The Centre for Internet and Society
http://editors.cis-india.org
These are the search results for the query, showing results 31 to 45.
The Digital Classroom: Social Justice and Pedagogy
http://editors.cis-india.org/digital-natives/pathways/facultyworkshop
<b>What happens when we look at the classroom as a space of social justice? What are the ways in which students can be engaged in learning beyond rote memorisation? What innovative methods can be evolved to make students stakeholders in their learning process? These were some of the questions that were thrown up and discussed at the 2 day Faculty Training workshop for participant from colleges included in the Pathways to Higher Education programme, supported by Ford Foundation and collaboratively executed by the Higher Education Innovation and Research Application and the Centre for Internet and Society, Bangalore.</b>
<p></p>
<p>The workshop focused on 3 chief challenges in contemporary
pedagogy and teaching in higher education in India as identified by <a class="external-link" href="http://heira.in/">HEIRA</a>: The need for innovative
curricula, challenges to social justice in education, and possibilities offered
by the intersection of digital and internet technologies with classroom
teaching and evaluation. In the open discussions, the participating faculty
members used their multidisciplinary skills and teaching experience to look at possibilities that we might implement in our classrooms to create a more
inclusive and participatory environment. The conversations were varied, and
through 3 blog entries I want to capture the focus points of the workshop. In
this first post, I focus specifically on the changing nature of student
engagement with education and innovative ways by which we can learn from the
digital platforms of learning and knowledge production and implement certain
innovations in pedagogy that might better help create inclusive and just learning
environments in the undergraduate classroom in India.</p>
<p><strong>Peer 2 Peer:</strong> One of the observations that was made
unanimously by all the faculty members was that students respond better, learn
faster, engage more deeply with their syllabus when the instructor has a
personal rapport with them. Traditionally, the teachers who have established
human contact which goes beyond the call of duty are also the teachers that
have become catalysts and inspirations for the students. Especially with the
digital aesthetics of non-hierarchical information interaction, this has become
the call of the day.</p>
<p>Establishing the teacher as a peer within the classroom,
rather than the fountainhead of information flow, is an experiment worth
conducting. Like on other digital platforms, can we think of the classroom as a
space where the interlocutors each bring their life experience and learning to
start an information exchange and dialogue that would make them stakeholders in
the process of learning? This would mean that the teacher would be a <em>facilitator</em> who builds conditions of
knowledge production and dissemination, thus also changing his/her relationship
with the idea of curriculum and teaching.</p>
<p><strong>Reciprocal evaluation</strong>: It was pointed out that the grade
oriented academic system often leads to students disengaging with innovative
and meaningful learning practices. With the pressure of completing the
curriculum, the students’ instrumental relationship with their classroom
learning and the highly conservative structures of higher education that do not
offer enough space to experiment with the teaching methods, it often becomes
difficult to initiate innovative pedagogic practices. Learning from the
differently hierarchised digital spaces, it was suggested that one of the ways
by which this could be countered is by introducing reciprocal evaluation
patterns which might not directly be associated with the grades but would
recognise and appreciate the skills that students bring to their learning.</p>
<p>Inspired by the Badges contest at <a class="external-link" href="http://hastac.org/tag/badges">HASTAC</a>,
it was suggested that evaluation has to take into account, more than grades.
Different students bring different skills, experiences, personalities and
behaviours to bear upon the syllabus. They work individually and in clusters to
understand and analyse the curriculum. Recognising these skills and the roles
that they play in their learning environments is essential. Getting students to
offer different badges to each other as well as to the teachers involved, helps
them understand their own learning process and engages them in new ways of
learning.</p>
<p><strong>Role based learning: </strong>Within the Web 2.0 there is a peculiar
condition where individuals are recognised simultaneously as experts and
novices. They bring certain knowledges and experiences to the table which make
them credible sources of information and analysis in those areas. At the same
time, they are often beginner learners in certain other areas and they harness
the power of the web to learn. Such a distributed imagination of a student as
not equally proficient in all areas, but diversely equipped to deal with
different disciplines is missing from our understanding of the higher education
classroom.</p>
<p>We discussed the possibility of making the student responsible not
only for his/her own learning but also the learning of the peers in the
classroom. Making the student aware of what s/he is good at and where s/he is
lacking allows them to gain confidence and also realise that everybody has
differential strengths and aptitudes. Such a classroom might look different
because the students don’t have to be pitched in stressful competition with
each other but instead work collaboratively to learn, research and produce
knowledge in a nurturing and supportive learning environment.</p>
<p>These initial discussions look at the possibility of
innovative classroom teaching that can accommodate for the skills and
differences of the students in higher education in India. The conversations
opened up the idea that the classroom can be reshaped so that it becomes a more
inclusive space where the quality of students’ access to education can be
improved. It also ties in with the larger imagination of classrooms as spaces
where principles of social justice can be invoked so that students who are
disadvantaged in language, learning skills, socio-economic backgrounds, are not
just looked at as either ‘beyond help’ or ‘victims of a system’. Instead, it
encourages to look at the students as differential learners who need to be made
stakeholders in their own processes of learning and education.</p>
<p> </p>
<p>
For more details visit <a href='http://editors.cis-india.org/digital-natives/pathways/facultyworkshop'>http://editors.cis-india.org/digital-natives/pathways/facultyworkshop</a>
</p>
No publishernishantHigher EducationAccess to KnowledgeDigital NativesFeaturedNew PedagogiesResearchers at WorkDigital Pluralism2015-05-08T12:36:29ZBlog EntryThe Bots That Got Some Votes Home
http://editors.cis-india.org/digital-natives/bots-got-some-votes-home
<b>Nilofar Ansher gives us some startling updates on the "Digital Natives Video Contest" voting results declared in May 2012, in this blog post.</b>
<p style="text-align: justify;">It was a hint of suspicion raised by one of our colleagues at the Centre for Internet & Society that spurred our Web Analytics team to check into the voting activity of the contest that was all about the ‘<a href="http://editors.cis-india.org/digital-natives/vote-for-digital-natives" class="external-link">Everyday Digital Native</a>’. And while we acknowledged and celebrated the ‘digital’ in the native (users of technology), we forgot the human part that the digital has to engage with. Following weeks of deliberations, we now have conclusive evidence that points to irregularities in voting numbers of the Top 10 contestants. We are now staring at the elephant in the room: those innocuous little automated scripts we sweetly nicknamed, ‘bots’.</p>
<p style="text-align: justify;">Internet bots, also known as web robots or simply bots, are software applications that run automated tasks over the Internet. Typically, bots perform tasks that are both simple and structurally repetitive, at a much higher rate than would be possible for a human alone. The largest use of bots is in web spidering, in which an automated script fetches, analyzes and files information from web servers at many times the speed of a human. Each server can have a file called robots.txt, containing rules for the spidering of that server that the bot is supposed to obey. In addition to their uses outlined above, bots may also be implemented where a response speed faster than that of humans is required (e.g., gaming bots and auction-site robots) or less commonly in situations where the emulation of human activity is required, for example chat bots (Source: Wikipedia).</p>
<h3>What irregularities?</h3>
<p style="text-align: justify;">You would see how a script or bot would have played a role in ‘automating’ the votes for a video. The Top 10 videos received a combined voting number of 20,000+. The discrepancy occurs at the juncture where the votes polled on the front end (the webpage where the contestant video was visible to the public) did not match with the number of hits the page received on the backend (this is the analytics part). For instance, the top polled video has some few thousand votes more than the number of people who actually visited our CIS website in the same duration. This prompted a review of the logs and the possible “hand” of a nonhuman agent acting on its human creator’s command to drive up the votes.</p>
<h3>How was this done? The Technicalities</h3>
<p>The following graph shows the extremely high level of voting requests just before the closing date (March 31, 2012). This would not be extraordinary except for the fact that two or three entries had an exceptionally higher vote count relative to their page views as per the analytics statistics.</p>
<p><img src="http://editors.cis-india.org/digital-natives/video-contest/scripted-voting-report/quickhist_march_april.png" alt="null" class="image-inline" title="Voting requests by date" /></p>
<h3>Analysis of the voting against the http requests for the voting link against page views</h3>
<div>
<table class="vertical listing">
<tbody>
<tr style="text-align: center;">
<th>
<p>Entry</p>
</th>
<th>Actual Votes Recorded (1)<br /></th>
<th>Direct http requests to votes (2)<br /></th>
<th>http requests for normal page view access (3)<br /></th>
<th>Recommended adjusted vote count (4)<br /></th>
</tr>
<tr style="text-align: right;">
<td>
<p><a href="http://editors.cis-india.org/digital-natives/video-contest/entries/digital-media-dance" class="internal-link">Digital Dance</a></p>
</td>
<td>268</td>
<td>448</td>
<td>198</td>
<td><span class="visualHighlight">198</span></td>
</tr>
<tr style="text-align: right;">
<td>
<p><a href="http://editors.cis-india.org/digital-natives/video-contest/entries/big-stories-small-towns" class="internal-link">Big Stories, Small Town</a></p>
</td>
<td>3</td>
<td>10</td>
<td>112</td>
<td>3</td>
</tr>
<tr style="text-align: right;">
<td>
<p><a href="http://editors.cis-india.org/digital-natives/video-contest/entries/digital-natives-contest/entries/connecting-souls-bridging-dreams" class="internal-link">Connecting Souls, Bridging Dreams</a></p>
</td>
<td>1113</td>
<td>2018</td>
<td>1685</td>
<td>1113</td>
</tr>
<tr style="text-align: right;">
<td>
<p><a href="http://editors.cis-india.org/digital-natives/video-contest/entries/finalist-summary/deployed" class="internal-link">Deployed</a></p>
</td>
<td>191</td>
<td>479</td>
<td>195</td>
<td>191</td>
</tr>
<tr style="text-align: right;">
<td>
<p class="internal-link"><a href="http://editors.cis-india.org/digital-natives/video-contest/entries/from-the-wild-into-the-digital-world" class="internal-link">From The Wild Into The Digital World</a></p>
</td>
<td>10317</td>
<td>11880</td>
<td>810</td>
<td><span class="visualHighlight">810</span></td>
</tr>
<tr style="text-align: right;">
<td>
<p><a href="http://editors.cis-india.org/digital-natives/video-contest/entries/i-am-a-ghetto-digital-native" class="internal-link">I Am A Ghetto Digital Native</a></p>
</td>
<td>321</td>
<td>365</td>
<td>844</td>
<td>321</td>
</tr>
<tr style="text-align: right;">
<td>
<p><a href="http://editors.cis-india.org/digital-natives/video-contest/entries/life-in-the-city-slums" class="internal-link">Life in the City Slums</a></p>
</td>
<td>13</td>
<td>18</td>
<td>94</td>
<td>13</td>
</tr>
<tr style="text-align: right;">
<td>
<p><a href="http://editors.cis-india.org/digital-natives/video-contest/entries/who-is-a-digital-native" class="internal-link">Digital Natives</a></p>
</td>
<td>111</td>
<td>328</td>
<td>102</td>
<td><span class="visualHighlight">102</span></td>
</tr>
<tr style="text-align: right;">
<td>
<p><a href="http://editors.cis-india.org/digital-natives/video-contest/entries/with-no-distinction" class="internal-link">With No Distinction</a></p>
</td>
<td>369</td>
<td>557</td>
<td>1232</td>
<td>369</td>
</tr>
<tr style="text-align: right;">
<td>
<p><a href="http://editors.cis-india.org/digital-natives/video-contest/entries/digital-coverage-in-a-digital-world" class="internal-link">Digital Coverage in a Digital World</a></p>
</td>
<td>9622</td>
<td>13650</td>
<td>181</td>
<td><span class="visualHighlight">181</span></td>
</tr>
</tbody>
</table>
<h3></h3>
<span class="internal-link"> </span>
<ol>
<li style="text-align: justify;">These are the public votes displayed on the contestant’s page through the thumbs up icon</li>
<li style="text-align: justify;">These are http requests to the voting link against each video when the user clicked on the thumbs up icon.</li>
<li style="text-align: justify;">These are http requests which are collectively related to the video page (page view). A normal human user would browse through a page first, which downloads some other urls, such as the HTML for the page, JavaScript, images, and so on. A normal vote request would be included collectively. A direct http request to the voting link on the other hand does not do this, and only makes a specific request to vote without downloading the other parts that make up the page.</li>
<li style="text-align: justify;">A normal human vote count should be the same or less than the number of page views. Only three videos highlighted show abnormal behaviour and it is recommended these be adjusted to the page view counts.</li></ol>
<h3>Are you saying contestants cheated?</h3>
<p style="text-align: justify;">While the use of programming scripts to accrue votes is no new tactic and we should, in fact, have a more robust mechanism to monitor such activity during a contest, we cannot prove the culpability of the human agents. The contestants might be innocent actors with overzealous friends or colleagues who ran the voting scripts. As of now, since there is no way to ascertain their part in this irregularity, it’s best we give them the benefit of the doubt. What comes through loud and clear is that once you do away with the scripted votes, four contestants still manage to have enough votes to maintain their positions in the final five. In the fifth position, we now have a contestant from the top ten finalists, who has secured the requisite votes (after vote adjustment) to propel him into the final five.</p>
<h3>Recommendation</h3>
<p style="text-align: justify;">‘Digital Dance’ (Cijo Abraham), ‘From the Wild into the Digital World’ (John Musila) and ‘Digital Coverage in a Digital World’ (T.J. Burks) had additional vote url counts than page views. It is recommended that the total votes for these videos be adjusted to the page view counts, and not the actual vote counts as displayed on their individual web pages (thumbs up icon) during the voting period.</p>
<p>The rankings of the adjusted voting would now read as:</p>
<ol>
<li>Connecting Souls, Bridging Dreams – Marie Jude Bendiola (1113)</li>
<li>From The Wild Into The Digital World - John Musila (810)</li>
<li>With No Distinction - T.J. K. M. (369)</li>
<li>I Am A Ghetto Digital Native – MJ (321)</li>
<li>Digital Dance – Cijo Abraham (198)</li></ol>
<h3>Transparency at CIS</h3>
<p style="text-align: justify;">‘The Digital Natives with a Cause?’ research inquiry is shaped around concerns of transparency, equity and community accountability. In our research methods as well as in outputs of the different activities, we have always maintained a complete transparency of decision making processes as well as in depending upon the incredible people we work with to help us learn, grow and reflect openly on the concerns that we have been engaged with. We strive to follow this method and in publishing these statistics, we want to ensure that there is complete transparency about the votes that were accrued and how the final winners were selected. We also take this opportunity as a learning experience to re-think the question of the non-human actors in our networks and further about the nature of participation and reputation online. We hope that the publishing of these results will help answer any inquiries on how the process unfolded.</p>
<h3>View Logs and Source Code</h3>
<ul>
<li><a href="http://editors.cis-india.org/digital-natives/video-contest/scripted-voting-report/logs-during-voting-period" class="external-link">All logs from the web server for this period</a> (24.7MB) Identical IPs are from caching server.</li>
<li><a class="external-link" href="http://www.cis-india.org/digital-natives/video-contest/scripted-voting-report/main.R">R script to evaluate data for table</a></li></ul>
<h3>What next?</h3>
<p style="text-align: justify;">Since we spotted the error in time, we haven’t disbursed the prize money of EUR 500 to each of the Top 5 contestants. They will now receive the prize along with a chance to participate in the Digital Native workshop-cum-Webinar, slated to be held in July 2012. The top 10 videos will be showcased in this event.</p>
</div>
<p>
For more details visit <a href='http://editors.cis-india.org/digital-natives/bots-got-some-votes-home'>http://editors.cis-india.org/digital-natives/bots-got-some-votes-home</a>
</p>
No publisherNilofar AnsherFeaturedResearchers at WorkDigital Natives2015-04-24T11:56:10ZBlog EntryThe All India Privacy Symposium: Conference Report
http://editors.cis-india.org/internet-governance/all-india-privacy-delhi-report
<b>Privacy India, the Centre for Internet and Society and Society in Action Group, with support from the International Development Research Centre, Privacy International and Commonwealth Human Rights Initiative had organised the All India Privacy Symposium at the India International Centre in New Delhi, on February 4, 2012. Natasha Vaz reports about the event.</b>
<p>The symposium was organized around five thematic panel discussions:<br />
Panel 1: Privacy and Transparency<br />
Panel 2: Privacy and E-Governance Initiatives<br />
Panel 3: Privacy and National Security<br />
Panel 4: Privacy and Banking<br />
Panel 5: Privacy and Health</p>
<h2>Introduction</h2>
<p>Elonnai Hickok (Policy Advocate, Privacy India) introduced the
objectives of Privacy India. The primary objectives were to raise
national awareness about privacy, do an in-depth study of privacy in
India and provide feedback on the proposed ‘Right to Privacy’ Bill.
