The Centre for Internet and Society
http://editors.cis-india.org
These are the search results for the query, showing results 31 to 45.
Security, Governments, and Data: Technology and Policy
http://editors.cis-india.org/internet-governance/events/security-governments-data-technology-policy
<b>The Centre for Internet & Society and the Observer Research Foundation invite you to a one day conference on January 8, 2015 in New Delhi. </b>
<h3 style="text-align: justify; "></h3>
<h3 style="text-align: justify; "></h3>
<h3 style="text-align: justify; ">About the Conference</h3>
<p style="text-align: justify; ">The conference will focus on the technologies, policies, and practices around cyber security and surveillance. The conference will reach out to a number of key stakeholders including civil society, industry, government, and academia and explore the present scenario in India to reflect on ways forward.</p>
<h3 align="left" class="western"><strong>Conference </strong><strong>Context</strong></h3>
<p align="justify"><span>Ensuring the security of the India’s cyber space is a complex, challenging, and ever changing responsibility that the government is tasked with. Doing so effectively requires a number of factors to come together in a harmonized strategy including: laws & policies, technical capabilities, markets, and a skilled workforce. It also requires collaboration on multiple levels including with foreign governments, domestic and foreign industry, and law enforcement. The first of these is particularly important given the ability of attackers to penetrate across borders and the global nature of data. Any strategy developed by India must be proactive and reactive – evolving defences to prevent a potential threat and applying tactics to respond to a real time threat. To do so, the government of India must legally have the powers to take action and must have the technical capability to do so. Yet, many of these powers and technical capabilities require a degree of intrusion into the lives of citizens and residents of India through means such as surveillance. Thus, such measures must be considered in light of principles of proportionality and necessity, and legal safeguards are needed to protect against the violation of privacy. Furthermore, a principle of optimization must be considered i.e, how much surveillance achieves the most amount of security and how can this security be achieved with the optimal mix of technology, policy and enforcement.</span></p>
<h3 align="left" class="western">Panel Descriptions</h3>
<p align="left"> </p>
<p align="left"><strong>Challenges & Present Scenario</strong></p>
<p align="left"><strong> </strong><span>Protecting and enhancing the cyber security of India is a complex and dynamic responsibility. The challenge of securing cyber space is magnified by the demarcated nature of the internet, the multiplicity of vulnerabilities that can be exploited at the national level, the magnitude of infrastructure damage possible from a cyber attack, and the complexity of application of a jurisdiction’s law to a space that is technologically borderless. A comprehensive ‘cyber security’ ecosystem is required to address such challenges – one that involves technology, skills, and capabilities – including surveillance capabilities. The Government of India has taken numerous steps to address and resolve such challenges. In July 2013, the National Cyber Security Policy was published for the purpose of creating an enabling framework for the protection of India’s cyber security. In February 2014, the 52</span><sup>nd</sup><span> Standing Committee on Information Technology issued a report assessing the implementation of this policy – in which they found that a number of areas needed strengthening. The Government of India has also proposed the establishment of a number of centres focused on cyber security – such as the National Cyber Coordination Center and the National Critical Information Infrastructure Protection Centre. CERT-IN, under the Department of Electronics and Information Technology is presently the body responsible for overseeing and enforcing cyber security in India, while other bodies such as the Resource Centre for Cyber Forensic and TERM cells under the Department of Telecommunications play critical roles in overseeing and undertaking capabilities related to cyber security.</span></p>
<p align="justify"><strong>Law & Policy</strong></p>
<p align="justify"><span>India has five statutes regulating the collection and use of data for surveillance purposes. These laws define circumstances on which the government is justified in accessing and collecting real time and stored data as well as procedural safeguards they must adhere to when doing so. The Department of Telecommunications has also issued the Unified Access License which, among other things, mandates service providers to provide technical support to enable such collection. The Indian judicial system has also provided a number of Rulings that set standards for the access, collection, and use of data as well as defining limitations and safeguards that must be respected in doing so. The draft Privacy Bill 2011, released by the Department of Personnel and Training, also contained provisions addressing surveillance in the context of interception and the use of electronic video recording devices. In the Report of the Group of Experts on Privacy, the AP Shah Committee found that the legal regime for surveillance in India was not harmonized and lacked safeguards. Furthermore, in the era where the direct collection of large volumes of data is easily possible, there is a growing need to re-visit questions about the legitimate and proportionate collection and use (particularly as evidence) of such data. Questions are also arising about the applicability of standards and safeguards to the state. At a global level, catalyzed by the leaks by Edward Snowden, there has been a strong push for governments to review and structure their surveillance regimes to ensure that they are in line with international human rights standards.</span></p>
<p align="justify"><strong>Architecture & Technology</strong></p>
<p align="justify"><span>India is in the process of architecting a number of initiatives that seek to enable the collection and sharing of intelligence such as the CMS, NATGRID, and NETRA. At a regional level, the Ministry of Home Affairs is in the process of implementing ‘Mega Policing Cities’ which include the instalment of CCTV’s and centralized access to crime related information. Globally, law enforcement and governments are beginning to take advantage of the possibilities created by ‘Big Data’ and ‘open source’ policing. The architecture and technology behind any surveillance and cyber security initiative are key to its success. Intelligently and appropriately designed projects and technology can also minimize the possibility of intrusions into the private lives of citizens. Strong access controls, decentralized architecture, and targeted access are all principles that can be incorporated into the architecture and technology behind a project or initiative. At the same time, the technology or process around a project can serve as the ‘weakest link’ – as it is vulnerable to attacks and tampering. Such possibilities raise concerns about the use of foreign technology and dependencies on foreign governments and companies.</span></p>
<p align="justify"><strong>International and Domestic Markets</strong></p>
<p align="justify"><strong> </strong><span>Globally, the security market is growing – with companies offering a range of services and products that facilitate surveillance and can be used towards enhancing cyber security. In India, the security market is also growing with studies predicting that it will reach $1.06 billion by 2015. Recognizing the potential threat posed by imported security and telecom equipment, India also develops its own technologies through the Centre for Development of Telematics –attached to the Department of Telecommunications, and the Centre for Development of Advanced Computing – attached to the Department of Electronics and Information Technology. At times India has also imposed bans on the import of technologies believed to be compromised. Towards this end, the Government of India has a number of bodies responsible for licensing, auditing, and certifying the use of security and telecommunication equipment. Though India has recognized the security vulnerabilities posed by these technologies, as of yet it has not formally recognized the human rights violations that are made possible. Indeed, though India has submitted a request to be a signing member of the </span><span>Wassenaar agreement, they have yet to be accepted.</span></p>
<h3 style="text-align: justify; ">Agenda</h3>
<table class="plain">
<tbody>
<tr>
<td>11.00</td>
<td>Registration & Tea</td>
</tr>
<tr>
<td>11.30</td>
<td>Key Note Speech</td>
</tr>
<tr>
<td>12.00</td>
<td>Challenges & Present Scenario</td>
</tr>
<tr>
<td>13.00</td>
<td>Law & Policy</td>
</tr>
<tr>
<td>14.00</td>
<td>Lunch</td>
</tr>
<tr>
<td>15.00</td>
<td>Architecture & Technology</td>
</tr>
<tr>
<td>16.00</td>
<td>International & Domestic Markets</td>
</tr>
<tr>
<td>17.00</td>
<td>Tea</td>
</tr>
<tr>
<td>17.30</td>
<td>Conclusion & Closing Remarks</td>
</tr>
</tbody>
</table>
<h3></h3>
<ol> </ol>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/events/security-governments-data-technology-policy'>http://editors.cis-india.org/internet-governance/events/security-governments-data-technology-policy</a>
</p>
No publisherelonnaiEventInternet Governance2014-12-24T08:06:59ZEventNASA Space Apps Challenge 2017
http://editors.cis-india.org/openness/events/nasa-space-apps-challenge-2017
<b>The NASA Space Data Challenge (Hillhacks Pre-event) will be hosted at the Centre for Internet & Society's Bengaluru office on Saturday, April 22, 2017 from 4 p.m. to 7 p.m.</b>
<p><img alt="Pre-event Banner" class="full-width richtext-image" height="331" src="https://sa-media-2017.s3.amazonaws.com/media/images/Pre-Event_Banner.width-800.jpg?AWSAccessKeyId=AKIAJQG3YOIUOOAQEQ4Q&Signature=ZJtdQM31dRzmEALLngJXVjH3p2U%3D&Expires=1492710139" width="664" /></p>
<hr />
<p style="text-align: justify; ">Calling all hackers, designers, makers, the open source community, space enthusiasts and the ones who will join us for the main NASA Space Apps Challenge Hackathon.</p>
<p>We are thrilled to share with you that members of <a href="https://hillhacks.in">Hillhacks</a> would join us to talk about the amazing work they have done so far and about their upcoming hill hacks too.</p>
<p>Also joining would be OpenCube Labs to share their experience of their projects in previous editions of the NASA Space Apps Challenge.</p>
<p>This pre-event will be a great place for you to get your doubts out of the way about the main hackathon.</p>
<p>You possibly can meet potential team members who can give you additional dimensions for your project. You can learn how you can best leverage the data available from NASA and tackle the challenges by them.</p>
<p>See you there!</p>
<p>Participant registration is now open! <a href="https://2017.spaceappschallenge.org/locations/">Click here</a> to view Space Apps 2017 locations to find an event near you and sign up.</p>
<p>
For more details visit <a href='http://editors.cis-india.org/openness/events/nasa-space-apps-challenge-2017'>http://editors.cis-india.org/openness/events/nasa-space-apps-challenge-2017</a>
</p>
No publisherpraskrishnaSpace AppsOpennessOpen ScienceEvent2017-04-20T16:53:35ZEventBangalore CryptoParty!
http://editors.cis-india.org/internet-governance/events/bangalore-crypto-party
<b>Care about your privacy and online security? Want to fight against pervasive governmental surveillance and corporate invasions of privacy? The Centre for Internet & Society invites you to the CryptoParty tonight (Friday) at 6.00 p.m. Make sure to bring friends (and your laptop and smart phones)!
