives no warning message in this case.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;More than two decades ago, John Gilmore, of Electronic Frontier  Foundation, famously said, “the Net interprets censorship as damage and  routes around it.” That was when the topology of the Internet was highly  decentralized and there were hundreds of ISPs that competed with each  other to provide access. Given the information diet of the average  netizen today, the Internet is, for all practical purposes, highly  centralized and therefore governments find it easier and easier to  control.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/livemint-june-22-2015-sunil-abraham-the-generation-of-e-emergency'&gt;http://editors.cis-india.org/internet-governance/blog/livemint-june-22-2015-sunil-abraham-the-generation-of-e-emergency&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2015-06-29T16:40:54Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/international-school-on-digital-transformation">
    <title>The Gary Chapman International School on Digital Transformation — Deadline Expires on April 30 </title>
    <link>http://editors.cis-india.org/news/international-school-on-digital-transformation</link>
    <description>
        &lt;b&gt;The application period for the Gary Chapman International School on Digital Transformation is now open! The deadline for applications is April 30, 2011.&lt;/b&gt;
        
&lt;p&gt;The UT Austin Portugal program is now accepting applications for the third annual International School on Digital Transformation, to be held July 17-22 in Porto, Portugal. Advanced students and emerging professionals, social entrepreneurs, and activists from around the world with an interest in digital technology and the enrichment of civil society are invited to apply.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;For the past two years, this intensive residential program has brought together scholars, policy experts, community advocates, designers, and hackers to explore the potential for digital media to empower citizens, strengthen communities, and contribute to a more vibrant civil society. The School is named for Gary Chapman, an internationally renowned Internet policy expert and member of the faculty at the LBJ School of Public Affairs at UT Austin who founded this innovative program and passed away suddenly last year. His life continues to inspire the School.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The School is conducted in English and in previous years has attracted faculty and participants from Portugal, South Africa, Finland, India, the U.K., the U.S., and Brazil, among many other countries. During the week, innovators in digital communications serve as teachers and mentors, presenting current projects and engaging in discussion. Faculty and students will be regarded as peers during the School.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Participants of the School will have the opportunity to present and discuss their own projects with those having similar interests, and explore ways to further develop their work. Additionally, members will collaborate on group projects involving digital media and civil society. Consisting of approximately 40 participants and 15 faculty, the School seeks to create an atmosphere of scholarly collegiality, fostering dialogue among diverse perspectives including those of design, policy, activist, and research backgrounds. The daily schedule will include time for presentations, bar camp style meetings, and informal conversations among faculty and students.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The School’s program for 2011 will focus on these themes:&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;Information access and open civic discourse&lt;/li&gt;&lt;li&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;Digital tools for government transparency&lt;/li&gt;&lt;li&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;Evolving Internet content regulation and the public’s right to information&lt;/li&gt;&lt;li&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;Digital media and the democratic process&lt;/li&gt;&lt;li&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;Factors influencing the growth of online civic engagement&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;The School will be held at the Hotel Eurostars Das Artes, a four-star hotel near the heart of Porto’s historic district, an area renowned for its active arts culture, wine, architecture, and breathtaking views. A link to the hotel site is below.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Participant fees are:&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&amp;nbsp;&amp;nbsp; 370 Euros, which includes&lt;/li&gt;&lt;/ul&gt;
&lt;ol&gt;&lt;li&gt;Six nights of lodging in a single room at the Eurostars Das Artes&lt;/li&gt;&lt;li&gt;Six days of breakfasts at the hotel (Monday-Saturday)&lt;/li&gt;&lt;li&gt;Six dinners at a local restaurant (Sunday-Friday)&lt;/li&gt;&lt;li&gt;The daily program of meetings, with coffee breaks&lt;/li&gt;&lt;li&gt;An evening cultural activity&amp;nbsp;&lt;/li&gt;&lt;/ol&gt;
&lt;ul&gt;&lt;li&gt;170 Euros for UT-Austin-Portugal PhD Program students (this includes the items listed above, minus hotel and breakfast. Students will be asked to pay an additional charge for lodging, unless they are based in Porto andwish to stay at home.)&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;All participants should expect to pay for travel to and from Porto, lunches, and any incidental expenses such as bar tabs and outings to cafes or other Porto sites not included in the official agenda.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The Gary Chapman International School on Digital Transformation is organized by the UT Austin-Portugal program, a cooperative endeavor between the University of Texas at Austin and some of the top universities of Portugal. The co-directors of the School are Dr. Sharon Strover of the University of Texas at Austin and Dr. Artur Pimenta Alves of the University of Porto. &amp;nbsp;More details on the program will be added and updated as they are confirmed.&amp;nbsp;&lt;br /&gt;&amp;nbsp;&lt;br /&gt;The Eurostars Das Artes is a deluxe hotel located near many shops, restaurants, and art galleries and about a 20-minute walk to the Praça da Ribeira, at the shores of the Douro River. More information may be found &lt;a class="external-link" href="http://www.eurostarshotels.com/en/hotels-in-portugal-porto.html"&gt;here&lt;/a&gt;.&amp;nbsp;For more information on the broader program, please see &lt;a class="external-link" href="http://utaustinportugal.org/"&gt;this&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;There is limited space and the final deadline for applications is April 30. &amp;nbsp;For questions regarding the program or call for applications, please contact Karen Gustafson at kegustafson@gmail.com.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;Read the original news &lt;a class="external-link" href="http://digitaltransformationschool.org/2011/"&gt;here&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/international-school-on-digital-transformation'&gt;http://editors.cis-india.org/news/international-school-on-digital-transformation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2011-04-26T06:23:02Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/research/conferences/conference-blogs/picnic">
    <title>The Future of Journalism: EJC @ Picnic 2010</title>
    <link>http://editors.cis-india.org/research/conferences/conference-blogs/picnic</link>
    <description>
        &lt;b&gt;Nishant Shah was a speaker at the PICNIC 2010, in Amsterdam, where he made a presentation titled "Citizens in the time of Database Democracies : Information ecology and role of participatory technologies in India"

&lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;The
relationship between citizenship and government informatics have
historically
been shaped through a series of debates around questions of
citizenship,
security, State-market collaborations, and right based discourse in
India. Even
before the information explosion caused by the emergence of digital and
internet technologies, there has been a strident discourse around
participatory democracy and technology mediated governance as&amp;nbsp; ways of
empowering the citizen's access to rights and resources in the country.
With the emergence of new technologies of storage,
retrieval and dissemination, these expectations have become more
visible.&amp;nbsp; The Indian Government has
officially accepted the transition to become a S.M.A.R.T.&amp;nbsp;
(Simple, Moral, Accountable, Responsible and
Transparent) State, with the rise of&amp;nbsp; 'Netizens' who, in their access
to new digital and internet technologies will change the very shape and
structure of governance.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;However,
as the digital infrastructure develops and new kinds of citizen
services and consumption come to the fore,
battle-lines are being drawn between stakeholders. On the one hand are
those
who believe that this might be the opening of a Pandora’s Box for a
country
like India where a stark digital divide might create great inequality
in citizens' access to State services and resources, producing unjust
and discriminatory structures based on access, bandwidth and education.
. On the other
hand are those who celebrate the need for transparency, participation
and access to governmentality that these e-governance initiatives usher
in, addressing long standing questions of plutocratic governance,
bureaucratic systems of denial of rights and widespread corruption.&amp;nbsp;
Both the warring factions draw upon partial data – of
failed attempts and projects by different government initiatives to
pilot
studies initiated by different government and civil society
organisations
respectively – to make their arguments for and against the emergence of
a 'Database Democracy' .premised on participatory politics facilitated
by new media practices in the country.&lt;/p&gt;
&lt;p&gt;Especially
with the current rolling out of a Unique Identity Project (named Aadhar
– The
Hindi word for ‘Support’) these discussions have become more severe and
the
arguments have become angrier. It is not only timely but also necessary
to
examine the ecology of participatory technologies and processes in the
country in order
to look at the different sides of the debates and explore the role that
new media practitioners and stakeholders&amp;nbsp; would play in efficiently and
responsibly establishing a protocol
of open and transparent governance structures without compromising
either the privacy,
rights or safety of the citizens. This presentation explores the
project Aadhar as symptomatic of a changing relationship between the
State and its Citizens mediated by ICT technologies and stakeholders,
to look at the ways in which new Citizenships are being forged in
emerging information societies like India.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;More news about the panel on Future of Journalism, arranged by the European Journalism Commission, is available at&lt;/p&gt;
&lt;p&gt;http://futureofjournalism.net/index.php/EJC_at_PICNIC2010&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/research/conferences/conference-blogs/picnic'&gt;http://editors.cis-india.org/research/conferences/conference-blogs/picnic&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Conference</dc:subject>
    
    
        <dc:subject>Digital Activism</dc:subject>
    
    
        <dc:subject>Digital Governance</dc:subject>
    

   <dc:date>2010-10-13T07:13:29Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/www-deccan-chronicle-sep-16-2012-sunil-abraham-the-five-monkeys-and-ice-cold-water">
    <title>The Five Monkeys &amp; Ice-cold Water</title>
    <link>http://editors.cis-india.org/internet-governance/www-deccan-chronicle-sep-16-2012-sunil-abraham-the-five-monkeys-and-ice-cold-water</link>
    <description>
        &lt;b&gt;The Indian government provides leadership, both domestically and internationally, when it comes to access to knowledge.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This article by Sunil Abraham was published in &lt;a class="external-link" href="http://www.deccanchronicle.com/360-degree/five-monkeys-ice-cold-water-213"&gt;Deccan Chronicle&lt;/a&gt; on September 16, 2012.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Our domestic patent policy ensures that generic medicines are available and largely affordable not only within India but also in Africa and elsewhere. It also allows Indians to consume a wide range of technological innovations without worrying about legal bans that are an otherwise common feature in the developed countries, thanks to phenomena such as the ongoing mobile phone patent wars.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Copyright policy, including the last amendment of the copyright act, has ensured that fair dealing and the rights of students, researchers, disabled, etc., are protected. Texts, audio and video for education and entertainment are relatively affordable, especially in comparison to other countries in the Asia-Pacific.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even at the World Intellectual Property Organisation, other developing countries look to India for guidance. The interventions of the copyright registrar G.R. Raghavender and the Indian team won praise during the most recent round of negotiations for the Treaty for the Visually Impaired. An excellent example of India's soft power protecting public interest at home and abroad.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In diametrical contrast, India has a terrible track record when it comes to freedom of expression, especially expression mediated by networked technologies such as telecommunications and the Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Our policy-makers seem determined to extinguish the privacy of communications and also anonymous/pseudonymous speech through such devices as Know Your Customer (KYC) and data retention requirements for accessing the Internet through cyber-cafes, mobile phones, dial-up or broadband, ban on open wi-fi networks, plans to tie together Aadhaar and NATGRID and Central Monitoring System (CMS) to track a citizen using his/her UID across devices, networks and intermediaries, and requiring real-time interception equipment to be installed at all network and data centres.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;All these without any horizontal privacy law or a data protection law that is compliant with international best practices. Security hawks argue that this pervasive, multi-tiered surveillance regime helps thwart criminal and terrorist attacks, but its poor design extracts a terrible price in terms of freedom of expression.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Citizens who cannot express themselves anonymously and privately begin to censor themselves, seriously undermining our democracy, which is most importantly founded on an anonymous expression, the electoral ballot.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition, in April 2011, rules under the amended IT Act were notified for intermediaries that have a chilling effect on free speech via unclear and unconstitutional limits on freedom of expression, encouragement of private censorship without any notice to those impacted, missing procedure for redress, and lack of penalties for those who abuse the rules to target legitimate speech. This was followed by calls for proactive censorship of social media, which caused much outrage amongst the twitterati.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even when the government had legitimate grounds (the recent exodus of North-East Indians) to censor free speech, it overreached and acted incompetently, cracking down on parody accounts on social media rather than carefully configuring the text message ban. As if that weren't enough, the government beats up a cartoonist and jails him for sedition.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There’s a plan behind such attacks on free speech. The powerful in India, with their fragile egos, can afford expensive lawyers who can ensure that for those who dare to speak their mind, “the process is the punishment”, as Lawrence Liang of the Alternative Law Forum put it. Needless to say, cartoonists and others that dare to speak their mind cannot usually afford the time and expense of courts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An experiment featuring monkeys, bananas and ice-cold water, commonly attributed to the late American psychologist Harry Harlow, explains what’s being attempted by those who attack free speech. First, five monkeys are put in a cage with bananas hanging from the top that can be reached by climbing a ladder. Every time one of the monkeys try to climb the ladder, ice-cold water is thrown on all of them. Soon, the monkeys learn not to climb the ladder.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Then, one of them is replaced with a monkey that has never been drenched with ice-cold water. When the new monkey tries to climb the ladder, the other four monkeys attack it and prevent it from reaching the banana. This is continued till all the original monkeys are replaced with new ones.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When that’s done, although none of the monkeys left in the cage has ever been drenched with ice-cold water, they continue to enforce the regulation on themselves. This is what has happened in China. This is what is being attempted here – to social engineer the Indian netizen.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/www-deccan-chronicle-sep-16-2012-sunil-abraham-the-five-monkeys-and-ice-cold-water'&gt;http://editors.cis-india.org/internet-governance/www-deccan-chronicle-sep-16-2012-sunil-abraham-the-five-monkeys-and-ice-cold-water&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-10-30T10:43:38Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/a2k/blogs/epw-vol-xlviii-42-october-19-2013-sunil-abraham-the-fight-for-digital-sovereignty">
