The Centre for Internet and Society
http://editors.cis-india.org
These are the search results for the query, showing results 171 to 185.
CPDP 2014 Reforming Data Protection: The Global Perspective
http://editors.cis-india.org/events/cpdp-2014-reforming-data-protection-global-perspective
<b>Already in its 7th edition, the annual Computer Privacy and Data Protection conference (organised by CPDP) is being held in Brussels from January 22 to 24, 2014. Malavika Jayaram will be speaking at this event.</b>
<hr />
<p>The Centre for Internet and Society is <a class="external-link" href="http://www.cpdpconferences.org/wednesday22january2014.html">one of the sponsors</a> for this event. Click <a class="external-link" href="http://www.cpdpconferences.org/wednesday22january2014.html">here</a> to read the full programme.</p>
<hr />
<p style="text-align: justify; ">CPDP is a <b>non-profit platform</b> originally founded in 2007 by research groups from the Vrije Universiteit Brussel, the Université de Namur and Tilburg University, which has now grown significantly and incorporates a consortium of 21 conference partners.</p>
<p style="text-align: justify; ">CPDP offers the <b>cutting edge in legal, regulatory, academic and technological development in privacy and data protection</b>. In an atmosphere of independence and mutual respect, CPDP gathers academics, lawyers, practitioners, policy-makers, computer scientists and civil society from all over the world to exchange ideas and discuss the latest emerging issues and trends. This unique multidisciplinary formula has served to make CPDP <b>one of the leading data protection and privacy conferences in Europe and around the world</b>.</p>
<p style="text-align: justify; ">CPDP2014 has become <b>truly global</b>: it is co-organized by conference partners from Europe and the United States, and devotes panels to Latin-America and India. Moreover, CPDP is reaching out to the Asia-Pacific with speakers coming from all over the region.</p>
<p style="text-align: justify; ">The progressive growth of CPDP will culminate in an unprecedented 7<sup>th</sup> edition. A terrific programme will include <b>more than 60 panels</b> held over three consecutive days. The panels will focus on key issues that cover <b>all current debates</b>: The data protection reform in the European Union, PRISM, big data, cybercrime, data retention, cloud computing, enforcement by Data Protection Authorities, biometrics, e-health, privacy by design, and much, much more. In addition, there will be a day event on the ethical issues of data collection on minorities, and the use of technology to advance the status of Roma.</p>
<p style="text-align: justify; ">CPDP will offer valuable contributions from the <b>leading names in the field</b>, including key <b>representatives from all the major European institutions</b> - the European Commission, the European Parliament, the European Data Protection Supervisor, and the Council of Europe.</p>
<p style="text-align: justify; ">In addition to the well-known classic <b>Pecha Kucha</b> side event, there will be several <b>public debates</b> held in the evenings – both in Dutch and English.</p>
<p style="text-align: justify; ">CDP2014 will continue to pay particular attention to <b>high-level and innovative research from PhD Students and outstanding junior researchers </b>by organizing sessions completely devoted to their work. CPDP2014 will also remain home to several <b>award ceremonies,</b> such as the award for the best Multidisciplinary Privacy Paper and the EPIC International Champion of Freedom Award.</p>
<p style="text-align: justify; ">Whether you are involved in the Conference as a sponsor, supporter, partner or participant or not, CPDP2014 welcomes you to join the event and contribute to the debate on emerging privacy and data protection issues.</p>
<p style="text-align: justify; ">For up to date information, registration and the programme, please visit <a href="http://www.cpdpconferences.org/">http://www.cpdpconferences.org/</a> and follow CPDP on Facebook (cpdpconferences) and Twitter (@cpdpconferences).</p>
<p style="text-align: justify; ">If you have any questions please contact: <a href="mailto:info@cpdpconferences.org">info@cpdpconferences.org</a></p>
<p>
For more details visit <a href='http://editors.cis-india.org/events/cpdp-2014-reforming-data-protection-global-perspective'>http://editors.cis-india.org/events/cpdp-2014-reforming-data-protection-global-perspective</a>
</p>
No publisherpraskrishnaEventInternet GovernancePrivacy2013-12-11T03:39:50ZEventCounter Surveillance Panel: DiscoTech & Hackathon
http://editors.cis-india.org/events/counter-surveillance-panel-disco-tech-hackathon
<b>We invite you to a Counter Surveillance DiscoTech and Hackathon at the Centre for Internet and Society in Bangalore on Saturday, March 1, 2014 (9.00 a.m. to 5.00 p.m.). The event is being co-organized by the Centre for Internet and Society in tandem with the MIT Centre for Civic Media Co-Design Lab, with support from members of Tactical Technology Collective, Hackteria.org and Srishti School of Art Design and Technology. Registrations begin at 9.00 a.m. The event shall close with a featured talk by renown information activist and maker lab innovator Smari McCarthy, titled "Privacy for Humanity" at 5.00 p.m.</b>
<h2>Overview</h2>
<p style="text-align: justify; ">Mirroring the call by MIT Civic Media Lab <a href="http://codesign.mit.edu/discotechs/">Co-Design Studio</a>, this event brings together students, technologists, designers and citizens to explore counter-surveillance strategies. The event will be held simultaneously across various locations including Boston, Palestine, Lisbon and Buenos Aires. Click here for the definition of <a href="http://codesign.mit.edu/discotechs/">DiscoTech</a>.(Discovering Technology)<b> </b></p>
<h2 style="text-align: justify; ">Agenda</h2>
<p class="Default" style="text-align: justify; ">We shall begin with brief contextualized introductions catalyzed by researchers in the field of privacy & surveillance, followed by workshops and hackathons led by expert practitioners. Participants are welcome from diverse backgrounds looking to be involved in designing engaging and creative ways to counter surveillance. The event shall close with a featured talk by renown information activist and maker lab innovator <a href="http://en.wikipedia.org/wiki/Sm%C3%A1ri_McCarthy"><b>Smari McCarthy</b></a> , titled "<b>Privacy for Humanity</b>" at 5.00 p.m.</p>
<h3 class="Default" style="text-align: justify; ">Introductory Catalyst Sessions</h3>
<ul>
<li style="text-align: justify; "><b>Malavika Jayaram</b>: Fellow at <a class="external-link" href="http://cyber.law.harvard.edu/people/mjayaram">Berkman Center for Internet and Society at Harvard University</a> and the <a class="external-link" href="http://www.cis-india.org/">Centre for Internet and Society, Bangalore</a></li>