</b>
<p>We will discuss, install and use digital security and privacy tools and practices.</p>
<h2>Hosts</h2>
<hr />
<p><a class="external-link" href="https://twitter.com/thej">Thejesh GN</a><br /><a class="external-link" href="https://twitter.com/houndbee">Kaustubh Srikanth</a><br /><a class="external-link" href="https://twitter.com/pranesh_prakash">Pranesh Prakash</a></p>
<h2>Details</h2>
<hr />
<h3>We Will Provide</h3>
<ul>
<li>Food and drinks: Snacks - Samosas + Kachoris + Biscuits + Tea + Soft Drinks</li>
<li>Software: Security-in-a-box toolkits + Ubuntu Live USBs + software + internet connection</li>
<li>Expertise: Kaustubh Srikanth + Thejesh GN + Pranesh Prakash </li>
</ul>
<h3><span class="mw-headline" id="You_need_to_bring">You need to bring</span></h3>
<ul>
<li>Your own laptop (highly recommended)</li>
<li>Desire to learn about secure and private communications and storage (mandatory! :D)</li>
<li>Expertise, to share with others (if possible) </li>
</ul>
<h3>Intro</h3>
<p>(20 mins)</p>
<ul>
<li>Privacy vs. convenience </li>
<li>Importance of Free and Open Source Software and Open Standards </li>
<li>Basics of Passwords </li>
<ul>
<li>Choosing secure passwords </li>
<ul>
<li>Dropbox Register Page </li>
</ul>
<li>Storing comes later </li>
<li>2FA - Google Authenticator </li>
</ul>
<li>Securing online Identities </li>
</ul>
<h3>Show and tell</h3>
<p><b>Browsing (45 mins)</b><br />(5 mins)</p>
<ul>
<li>Firefox (multiple platforms) / offline </li>
</ul>
<p>(15 mins):</p>
<ul>
<li>AdBlockPlus </li>
<li>RequestPolicy </li>
<li>HTTPSEverywhere </li>
<li>Ghostery / DoNotTrackMe </li>
<li>Noscript </li>
</ul>
<p>(5 mins)</p>
<ul>
<li>Anti-Google Surveillance </li>
<ul>
<li>DuckDuckGo </li>
<li>GoogleSharing </li>
</ul>
</ul>
<p>(10 mins)</p>
<ul>
<li>Password management </li>
<ul>
<li>Keepass + Password Safe </li>
<li>Cloud Services </li>
<ul>
<li>LastPass </li>
<li>Keepass + Dropbox </li>
</ul>
</ul>
</ul>
<p><b>Email + IM (1 hour)</b><br />(10 mins)</p>
<ul>
<li>Thunderbird (multiple platforms) / available offline </li>
<ul>
<li>Enigmail </li>
</ul>
</ul>
<p>(30 mins)</p>
<ul>
<li>GPG4Win + GPGTools / offline </li>
<li>Seahorse (on Ubuntu Fresh Install) </li>
<li>Enigmail + Key Management (Kaustubh) </li>
<li>Key-signing party! </li>
</ul>
<p>(15 mins)</p>
<ul>
<li>Instant Messaging with OTR </li>
<ul>
<li>Pidgin + Adium / offline </li>
<li>OTR / offline </li>
</ul>
</ul>
<p><b>Tell (27 mins)</b><br />(5 mins)</p>
<ul>
<li>Tor (Pranesh) </li>
</ul>
<p>(5 mins)</p>
<ul>
<li>VPNs and SSH tunnel </li>
<ul>
<li>RiseUp (Kaustubh) </li>
<li>SSH tunneling using AWS / RackSpace (Thej) </li>
</ul>
</ul>
<p>(12 mins)</p>
<ul>
<li>Mobiles </li>
<ul>
<li>APG + K9 (Pranesh) </li>
<li>WhisperCore (Kaustubh mentions) </li>
<li>Text Secure (Thej) </li>
<li>Gibbberbot (Pranesh) </li>
</ul>
</ul>
<p>(3 mins)</p>
<ul>
<li>Full-disk encryption </li>
<ul>
<li>Ubuntu (Pranesh demoes quickly) </li>
<li>BitLocker </li>
<li>TrueCrypt </li>
</ul>
</ul>
<p>(2 mins)</p>
<ul>
<li>Virtual machines </li>
<ul>
<li>VirtualBox (Kaustubh demoes quickly) </li>
</ul>
</ul>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/events/bangalore-crypto-party'>http://editors.cis-india.org/internet-governance/events/bangalore-crypto-party</a>
</p>
No publisherpraskrishnaEventInternet Governance2013-01-06T13:47:02ZEventSangeet Baithak: A Hindustani Music Resource Donation Event in Mumbai
http://editors.cis-india.org/openness/events/sangeet-baithak
<b>The Access to Knowledge team from the Centre for Internet and Society (CIS-A2K) and Khayal Trust is organizing a music event on October 7, 2014 in Shivaji Park, Dadar, Mumbai. T.Vishnu Vardhan and Tejaswini Niranjana will be participating.</b>
<p style="text-align: justify; "><a class="external-link" href="https://en.wikipedia.org/wiki/Neela_Bhagwat">Neela Bhagwat</a> will donate her comprehensive textual compilation of <a class="external-link" href="https://en.wikipedia.org/wiki/Gwalior_gharana">Gwalior Gharana</a> bandishes. Gwalior Gharana is one of the old traditions of Hindustani gayaki and like other gayaki's the tradition has been passed on orally in the guru-shishya parampara. Pt. Neela Bhagwat has over a period of 30 years (of learning and teaching music) meticulously compiled most of the Gwalior Gharana bandishes with notations and notes. This comprehensive collection which will be scanned and hosted on Wikisource and made available under CC-BY-SA 4.0. license.</p>
<p>Click to download the event <a href="http://editors.cis-india.org/openness/blog-old/music-event.pdf" class="internal-link">invite here</a>.</p>
<p>
For more details visit <a href='http://editors.cis-india.org/openness/events/sangeet-baithak'>http://editors.cis-india.org/openness/events/sangeet-baithak</a>
</p>
No publisherpraskrishnaAccess to KnowledgeWikimediaWikipediaOpennessEvent2014-10-07T04:27:49ZEventMobile Training Workshop @ CIS
http://editors.cis-india.org/openness/events/mobile-training-workshop
<b>The Centre for Internet and Society (CIS), Bangalore welcomes you to a mobile training workshop in its office in Bangalore on Thursday, August 29, 2013. Rachita and Keerthana Chandrashekar will conduct the workshop from 12.00 p.m. to 2.00 p.m. </b>
<p style="text-align: justify; ">Social media tools provide us with a huge opportunity to make our voices heard farther and faster. Social media campaigning has been used successfully to bring about changes that traditional campaigning methods have been unable to. Keerthana Chandrashekar will talk about successful online and offline campaigning.</p>
<h3>Agenda for Training</h3>
<ol>
<li style="text-align: justify; ">Case studies of successful mobile campaigns including studies relevant for CIS programmes.</li>
<li style="text-align: justify; ">Highlighting major components in a successful mobile campaign.</li>
<li style="text-align: justify; ">Outlining general communication flow of a mobile campaign.</li>
<li style="text-align: justify; ">Presentation of a sample campaign idea.</li>
<li style="text-align: justify; ">Presentation of detail campaign flow for that campaign idea.</li>
<li style="text-align: justify; ">Campaign data analysis. </li>
</ol>
<h2><a class="external-link" href="http://jhatkaa.org/">About Jhatkaa</a></h2>
<p style="text-align: justify; ">Jhatkaa is a new advocacy group committed to building citizen power across India in effective and innovative ways. We look to organize people to rapidly respond to issues in ways that maximise their collective power in a given situation. We look to achieve this goal of mobilizing citizens through the use of digital technology which will help bridge the gap of distance and time. Some of the tools that we are looking to utilize are email, mobiles, radio, social media, etc. Our belief is that through sustained collective action, huge change is possible.</p>
<h2 style="text-align: justify; ">The Speakers</h2>
<h3 style="text-align: justify; ">Keerthana Chandrashekar</h3>
<p style="text-align: justify; ">Keerthana is a telecommunication engineer. She graduated in 2012 from <a class="external-link" href="http://it.cmr.ac.in/">CMR Institute of Technology, Bangalore</a>. She was trained as a data and business analyst in <a class="external-link" href="http://www.mu-sigma.com/">Mu Sigma Business Solutions Pvt. Ltd.</a> and worked there for six months before joining Jhatkaa as a campaigner. Currently she works as a campaigner and is setting up the mobile platform for Jhatkaa.</p>
<h3 style="text-align: justify; ">Rachita</h3>
<p style="text-align: justify; ">Rachita graduated from the <a class="external-link" href="http://www.du.ac.in/index.html">University of Delhi</a> with a Bachelors in Mass Media and Mass Communications last year. Thereafter, she worked with <a class="external-link" href="http://www.greenpeace.org/india/en/Greenpeace-India/">Greenpeace India</a> in the Digital Media Team and now works as a campaigner with Jhatkaa.</p>
<p>
For more details visit <a href='http://editors.cis-india.org/openness/events/mobile-training-workshop'>http://editors.cis-india.org/openness/events/mobile-training-workshop</a>
</p>
No publisherpraskrishnaEventAccess to Knowledge2013-08-28T11:01:35ZEventTrain the Trainer — Four-day long Residential Training Workshop in Bangalore
http://editors.cis-india.org/openness/events/train-the-trainer
<b>Train the Trainer is a four-day long residential training workshop to enable Indian Wikipedia community members conduct outreach sessions effectively and independently. It is being conducted by the CIS-A2K team in Bangalore in the first week of October.</b>
<hr />
<p>See the event on the <a class="external-link" href="http://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Events/Train_the_Trainer_Program">Wikipedia page here</a>. <i>Please note that the exact dates for this event hasn't been finalized. We will let you know once it is done</i>. See the Snippets from Wikimedia Train the Trainer <a class="external-link" href="https://storify.com/CISA2K/wikimedia-train-the-trainer-2015">here</a>.</p>