    <title>The Fight for Digital Sovereignty</title>
    <link>http://editors.cis-india.org/a2k/blogs/epw-vol-xlviii-42-october-19-2013-sunil-abraham-the-fight-for-digital-sovereignty</link>
    <description>
        &lt;b&gt;It is time to incorporate free software principles to address the issue of privacy. Thanks to the revelations of Edward Snowden, a former contractor to the United States (US) National Security Agency (NSA) who leaked secrets about the agency’s surveillance programmes, a 24-year-old movement aimed at protecting the rights of software users and developers has got some fresh attention from policymakers.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://www.epw.in/postscript/fight-digital-sovereignty.html"&gt;published in the Economic &amp;amp; Political Weekly&lt;/a&gt;, Vol-XLVIII No. 42, October 19, 2013&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The free and open source software movement (often collectively labelled  as FOSS or sometimes FLOSS, with the “l” standing for “libre”)  guarantees four freedoms through a copyright licence – the freedom to  use for any purpose, the freedom to study the code, the freedom to  modify it and the freedom to distribute the modified code gratis or for a  fee. Free software principles have permeated the world in the form of  movements around open standards, open content, open access and open  data. The second freedom is the most critical in an open society.  Privacy, security and integrity are best achieved through the  transparency guaranteed by free software rather than the opacity of  proprietary software.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Free software is directly useful in deciding on the software required  for your device operating system and applications. NSA’s surveillance  programme covered operating system vendors like Microsoft and Apple, and  application vendors like Skype. The concerns raised by such  surveillance programmes are best addressed by shifting to free software.  Increasingly, this is possible on mobile devices because of the  availability of Android derivatives that keep Google’s nose out of your  business and on other personal computing devices through GNU/Linux  distributions such as Ubuntu. Ideally, this should be accomplished by a  mandate for government and public infrastructure in specific areas where  free software alternatives are on par with proprietary competitors. Two  other policy options remain outside procurement policies for hardware –  code escrow and independent audits. Firms that are willing to share  code with the government should be preferred over those that do not,  thereby encouraging proprietary software companies to provide for the  second freedom in free software within a limited context. Code escrow  could improve the quality of the independent audit.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unfortunately, open hardware based on free software principles is  still a fringe phenomenon in terms of market share. The Indian  government cannot afford bans on foreign products, unlike the  intelligence and military of Australia, the US, Britain, Canada and New  Zealand, which recently prohibited the use of Lenovo machines in  “secret” and “top secret” networks. Last October, the US government  banned US telecos from using equipment from Huawei and ZTE. Both these  bans are not based on any credible public evidence regarding back doors  in any of the products manufactured by these Chinese companies. The  Indian government, using funds like the Universal Service Obligation  Fund, should support competitive research to reverse-engineer and  analyse all foreign and indigenous hardware to ensure that there is no  national security threat or infringement on the individual’s right to  privacy. One example would be a research project to determine whether  China-manufactured phones call home when they are used on Indian telecom  networks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Cloud and other online services run by corporations could also  completely undermine privacy and security. This again can be partially  addressed through the transparency enabled by free software and open  standards. To begin with, the government must ban the use of Google,  Yahoo, Hotmail, etc, for official purposes by those in public office,  law enforcement and the military, while simultaneously mandating the use  of cryptography for all sensitive material and communication. It should  not, however, mandate the use of National Informatics Centre (NIC)  infrastructure as it may be a single point of failure; instead, a  variety of open-standards-compliant and free-software-based  infrastructure for all public sector information communication  technology (ICT) requirements should be encouraged. This procurement  bias will result in the growth of domestic server administration and  security competence, thus creating and contributing towards the  establishment of a market for affordable privacy and security-enhanced  services that ordinary citizens and private sector organisations can  access.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The end objective through means such as free software, open hardware,  code escrow and independent audits is sovereignty over software,  hardware, cloud and network infrastructure. However, the state, the  private sector, the consumer and the citizen may disagree on the  details. Apart from law enforcement and national security concerns that  may require targeted surveillance, there are other occasions when  technological possibilities may have to be curtailed through policy to  protect human rights and the public interest. For example, to implement  the internationally accepted privacy principle of notice on electronic  recording devices, some jurisdictions may require that video recorders  display a blinking red light and that digital cameras make an audible  click sound just like analog cameras. This was first initiated in South  Korea to reduce the incidence of “upskirt photography”. This type of law  may become more commonplace when technologies like Google Glass become  more popular. In other words, absolute digital sovereignty may need to  be curtailed in order to protect human rights in certain circumstances.  But code could be used to resist regulation through law, thereby  converting both the software and hardware layers of devices and networks  into a battleground for sovereignty between the free software hacker  and the state.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/a2k/blogs/epw-vol-xlviii-42-october-19-2013-sunil-abraham-the-fight-for-digital-sovereignty'&gt;http://editors.cis-india.org/a2k/blogs/epw-vol-xlviii-42-october-19-2013-sunil-abraham-the-fight-for-digital-sovereignty&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    

   <dc:date>2013-10-25T07:29:22Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/the-fifth-elephant">
    <title>The Fifth Elephant in Bangalore</title>
    <link>http://editors.cis-india.org/news/the-fifth-elephant</link>
    <description>
        &lt;b&gt;HasGeek is organizing the Fifth Elephant in Bangalore at NIMHANS Convention Centre on July 25 and 26, 2014. The Centre for Internet and Society is a community outreach partner with HasGeek.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Facebook           has 100 million users in India. You know who has a billion?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The           Indian Census.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://hasgeek.tv/fifthelephant/2013-2/890-a-billion-snapshots-principles-and-processes-in-the-census-of-india" target="_blank"&gt;Varsha             Joshi, Director of the National Population Register, was             present at The Fifth Elephant 2013 to explain on how the             census team collects and processes such a vast amount of             data.&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Each           year, The &lt;a href="http://fifthelephant.in/2014" target="_blank"&gt;Fifth             Elephant&lt;/a&gt; conference brings consumers and producers of           technology to understand how data is processed (via available           technologies), insights mined from datasets in different           domains, and opportunities that data presents for economy and           society. The key differentiator of The Fifth Elephant           conference is that the content is crowdsourced and carefully           curated by a panel of experts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;HasGeek,           organizer of The Fifth Elephant, also shares a strong           commitment to open access, open knowledge and open data. We           ensure that every edition of The Fifth Elephant has           representatives from the government –– either officials           themselves or technology teams working on important data           projects –– addressing citizens’ concerns around privacy and           protection of data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2012, we had &lt;a href="https://hasgeek.tv/fifthelephant/2012-2/64-aadhaar-worlds-largest-biometric-identity-platform" target="_blank"&gt;Pramod             Varma and Regunath B. speaking about the Aadhar project&lt;/a&gt; alongside &lt;a href="https://hasgeek.tv/fifthelephant/2012-2/536-the-data-journalism-handbook" target="_blank"&gt;Lucy             Chambers’ presentation on the OKF’s work with data             journalism&lt;/a&gt;, &lt;a href="https://hasgeek.tv/fifthelephant/2012-2/535-nikhil-pahwa-rti-and-data-opportunities-issues-and-challenges" target="_blank"&gt;Nikhil             Pahwa’s on RTI&lt;/a&gt; and &lt;a href="https://hasgeek.tv/fifthelephant/2012-2/533-riju-the-art-of-nsso-data" target="_blank"&gt;Sumandro’s             on NSSO data&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In           2013, Varsha Joshi talked to participants about the challenges           that the census faces in collating data.&lt;br /&gt; This year, we have invited Mr. Ram Sewak Sharma, secretary of           Department of Electronics and Information Technology (DEITY),           to talk about the state of government data and how citizens           can participate in strengthening government’s efforts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Why           should you attend The Fifth Elephant?&lt;br /&gt; The Fifth Elephant is a relevant event for data geeks and           enthusiasts, NGOs, journalists and members of advocacy groups           not just from the immediate standpoint of open data. This           year’s edition also brings talks from finance and healthcare           where speakers will talk about the challenges of working with           complex financial datasets, data security and privacy concerns           in the field of genomics, and related concerns. S. Anand will           speak about what it took – in terms of technology           infrastructure and data visualization – to do &lt;a href="https://funnel.hasgeek.com/fifthel2014/1146-scaling-real-time-visualisations-for-elections-201" target="_blank"&gt;real-time             visualizations for the recently concluded Indian elections&lt;/a&gt;.           Participants will also get a flavour of frameworks – &lt;a href="https://funnel.hasgeek.com/fifthel2014/1177-analytics-on-large-scale-unstructured-dynamic-data" target="_blank"&gt;Lambda&lt;/a&gt;, &lt;a href="https://funnel.hasgeek.com/fifthel2014/1182-the-state-of-julia-a-fast-language-for-technical-c" target="_blank"&gt;Julia&lt;/a&gt;,&lt;a href="https://funnel.hasgeek.com/fifthel2014/1165-scaling-spatial-data-openstreetmap-as-infrastructu" target="_blank"&gt;OSM&lt;/a&gt; –           and how these are used for building tools and platforms for           mining data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We           welcome you to participate in the discussions and enrich           interactions at the conference.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Schedule: &lt;a href="https://fifthelephant.in/2014/conference" target="_blank"&gt;https://fifthelephant.in/2014/conference&lt;/a&gt;&lt;br /&gt; Registrations: &lt;a href="http://fifthelephant.doattend.com/" target="_blank"&gt;http://fifthelephant.doattend.com&lt;/a&gt;&lt;br /&gt; For more information, write to &lt;a href="mailto:support@hasgeek.com" target="_blank"&gt;support@hasgeek.com&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/the-fifth-elephant'&gt;http://editors.cis-india.org/news/the-fifth-elephant&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2014-07-16T11:02:15Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/draft-electronic-delivery-services">
    <title>The Draft Electronic Delivery of Services Bill, 2011 – Comments by CIS</title>
    <link>http://editors.cis-india.org/internet-governance/blog/draft-electronic-delivery-services</link>
    <description>
        &lt;b&gt;The Draft Electronic Delivery of Services Bill, 2011 (“Bill”) is a Bill to provide for delivery of government services manadatorily through electronic means by phasing out manual delivery of services. It is heartening to note that the Bill shifts the approach to electronic delivery of services by Government agencies to one as part of the citizens' right to service delivery through electronic means rather than a luxury or benefit doled out by the Government. The Bill introduces bodies exclusively accountable for ensuring that electronic delivery of services by the Government at the state and central levels. While this is a welcome move on the part of the Government there are a few comments we, at the Centre for Internet and Society, have on the present version of the Bill:&lt;/b&gt;
        
&lt;ol&gt;&lt;li&gt;Accessibility&lt;br /&gt;The Bill does not make it mandatory for all 
Government services to be accessible to all including persons with 
disabilities. The Bill refers to the term “access”, as defined in 
Section 2(1)(a) from the prespective of merely gaining physical access 
to the services or availability of such services1 rather than from the 
perspective of catering to the ability of a person with print (or other)
 disbilities from gaining access to the services in the normal format. 