<li style="text-align: justify; "><b>Laird Brown</b>: DesiSec Project at the <a href="http://editors.cis-india.org/" class="external-link">Centre for Internet and Society, Bangalore</a> and University of Toronto</li>
<li style="text-align: justify; "><b>Kaustubh Srikant</b>: Head of Technology, <a class="external-link" href="https://tacticaltech.org/kaustubh-srikanth-head-technology">Tactical Technology Collective</a> and <b>Maya Indira Ganesh</b> (Program Director)</li>
<li style="text-align: justify; "><b>Abhay Raj Naik</b>: Assistant Professor,<a class="external-link" href="http://www.azimpremjiuniversity.edu.in/abhayraj-naik"> Azim Premji University</a></li>
</ul>
<h3>Design and Hackathon Lead Catalysts</h3>
<ul>
<li style="text-align: justify; "><a href="http://hackteria.org/?p=278"><b>Yashas</b></a><a href="http://hackteria.org/?p=278"><b> </b></a><a href="http://hackteria.org/?p=278"><b>Shetty</b></a>:Faculty@ <a href="http://www.srishti.ac.in/">www.srishti.ac.in</a> and Co-Founder <a href="http://www.hackteria.org/">Hackteria.org</a> (DNA Spoofing, Surveillance Camera: Avoidance, Microscopic Re-Appropriation & Bacterial Discotheque)</li>
</ul>
<ul>
<li style="text-align: justify; "><b>Hari Dilip Kumar</b>: Co, Founder, <a class="external-link" href="http://www.fluxgentech.com/people">FluxGen</a>: (Introducing data transmission protocols, Software Defined Radio (SDR) design and surveillance detection )</li>
</ul>
<ul>
<li style="text-align: justify; "><b>Sharath Chandra Ram</b>: Researcher @ CIS <a class="external-link" href="http://dorkbot.org/dorkbotbangalore/">Open Lab</a> and Faculty@<a class="external-link" href="http://www.srishti.ac.in/">Srishti</a> (Civic Media solutions using open citizen networks and the web, spectrum scanning, visual communication design strategies, finger print mash-up publishing) </li>
</ul>
<h3 style="text-align: justify; ">Featured Talk and Interactive Closing Session by <a class="external-link" href="http://en.wikipedia.org/wiki/Sm%C3%A1ri_McCarthy">Smari McCarthy</a><b><a class="external-link" href="http://en.wikipedia.org/wiki/Sm%C3%A1ri_McCarthy"> </a></b></h3>
<p style="text-align: justify; "><b>(Executive Director, International Modern Media Institute and Founder, Icelandic Pirate Party & Icelandic Digital Freedom Society)</b><b></b></p>
<p class="callout" style="text-align: justify; "><b>Title of Talk: PRIVACY for HUMANITY - 5.00 p.m.<br /></b></p>
<hr />
<p><a href="http://editors.cis-india.org/internet-governance/blog/counter-surveillance.pdf" class="internal-link"> </a><b><a href="http://editors.cis-india.org/internet-governance/blog/counter-surveillance.pdf" class="internal-link">Click to download the flyer invite</a></b><br />Date: Saturday, March 1, 2014<br />Time: 9.00 a.m. to 5.00 p.m. (Registration 9.00 a.m. sharp)<br />Venue: Centre for Internet and Society, Bangalore<br />Map : <a href="http://bit.ly/1fcDDLG">http://</a><a href="http://bit.ly/1fcDDLG">bit.ly</a><a href="http://bit.ly/1fcDDLG">/1fcDDLG</a><b><br /></b><a href="mailto:sharath@cis-india.org"><br /></a><i>Please RSVP due to limited space and logistics for lunch and refreshments</i></p>
<p>
For more details visit <a href='http://editors.cis-india.org/events/counter-surveillance-panel-disco-tech-hackathon'>http://editors.cis-india.org/events/counter-surveillance-panel-disco-tech-hackathon</a>
</p>
No publisherpraskrishnaSurveillanceEventInternet GovernancePrivacy2014-02-28T05:36:15ZEventConsultation on Figures of Learning in the Digital Context
http://editors.cis-india.org/raw/consultation-on-new-figures-of-learning-in-digital-context
<b>The Centre for Internet and Society welcomes you to a consultation on new figures of learning in the digital context at its office in Bangalore on September 22, 2014 from 2 p.m. to 6 p.m.</b>
<p> </p>
<p>The increasing prevalence of the internet and digital technologies today has engendered a new kind of learning environment, which is connected and collaborative, yet also focussed on the individual, with an emphasis on practice. The pervasive influence of technology in teaching-learning practice has also resulted in new tools, processes and platforms, which have added dimensions to learning, and led to the creation of new bodies of knowledge in the digital context. These new figures, spaces, objects and processes, often challenge and inflate given notions of expertise and authority, increasingly locating them outside the familiar framework of the university and a traditional classroom-based approach to learning.</p>
<p>While the processes of knowledge production have been rapidly changing in the last couple of decades, some examples being data mining, distant reading, cultural mapping and design thinking as new ways of parsing, organising, curating and processing information or knowledge, traditionally the point of reference for authoritative ‘figures’ of learning remains the same. These are that of the teacher, facilitator, reader, student, participant etc. However, with the emergence of such new processes of knowledge-making which are largely located in the digital context, one can see the presence of some non-traditional figures of knowledge as well – such as the geek, hacker, blogger, story-teller, worker, designer, activist etc. There are figures which, consciously or unconsciously subvert and redefine certain conventions of knowledge-making practices, by inventing new terms or redefining old ones. More importantly, the emergence of this nomenclature is symptomatic of a change in the predominant discourse that constitutes a particular kind of ‘digital subject’ or entity that inhabits the digital in a particular way.</p>
<p>The present consultation is an exercise to map these concepts and changes around a set of figures of learning, old and new, to understand the discursive shifts that produce them and locate them in the contemporary moment. Participants from diverse areas of research and practice would be invited to make a short ten minute presentation on one such figure, drawn from their area of interest and work, and examine the concepts or notions behind them. This will be followed by group discussions and a 30 minute writing sprint at the end of the consultation to consolidate the discussion.</p>
<p> </p>
<p>
For more details visit <a href='http://editors.cis-india.org/raw/consultation-on-new-figures-of-learning-in-digital-context'>http://editors.cis-india.org/raw/consultation-on-new-figures-of-learning-in-digital-context</a>
</p>
No publisherpraskrishnaRAW EventsDigital KnowledgeResearchFigures of LearningResearchers at WorkEvent2015-11-13T05:39:00ZEventConsultation on 'Digital Futures of Indian Languages'
http://editors.cis-india.org/raw/digital-futures-of-indian-languages-2015