<hr />
<h3>Why CIS-A2K is conducting this Program?</h3>
<p>Based on an internal needs assessment exercise undertaken by CIS-A2K, it has been realized that:</p>
<ul>
<li style="text-align: justify; ">bulk of the Indian population does not know about the existence of Indic Wikipedias and sister projects.</li>
<li style="text-align: justify; ">there is a lot of potential to do outreach in India but it is hampered by community member's lack of time, lack of availability of support material and/or ability to do outreach.</li>
<li style="text-align: justify; ">though many Indic Wikipedia community members have desire to undertake offline outreach they seldom receive support and guidance.</li>
<li style="text-align: justify; ">there is a need to further build the capacity of interested community members to conduct effective outreach sessions.</li>
</ul>
<p style="text-align: justify; ">Thus through this program, the CIS-A2K programme wants to support and enable community members who are interested to conduct Wikipedia outreach sessions in their own cities/languages and to spread the word about the Indic Wikipedias.</p>
<h3>Overview of the programme</h3>
<p style="text-align: justify; ">CIS-A2K is organising a 4 day Train the Trainer Program in Bangalore. The program will include:</p>
<ul>
<li style="text-align: justify; ">3 day sessions with interactive training run by professional consultants on how to conduct outreach in an effective manner – training on presentation skills, audience engagement, public speaking etc. It will include mock presentations, with video recording for feedback.</li>
<li style="text-align: justify; ">4th day will be a field trip aiming to train the participants on how to organise an effective photothon; in addition, participants will also add pictures from the field trip to Wikimedia Commons for enhancing and improving articles on Indian language Wikipedias.</li>
</ul>
<h3>Selection Criterion</h3>
<p style="text-align: justify; ">CIS-A2K will conduct this program for approximately 20-25 interested community members from different Indian language communities. We want to make sure that there is equal participation from each language community. The CIS-A2K will use below mentioned parameters for selecting candidates.</p>
<ol>
<li style="text-align: justify; ">CIS-A2K's evaluation of <a class="text external" href="https://docs.google.com/forms/d/1le9y8P4ojQTLvOm-L2vikfYUnpF_pfLhOTquPAnK7tU/viewform" rel="nofollow">Train the Trainer Program Application Form</a>.</li>
<li style="text-align: justify; ">Motivation of the candidate to be a part of the program.</li>
<li style="text-align: justify; ">The applicant should have made minimum 200 edits on their respective Indian language Wikipedia.</li>
<li style="text-align: justify; ">The applicant should have created at least 5 new articles of start class (as defined by their language community) on their respective Indian language Wikipedia.</li>
<li style="text-align: justify; ">The applicant should have conducted at least 1 outreach session before the end of application date and shared the report with the community (via mailing list, village pump, event page, etc.)</li>
</ol>
<h3>Candidates' Deliverable</h3>
<p>There are certain deliverables that CIS-A2K expects out of selected candidates. These are:</p>
<ol>
<li style="text-align: justify; ">Take lead in translating outreach documents (including presentations, banners, FAQs, handouts) in their respective language and share it with their respective communities.</li>
<li style="text-align: justify; ">Organise at least 2 outreach sessions per month in their respective cities, for a minimum of 6 continuous months and share the report with the community (via mailing list, village pump, event page, etc.).</li>
<li style="text-align: justify; ">Take lead in organising at least 1 community meet up in their respective cities, where they would give a small talk/presentation about their experience in the Train the Trainer Program and share ideas and tips they picked from the program with their language community members.</li>
<li style="text-align: justify; ">Write a 1500-word report sharing their Train the Trainer Program experience with large emphasis on their learnings and take-aways to be shared with all Indian communities.</li>
</ol>
<h3>What's in it for you?</h3>
<ol>
<li style="text-align: justify; ">Get general training and presentation skills which you can apply not only during Wikipedia workshops, but also during delivering personal and professional talks.</li>
<li style="text-align: justify; ">Receive detailed feedback about your presentation and training skills from professional consultants.</li>
<li style="text-align: justify; ">Help design a training program that serves Wikimedia community in the long term.</li>
<li style="text-align: justify; ">Share your skills with others.</li>
<li style="text-align: justify; ">Meet fellow Wikimedia editors and have fun.</li>
</ol>
<table class="plain">
<tbody>
<tr style="text-align: justify; ">
<th>Dates</th><th>Number of days</th><th>Details</th>
</tr>
<tr>
<td style="text-align: justify; ">30th August to 13th September 2013</td>
<td>14 Days</td>
<td style="text-align: justify; ">CIS-A2K accepts applications.</td>
</tr>
<tr>
<td style="text-align: justify; ">13th September to 16th September 2013</td>
<td>3 Days</td>
<td style="text-align: justify; ">CIS-A2K evaluates the applications and shares details of selected candidates.</td>
</tr>
<tr>
<td style="text-align: justify; ">16th September to 23th September 2013</td>
<td>7 Days</td>
<td style="text-align: justify; ">CIS-A2K co-ordinates with selected candidates to finalize their travel plans, make reservations etc.</td>
</tr>
<tr>
<td style="text-align: justify; ">1st week of October 2013</td>
<td>4 Days</td>
<td style="text-align: justify; ">CIS-A2K organises Train the trainer Program.</td>
</tr>
</tbody>
</table>
<h3>Call for Participation</h3>
<p style="text-align: justify; ">CIS-A2K is calling for applications for it's Train the Trainer Program. If you'd like to be part of this program please make sure that you meet the <a href="http://meta.wikimedia.org/wiki/User:Nitika.t/TTT#Selection_Criterion" title="User:Nitika.t/TTT">selection criterion</a> and fill in the <a class="text external" href="https://docs.google.com/forms/d/1le9y8P4ojQTLvOm-L2vikfYUnpF_pfLhOTquPAnK7tU/viewform" rel="nofollow">Train the Trainer Program Application Form</a> by 13th September, 2013.</p>
<h3 style="text-align: justify; ">FAQ</h3>
<ol>
<li style="text-align: justify; "><b>What is train the trainer program?</b><br /> Train the trainer is a 4 day program organised by CIS-A2K to build capacity and enable community members to conduct outreach sessions independently or with minimal support to introduce Wikipedia to prospective editors in their respective Indian languages. Participants will be trained on various aspects such as presenting with impact, engaging with the audience, significance of body language, outreach follow ups etc. Program will also include groups discussions on ideas, learnings, challenges faced during outreach sessions.</li>
<li style="text-align: justify; "><b>When will train the trainer program run?</b><br /> Train the trainer program will take place in Bangalore for 4 continuous days in the 1st week of October 2013. Exact details of dates and venue will be communicated shortly.</li>
<li style="text-align: justify; "><b>Who can take part in the program?</b><br /> The event is open to all Wikimedia volunteers from India who can and want to support outreach events in the coming year.</li>
<li style="text-align: justify; "><b>How can I apply?</b><br /> Please fill in <a class="text external" href="https://docs.google.com/forms/d/1le9y8P4ojQTLvOm-L2vikfYUnpF_pfLhOTquPAnK7tU/viewform" rel="nofollow">Train the Trainer Program Application Form</a>.</li>
<li style="text-align: justify; "><b>Who will take care of my travel and accommodation?</b><br /> CIS-A2K has a budget for Community Development and the team will be able to cover your travel and accommodation.</li>
<li style="text-align: justify; "><b>What will be the timings each day?</b><br /> The timings of the program will be 9.00am to 7.30pm everyday with sufficient time for lunch, dinner, tea breaks and fun sessions.</li>
<li style="text-align: justify; "><b>Where will I eat?</b><br /> Light breakfast and lunch will be provided; together with social dinner. Arrangements will also be made for tea and coffee.</li>
<li style="text-align: justify; "><b>What is expected out of me?</b></li>
</ol> <dl><dd> <dl><dd>
<ul>
</ul>
<ul>
<li style="text-align: justify; ">Each selected candidate will be given some pre-work. You're expected to come with completed pre-work.</li>
<li style="text-align: justify; ">Take lead in translating outreach documents (including presentations, banners, FAQs, handouts) in their respective language and share it with their respective communities.</li>