It is very important that the electronic services are delivered in a 
format which is accessible to all persons including persons with 
disbilities, elderly persons etc. It should be mandatory for the 
Government to comply with Web Content Accessibility Guidelines (WCAG) 
and National Informatics Centre (NIC) guidelines for web accessibility. 
It is also important to ensure accessibility of all documents produced 
during service delivery by Government agencies.&lt;/li&gt;&lt;li&gt;Linguistic Accessibility&amp;nbsp;&lt;br /&gt;Section
 5(2)(b) of the Bill requires the Government to prescribe a framework 
for all its agencies to ensure web presence or enablement which refers 
to rendering electronic services in the language chosen by the user. In 
pursuance of the same, it is important for delivery of services to be 
available in all national languages of India to begin with in addition 
to the content being encoded in Unicode font for all languages. It is 
important to note that there are not many open fonts available for 
Indian languages. Hence, it must be ensured that the Government 
allocates sufficient funds to ensure linguistic accessbility of the 
services delivered, while ensuring implementation of the provisions of 
the Bill.&lt;/li&gt;&lt;li&gt;Public Scrutiny&amp;nbsp;&lt;br /&gt;In order to ensure transparency of
 Government services and process of service delivery, it is essential 
that the Bill incorporates a provision to enable citizens to gain access
 to information provided by the Government as part of the service 
delivery process unless disclosing such information would amount to 
violation of any applicable law. Similarly, provision should be made for
 making public all RTI applications filed with the Government and 
responses to them.&lt;/li&gt;&lt;li&gt;Use of Free and Open Source Software&lt;br /&gt;Considering
 that electronic service delivery by Government agencies is effected 
through public money, it is important that Governments are urged to use 
Free and Open Source Software (FOSS) for service delivery. This cuts 
costs to a great extent and also make the process more transparent and 
capable of customisation to varied needs of different departments. It is
 important to insert a provision requiring the Government to use FOSS as
 far as possible and in the event of any use of proprietary software, 
the Government should clearly explain the reason for such use, the costs
 incurred for the same, the additional benefit derived out of its use 
and other relevant details.&lt;/li&gt;&lt;li&gt;Open Standards&lt;br /&gt;The Bill must 
stress on use of open standards for all computer resources and service 
delivery systems by Government agencies. As is the case with FOSS, such 
use brings down operation costs drastically and makes the service 
delivery process transparent and available for all to use. Use of ODF 
formats for documents, HTML for websites, ISA standards for hardware is 
recommended. It is also useful to ensure compliance with W3C guidelines 
by the concerned Government departments during implementation of the 
Bill.&lt;/li&gt;&lt;li&gt;Whistleblower Exception&lt;br /&gt;The Bill does not contain any 
safeguards to ensure free and fearless disclosure of any wilful 
violation of the law impacting larger public interest. It is important 
to include a provision protecting any person exposing any violation of 
the provisions of the Bill or blowing the cover off any scam or 
farudulent activity decieving the public committed by service providers 
under the Bill. Such protection can be given by ensuring that the 
actions of such whistleblower, to the extent required for the exposure, 
does not constitute an offence under the provisions of the Bill.&lt;/li&gt;&lt;li&gt;Penalties for Offences&lt;br /&gt;
&lt;ul style="list-style-type: square;"&gt;&lt;li&gt;Chapter 4 of the Bill gives a 
detailed list of acts constituting an offence under the Act including 
Section 15 which specifically relates to offences by companies. It is 
critical to ensure that the punishment and penalities for offences 
extend not only to citizens and companies but also to Government 
officials who misuse information they are&amp;nbsp;privy to under the provisions 
of the Bill. In fact, a separate provision specifically applicable to 
the various offences which could be committed by Government officials 
under the Bill can reduce misuse of its provisions by the Government.&lt;/li&gt;&lt;li&gt;It
 is to be noted that several provisions listed under Chapter 4 of the 
Bill covering offences and penalties are a reproduction of the 
provisions for the same under the Information Technology Act, 2000 (“IT 
Act”). Such reprodution is unnecessary and acts which are already deemed
 to be offences and have punishments prescribed for them under the IT 
Act (or any other legislation for the time being in force in India) need
 not be covered again in the Bill. This will avoid duplication and 
confusion in the legislations.&lt;/li&gt;&lt;li&gt;Section 19(1) of the Bill 
provides that no alleged offence under the Bill can be tried in a court 
of law unless the Central Electronic Delivery of Services Commissioner 
(“Central Commissioner”) or the State Electronic Delivery of Services 
Commissioner (“State Commissioner”) authorises the same by issuing a 
complaint in this regard to the relevant court. This provision directly 
conflicts with a citizen's constitutional right to seek legal redress 
since it takes away his freedom to approach a court of law for redressal
 of his grievance without the permission of the Commissioners. It is 
recommended that the provision be either deleted or suitably modify so 
that it is not in violation of this constitutional right.&lt;/li&gt;&lt;/ul&gt;
&lt;/li&gt;&lt;li&gt;Bottoms up Approach&lt;br /&gt;A decentralised approach should be 
adopted along the lines of the Panchayati Raj system giving the citizen a
 greater say in the framework and implementation of service delivery by 
Government agencies. Implementation can be at the Panchayat and District
 levels apart from State levels. Citizens must be able to access and 
update their information. Furthermore, they should be able to define to a
 certain extent, access control to their information. This will 
automatically make them eligible or ineligible for various government 
services.&amp;nbsp;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Charges for service delivery&lt;br /&gt;Section 4 
of the Bill authorises the Government to allow service providers to 
collect charges for electronic service delivery while Section 3(2) 
provides for the Government to regulate the manner and method of payment
 of such charges. It is critical to ensure that such charges levied 
under the provisions of the Bill do not exceed the charges levied by the
 Government agency for manual delivery of services. Charges for manual 
service delivery may include charges for photocopy, printing, paper, 
postage etc., all of which are totally eliminated during service 
delivery through electronic means. Thus, levying the same charges, let 
alone greater charges for electronic service delivery is totally 
unnecessary and places an additional burden on the citizen ultimately 
defeating the very purpose of the Bill.&amp;nbsp;&lt;/li&gt;&lt;li&gt;Security in payment of charges&lt;br /&gt;Section
 3(2) of the Bill provides for the Government to regulate the manner and
 method of payment of charges for delivery of services.It is important 
that each transaction that takes place is done securely and without the 
exposure of an individuals confidential details. There are many ways to 
structure the transaction of payment of fees to achieve this goal. We 
reccommend that the SCOSTA smart card structure is used for completing 
and processing a transaction.&amp;nbsp;&lt;/li&gt;&lt;li&gt;Data Security and Privacy&lt;br /&gt;Section
 5(1)(e) of the Bill requires the Government to ensure integrity, 
security and confidentiality of data collected, preserved and retained. 
We recommend that in addition to this, the Government also ensures 
integrity, security and confidentiality of data or information that is 
transferred, accessed or deleted. We also recommend that the Bill 
requires the Government to prescribe a framework under Section 5(2) for 
agency privacy policies to ensure that they are interoperable and 
consistent between different departments of the Government.&amp;nbsp;&lt;/li&gt;&lt;li&gt;Functions of the Central Commissioner&lt;br /&gt;Section
 8 of the Bill grants the Central Commissioner the power to perform any 
or all of the functions listed in the provision including Section 8(f) 
which refers to the power of the State Commissioner in conducting the 
work of the State Government agencies. A Central Government authority 
may not have a say in all matters under the purview of the State 
Governments. This aspect has been left out for consideration while 
drafting this provision and hence it needs to be relooked at.&lt;/li&gt;&lt;li&gt;Cut-off Date for Implementation&lt;br /&gt;While
 the Bill mandates a cut off period of 180 days for the Government to 
finalise on the scope, framework and manner of service delivery under 
its provisions, it states that the Government “may” prescribe a 
framework for implementation of the provisions. It is recommended, for 
the purpose of ensuring speedy implementation of the provisions, that 
the term “may” in Section 5(2) be replaced by “shall”.&lt;/li&gt;&lt;li&gt;Transparency of Government Agencies&lt;br /&gt;Transparency
 and accountability of the Government towards the citizen is as 
important as the transparency of the citizen towards the Government. 