<b>A consultation on 'digital futures of Indian languages' will be held at the CIS office in Bangalore on December 12, 2015, to generate ideas and structure the Indian languages focus area of the CSCS Digital Innovation Fund (CDIF). It is being led by Dr. Tejaswini Niranjana, Centre for the Study of Culture and Society (CSCS), and Tanveer Hasan, A2K programme at CIS; and is supported by CDIF.</b>
<p> </p>
<h2>A Consultation to Generate Ideas for the CSCS Digital Innovation Fund (CDIF)</h2>
<p>We at the Centre for the Study of Culture and Society, Bangalore; Centre for Indian Languages in Higher Education, Tata Institute of Social Sciences, Mumbai; and Access to Knowledge Programme, Centre for Internet and Society, Bangalore, have between us more than a decade-long experience in the field of Indian languages for higher education and Indic language computing. Together we have, over the past ten years, produced new research and incubated innovative pilot projects to stimulate the use of Indian languages in higher education, especially in the context of a widening linguistic divide in that sphere.</p>
<p>As a new phase in this process, we would like to explore the possible digital futures of Indian languages. Already, there have been many interesting but sporadic attempts at digitization of Indian language text resources and development of software for translation between Indian languages and a host of Indian language support platforms for web-based services. While this momentum is impressive, a lot more remains to be done, when seen against the backdrop of the surging demand for Indian language computational tools, especially those with potential for knowledge-use, that is, tools which could be used by students, teachers, researchers, media analysts, self-learners, bibliographers, librarians, archivists, collectors and the public at large.</p>
<p>The <a href="http://cis-india.org/raw/cscs-digital-innovation-fund" target="_blank">CSCS Digital Innovation Fund</a> is looking to help set up new platforms that aid in generating, processing and making available a wide range of born-digital content. Under the CDIF, the Indian Languages initiative will support the development of new technological aids, apps, software programmes, websites, DYI digitisation devices, and any other project which will enrich the digital use of Indian languages.</p>
<p>We are organising this national consultation with the intention of bringing together people who have been or would like to be involved in such initiatives. We expect each participant to make a short 10-15 minute presentation on an idea they would like to develop, to take part in the general discussions, and to offer feedback to other speakers. We hope to learn from these conversations so that our own research and initiative development will benefit from the inputs as also to contribute to the conversation in such a way that isolated practices, innovations and opportunities are given a platform for greater generalisation and scalability.</p>
<p>- <em><strong>Tejaswini Niranjana, Ashwin Kumar AP, and Tanveer Hasan</strong></em></p>
<p> </p>
<p>
For more details visit <a href='http://editors.cis-india.org/raw/digital-futures-of-indian-languages-2015'>http://editors.cis-india.org/raw/digital-futures-of-indian-languages-2015</a>
</p>
No publishersumandroLanguageCDIFLearningIndic ComputingResearchers at WorkEvent2016-01-15T06:10:57ZEventConsilience – 2013
http://editors.cis-india.org/internet-governance/events/consilience-2013-law-technology-committee-nls-bangalore
<b>The Law and Technology Committee of National Law School of India University, Bangalore is organising ‘Consilience – 2013′, an annual conference on law and technology, to be held on May 25 and 26, 2013. The Centre for Internet and Society is a co-partner for this event.</b>
<hr />
<p>Theme: Data Protection and Cyber Security in India. Click to read the <a href="http://editors.cis-india.org/internet-governance/blog/consilience-2013.pdf" class="internal-link">report here</a>.</p>
<hr />
<p><b>Topics:<br />Frameworks for Data Protection in India: The J. A.P. Shah “Report of the Group of Experts on Privacy”</b></p>
<p style="text-align: justify; ">a. What is the scope of the principles/framework?</p>
<p style="text-align: justify; ">b. What could be the strengths and limitation of their application?</p>
<p style="text-align: justify; ">c. How does Report define privacy for India?</p>
<p style="text-align: justify; ">d. Would an alternative framework for privacy in India be better? If so, what would this framework look like?</p>
<p><b>India and the EU: The Privacy Debate</b></p>
<p style="text-align: justify; ">a. How does the Indian data protection regime differ from the EU regime?</p>
<p style="text-align: justify; ">b. Was the EU is justified in not accepting India as a data secure country? Reason for or against.</p>
<p style="text-align: justify; ">c. In what way does the Indian regime on data protection not meet the requirements of EU’s data protection directive?</p>
<p style="text-align: justify; ">d. What changes need to be made in the Indian regime to become EU compliant? Are these changes feasible? Should India make these changes?</p>
<p><b>Governmental Schemes, Data Protection, and Security</b></p>
<p style="text-align: justify; ">a. In India, do private public partnerships between government and the private sector adequately incorporate data protection standards?</p>
<p style="text-align: justify; ">b. What have been concerns related to data protection and security that have arisen from government schemes? (Please use two governmental schemes as case studies)</p>
<p style="text-align: justify; ">c. Are these concerns related to the policy associated with the project – the architecture of the project as well as the implementation?</p>
<p style="text-align: justify; ">d. Should the larger question of data protection for governmental schemes be incorporated into a privacy legislation? If yes, how so?</p>
<p><b>Contracts and Data Protection in India</b></p>
<p style="text-align: justify; ">a. How are contracts used to ensure data protection in India? What actors use contracts?</p>
<p style="text-align: justify; ">b. Are there weaknesses in using contracts to ensure data protection standards?</p>
<p style="text-align: justify; ">c. Do contracts address questions brought about from technology like the cloud?</p>
<p><b>Cyber security in India</b></p>
<p>a. What are the perceived challenges and threats to cyber security in India?</p>
<p>b. Are these currently being addressed through policy/projects? If yes, how so?</p>
<p>c. How does India’s cyber security regime compare to other countries?</p>
<p><b>Surveillance and Cyber Security</b></p>