<li style="text-align: justify; ">Post the program, organize at least 2 outreach sessions per month in your respective cities, for a minimum of 6 continuous months and share the report with the community (via mailing list, village pump, event page, etc.).</li>
<li style="text-align: justify; ">Post the program, take lead in organising at least 1 community meet up in your respective cities, where you would give a small talk/presentation about your experience in the Train the Trainer Program and share ideas and tips you picked from the program with your language community members.</li>
<li style="text-align: justify; ">Write a 1500-word report sharing your Train the Trainer Program experience with large emphasis on learnings and take-aways to be shared with all Indian communities.</li>
</ul>
<hr />
<h3>Contact</h3>
<p style="text-align: justify; ">For any further queries please mail at <a class="mail-link" href="mailto:a2k@cis-india.org">a2k@cis-india.org</a></p>
<ul>
</ul>
</dd></dl> </dd></dl><ol> </ol><ol> </ol><ol> </ol>
<ul>
</ul>
<p>
For more details visit <a href='http://editors.cis-india.org/openness/events/train-the-trainer'>http://editors.cis-india.org/openness/events/train-the-trainer</a>
</p>
No publisherpraskrishnaAccess to KnowledgeWikimediaWikipediaWorkshopOpennessEvent2015-09-27T09:59:00ZEventWikipedia Training in Telugu for Dr. B.R. Ambedkar Open University, Hyderabad
http://editors.cis-india.org/openness/events/wikipedia-training-in-telugu-for-b-r-ambedkar-open-university
<b>CIS-A2K is conducting a Wikipedia training programme in Telugu for the faculty of Dr. B.R.Ambedkar Open University (Dr. BRAOU) in Hyderabad on September 5 and 6, 2013. </b>
<p style="text-align: justify; ">This is done as part of the "ICT and eContent" workshop organized by the Centre for Staff Training and Development of Dr. BRAOU for their faculty. T. Vishnu Vardhan Program Director, CIS-A2K has been invited to teach a module on "Knowledge and Openness in the Digital Era" as part of which this Wikipedia training programme was also organized.</p>
<hr />
<p style="text-align: justify; ">Details in <a class="external-link" href="https://te.wikipedia.org/wiki/%E0%B0%B5%E0%B0%BF%E0%B0%95%E0%B1%80%E0%B0%AA%E0%B1%80%E0%B0%A1%E0%B0%BF%E0%B0%AF%E0%B0%BE:%E0%B0%B6%E0%B0%BF%E0%B0%95%E0%B1%8D%E0%B0%B7%E0%B0%A3_%E0%B0%B6%E0%B0%BF%E0%B0%AC%E0%B0%BF%E0%B0%B0%E0%B0%82/%E0%B0%B9%E0%B1%88%E0%B0%A6%E0%B0%B0%E0%B0%BE%E0%B0%AC%E0%B0%BE%E0%B0%A6%E0%B1%8D/%E0%B0%B9%E0%B1%88%E0%B0%A6%E0%B0%B0%E0%B0%BE%E0%B0%AC%E0%B0%BE%E0%B0%A6%E0%B1%8D2">Telugu originally published in the metapage on Wikipedia</a> is reproduced below:</p>
<h3 style="text-align: justify; ">వికీపీడియా:శిక్షణ శిబిరం/హైదరాబాద్/హైదరాబాద్2</h3>
<p style="text-align: justify; ">--<a href="https://te.wikipedia.org/wiki/%E0%B0%AA%E0%B1%8D%E0%B0%B0%E0%B0%A4%E0%B1%8D%E0%B0%AF%E0%B1%87%E0%B0%95:Contributions/14.139.86.130" title="ప్రత్యేక:Contributions/14.139.86.130">14.139.86.130</a> 05:32, 6 సెప్టెంబర్ 2013 (UTC)పరాంకుశం వెంకట రమణ==తేదీ - స్థలం== సెప్టెంబరు, 5 2013; <a class="text external" href="http://www.braou.ac.in/%7C" rel="nofollow">డాక్టర్ బి.ఆర్. అంబేద్కర్ సార్వత్రిక విశ్వవిద్యాలయం</a></p>
<p style="text-align: justify; "><b>సమయం<br /></b>పొ. 10.00 నుండి మ. 1.00 వరకు</p>
<p style="text-align: justify; ">నిర్వహణ సంస్థ/లు</p>
<p style="text-align: justify; "><a class="extiw" href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge" title="m:India Access To Knowledge">CISA2K</a> డాక్టర్ బి.ఆర్. అంబేద్కర్ సార్వత్రిక విశ్వవిద్యాలయం, హైదరబాద్ వారి సంస్థాగత భాగస్వామ్యంతో. ఈ శిబిరం Centre for Staff Training and Development (Dr. BRAOU) వారు 10 రోజులపాటు విశ్వవిద్యాలయం యొక్క ఉపాధ్యాయుల కొరకు నిర్వహించిన ‘ICT and e-Content Development’ Workshop లో భాగంగా నిర్వహించబడినది.</p>
<p style="text-align: justify; ">నిర్వాహకులు</p>
<ul>
<li><a href="https://te.wikipedia.org/wiki/%E0%B0%B5%E0%B0%BE%E0%B0%A1%E0%B1%81%E0%B0%95%E0%B0%B0%E0%B0%BF:Visdaviva" title="వాడుకరి:Visdaviva">విష్ణు</a> (<a href="https://te.wikipedia.org/wiki/%E0%B0%B5%E0%B0%BE%E0%B0%A1%E0%B1%81%E0%B0%95%E0%B0%B0%E0%B0%BF_%E0%B0%9A%E0%B0%B0%E0%B1%8D%E0%B0%9A:Visdaviva" title="వాడుకరి చర్చ:Visdaviva">చర్చ</a>)</li>
</ul>
<p>--<a href="https://te.wikipedia.org/wiki/%E0%B0%B5%E0%B0%BE%E0%B0%A1%E0%B1%81%E0%B0%95%E0%B0%B0%E0%B0%BF:Elkasudharani" title="వాడుకరి:Elkasudharani">Elkasudharani</a> (<a href="https://te.wikipedia.org/wiki/%E0%B0%B5%E0%B0%BE%E0%B0%A1%E0%B1%81%E0%B0%95%E0%B0%B0%E0%B0%BF_%E0%B0%9A%E0%B0%B0%E0%B1%8D%E0%B0%9A:Elkasudharani" title="వాడుకరి చర్చ:Elkasudharani">చర్చ</a>) 05:37, 6 సెప్టెంబర్ 2013 (UTC)==Dr.BRAOU లోని కార్యక్రమ సంధానకర్తలు==</p>
<ul>
<li><a class="extiw" href="https://en.wikipedia.org/wiki/Ghanta_Chakrapani" title="w:Ghanta Chakrapani">ఘంటా చక్రపాణి</a> (డైరెక్టర్, Centre for Staff Training and Development, డాక్టర్ బి.ఆర్. అంబేద్కర్ సార్వత్రిక విశ్వవిద్యాలయం)</li>
</ul>
<p>--<a href="https://te.wikipedia.org/wiki/%E0%B0%AA%E0%B1%8D%E0%B0%B0%E0%B0%A4%E0%B1%8D%E0%B0%AF%E0%B1%87%E0%B0%95:Contributions/14.139.86.130" title="ప్రత్యేక:Contributions/14.139.86.130">14.139.86.130</a> 05:35, 6 సెప్టెంబర్ 2013 (UTC)</p>
<p>శిక్షణ శిబిరానికి హజరైన సభ్యులు</p>
<p>--<a class="new" href="https://te.wikipedia.org/w/index.php?title=%E0%B0%B5%E0%B0%BE%E0%B0%A1%E0%B1%81%E0%B0%95%E0%B0%B0%E0%B0%BF:Pallavisudheer&action=edit&redlink=1" title="వాడుకరి:Pallavisudheer (పుట లేదు)">Pallavisudheer</a> (<a href="https://te.wikipedia.org/wiki/%E0%B0%B5%E0%B0%BE%E0%B0%A1%E0%B1%81%E0%B0%95%E0%B0%B0%E0%B0%BF_%E0%B0%9A%E0%B0%B0%E0%B1%8D%E0%B0%9A:Pallavisudheer" title="వాడుకరి చర్చ:Pallavisudheer">చర్చ</a>) 05:31, 6 సెప్టెంబర్ 2013 (UTC)</p>
<ol>
<li>సరోజ --<a href="https://te.wikipedia.org/wiki/%E0%B0%B5%E0%B0%BE%E0%B0%A1%E0%B1%81%E0%B0%95%E0%B0%B0%E0%B0%BF:Drgsaroja" title="వాడుకరి:Drgsaroja">Drgsaroja</a> (<a href="https://te.wikipedia.org/wiki/%E0%B0%B5%E0%B0%BE%E0%B0%A1%E0%B1%81%E0%B0%95%E0%B0%B0%E0%B0%BF_%E0%B0%9A%E0%B0%B0%E0%B1%8D%E0%B0%9A:Drgsaroja" title="వాడుకరి చర్చ:Drgsaroja">చర్చ</a>) 05:27, 6 సెప్టెంబర్ 2013 (UTC)</li>
<li>--<a href="https://te.wikipedia.org/wiki/%E0%B0%B5%E0%B0%BE%E0%B0%A1%E0%B1%81%E0%B0%95%E0%B0%B0%E0%B0%BF:Rajani_nellutla" title="వాడుకరి:Rajani nellutla">Rajani nellutla</a> (<a href="https://te.wikipedia.org/wiki/%E0%B0%B5%E0%B0%BE%E0%B0%A1%E0%B1%81%E0%B0%95%E0%B0%B0%E0%B0%BF_%E0%B0%9A%E0%B0%B0%E0%B1%8D%E0%B0%9A:Rajani_nellutla" title="వాడుకరి చర్చ:Rajani nellutla">చర్చ</a>) 05:29, 6 సెప్టెంబర్ 2013 (UTC)</li>
<li>--<a href="https://te.wikipedia.org/wiki/%E0%B0%B5%E0%B0%BE%E0%B0%A1%E0%B1%81%E0%B0%95%E0%B0%B0%E0%B0%BF:Kiranmayi.ys" title="వాడుకరి:Kiranmayi.ys">Kiranmayi.ys</a> (<a href="https://te.wikipedia.org/wiki/%E0%B0%B5%E0%B0%BE%E0%B0%A1%E0%B1%81%E0%B0%95%E0%B0%B0%E0%B0%BF_%E0%B0%9A%E0%B0%B0%E0%B1%8D%E0%B0%9A:Kiranmayi.ys" title="వాడుకరి చర్చ:Kiranmayi.ys">చర్చ</a>) 05:30, 6 సెప్టెంబర్ 2013 (UTC)</li>
<li>--<a class="new" href="https://te.wikipedia.org/w/index.php?title=%E0%B0%B5%E0%B0%BE%E0%B0%A1%E0%B1%81%E0%B0%95%E0%B0%B0%E0%B0%BF:Vasuvaddanam&action=edit&redlink=1" title="వాడుకరి:Vasuvaddanam (పుట లేదు)">Vasuvaddanam</a> (<a href="https://te.wikipedia.org/wiki/%E0%B0%B5%E0%B0%BE%E0%B0%A1%E0%B1%81%E0%B0%95%E0%B0%B0%E0%B0%BF_%E0%B0%9A%E0%B0%B0%E0%B1%8D%E0%B0%9A:Vasuvaddanam" title="వాడుకరి చర్చ:Vasuvaddanam">చర్చ</a>) 05:31, 6 సెప్టెంబర్ 2013 (UTC)</li>
</ol>
<p>--<a href="https://te.wikipedia.org/wiki/%E0%B0%B5%E0%B0%BE%E0%B0%A1%E0%B1%81%E0%B0%95%E0%B0%B0%E0%B0%BF:Gpushpa" title="వాడుకరి:Gpushpa">Gpushpa</a> (<a href="https://te.wikipedia.org/wiki/%E0%B0%B5%E0%B0%BE%E0%B0%A1%E0%B1%81%E0%B0%95%E0%B0%B0%E0%B0%BF_%E0%B0%9A%E0%B0%B0%E0%B1%8D%E0%B0%9A:Gpushpa" title="వాడుకరి చర్చ:Gpushpa">చర్చ</a>) 05:32, 6 సెప్టెంబర్ 2013 (UTC) --<a href="https://te.wikipedia.org/wiki/%E0%B0%B5%E0%B0%BE%E0%B0%A1%E0%B1%81%E0%B0%95%E0%B0%B0%E0%B0%BF:Drgsaroja" title="వాడుకరి:Drgsaroja">Drgsaroja</a> (<a href="https://te.wikipedia.org/wiki/%E0%B0%B5%E0%B0%BE%E0%B0%A1%E0%B1%81%E0%B0%95%E0%B0%B0%E0%B0%BF_%E0%B0%9A%E0%B0%B0%E0%B1%8D%E0%B0%9A:Drgsaroja" title="వాడుకరి చర్చ:Drgsaroja">చర్చ</a>) 05:34, 6 సెప్టెంబర్ 2013 (UTC)</p>
<ol>
<li>--<a href="https://te.wikipedia.org/wiki/%E0%B0%B5%E0%B0%BE%E0%B0%A1%E0%B1%81%E0%B0%95%E0%B0%B0%E0%B0%BF:Boju_srinivas" title="వాడుకరి:Boju srinivas">Boju srinivas</a> (<a href="https://te.wikipedia.org/wiki/%E0%B0%B5%E0%B0%BE%E0%B0%A1%E0%B1%81%E0%B0%95%E0%B0%B0%E0%B0%BF_%E0%B0%9A%E0%B0%B0%E0%B1%8D%E0%B0%9A:Boju_srinivas" title="వాడుకరి చర్చ:Boju srinivas">చర్చ</a>) 05:36, 6 సెప్టెంబర్ 2013 (UTC)</li>
<li>--<a href="https://te.wikipedia.org/wiki/%E0%B0%B5%E0%B0%BE%E0%B0%A1%E0%B1%81%E0%B0%95%E0%B0%B0%E0%B0%BF:Shridhevie" title="వాడుకరి:Shridhevie">Shridhevie</a> (<a href="https://te.wikipedia.org/wiki/%E0%B0%B5%E0%B0%BE%E0%B0%A1%E0%B1%81%E0%B0%95%E0%B0%B0%E0%B0%BF_%E0%B0%9A%E0%B0%B0%E0%B1%8D%E0%B0%9A:Shridhevie" title="వాడుకరి చర్చ:Shridhevie">చర్చ</a>) 05:37, 6 సెప్టెంబర్ 2013 (UTC)</li>
</ol>
<p>పై వరసలో పేరు చేర్చండి లేక సంతకం చేయండి></p>
<ol>