Therefore, the provisions of the Bill must ensure that the Government 
activities are transparent to the citizens by making available to the 
citizens, details of the responsible officials under the Bill, manner of
 service delivery and other relevant information in this regard.&lt;/li&gt;&lt;/ol&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/draft-electronic-delivery-services'&gt;http://editors.cis-india.org/internet-governance/blog/draft-electronic-delivery-services&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-08-02T07:37:37Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/newslaundry-elonnai-hickok-and-shweta-mohandas-january-14-2019-dna-bill-has-a-sequence-of-problems-that-need-to-be-resolved">
    <title>The DNA Bill has a sequence of problems that need to be resolved</title>
    <link>http://editors.cis-india.org/internet-governance/blog/newslaundry-elonnai-hickok-and-shweta-mohandas-january-14-2019-dna-bill-has-a-sequence-of-problems-that-need-to-be-resolved</link>
    <description>
        &lt;b&gt;In its current form, it’s far from comprehensive and fails to adequately address privacy and security concerns.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The opinion piece was &lt;a class="external-link" href="https://www.newslaundry.com/2019/01/14/the-dna-bill-has-a-sequence-of-problems-that-need-to-be-resolved"&gt;published by Newslaundry&lt;/a&gt; on January 14, 2019.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;On January 9, Science and Technology  Minister Harsh Vardhan introduced the DNA Technology (Use and  Application) Regulation Bill, 2018, amidst opposition and questions  about the Bill’s potential threat to privacy and the lack of security  measures. The Bill aims to provide for the regulation of the use and  application of DNA technology for certain criminal and civil purposes,  such as identifying offenders, suspects, victims, undertrials, missing  persons and unknown deceased persons. The Schedule of the Bill also  lists civil matters where DNA profiling can be used. These include  parental disputes, issues relating to immigration and emigration, and  establishment of individual identity. The Bill does not cover the  commercial or private use of DNA samples, such as private companies  providing DNA testing services for &lt;a href="https://scroll.in/pulse/827169/more-indians-are-taking-home-dna-tests-but-do-they-understand-what-their-genes-are-telling-them" target="_blank"&gt;conducting genetic tests&lt;/a&gt; or for verifying &lt;a href="https://timesofindia.indiatimes.com/city/hyderabad/Doubting-parents-can-buy-peace-for-Rs-10K/articleshow/15921603.cms" target="_blank"&gt;paternity&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  Bill has seen several iterations and revisions from when it was first  introduced in 2007. However, after repeated expert consultations, the  Bill even at its current stage is far from a comprehensive legislation. &lt;a href="https://www.thehindu.com/sci-tech/science/scientific-ambitions-behind-dna-profiling-bill/article7544598.ece" target="_blank"&gt;Experts&lt;/a&gt; have articulated concerns that the version of the Bill that was  presented post the Puttaswamy judgement still fails to make provisions  that fully uphold the &lt;a href="https://www.bloombergquint.com/opinion/dna-evidence-only-opinion-not-science-and-definitely-not-proof-of-crime#gs.dfL5aOrP" target="_blank"&gt;privacy&lt;/a&gt; and &lt;a href="https://www.bloombergquint.com/opinion/the-dna-bill-another-invasive-imperfect-database#gs.0ZIZNiNR" target="_blank"&gt;dignity&lt;/a&gt; of the individual. The hurry to pass the Bill by pushing for it by &lt;a href="https://www.firstpost.com/politics/parliament-live-updates-lok-sabha-passes-constitutional-amendment-bill-with-323-ayes-3-noes-quota-bill-to-now-be-presented-in-rajya-sabha-5854221.html#live-blog-20190108130637" target="_blank"&gt;extending the winter session&lt;/a&gt; and before the Personal Data Protection Bill is brought before  Parliament is also worrying. The Bill was passed in the Lok Sabha with  only one amendment: which changed the year of the Bill from 2018 to  2019.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Need for a better-drafted legislation&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although  the Schedule of the Bill includes certain civil matters under its  purview, some important provisions are silent on the procedure that is  to be followed for these civil matters. For example, the Bill  necessitates the consent of the individual for DNA profiling in criminal  investigation and for identifying missing persons. However, the Bill is  silent on the requirement for consent in all civil matters that have  been brought under the scope of the Bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  omission of civil matters in the provisions of the Bill that are  crucial for privacy is just one of the ways the Bill fails to ensure  privacy safeguards.  The civil matters listed in the Bill are highly  sensitive (such as paternity/maternity, use of assisted reproductive  technology, organ transplants, etc.) and can have a far-reaching impact  on a number of sections of society. For example, the civil matters  listed in the Bill affect women not just in the case of paternity  disputes but in a number of matters concerning women including the  Domestic Violence Act and the Prenatal Diagnostic Techniques Act. Other  matters such as pedigree, immigration and emigration can  disproportionately impact vulnerable groups and communities, raising  raises concerns of discrimination and abuse.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Privacy and security concerns&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although  the Bill makes provisions for written consent for the collection of  bodily substances and intimate bodily substances, the Bill allows  non-consensual collection for offences punishable by death or  imprisonment for a term exceeding seven years. Another issue with  respect to collection with consent is the absence of safeguards to  ensure that consent is given freely, especially when under police  custody. This issue was also &lt;a href="https://twitter.com/tame_wildcard/status/1082550737845006336" target="_blank"&gt;highlighted by MP NK Premachandran&lt;/a&gt; when he emphasised that the Bill be sent to a &lt;a href="https://thewire.in/the-sciences/lok-sabha-passes-dna-technology-bill-all-you-need-to-know" target="_blank"&gt;Parliamentary Standing Committee&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apart  from the collection, the Bill fails to ensure the privacy and security  of the samples. One such example of this failure is Section 35(b), which  allows access to the information contained in the DNA Data Banks for  the purpose of training. The use of these highly sensitive data—that  carry the risk of contamination—for training poses risks to the privacy  of the people who have deposited their DNA both with and without  consent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An earlier  version of the Bill included a provision for the creation of a  population statistics databank. Though this has been removed now, there  is no guarantee that this provision will not make its way through  regulation. This is a cause for concern as the Bill also covers certain  civil cases including those relating to immigration and emigration.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Conclusion&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In  July 2018, the Justice Sri Krishna Committee released the draft  Personal Data Protection Bill. The Bill was open for public consultation  and is now likely to be &lt;a href="https://economictimes.indiatimes.com/tech/internet/personal-data-protection-bill-only-after-new-government-takes-over/articleshow/67374919.cms" target="_blank"&gt;introduced in Parliament in June&lt;/a&gt;.  The PDP Bill, while defining “sensitive personal data”, provides an  exhaustive list of data that can be considered sensitive, including  biometric data, genetic data and health data. Under the Bill, sensitive  personal data has heightened parameters for collection and processing,  including clear, informed, and specific consent. Ideally, the DNA Bill  should be passed after ensuring that it is in line with the PDP Bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  DNA Bill, once it becomes a law, will allow for law enforcement  authorities to collect sensitive DNA data and database the same for  forensic purposes without a number of key safeguards in place with  respect to security and the rights of individuals. In &lt;a href="http://ncrb.gov.in/StatPublications/CII/CII2016/pdfs/NEWPDFs/9%20%20Snapshots%20All%20India%202016.pdf" target="_blank"&gt;2016 alone&lt;/a&gt;,  29,75,711 crimes under various provisions the Indian Penal Code were  reported. One can only guess the sheer number of DNA profiles and  related information that will be collected from both criminal and  specified civil cases. The Bill needs to be revised to reduce all  ambiguity with respect to the civil cases, and also to ensure that it is  in line with the data protection regime in India. A comprehensive  privacy legislation should be enacted prior to the passing of this Bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are still studies  and cases that show that DNA testing can be fallible. The Indian  government needs to ensure that there is proper sensitisation and  training on the collection, storage and use of DNA profiles as well as  the recognition and awareness of the fact that the DNA tests are not  infallible amongst key stakeholders, including law enforcement and the  judiciary.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/newslaundry-elonnai-hickok-and-shweta-mohandas-january-14-2019-dna-bill-has-a-sequence-of-problems-that-need-to-be-resolved'&gt;http://editors.cis-india.org/internet-governance/blog/newslaundry-elonnai-hickok-and-shweta-mohandas-january-14-2019-dna-bill-has-a-sequence-of-problems-that-need-to-be-resolved&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Shweta Mohandas and Elonnai Hickok</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>DNA Profiling</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-01-15T02:36:11Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/a2k/blogs/giswatch-december-9-2016-sunil-abraham-and-vidushi-marda-digital-protection-of-traditional-knowledge-questions-raised-by-traditional-knowledge-digital-library-in-india">
    <title>The Digital Protection of Traditional Knowledge: Questions Raised by the Traditional Knowledge Digital Library in India</title>
    <link>http://editors.cis-india.org/a2k/blogs/giswatch-december-9-2016-sunil-abraham-and-vidushi-marda-digital-protection-of-traditional-knowledge-questions-raised-by-traditional-knowledge-digital-library-in-india</link>
    <description>
        &lt;b&gt;This is an edited version of part three of a study that considers the International Covenant on Economic, Social and Cultural Rights (ICESCR) through aspects of intellectual property in India, namely, mobile patents, free and open source software, and India's Traditional Knowledge Digital Library. Through these, it demonstrates the potential of the internet in realising ESCRs. 