Privacy India has reviewed case laws, legislations, including the
upcoming policy and conducted state-level privacy workshops and
consultations across India in Kolkata, Bangalore, Ahmedabad, Guwahati,
Chennai, and Mumbai. India like the rest of the world is answering some
fundamental questions about the powers of the government and citizen’s
rights and complications that arise from emerging technologies. Through
our research we have come to understand that privacy varies across
cultures and contexts, and there is no one concept of privacy but
instead several distinct core notions that serve as complex duties,
claims and obligations. </p>
<h2>Privacy and Transparency</h2>
<p>Panelists: Ponnurangam K, (Assistant Professor, IIIT New Delhi), ),
Chitra Ahanthem (Journalist, Imphal), Nikhil Dey (Social & Political
Activist), Deepak Maheshwari (Director, Corporate Affairs, Microsoft),
Gus Hosein (Executive Director, Privacy International, UK), and Prashant
Bhushan, (Senior Advocate, Supreme Court of India).<br />
Moderator: Sunil Abraham (Executive Director, Centre for Internet and Society, Bangalore) <br />
Poster: Srishti Goyal (Law Student, NUJS)</p>
<p>Srishti Goyal provided the general contours, privacy protections,
limits to privacy and loopholes of policy relating to transparency and
privacy, specifically analyzing the Right to Information Act, Public
Interest Disclosures Act, and the Official Secrets Act.</p>
<p>Nikhil Dey commented on the interaction between the right to privacy
and the right to information (RTI). He referred to Gopal Gandhi, the
former Governor of West Bengal, “we must ensure that tools like the UID
must help the citizen watch every move of government; not allow the
government watch every move of the citizen.” Currently, the RTI and the
UID stand on contrary sides of the information debate. A privacy law
could allow for a backdoor to curb RTI. So, utmost care has to be taken
while drafting legislation with respect to right to privacy.</p>
<table class="plain">
<tbody>
<tr>
<td align="center"><img src="http://editors.cis-india.org/home-images/1.JPG/image_preview" alt="p1" class="image-inline image-inline" title="p1" /></td>
<td>Data and information has leaked furiously in India and it has leaked
to the powerful. A person who is in a position of power can access
private information irrespective of any laws in place to safeguard
privacy. It is necessary to look at the power dynamics, which exists in
the society before formulating legislation on right to privacy.
According to Nikhil Dey, there should be different standards of privacy
with respect to public servants. A citizen should be entitled to
information related to funds, functions and functionaries. The main
problem arises while defining the private space of a public servant or
functionaries.<br /><br />The RTI Act has failed to address the legal protection for the right
to privacy. Perhaps, rules regarding privacy can be added to the Act. It
can be defined by answering the questions: (i) what is ‘personal
information’? (ii) what is it’s relation to public activity or public
interest? (iii) what is the unwarranted invasion of the privacy of an
individual? and (iv) what is the larger public good? Expanding on these
four points can provide greater legal protection for the right to
privacy. <br /></td>
</tr>
</tbody>
</table>
<p>Gus Hosein described the intersection and interaction of the right to
information and the right to privacy. He referred to a petition filed by
Privacy International requesting information on the expenses of members
of parliament. Privacy and transparency of the government are
compatible in the public interest. Gross abuse of the public funds by
MPs was revealed by this particular petition such as pornography or
cleaning of moats of MPs homes. Privacy advocates are supporters of RTI,
however, it cannot be denied that there is no tension between
transparency and privacy. In order chalk out the differences, there is a
need of a legal framework. According to Gus Hosein, in many countries
the government office that deals with right to information also deals
with cases related to right to privacy.</p>
<p>Mumbai and New Delhi police have started using social media very
aggressively, encouraging citizens to take photographs of traffic
violations and upload them to Facebook or Twitter. In reference to this,
Ponnurangam described the perceptions of privacy and if it agreed or
conflicted with his research findings. Ponnurangam has empirically
explored the awareness and perspective of privacy in India with respect
to other countries. He conducted a privacy survey in Hyderabad, Chennai
and Mumbai. People are very comfortable in posting pictures of others
committing a traffic violation or running a red light. Ironically, many
people have posted pictures of police officers committing a traffic
violation such as not wearing a helmet or running a red light.<br />
<br />
Chitra Ahanthem described the barriers and challenges of using RTI in
Manipur. There are more than 40 armed militia groups, which are banned
by the central and state government. The central government provides
economic packages for the development of the north-east region. However,
the state government officials and armed groups pocket the economic
packages. These armed groups have imposed a ban on RTI. Furthermore,
Manipur is a very small community. If people try and access information
through RTI they risk getting threatened by the Panchayat members and
being ostracized from the community or their clan. <br />
<br />
People are apprehensive about filing RTI because they believe that these
procedures are costly and the police and government may also get
involved. Officials use the privacy plea to avoid giving out
information. Since certain information are private and not in the public
domain, government officials, use the defense of privacy to hide
information. In addition, the police brutality prevalent in the area
deters people to even have interactions with government officials. <br />
<br />
According to Deepak Maheshwari, the open data initiative is a subset
within the larger context of open information. There is an onus on the
government to publish information, which is in the public domain. As a
result, one does not necessarily have to go through the entire process
of filing an RTI to get information, which is already there in the
public domain. Moreover, if it is freely available in public domain,
then one can anonymously access such information; this further
strengthens the privacy aspects of requesting information and
facilitating anonymity with respect to access to such information in the
public domain. It has also to be noted that it is not sufficient to put
data out in the public domain but it should also disclose the basis of
the data for example, if there is representation of a data on a pie
chart, the data which was used to arrive at the pie chart should also be
available in the public domain. The main intention of releasing data to
the public domain or having open data standards should not only be to
provide access to such data but also should be in such a fashion so as
to enable people to use the data for multiple purposes.</p>
<p>Prashant Bhushan noted that one of the grounds for withholding
information in the RTI Act is privacy. An RTI officer can disclose
personal information if he feels that larger public interest warrants
the disclosure, even if it is personal information, which has no
relationship to public activity or interest. This raises the important
question, “what constitutes personal information?” He referred to the
Radia Tapes controversy. Ratan Tata has filed a petition in the Supreme
Court on the grounds that the Nira Radia tapes contained personal
information and that the release of these tapes into the public domain
violated his privacy. The Centre for Public Interest Litigation has
filed a counter petition on the grounds that the nature of the
conversations was not personal but in relation to public activity. They
were between a lobbyist and bureaucrats, journalists and ministers.
Prashant Bhushan stressed the importance of releasing these tapes into
the public domain to show glimpses of all kinds of fixing, deal-making
and show how the whole ruling establishment functions. It is absurd for
Ratan Tata to claim that this is an invasion of privacy. Lastly, he felt
when drafting a privacy law, clearly defining and distinguishing
personal information and public is extremely important.</p>
<p>One of the interesting comments made during the panel was on the
assumption that data is transparent. Transparency can be staged;
questions have to be asked around whether the word is itself
transparent.</p>
<h2>Privacy and E-Governance Initiatives</h2>
<p>Panelists: Anant Maringanti, (Independent Social Researcher), Usha
Ramanathan, (Advocate & Social Activist), Gus Hosein, (Executive
Director, Privacy International, UK), Apar Gupta, (Advocate, Supreme
Court of India), and Elida Kristine Undrum Jacobsen (Doctoral
Researcher, The Peace Research Institute Oslo).<br />
Moderator: Sudhir Krishnaswamy (Centre for Law and Policy Research)<br />
Poster: Adrija Das (Law Student, NUJS)</p>
<p>Adrija Das discussed the legal provision relating to identity
projects and e-governance initiatives in India. The objective of any
e-governance project is to increase efficiency and accessibility of
public services. However, a major problem that arises is the linkage of
the data results in the creation of a central database, accessible by
every department of the government. Furthermore, implementing data
protection and security standards are very expensive.</p>
<p>Sudhir Krishnaswamy highlighted the default assumptions surrounding
e-governance initiatives: e-governance initiatives solve governance
problems, increase efficiency, increase transparency and increase
accountability. It is important to analyze the problems that arise from
e-governance initiatives, such as privacy. </p>
<table class="plain">
<tbody>
<tr>
<td>Usha Ramanathan described the increased number and vastness of
e-governance initiatives such as UID, NPR, IT Rules and NATGRID. There
are also many burdens on privacy that emanate from the introduction and
existence of electronic data management systems. Electronic data
management systems have allowed state to collect, store and use personal
information of individual. Currently, the DNA Profiling Bill is pending
before the Parliament. It is important to question the purpose and need
for the government to collect such personal information. It is also to
be noted that, there are certain laws such as Collection of Statistics
Act, 2008 that penalize individuals if they do not comply with the
information requests of the government.</td>
<td><img src="http://editors.cis-india.org/home-images/Usha.JPG/image_preview" title="Usha" height="124" width="148" alt="Usha" class="image-inline image-inline" /></td>
</tr>
</tbody>
</table>
<p>Anant Maringanti discussed the limitations of data sharing that once
existed. Currently, data can move across space in a very short time. He
analyzed the state and market rationalities involved in e-governance
initiatives, which raise the question “who can access data and at what
price?”. Data may seem to be innocent or neutral, but data in the hands
of wrong people becomes very crucial due to abuse and misuse. For
example, Andhra Pradesh was praised as the model state for UID
implementation. However, during the process of collecting data for UID a
company bought personal information and sold the data to third parties.<br />
<br />
Apar Gupta discussed the dilemmas of e-governance. Generally information
in the form of an electronic record is presumed to be authentic. The
data which government collects is most often inaccurate and wrong. So
the digital identity of a person can be totally different from the real
identity of that particular person. The process for correcting such
information is also very inconvenient and sometimes impossible. <br />
Under the evidence law any electronic evidence is presumed to be
authentic and admissible as evidence. The Bombay High Court decided a
case involving the authenticity of a telephone bill generated by a
machine. The judgment said that since it is being generated by a
machine, through and automated process, there is no need to challenge
the authenticity of the document, it is presumed to true and authentic.
The main danger in such case is that one does away with the process of
law and attaches certain sanctity to the electronic record and evidence.
<br />
<br />
It should be also observed that how government maintains secrecy as to
the ways in which it collects data. For example, the Election Commission
has refused to disclose the functioning and design of electronic voting
machines. The reason given for such secrecy is that if such information
is put in the public domain then the electronic voting machines will be
vulnerable and can be tampered with. But we, who use the voting
machines, will never find out its vulnerabilities.</p>
<table class="plain">
<tbody>
<tr>
<td>According to Gus Hosein, politicians generally have this wrong notion
that technology can solve complex administrative problems. Furthermore,
the industry is complicit; they indulge in anti-competitive market
practice to sell these technologies as a solution to problems. However,
such technology does not solve any problems rather it gives rise to
problems.<br /><br />Huge amount of government funds is associated with collection of
personal data but such data is rendered useless or rather misused,
because the government does not have clue as to how to use the data for
development and security purposes. The UK National Health Records
project estimated to cost around twelve to twenty billion pounds.
However, a survey carried out by a professor in University College
London showed that the hospital and other health institutions do not use
the information collected by the National Health Records. Similarly,
the UK Identity Card scheme was estimated to cost 1.3 billion pounds and
finally it was estimated to cost five billion pounds. The identity
cards are rendered obsolete, the sole department interested in the
identity card was the Home Office Department, no other department
intended on using it.<br /></td>
<td><img src="http://editors.cis-india.org/home-images/Gus.JPG/image_preview" alt="Gus " class="image-inline image-inline" title="Gus " /></td>
</tr>
</tbody>
</table>
<p>Technology should be built in such a manner that it empowers the
individual. Technology should allow the individual to control his
identity and as well as access all kinds of information available to the
government and private bodies on that individual. <br />
<br />
According to Elida Kristine Undrum Jacobsen, technology is regarded in
this linear manner. It is increasingly being naturalized and as an
all-encompassing solution. The use of biometric systems in the UID
raises three areas of concern: power, value and social relationships. </p>
<table class="plain">
<tbody>
<tr>
<td><img src="http://editors.cis-india.org/home-images/Elida.JPG/image_preview" alt="Elida" class="image-inline image-inline" title="Elida" /></td>
<td>With regards to power, there is a difference between providing
documentation and information for identification. However, problems
arise when the mode of identification becomes one’s body. It also leads
to absolute reliance on technology, if the machine says that this is an
individual’s identity then it is considered to be the absolute truth and
it does not matter even if the individual is someone else. It becomes
furthermore problematic with biometric system because it is generally
used for forensic purposes. <br /><br />The other component of UID or any national identification scheme is
the question of consent and its relationship to privacy. In the case of
UID project, people are totally unaware about how their information will
be used and what purposes can it be used or misused for. Therefore,
there is no informed consent when it comes to collection of biometric
data under the UID project. <br />
<br /></td>
</tr>
</tbody>
</table>
<p>On the issue of social value it is to be noted that the value of
efficiency becomes the most important value, which is valued. Many of
the UIDAI documents state that the UID will provide a transactional
identity. However, at the same time it takes away societal layers, which
is inherently part of one’s identity. In addition, it makes it possible
for the identity of a person to become a commodity to be sold. This
also means that the personal information has economic value and players
in the market such as insurance companies, banks can buy and sell the
information.<br />
<br />
When there is identification projects using biometrics it gives the
State a lot of power; the power to determine and dictate one’s identity
irrespective of the difference in real identity. Moreover, when such
identifications projects are carried out at a national level it also
gives rise to problem related to exclusion and inclusion of people or
various purposes. The classification of the society based on various
factors becomes easy and there is a huge risk involved with such
classification. </p>
<p>The issues, which came out from the Q&A session, were:</p>
<ul><li>The interplay between fairness and lawfulness in the context of
privacy and data collection. There has to be a question asked as to why
certain information is required by the State and how is it lawful. </li><li>In the neo-liberal era corporations are generally considered to be
private. This has to be questioned and furthermore the difference
between what is private and what is public. There are also concerns
about corporations increasingly collaborating with the State. Can it be
still considered as private?</li></ul>
<h2>Privacy and National Security</h2>
<p>Panelists: PK Hormis Tharakan (Former Chief of Research and Analysis
Wing, Government of India), Saikat Datta (Journalist), Menaka Guruswamy,
(Advocate, Supreme Court, New Delhi), Prasanth Sugathan, (Legal
Counsel, Software Freedom Law Center), and Oxblood Ruffin, (Cult of the
Dead Cow Security and Publishing Collective).<br />
Moderator: Danish Sheikh (Alternative Law Forum)<br />
Poster: Suchitra Menon (Law Student, NUJS) </p>
<p>Suchitra Menon discussed the legal provisions for national security
in relation to privacy. Specifically, she described the guidelines and
procedural safeguards with respect to phone tapping and interception of
communication decisional jurisprudence.</p>
<p>In the year 2000, the Information Technology Act (IT Act), 2000 was
enacted, this Act had under section 69 allowed the State to monitor and
intercept information through intermediaries. Prasanth Sugathan
described how the government has been trying to bypass the procedural
safeguard laid down by the Supreme Court in the PUCL case by using
Section 28 of the IT Act, 2000. The provision deals with certifying
authority for digital signatures. The certifying authority under the Act
also has the authority to investigate offences under the Act. The
provision mainly deals with digital signature but it is used by the
government to intercept communication without implementing the
procedural safeguards laid down for such interception. Furthermore, the
IT Rules which was notified by the government in April, 2007 allows the
government to intercept any communication with the help of the
intermediaries. The 2008 amendment to the IT Act was an after effect of
the 26/11 attacks in Mumbai. The legislation has become draconian since
then and privacy has been sacrificed to meet the ends of national
security.</p>
<p>Oxblood Ruffin read out his speech and the same is reproduced below.</p>
<p>“The online citizenry of any country is part of its national security
infrastructure. And the extent to which individual privacy rights are
protected will determine whether democracy continues to succeed, or
inches towards tyranny. The challenge then is to balance the legitimate
needs of the state to secure its sovereignty with protecting its most
valuable asset: The citizen.<br />
<br />
It has become trite to say that 9/11 changed everything. Yet it is as
true for the West as it is for the global South. 9/11 kick started the
downward spiral of individual privacy rights across the entire internet.
It also ushered in a false dichotomy of choice, that in choosing
between security and privacy, it was privacy that had adapted to the new
realities, or so we’ve been told.<br />
<br />
Let’s examine some of the fallacies of this argument.<br />
<br />
The false equation which many argue is that we must give up privacy to
ensure security. But no one argues the opposite. We needn’t balance the
costs of surveillance over privacy, because rarely banning a security
measure protects privacy. Rather, protecting privacy typically means
that government surveillance must be subjected to judicial oversight and
justification of the need to surveillance. In most cases privacy
protection will not diminish the state’s effectiveness to secure itself.<br />
<br />
The deference argument is that security advocates insist that the courts
should defer to elected officials when evaluating security measures.
But when the judiciary weighs privacy against surveillance, privacy
almost always loses. Unless the security measures are explored for
efficacy they will win every time, especially when the word terrorism is
invoked. The courts must take on a more active role to balance the
interests of the state and its citizens.<br />
<br />
For the war time argument security proponents argue that the war on
terror requires greater security and less privacy. But this argument is
backwards. During times of crisis the temptation is to make unnecessary
sacrifices in the name of security. In the United States, for example,
we saw that Japanese-American internment and the McCarthy-era witch-hunt
for communists was in vain. The greatest challenge for safeguarding
privacy comes during times when we are least inclined to protect it. We
must be willing to be coldly rational and not emotional during such
times.<br />
<br />
We are often told that if you have nothing to hide, you have nothing to
fear. This is the most pervasive argument the average person hears. But
isn’t privacy a little like being naked? We might not be ashamed of our
bodies but we don’t walk around naked. Being online isn’t so different.