<li>--[[--<a href="https://te.wikipedia.org/wiki/%E0%B0%AA%E0%B1%8D%E0%B0%B0%E0%B0%A4%E0%B1%8D%E0%B0%AF%E0%B1%87%E0%B0%95:Contributions/14.139.86.130" title="ప్రత్యేక:Contributions/14.139.86.130">14.139.86.130</a> 05:35, 6 సెప్టెంబర్ 2013 (UTC)]]</li>
<li>--<a href="https://te.wikipedia.org/wiki/%E0%B0%B5%E0%B0%BE%E0%B0%A1%E0%B1%81%E0%B0%95%E0%B0%B0%E0%B0%BF:Elkasudharani" title="వాడుకరి:Elkasudharani">Elkasudharani</a> (<a href="https://te.wikipedia.org/wiki/%E0%B0%B5%E0%B0%BE%E0%B0%A1%E0%B1%81%E0%B0%95%E0%B0%B0%E0%B0%BF_%E0%B0%9A%E0%B0%B0%E0%B1%8D%E0%B0%9A:Elkasudharani" title="వాడుకరి చర్చ:Elkasudharani">చర్చ</a>) 05:37, 6 సెప్టెంబర్ 2013 (UTC)</li>
<li>--<a href="https://te.wikipedia.org/wiki/%E0%B0%B5%E0%B0%BE%E0%B0%A1%E0%B1%81%E0%B0%95%E0%B0%B0%E0%B0%BF:Pvramana24" title="వాడుకరి:Pvramana24">Pvramana24</a> (<a href="https://te.wikipedia.org/wiki/%E0%B0%B5%E0%B0%BE%E0%B0%A1%E0%B1%81%E0%B0%95%E0%B0%B0%E0%B0%BF_%E0%B0%9A%E0%B0%B0%E0%B1%8D%E0%B0%9A:Pvramana24" title="వాడుకరి చర్చ:Pvramana24">చర్చ</a>) 05:37, 6 సెప్టెంబర్ 2013 (UTC)</li>
</ol>
<p style="text-align: justify; ">నివేదిక</p>
<p style="text-align: justify; ">చిత్రమాలిక</p>
<p>
For more details visit <a href='http://editors.cis-india.org/openness/events/wikipedia-training-in-telugu-for-b-r-ambedkar-open-university'>http://editors.cis-india.org/openness/events/wikipedia-training-in-telugu-for-b-r-ambedkar-open-university</a>
</p>
No publisherpraskrishnaAccess to KnowledgeWikimediaWikipediaWorkshopOpennessEvent2013-09-06T05:51:49ZEventPublic Law and Jurisprudential Issues of Privacy: A Talk at CIS
http://editors.cis-india.org/internet-governance/events/public-law-and-jurisprudential-issues-of-privacy-talk-at-cis
<b>On Friday, September 27, 2013, Abhayraj Naik will give a talk on public law and jurisprudential issues related to privacy. CIS will host the talk at its office in Bangalore from 4.30 p.m. to 6.00 p.m.</b>
<h3>Abhayraj Naik</h3>
<p style="text-align: justify;">Abhayraj Naik is a graduate of the National Law School of India University, Bangalore, and the Yale Law School. He previously taught public law at the Jindal Global Law School of the OP Jindal Global University where he also co-directed the Centre for Public Law & Jurisprudence from September 2009 to July 2012.</p>
<p style="text-align: justify;">Abhay is actively associated with the Environment Support Group, Bangalore (<a href="http://www.esgindia.org">http://www.esgindia.org</a>), and has also been associated with the Meiklejohn Civil Liberties Institute, Berkeley, USA; Universities Allied for Essential Medicines, USA; Culture Move, Bangalore and other national and international advocacy, activism and research groups for several years now.</p>
<p style="text-align: justify;">Abhay's research interests include legal theory, philosophy, criminal justice reform, urban governance, ecology, and technology policy. His current research projects include interdisciplinary studies of urban street vending, information privacy, fiduciary duties, forgiveness, biopiracy, and criminal justice reform.</p>
<p style="text-align: justify;">He enjoys cycling, travel, poetry, music, and radical educational and ecological activism.</p>
<p style="text-align: justify;">Abhay currently teaches at the Azim Premji University in Bangalore.</p>
<p style="text-align: justify;"><strong>VIDEO</strong></p>
<iframe src="//www.youtube.com/embed/eTWSXa8g0gA" frameborder="0" height="250" width="250"></iframe>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/events/public-law-and-jurisprudential-issues-of-privacy-talk-at-cis'>http://editors.cis-india.org/internet-governance/events/public-law-and-jurisprudential-issues-of-privacy-talk-at-cis</a>
</p>
No publisherpraskrishnaEventInternet GovernancePrivacy2013-12-30T12:39:23ZEventRe-releasing Konkani Vishwakosh & Building Konkani Wikipedia
http://editors.cis-india.org/openness/events/re-releasing-konkani-vishwakosh-and-building-konkani-wikipedia
<b>The Centre for Internet and Society (CIS-A2K) in partnership with the University of Goa invites you to this event on Thursday, September 26, 2013, 10.00 a.m. The one-hour event will be followed by a press conference.</b>
<p style="text-align: justify; ">This was originally published in <a class="external-link" href="https://commons.wikimedia.org/wiki/File:Re-release_of_Konkani_Vishwakosh_under_Creative_Commons_License_CC-BY-SA_3.0_-_Invite.pdf">the Wikipedia page here</a>.</p>
<hr />
<p style="text-align: justify; ">Upon <a class="external-link" href="http://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Programme_Plan">CIS-A2K</a>'s explicit request, <a class="external-link" href="http://www.unigoa.ac.in/">Goa University</a> has approved the re-release of Konkani Vishwakosh under <a class="external-link" href="http://creativecommons.org/licenses/">Creative Commons License</a> (CC‐BY‐SA 3.0) to make it freely available to public and thus preserve <a class="external-link" href="http://en.wikipedia.org/wiki/Konkani_language">Konkani language</a> and culture in the digital era. This encyclopaedia will also serve as one of the main sources of building and writing articles on Konkani Wikipedia (which is currently under incubation).</p>
<p style="text-align: justify; ">We'd like you to be a part of this event and help showcase Konkani community and language on a global digital platform such as Konkani Wikipedia.</p>
<p style="text-align: justify; "><a href="http://editors.cis-india.org/openness/blog-old/re-releasing-konkani-vishwakosh.pdf" class="internal-link">Please click to see the invite</a>. We look forward to seeing you at the event.</p>
<p>
For more details visit <a href='http://editors.cis-india.org/openness/events/re-releasing-konkani-vishwakosh-and-building-konkani-wikipedia'>http://editors.cis-india.org/openness/events/re-releasing-konkani-vishwakosh-and-building-konkani-wikipedia</a>
</p>
No publisherpraskrishnaAccess to KnowledgeWikimediaWikipediaOpennessEvent2013-09-25T05:48:56ZEventBangalore + Social Good
http://editors.cis-india.org/internet-governance/events/bangalore-social-good
<b>In conjunction with The Social Good Summit held in New York City on September 22 - 24, Ashoka India, IDEX + Green Lungi are partnering to host the Bangalore + Sustainability event! The Social Good Summit aims to explore creative ways that technology can be leveraged for positive social change. Green Lungi in collaboration with IDEX and Ashoka is holding the event at CIS, Bangalore on September 21.</b>
<hr />
<p>Sharath Chandra Ram, a researcher at CIS is one of the panelists. A brief abstract of his talk is given below:</p>
<p style="text-align: justify; "><i>"Are digital networked technologies adopted or used in the same way globally across all communities? Were social networks and apps across Twitter or Facebook really that pivotal in the mass citizen uprisings of the recent past? In this session, we shall see how it is essential to consider cultural specificities while designing technological interventions. Furthermore, I shall discuss how an effective strategy for citizen activism is not that which relies solely on virtual networks, but one that bridges networks, across different mediums, to engage offline citizens as much as the online. There will be a few live demonstrations of solutions we developed at the Centre for Internet and Society which embrace openness in pervasive technologies that enable us to bridge this crucial trans-medial interface</i>.<i>"</i></p>
<hr />
<p style="text-align: justify; ">The Bangalore + Sustainability event will focus on devising creative applications of technologies to confront sustainability challenges. We believe that young people have the power to affect change, and its time that we provide them with more opportunities to solve the challenges they see around them. This event is a first step in the direction of developing these problem-solving skills in our young people. Through an innovative Make-a-thon format, participants will engage in developing creative tech-based solutions to everyday challenges like road safety, waste management, water management, improving green cover and safer spaces for women.</p>
<h3 style="text-align: justify; ">Event Format and Details</h3>
<ul>
<li>1:45 - 2:00 -- Registration + Welcome</li>
</ul>
<ul>
<li>2:00 - 2:45 -- Panel Discussion + Q&A</li>
</ul>
<p style="text-align: justify; ">Panelists will give a brief talk (5 - 7 minutes), posing questions for participants to consider around the intersection of technology + behavioral change + sustainability + youth engagement. A panelist from each of these sectors will set the context for the Jam to follow:</p>
<ul>
<li>Sustainability</li>
<li>Communications/Design</li>
<li>Technology</li>
<li>Young Changemakers</li>
</ul>
<p style="text-align: justify; "><a href="http://editors.cis-india.org/internet-governance/blog/bangalore-social-good.pdf" class="internal-link">Click to download the event brochure</a> for details on the panelists/speakers</p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/events/bangalore-social-good'>http://editors.cis-india.org/internet-governance/events/bangalore-social-good</a>