<p style="text-align: justify; ">a. Does policy in India enable the Government of India to surveil individuals for reasons related to cyber security?</p>
<p>b. If so – through what policy, projects, legislation?</p>
<p>c. Do the relevant policies, projects, and legislation impact privacy? How so?</p>
<p><b>The Draft National Cyber Security Policy</b></p>
<p style="text-align: justify; ">a. What is the scope of the National Cyber Security Policy of India? Does the draft policy adequately address all of the concerns within the ambit of cyber security?</p>
<p style="text-align: justify; ">b. Would the Draft National Cyber Security Policy of India be effective in meeting the goal of enhancing cyber security levels in India?</p>
<p style="text-align: justify; ">c. How does the Draft National Cyber Security Policy compare to other countries cyber security policies?</p>
<p><b>Word Limit</b>:</p>
<p>Abstract: 750-800 words</p>
<p>Paper: 2,500 words</p>
<p><b>Deadlines:</b></p>
<p>Abstract Submission: April 30, 2013</p>
<p>Paper Submission: May 15, 2013</p>
<p><b>Contact Details</b>:</p>
<p>consilience2013[at]gmail[dot]com</p>
<p>Mohak Arora: +91-90359-21926</p>
<p>Shivam Singla: +91-99167-08701</p>
<p style="text-align: justify; ">Each participant is required to submit an abstract on <b>any one</b> of the seven topics above and can choose the specific issue within the selected topic to discuss.</p>
<p style="text-align: justify; ">For additional details, click<b> <a href="http://consilience.co.in/index.php/component/content/article/20-frontpage/310-call-for-papers">here</a>.</b></p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/events/consilience-2013-law-technology-committee-nls-bangalore'>http://editors.cis-india.org/internet-governance/events/consilience-2013-law-technology-committee-nls-bangalore</a>
</p>
No publisherpraskrishnaEventInternet GovernancePrivacy2013-11-20T06:15:15ZEventCommunity Capacity Building Workshop at KIIT University
http://editors.cis-india.org/openness/events/community-capacity-building-workshop-at-kiit
<b>The Centre for Internet and Society's Access to Knowledge (CIS-A2K) team is organizing a workshop for community capacity building at KIIT University on March 30, 2014.</b>
<p style="text-align: justify; ">Experienced Wikimedians and Subhashish Panigrahi from CIS-A2K mentored the community about community building strategies and outreach. They had a discussion about the further steps with students (graduating batch) of the Indian Institute of Mass Communication (IIMC), Dhenkanal who took part in the Odia Wikipedia Education program. Finally there was a discussion on CIS-A2K's Odia language work plan for Wikipedia and WikiSource.</p>
<p>
For more details visit <a href='http://editors.cis-india.org/openness/events/community-capacity-building-workshop-at-kiit'>http://editors.cis-india.org/openness/events/community-capacity-building-workshop-at-kiit</a>
</p>
No publisherpraskrishnaAccess to KnowledgeWikimediaWikipediaOdia WikipediaOpennessEvent2014-04-08T05:22:17ZEventCommunication Rights in the Age of Digital Technology
http://editors.cis-india.org/internet-governance/events/communication-rights-in-the-age-of-digital-technology
<b>The Centre for Internet & Society (CIS) invites you to a conference to discuss the evolution of privacy and surveillance in India on Friday, October 30, 2015 at Deck Suite Hall, 5th Floor, Habitat Centre, Lodhi Road, Near Air Force Bal Bharti School, New Delhi - 110003, from 11 a.m. to 5 p.m.</b>
<p>The conference will be conducted in a round-table format. Topics to be discussed shall include, among others, the Human DNA Profiling Bill, 2012, the PIL questioning the data collection under the UID scheme, the draft National Encryption Policy and the Supreme Court judgement in Shreya Singhal v. Union of India, in the context of privacy and surveillance in India. The conference will be a forum for discussion, knowledge exchange and agenda building.</p>
<hr />
<h3 style="text-align: justify; ">Background Note</h3>
<p style="text-align: justify; ">In India, the Right to Privacy has been interpreted to mean an individuals’ right to be left alone. In the age of massive use of Information and Communications Technology, it has become imperative to have this right protected. The Supreme Court has held in a number of its decisions that the right to privacy is implicit in the fundamental right to life and personal liberty under Article 21 of the Indian Constitution, though Part III does not explicitly mention this right. Since the 1960s, the Apex Court has been dealing with this issue, primarily with respect to privacy being recognised as a fundamental or common law right and the standards that need to be satisfied in order to impose any restrictions on it.</p>
<p style="text-align: justify; ">In the year 2012, the Planning Commission constituted a Group of Experts under the chairmanship of Justice AP Shah, Former Chief Justice of the Delhi High Court to recommend a <a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf">potential privacy framework</a> for privacy in India. Previously in 2011 the Department of Personnel and Training had prepared a <a href="https://bourgeoisinspirations.files.wordpress.com/2010/03/draft_right-to-privacy.pdf">draft Bill on Right to Privacy </a>which has yet to materialize into a comprehensive legislation on privacy. In 2014, a version of the revised Right to Privacy Bill was <a href="http://cis-india.org/internet-governance/blog/leaked-privacy-bill-2014-v-2011">leaked</a>. Amendments to the Bill aim to protect individuals against misuse of their data by the government or private agencies, and is in the process of being <a href="http://www.newindianexpress.com/nation/Centre-Giving-Final-Touches-to-Right-to-Privacy-Bill/2015/03/17/article2717271.ece">finalized by the Indian Government</a><a href="http://www.newindianexpress.com/nation/Centre-Giving-Final-Touches-to-Right-to-Privacy-Bill/2015/03/17/article2717271.ece">. </a></p>
<p style="text-align: justify; ">Of late, privacy concerns have gained importance in India due to the initiation of national programmes like the UID Scheme, DNA Profiling, the National Encryption Policy, etc. attracting criticism for their impact on the right to privacy. For example, DeitY introduced a draft National Encryption Policy in September this year to prescribe methods for encryption. However, the policy would have posed significant restriction on the ability of citizens to encrypt online communication. Backlash from the citizens, industry, social media and privacy experts led the Government to withdraw the policy as the measures included made the information system vulnerable in every sense.</p>