&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;The original report published by GISWatch can be &lt;a class="external-link" href="https://www.giswatch.org/en/economic-social-and-cultural-rights-escrs/digital-protection-traditional-knowledge-questions-rais"&gt;read here&lt;/a&gt;. Aditya Singh Chawla, Parvathy Nair, Raji Gururaj and Balaji Subramaniam provided research assistance for this paper during their internships with the Centre for Internet and Society. &lt;a class="external-link" href="https://www.giswatch.org/sites/default/files/gw2016-thematic-traditional.pdf"&gt;Click to download the PDF&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;Introduction&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The first problem one encounters in studying traditional knowledge (TK) is the extent and meaning of the term itself. No globally accepted definition of TK exists,&lt;a href="#_ftn1" name="_ftnref1"&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/a&gt; and therefore no clear delineation of its scope. The definition adopted by the World Intellectual Property Organization (WIPO) is that TK is “knowledge, know-how, skills and practices that are developed, sustained and passed on from generation to generation within a community, often forming part of its cultural or spiritual identity.”&lt;sup&gt;4&lt;/sup&gt; While TK embraces traditional cultural expressions within its ambit, and includes distinctive signs and symbols associated with traditional knowledge,&lt;a href="#_ftn2" name="_ftnref2"&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/a&gt; the scope of this report does not extend to traditional cultural expressions as they necessarily would fall under the purview of copyright law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Before we frame TK in terms of economic, social and cultural rights (ESCRs), let us understand the phenomenom of biopiracy in a bit more detail using two examples, one connected to the right to food, and the other connected to health. Biopiracy is the use of intellectual property (IP) systems to legitimise control over biological products and processes that were previously used for centuries in non- industrialised cultures.&lt;a href="#_ftn3" name="_ftnref3"&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/a&gt; The case of neem-related patents, through which bio-prospectors attempted to appropriate the royalty arising from a plant whose medicinal value was already in the public domain, is well documented.&lt;a href="#_ftn4" name="_ftnref4"&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/a&gt; Another case worth noting is that of the “Enola bean”, in which Larry Proctor, a United States (US) citizen, purchased a package of Mexican beans of various colours, separated out the yellow ones, and spent three years selectively breeding the plants. He then named his line “Enola” and obtained patent protection for the bean, its plant, its pollen, and the method of producing it.&lt;a href="#_ftn5" name="_ftnref5"&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/a&gt;&lt;a href="#_ftn6" name="_ftnref6"&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This case is far more worrying than the neem case for two reasons.&lt;a href="#_ftn7" name="_ftnref7"&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/a&gt; First, it was a case that had an immediate and tangible impact on the producers of the commodity in that yellow Mexican beans were exported into the United States before the patent was granted, and the assertion of the patent led to significant reductions in bean exports, representing a quantifiable economic loss for bean farmers.&lt;a href="#_ftn8" name="_ftnref8"&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/a&gt; Second, the patent was allowed to stand for almost a decade, amounting to half the life of a legitimate patent.&lt;a href="#_ftn9" name="_ftnref9"&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/a&gt; This represents an incredibly unjust outcome – an invention (“specifically selected yellow beans”) arising from traditional knowledge in the public domain (since Mexican farmers had been cultivating and exporting these beans) being monopolised by a private entity illegally for almost a decade.&lt;/p&gt;
&lt;p&gt;The differences between TK and other forms of IP are the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;With other forms of IP, property rights are afforded to the innovator or creator, whereas communities own TK.&lt;/li&gt;
&lt;li&gt;Other forms of IP are designed as incentive mechanisms for the creation of new property; however, there is no such incentive to create new property with TK.&lt;/li&gt;
&lt;li&gt;IP is also time-bound, whereas TK is held in perpetuity from generation to generation.&lt;/li&gt;
&lt;li&gt;The invention under IP must also satisfy the requirement for novelty and industrial application, whereas TK does not have these requirements.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Although patent law is not tailored to protect TK, it has been used to prevent misappropriation of TK.&lt;/p&gt;
&lt;h2&gt;The Traditional Knowledge Digital Library&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;At the turn of the millennium, an expert group found that roughly 2,000 patents linked to India’s TK in medicine were being granted annually around the world.&lt;a href="#_ftn10" name="_ftnref10"&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/a&gt; This expert group proposed the establishment of the Traditional Knowledge Digital Library (TKDL)&lt;sup&gt;13 &lt;/sup&gt;in order to reduce biopiracy. The TKDL was envisaged as “a home-grown effort to ensure patent offices around the world do not grant patents for applications founded on India’s wealth of TK that has existed for millennia.”&lt;sup&gt;14&lt;/sup&gt; In 2001 India launched the initiative, which digitised its wide repository of TK, with the hope of enabling the protection of this knowledge and preventing its misuse.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The TKDL is a digital knowledge repository of Indian traditional knowledge about medicinal plants and formulations, and practices used in Indian systems of medicine. Its knowledge base is primarily derived from Ayurveda, Unani, Siddha and Yoga. These areas are being documented by collating the information on TK from literature existing in local languages such as Sanskrit, Urdu, Arabic, Persian and Tamil in digitised format. These have been made available in five international languages: English, German, Spanish, French and Japanese. While it is clear that the first three systems of medicine (i.e. Ayurveda, Unani and Siddha) are systems that have a corresponding system of traditional medicines, the framing of Yoga as a system of medicine is unclear as there is no medicine administered to the patient. Increasingly, however, medical procedures are being patented, and the Indian government in August 2015 shortlisted 1,500 yoga asanas to be included in the TKDL to prevent foreign parties from patenting them.&lt;a href="#_ftn11" name="_ftnref11"&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/a&gt; This was in response to several yoga-related patents being applied for&lt;a href="#_ftn12" name="_ftnref12"&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/a&gt; and granted&lt;a href="#_ftn13" name="_ftnref13"&gt;&lt;sup&gt;[13]&lt;/sup&gt;&lt;/a&gt; around the world, notably in the United States.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The TKDL’s appeal lies in the manner in which it approaches attempts to patent TK (the “state of the art”) – it serves to pre-empt the granting of a patent, rather than to contest a patent’s validity after it has been granted. This, it is claimed, reduces the time taken to contest claims from a matter of years to a few weeks.&lt;a href="#_ftn14" name="_ftnref14"&gt;&lt;sup&gt;[14]&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;Defining the right&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The protection of TK can be primarily placed within Article 15 of the International Covenant on Economic, Social and Cultural Rights (ICESCR). In order to understand the relationship between TK and Article 15, we must first appreciate that TK is also scientific knowledge. There are two ways in which the right of the TK community can be mapped onto Article 15. First, the Article recognises “the right to take part in cultural life”, and second, “to enjoy the benefits from scientific progress and its applications”. This ensures that communities have the right to continue to operationalise and use TK. Further, Article 15 includes the right “to benefit from the protection of the moral and material interests resulting from any scientific, literary or artistic production”. However, while this is a universal right, in practice it will only happen when national law recognises the property rights of the community, facilitates protection of these rights, takes legal action against infringements, and provides mechanisms for the collection and distribution of royalties. What might not strike the reader as obvious is that the benefits of protecting the moral and material interests in the world of TK accrue to the community, while in other forms of IP the rights holder is either an individual or corporation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article 11 of the ICESCR is also relevant to TK. It recognises the right of everyone to an adequate standard of living, including adequate food, clothing and housing, and to the continuous improvement of living conditions. Article 11 (2) (a) mandates that states parties to the Covenant take measures to “improve methods of production, conservation and distribution of food by making full use of technical and scientific knowledge, by disseminating knowledge of the principles of nutrition and by developing or reforming agrarian systems in such a way as to achieve the most efficient development and utilization of natural resources.”&lt;a href="#_ftn15" name="_ftnref15"&gt;&lt;sup&gt;[15]&lt;/sup&gt;&lt;/a&gt; TK is connected to food in multiple ways, such as ecosystem and landscape management, water management, soil conservation, biological control of pests and diseases, ecological agriculture and livestock practices, and plant and animal breeding – and most importantly, with regard to the latter, breeding and preserving varieties of plant and animal species. Suman Sahai, founder of the Gene Campaign,&lt;a href="#_ftn16" name="_ftnref16"&gt;&lt;sup&gt;[16]&lt;/sup&gt;&lt;/a&gt; helps us understand the connection between food security and traditional knowledge. She argues that farmers are a community of women and men who have not only created several thousand breeds of food and cash crops, but also “identified valuable genes and traits in these crops and maintained them over generations through a highly sophisticated system of crossing and selection.”&lt;a href="#_ftn17" name="_ftnref17"&gt;&lt;sup&gt;[17]&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There exist a host of international and national norms, both of a general and a specific nature, enunciating the right of indigenous communities to their traditional knowledge. One specific example is the World Health Organization’s approach to Traditional and Complementary Medicine (T&amp;amp;CM). In this, it urges states to “prevent the misappropriation of T&amp;amp;CM by implementing the relevant international instruments in line with the WHO global strategy and plan of action on public health, innovation and intellectual property, adopting or amending national intellectual property legislation, and enacting other defensive protection strategies.”&lt;a href="#_ftn18" name="_ftnref18"&gt;&lt;sup&gt;[18]&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;India has signed the Convention on Biological&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Diversity (CBD), a treaty with 194 parties in total.&lt;a href="#_ftn19" name="_ftnref19"&gt;&lt;sup&gt;[19]&lt;/sup&gt;&lt;/a&gt; The CBD provides for the respect, preservation and maintenance of “knowledge, innovation and practices of indigenous and local communities embodying traditional lifestyles relevant for the conservation and sustainable use of biological diversity”, and also for encouraging the wider application of such practices while ensuring that the benefits arising from such utilisation are shared equit ably with the communities in question.&lt;a href="#_ftn20" name="_ftnref20"&gt;&lt;sup&gt;[20]&lt;/sup&gt;&lt;/a&gt; Having signed this convention, India has the duty to protect this knowledge without appropriating it, and the TKDL is a means to protect this right.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Such provisions have been included in India’s Biological Diversity Act,&lt;a href="#_ftn21" name="_ftnref21"&gt;&lt;sup&gt;[21]&lt;/sup&gt;&lt;/a&gt; which was enacted in pursuance of India’s duties under the CBD. Restrictions on the granting of patents for inventions arising from research on biological resources,&lt;sup&gt;26&lt;/sup&gt; the transfer of biological resources or knowledge,&lt;a href="#_ftn22" name="_ftnref22"&gt;&lt;sup&gt;[22]&lt;/sup&gt;&lt;/a&gt; and the enforcement of equitable benefit sharing&lt;a href="#_ftn23" name="_ftnref23"&gt;&lt;sup&gt;[23]&lt;/sup&gt;&lt;/a&gt; aim to serve as effective legal bars to biopiracy and unauthorised use of traditional knowledge.&lt;/p&gt;