Our virtual selves should be as covered as our real selves. It’s a form
of personal sovereignty. Being seen should require our consent, just as
in the real world. The state has no business taking up the role of
Peeping Tom.<br />
<br />
I firmly believe that the state has a right and a duty to secure itself.
And I equally believe that its citizens are entitled to those same
rights. Citizens are part of the national security infrastructure. They
conduct business; they share information; they are the benefactors of
democratic values. Privacy rights are what, amongst others, separate us
from the rule of tyrants. To protect them is to protect and preserve
democracy. It is a fight worth dying for, as so many have done before
us.</p>
<p>PK Hormis Tharakan discussed the importance of interception
communication in intelligence gathering. In the western liberal
democracies, restrictions of privacy were introduced for the
anti-terrorism campaigns and these measures are far restrictive than
what the Indian legislations contemplate. Preventive intelligence is a
major component in maintenance of national security and this
intelligence is generated and can be procured through interception. <br />
<br />
We do need laws to make sure that the power of interception is not
excessive or out of proportion. But the graver issue is that the
equipment used for interception of communication is freely available in
the market at a cheap price. This allows private citizens also to snoop
into others conversation. So, interception by civilians should be the
main concern.<br />
<br />
Menaka Guruswamy discussed the lack of regulation of Indian intelligence
agencies that creates burdens on privacy. When there is a conflict
between individual privacy and national security, the court will always
rule in favour of the national security. Public interest always takes
precedence over individual interest. <br />
<br />
When there is a claim right to privacy vis-à-vis national security,
generally these claims are characterized by dissent, chilling effects on
freedom of expression and government accountability. In India, privacy
is fragile and relatively a less justifiable right. Another challenge to
privacy is that, when communication is intercepted, which part of the
conversation can be considered to be private and which part cannot be
considered so.<br />
<br />
Saikat Datta described his experience of being under illegal
surveillance by an unauthorized intelligence agency. When a person is
under surveillance, he or she is already considered to be suspect. If
the State commits any mistake as to surveillance, carrying surveillance,
who is not at all a person of interest in such case upon discovery,
there is no penalty for such discrepancy.<br />
He warned of the dangers of excessive wiretapping, a practice that
currently generates such a “mountain” of information that anything with
real intelligence value tends to be ignored until it is too late, as
happened with the Mumbai bombings in 2008. It is clear that the Indian
government’s surveillance and interception programmes far exceed what is
necessary for legitimate law enforcement.<br />
<br />
The issues, which came during the Q&A session was:</p>
<ul><li>In case of national security vis-à-vis privacy in heavily
militarized zone, legislations such as Armed Forces Special Powers Act
actually give authority to the army to search and seizure on mere
suspicion? This amounts gross violation of privacy.</li></ul>
<h2>Privacy and Banking</h2>
<p>Panelists: M R Umarji, (Chief Legal Advisor, Indian Banks Associations), N A Vijayashankar, (Cyber Law Expert), Malavika Jayaram, (Advocate, Bangalore)<br />Moderator: Prashant Iyengar (Associate Professor, Jindal Law University)<br />Poster: Malavika Chandu (Law Student, NUJS)</p>
<p>Prashant Iyengar highlighted how privacy has been a central feature in banking and finance. Even before the notion of privacy came into existence, banks had developed an evolved notion of secrecy and confidentiality, which was fairly robust. Every legislation dealing with banking and finance generally have a clause related to privacy and confidentiality. It might seem that it would be easy to implement privacy in banking and finance given the long relationship between banking and secrecy and confidentiality. However, this is not the case in the contemporary times. Specifically, with the growth in issues related to national security, transparency and technology, the highly regarded notion of privacy seems to be slowly depleting.</p>
<p>Malavika Chandu described the data protection standards that govern the banking industry. As part of the know-you-customer guidelines, banks are required to provide the Reserve Bank with customer profiles and other identification information. Lastly, she described case laws in relation to privacy with respect to financial records.</p>
<table class="plain">
<tbody>
<tr>
<td>N A Vijayashankar noted that the confidentiality and secrecy practices
in the banking sector emanate from the banker-customer relationship. In
the present context, secrecy and privacy maintained by the banks should
be analyzed from the perspective of the right of the customer to
safeguard his or her information from any third party. Generally, banks
and other financial institutions protect personal information as a fraud
control measure and not as duty to protect the privacy of a customer.<br /><br />There has been a paradigm shift in banking practices from traditional
banking practices to more efficient but less secure banking practice.
Some of the terms and conditions of internet banking are illegal and do
not stand the test of law. In contemporary times, banking institutions
use confidentiality to cover up problems and data breach rather than
protecting the customer. But the banks are not ready to disclose data
breach as it apprehends that it will result in public losing faith in
the system. The Reserve Bank of India, has recently notified that
protection which is provided to the customers in banking services should
also be extended to e-banking services. However, the banks have not
properly implemented this. <br /></td>
<td><img src="http://editors.cis-india.org/home-images/Naavi.JPG/image_preview" alt="NA Vijayashankar" class="image-inline image-inline" title="NA Vijayashankar" /></td>
</tr>
</tbody>
</table>
<p>M R Umarji highlighted fourteen laws related to banking which carries confidentiality clauses. In India, public sector banks dominate the market. These banks are created under a statute and such statute governs them. Therefore, they are duty bound to maintain secrecy and confidentiality. Private banks and cooperative banks are not bound by any statute. They do not have any obligations to maintain secrecy, but they do strictly observe confidentiality as a form of banking practice. <br /><br />Banks are not allowed to reveal any personal information of an individual unless it is sought by some authority that has a legitimate right to claim such information. There has been a constant erosion of confidentiality due to various laws which empowers authorities to seek confidential information from the banks. Recently, in the light of the growing national security concerns, banks also have an obligation to report suspicious transactions. These have caused heavy burdens on right to privacy of an individual.<br /><br />Under the Right to Information Act, 2005 public sector banks are considered to be public authorities. By the virtue of the Statute, any person can access information from banks. For example, in a recent case an information officer directed Reserve Bank of India, to disclose Inspection Reports. These reports generally contain information regarding doubtful accounts, non-performing account, etc. There is a need that banks should be exempted from the Right to Information Act, 2005. Since they are not dealing with public funds there is no need to apply transparency law to the banks. <br /><br />Malavika Jayaram described the major conflicts and tensions with respect to privacy vis-à-vis banking and financial systems and financial data. Other privacy and transparency issues include: the publication of online tax information and income data. <br /><br />Surveillance is built in the design of banking system, so it is capable of tracking personal information and activity. There is a need to implement more privacy friendly and privacy by design systems in the banking sector. Customers are generally ignorant about privacy policies and this influences informed consent and furthermore marketing institution may influence customers to behave in a particular manner. In this context privacy by design becomes very important.<br /><br />Data minimization principles should be applied; since the more data collected the more there is a risk of data breach and misuse. In case of data retention it is necessary that person giving such data should know how much proportion of the data is being retained and for how long it is stored and also what is the scope of the data and for what purpose will it be used. <br /><br />Personal information and data, which was previously collected by the government, are gradually being outsourced to private bodies. On one hand it is a good thing that private sector get their technology and security measures right as compared to the government agencies but it comes with the risk that it can be sold out by private bodies as commodities in the market. Private bodies that are harvesting the data can also be forced by the government to disclose it under a particular law or statute without taking into consideration the consent of the individual whose personal information is sought for. <br /><br />There is multiplicity of documentation for identification, which makes transactions less efficient. This has attracted customers to more convenient systems such as one-access point systems, but people tend to forget the issues related to privacy, in using such a system. What is portrayed as efficient for the consumer is a tool for social control and who has access and authority to use such information. <br /><br />Often the reason given for collecting information is that it will help the service provider to combat fraud. However, studies have shown people more often fake situation rather than identity. The other concerns are that of sharing of information and lack of choice with respect to such sharing. There should be check as to sharing of personal information as the data belongs to the individual and not the bank or any other institution which requires furnishing personal information in lieu of services. This gives rise to a binary choice to the user; either the individual has to provide information to avail the service or else one cannot avail the services.</p>
<p>There is supposed to be market for privacy. The notion of personal information is subjective and varies from person to person. For example, one might be comfortable to share certain information. However, others might not be.<br /><br />The issues that came out of the Q&A sessions are:</p>
<ul><li>The default settings are generally put at the low protection settings. Unless the user is aware of the privacy protection setting, he or she is prone to breach of privacy. Should the default privacy setting be set to maximum security and option can be given to the user to change it according to his or her preference?</li><li>Is there any system in the banks, which allows the customers of bank to know about which all third parties the bank has shared his or her personal information with?</li></ul>
<h2>Health Privacy</h2>
<p>Panelists: K. K. Abraham, (President, Indian Network for People with HIV), Dr. B. S. Bedi, (Advisor, CDAC & Media Lab Asia), and Raman Chawla, (Senior Advocacy Officer, Lawyers Collective).<br />Moderator: Ashok Row Kavi (Journalist and LGBT Activist) <br />Poster: Danish Sheikh (Researcher, Alternative Law Forum)</p>
<p>Danish Sheikh outlined the possible health privacy violations. These included the disclosure of personal health information to third parties without consent, inadequate notification to a patient of a data breach, the purpose of collecting data is not specified and improper security standards, storage and disposal. The disclosure of personal health information has the potential to be embarrassing, stigmatizing or discriminatory. <br /><br />Subsequently, Danish Sheikh examined the status of sexual minorities’ vis-à-vis the privacy framework. Culling out some real life examples based on various studies, media reports and judgments from the Supreme Court and the High Courts of Delhi and Allahabad, he also described privacy violations committed by both individuals as well as state authorities. <br /><br />Ashok Row Kavi recounted how privacy was very contextual when debating section 377 in the LGBT community. The paradigm upon which they were going to fight the anti-sodomy law was that it was consenting sex between two adults in private space. However, this paradigm was not well received by women, as women did not see private space as safe space, due to domestic violence. Perceptions of privacy are very subjective and it differs from person to person.<br /><br />Raman Chawla recounted the history of the Draft HIV/AIDS Bill. In 2002, the need for law related to HIV/AIDS was realized in order to protect right to consent, right against discrimination and right to confidentiality of HIV patients. The bill was finalized in the year 2006. Alarmingly, it is yet to be tabled before the Parliament. <br /><br />The privacy provisions in the HIV bill clearly state that no person can be tested, treated or researched for HIV without the consent of the patient. It also casts that in a fiduciary relationship the health care provider must maintain confidentiality, however if the patient provides written consent then their status may be disclosed. The HIV condition of the patient can also revealed by the doctor if there is a court order demanding such disclosure. The doctor may disclose the status of the patient to his or her partner but he has to follow a particular protocol. The doctor should have sufficient belief that his or her partner is at risk of contracting HIV. The person who is infected will be asked for his/her views and counseled before his/her partner is informed. However, there are doubts as to the implementation and enforcement of this protocol.</p>
<p>Danish Sheikh outlined the possible health privacy violations. These included the disclosure of personal health information to third parties without consent, inadequate notification to a patient of a data breach, the purpose of collecting data is not specified and improper security standards, storage and disposal. The disclosure of personal health information has the potential to be embarrassing, stigmatizing or discriminatory. <br /><br />Subsequently, Danish Sheikh examined the status of sexual minorities’ vis-à-vis the privacy framework. Culling out some real life examples based on various studies, media reports and judgments from the Supreme Court and the High Courts of Delhi and Allahabad, he also described privacy violations committed by both individuals as well as state authorities. <br /><br />Ashok Row Kavi recounted how privacy was very contextual when debating section 377 in the LGBT community. The paradigm upon which they were going to fight the anti-sodomy law was that it was consenting sex between two adults in private space. However, this paradigm was not well received by women, as women did not see private space as safe space, due to domestic violence. Perceptions of privacy are very subjective and it differs from person to person.<br /><br />Raman Chawla recounted the history of the Draft HIV/AIDS Bill. In 2002, the need for law related to HIV/AIDS was realized in order to protect right to consent, right against discrimination and right to confidentiality of HIV patients. The bill was finalized in the year 2006. Alarmingly, it is yet to be tabled before the Parliament. <br /><br />The privacy provisions in the HIV bill clearly state that no person can be tested, treated or researched for HIV without the consent of the patient. It also casts that in a fiduciary relationship the health care provider must maintain confidentiality, however if the patient provides written consent then their status may be disclosed. The HIV condition of the patient can also revealed by the doctor if there is a court order demanding such disclosure. The doctor may disclose the status of the patient to his or her partner but he has to follow a particular protocol. The doctor should have sufficient belief that his or her partner is at risk of contracting HIV. The person who is infected will be asked for his/her views and counseled before his/her partner is informed. However, there are doubts as to the implementation and enforcement of this protocol.</p>
<p align="center"><img src="http://editors.cis-india.org/home-images/AP.JPG/image_preview" alt="AI" class="image-inline image-inline" title="AI" /></p>
<h2>Conclusion</h2>
<p>Natasha Vaz (Policy Advocate, Privacy India) brought the symposium to a close by thanking the partners, the panelists, the moderators and the participants for their sincere efforts in making the All India Privacy Symposium a grand success. In India, a public discussion regarding privacy has been long over due. The symposium provided a platform for dialogue and building greater awareness around privacy issues in health, banking, national security, transparency and e-governance. Using our research, expert opinions, personal experiences, questions and comments various facets of privacy were explored.</p>
<hr />
<h2>Press Coverage</h2>
<p>The event was featured in the media as well:</p>
<ol><li><a class="external-link" href="http://articles.economictimes.indiatimes.com/2012-02-02/news/31017368_1_privacy-law-privacy-international-cis">India needs an independent privacy law, says NGO Privacy India</a>, Economic Times, February 2, 2012</li><li><a class="external-link" href="http://www.tehelka.com/story_main51.asp?filename=Ws060212Privacy.asp">New Bill to decide on individual’s right to privacy</a>, Tehelka, February 6, 2012 </li><li><a class="external-link" href="http://www.dnaindia.com/analysis/column_lack-of-strong-privacy-law-in-healthcare-a-big-worry_1649366">Lack of strong privacy law in healthcare a big worry</a>, Daily News & Analysis, February 13, 2012</li><li><a class="external-link" href="http://www.washingtonpost.com/world/asia_pacific/privacy-concerns-grow-in-india/2012/01/26/gIQAyM0UmQ_story.html">Privacy concerns grow in India</a>, Washington Post, February 3, 2012</li></ol>
<hr />
<ul><li><a href="http://editors.cis-india.org/internet-governance/privacy-symposium-agenda.pdf" class="internal-link" title="All India Privacy Symposium - Profiles & Speakers">Click </a>to download the Agenda and Profile of Speakers (PDF, 1642 Kb)</li></ul>
<ul><li><a href="http://editors.cis-india.org/internet-governance/all-privacy-symposium.pdf" class="internal-link" title="All India Privacy Symposium (File)">Download the PDF</a> (555 Kb)</li><li><a href="http://editors.cis-india.org/all-india-privacy-symposium-webcast" class="external-link">Follow the webcast of the event</a><br /></li></ul>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/all-india-privacy-delhi-report'>http://editors.cis-india.org/internet-governance/all-india-privacy-delhi-report</a>
</p>
No publishernatashaFeaturedInternet GovernancePrivacy2012-04-30T05:16:41ZBlog EntryTechnology, Social Justice and Higher Education
http://editors.cis-india.org/digital-natives/pathways/blog/higher-education
<b>Since the last two years, we at the Centre for Internet and Society, have been working with the Higher Education Innovation and Research Applications at the Centre for the Study of Culture and Society, on a project called Pathways to Higher Education, supported by the Ford Foundation. </b>
<p>The main aim of the project is to research the state of social diversity and justice in undergraduate colleges in India and encourage students to articulate the axes of discrimination and exclusion which might keep them from interacting and engaging with educational resources and systems in their college environments.</p>
<h3>Peer-to-Peer Technologies<br /></h3>
<p>The entry point into these debates was digital technologies, where
through an introduction to peer-to-peer technologies, digital story
telling through various web based platforms, and a collaborative thought
environment mediated by internet and digital technologies, we
facilitated the students to identify, articulate and address questions
of discrimination, change and the possibility of engaging with these
critically in order to build a better learning environment for
themselves (and their peers) in their own colleges.</p>
<table class="plain">
<tbody>
<tr class="even">
<td><img src="http://editors.cis-india.org/home-images/sies.jpg/image_preview" title="sies " height="266" width="400" alt="sies " class="image-inline image-inline" /></td>
<td>
<div align="left">Each workshop was designed not only to be sensitive to
the specificities of the locations of the colleges, but also to
accommodate for the needs, desires and aspirations of the students
involved. The participants looked at their own personal, family and
community histories, their everyday experiences, their affective modes
of aspiration and desire, and their own circumstances which often
circumscribe them, in order to come up with certain themes that they
thought were relevant and crucial in their own contexts.</div>
<br />
<div align="left"> </div>
</td>
</tr>
</tbody>
</table>
<p>As a follow-up on the workshops, the students developed specific
projects and activities that will help them strengthen their hypotheses
by looking beyond the personal and finding ways by which they can engage
with the larger communities, spreading awareness, building histories
and acquiring skills to successfully bolster their classroom interaction
and learning.</p>
<p><em>The following is a bird’s eye view of the key themes that have emerged in the workshops:</em></p>
<h3>The Costs of Belonging</h3>
<p>Almost unanimously, though articulating it in different ways, the
students looked at different costs of belonging to a space. Sometimes it
was the space of the web, sometimes of the larger educational
institution, sometimes to distinct language groups which do not treat
English as the lingua franca, and sometimes to communities and friend
circles within the college environment.</p>
<p> </p>
<p align="center"><img src="http://editors.cis-india.org/home-images/problem.jpg/image_preview" title="problems" height="365" width="548" alt="problems" class="image-inline image-inline" /></p>
<div align="left">It was particularly insightful for us to understand
that granting access, providing infrastructure or equipping
‘underprivileged’ students with skills is not enough. In fact, it became
apparent that there is a certain policy driven, post-Mandal affirmative
action that has already bridged the infrastructural and access gap in
the educational institutions. The easy availability of computers,
internet access, the ubiquitous cell phone, were all indicators that for
most of the students, it wasn’t a question of affording access. Even
when we were dealing with economically disadvantaged students, there
were a plethora of technology devices they had access to and familiarity
with. Shared resources, public access to digital technologies, and
institutional support towards promoting digital familiarity all played a
significant role in demystifying the digital for them. In many ways,
these students were digital natives if defined through access, because
they had Facebook accounts and browsed Google to find everything they
wanted. Their phone was an extension of their selves and they used it in
creative ways to communicate and connect with their peers.<br /><br />Based
on this, the students are now prepared to work on documenting,
exploring and raising awareness about these questions, to see what the
gating factors are that disallow people with access to still feel
excluded from the power of the digital.<br /><br /></div>
<h3>The Need for Diversity<br /></h3>
<div align="left"><br />
<table class="plain">
<tbody>
<tr>
<td><img src="http://editors.cis-india.org/home-images/others.jpg/image_preview" alt="others" class="image-inline image-inline" title="others" /></td>
<td>It is a telling sign about the state of the Internet in India that every
student presumed that the only way to be really fluent with the digital
web is to be fluent in English. The equation of English being
synonymous with being online was both fascinating and troubling to us.