<p style="text-align: justify; ">Earlier this year, the Apex Court gave a <a href="http://supremecourtofindia.nic.in/FileServer/2015-03-24_1427183283.pdf">historical</a><a href="http://supremecourtofindia.nic.in/FileServer/2015-03-24_1427183283.pdf"> judgement</a> by striking down section 66A of the IT (Amendment) Act 2008. The Court upheld section 69A and the Information Technology (Procedure & Safeguards for Blocking for Access of Information by Public) Rules 2009 to be constitutionally valid, which accords the government with the authority to block transmission of information and websites when it deems it as necessary for reasons like sovereignty and integrity of India, public order, etc.</p>
<p style="text-align: justify; ">Another government initiative which has generated considerable controversy for its threat to privacy is the UID project which aims to issue a unique identification number to all citizens by the Unique Identification Authority of India, which can be authenticated and verified online. In August this year, the Supreme Court, <a href="http://judis.nic.in/supremecourt/imgs1.aspx?filename=42841">vide an interim order</a>, restricted the use of Aadhaar by declaring it to be optional for availing government benefits and services. Though the Government contended the right to privacy as a fundamental right in India, the Court deferred this issue to a larger Constitutional Bench, and the Supreme Court upheld its decision yet again in the month of October.</p>
<p style="text-align: justify; ">Similarly, the <a href="http://www.dbtindia.nic.in/wp-content/uploads/Human-DNA-Profiling-Bill.pdf">d</a><a href="http://www.dbtindia.nic.in/wp-content/uploads/Human-DNA-Profiling-Bill.pdf">raft</a><a href="http://www.dbtindia.nic.in/wp-content/uploads/Human-DNA-Profiling-Bill.pdf"> Human DNA </a><a href="http://www.dbtindia.nic.in/wp-content/uploads/Human-DNA-Profiling-Bill.pdf">P</a><a href="http://www.dbtindia.nic.in/wp-content/uploads/Human-DNA-Profiling-Bill.pdf">rofiling </a><a href="http://www.dbtindia.nic.in/wp-content/uploads/Human-DNA-Profiling-Bill.pdf">B</a><a href="http://www.dbtindia.nic.in/wp-content/uploads/Human-DNA-Profiling-Bill.pdf">ill 2015</a> is being questioned on grounds of privacy invasion on a massive scale as it aims to collect and store the DNA samples of criminals, suspects, volunteers, and victims and regulate DNA laboratories and DNA sampling for use by law enforcement agencies. The Bill also fails to include comprehensive privacy safeguards and provisions regarding collection of DNA samples with or without the consent of an individual, making individual privacy an important concern.</p>
<p style="text-align: justify; ">Going by these ongoing debates, one can say that Privacy as a right has primarily evolved by way of judicial interpretation and continues to evolve in light of several controversial Government policies, projects and schemes. However its development is often undermined by tension between several competing national interests which calls for clear guidelines to protect this inviolable right of the citizens.</p>
<h3><a href="http://editors.cis-india.org/internet-governance/blog/gsma-conference-invite.pdf" class="internal-link">
<hr />
<b>Download the Invite</b></a></h3>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/events/communication-rights-in-the-age-of-digital-technology'>http://editors.cis-india.org/internet-governance/events/communication-rights-in-the-age-of-digital-technology</a>
</p>
No publisherrakeshSurveillanceEventInternet GovernancePrivacy2015-10-24T07:45:26ZEventCommunication Design and Visualising Information
http://editors.cis-india.org/internet-governance/events/communication-design-and-visualising-information
<b>Saumyaa conducted a session on the broad principles of communication design and visualising information. </b>
<p>Saumyaa spoke about</p>
<ul>
<li>Principles and methods of visual communication</li>
<li>Choosing visualisation formats for specific purposes</li>
<li>Aesthetics and clarity in visualisations</li>
</ul>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/events/communication-design-and-visualising-information'>http://editors.cis-india.org/internet-governance/events/communication-design-and-visualising-information</a>
</p>
No publisherpraskrishnaEventInternet Governance2017-05-20T02:45:46ZEventCoinFest 2016
http://editors.cis-india.org/openness/events/coinfest-2016
<b>Coinsecure and India Bitcoin have joined hands to organize to organize CoinFest at the Centre for Internet & Society's Bangalore office on Saturday, April 10, 2016, from 4.00 p.m. to 7.00 p.m.</b>
<h3 style="text-align: justify; ">CoinFest 2016</h3>
<p style="text-align: justify; ">CoinFest 2015 was a stunning success, taking Canada’s crypto holiday to countries around the world. CoinFest 2016 is building on that momentum, preparing a series of events for April with over two dozen cities planning to participate. This year's CoinFest will celebrate Bitcoin & educate participants about its uses & benefits. Come learn about bitcoin, blockchain, and other digital currencies! Find out how to use them and how this technology is having a positive impact globally!</p>
<h3 style="text-align: justify; ">Speakers</h3>
<ul>
<li><a href="https://www.facebook.com/CoinSecure.in/">Coinsecure</a><span> - Benson Samuel & team will be talking about journey of Bitcoin in India.</span></li>
<li><span> </span><a href="https://www.facebook.com/airbitz/">Airbitz</a><span> - Meghan Kellison-Lords & </span><a href="https://www.facebook.com/FactomProject/">Factom</a><span> - Paul Snow will also be participating via Hangouts.</span></li>
</ul>
<p><b><a class="external-link" href="https://www.facebook.com/events/653126684826814/">Follow the event on Facebook</a></b></p>
<p> </p>
<p>
For more details visit <a href='http://editors.cis-india.org/openness/events/coinfest-2016'>http://editors.cis-india.org/openness/events/coinfest-2016</a>
</p>
No publisherpraskrishnaOpennessEvent2016-04-04T15:19:28ZEventCode As Communication
http://editors.cis-india.org/openness/events/code-as-communication
<b>Gene Kogan will give a talk at the Centre for Internet & Society's Bangalore office on February 2, 2015. The talk will be from 5 p.m. to 7 p.m. Gene's talk will draw analogies between software, communication, creativity, and expressivity. Programming has a long history of comparison to other written media, with inevitable consequences on our legal policy over authorship and ownership.</b>
<p style="text-align: justify; ">With the emergence of free "creative coding" and "live coding" platforms like Processing, OpenFrameworks, PureData, vvvv, and SuperCollider, the boundaries between code and creative expression have further eroded, initiating inquiry as to its overlap with "traditional" creative writing. We are confronted with old questions within new contexts. As existing institutions incorporate emerging technologies into their creative programs and new ones take root and solidify, how do we make an infrastructure which most effectively and transparently fosters the development of creative technology? How do we ensure that this process is fair and democratic, and at greatest benefit and lowest cost to the public? What rights should users and developers receive? As the distinction between art and technology becomes blurry, what relevance does the FOSS movement have in cultivating cultural production?</p>