&lt;h2&gt;Successes of the TKDL&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Since the inception of the TKDL, in just under two years, and in Europe alone, India has succeeded in using this resource to bring about the cancellation or withdrawal of 36 applications to patents traditionally known as medicinal formulations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Between 2001 and 2015, out of a total of 189 pharmaceutical applications which include medicines, therapeutics, etc., 21 were granted while 17 were rejected. An additional 30 were deemed withdrawn and another 31 were abandoned. At the time of writing, 90 have their examination still in progress. Out of the 10 applications under cosmetics, seven are under progress while one each has been accepted, rejected and deemed to be withdrawn. There was only one application under agriculture which was rejected. The domain of food had three applications out of which one was rejected, one deemed to be withdrawn and the last one in progress.&lt;a href="#_ftn24" name="_ftnref24"&gt;&lt;sup&gt;[24]&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India and the US had the maximum number of applications at 75 and 43 respectively. Japan and Korea were third and fourth at 16 and 11 respectively. Most of these applications were in progress, with 12 applications from India being rejected and 17 being abandoned. Only five had been granted to India while three were deemed to be withdrawn; 38 of India’s applications and 12 of those from the US are pending. Taiwan and Jordan’s only applications were granted while Spain’s only application was rejected.&lt;a href="#_ftn25" name="_ftnref25"&gt;&lt;sup&gt;[25]&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;But do digital databases work as a form  of IP protection?&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;While proponents of the database have been vocal in their vision for its application, it has received criticism on several grounds.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;First of all, there is a fair amount of disagreement regarding the best possible means through which TK can be protected.&lt;a href="#_ftn26" name="_ftnref26"&gt;&lt;sup&gt;[26]&lt;/sup&gt;&lt;/a&gt; Indeed, existing literature already features catalogues of international law (both “hard” and “soft”), regional norms and domestic legislation that accord protection to TK within the framework of culture.&lt;a href="#_ftn27" name="_ftnref27"&gt;&lt;sup&gt;[27]&lt;/sup&gt;&lt;/a&gt; While some believe that data aggregation and record creation is the best means to tackle biopiracy, others propose different approaches,&lt;a href="#_ftn28" name="_ftnref28"&gt;&lt;sup&gt;[28]&lt;/sup&gt;&lt;/a&gt; such as negotiating access agreements between indigenous communities and bio-prospectors.&lt;a href="#_ftn29" name="_ftnref29"&gt;&lt;sup&gt;[29]&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Secondly, the TKDL has also attracted criticism because of its high level of confidentiality. In response to a right to information application, the Council for Scientific and Industrial Research (CSIR) clarified that the TKDL can only be accessed by foreign patent offices.&lt;a href="#_ftn30" name="_ftnref30"&gt;&lt;sup&gt;[30]&lt;/sup&gt;&lt;/a&gt; It is not made available to the Indian Patent Office or to CSIR scientists. As per the same response, the decision to make the TKDL confidential was taken during a cabinet meeting in 2006, but there exists no legal instrument that mandates such confidentiality. TK databases in other countries do not impose access restrictions. The Korean Traditional Knowledge Portal, for example, explicitly states the motivation behind making itself publicly available:&lt;/p&gt;
&lt;p&gt;The database is presented on-line through the Korean Traditional Knowledge Portal (KTKP). The reasons for making the database publicly accessible through the KTKP are as follows:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;To lay the foundation for international protection of Korean traditional knowledge, thereby preventing unauthorized use of patents inside and outside the country.&lt;/li&gt;
&lt;li&gt;To provide an abundance of information on traditional knowledge and related research, thereby expediting the development of related studies and industries.&lt;/li&gt;
&lt;li&gt;To provide essential information for patent examinations, thereby enhancing the quality of intellectual property applications for traditional knowledge.&lt;a href="#_ftn31" name="_ftnref31"&gt;&lt;sup&gt;[31]&lt;/sup&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;Similarly, the contents of the China Traditional Medicine Patent Database are also publicly available on the internet.&lt;a href="#_ftn32" name="_ftnref32"&gt;&lt;sup&gt;[32]&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finally, the TKDL has also raised questions of copyright, with claims that it falls foul of the Indian Copyright Act, 1957, since it has digitised works (such as translations or compilations of ancient texts) that are still under copyright without the consent of their authors.&lt;sup&gt;38&lt;/sup&gt; Responding to the same right to information application discussed above, the CSIR claimed that no consent was required since the traditional knowledge in question was authored many years ago. This is a perplexing position to take, as there is significant skill and labour involved in translating and compiling these ancient texts and putting this knowledge together, which merits copyright protection.&lt;a href="#_ftn33" name="_ftnref33"&gt;&lt;sup&gt;[33]&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;The need for open knowledge systems&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;There seems to be no reason to keep a valuable resource such as the TKDL away from the public’s reach, especially considering the fact that the entire project was bankrolled by the Indian taxpayer. Restricting access to the TKDL severely limits the benefit that the general public could derive from this knowledge. Even if one were to accept that there exist compelling reasons to keep the data confidential, it is clear that the TKDL, by its very nature, cannot possibly be invulnerable to breach. Problems of access control are endemic to large databases – it has been postulated that large aggregations of secret data are fundamentally impossible because security must be traded off for ease of access in such situations. Thus, “you cannot construct a database with scale, functionality and security because if you design a large system for ease of access it becomes insecure, while if you make it watertight it becomes impossible to use.”&lt;a href="#_ftn34" name="_ftnref34"&gt;&lt;sup&gt;[34]&lt;/sup&gt;&lt;/a&gt; For this reason, governments have been urged to make use of centralised databases only when absolutely necessary.&lt;a href="#_ftn35" name="_ftnref35"&gt;&lt;sup&gt;[35]&lt;/sup&gt;&lt;/a&gt; If we accept the premise that centralised databases cannot possibly be both accessible and secure, then we must examine whether the TKDL represents a balanced trade-off between accessibility and confidentiality.&lt;/p&gt;
&lt;p&gt;There are three changes that are necessary in this regard:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;The need to push for open knowledge &lt;/i&gt;A system like the TKDL constitutes a mechanism for &lt;i&gt;defensive protection&lt;/i&gt; of TK – it seeks to keep TK in the public domain rather than to exclusively put it in the hands of the community that evolved it. This is similar to the Peer-to-Patent&lt;a href="#_ftn36" name="_ftnref36"&gt;&lt;sup&gt;[36]&lt;/sup&gt;&lt;/a&gt; initiative, which ensures that more eyes are involved in following the process: a crowd-sourced approach to preventing inappropriate appropriation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;The need to address legal barriers &lt;/i&gt;Primarily, the TKDL’s data seems to be far from infallible, with several reports of mistranslations&lt;a href="#_ftn37" name="_ftnref37"&gt;&lt;sup&gt;[37]&lt;/sup&gt;&lt;/a&gt; and exaggerated claims&lt;a href="#_ftn38" name="_ftnref38"&gt;&lt;sup&gt;[38]&lt;/sup&gt;&lt;/a&gt; made by the CSIR. Apart from this, the most important requirement that the TKDL must fulfil is for its data to meet the legal criteria established for prior art in various jurisdictions. This would entail ensuring that the knowledge is made available with clear evidence of the date of its publication, and the presentation of the knowledge in a manner that clearly establishes that a patent claim is anticipated by the data contained in the library.&lt;a href="#_ftn39" name="_ftnref39"&gt;&lt;sup&gt;[39]&lt;/sup&gt;&lt;/a&gt; Further, the fundamental challenge faced by any defensive protection mechanism is its vulnerability to differing definitions of prior art in various jurisdictions:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;European Patent Convention (EPC):&lt;/i&gt; The most TKDL-friendly jurisdictions are those such as the EU. The EPC defines prior art as “everything made available to the public by means of a written or oral description, by use, or in any other way, before the date of filing of the European patent application”.&lt;a href="#_ftn40" name="_ftnref40"&gt;&lt;sup&gt;[40]&lt;/sup&gt;&lt;/a&gt; Thus, innovations detailed in the works indexed by the TKDL would fall within the definition of prior art, and therefore be unpatentable – assuming, of course, that all the works digitised and translated by the database were publicly available. An overwhelming majority of the TKDL’s self-proclaimed “successes” have been achieved in the EU – around 120 of the 180 “successful outcomes” are against European patent applications.&lt;a href="#_ftn41" name="_ftnref41"&gt;&lt;sup&gt;[41]&lt;/sup&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;United States:&lt;/i&gt; On the other end of the spectrum is the US definition of prior art. The United States Patent Act provides that a person “shall be entitled to a patent unless (a) the invention was known or used by others in this country, or patented or described in a printed publication in this or a foreign country, before the invention thereof by the applicant for patent.”&lt;sup&gt;48&lt;/sup&gt; This effectively excludes protection for any non-published knowledge outside the US. Further, given the restrictive access to the TKDL, it appears that the database would not fall within the definition of a “printed publication”, since it has never been “published” – merely circulated among patent examiners on conditions of non-disclosure. Thus, it appears that there is no legal basis for the TKDL to be cited as evidence of prior art in the US, or other jurisdictions that have similar definitions of prior art.&lt;a href="#_ftn42" name="_ftnref42"&gt;&lt;sup&gt;[42]&lt;/sup&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;i&gt;The need to address structural barriers&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In choosing to characterise itself as an archive of prior art, the TKDL has placed the burden of enforcing TK assertions upon patent examiners around the world. In doing so, it has pigeonholed itself into a doctrine (namely prior art) that has a tendency to go largely unheard in patent examinations. With studies showing that more experienced patent examiners, typically occupying higher positions in the patent office, are less likely to cite examples of prior art in their examinations,&lt;a href="#_ftn43" name="_ftnref43"&gt;&lt;sup&gt;[43]&lt;/sup&gt;&lt;/a&gt;&lt;a href="#_ftn44" name="_ftnref44"&gt;&lt;sup&gt;[44]&lt;/sup&gt;&lt;/a&gt; and still other evaluations showing that applicants for patents are extremely unlikely to provide and identify prior art surrounding their claims,&lt;a href="#_ftn45" name="_ftnref45"&gt;&lt;sup&gt;[45]&lt;/sup&gt;&lt;/a&gt; it is evident that there are structural imbalances working against the efficacy of the prior art doctrine in preventing illegitimate patent claims. Thus, efforts must be made to counter this imbalance at two levels: first, access to the TKDL must be made as easy as possible; second, the TKDL has to undertake proactive patent monitoring efforts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Patent monitoring, while an onerous and expensive task, is nevertheless necessary for the success of a defensive system such as the TKDL, especially in those jurisdictions which do not have the legislative framework to enable provisions of the CBD that mandate disclosure of genetic material sources.&lt;/p&gt;