Of course, a lot of it has to do with India’s own preoccupations, marked
by a postcolonial subjectivity, with English as the language of
modernity and privilege. But it also has to do with the fact that almost
all things digital in India, lack localisation. The digital
technologies and platforms remain almost exclusively in English,
fostered by the fact that input devices (keyboards, for example) and
display interfaces favour English as the language of computing.<br /><br /><br /></td>
</tr>
</tbody>
</table>
</div>
<p>Such an idea might also help in
reducing the distance between those who can fluently navigate the web
through its own language, and those who, through various reasons, find
themselves tentative and intimidated online.</p>
<p>The breakthrough that the
participants had, when they realised that they don’t have to be ‘proper
in English’ while being online – the ability to find local language
resources, fonts, translation machines, and the possibility of
transliterating their local language in the Roman script was a learning
lesson for us.</p>
<h3>Peer-to-Peer (P2P) Learning</h3>
<div align="left">As a part of their orientation to the world of the
digital, especially with the methodologies of the workshops, the
students literally had an overnight epiphany where they could see the
possibilities and potentials of P2P learning. The recognition that they
are not merely recipients of knowledge but also bearers of experience
and contexts which are rich and replete with knowledge, gave them new
insights on how to approach learning and education. Through digital
storytelling, the workshops demonstrated how, in our own stories and
accounts of life, there are many indicators and factors which can help
us engage with the realities of exclusion and injustice.<br /><br />Working
together in groups, not only to excavate knowledge from the outside, as
it were, but also to unearth the knowledge, experience, stories,
emotions that we all carry with ourselves and can serve as valuable
tools to bring to the classroom, is a lesson that all the groups
learned. The idea of a peer also led them to question the established
hierarchies within formal education. What was particularly interesting
was that they did not – as is often the case – translate P2P into DIY
education. They recognised that there are certain knowledge and skill
gaps that they would like experts to address and have incorporated
special trainings with different experts in areas of language,
communication, ethnography, interviews, film making, etc. However, the
methods for these trainings are going to emphasise a more P2P structure
that is different from the regular classroom learning.<br /><br />What would
happen if a teacher is looked at as a peer rather than a superior? How
would they navigate curricula if the scope of their learning was greater
than the curricula? How could they work together to learn from each
other, different ways of learning and understanding? These are some of
the questions that get reflected in their proposed campus activities,
where they are trying to now produce knowledge about their communities,
cities, families, groups and experiences, by conducting surveys,
ethnographies, historical archive work, etc. The digital helps them in
not only disseminating the information they are collecting but also in
re-establishing their relationship with learning and knowledge.<br /><br /><img src="http://editors.cis-india.org/home-images/workshop.jpg/image_preview" title="classroom" height="337" width="509" alt="classroom" class="image-inline image-inline" /><br />
<div align="center"><br />
<div align="left">Ideas like open space dialogues, collaborative
story-telling, mobilising resources for knowledge production, creating
awareness campaigns and interacting with a larger audience through the
digital platforms are now a part of their proposals and promise to show
some creative, innovative and interesting uses of these technologies.
How the teachers would react to such an imagination of the students as
peers within the formal education system, remains to be seen as we
organise a faculty training workshop later in December. <br /><br />These
three large themes find different articulations, interpretations and
executions in different locations. However, they seem to be emerging as
the new forms of social exclusion that we need to take into account. It
is apparent that the role of technologies – both at the level of usage
and of imagination – is crucial in shaping these forms of social
inequities. But the technologies can also facilitate negotiations and
engagements with these concerns by providing new forms of knowledge
production and pedagogy, which can help the students in developing
better learning environments and processes. The Pathways to Higher
Education remains committed to not only documenting these learnings but
also to see how they might be upscaled and integrated into mainstream
learning within higher education in India.</div>
</div>
</div>
<p>
For more details visit <a href='http://editors.cis-india.org/digital-natives/pathways/blog/higher-education'>http://editors.cis-india.org/digital-natives/pathways/blog/higher-education</a>
</p>
No publisherpraskrishnaFeaturedHigher EducationResearchers at WorkDigital Knowledge2015-03-30T14:54:21ZBlog EntrySVG Translation Workshop at KBC North Maharashtra University
http://editors.cis-india.org/a2k/blogs/subodh-kulkarni-april-10-2019-svg-translation-workshop-at-kbc-north-maharashtra-university
<b>The Centre for Internet & Access to Knowledge (CIS-A2K) wing organized an SVG translation workshop in collaboration with KBC North Maharashtra University, Jalgaon on 14-15 March 2019. The workshop was a part of India level campaign. Total 58 participants attended the workshop and contributed to Commons till 31 March 2019.</b>
<h3>Background</h3>
<p>During the edit-a-thons and thematic workshops, the need for images in Marathi was realised. Many articles on health and science have images with labels in English. The issue was discussed with few institutions. KBC University came forward to start the activity under this campaign.</p>
<h3>Objectives</h3>
<ul>
<li>Orientation of Wikimedia projects</li>
<li>Localisation of SVG images</li>
<li>Commons upload policies and process</li></ul>
<h3>Facilitators</h3>
<ul>
<li>Krishna Chaitanya Velaga -- <a title="User:KCVelaga" href="https://meta.wikimedia.org/wiki/User:KCVelaga">User: KCVelaga</a></li>
<li>Subodh Kulkarni, CIS-A2K --<a title="User:Subodh (CIS-A2K)" href="https://meta.wikimedia.org/wiki/User:Subodh_(CIS-A2K)">Subodh (CIS-A2K)</a> </li>
<li>Prof. Manish Joshi, SOCS KBCNMU, Jalgaon -- <a title="User:Joshmanish" href="https://meta.wikimedia.org/wiki/User:Joshmanish">Joshmanish</a> </li>
<li>Dr. Snehalata B. Shirude, SOCS KBCNMU, Jalgaon --<a title="User:Snehalata Shirude" href="https://meta.wikimedia.org/wiki/User:Snehalata_Shirude">Snehalata Shirude</a> </li></ul>
<h3>Agenda</h3>
<ul>
<li>Introduction to Wikimedia projects, Marathi Wikipedia, Commons</li>
<li>Account creation, basic editing skills</li>
<li>Copyrights, Commons upload process</li>
<li>Graphics images, types of formats, features</li>
<li>Installation of fonts, Inkscape</li>
<li>Resources for translation, verification before uploads</li>
<li>Selection of images, tags, categories for upload</li>
<li>Using translated images in local Wikipedia</li></ul>
<h3>Report</h3>
<p style="text-align: justify;">As the participants were not aware of Wikimedia projects, the first two sessions dedicated to an introduction to various projects. The participants opened accounts on a smartphone and created user pages after logging in on computers. They were introduced to basic skills in Wikipedia editing, giving references/wiki links and adding images from Commons. The Commons platform was explained in detail. The missing images in Marathi language articles and Commons as well were shown. The discussion on these topics resulted in understanding the need for SVG translation exercise.</p>
<p style="text-align: justify;">The next session was to download and install the necessary software on each computer. The participants installed Google Input Tools for Marathi typing and also Inkscape. Before translating images on Inkscape, the students first practised Marathi typing on their sandboxes. After this, the main graphics sessions were conducted. Krishna explained various types of formats, differences between raster and vector graphics, the importance of SVGs and actual SVG file translation process. He demonstrated the process for images with different difficulty levels. They were introduced to resources available as a part of the campaign for SVG translation and necessary techniques. The usage of various online resources like encyclopedia and thesaurus available was also explained. The images were selected and working tags were applied by the participants. The faculty facilitated the process of work distribution among the students. The participants were able to upload 100+ images on the first day.</p>
<p style="text-align: justify;"><img src="http://editors.cis-india.org/home-images/SVGWorkshop.jpg/@@images/6d0456b2-a79a-49eb-abd0-73e551f0fbb0.jpeg" alt="null" class="image-inline" title="SVG Workshop" /></p>
<p style="text-align: justify;"><span style="text-align: justify;">Pictured above: Students from Day 1 helping others on Day 2 (Picture by Subodh Kulkarni)</span></p>
<p style="text-align: justify;">On Day 2, around 20 participants newly joined the workshop. This group comprised of teachers, journalists, doctors, and other enthusiastic citizens. Active students from Day 1 facilitated the training of this new batch. Having conducted a session on the previous day greatly helped to facilitate this session easily. The experienced teachers and citizens helped others to get correct translations and terms. This boosted the speed of the work. The images were also used in the articles on Marathi Wikipedia.</p>
<p style="text-align: justify;">With the help of science teachers, the images were verified before uploading to Commons. Due to active participatory work on the second day, the total images crossed 200 mark. The students continued to contribute till last day of campaign i.e. 31 March. At the end, due to consistent work <a href="https://commons.wikimedia.org/wiki/Category:Creations_from_STC19_in_mr">Marathi category</a> reached the highest number with a total of 357 images among <a href="https://commons.wikimedia.org/wiki/Category:Creations_from_STC19">all Indian languages</a>. The workshop and further work was well organized and motivated by Prof. Manish Joshi and Prof. Snehalata Shirude from Computer Science department.</p>
<hr />
<p style="text-align: justify;">Link to the Wikipedia page report<a href="https://meta.wikimedia.org/wiki/CIS-A2K/Events/SVG_Translation_Workshop_at_KBC_North_Maharashtra_University,_Jalgaon_(14-15_March_2019)"> here</a></p>
<p>
For more details visit <a href='http://editors.cis-india.org/a2k/blogs/subodh-kulkarni-april-10-2019-svg-translation-workshop-at-kbc-north-maharashtra-university'>http://editors.cis-india.org/a2k/blogs/subodh-kulkarni-april-10-2019-svg-translation-workshop-at-kbc-north-maharashtra-university</a>
</p>
No publishersubodhFeaturedCIS-A2KMarathi WikipediaAccess to Knowledge2019-04-26T06:47:40ZBlog EntrySurvey on Data Protection Regime
http://editors.cis-india.org/internet-governance/blog/survey-on-data-protection-regime
<b>We request you to take part in this survey aimed at understanding how various organisations view the changes in the Data Protection Regime in the European Union. Recently the General Data Protection Regulation (EU) 2016/679 was passed, which shall replace the present Data Protection Directive DPD 95/46/EC. This step is likely to impact the way of working for many organisations. We are grateful for your voluntary contribution to our research, and all information shared by you will be used for the purpose of research only. Questions that personally identify you are not mandatory and will be kept strictly confidential. </b>
<p> </p>
<h4>The survey form below can also be accessed <a href="https://goo.gl/forms/61d4W0kPQ8SqNaMO2" target="_blank">here</a>.</h4>
<hr />
<iframe src="https://docs.google.com/forms/d/e/1FAIpQLSepvhTUkkc7s3jFDfJZ90wFJAIuVexrbVSO5icV4kW0-1uyNA/viewform?embedded=true" frameborder="0" marginwidth="0" marginheight="0" height="800" width="600">Loading...</iframe>
<p> </p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/blog/survey-on-data-protection-regime'>http://editors.cis-india.org/internet-governance/blog/survey-on-data-protection-regime</a>
</p>
No publisherAditi Chaturvedi and Elonnai HickokGeneral Data Protection RegulationInternet GovernanceFeaturedData ProtectionHomepage2017-02-10T10:47:00ZBlog EntrySurvey : Digital Natives with a cause?
http://editors.cis-india.org/digital-natives/blog/survey-digital-natives-with-a-cause
<b>This survey seeks to consolidate information about how young people who have grown up with networked technologies use and experience online platforms and tools. It is also one of the first steps we have taken to interact with Digital Natives from around the world — especially in emerging information societies — to learn, understand and explore the possibilities of change via technology that lie before the Digital Natives. The findings from the survey will be presented at a multi-stakeholder conference later this year in The Netherlands.