<h2 style="text-align: justify; ">Gene Kogan</h2>
<p style="text-align: justify; ">Gene Kogan is a programmer and artist who writes free software for new and emerging technologies. He creates tools for live music, dance, theatre, and performance art. He contributes to numerous open-source software projects, and frequently gives workshops and demonstrations on topics related to code and art.</p>
<p style="text-align: justify; ">Follow Gene Kogan elsewhere:</p>
<ul>
<li>Website: <a class="moz-txt-link-rfc2396E" href="http://www.genekogan.com">http://www.genekogan.com</a> </li>
</ul>
<ul>
<li>Vimeo: <a class="moz-txt-link-rfc2396E" href="http://www.vimeo.com/genekogan">http://www.vimeo.com/genekogan</a> </li>
</ul>
<ul>
<li>Soundcloud: <a class="moz-txt-link-rfc2396E" href="http://www.soundcloud.com/genekogan">http://www.soundcloud.com/genekogan</a> </li>
</ul>
<ul>
<li>Flickr: <a class="moz-txt-link-rfc2396E" href="http://www.flickr.com/genekogan">http://www.flickr.com/genekogan</a> </li>
</ul>
<ul>
<li>Github: <a class="moz-txt-link-rfc2396E" href="http://www.github.com/genekogan">http://www.github.com/genekogan</a> </li>
</ul>
<ul>
<li>Twitter: <a class="moz-txt-link-rfc2396E" href="http://www.twitter.com/genekogan">http://www.twitter.com/genekogan</a></li>
</ul>
<p>
For more details visit <a href='http://editors.cis-india.org/openness/events/code-as-communication'>http://editors.cis-india.org/openness/events/code-as-communication</a>
</p>
No publisherpraskrishnaOpennessCodingEvent2015-01-23T03:12:15ZEventCISxScholars Delhi - William F. Stafford (Nov 03, 6:30 pm)
http://editors.cis-india.org/raw/cisxscholars-delhi-william-f-stafford-thursday-nov-03
<b>We are delighted to have William F. Stafford, PhD candidate in UC Berkeley, present on "Public Measurements, Private Measurements, and the Convergence of Units" at the CIS office in Delhi on Thursday, Nov 03, at 6:30 pm. Please RSVP if you are joining us: <raw@cis-india.org>.</b>
<p> </p>
<p><em>CISxScholars are informal events organised by CIS for presentation, discussion, and exchange of academic research and policy analysis.</em></p>
<hr />
<h2>Public Measurements, Private Measurements and the Convergence of Units</h2>
<p>In this discussion I will focus on a comparison between the standard government prescribed meters for autorickshaws and taxis and the role of ridesharing apps as instruments which take measurements, as the basis for the calculation of fares, and the more general questions which arise for commerce, technology and their regulation. I will organise the paper around the observations of a paratransit operations engineer on the distinction between public and private instruments, and explore the possible implications of new forms of commercialisation of location and proximity and reactions to such developments for understanding questions of fairness and corruption.</p>
<h2>William F. Stafford</h2>
<p>William F. Stafford, Jr., is a PhD candidate in the Department of Anthropology, UC Berkeley. William's research focuses on the auto-rickshaw meter in New Delhi, as a way to engage with classical questions concerning the relationship between measurement, quantification and delimitations of domains of labour. William's general interests concern the analytics of labour and the reconfiguration of what are often taken as its axiomatic aspects. Before joining Berkeley, he studied Sociology at Jawaharlal Nehru University and the Delhi School of Economics.</p>
<p> </p>
<p>
For more details visit <a href='http://editors.cis-india.org/raw/cisxscholars-delhi-william-f-stafford-thursday-nov-03'>http://editors.cis-india.org/raw/cisxscholars-delhi-william-f-stafford-thursday-nov-03</a>
</p>
No publishersumandroCISxScholarsData SystemsDigital EconomyResearchers at WorkDigital LabourNetwork EconomiesHomepageEvent2019-03-13T00:30:39ZEventCISxScholars Delhi - Harsh Gupta - FAT ML for Lawyers and Lawmakers (June 29, 5:30 pm)
http://editors.cis-india.org/raw/cisxscholars-harsh-gupta-machine-learning-for-lawyers-and-lawmakers-20170629
<b>We are proud to announce that Harsh Gupta will discuss "FAT ML (Fairness, Accountability, and Transparency in Machine Learning) for Lawyers and Lawmakers" at the CIS office in Delhi on Thursday, June 29, at 5:30 pm. This will be a two and half hour session: beginning with a 45 minute talk, followed by 15 minute break, another talk for 45 minutes, and then a discussion session. Please RSVP if you are joining us: <raw@cis-india.org>. </b>
<p> </p>
<p><em>CISxScholars are informal events organised by CIS for presentation, discussion, and exchange of academic research and policy analysis.</em></p>
<hr />
<h3><strong>FAT ML (Fairness, Accountability, and Transparency in Machine Learning) for Lawyers and Lawmakers</strong></h3>
<p>From tagging people in photos to determining risk of loan defaults, use of data based tools is affecting more and areas of our lives. In some areas there have been very successful applications of such tools, in others areas they has been found to not only reflect the existing bias and discrimination found in today's society but also exaggerate it.</p>
<h3><strong>Harsh Gupta</strong></h3>
<p>Harsh Gupta is a recent graduate from IIT Kharagpur with B.Sc and M.Sc in Mathematics and Computing and will be joining JP Morgan and Chase as a data scientist. He completed his master's thesis in "Discrimination Aware Machine Learning". He was also an intern at The Center for Internet and Society during summer of 2016.</p>
<p> </p>
<p>
For more details visit <a href='http://editors.cis-india.org/raw/cisxscholars-harsh-gupta-machine-learning-for-lawyers-and-lawmakers-20170629'>http://editors.cis-india.org/raw/cisxscholars-harsh-gupta-machine-learning-for-lawyers-and-lawmakers-20170629</a>
</p>
No publishersumandroFAT MLCISxScholarsBig DataMachine LearningResearchers at WorkEventArtificial Intelligence2017-06-27T09:16:48ZEventCIS Seminar Series
http://editors.cis-india.org/internet-governance/blog/cis-seminar-series
<b>The CIS seminar series will be a venue for researchers to share works-in-progress, exchange ideas, identify avenues for collaboration, and curate research. We also seek to mitigate the impact of Covid-19 on research exchange, and foster collaborations among researchers and academics from diverse geographies. Every quarter we will be hosting a remote seminar with presentations, discussions and debate on a thematic area. </b>