&lt;h2&gt;Conclusion&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;For the reasons stated above, the access policy of the TKDL requires significant modification if the database is to reach its true potential for providing accurate, efficient and time-bound protection to TKbased innovations through the use of a centralised database that is wired into a network of interested parties.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;TK systems require all the external support they can get in order to protect their mandate. Civil society must engage effectively with the TKDL initiative, encourage the accuracy of its records through research, and stimulate dialogue regarding the key issues discussed in this report. As pointed out by the UN Special Rapporteur on the rights of indigenous people: “Much more needs to be done to understand fully how … treaties and agreements can undermine or reinforce indigenous peoples’ rights and how they shape the trajectories of national economic development plans.”&lt;a href="#_ftn46" name="_ftnref46"&gt;&lt;sup&gt;[46]&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; Traditional Knowledge, WIPO. &lt;a href="http://www.wipo.int/tk/en/tk"&gt;www.wipo.int/tk/en/tk &lt;/a&gt; 4 Ibid.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; WIPO. (2010). &lt;i&gt;List and Brief Technical Explanation of Various Forms in which Traditional Knowledge May be Found&lt;/i&gt;.&lt;a href="http://www.wipo.int/meetings/en/doc_details.jsp?doc_id=147152"&gt; www.wipo.int/ &lt;/a&gt;&lt;a href="http://www.wipo.int/meetings/en/doc_details.jsp?doc_id=147152"&gt;meetings/en/doc_details.jsp?doc_id=147152 &lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; Shiva, V. (2001). &lt;i&gt;Protect or Plunder? Understanding Intellectual Property Rights. &lt;/i&gt;London: Zed Books.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; See, e.g., Horsbrugh Porter, A. (2006, 17 April). Neem: India’s tree of life. &lt;i&gt;BBC&lt;/i&gt;. &lt;a href="http://news.bbc.co.uk/2/hi/south_asia/4916044.stm"&gt;news.bbc.co.uk/2/hi/south_asia/4916044.stm&lt;/a&gt;; BBC. (2005, 9 March). India wins landmark patent battle. &lt;i&gt;BBC&lt;/i&gt;. &lt;a href="http://news.bbc.co.uk/2/hi/science/nature/4333627.stm"&gt;news. &lt;/a&gt;&lt;a href="http://news.bbc.co.uk/2/hi/science/nature/4333627.stm"&gt;bbc.co.uk/2/hi/science/nature/4333627.stm&lt;/a&gt;; Hoggan, K. (2000, 11 May). Neem tree patent revoked. &lt;i&gt;BBC&lt;/i&gt;. &lt;a href="http://news.bbc.co.uk/2/hi/science/nature/745028.stm"&gt;news.bbc.co.uk/2/hi/ &lt;/a&gt;&lt;a href="http://news.bbc.co.uk/2/hi/science/nature/745028.stm"&gt;science/nature/745028.stm &lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; In re POD-NERS, L.L.C., Re-examination No. 90/005,892, US Fed.&lt;/p&gt;
&lt;p&gt;Cir. 2009. &lt;a href="http://law.justia.com/cases/federal/appellate-courts/cafc/08-1492/08-1492-2011-03-27.html"&gt;law.justia.com/cases/federal/appellate-courts/cafc/08-&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; &lt;a href="http://law.justia.com/cases/federal/appellate-courts/cafc/08-1492/08-1492-2011-03-27.html"&gt;/08-1492-2011-03-27.html &lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt; It is also noteworthy for another reason: it is illustrative of the time and effort required to contest claims after a patent has been granted. Proponents of the TKDL would argue that what took a decade in the Enola bean case could have been achieved in a manner of weeks at the application stage by a patent office equipped with such a database.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt; Shashikant, S., &amp;amp; Asghedom, A. (2009, 12 August). The ‘Enola Bean’ dispute: patent failure &amp;amp; lessons for developing countries. &lt;i&gt;Third World Network&lt;/i&gt;. &lt;a href="http://twn.my/title2/wto.info/2009/twninfo20090811.htm"&gt;twn.my/title2/wto.info/2009/ &lt;/a&gt;&lt;a href="http://twn.my/title2/wto.info/2009/twninfo20090811.htm"&gt;twninfo20090811.htm &lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;[9]&lt;/a&gt; Crouch, D. (2009, 10 July). Mexican Yellow Bean Patent Finally Cooked. &lt;i&gt;Patently-O&lt;/i&gt;. &lt;a href="http://patentlyo.com/patent/2009/07/mexican-yellow-bean-patent-finally-cooked.html"&gt;patentlyo.com/patent/2009/07/mexican&lt;/a&gt;&lt;a href="http://patentlyo.com/patent/2009/07/mexican-yellow-bean-patent-finally-cooked.html"&gt;yellow-bean-patent-finally-cooked.html &lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;[10]&lt;/a&gt; Gupta, V. K. (2011). &lt;i&gt;Protecting Indian Traditional Knowledge from Biopiracy. &lt;/i&gt;WIPO. &lt;a href="http://www.wipo.int/export/sites/www/meetings/en/2011/wipo_tkdl_del_11/pdf/tkdl_gupta.pdf"&gt;www.wipo.int/export/sites/www/meetings/ &lt;/a&gt;&lt;a href="http://www.wipo.int/export/sites/www/meetings/en/2011/wipo_tkdl_del_11/pdf/tkdl_gupta.pdf"&gt;en/2011/wipo_tkdl_del_11/pdf/tkdl_gupta.pdf &lt;/a&gt; 13 &lt;a href="http://www.tkdl.res.in/tkdl/langdefault/common/Home.asp?GL=Eng"&gt;www.tkdl.res.in/tkdl/langdefault/common/Home.asp?GL=Eng&lt;/a&gt; 14 Gupta, V. K. (2011). Op. cit.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;[11]&lt;/a&gt; PTI. (2015, 9 August). Over 1500 yoga asanas shortlisted to thwart patenting by foreign parties. &lt;i&gt;Indian Express&lt;/i&gt;. &lt;a href="http://indianexpress.com/article/india/india-others/over-1500-yoga-asanas-shortlisted-to-thwart-patenting-by-foreign-parties"&gt;indianexpress.com/ &lt;/a&gt;&lt;a href="http://indianexpress.com/article/india/india-others/over-1500-yoga-asanas-shortlisted-to-thwart-patenting-by-foreign-parties"&gt;article/india/india-others/over-1500-yoga-asanas-shortlisted-to&lt;/a&gt;&lt;a href="http://indianexpress.com/article/india/india-others/over-1500-yoga-asanas-shortlisted-to-thwart-patenting-by-foreign-parties"&gt;thwart-patenting-by-foreign-parties &lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;[12]&lt;/a&gt; TNN. (2007, 18 May). US patent on yoga? Indian gurus fume. &lt;i&gt;Indian Express.&lt;/i&gt; &lt;a href="http://timesofindia.indiatimes.com/india/US-patent-on-yoga-Indian-gurus-fume/articleshow/2058285.cms"&gt;timesofindia.indiatimes.com/india/US-patent-on&lt;/a&gt;&lt;a href="http://timesofindia.indiatimes.com/india/US-patent-on-yoga-Indian-gurus-fume/articleshow/2058285.cms"&gt;yoga-Indian-gurus-fume/articleshow/2058285.cms &lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;[13]&lt;/a&gt; Lee, T. B. (2013, 13 December). A yoga patent? Here’s why the USPTO approves so many dubious applications. &lt;i&gt;Washington Post&lt;/i&gt;. &lt;a href="https://www.washingtonpost.com/news/the-switch/wp/2013/12/13/a-yoga-patent-heres-why-the-uspto-approves-so-many-dubious-applications"&gt;https://www.washingtonpost.com/news/the-switch/ &lt;/a&gt;&lt;a href="https://www.washingtonpost.com/news/the-switch/wp/2013/12/13/a-yoga-patent-heres-why-the-uspto-approves-so-many-dubious-applications"&gt;wp/2013/12/13/a-yoga-patent-heres-why-the-uspto-approves-so&lt;/a&gt;&lt;a href="https://www.washingtonpost.com/news/the-switch/wp/2013/12/13/a-yoga-patent-heres-why-the-uspto-approves-so-many-dubious-applications"&gt;many-dubious-applications &lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;[14]&lt;/a&gt; Press Information Bureau. (2010, 28 April). India Partners with US and UK to Protect Its Traditional Knowledge and Prevent Bio-Piracy. &lt;a href="http://pib.nic.in/newsite/erelease.aspx?relid=61122"&gt;pib.nic.in/newsite/erelease.aspx?relid=61122 &lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;[15]&lt;/a&gt; www.ohchr.org/EN/ProfessionalInterest/Pages/CESCR.aspx&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;[16]&lt;/a&gt; &lt;a href="http://genecampaign.org/"&gt;genecampaign.org &lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;[17]&lt;/a&gt; Sahai, S. (1996). Importance of Indigenous Knowledge in IPR. &lt;i&gt;Economic and Political Weekly, 31&lt;/i&gt;(47).&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;[18]&lt;/a&gt; World Health Organization. (2013). WHO Traditional Medicine Strategy 2014-2023. &lt;a href="http://apps.who.int/iris/bitstream/10665/92455/1/9789241506090_eng.pdf?ua=1"&gt;apps.who.int/iris/ &lt;/a&gt;&lt;a href="http://apps.who.int/iris/bitstream/10665/92455/1/9789241506090_eng.pdf?ua=1"&gt;bitstream/10665/92455/1/9789241506090_eng.pdf?ua=1&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;[19]&lt;/a&gt; List of Parties, Convention on Biological Diversity. &lt;a href="https://www.cbd.int/information/parties.shtml"&gt;https://www. &lt;/a&gt;&lt;a href="https://www.cbd.int/information/parties.shtml"&gt;cbd.int/information/parties.shtml &lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref20" name="_ftn20"&gt;[20]&lt;/a&gt; Article 8(j) of the Convention on Biological Diversity.&lt;a href="https://www.cbd.int/convention/text"&gt; https://www.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://www.cbd.int/convention/text"&gt;cbd.int/convention/text &lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref21" name="_ftn21"&gt;[21]&lt;/a&gt; &lt;a href="http://nbaindia.org/content/25/19/1/act.html"&gt;nbaindia.org/content/25/19/1/act.html&lt;/a&gt; 26 Section 6 of the Biological Diversity Act, 2002.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref22" name="_ftn22"&gt;[22]&lt;/a&gt; Section 20 of the Biological Diversity Act, 2002.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref23" name="_ftn23"&gt;[23]&lt;/a&gt; Section 21 of the Biological Diversity Act, 2002.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref24" name="_ftn24"&gt;[24]&lt;/a&gt; &lt;a href="http://www.tkdl.res.in/tkdl/langdefault/Common/ExaminerReport.asp?homepage=sub"&gt;www.tkdl.res.in/tkdl/langdefault/Common/ExaminerReport.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.tkdl.res.in/tkdl/langdefault/Common/ExaminerReport.asp?homepage=sub"&gt;asp?homepage=sub &lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref25" name="_ftn25"&gt;[25]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref26" name="_ftn26"&gt;[26]&lt;/a&gt; WIPO. (2010). Op. cit., Annex 2.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref27" name="_ftn27"&gt;[27]&lt;/a&gt; See, e.g., Coombe, R. J. (2005). Protecting Traditional&lt;/p&gt;
&lt;p&gt;Environmental Knowledge and New Social Movements in the&lt;/p&gt;
&lt;p&gt;Americas: Intellectual Property, Human Right, or Claims to an Alternative Form of Sustainable Development? &lt;i&gt;Florida Journal of International Law,&lt;/i&gt; &lt;i&gt;17&lt;/i&gt;(1), 115-136.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref28" name="_ftn28"&gt;[28]&lt;/a&gt; Swiderska, K. (2006). &lt;i&gt;Banishing the Biopirates: A New Approach to Protecting Traditional Knowledge&lt;/i&gt;. International Institute for Environment and Development. &lt;a href="http://pubs.iied.org/pdfs/14537IIED.pdf"&gt;pubs.iied.org/pdfs/14537IIED.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref29" name="_ftn29"&gt;[29]&lt;/a&gt; Intergovernmental Committee on Intellectual Property and Genetic Resources, Traditional Knowledge and Folklore. (2002). &lt;i&gt;Review of Existing Intellectual Property Protection of Traditional Knowledge&lt;/i&gt;. WIPO. &lt;a href="http://www.wipo.int/edocs/mdocs/tk/en/wipo_grtkf_ic_3/wipo_grtkf_ic_3_17-main1.html"&gt;www.wipo.int/edocs/mdocs/tk/en/wipo_grtkf_ic_3/ &lt;/a&gt;&lt;a href="http://www.wipo.int/edocs/mdocs/tk/en/wipo_grtkf_ic_3/wipo_grtkf_ic_3_17-main1.html"&gt;wipo_grtkf_ic_3_17-main1.html &lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref30" name="_ftn30"&gt;[30]&lt;/a&gt; Reddy, P. (2012, 29 March). Is the TKDL a ‘confidential database’ and is it compliant with Indian copyright law? &lt;i&gt;SpicyIP&lt;/i&gt;.&lt;a href="http://spicyip.com/2012/03/is-tkdl-confidential-database-and-is-it.html"&gt; spicyip. &lt;/a&gt;&lt;a href="http://spicyip.com/2012/03/is-tkdl-confidential-database-and-is-it.html"&gt;com/2012/03/is-tkdl-confidential-database-and-is-it.html&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref31" name="_ftn31"&gt;[31]&lt;/a&gt; &lt;i&gt;KTKP Introduction&lt;/i&gt;, Korean Traditional Knowledge Portal.&lt;a href="http://www.koreantk.com/en/m_about/about_01.jsp?about=1"&gt; www. &lt;/a&gt;&lt;a href="http://www.koreantk.com/en/m_about/about_01.jsp?about=1"&gt;koreantk.com/en/m_about/about_01.jsp?about=1&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref32" name="_ftn32"&gt;[32]&lt;/a&gt; Brief introduction of China Traditional Medicine (TCM) Patent Database, China TCM Patent Database. &lt;a href="http://221.122.40.157/tcm_patent/englishversion/help/help.html"&gt;221.122.40.157/tcm_ &lt;/a&gt;&lt;a href="http://221.122.40.157/tcm_patent/englishversion/help/help.html"&gt;patent/englishversion/help/help.html &lt;/a&gt;38 Op. cit.