</p>
No publisherpraskrishnaEventInternet Governance2013-09-25T07:43:58ZEventPrivacy Round Table, New Delhi (October 2013)
http://editors.cis-india.org/internet-governance/events/privacy-round-table-delhi-october-19-2013
<b>The Centre for Internet and Society (CIS), Federation of Indian Chambers of Commerce and Industry (FICCI), and DSCI cordially invite you to a "Privacy Round Table" at the FICCI Federation House in Tansen Marg on October 19, 2013.</b>
<hr />
<p style="text-align: justify; ">Click the below links to:</p>
<ul>
<li><a href="http://editors.cis-india.org/internet-governance/blog/privacy-round-table-delhi-october-13.pdf" class="internal-link">Download the event brochure</a></li>
<li>Download the <a href="http://editors.cis-india.org/internet-governance/blog/privacy-protection-bill-september-2013.pdf" class="internal-link">latest version of the Draft Privacy Bill</a></li>
</ul>
<hr />
<p style="text-align: justify; "> </p>
<p style="text-align: justify; ">Jacob Kohnstamm, Data Protection Authority, Netherlands and Chairman of the Article 29 Working Party, Chantel Bernier, Assistant Privacy Commissioner, Canada, and Christopher Graham, Information Commissioner, UK will make presentations:</p>
<p style="text-align: justify; "> </p>
<p style="text-align: justify; "> </p>
<h2 style="text-align: justify; "></h2>
<h2 style="text-align: justify; "></h2>
<h2 style="text-align: justify; "></h2>
<h2 style="text-align: justify; ">Agenda</h2>
<table class="plain">
<tbody>
<tr>
<th>Time</th><th>Detail</th>
</tr>
<tr>
<td>10:00 <br />10:30 <br /></td>
<td>Introduction and summary of previous Roundtables</td>
</tr>
<tr>
<td>10:30 <br />11:00</td>
<td>“Data Protection in the European Union” <br />Mr. Jacob Kohnstamm, <i>Data Protection Authority, Netherlands and Chairman of the Article 29 Working Party</i><br /></td>
</tr>
<tr>
<td>11:00 <br />11:15</td>
<td>Tea</td>
</tr>
<tr>
<td>11:15 <br />12:15</td>
<td>Regulatory Frameworks and Jurisdiction<br /> a. Co-Regulation vs. Self Regulation vs. Statutory Regulation<br />b. Applicability of regulatory framework to domestic processing vs. multiple/international jurisdictions<br /></td>
</tr>
<tr>
<td>12:15 <br />12:45</td>
<td>“An Overview of the Canadian Privacy Regime”<br />Ms. Chantal Bernier, <i>Assistant Privacy Commissioner, Canada</i><br /></td>
</tr>
<tr>
<td>12:15 <br />13:30</td>
<td>The Privacy Commissioner<br />a. Composition of the Office of the Privacy Commissioner (officers, funding, organizational structure)<br />b. Powers of the Privacy Commissioner (investigation, audit, privacy impact assessment etc)<br /> c. Functions of the Office of the Privacy Commissioner<br /></td>
</tr>
<tr>
<td>13:30 <br />14:30</td>
<td>Lunch</td>
</tr>
<tr>
<td>14:30 <br />15:30</td>
<td>Rights of the individual and exceptions to the right to privacy<br /> a. Rights of the individual including: notice, access, deletion etc.<br />b. Exceptions to the right to privacy: national security, public<br /> order, public interest, prevention and detection of crime etc.<br /></td>
</tr>
<tr>
<td>15:30 <br />16:00</td>
<td>“An overview of the Privacy Regime in the UK” <br /> Mr. Christopher Graham, Information Commissioner, UK <br /></td>
</tr>
<tr>
<td>16:00 <br />16:15</td>
<td>Tea</td>
</tr>
<tr>
<td>16:15 <br />17:00</td>
<td>Defining and protecting personal data and personal sensitive data<br />a. Definitions and distinctions between personal data vs personal sensitive data<br />b. Levels of protection for personal data vs. personal sensitive data<br /> c. Penalty and remedy for breach of personal data vs. personal sensitive data<br /></td>
</tr>
<tr>
<td>17:00 <br />18:00</td>
<td>Penalty and Redress<br /> a. Forms and extent of penalty: fine, public notice, shut down of services etc.<br /> b. Forms of redress for the individual<br /> c. Enforcement of penalty and redress<br /></td>
</tr>
</tbody>
</table>
<h2 style="text-align: justify; ">The Speakers</h2>
<table class="grid listing">
<tbody>
<tr>
<td>
<h3 style="text-align: justify; "><img src="http://editors.cis-india.org/home-images/Jacob.png/@@images/a153adde-fdab-489b-84f0-340787121b1b.png" alt="Jacob" class="image-inline" title="Jacob" /></h3>
<h3 style="text-align: center; "><b>Jacob Kohnstamm</b></h3>
</td>
<td>
<p style="text-align: justify; ">Before his appointment as Chairman of the <a class="external-link" href="http://www.dutchdpa.nl/Pages/home.aspx">Dutch Data Protection Authority</a> in 2004, Jacob Kohnstamm was active in Dutch politics as member of the Lower House of the Dutch Parliament, as State Secretary for Internal Affairs and as member of the Senate of the Dutch Parliament (between 1981 and 2004). Before that, he worked as a lawyer in Amsterdam.</p>
<p style="text-align: justify; ">Since February 2010, Jacob Kohnstamm is Chairman of the <a class="external-link" href="http://ec.europa.eu/justice/data-protection/article-29/">Art. 29 Working Party of European Data Protection Authorities</a>.</p>
<p style="text-align: justify; ">Since November 2011, Jacob Kohnstamm is also Chairman of the Executive Committee of the International Conference of Data Protection and Privacy Commissioners.</p>
</td>
</tr>
<tr>
<td>
<p><img src="http://editors.cis-india.org/home-images/Chantel.png/@@images/14ec1d2b-18ac-4327-ad26-1e4f38cdbc4c.png" title="Chantal" height="271" width="221" alt="Chantal" class="image-inline" /></p>
<h3 style="text-align: center; "><b>Chantal Bernier</b></h3>
</td>
<td>
<p style="text-align: justify; ">Chantal Bernier was appointed Assistant Privacy Commissioner of Canada in December 2008.</p>
<p style="text-align: justify; ">Ms. Bernier started her career in the federal government as a lawyer in the <a class="external-link" href="http://www.justice.gc.ca/eng/">Department of Justice, Canada</a>. She went on to hold a directorship at the Privy Council Office before being appointed Assistant Deputy Minister at Indian and Northern Affairs Canada, and later on at Public Safety Canada.</p>
<p style="text-align: justify; ">She holds a Bachelor of Civil Law from the <a class="external-link" href="http://www.usherbrooke.ca/">University of Sherbrooke</a> and a Masters in Public International Law from the <a class="external-link" href="http://www.lse.ac.uk/home.aspx">London School of Economics and Political Science</a>.</p>
</td>
</tr>
<tr>
<td>
<p><img src="http://editors.cis-india.org/home-images/Christopher.png/@@images/a67e609e-590e-4c77-b957-ba785a06b691.png" title="Christopher" height="138" width="228" alt="Christopher" class="image-inline" /></p>
<h3 style="text-align: center; "><b>Christopher Graham</b></h3>
</td>
<td>
<p style="text-align: justify; ">Christopher Graham became UK Information Commissioner in June 2009, with responsibility for overseeing the Freedom of Information Act and Data Protection Act regimes — upholding information rights in the public interest, promoting openness by public bodies and data privacy for individuals. He is the Vice Chair of the Article 29 Working Party of the European Data Protection Authorities.</p>
<p style="text-align: justify; ">Christopher was the director general of the <a class="external-link" href="http://www.asa.org.uk/">Advertising Standards Authority </a>(ASA) from April 2000 to June 2009. From 2003-5, he was chairman of the <a class="external-link" href="http://www.easa-alliance.org/">European Advertising Standards Alliance</a> (EASA), the federation of advertising self-regulatory bodies across the EU Single Market.</p>
<p style="text-align: justify; ">Prior to joining the ASA, Christopher was for three years Secretary of the <a class="external-link" href="http://www.bbc.com/?/">BBC</a>. Christopher first joined the broadcaster as a news trainee in 1973. He was a Current Affairs Producer for BBC Radio and TV before becoming Managing Editor of News Programmes for TV and Radio.</p>
</td>
</tr>
</tbody>
</table>
<h2>Confirmations and RSVP</h2>
<p>Please send your email confirmations for attending the Delhi Privacy Round Table on October 19, 2013, to Elonnai Hickok (<a class="mail-link" href="mailto:elonnai@cis-india.org">elonnai@cis-india.org</a>)</p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/events/privacy-round-table-delhi-october-19-2013'>http://editors.cis-india.org/internet-governance/events/privacy-round-table-delhi-october-19-2013</a>
</p>
No publisherpraskrishnaEventInternet GovernancePrivacy2013-09-28T02:52:26ZEvent #CultureForAll Conference on Cultural Mapping
http://editors.cis-india.org/raw/culture-for-all-conference-on-cultural-mapping
<b>Sahapedia is organising the #CultureForAll Conference on Cultural Mapping, digitally on September 28 and 29, 2021. The conference will take place in collaboration with the Centre for Social Studies at the University of Coimbra, Azim Premji University, the Centre for Internet and Society, and the Re-Centring Afro Asia project at the University of Cape Town.</b>