<p style="text-align: justify; ">The first seminar series was held on 7th and 8th October on the theme of <a href="https://cis-india.org/internet-governance/blog/cis-seminar-series-information-disorder">‘Information Disorder: Mis-, Dis- and Malinformation’</a>,</p>
<h3 style="text-align: justify; ">Theme for the Second Seminar (to be held online)</h3>
<h3>Moderating Data, Moderating Lives: Debating visions of (automated) content moderation in the contemporary</h3>
<p style="text-align: justify; ">Artificial Intelligence (AI) and Machine Learning (ML) based approaches have become increasingly popular as “solutions” to curb the extent of mis-, dis- mal-information, hate speech, online violence and harassment on social media. The pandemic and the ensuing work from home policy forced many platforms to shift to automated moderation which further highlighted the inefficacy of existing models (<a href="https://www.zotero.org/google-docs/?u73Lwx">Gillespie, 2020)</a> to deal with the surge in misinformation and harassment. These efforts, however, raise a range of interrelated concerns such as freedom and regulation of speech on the privately public sphere of social media platforms; algorithmic governance, censorship and surveillance; the relation between virality, hate, algorithmic design and profits; and social, political and cultural implications of ordering social relations through computational logics of AI/ML.</p>
<p style="text-align: justify; ">On one hand, large-scale content moderation approaches (that include automated AI/ML-based approaches) have been deemed “necessary” given the enormity of data generated <a href="https://www.zotero.org/google-docs/?JHQ0rF">(Gillespie, 2020)</a>, on the other hand, they have been regarded as “technological fixtures” offered by the Silicon Valley <a href="https://www.zotero.org/google-docs/?YLFnLm">(Morozov, 2013)</a>, or “tyrannical” as they erode existing democratic measures <a href="https://www.zotero.org/google-docs/?Ia8JYp">(Harari, 2018)</a>. Alternatively, decolonial, feminist and postcolonial approaches insist on designing AI/ML models that centre voices of those excluded to sustain and further civic spaces on social media (<a href="https://www.zotero.org/google-docs/?1Sa8vf">Siapera, 2022)</a>.</p>
<p style="text-align: justify; ">From the global south perspective, issues around content moderation foreground the hierarchies inbuilt in the existing knowledge infrastructures. First, platforms remain unwilling to moderate content in under-resourced languages of the global south citing technological difficulties. Second, given the scale and reach of social media platforms and inefficient moderation models, the work is outsourced to workers in the global south who are meant to do the dirty work of scavenging content off these platforms for the global north. Such concerns allow us to interrogate the techno-solutionist approaches as well as their critiques situated in the global north. These realities demand that we articulate a different relationship with AI/ML while also being critical of AI/ML as an instrument of social empowerment for those at the “bottom of the pyramid” <a href="https://www.zotero.org/google-docs/?bvx6mV">(Arora, 2016)</a>.</p>
<p style="text-align: justify; ">The seminar invites scholars interested in articulating nuanced responses to content moderation that take into account the harms perpetrated by algorithmic governance of social relations and irresponsible intermediaries while being cognizant of the harmful effects of mis-, dis- mal-information, hate speech, online violence and harassment on social media.</p>
<p style="text-align: justify; ">We invite abstract submissions that respond to these complexities vis-a-vis content moderation models or propose provocations regarding automated moderation models and their in/efficacy in furthering egalitarian relationships on social media, especially in the global south.</p>
<p style="text-align: justify; ">Submissions can reflect on the following themes using legal, policy, social, cultural and political approaches. Also, the list is not exhaustive and abstracts addressing other ancillary concerns are most welcome:</p>
<ul>
<li>Metaphors of (content) moderation: mediating utopia, dystopia, scepticism surrounding AI/ML approaches to moderation.</li>
<li>From toxic to healthy, from purity to impurity: Interrogating gendered, racist, colonial tropes used to legitimize content moderation </li>
<li>Negotiating the link between content moderation, censorship and surveillance in the global south</li>
<li>Whose values decide what is and is not harmful? </li>
<li>Challenges of building moderation models for under resourced languages.</li>
<li>Content moderation, algorithmic governance and social relations. </li>
<li>Communicating algorithmic governance on social media to the not so “tech-savvy” among us.</li>
<li>Speculative horizons of content moderation and the future of social relations on the internet. </li>
<li>Scavenging abuse on social media: Immaterial/invisible labour for making for-profit platforms safer to use.</li>
<li>Do different platforms moderate differently? Interrogating content moderation on diverse social media platforms, and multimedia content.</li>
<li>What should and should not be automated? Understanding prevalence of irony, sarcasm, humour, explicit language as counterspeech.</li>
<li>Maybe we should not automate: Alternative, bottom-up approaches to content moderation</li>
</ul>
<h3>Seminar Format</h3>
<p>We are happy to welcome abstracts for one of two tracks:</p>
<p><strong>Working paper presentation</strong></p>
<p style="text-align: justify; ">A working paper presentation would ideally involve a working draft that is presented for about 15 minutes followed by feedback from workshop participants. Abstracts for this track should be 600-800 words in length with clear research questions, methodology, and questions for discussion at the seminar. Ideally, for this track, authors should be able to submit a draft paper two weeks before the conference for circulation to participants.</p>
<p><strong>Coffee-shop conversations</strong></p>
<p style="text-align: justify; ">In contrast to the formal paper presentation format, the point of the coffee-shop conversations is to enable an informal space for presentation and discussion of ideas. Simply put, it is an opportunity for researchers to “think out loud” and get feedback on future research agendas. Provocations for this should be 100-150 words containing a short description of the idea you want to discuss.</p>
<p style="text-align: justify; ">We will try to accommodate as many abstracts as possible given time constraints. We welcome submissions from students and early career researchers, especially those from under-represented communities.</p>