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref33" name="_ftn33"&gt;[33]&lt;/a&gt; Reddy, P. (2012, 21 April). The need for an ‘independent’ review of the TKDL project&lt;i&gt;. SpicyIP&lt;/i&gt;. &lt;a href="http://spicyip.com/2012/04/need-for-anindependent-review-of-tkdl.html"&gt;spicyip.com/2012/04/need-for&lt;/a&gt;&lt;a href="http://spicyip.com/2012/04/need-for-anindependent-review-of-tkdl.html"&gt;anindependent-review-of-tkdl.html &lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref34" name="_ftn34"&gt;[34]&lt;/a&gt; Proposed by Ross J. Anderson, this thumb-rule has come to be known as Anderson’s Rule. See: Porter, H. (2009, 10 August). Nine sacked for breaching core ID card database. &lt;i&gt;The Guardian&lt;/i&gt;.&lt;a href="http://www.theguardian.com/commentisfree/henryporter/2009/aug/10/id-card-database-breach"&gt; www. &lt;/a&gt;&lt;a href="http://www.theguardian.com/commentisfree/henryporter/2009/aug/10/id-card-database-breach"&gt;theguardian.com/commentisfree/henryporter/2009/aug/10/ &lt;/a&gt;&lt;a href="http://www.theguardian.com/commentisfree/henryporter/2009/aug/10/id-card-database-breach"&gt;id-card-database-breach &lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref35" name="_ftn35"&gt;[35]&lt;/a&gt; See, e.g., Anderson, R. et. al. (2009). &lt;i&gt;Database State&lt;/i&gt;. Joseph Rowntree Reform Trust. &lt;a href="http://www.jrrt.org.uk/sites/jrrt.org.uk/files/documents/database-state.pdf"&gt;www.jrrt.org.uk/sites/jrrt.org.uk/files/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.jrrt.org.uk/sites/jrrt.org.uk/files/documents/database-state.pdf"&gt;documents/database-state.pdf &lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref36" name="_ftn36"&gt;[36]&lt;/a&gt; &lt;a href="http://www.peertopatent.org/"&gt;www.peertopatent.org &lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref37" name="_ftn37"&gt;[37]&lt;/a&gt; Rathi, M. (2012, 20 April). Guest Post – TKDL: A success – Really?&lt;/p&gt;
&lt;p&gt;&lt;i&gt;SpicyIP&lt;/i&gt;. &lt;a href="http://spicyip.com/2012/04/guest-post-tkdl-success-really.html"&gt;spicyip.com/2012/04/guest-post-tkdl-success-really.html&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref38" name="_ftn38"&gt;[38]&lt;/a&gt; Reddy, P. (2012, 19 March). Guest Post: The Traditional Knowledge Digital Library and the EPO. &lt;i&gt;SpicyIP&lt;/i&gt;. &lt;a href="http://spicyip.com/2012/03/guest-post-traditional-knowledge.html"&gt;spicyip.com/2012/03/guest&lt;/a&gt;&lt;a href="http://spicyip.com/2012/03/guest-post-traditional-knowledge.html"&gt;post-traditional-knowledge.html &lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref39" name="_ftn39"&gt;[39]&lt;/a&gt; Intergovernmental Committee on Intellectual Property and Genetic Resources, Traditional Knowledge and Folklore. (2003). &lt;i&gt;Practical Mechanisms for the Defensive Protection of Traditional Knowledge and Genetic Resources within the Patent System.&lt;/i&gt; WIPO.&lt;a href="http://www.wipo.int/edocs/mdocs/tk/en/wipo_grtkf_ic_5/wipo_grtkf_ic_5_6.pdf"&gt; www.wipo. &lt;/a&gt;&lt;a href="http://www.wipo.int/edocs/mdocs/tk/en/wipo_grtkf_ic_5/wipo_grtkf_ic_5_6.pdf"&gt;int/edocs/mdocs/tk/en/wipo_grtkf_ic_5/wipo_grtkf_ic_5_6.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref40" name="_ftn40"&gt;[40]&lt;/a&gt; Article 54(2) of the Convention on the Grant of European Patents. &lt;a href="https://www.epo.org/law-practice/legal-texts/epc.html"&gt;https://www.epo.org/law-practice/legal-texts/epc.html&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref41" name="_ftn41"&gt;[41]&lt;/a&gt; &lt;i&gt;Outcomes against bio-piracy&lt;/i&gt;, Traditional Knowledge Digital Library. &lt;a href="http://www.tkdl.res.in/tkdl/langdefault/common/Outcome.asp"&gt;www.tkdl.res.in/tkdl/langdefault/common/Outcome.asp&lt;/a&gt; 48 35 U.S.C. § 102(a).&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref42" name="_ftn42"&gt;[42]&lt;/a&gt; Quinn, G. (2009, 30 November). US Patent Office to Reject Based on Traditional Knowledge. &lt;i&gt;IPWatchdog&lt;/i&gt;. &lt;a href="http://www.ipwatchdog.com/2009/11/30/us-patent-office-to-reject-based-on-traditional-knowledge/id=7502"&gt;www.ipwatchdog.com/2009/11/30/us-patent&lt;/a&gt;&lt;a href="http://www.ipwatchdog.com/2009/11/30/us-patent-office-to-reject-based-on-traditional-knowledge/id=7502"&gt;office-to-reject-based-on-traditional-knowledge/ &lt;/a&gt;&lt;a href="http://www.ipwatchdog.com/2009/11/30/us-patent-office-to-reject-based-on-traditional-knowledge/id=7502"&gt;id=7502 &lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref43" name="_ftn43"&gt;[43]&lt;/a&gt; Lemley, M. A., &amp;amp; Sampat, B. (2012). Examiner Characteristics and&lt;/p&gt;
&lt;p&gt;Patent Office Outcomes. &lt;i&gt;The Review of Economics and Statistics,&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref44" name="_ftn44"&gt;[44]&lt;/a&gt; (3), 817-827. &lt;a href="http://www.mitpressjournals.org/doi/abs/10.1162/REST_a_00194?journalCode=rest"&gt;www.mitpressjournals.org/doi/abs/10.1162/ &lt;/a&gt;&lt;a href="http://www.mitpressjournals.org/doi/abs/10.1162/REST_a_00194?journalCode=rest"&gt;REST_a_00194?journalCode=rest &lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref45" name="_ftn45"&gt;[45]&lt;/a&gt; Sampat, B. (2010). When do Applicants Search for Prior Art? &lt;i&gt;The Journal of Law and Economics, 53&lt;/i&gt;(2), 399-416.&lt;a href="http://www.journals.uchicago.edu/doi/abs/10.1086/651959?journalCode=jle"&gt; www.journals. &lt;/a&gt;&lt;a href="http://www.journals.uchicago.edu/doi/abs/10.1086/651959?journalCode=jle"&gt;uchicago.edu/doi/abs/10.1086/651959?journalCode=jle&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref46" name="_ftn46"&gt;[46]&lt;/a&gt; Human Rights Council. (2014). Report of the Special Rapporteur on the Rights of Indigenous People. &lt;a href="http://unsr.vtaulicorpuz.org/site/index.php/documents/annual-reports/26-annual-report-hrc-2014"&gt;unsr.vtaulicorpuz.org/site/index. &lt;/a&gt;&lt;a href="http://unsr.vtaulicorpuz.org/site/index.php/documents/annual-reports/26-annual-report-hrc-2014"&gt;php/documents/annual-reports/26-annual-report-hrc-2014&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/a2k/blogs/giswatch-december-9-2016-sunil-abraham-and-vidushi-marda-digital-protection-of-traditional-knowledge-questions-raised-by-traditional-knowledge-digital-library-in-india'&gt;http://editors.cis-india.org/a2k/blogs/giswatch-december-9-2016-sunil-abraham-and-vidushi-marda-digital-protection-of-traditional-knowledge-questions-raised-by-traditional-knowledge-digital-library-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Sunil Abraham and Vidushi Marda</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2016-12-09T15:50:36Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/indian-express-march-20-2016-nishant-shah-digital-is-political">
    <title>The Digital is Political</title>
    <link>http://editors.cis-india.org/internet-governance/blog/indian-express-march-20-2016-nishant-shah-digital-is-political</link>
    <description>
        &lt;b&gt;To speak of technology is to speak of human life and living. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://indianexpress.com/article/technology/technology-others/the-digital-is-political/"&gt;published in the Indian Express&lt;/a&gt; on March 20, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;“You are supposed to write about the internet, why do you keep talking about all this politics?” I was taken aback when I was faced with this question. It is true – since the year has begun, I have talked about digital education and the ways in which it needs to account for unexpected and underserved communities, about net neutrality and why the Indian government needs to build a stronger, safer, and a more inclusive digital ecosystem. I have written about freedom of speech and expression and how this is going to be the year when we stand together to save the internet from vested interests that seek to convert it from a public commons into a private commodity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In my head, all these questions — of inclusion, of access, of presence, of rights — are questions of human life and living, but they are also those that are being hugely restructured by the internet and digital technologies. When faced with the query, I was reminded of a deep-seated division that has been at the heart of digital cultures.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Way back in the ’90s, when the internet was still a space of science fiction and the World Wide Web was in its nascent stages, there was a distinction made between Virtual Reality (VR) and Real Life (RL). The presumption in the construction of these categories was that the digital is only an escape, the technological is merely a prosthesis, and the internet is just a thing that a few geeks engaged with in their free time. However, the last three decades have made this distinction between VR and RL redundant.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We live in digital times. The digital is not just something we use strategically and specifically to do a few tasks. Our very perception of who we are, how we connect to the world around us, and the ways in which we define our domains of life, labour, and language are hugely structured by the digital technologies. The digital is ubiquitous and hence, like air, invisible. We live within digital systems, we live with intimate gadgets, we interact through digital media, and even though we might all be equally digital natives, there is no denying the fact that the very presence and imagination of the digital has dramatically restructured our lives. The digital, far from being a tool, is a condition and context that defines the shapes and boundaries of our understanding of the self, the society, and the structures of governance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The pervasive nature of the digital technologies and internet can be found at multiple levels. For instance, we do not think about going online anymore, because most of our devices are connected 24×7 to the digital web. Even when we are not online, sunk in a bad network connection, or protecting our precious data usage, we know that our avatars and digital identities are online and talking without us.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So established is this phenomenon that we even have a name for the anxiety it creates: FOMO — the Fear Of Missing Out. Similarly, the digital can be located at the level of human understanding. We are used to thinking of ourselves as digital systems. We talk about our primary identity as one marked by information overload. We often complain, when faced with too many demands on our time and space, that we don’t have enough bandwidth to deal with new problems, and we are not referring to digital connectivity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The digital also has space at the level of policy and governance. If you, like the many millions of Indians, have registered for an Aadhaar card, you have already been marked by a digital identity whether or not you have broadband access. When our government launches Digital India campaigns, it is not merely about an economic model of growth, but it is suggesting that the digital is going to be at the foundations of the new India that we want to build for the future.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If the digital is so central to our fundamental understanding of the self, the society, and the state, then surely it is time to stop thinking that these technologies have nothing to do with politics? There remains a forced imagination of technologies as devices, as tools, as prostheses which do not have any other role than the performing of a function. However, this is a fallacy, because not only do technologies shape our sense of who we are, but they also prescribe new templates and models of who we are going to be. In the process, these technologies take political action, create social structures, mobilise cultural possibilities, and often, because they are technologies that are still elite and available to the privileged few in the country, they enable decisions which are not always fair, open, and just.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Hence, a technological decision cannot be read merely as a technical decisions but as human decisions. To speak of technology is to speak of human life and living. To write about technology is to write about politics, because a separation between the two is not only futile but downright dangerous.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/indian-express-march-20-2016-nishant-shah-digital-is-political'&gt;http://editors.cis-india.org/internet-governance/blog/indian-express-march-20-2016-nishant-shah-digital-is-political&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-06-05T03:58:46Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