<p style="text-align: justify; "><b>Cross-posted from <a class="external-link" href="https://www.sahapedia.org/conferences">Sahapedia</a></b></p>
<p style="text-align: justify; ">Featuring 15 papers across 4 sessions, the conference will present research primarily from South Asia with some papers discussing experimental mapping techniques in Africa and Europe. Sessions will be chaired by academicians from among our collaborators and promise to interrogate, discuss, and reflect upon the complex questions of who, what, how, and for whom to map culture. Speakers at the conference will present work ranging from literature in Nagaland and food in Goa to music in South Africa and architecture in Delhi. They include researchers in history, literature, and music, as well as architects and educators.</p>
<hr />
<ul>
<li>The conference will be held on Zoom. Register here: <a class="moz-txt-link-freetext" href="https://bit.ly/2X4XAap">https://bit.ly/2X4XAap</a></li>
<li>For the schedule and more details, visit <a class="moz-txt-link-freetext" href="https://www.sahapedia.org/conferences">https://www.sahapedia.org/conferences</a></li>
<li>The Cultural Mapping Conference is part of the ongoing <a href="https://www.sahapedia.org/culture-for-all">#CultureForAll (CFA) </a><span>festival by Sahapedia.</span></li>
</ul>
<p>
For more details visit <a href='http://editors.cis-india.org/raw/culture-for-all-conference-on-cultural-mapping'>http://editors.cis-india.org/raw/culture-for-all-conference-on-cultural-mapping</a>
</p>
No publishersnehaResearchers at WorkDigital KnowledgeEvent2021-09-20T15:18:02ZBlog EntryCommunication Rights in the Age of Digital Technology
http://editors.cis-india.org/internet-governance/events/communication-rights-in-the-age-of-digital-technology
<b>The Centre for Internet & Society (CIS) invites you to a conference to discuss the evolution of privacy and surveillance in India on Friday, October 30, 2015 at Deck Suite Hall, 5th Floor, Habitat Centre, Lodhi Road, Near Air Force Bal Bharti School, New Delhi - 110003, from 11 a.m. to 5 p.m.</b>
<p>The conference will be conducted in a round-table format. Topics to be discussed shall include, among others, the Human DNA Profiling Bill, 2012, the PIL questioning the data collection under the UID scheme, the draft National Encryption Policy and the Supreme Court judgement in Shreya Singhal v. Union of India, in the context of privacy and surveillance in India. The conference will be a forum for discussion, knowledge exchange and agenda building.</p>
<hr />
<h3 style="text-align: justify; ">Background Note</h3>
<p style="text-align: justify; ">In India, the Right to Privacy has been interpreted to mean an individuals’ right to be left alone. In the age of massive use of Information and Communications Technology, it has become imperative to have this right protected. The Supreme Court has held in a number of its decisions that the right to privacy is implicit in the fundamental right to life and personal liberty under Article 21 of the Indian Constitution, though Part III does not explicitly mention this right. Since the 1960s, the Apex Court has been dealing with this issue, primarily with respect to privacy being recognised as a fundamental or common law right and the standards that need to be satisfied in order to impose any restrictions on it.</p>
<p style="text-align: justify; ">In the year 2012, the Planning Commission constituted a Group of Experts under the chairmanship of Justice AP Shah, Former Chief Justice of the Delhi High Court to recommend a <a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf">potential privacy framework</a> for privacy in India. Previously in 2011 the Department of Personnel and Training had prepared a <a href="https://bourgeoisinspirations.files.wordpress.com/2010/03/draft_right-to-privacy.pdf">draft Bill on Right to Privacy </a>which has yet to materialize into a comprehensive legislation on privacy. In 2014, a version of the revised Right to Privacy Bill was <a href="http://cis-india.org/internet-governance/blog/leaked-privacy-bill-2014-v-2011">leaked</a>. Amendments to the Bill aim to protect individuals against misuse of their data by the government or private agencies, and is in the process of being <a href="http://www.newindianexpress.com/nation/Centre-Giving-Final-Touches-to-Right-to-Privacy-Bill/2015/03/17/article2717271.ece">finalized by the Indian Government</a><a href="http://www.newindianexpress.com/nation/Centre-Giving-Final-Touches-to-Right-to-Privacy-Bill/2015/03/17/article2717271.ece">. </a></p>
<p style="text-align: justify; ">Of late, privacy concerns have gained importance in India due to the initiation of national programmes like the UID Scheme, DNA Profiling, the National Encryption Policy, etc. attracting criticism for their impact on the right to privacy. For example, DeitY introduced a draft National Encryption Policy in September this year to prescribe methods for encryption. However, the policy would have posed significant restriction on the ability of citizens to encrypt online communication. Backlash from the citizens, industry, social media and privacy experts led the Government to withdraw the policy as the measures included made the information system vulnerable in every sense.</p>
<p style="text-align: justify; ">Earlier this year, the Apex Court gave a <a href="http://supremecourtofindia.nic.in/FileServer/2015-03-24_1427183283.pdf">historical</a><a href="http://supremecourtofindia.nic.in/FileServer/2015-03-24_1427183283.pdf"> judgement</a> by striking down section 66A of the IT (Amendment) Act 2008. The Court upheld section 69A and the Information Technology (Procedure & Safeguards for Blocking for Access of Information by Public) Rules 2009 to be constitutionally valid, which accords the government with the authority to block transmission of information and websites when it deems it as necessary for reasons like sovereignty and integrity of India, public order, etc.</p>
<p style="text-align: justify; ">Another government initiative which has generated considerable controversy for its threat to privacy is the UID project which aims to issue a unique identification number to all citizens by the Unique Identification Authority of India, which can be authenticated and verified online. In August this year, the Supreme Court, <a href="http://judis.nic.in/supremecourt/imgs1.aspx?filename=42841">vide an interim order</a>, restricted the use of Aadhaar by declaring it to be optional for availing government benefits and services. Though the Government contended the right to privacy as a fundamental right in India, the Court deferred this issue to a larger Constitutional Bench, and the Supreme Court upheld its decision yet again in the month of October.</p>
<p style="text-align: justify; ">Similarly, the <a href="http://www.dbtindia.nic.in/wp-content/uploads/Human-DNA-Profiling-Bill.pdf">d</a><a href="http://www.dbtindia.nic.in/wp-content/uploads/Human-DNA-Profiling-Bill.pdf">raft</a><a href="http://www.dbtindia.nic.in/wp-content/uploads/Human-DNA-Profiling-Bill.pdf"> Human DNA </a><a href="http://www.dbtindia.nic.in/wp-content/uploads/Human-DNA-Profiling-Bill.pdf">P</a><a href="http://www.dbtindia.nic.in/wp-content/uploads/Human-DNA-Profiling-Bill.pdf">rofiling </a><a href="http://www.dbtindia.nic.in/wp-content/uploads/Human-DNA-Profiling-Bill.pdf">B</a><a href="http://www.dbtindia.nic.in/wp-content/uploads/Human-DNA-Profiling-Bill.pdf">ill 2015</a> is being questioned on grounds of privacy invasion on a massive scale as it aims to collect and store the DNA samples of criminals, suspects, volunteers, and victims and regulate DNA laboratories and DNA sampling for use by law enforcement agencies. The Bill also fails to include comprehensive privacy safeguards and provisions regarding collection of DNA samples with or without the consent of an individual, making individual privacy an important concern.</p>
<p style="text-align: justify; ">Going by these ongoing debates, one can say that Privacy as a right has primarily evolved by way of judicial interpretation and continues to evolve in light of several controversial Government policies, projects and schemes. However its development is often undermined by tension between several competing national interests which calls for clear guidelines to protect this inviolable right of the citizens.</p>
<h3><a href="http://editors.cis-india.org/internet-governance/blog/gsma-conference-invite.pdf" class="internal-link">
<hr />
<b>Download the Invite</b></a></h3>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/events/communication-rights-in-the-age-of-digital-technology'>http://editors.cis-india.org/internet-governance/events/communication-rights-in-the-age-of-digital-technology</a>
</p>
No publisherrakeshSurveillanceEventInternet GovernancePrivacy2015-10-24T07:45:26ZEventThe Geopolitics of Information Controls: A Presentation by Masashi Crete-Nishihata