<p>All discussions will be private and conducted under the Chatham House Rule. Drafts will only be circulated among registered participants.</p>
<p>Please send your abstracts to <a href="mailto:workshops@cis-india.org">workshops@cis-india.org</a>.</p>
<h3>Timeline</h3>
<div id="_mcePaste"><ol>
<li>Abstract Submission Deadline: 18th April</li>
<li>Results of Abstract review: 25th April</li>
<li>Full submissions (of draft papers): 25th May</li>
<li>Seminar date: Tentative 31st May</li>
</ol></div>
<h3>References</h3>
<p class="MsoNormal" style="text-align:justify; "><span><a href="https://www.zotero.org/google-docs/?ZHb88g"><span>Arora, P. (2016). Bottom of the Data Pyramid: Big Data and the Global South. </span></a><a href="https://www.zotero.org/google-docs/?ZHb88g"><i><span>International Journal of Communication</span></i></a><a href="https://www.zotero.org/google-docs/?ZHb88g"><span>, </span></a><a href="https://www.zotero.org/google-docs/?ZHb88g"><i><span>10</span></i></a><a href="https://www.zotero.org/google-docs/?ZHb88g"><span>(0), 19.</span></a></span><span> </span></p>
<p class="MsoNormal" style="text-align:justify; "><span><a href="https://www.zotero.org/google-docs/?ZHb88g"><span>Gillespie, T. (2020). Content moderation, AI, and the question of scale. </span></a><a href="https://www.zotero.org/google-docs/?ZHb88g"><i><span>Big Data & Society</span></i></a><a href="https://www.zotero.org/google-docs/?ZHb88g"><span>, </span></a><a href="https://www.zotero.org/google-docs/?ZHb88g"><i><span>7</span></i></a><a href="https://www.zotero.org/google-docs/?ZHb88g"><span>(2), 2053951720943234. https://doi.org/10.1177/2053951720943234</span></a></span><span> </span></p>
<p class="MsoNormal" style="text-align:justify; "><span><a href="https://www.zotero.org/google-docs/?ZHb88g"><span>Harari, Y. N. (2018, August 30). </span></a><a href="https://www.zotero.org/google-docs/?ZHb88g"><i><span>Why Technology Favors Tyranny</span></i></a><a href="https://www.zotero.org/google-docs/?ZHb88g"><span>. The Atlantic. https://www.theatlantic.com/magazine/archive/2018/10/yuval-noah-harari-technology-tyranny/568330/</span></a></span><span> </span></p>
<p class="MsoNormal" style="text-align:justify; "><span><a href="https://www.zotero.org/google-docs/?ZHb88g"><span>Morozov, E. (2013). </span></a><a href="https://www.zotero.org/google-docs/?ZHb88g"><i><span>To save everything, click here: The folly of technological solutionism</span></i></a><a href="https://www.zotero.org/google-docs/?ZHb88g"><span> (First edition). PublicAffairs.</span></a></span><span> </span></p>
<p><a href="https://www.zotero.org/google-docs/?ZHb88g" style="text-align: justify; ">Siapera, E. (2022). AI Content Moderation, Racism and (de)Coloniality. </a><a href="https://www.zotero.org/google-docs/?ZHb88g" style="text-align: justify; "><i>International Journal of Bullying Prevention</i></a><a href="https://www.zotero.org/google-docs/?ZHb88g" style="text-align: justify; ">, </a><a href="https://www.zotero.org/google-docs/?ZHb88g" style="text-align: justify; "><i>4</i></a><a href="https://www.zotero.org/google-docs/?ZHb88g" style="text-align: justify; ">(1), 55–65. https://doi.org/10.1007/s42380-021-00105-7</a></p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/blog/cis-seminar-series'>http://editors.cis-india.org/internet-governance/blog/cis-seminar-series</a>
</p>
No publisherCheshta AroraInternet GovernanceMachine LearningArtificial IntelligenceEventSeminar2022-04-11T15:19:11ZBlog EntryCIS Cybersecurity Film Screening
http://editors.cis-india.org/events/cis-cybersecurity-film-screening
<b>The Centre for Internet and Society invites you to a screening of Episode 1&2 of DesiSec: the first documentary film on cybersecurity in India. Hope you can join us on 26th March, at CIS, Domlur!</b>
<div>Early 2013, the Centre for Internet and Society began shooting its first documentary film project. After months of researching and interviewing activists and experts, CIS released the first episode on 11th December. </div>
<div> </div>
<div>CIS is hosting a special screening of <strong>DesiSec: Episode 1&2</strong> on <strong>26th March, 2</strong><strong>013, 5.30 pm</strong> and invites you to this event. The first episode is centered around the issue of privacy and surveillance in cyber space and how it affects Indian society. The second episode is focused on anonymity and free speech online.</div>
<div> </div>
<div>We look forward to seeing you there!</div>
<div> </div>
<div>RSVP: <a href="mailto:purba@cis-india.org" target="_blank">purba@cis-india.org</a></div>
<div>Venue: http://osm.org/go/yy4fIjrQL?m=</div>
<div> </div>
<div><strong><em>This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.</em></strong></div>
<p>
For more details visit <a href='http://editors.cis-india.org/events/cis-cybersecurity-film-screening'>http://editors.cis-india.org/events/cis-cybersecurity-film-screening</a>
</p>
No publisherpurbaCyber Security FilmEventCyber Security Interview2014-03-20T09:34:38ZEventChennai: Learn to Protect your Online Activities!
http://editors.cis-india.org/internet-governance/cryptoparty-chennai
<b>The Centre for Internet and Society cordially invites you to a Crypto Party at Asian College of Journalism Second main Road (Behind M.S. Swaminathan Research Foundation) Taramani in Chennai on August 7, 2013, 4.30 p.m. to 6.30 p.m.</b>
<p style="text-align: justify; ">"Governments around the world, are greatly increasing their surveillance of the Internet. Alongside a loss of the private sphere, this also represents a clear danger to basic civil liberties. The good news is that we already have the solution: encrypting communications makes it very hard, if not entirely impossible, for others to eavesdrop on our conversations. The bad news is that crypto is largely ignored by the general public, partly because they don't know about it, and partly because even if they do, it seems too much trouble to implement." (<a href="https://www.techdirt.com/articles/20121009/06132920660/cryptoparty-like-its-1993.shtml">Source</a>)</p>
<p><img alt="yes we scan and obama with headphones" height="167" src="https://netzpolitik.org/wp-upload/1012366_534624166585046_1146520866_n.png" width="450" /></p>
<p><b>So lets go and have a party, and teach each other how to crypto!</b></p>
<p><b>Everyone is invited! Especially do not hesitate to join if you are not using any crypto at all (yet!)</b></p>
<p><a href="http://editors.cis-india.org/internet-governance/cryptoparty-chennai-1/at_download/file">Here is a Flyer / Printout for you</a> to spread the message!</p>
<div></div>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/cryptoparty-chennai'>http://editors.cis-india.org/internet-governance/cryptoparty-chennai</a>
</p>
No publisherbernadetteCrypto PartyEventInternet Governance2013-08-01T12:16:52ZEvent