</b>
<p>The Centre for Internet and Society, in collaboration with Hivos' Knowledge Programme, launched the "Digital Natives with a Cause?" Programme in 2008. After the initial study (<a href="http://editors.cis-india.org/publications/cis/nishant/dnrep.pdf/view" class="external-link">click here for a free download</a>), we are now gathering responses from young users of technology to help us understand, document and support different practices aimed at social transformation and political participation more efficiently.</p>
<p> </p>
<p>We believe that the world is changing very fast and that the rise of Internet technologies has a lot to do with it. As young users of technology (as opposed to young users who use technology) adopt, adapt and use these new technologised tools to interact with their environment, new ways of effecting change emerge. This survey is an attempt to capture some of the information which gives us an insight into who the people are, using these technologies, the ways in which they use them and what their perceptions and experiences are.</p>
<p> </p>
<p>The survey will not take more than 7 minutes of your time but it will help us get a better sense of the way things are.</p>
<p> </p>
<strong>Please click here so start the
<a href="http://spreadsheets.google.com/viewform?formkey=dG9reUVvQ0w4d1ZER3lKOUtFanZMUnc6MA" target="_blank"> survey</a>.</strong>
<p>
For more details visit <a href='http://editors.cis-india.org/digital-natives/blog/survey-digital-natives-with-a-cause'>http://editors.cis-india.org/digital-natives/blog/survey-digital-natives-with-a-cause</a>
</p>
No publisherpushpaSocial mediaDigital NativesYouthFeaturedDigital subjectivitiesSocial Networking2011-08-04T10:35:43ZBlog EntrySuper Cassettes v. MySpace
http://editors.cis-india.org/a2k/blogs/super-cassettes-v-my-space
<b>The Delhi High Court’s judgment in Super Cassettes v. MySpace last July is worrying for a number of reasons. The court failed to appreciate the working of intermediaries online and disregard all pragmatic considerations involved. The consequences for free expression and particularly for file sharing by users of services online are especially unfavourable. </b>
<p style="text-align: justify; ">The judgment<a href="#fn*" name="fr*">[*]</a>is extremely worrying since it holds MySpace liable for copyright infringement, <b>despite</b> it having shown that it did not know, and could not have known, about each instance of infringement; that it removed each instance of alleged infringement upon mere complaint; that it asked Super Cassettes to submit their songs to their song identification database and Super Cassettes didn't.</p>
<p style="text-align: justify; ">This, in essence, means, that all 'social media services' in which there is even a <b>potential</b> for copyright infringement (such as YouTube, Facebook, Twitter, etc.) are now faced with a choice of either braving lawsuits for activities of their users that they have no control over — they can at best respond to takedown requests after the infringing material has already been put up — or to wind down their operations in India.</p>
<h2 style="text-align: justify; ">The Facts</h2>
<p style="text-align: justify; ">Aside from social networking, MySpace facilitates the sharing of content between its users. This case concerns content (whose copyright vested in T-Series) was uploaded by users to MySpace’s website. It appears that tensions between MySpace and T-Series arose in 2007, when T-Series entered into talks with MySpace to grant it licenses in its copyrighted content, while MySpace asked instead that T-Series register with its rights management programme. Neither the license nor the registration came about, and the infringing material continued to be available on the MySpace website.</p>
<p style="text-align: justify; ">Specifically, T-Series alleged that cases for primary infringement under section 51(a)(i) of the Copyright Act as well as secondary infringement under section 51 (a) (ii) could be made out. Alleging that MySpace had infringed its copyrights and so affected its earnings in royalties, T-Series approached the Delhi High Court and filed a suit seeking injunctive relief and damages. In proceedings for interim relief while the suit was pending, the court granted an injunction, but, in an appeal by MySpace, added the qualification that the content would have to be taken down only on receipt of a specific catalogue of infringing works available on MySpace, rather than a general list of works in which T-Series held a copyright.</p>
<h2 style="text-align: justify; ">The Defence</h2>
<p>While other arguments such as one around the jurisdiction of the court were also raised, the central issues are listed below:</p>
<ol>
<li style="text-align: justify; ">Non-Specificity of Prayer<br />T-Series’ claim in the suit is for a blanket injunction on copyrighted content on the MySpace website. This imposes a clearly untenable, even impossible, burden for intermediaries to comply with.</li>
<li style="text-align: justify; ">Knowledge<br />MySpace argued that no liability could accrue to it on two counts. The first was that it had no actual or direct knowledge or role in the selection of the content, while the second was that no control was exercised, or was exercisable over the uploading of the content. Additionally, there was no possible means by which it could have identified the offending content and segregated it from lawful content, or monitored all of the content that it serves as a platform for.</li>
<li style="text-align: justify; ">Intermediary status and Safe Harbour Protection<br />In relation to its status as an intermediary, MySpace raised several arguments. First, it argued that it had immunity under section 79 of the IT Act and under the US Digital Millennium Copyright Act (US DMCA). Another argument restated what is arguably the most basic tenet of intermediary liability that merely providing the platform by which infringement could occur cannot amount to infringement. In other words, the mere act of facilitating expression over internet does not amount to infringement. It then made reference to its terms of use and its institution of safeguards (in the form of a hash filter, a rights management tool and a system of take-down–stay-down), which it argued clearly reflect an intention to discourage or else address cases of infringement as they arise. MySpace also emphasized that a US DMCA compliant procedure was in place, although T-Series countered that the notice and take down system would not mitigate the infringement.</li>
<li style="text-align: justify; ">Relationship between MySpace and its Users<br />Taking from previous arguments about a lack of control and its status as an intermediary, MySpace argued that it was simply a licensee of users who uploaded content. The license is limited, in that MySpace is only allowed to alter user-generated content so as to make it viewable.</li>
</ol>
<h2 style="text-align: justify; ">Outcomes</h2>
<ol>
<li style="text-align: justify; ">Infringement by Facilitation<br />The court concluded that infringement in terms of section 51 (a) (ii) had occurred in this case, since web space is a “place” in the terms required by the section and there were monetary gains in the form of ad revenue. The argument as to a lack of knowledge of infringement was also rejected on the ground that MySpace’s provision for safeguards against infringement clearly established a reason to believe that infringement will occur. Also referenced as evidence of knowledge, or at least a reason to believe infringement would occur, is the fact that MySpace modifies the format of the content before making it available on its website. It also tested for infringement by authorization in terms of section 14 read with section 51 (a) (i), but concluded that this did not arise here.</li>
<li style="text-align: justify; ">Reading away section 79?<br />The court accepted the argument made by T-Series to the effect that sections 79 and 81 of the IT Act must be read together. Since section 79 would be overridden by section 81’s non-obstante, the effect would be that rights holders’ interests under the Copyright Act will erode intermediaries’ immunity under section 79. </li>
<li style="text-align: justify; ">Due Diligence<br />The court rejected the argument that the provision of due diligence or curative measures post-infringement would be sufficient. Specifically, the contention that the quantum of content being uploaded precludes close scrutiny, given the amount of labour that would be involved, was rejected. Content should not immediately be made available but must be subject to enquiries as to its title or to authentication of its proprietor before it is made available. In fact, it holds that, “there is no reason to axiomatically make each and every work available to the public solely because user has supplied them unless the defendants are so sure that it is not infringement.” (Paragraph 88).</li>
</ol> <ol> </ol>
<p style="text-align: justify; ">There is also an attempt to distinguish the Indian framework from the DMCA. While that law calls for post-infringement measures, it is argued that in India, on reading section 51 with section 55, the focus is on preventing infringement at the threshold. In response to the case that it would be impossible to do so, the court held that since the process here requires MySpace to modify the format of content uploaded to it to make it viewable, it will have a reasonable opportunity to test for infringement.</p>
<h2 style="text-align: justify; ">Analysis</h2>
<h3>Accounting for the Medium of Communication</h3>
<p style="text-align: justify; ">The court’s analysis of the issues begins with a predictable emphasis on how the law of copyright would operate in the context of what is termed “internet computing”, peppered with trite statements about “the virtual world of internet” creating “complexit[ies]” for copyright law. The court appears to have entered into this discussion to establish that the notion of place in section 51 (a) (ii) should extend to “web space” but the statements made here only serve to contrast starkly against its subsequent failure to account for the peculiarities of form and function of intermediaries online. Had this line of argument been taken to its logical conclusion, after the character of the medium had been appreciated, the court’s final conclusion, that MySpace is liable for copyright infringement, would have been an impossible one to arrive at.</p>
<h3 style="text-align: justify; ">And What of Free Speech?</h3>
<p style="text-align: justify; ">As it had argued before the court, intermediaries such as MySpace have no means by which to determine whether content is illegal (whether by reason of amounting to a violation of copyright, or otherwise) until content is uploaded. In other words, there is no existing mechanism by which this determination can be made at the threshold, before posting.</p>
<p style="text-align: justify; ">The court does not engage with the larger consequences for such a scheme of penalizing intermediaries. Censoring patent illegalities at the threshold, even if that were possible is one thing. The precedent that the court creates here is quite another. Given the general difficulty in conclusively establishing whether there is an infringement at all due to the complexities in applying the exceptions contained under section 52, it should not be for ordinary private or commercial interests such as intermediaries to sit in judgment over whether content is or is not published at all. In order to minimize its own liability, the likelihood of legitimate content being censored by the intermediary prior to posting is high.</p>
<p style="text-align: justify; ">The consequences for civil liberties, and free speech and expression online in particular, appear to have been completely ignored in favour of rights holders’ commercial interests.</p>
<h3 style="text-align: justify; ">Consequences for Intermediary Liability and Safe Harbour Protection</h3>
<blockquote class="pullquote" style="text-align: justify; ">Even if every instance in question did amount to an infringement of copyright and a mechanism did exist allowing for removal of content, the effect of this judgment is to create a strict liability regime for intermediaries.</blockquote>
<p style="text-align: justify; ">In other words, the court’s ruling will have the effect that courts’ determination of intermediaries’ liability will become detached from whether or not any fault can be attributed to them. MySpace did make this argument, even going as far as to suggest that doing so would impose strict liability on intermediaries. This would lead to an unprecedented and entirely unjustifiable result. In spite the fact that a given intermediary did apply all available means to prevent the publication of potentially infringing content, it would remain potentially liable for any illegality in the content, even though the illegality could not have been detected or addressed.</p>
<p style="text-align: justify; ">What is perhaps even more worrying is that MySpace’s attempt at proactively and in good faith preventing copyright infringement through its terms of use and in addressing them through its post-infringement measures was explicitly cited as evidence of knowledge of and control over the uploading of copyrighted material, at the threshold rather than ex post. This creates perverse incentives for the intermediary to ignore infringement, to the detriment of rights holders, rather than act proactively to minimize its incidence.</p>
<p style="text-align: justify; ">A final observation is that the court’s use, while pronouncing on relief, of the fact that MySpace makes a “copy” of the uploaded content by converting it into a format that could subsequently be hosted on the site and made accessible to show evidence of infringement and impose liability upon MySpace in itself is a glaring instance of the disingenuous reasoning the court employs throughout the case. There is another problem with the amended section 79, which waives immunity where the intermediary “modifies” material. That term is vague and overreaches, as it does here: altering formats to make content compatible with a given platform is not comparable to choices as to the content of speech or expression, but the reading is tenable under section 79 as it stands.</p>
<p style="text-align: justify; ">The result of all of this is to dislodge the section 79 immunity that accrues to intermediaries and replace that with a presumption that they are liable, rather than not, for any illegality in the content that they passively host.</p>
<h3 style="text-align: justify; ">Effect of the Copyright (Amendment) Act, 2012</h3>
<p style="text-align: justify; ">Since the judgment in the MySpace case, the Copyright Act has been amended to include some provisions that would bear on online service providers and on intermediaries’ liability for hosting infringing content, in particular. Section 52 (1) (b) of the amended Act provides that “transient or incidental storage of a work or performance purely in the technical process of electronic transmission or communication to the public” would not infringe copyright. The other material provision is section 52 (1) (c) which provides that “transient or incidental storage of a work or performance for the purpose of providing electronic links, access or integration, where such links, access or integration has not been expressly prohibited by the right holder, unless the person responsible is aware or has reasonable grounds for believing that such storage is of an infringing copy” will not constitute an infringement of copyright. The latter provision appears to institute a rather rudimentary, and very arguably incomplete, system of notice and takedown by way of a proviso. This requires intermediaries to takedown content on written complaint from copyright owners for a period of 21 days or until a competent rules on the matter whichever is sooner, and restore access to the content once that time period lapses, if there is no court order to sustain it beyond that period.</p>
<p style="text-align: justify; ">This post does not account for the effect that these provisions could have had on the case, but it is already clear, from the sloppy drafting of section 52 (1) (c) and its proviso that they are not entirely salutary even at the outset. At any rate, there appears to be nothing that *<i>determinatively*</i> affects intermediaries’ secondary liability, <i>i.e.</i>, their liability for users’ infringing acts.</p>
<hr />
<p style="text-align: justify; "><i>Disclosure: CIS is now a party to these proceedings at the Delhi High Court. This is a purely academic critique, and should not be seen to have any prejudice to the arguments we will make there.</i></p>
<hr />
<p>[<a href="#fr*" name="fn*">*</a>]. Super Cassettes Industries Ltd. v. MySpace Inc. and Another, on 29 July, 2011, Indian Kanoon - Search engine for Indian Law. See<a class="external-link" href="http://bit.ly/quj6JW"> http://bit.ly/quj6JW</a>, last accessed on October 31, 2012.</p>
<p>
For more details visit <a href='http://editors.cis-india.org/a2k/blogs/super-cassettes-v-my-space'>http://editors.cis-india.org/a2k/blogs/super-cassettes-v-my-space</a>
</p>
No publisherujwalaAccess to KnowledgeCopyrightIntellectual Property RightsIntermediary LiabilityFeatured2012-10-31T10:27:36ZBlog EntrySubmitted Comments on the Telangana State Open Data Policy 2016
http://editors.cis-india.org/openness/comments-on-the-telangana-state-open-data-policy-2016
<b>Last month, the Information Technology, Electronics & Communications Department of the Government of Telangana released the first public draft of the Telangana State Open Data Policy 2016, and sought comments from various stakeholders in the state and outside. The draft policy not only aims to facilitate and provide a framework for proactive disclosure of data created by the state government agencies, but also identify the need for integrating such a mandate within the information systems operated by these agencies as well. CIS is grateful to be invited to submit its detailed comments on the same. The submission was drafted by Anubha Sinha and Sumandro Chattapadhyay.</b>
<p> </p>
<p><strong>Download the submitted document: <a href="http://cis-india.org/openness/files/cis-telangana-state-open-data-policy-v-1-submission/at_download/file">PDF</a>.</strong></p>
<hr />
<h3><strong>1. Preliminary</strong></h3>
<p><strong>1.1.</strong> This submission presents comments and recommendations by the Centre for Internet and Society (“CIS”) <strong>[1]</strong> on the proposed draft of the Telangana Open Data Policy 2016 (“the draft policy”). This submission is based on Version 1 of the draft policy shared by the Information Technology, Electronics & Communications Department, Government of Telangana (“the ITE&C Department”).</p>
<p><strong>1.2.</strong> CIS commends the ITE&C Department for its generous efforts at seeking inputs from various stakeholders to draft an open data policy for the state of Telangana. CIS is thankful for this opportunity to provide a clause-by-clause submission.</p>
<h3><strong>2. The Centre for Internet and Society</strong></h3>
<p><strong>2.1.</strong> The Centre for Internet and Society, CIS, is a non-profit organisation that undertakes interdisciplinary research on internet and digital technologies from policy and academic perspectives. The areas of focus include digital accessibility for persons with diverse abilities, access to knowledge, intellectual property rights, openness (including open data, free and open source software, open standards, open access, open educational resources, and open video), internet governance, telecommunication reform, digital privacy, and cyber-security. The academic research at CIS seeks to understand the reconfiguration of social processes and structures through the internet and digital media technologies, and vice versa.</p>
<p>2.2. This submission is consistent with CIS’ commitment to safeguarding general public interest, and the interests and rights of various stakeholders involved. The comments in this submission aim to further the principle of citizens’ right to information, instituting openness-by-default in governmental activities, and to realise the various kinds of public goods that can emerge from greater availability of open (government) data. The submission is limited to those clauses that most directly have an impact on these principles.</p>
<h3><strong>3. Comments and Recommendations</strong></h3>
<p><em>This section presents comments and recommendations directed at the draft policy as a whole, and in certain places, directed at specific clauses of the draft policy.</em></p>
<h3>3.1. Defining the Scope of the Policy in the Preamble</h3>
<p><strong>3.1.1.</strong> CIS observes and appreciates that the ITE&C Department has identified the open data policy as a catalyst for, and as dependent upon, a larger transformation of the information systems implemented in the state, to specifically ensure that these information systems.</p>
<p><strong>3.1.2.</strong> CIS commends the endeavour of the draft policy to share data in open and machine-readable standards. To further this, it will be useful for the preamble to explicitly mandate proactive disclosure in both human-readable and machine-readable formats, using open standards, and under open license(s).</p>
<p><strong>3.1.3.</strong> CIS recommends that the draft policy state the scope of the policy at the outset, i.e. in the Preamble section of the document. This will provide greater clarity to the stakeholders who are trying to ascertain applicability of the draft policy to their data.</p>
<p><strong>3.1.4.</strong> CIS commends the crucial mandate of creating data inventory within every state government ministry / department. We further recommend that the draft policy also expressly states the need to make these inventories publicly accessible.</p>
<p><strong>3.1.5.</strong> CIS commends the draft policy’s aim to build a process to engage with data users for better outcomes. We suggest that the draft policy also enumerates the “outcomes” of such engagement, in order to provide more clarity. We recommend that these “outcomes” include greater public supply of open government data in an effective, well-documented, timely, and responsible manner.</p>