http://editors.cis-india.org/internet-governance/events/geo-politics-of-information-controls
<b>Masashi Crete-Nishihata will give a talk on Citizen Lab's activities and present its approach to the study of information controls through recent research and case studies. The talk will be held on June 19, 2013 at TERI Auditorium in Bangalore, 5 p.m. to 7.30 p.m.</b>
<h2>The Citizen Lab</h2>
<p style="text-align: justify; ">The Citizen Lab is an interdisciplinary research group based at the University of Toronto. It explores the intersection of<br />information technology, global security, and human rights through technical, policy, and legal research.</p>
<p style="text-align: justify; ">A central focus of Citizen Lab's research analyzes the prevalence, operation, and impact of information controls. Information controls can be conceptualized as actions conducted in and through the Internet and other information and communication technologies. Such controls seek to deny (as with Internet filtering), disrupt (as in denial-of-service<br /> attacks), or monitor (such as passive or targeted surveillance) information for political ends.</p>
<h2 style="text-align: justify; ">Masashi Crete-Nishihata</h2>
<p style="text-align: justify; ">Masashi is <span style="text-align: -webkit-auto; ">the research manager of the Citizen Lab at the Munk School of Global Affairs, University of Toronto. He has published work on information controls during the 2008 Russia-Georgia conflict, cyber security research ethics, cyber attacks against Burmese media groups, and the psychosocial impacts of lifelogging technologies. His research interests include technology policy, information controls, and human computer interaction.</span></p>
<hr />
<h3 style="text-align: -webkit-auto; "><span style="text-align: -webkit-auto; ">Relevant Links</span></h3>
<div><span style="text-align: -webkit-auto; "><a href="http://citizenlab.org/" target="_blank">http://citizenlab.org</a></span></div>
<div><span style="text-align: -webkit-auto; "><a href="http://citizenlab.org/publications/" target="_blank">http://citizenlab.org/publications/</a></span></div>
<div><span style="text-align: -webkit-auto; "><a href="https://citizenlab.org/2013/03/you-only-click-twice-finfishers-global-proliferation-2/" target="_blank">https://citizenlab.org/2013/03/you-only-click-twice-finfishers-global-proliferation-2/</a></span></div>
<div></div>
<div><span style="text-align: -webkit-auto; ">Please RSVP as seats are limited. <br />RSVP: Purba Sarkar (<a class="mail-link" href="mailto:purba@cis-india.org">purba@cis-india.org</a>)</span></div>
<div></div>
<hr />
<div><span style="text-align: -webkit-auto; "><b>Video</b><br /></span></div>
<p><iframe frameborder="0" height="315" src="http://www.youtube.com/embed/FEwPtSYdm4Q" width="320"></iframe></p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/events/geo-politics-of-information-controls'>http://editors.cis-india.org/internet-governance/events/geo-politics-of-information-controls</a>
</p>
No publisherpraskrishnaEventInternet Governance2013-06-26T09:56:01ZEventCounter Surveillance Panel: DiscoTech & Hackathon
http://editors.cis-india.org/events/counter-surveillance-panel-disco-tech-hackathon
<b>We invite you to a Counter Surveillance DiscoTech and Hackathon at the Centre for Internet and Society in Bangalore on Saturday, March 1, 2014 (9.00 a.m. to 5.00 p.m.). The event is being co-organized by the Centre for Internet and Society in tandem with the MIT Centre for Civic Media Co-Design Lab, with support from members of Tactical Technology Collective, Hackteria.org and Srishti School of Art Design and Technology. Registrations begin at 9.00 a.m. The event shall close with a featured talk by renown information activist and maker lab innovator Smari McCarthy, titled "Privacy for Humanity" at 5.00 p.m.</b>
<h2>Overview</h2>
<p style="text-align: justify; ">Mirroring the call by MIT Civic Media Lab <a href="http://codesign.mit.edu/discotechs/">Co-Design Studio</a>, this event brings together students, technologists, designers and citizens to explore counter-surveillance strategies. The event will be held simultaneously across various locations including Boston, Palestine, Lisbon and Buenos Aires. Click here for the definition of <a href="http://codesign.mit.edu/discotechs/">DiscoTech</a>.(Discovering Technology)<b> </b></p>
<h2 style="text-align: justify; ">Agenda</h2>
<p class="Default" style="text-align: justify; ">We shall begin with brief contextualized introductions catalyzed by researchers in the field of privacy & surveillance, followed by workshops and hackathons led by expert practitioners. Participants are welcome from diverse backgrounds looking to be involved in designing engaging and creative ways to counter surveillance. The event shall close with a featured talk by renown information activist and maker lab innovator <a href="http://en.wikipedia.org/wiki/Sm%C3%A1ri_McCarthy"><b>Smari McCarthy</b></a> , titled "<b>Privacy for Humanity</b>" at 5.00 p.m.</p>
<h3 class="Default" style="text-align: justify; ">Introductory Catalyst Sessions</h3>
<ul>
<li style="text-align: justify; "><b>Malavika Jayaram</b>: Fellow at <a class="external-link" href="http://cyber.law.harvard.edu/people/mjayaram">Berkman Center for Internet and Society at Harvard University</a> and the <a class="external-link" href="http://www.cis-india.org/">Centre for Internet and Society, Bangalore</a></li>
<li style="text-align: justify; "><b>Laird Brown</b>: DesiSec Project at the <a href="http://editors.cis-india.org/" class="external-link">Centre for Internet and Society, Bangalore</a> and University of Toronto</li>
<li style="text-align: justify; "><b>Kaustubh Srikant</b>: Head of Technology, <a class="external-link" href="https://tacticaltech.org/kaustubh-srikanth-head-technology">Tactical Technology Collective</a> and <b>Maya Indira Ganesh</b> (Program Director)</li>
<li style="text-align: justify; "><b>Abhay Raj Naik</b>: Assistant Professor,<a class="external-link" href="http://www.azimpremjiuniversity.edu.in/abhayraj-naik"> Azim Premji University</a></li>
</ul>
<h3>Design and Hackathon Lead Catalysts</h3>
<ul>
<li style="text-align: justify; "><a href="http://hackteria.org/?p=278"><b>Yashas</b></a><a href="http://hackteria.org/?p=278"><b> </b></a><a href="http://hackteria.org/?p=278"><b>Shetty</b></a>:Faculty@ <a href="http://www.srishti.ac.in/">www.srishti.ac.in</a> and Co-Founder <a href="http://www.hackteria.org/">Hackteria.org</a> (DNA Spoofing, Surveillance Camera: Avoidance, Microscopic Re-Appropriation & Bacterial Discotheque)</li>
</ul>
<ul>
<li style="text-align: justify; "><b>Hari Dilip Kumar</b>: Co, Founder, <a class="external-link" href="http://www.fluxgentech.com/people">FluxGen</a>: (Introducing data transmission protocols, Software Defined Radio (SDR) design and surveillance detection )</li>
</ul>
<ul>
<li style="text-align: justify; "><b>Sharath Chandra Ram</b>: Researcher @ CIS <a class="external-link" href="http://dorkbot.org/dorkbotbangalore/">Open Lab</a> and Faculty@<a class="external-link" href="http://www.srishti.ac.in/">Srishti</a> (Civic Media solutions using open citizen networks and the web, spectrum scanning, visual communication design strategies, finger print mash-up publishing) </li>
</ul>
<h3 style="text-align: justify; ">Featured Talk and Interactive Closing Session by <a class="external-link" href="http://en.wikipedia.org/wiki/Sm%C3%A1ri_McCarthy">Smari McCarthy</a><b><a class="external-link" href="http://en.wikipedia.org/wiki/Sm%C3%A1ri_McCarthy"> </a></b></h3>
<p style="text-align: justify; "><b>(Executive Director, International Modern Media Institute and Founder, Icelandic Pirate Party & Icelandic Digital Freedom Society)</b><b></b></p>
<p class="callout" style="text-align: justify; "><b>Title of Talk: PRIVACY for HUMANITY - 5.00 p.m.<br /></b></p>
<hr />
<p><a href="http://editors.cis-india.org/internet-governance/blog/counter-surveillance.pdf" class="internal-link"> </a><b><a href="http://editors.cis-india.org/internet-governance/blog/counter-surveillance.pdf" class="internal-link">Click to download the flyer invite</a></b><br />Date: Saturday, March 1, 2014<br />Time: 9.00 a.m. to 5.00 p.m. (Registration 9.00 a.m. sharp)<br />Venue: Centre for Internet and Society, Bangalore<br />Map : <a href="http://bit.ly/1fcDDLG">http://</a><a href="http://bit.ly/1fcDDLG">bit.ly</a><a href="http://bit.ly/1fcDDLG">/1fcDDLG</a><b><br /></b><a href="mailto:sharath@cis-india.org"><br /></a><i>Please RSVP due to limited space and logistics for lunch and refreshments</i></p>
<p>
For more details visit <a href='http://editors.cis-india.org/events/counter-surveillance-panel-disco-tech-hackathon'>http://editors.cis-india.org/events/counter-surveillance-panel-disco-tech-hackathon</a>
</p>
No publisherpraskrishnaSurveillanceEventInternet GovernancePrivacy2014-02-28T05:36:15ZEvent