<p><strong>3.1.6.</strong> Further, CIS suggests that the draft policy define “information centric and customer centric data” to provide more clarity to the document, as well as its scope and objectives.</p>
<h3>3.2. Provide Legal and Policy References</h3>
<p><strong>3.2.1.</strong> Strengthening transparency, predictability, and legal certainty of rules benefits all stakeholders. Thus, as far as possible, terms in the draft policy should use pre-existing legal definitions. In case of ambiguities arising after the implementation of the policy, consistency in definitions will also lead to greater interpretive certainty. It must be noted that good quality public policies which promote legal certainty, lead to better implementation.</p>
<p><strong>3.2.2.</strong> CIS observes that the draft policy re-defines various terms in Section 4 that have already been defined in National Data Sharing and Accessibility Policy (“NDSAP”) 2012 <strong>[2]</strong>, the Right to Information 2005 (“RTI Act”) <strong>[3]</strong>, and IT (Reasonable security practices and procedures and sensitive personal data or information) Rules 2011 <strong>[4]</strong>. We strongly recommend that the draft policy uses the pre-existing definitions in these acts, rules, and policies.</p>
<p><strong>3.2.3.</strong> Further, CIS observes that while certain sections accurately reflect definitions and parts from other acts, rules and policies, such sections are not referenced back to the latter. These sections include, but are not limited to: Sections 3, 7, 8, 4 (definitions of Data set, Data Archive, Negative list, Sensitive Personal data). We strongly recommend that accurate legal references be added to the draft policy after careful study of the language used.</p>
<h3>3.3. Need for More Focused Objective Statement</h3>
<p><strong>3.3.1.</strong> While the draft policy has a very comprehensive statement of its objectives, including "<em>all issues related to data in terms of the available scope of sharing and accessing spatial and non-spatial data under broad frameworks of standards and interoperability</em>," it may consider offering a more focused statement of its key objective, which is to provide a policy framework for proactive disclosure of government data by the various agencies of the Government of Telangana.</p>
<p><strong>3.3.2.</strong> Further, the objective statement must clearly state that the policy enables publication of data created by the agencies of the Government of Telangana, and/or by private agencies working in partnership with public agencies, using public funds as open data (that is, using open standards, and under open license). The present version of the objective statement mentions "<em>sharing</em>" and "<em>accessing</em>" the data concerned under "<em>broad frameworks of standards and interoperability</em>" but does not make it clear if such shared data will be available in open standards, under open licenses, and for royalty-free adaptation and redistribution by the users concerned.</p>
<h3>3.4. Suggestions related to the Definitions</h3>
<p><strong>3.4.1.</strong> The term “Data” has not been defined in accordance with NDSAP 2012. We suggest that the definition provided in NDSAP is followed so as to ensure legal compatibility.</p>
<p><strong>3.4.2.</strong> The term “Sensitive Personal Data” seems to have been defined on the basis of the definition provided in the IT (Reasonable security practices and procedures and sensitive personal data or information) Rules 2011. Please add direct reference so as to make this clear. We further suggest that the term “Personal Information”, also defined in the same IT Rules, is also included and referred to in the draft policy, so that not only Sensitive Personal Data is barred from disclosure under this policy, but also Personal Information (that is "<em>any information that relates to a natural person, which, either directly or indirectly, in combination with other information available or likely to be available with a body corporate, is capable of identifying such person</em>") <strong>[5]</strong>.</p>
<p><strong>3.4.3.</strong> The term “Negative List” is defined in a manner that allows the state government ministries and agencies to identify which data are to be considered as non-shareable without any reference to an existing policy framework that list acceptable grounds for such identification. The term must be defined more restrictively, as this definition can allow an agency to avoid disclosure of data that may not be legally justifiable as non-shareable or sensitive. Thus, we recommend a more limited definition which may draw upon the RTI Act 2005, and specifically consider the factors mentioned in Sections 8 and 9 of the Act as the (only) set of acceptable reasons for non-disclosure of government data.</p>
<p><strong>3.4.4.</strong> The terms “Shareable Data” and “Sensitive Data” are used in several places in the draft policy but are not defined in Section 4. Both these terms are defined in NDSAP 2012. We suggest that both these terms be listed in Section 4, in accordance with the respective definitions provided in NDSAP 2012.</p>
<p><strong>3.4.5.</strong> The terms “Data Archive”, “Data Acquisition”, “Raw Data”, “Standards-Compliant Applications”, and “Unique Data” are defined in Section 4, but none of these terms appear elsewhere in the draft policy. We suggest that these terms are either better integrated into the document, or may not be defined at all.</p>
<h3>3.5. Rename Section 6 to Focus on Implementation of the Policy</h3>
<p><strong>3.5.1.</strong> Though the Section 6 is named as “Shareable Data”, it instead categorically lists down how the policy is to be implemented. This is a very welcome step, but the Section title should reflect this purpose of the Section.</p>
<p><strong>3.5.2.</strong> The decision proposed in the draft policy to make it mandatory for "<em>each funding organization</em>" to "<em>highlight data sharing policy as preamble in its RFPs as well as Project proposal formats</em>" is much appreciated and commendable. For a clearer and wider applicability of this measure, we recommend that this responsibility should apply to all state government agencies, including agencies where the state government enjoys significant stake, and all public-private partnerships entered into by the state government agencies, and not only to "<em>funding organizations</em>" (a term that has also not been defined in the draft policy).</p>
<p><strong>3.5.3.</strong> While the Section details out various measures and steps of implementation of the policy, it does not clarify which agency and/or committee would have the authority and responsibility to coordinate, monitor, facilitate, and ensure these measures and steps. Not only governmental representatives but also non-governmental representatives may be considered for such a committee.</p>
<h3>3.6. Host All Open Government Data in the State Portal</h3>
<p><strong>3.6.1.</strong> We observe that the Section 6 indicates that , the designated domain for the open government data portal for the state of Telangana, will only store metadata related to the proactive disclosed data sets but not the data sets themselves. This is further clarified in Section 10. We strongly urge the ITE&C Department to reconsider this decision to not to store the actual open data sets in the state open government data portal itself but in the departmental portals. A central archive of the open data assets, hosted by the state open government data portal, will allow for more effective and streamlined management of the open data assets concerned, including their systematic backing-up, better security and integrity, permanent and unique disclosure, and rule-driven updation. This would also reduce the burden upon all the government agencies, especially those that do not have a substantial IT team, to run independent department-specific open data portals.</p>
<h3>3.7. Reconsider the Section on Data Classification</h3>
<p><strong>3.7.1.</strong> While it is clear that the Section 7 on Data Classification follows the classification of various data sets created, managed, and/or hosted by government agencies offered in the NDSAP 2012, it is not very clear what role this classification plays in functioning and implementation of the draft policy. While Open Access and Registered Access data may both be considered as open government data that is to be proactively disclosed by the state government agencies via the state open government data portal, the Restricted Access data overlaps with the kinds of data already included in the Negative List defined in the draft policy (and elsewhere, like the RTI Act 2005). Further, the final sentence in this Section ensures that all data users provide appropriate attribution of the source(s) of the data set concerned, which (though is an important statement) should not be part of this Section on Data Classification. We suggest reconsideration of inclusion of this Section.</p>
<h3>3.8. Reconsider the Section on Technology for Sharing and Access</h3>
<p><strong>3.8.1.</strong> While it is clear that the Section 8 on Technology for Sharing and Access is adapted from the Section 9 of the NDSAP 2012, the text in this Section seems to be not fully compatible with other statements in this draft policy. For example, the Section states that "<em>[t]his integrated repository will hold data of current and historical nature and this repository over a period of time will also encompass data generated by various State Government departments</em>." However, the draft policy states in Section 10 that "<em>data.telangana.gov.in will only have the metadata and data itself will be accessed from the portals of the departments</em>."</p>
<p><strong>3.8.2.</strong> We strongly urge the ITE&C Department to revise this Section through close discussion with the NDSAP Project Management Unit, National Informatics Centre, which is the technical team responsible for developing and managing the portal, since the present version of this Section lists the original feature set of the portal as envisioned in 2012 but does not reflect the most recent feature set that has been already implemented in the portal concerned.</p>
<h3>3.9. Current Legal Framework (Section 9) should List to Relevant Acts, Rules, Policies, and Guidelines</h3>
<p><strong>3.9.1.</strong> CIS observes that the draft policy attempts to lay out the applicable legal framework in Section 2 and 9 of the draft policy, and submits that the legal framework is incomplete and recommends that the draft policy lists all the following relevant acts, rules, policies and guidelines:</p>
<ol type="A">
<li>National Data Sharing and Accessibility Policy, 2012<br /><br /></li>
<li>Right to Information Act, 2005<br /><br /></li>
<li>Information Technology Act, 2002<br /><br /></li>
<li>Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011.<br /></li></ol>
<p><strong>3.9.2.</strong> CIS submits that apart from the policies mentioned above, the implementation of the draft policy is intricately linked to concepts of "open standards," "open source software," "open API," and "right to information." These concepts are governed by specific acts and policies, and are applicable to government owned data, as follows:</p>
<ol type="A">
<li><strong>Adoption of Open Standards:</strong> CIS observes that the draft policy draws on the importance of building information systems for interoperability and greater information accessibility. Interoperability is achieved by appropriate implementation of open standards. Thus, CIS submits that the Policy on Open Standards for e-Governance <strong>[6]</strong> which establishes the guidelines for usage of open standards to ensure seamless interoperability, and the Implementation Guidelines of the National Data Sharing and Accessibility Policy, 2012 <strong>[7]</strong> should be mentioned in the draft policy.<br /><br /></li>
<li><strong>Adoption of Open Source Software:</strong> The Policy on Adoption of Open Source Software for Government of India states that the "<em>Government of India shall endeavour to adopt Open Source Software in all e-Governance systems implemented by various Government organizations, as a preferred option in comparison to Closed Source Software</em> <strong>[8]</strong>." As the draft policy proposed to guide the development of information systems to share open data is being developed and implemented both by the Government of Telangana and by other agencies (academic, commercial, and otherwise), it must include an explicit reference and embracing of this mandate for adoption of Open Source Software, for reasons of reducing expenses, avoiding vendor lock-ins, re-usability of software components, enabling public accountability, and greater security of software systems.<br /><br /></li>
<li><strong>Implementation of Open APIs:</strong> CIS observes that the draft policy refers to Standard compliant applications in Section 4. CIS suggests that final version of the policy refer to and operationalise the Policy on Open Application Programming Interfaces (APIs) for Government of India <strong>[9]</strong>. This will ensure that the openly available data is available to the public, as well as to all the government agencies, in a structured digital format that is easy to consume and use on one hand, and is available for various forms of value addition and innovation on the other. Refer to Official Secrets Act, 1923: The Official Secrets Act penalises a person if he/she "<em>obtains, collects, records or publishes or communicates to other person any secret official code or password, or any sketch, plan, model, article or note or other document or information which is calculated to be or might be or is intended to be, directly or indirectly, useful to an enemy for which relates to a matter the disclosure of which is likely to affect the sovereignty and integrity of India, the security of the State or friendly relations with foreign States</em> <strong>[10]</strong>." CIS submits that this Act should be referred to in this context of ensuring non-publication of the aforementioned data.<br /></li></ol>
<h3>3.10. Mandate a Participatory Process for Developing the Implementation Guidelines</h3>
<p><strong>3.10.1.</strong> We highly appreciate and welcome the fact that the draft policy emphasises rapid operationalisation of the policy by mandating that the ITE&C Department will prepare a detailed implementation guideline within 6 months of the notification of this policy, and all state government departments will publish at least 5 high value datasets within the next three months. Just as an addition to this mandate, we would like to propose that it can be suggested that the ITE&C Department undertakes a participatory process, with contributions from both government agencies and non-government actors, to develop this implementation guideline document. We believe that opening up government data in an effective and sustainable manner, for most government agencies, involves a systematic change in how the agency undertakes day-to-day data management practices. Hence, to develop productive and practical implementation guidelines, the ITE&C Department needs to gather insights from the other state government agencies regarding their existing data (and metadata) management practices <strong>[11]</strong>. Further, participation of the non-government actors in this process is crucial to ensure that the implementation guidelines appropriately identify the high value data sets, that is data sets that should be published on a priority basis.</p>
<h3>3.11. Defer the Decision about Roles of Data Owners, Generators, and Controllers</h3>
<p><strong>3.11.1.</strong> As the draft policy does not specifically define the terms “Data Owners”, “Data Generators”, and “Data Controllers”, and the Section 11 only briefly describes some of the roles of these types of actors, we suggest removal of this discussion and the decision regarding the specific roles and functions of the Data Owners / Generators / Controllers from the draft policy itself. It will be perhaps more appropriate and effective to define these terms, as well as their roles and functions, in the implementation guidelines to be prepared by the ITE&C Department after the notification of the open data policy, since these terms relate directly to the final designing of the implementation process.</p>
<p><strong>3.12.</strong> CIS is grateful to the ITE&C Department for this opportunity to provide comments, and would be honoured to provide further assistance on the matter.</p>
<h3><strong>Endnotes</strong></h3>
<p><strong>[1]</strong> See: <a href="http://cis-india.org/" target="_blank">http://cis-india.org/</a>.</p>
<p><strong>[2]</strong> See: <a href="http://data.gov.in/sites/default/files/NDSAP.pdf" target="_blank">http://data.gov.in/sites/default/files/NDSAP.pdf</a>.</p>
<p><strong>[3]</strong> See: <a href="http://rti.gov.in/webactrti.htm" target="_blank">http://rti.gov.in/webactrti.htm</a>.</p>
<p><strong>[4]</strong> See: <a href="http://meity.gov.in/sites/upload_files/dit/files/GSR313E_10511(1).pdf" target="_blank">http://meity.gov.in/sites/upload_files/dit/files/GSR313E_10511(1).pdf</a>.</p>
<p><strong>[5]</strong> See Section 2 (1) (i) of IT (Reasonable security practices and procedures and sensitive personal data or information) Rules 2011.</p>
<p><strong>[6]</strong> See: <a href="https://egovstandards.gov.in/sites/default/files/Published%20Documents/Policy_on_Open_Standards_for_e-Governance.pdf" target="_blank">https://egovstandards.gov.in/sites/default/files/Published%20Documents/Policy_on_Open_Standards_for_e-Governance.pdf</a>.</p>
<p><strong>[7]</strong> See: <a href="https://data.gov.in/sites/default/files/NDSAP_Implementation_Guidelines_2.2.pdf" target="_blank">https://data.gov.in/sites/default/files/NDSAP_Implementation_Guidelines_2.2.pdf</a>.</p>
<p><strong>[8]</strong> See: <a href="http://deity.gov.in/sites/upload_files/dit/files/policy_on_adoption_of_oss.pdf" target="_blank">http://deity.gov.in/sites/upload_files/dit/files/policy_on_adoption_of_oss.pdf</a>.</p>
<p><strong>[9]</strong> See: <a href="http://deity.gov.in/sites/upload_files/dit/files/Open_APIs_19May2015.pdf" target="_blank">http://deity.gov.in/sites/upload_files/dit/files/Open_APIs_19May2015.pdf</a>.</p>
<p><strong>[10]</strong> See: <a href="http://www.archive.india.gov.in/allimpfrms/allacts/3314.pdf" target="_blank">http://www.archive.india.gov.in/allimpfrms/allacts/3314.pdf</a>, Sections 2 (2) and 3 (1) (c).</p>
<p><strong>[11]</strong> A similar process was undertaken by the IT Department of the Government of Sikkim when developing the implementation guideline document. The ITE&C Department may consider discussing the matter with the said department to exchange relevant learnings.</p>
<p> </p>
<p>
For more details visit <a href='http://editors.cis-india.org/openness/comments-on-the-telangana-state-open-data-policy-2016'>http://editors.cis-india.org/openness/comments-on-the-telangana-state-open-data-policy-2016</a>
</p>
No publishersumandroOpen DataOpen Government DataFeaturedPoliciesOpennessHomepage2016-09-01T05:49:51ZBlog EntrySubmitted Comments on the 'Government Open Data Use License - India'
http://editors.cis-india.org/openness/submitted-comments-on-the-government-open-data-use-license-india
<b>The public consultation process of the draft open data license to be used by Government of India has ended yesterday. Here we share the text of the submission by CIS. It was drafted by Anubha Sinha, Pranesh Prakash, and Sumandro Chattapadhyay.</b>
<p> </p>
<p><em>The following comments on the 'Government Open Data Use License - India' was drafted by Anubha Sinha, Pranesh Prakash, and Sumandro Chattapadhyay, and submitted through the <a href="https://www.mygov.in/group-issue/public-consultation-government-open-data-use-license-india/">MyGov portal</a> on July 25, 2016. The original submission can be found <a href="https://www.mygov.in/sites/default/files/mygov_146946521043358971.pdfh">here</a>.</em></p>
<hr />
<h2>I. Preliminary</h2>
<ol>
<li>This submission presents comments by the Centre for Internet and Society (“<strong>CIS</strong>”) <strong>[1]</strong> on the draft Government Open Data Use License - India (“<strong>the draft licence</strong>”) <strong>[2]</strong> by the Department of Legal Affairs.<br /><br /></li>
<li>This submission is based on the draft licence released on the MyGov portal on June 27, 2016 <strong>[3]</strong>.<br /><br /></li>
<li>CIS commends the Department of Ministry of Law and Justice, Government of India for its efforts at seeking inputs from various stakeholders prior to finalising its open data licence. CIS is thankful for the opportunity to have been a part of the discussion during the framing of the licence; and to provide this submission, in furtherance of the feedback process continuing from the draft licence.</li></ol>
<h2>II. Overview</h2>
<ol start="4">
<li>The Centre for Internet and Society is a non-governmental organisation engaged in research and policy work in the areas of, inter alia, access to knowledge and openness. This clause-by-clause submission is consistent with CIS’ commitment to safeguarding general public interest, and the interests and rights of various stakeholders involved. Accordingly, the comments in this submission aim to further these principles and are limited to those clauses that most directly have an impact on them.</li></ol>
<h2>III. Comments and Recommendations</h2>
<ol start="5">
<li><strong>Name of the Licence:</strong> CIS recommends naming the licence “Open Data Licence - India” to reflect the nomenclature already established for similar licences in other nations like the UK and Canada. More importantly, the inclusion of the word ‘use’ in the original name “Government Open Data Use License” is misleading, since the licence permits use, sharing, modification and redistribution of open data.<br /><br /></li>
<li><strong>Change Language on Permissible Use of Data:</strong> The draft licence uses the terms “Access, use, adapt, and redistribute,” which are used in UNESCO’s definition of open educational resources, whereas, under the Indian Copyright Act <strong>[4]</strong>, it should cover “reproduction, issuing of copies,” etc. To resolve this difference, we suggest the following language be used: “Subject to the provisions of section 7, all users are provided a worldwide, royalty-free, non-exclusive licence to all rights covered by copyright and allied rights, for the duration of existence of such copyright and allied rights over the data or information.”<br /><br /></li>
<li><strong>Add Section on the Scope of Applicability of the Licence:</strong> It will be useful to inform the user of the licence on its applicability. The section may be drafted as: “This licence is meant for public use, and especially by all Ministries, Departments, Organizations, Agencies, and autonomous bodies of Government of India, when publicly disclosing, either proactively or reactively, data and information created, generated, collected, and managed using public funds provided by Government of India directly or through authorized agencies.”<br /><br /></li>
<li><strong>Add Sub-Clause Specifying that the Licence is Agnostic of Mode of Access:</strong> As part of the section 4 of the draft licence, titled ‘Terms and Conditions of Use of Data,’ a sub-clause should be added that specifies that users may enjoy all the freedom granted under this licence irrespective of their preferred mode of access of the data concerned, say manually downloaded from the website, automatically accessed via an API, collected from a third party involved in re-sharing of this data, accessed in physical/printed form, etc.<br /><br /></li>
<li><strong>Add Sub-Clause on Non-Repudiability and Integrity of the Published Data:</strong> To complement the sub-clause 6.e. that notes that data published under this licence should be published permanently and with appropriate versioning (in case of the published data being updated and/or modified), another sub-clause should be added that states that non-repudiability and integrity of published data must be ensured through application of real/digital signature, as applicable, and checksum, as applicable. This is to ensure that an user who has obtained the data, either in physical or digital form, can effectively identify and verify the the agency that has published the data, and if any parts of the data have been lost/modified in the process of distribution and/or transmission (through technological corruption of data, or otherwise).<br /><br /></li>
<li><strong>Combine Section 6 on Exemptions and Section 7 on Termination:</strong> Given that the licence cannot reasonably proscribe access to data that has already been published online, it is suggested that it would be better to simply terminate the application of the licence to that data or information that ought not to have been published for grounds provided under section 8 of the RTI Act, or have been inadvertently published. It should also be noted that section 8 of the RTI Act cannot be “violated” (as stated in Section 6.g. of the draft licence), since it only provides permission for the public authority to withhold information, and does not impose an obligation on them (or anyone else) to do so. The combined clause can read: “Upon determination by the data provider that specific data or information should not have been publicly disclosed for the grounds provided under Section 8 of the Right to Information Act, 2005, the data provider may terminate the applicability of the licence for that data or information, and this termination will have the effect of revocation of all rights provided under Section 3 of this licence.”<br /><br /></li>
<li>It will be our pleasure to discuss these submissions with the Department of Legal Affairs in greater detail, supplement these with further submissions if necessary, and offer any other assistance towards the efforts at developing a national open data licence.</li></ol>
<hr />
<p><strong>[1]</strong> See: <a href="http://cis-india.org/">http://cis-india.org/</a>.</p>
<p><strong>[2]</strong> See: <a href="https://www.mygov.in/sites/default/files/mygov_1466767582190667.pdf">https://www.mygov.in/sites/default/files/mygov_1466767582190667.pdf</a>.</p>
<p><strong>[3]</strong> See: <a href="https://www.mygov.in/group-issue/public-consultation-government-open-data-use-license-india/">https://www.mygov.in/group-issue/public-consultation-government-open-data-use-license-india/</a>.</p>
<p><strong>[4]</strong> See: <a href="http://www.copyright.gov.in/Documents/CopyrightRules1957.pdf">http://www.copyright.gov.in/Documents/CopyrightRules1957.pdf</a>.</p>
<p> </p>
<p>
For more details visit <a href='http://editors.cis-india.org/openness/submitted-comments-on-the-government-open-data-use-license-india'>http://editors.cis-india.org/openness/submitted-comments-on-the-government-open-data-use-license-india</a>
</p>
No publishersinhaOpen Government DataOpen LicenseOpen DataNDSAPFeaturedOpennessHomepage2016-07-26T09:23:48ZBlog EntrySubmission by the Centre for Internet and Society on Revisions to ICANN Expected Standards of Behavior
http://editors.cis-india.org/internet-governance/submission-by-the-centre-for-internet-and-society-on-revisions-to-icann-expected-standards-of-behavior
<b>Prepared by Vidushi Marda, with inputs from Dr. Nirmita Narasimhan and Sunil Abraham.</b>
<p> </p>
<p>We at the Centre for Internet and Society (“CIS”) are grateful for the opportunity to comment on the proposed revisions to ICANN’s Expected Standards of Behavior (“Standards”).</p>
<p>Before providing specific comments on the proposed revisions, CIS would like to state for the record our extreme disappointment while noting that there is no indication of the intention to draft and adopt a dedicated anti - harassment policy. We are of the firm opinion that harassment, and particularly sexual harassment, is not only a sensitive topic, but also a deeply complex one. Such a policy should consider scope, procedural questions, redressal and remedies in cases of harassment in general and sexual harassment in particular. A mere change in language to these Standards, however well intentioned, cannot go too far in preventing and dealing with cases of harassment in the absence of a framework within which such instances can be addressed.</p>
<p>Some of the issues that arose at ICANN55 were confusion surrounding the powers and limits of the Ombudsman’s office in dealing with cases of harassment, the exact procedure to be followed for redressal surrounding such incidents, and the appropriate conduct of parties to the matter. There will be no clarity in these respects, even if these proposed changes are to be adopted.</p>
<p>Specifically, the proposed language is problematic and completely inadequate for the following reasons:</p>
<ol><li>
<p><strong>Vague</strong></p>
<p>Terms like “professional conduct” and “appropriate behavior” mean little in the absence of a definition that entails such conduct. These terms could mean vastly different things to each community member and such language will only encourage a misalignment of expectation of conduct between community members. The “general” definition of harassment is at best, an ineffective placeholder, as it does not encompass exactly what kind of behavior would fall under its definition.</p>
</li>
<li>
<p><strong>Fails to consider important scenarios</strong></p>
<p>The proposed language fails to consider situations where some attempts or advances at communication, sexual or otherwise, occur. For example, consider a situation in which one community member stalks another online, and catalogues his/her every move. This is most certainly foreseeable, but will not be adequately covered by the proposed language. Further, terms like “speech or behavior that is sexually aggressive or intimidates” could or could not include types of speech such as art, music, photography etc, depending on who you ask. It also does not explain the use of the word behavior - physical, emotional, professional, online behavior are all possible, but the scope of this term would depend on the interpretation one chooses to apply. In part 4 below, we will demonstrate how ICANN has applied a far more detailed framework for harassment elsewhere.</p>
</li>
<li>
<p><strong>Ignores complexity</strong></p>
<p>In discussions surrounding the incident at ICANN55, a number of issues of arose. These included, inter alia, the definition of harassment and sexual harassment, what constituted such conduct, the procedure to be followed in such cases, the appropriate forum to deal with such incidents and the conduct that both parties are expected to maintain. These questions cannot, and have not been answered or addressed in the proposed change to the Standards. CIS emphasizes the need to understand this issue as one that must imbibe differences in culture, expectation, power dynamics, and options for redressal. If ICANN is to truly be a safe space, such issues must be substantively and procedurally fair for both the accused and the victim. This proposed definition is woefully inadequate in this regard.</p>
</li>
<li>
<p><strong>Superficial understanding of harassment, sexual harassment</strong></p>
<p>The proposed changes do not define harassment, and sexual harassment in an adequate fashion. The change currently reads, “Generally, harassment is considered unwelcome hostile or intimidating behavior -- in particular, speech or behavior that is sexually aggressive or intimidates based on attributes such as race, gender, ethnicity, religion, age, color, national origin, ancestry, disability or medical condition, sexual orientation, or gender identity.” These are subject to broad interpretation, and we have already highlighted the issues that may arise due to this in 1, above. Here, we would like to point to a far more comprehensive definition.</p>
</li></ol>
<p>ICANN’s own Employment Policy includes within the scope of sexual harassment “verbal, physical and visual conduct that creates an intimidating, offensive or hostile working environment, or interferes with work performance.” The policy also states:</p>
<blockquote>Harassing conduct can take many forms and includes, but is not limited to, the following:<br />
<ol><li>Slurs, jokes, epithets, derogatory comments, statements or gestures;</li>
<li>Assault, impeding or blocking another’s movement or otherwise physically interfering with normal work;</li>
<li>Pictures, posters, drawings or cartoons based upon the characteristics mentioned in the first paragraph of this policy.</li></ol>
Sexually harassing conduct includes all of the above prohibited actions, as well as other unwelcome conduct, such as requests for sexual favors, conversation containing sexual comments, and unwelcome sexual advances.”</blockquote>
<p>This definition is not perfect, it does not comprehensively consider advances or attempts at communication, sexual or otherwise, which are unwelcome by the target. Nonetheless, CIS believes that this is a far more appropriate definition that does not include vague metrics that the proposed changes do. Since it is one ICANN has already adopted, it can act as an important stepping stone towards a comprehensive framework.</p>
<p>Like ICANN, UNESCO’s organisational approach has been to adopt a comprehensive <a href="http://www.un.org/womenwatch/osagi/UN_system_policies/(UNESCO)Anti-harassment_Policy.pdf">Anti-Harassment Policy</a> which lays down details of definition, prevention, complaint procedure, investigations, sanctions, managerial responsibility, etc. Acknowledging the cultural sensitivity of harassment particularly in international situations, the policy also recognizes advances or attempts at communication, sexual or otherwise. Most importantly, it states that for conduct to come within the definition of sexual harassment, it “must be unwelcome, i.e. unsolicited and regarded as offensive or undesirable by the victim.”</p>
<h3>Conclusion</h3>
<p>In conclusion, we would like to reiterate the importance of adopting and drafting a dedicated anti-harassment policy and framework. The benefits of safety, certainty and formal redressal mechanisms in cases of harassment cannot be over emphasized.</p>
<p>Importantly, such measures have already been taken elsewhere. The IETF has adopted an <a href="http://tools.ietf.org/html/rfc7776">instrument</a> to address issues of harassment that occur at meetings, mailing lists and social events. This instrument contemplates in detail, problematic behavior, unacceptable conduct, the scope of the term harassment, etc. It further envisages a framework for redressal of complaints, remediation, and even contemplates issues that may arise with such remediation. It is particularly important to note that while it provides a definition of harassment, it also states that "[a]ny definition of harassment prohibited by an applicable law can be subject to this set of procedures, recognising harassment as a deeply personal and subjective experience, and thus encouraging members to take up issues of harassment as per their cultural norms and national laws, which are then considered as per procedures laid down."</p>
<p>A similar effort within the ICANN community is critical.</p>
<p> </p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/submission-by-the-centre-for-internet-and-society-on-revisions-to-icann-expected-standards-of-behavior'>http://editors.cis-india.org/internet-governance/submission-by-the-centre-for-internet-and-society-on-revisions-to-icann-expected-standards-of-behavior</a>
</p>
No publishervidushiPublic AccountabilityInternet GovernanceFeaturedICANNIANA TransitionHomepage2016-06-30T06:07:37ZBlog EntryStudying the Emerging Database State in India: Notes for Critical Data Studies (Accepted Abstract)
http://editors.cis-india.org/raw/studying-the-emerging-database-state-in-india-accepted-abstract
<b>"Critical Data Studies (CDS) is a growing field of research that focuses on the unique theoretical, ethical, and epistemological challenges posed by 'Big Data.' Rather than treat Big Data as a scientifically empirical, and therefore largely neutral phenomena, CDS advocates the view that data should be seen as always-already constituted within wider data assemblages." The Big Data and Society journal has provisionally accepted a paper abstract of mine for its upcoming special issue on Critical Data Studies.</b>
<p> </p>
<h2>Introduction</h2>
<p>Through the last decade, the Government of India has given shape to an digital identification infrastructure, developed and operated by the Unique Identification Authority of India (UIDAI). The infrastructure combines the task of assigning unique identification numbers, called Aadhaar numbers, to individuals submitting their biometric and demographic details, and the task of authenticating their identity when provided with an Aadhaar number and associated data (biometric data, One Time Pin sent to the pre-declared mobile number, etc.). The aim of UIDAI is to provide universal authentication-as-a-service for all residents of India who approach any public or private agencies for any kind of service or transaction. Simultaneously, the Aadhaar numbers will function as unique identifiers for joining up databases of different government agencies, and hence allow the Indian government to undertake big data analytics at a governmental scale, and not only at a departmental one.</p>
<p>In this paper, I am primarily motivated by the challenge of finding points and objects to enter into a critical study of such an in-progress data infrastructure. As I proceed with an understanding that data is produced within its specific social and material context, the question then is to read through the data to reflect on its possible social and material context. This is complicated when approaching a big data infrastructure that is meant to produce data for explicitly intra-governmental consumption and circulation. The problem then is not one of reading through available big data, but one of reading through the assemblage and imaginaries of big data to reflect on the kind of data it will give rise to, and thus on the politics of the data assemblage and the database state it enables.</p>
<p> </p>
<h2>Logic of the Database State</h2>
<p>Application of data to inform governmental acts have taken place at least since government has been understood as responsible for the welfare of the population and the territory. The measurement of the population and the territory – the number of people, their demographic features, amounts and locations of natural resources, and so on – have always been integral to the functioning of the modern nation-state. Database state is used in this paper to identify a particular mode of mobilisation of data within governmental acts, which is fundamentally shaped by the possibilities of big data extraction, appropriation, and analytics pioneered by a range of companies since late 1990s. The reason for not using big data state but database dtate is that big data refers to a body of technologies emerging in response to a set of data management and analysis challenges situated in a certain moment of development of information technologies, whereas database refers to a symbolic form (Manovich 1999): a form in which not only the population is made visible to the government (as a collection of visual, textual, numeric, and other forms of records), but also how the acts of government are made visible to the population (as a collection of performance indicators, budget allocation and utilisation tables, and other data visualised through dashboards, analog and digital).</p>
<p>The data production and management logic of this database state is specifically inspired by the notion of platform introduced by the so-called Web 2.0 companies: providing a common service layer upon which various other applications may also run, but under specific arrangements (including distribution of generated user data) with the original common layer provider. Data assemblages of the database state are expected to enable the government to function as a platform, as an intensely data-driven layer that widely gathers data about population individuals and feeds it back selectively to various providers of public and private services. This transforms the data assemblage from one vertical of governmental activities to a horizontal critical infrastructure for modularisation of governmental activities.</p>
<p> </p>
<h2>Studying the Emerging Database State in India</h2>
<p>Government of India is presently debating the legal and technical validity of the digital identity infrastructure programme in the Supreme Court, while simultaneously carrying out the enrollment drive for the same, linking up assignment of unique identity numbers with a national drive for population registration, and rolling out citizen-facing services and applications that implement the Aadhaar number as a necessary key to access them. With the enrollment process going on and the integration with various governmental processes (termed seeding by Aadhaar policy literature) just beginning, I enter this study through two key sets of objects reflecting the imaginaries and the technical specifications of the emerging database state in India. The first entry point is through the various official documents of vision, intentions, plans, and reconsiderations, and the second entry point is through the Application Programming Interface (API) documentations published by UIDAI to specify how its identity authentication platform will collaborate with various public and private services.</p>
<p>The first section of the paper provides a brief survey of pre-UIDAI attempts by the Government of India to deploy unique identification numbers and Smart Cards for specific population groups, so as to understand the initial conceptualisation of this data assemblage of a digital identification platform. The second section foregrounds how this platform undertakes a transformation of the components and relations of the pre-existing data assemblage of the Government of India, as articulated in various official documents of promised utility and proposed collaborations. The third section studies the API documentations to track how such imaginaries are materially interpreted and operationalised through the design of protocols of data interactions with various public and private agencies offering services utilising the identity authentication platform.</p>
<p> </p>
<h2>Notes for Critical Data Studies</h2>
<p>Expanding the early agenda note on Critical Data Studies by Craig Dalton and Jim Thatcher (2014), Rob Kitchin and Tracey P. Lauriault have taken steps towards emphasising the responsibility of this nebulous research strategy to chart and unpack the data assemblages (2014). This is exactly what I propose to do in this paper. While Kitchin and Lauriault provide a detailed list of the components of the apparatus of a data assemblage (2014: 7), I find the concepts of infrastructural components and infrastructural relations very useful in thinking through the emerging infrastructure of authentication. Thus, my approach to these tasks of charting and unpacking is focused on the infrastructural relations that the digital identity infrastructure re-configures, instead of the infrastructural components it mobilises (Bowker et al 2010). This tactical choice of focusing on the infrastructural relations is also necessitated by the practical difficulty in having comprehensive access to the individual components of the data assemblage concerned. Addressing questions of causality and quality becomes difficult when studying the assemblage sans the produced data, and rigorously analysing concerns of security and uncertainty pre-requires an actually existing data assemblage, with a public interface to investigating its leakages, breakages, and internal functioning. In the absence of such points of entry into the data assemblage, which I fear may not be an exceptional case, I attempt an inverted reading. Turning the data infrastructure inside out, in this paper I describe how the digital identity platform is critically reshaping the basis of governmental acts in India, through a specific model of production, extraction and application of big data.</p>
<p> </p>
<h2>Bibliography</h2>
<p>Bowker, Geoffrey C., Karen Baker, Florence Millerand, & David Ribes. 2010. Toward Information Infrastructure Studies: Ways of Knowing in a Networked Environment. Jeremy Hunsinger, Lisbeth Klastrup, & Matthew Allen (Eds.) International Handbook of Internet Research. Springer Dordrecht Heidelberg London New York. Pp. 97-117.</p>
<p>Dalton, Craig, & Jim Thatcher. 2014. What does a Critical Data Studies Look Like, and Why do We Care? Seven Points for a Critical Approach to ‘Big Data.’ Society and Space. May 19. Accessed on July 08, 2015, from <a href="http://societyandspace.com/material/commentaries/craig-dalton-and-jim-thatcher-what-does-a-critical-data-studies-look-like-and-why-do-we-care-seven-points-for-a-critical-approach-to-big-data/" target="_blank">http://societyandspace.com/material/commentaries/craig-dalton-and-jim-thatcher-what-does-a-critical-data-studies-look-like-and-why-do-we-care-seven-points-for-a-critical-approach-to-big-data/</a>.</p>
<p>Kitchin, Rob, & Tracey P. Lauriault. 2014. Towards Critical Data Studies: Charting and Unpacking Data Assemblages and their Work. The Programmable City Working Paper 2. July 29. National University of Ireland Maynooth, Ireland. Accessed on July 08, 2015 from <a href="http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2474112" target="_blank">http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2474112</a>.</p>
<p>Manovich, Lev. 1999. Database as Symbolic Form. Convergence. Volume 5, Number 2. Pp. 80-99.</p>
<p> </p>
<p><em>Note: Call for Papers for the special issue can found here: <a href="http://bigdatasoc.blogspot.in/2015/06/call-for-proposals-special-theme-on.html" target="_blank">http://bigdatasoc.blogspot.in/2015/06/call-for-proposals-special-theme-on.html</a>.</em></p>
<p> </p>
<p>
For more details visit <a href='http://editors.cis-india.org/raw/studying-the-emerging-database-state-in-india-accepted-abstract'>http://editors.cis-india.org/raw/studying-the-emerging-database-state-in-india-accepted-abstract</a>
</p>
No publishersumandroBig DataData SystemsResearchFeaturedAadhaarResearchers at WorkE-Governance2015-11-13T05:54:53ZBlog EntryStudying Internet in India: Selected Abstracts
http://editors.cis-india.org/raw/studying-internet-in-india-selected-abstracts
<b>We received thirty five engaging abstracts in response to the call for essays on 'Studying Internet in India.' Here are the ten selected abstracts. The final essays will be published from June onwards.</b>
<p> </p>
<h3>Deva Prasad M - 'Studying the Internet Discourse in India through the Prism of Human Rights'</h3>
<p>Exploring Internet from the perspective of human rights gives rise to the multitude of issues such as right to privacy, freedom of expression, accessibility. Pertinent socio-political and legal issues related to Internet which was widely debated upon in the past one year in India includes lack of freedom of expression on Internet and Section 66A of Information Technology Act, 2000. The recent net neutrality debate in India has also evoked deliberation about the right of equal accessibility to Internet and to maintain Internet as a democratic space. The repercussions of ‘Right to be Forgotten’ law of European Union also had led to debate of similar rights in Indian context. Interestingly all these issues have an underlying thread of human right perspective connecting them and need pertinent deliberation from human rights perspective.</p>
<p>This paper is an attempt to understand and analyze theses issues from the human rights angle and also how they have contributed in evolving an understanding and perspective amongst the digitally conscious Indian’s to ensure the democratic nature of “Internet” is perceived. Moreover, analysis of these three issues would also help in emphasizing upon the need for a right-based approach in studying Internet in India.</p>
<p> </p>
<h3>Dibyajyoti Ghosh - 'Indic Scripts and the Internet'</h3>
<p>Whereas the status of the internet in India is similar to the status of the internet in similar economies with low-penetration and a primarily mobile-based future, an alphabetically diverse nation such as India has its added worries. Whereas the 1990s saw an overdomination of English given the linguistic communities which were developing the world of computers and the world of the internet, by 2015, some of the disparity with offline linguistic patterns has been reduced. However, for Indic scripts, much less development has taken place. If one is studying the internet in India, chances are one is studying it in English.</p>
<p>What does this hold for the future of these Indic scripts? Given the multilingual skills of Indian school-goers and the increasing amount of daily reading time of those connected to the internet (which is somewhere between 12% and 20% of the population) being devoted to reading on the internet, chances are reading is increasingly in English. In this essay, I shall attempt to study the effects this has on the internet population of India, some of which are as follows.</p>
<ul>
<li>The kind of mimetic desire it causes</li>
<li>The degneration in spelling skills caused due to transliteration</li>
<li>The effacement of non-digitised Indic verbal texts</li></ul>
<p> </p>
<h3>Divij Joshi - 'The Internet in the Indian Judicial Imagination'</h3>
<p>The first mention of the 'Internet' in the vocabulary of Indian judicial system was a fleeting reference to its radical capability to allow access to knowledge. In one of its most recent references, it expounded upon and upheld the idea of the Internet as a radical tool for free expression, announcing its constitutional significance for free speech.</p>
<p>The judicial imagination of the Internet – the understanding of its capabilities and limitations, its actors and constituents, as reflected in the judgements of Indian courts – plays a major role in shaping the Internet in India, both reflecting and defining conceptions of the Internet and its relationship with society, law, and public policy.</p>
<p>This essay is an attempt to use legal and literary theory to study the archives of judicial decisions, tracing the history of the Internet in India through the lens of judicial trends, and also to look at how the judiciary has defined its own role in relation to the Internet. It attempts a vital study of how courts in India have conceptualized and understood the Internet, and how these conceptions have, in turn, impacted the influence of the Internet on Indian society.</p>
<p> </p>
<h3>Ipsita Sengupta</h3>
<p>The proposed essay will make observations of a specific kind of conversation that takes place on the social media platform of YouTube. The conclusive argument is imagined along questions of high versus low culture, as described below.</p>
<p>Under study are two objects- one, particular YouTube videos which play Rabindra-Sangeet, i.e. songs penned and composed in the late 19- early 20th centuries by the Bengali writer and artist Rabindranath Tagore, the body of work which today has become a genre of Indian music; and the second, comments that these videos receive from users of the site.</p>
<p>Visuals of YouTube song videos of Rabindra-Sangeet are of many kinds. So are renditions, with solitary or duet or band performances, and with varying pace and instrumental accompaniment.</p>
<p>The videos which have visuals from contemporary cinema, like images of urban youth, and the remixed renditions have often been found to receive comments which reflect/ reveal hurt sentiments of people trying to preserve some kind of sanctity of Rabindra-Sangeet, comments which state how the ethics of presenting the genre have been violated, via their notation and design, by either makers of the film in the song’s incorporation, or by the way young pop stars have been placed in particular montages.</p>
<p>Some examples:</p>
<p><iframe src="https://www.youtube-nocookie.com/embed/1aGwOBgyWTo?rel=0" frameborder="0" height="315" width="420"></iframe></p>
<p><iframe src="https://www.youtube-nocookie.com/embed/8_z3blCxCCQ?rel=0" frameborder="0" height="315" width="420"></iframe></p>
<p>In such a scenario, YouTube as medium of user-generated expression becomes interesting to analyse individual and group dynamics- given the space for commenting (below the video), and statistical data such as “Likes”, “Dislikes”, and “Views”. The debate here is that in Tagore’s “Nationalism”, when he himself is seen to have an imagination of the human race beyond patriotic groupings and consequent othering, does this apparent need to avoid “insulting” his compositions by preserving an intangible art form in a particular way, become then a type of jingoism of region or identity? And what is this Benjaminian “aura” of the “original” that listeners look for in their experience of these videos?</p>
<p> </p>
<h3>Laird Brown - 'Dharamsala Networked'</h3>
<p>Three hours after regulations governing public access to WiFi in India were changed in 2005 the first router went up in Dharamsala. It was homemade, open source, and eventually, “monkey proof.” Something unimaginable had happened: high-speed Internet access in one of India’s most difficult physical geographies. Dharamsala has also become one of India's interesting information networks and has a burgeoning, unlikely 'tech scene’. But is it so unlikely?</p>
<p>Since 1959 Dharamsala has been home to the Dalai Lama, the Tibetan people and, government in exile. This single, significant incident possibly set in motion a number of factors that made it possible for the mountain-town to become a political, global, communications. However, much like the rest of India, the region struggles for human and environmental rights against fractured ideas of 'development'. This essay will draw on archives and interviews to unpack this microcosmic tale of Internet access, its histories and economics and the factors at play in shaping it - mundane and maverick, familiar and outlier.</p>
<p> </p>
<h3>Maitrayee Deka - 'WhatsApp Economy'</h3>
<p>Everyone around us is connected to the Internet through some or other electronic devices, phones, laptops, and tablets. However, not everyone use Internet for the same purpose. Through an ethnographic account of the usage of WhatsApp messages by the traders in three electronic bazaars in Delhi, Palika Bazaar, Nehru Place and Lajpat Rai Market, we see how Internet on the phone is used predominantly for business purpose. The paper seeks to examine how Whatsapp messages, which are for most of the users a medium for social communication, for the traders in Delhi, become a mode to establish business contact with their counterparts in China. From sharing of pictures of new tools to quoting prices of different products, Whatsapp messages become the lifeline of what many has termed as ‘globalization from below’. This paper argues what has started as economic exchanges through Whatsapp messages may start a new political alliance of similar mass markets in Asia. With the electronic bazaars in Delhi facing stiff competition from formal business actors both online and offline, the WhatsApp messages that is a space of new innovations and trade alliances could sustain the mass markets in India.</p>
<p> </p>
<h3>Purbasha Auddy - 'Citizens and their Internet'</h3>
<p>Suddenly it seems internet data package on mobile phones is the reply to the problems in India. As mobile phones remain with us most of the time, it is as if we are ready to face the world if our mobile phones have a data package. Yes, several television commercials in India are gleefully harping on the notes of knowledge, empowerment and freedom. Moreover, internet is being identified as a virtual institution.</p>
<p>The essay proposes to look into those advertisements which talk about the internet to promote data packages, mobile phones or apps. Through this, the essay firstly, would like to construct the idea of the internet using the Indian citizen who is depicted as smart and almost infallible. Secondly, on the other hand, the essay would analyse how an affirmative and constructive view of using the internet in the minds of citizens has been generated by these advertisements, like the virtual world of the internet can save you from any drastic situation.</p>
<p>Advertisements are creative constructs, which have a strong aptitude to entice target consumers. While studying the internet in India, studying the ‘texts’ of Indian advertisements which refer to the act of ‘consuming’ the internet could result in an interesting study.</p>
<p> </p>
<h3>Sailen Routray - 'The Many Lives and Sites of Internet in Bhubaneswar'</h3>
<p>Those of us who have jumped or meandered across to the wrong (or perhaps the right) side of thirty by now, first came to consume internet in what were called, and are still called, cyber cafes or internet cafes. Their numbers in big Indian cities is dwindling because of the increasing ubiquity of smartphone, and netbooks and data cards. The cyber café seems to be inexorably headed the way of the STD booth in the geography of large Indian cities. The present paper is a preliminary step towards capturing some of the experience of running and using internet cafes. With ethnographic fieldwork with cyber café owners and internet users in these cafes in the Chandrasekharpur area of Bhubaneswar (where the largest section of the computer industry in the state of Odisha is located), this paper tries to capture experiences that lie at the interstices of ‘objects’ and spaces - experiences that are at the same time a history of the internet as well as a personal history of the city.</p>
<p> </p>
<h3>Sarah McKeever - 'Quantity over Quality: Social Media and the New Class System in India'</h3>
<p>From the humblest mobile phones to the most sophisticated computers, the Internet is everywhere and nowhere in India. The boundaries, the contours of the space remain nebulous and opaque. When engaging with social media in urban India in particular, we are bound to the conventions of corporations which demand quantity over quality creating a new class system of the Internet: those who are “active” – and therefore a “better” user – and those who have seemingly failed to keep up with the demands of the medium, buried in the ever‐growing noise and chaos. The creation of a new class system on the Internet, based on Western corporate desire for data, has shaped who is seen and heard on the Internet in India.</p>
<p>Based on fieldwork in New Delhi which examines the impact of the Internet on offline social movements – including the anti corruption movement in 2011 and the Delhi Rape Case in 2012 – I will argue that the study of the Internet in India can reinforce Western corporate conceptions of how to use the Internet properly among various users involved in the movements. By challenging these preconceptions, this essay will engage with issues of Western corporate notions of Internet use and how we engage with and find participants, how we evaluate what is “good” use of the Internet, and the creation of a new class system on the Internet in India.</p>
<p> </p>
<h3>Smarika Kumar - 'Governing Speech on the Internet: Transforming the Public Sphere through Policymaking'</h3>
<p>In the privatised spaces of the World Wide Web and the internet, how does one make sense of speech? Should speech in such a space be understood as the product of a marketplace of ideas? Or should its role in democratic participation be recognised by contextualising the internet as part of the Habermasian public sphere? These questions have interesting implications for the regulation of speech on the internet, as they employ different principles in understanding speech. Recent scholarship has argued for the benefits of employing the public sphere approach to the internet and thus recognising its democratic potential. But taking into account that all speech is inherently made in private spaces on the internet, the application of this
approach is far from simple.</p>
<p>This creates a tension between the marketplace of ideas and the public sphere approaches to speech on the internet in policymaking. I propose to explore how legal and regulatory mechanisms manage these tensions by
creating governance frameworks for the internet: I argue that through the use of policy and regulation, the private marketplace of the internet is sought to be reined in and reconciled to the public sphere, which is mostly represented through legislations governing the internet. I propose that this less-than-perfect reconciliation then manages to modify the very idea of the public sphere itself in the Indian context, by infusing participation of the "other" on the internet through indirect means.</p>
<p> </p>
<p>
For more details visit <a href='http://editors.cis-india.org/raw/studying-internet-in-india-selected-abstracts'>http://editors.cis-india.org/raw/studying-internet-in-india-selected-abstracts</a>
</p>
No publishersumandroResearchers at WorkFeaturedInternet StudiesRAW Blog2015-08-28T06:53:33ZBlog Entry Studying Internet in India (2016): Selected Abstracts
http://editors.cis-india.org/raw/studying-internet-in-india-2016-selected-abstracts
<b>We received some great submissions and decided to select twelve abstracts, and not only ten as we planned earlier. Here are the abstracts.</b>
<p> </p>
<h3><strong>Abhimanyu Roy</strong></h3>
<p><strong><em>The Curious Incidents on Matrimonial Websites in India</em></strong></p>
<p>What is love? Philosophers have argued over it, biologists have researched it and in the age of the internet, innovators have disrupted it. In the west, dating websites such as OKCupid and eHarmony use all manner of algorithms to find its users their optimal match. In India’s conservative society though, dating is fast-tracked or skipped altogether in favor of marriage. This gives rise to a plethora of matrimonial sites such as Jeevansathi.com and Shaadi.com. This is where things get tricky.</p>
<p>Matrimonial websites are different from other internet-enabled services. The gravity of the decision and the major impact that it has on the lives of users brings in pressure and a range of emotions that are not there on casual transactions such as an Uber ride or a foodpanda order. From outright fraud to online harassment newspaper back pages are filled with nightmare stories that begin on a matrimonial website. So much so, that in November of last year, the Indian government decided to set up a panel to regulate matrimonial sites in order to curb abuse. The essay will analyze India’s social stand on marriage, the role of matrimonial websites in modern day India, the problems this awkward amalgamation of the internet and love gives rise to and the steps authorities and matrimonial companies are taking to prevent these issues from occurring.</p>
<h3><strong>Anita Gurumurthy, Nandini Chami, and Deepti Bharthur</strong></h3>
<p><strong><em>Internet as Sutradhar: The Aesthetics and Politics of Digital Age Counter-power</em></strong></p>
<p>The open Internet is now a feeble, wannabe, digital age meme. The despots have grabbed it and capitalism has colonised it. But the network that engulfs its users is also a multi-headed organism; the predictables have to make peace with the unpredictables, both arising as they do with the unruly affordances of the network. The much celebrated public domain of open government data, usually meant for geeks and software gurus dedicated to the brave new 'codeful' future, has meant little for marginal subjects of India's development project. Data on government websites have been critiqued worldwide for often being too clunky to catalyse civic use or too obscure to pin down government efficacy. However, as an instrument of accountable governance, data in the public domain can help hold the line, fuelling vanguard action to foster democracy. Activists engaged in the right to food movement in India had reason to rejoice recently when the Supreme Court of India pulled up the central government for delay in release of funds under the MGNREGA scheme and violating the food security law. The series of actions leading to this victory enjoins deeper examination of the MGNREGS website, the design principles of the MIS that generates reports based on the data, and the truth claims that arose in the contingent context marking this struggle. <em>What were the ingredients of this happy irony; the deployment of the master's tools to disband the master's house? What aesthetics and principles made for a public data structure that allowed citizens to hack into state impunity? And what do such practices around the digital tell us about the performativity of the Internet - not as a grand, open, phenomenon for the network to access the multitude, but as the inane, local, Sutradhar (alchemist who produces the narrative), who allows truths to be told?</em></p>
<h3><strong>Aishwarya Panicker</strong></h3>
<p><strong><em>How Green is the Internet? The Good, the Bad and the Ugly</em></strong></p>
<p>Groceries at your doorstep, data on your fingertips, an Uber at the tap of a button and information overload- human negotiations with the internet have definitely changed drastically in the past few decades. Research in the area, too, has transformed to not just the supply of internet to the masses, but has evolved to include innovative and revolutionary ideas in terms of internet infrastructure and governance. With over 3.2 Billion internet users in the world, and over 400 million of these from India, this is no surprise.</p>
<p>However, while environmental sustainability remains at the forefront of many-a-government, there is little data / debate / analysis / examination of the environmental impact of the internet. This is true especially for India. In 2011, Joel Gombiner wrote an academic paper on the problem of the Internets carbon footprint, with a premise based on the lesser known fact that the ICT industry has been ‘responsible for two to four percent of the global greenhouse gas emissions’- an area that the Climate Group’s Smart 2020 report had focused on back in 2008 as well. Clearly this is a war on the environment that is yet to receive large-scale attention.</p>
<p>How can we move beyond particular fascinations with the internet and engage holistically with the internet? By moving towards a dimension of internet infrastructure studies, that has large policy and implementation benefits. This paper, then, will seek to elucidate four central issue areas: first, as the third highest country in terms of internet use, what is the current environmental impact of internet usage in India? Second, are there any regulatory provisions that give prescriptive measures to data centres and providers? Third, do any global standards
exist in this regard and finally, what future steps can be taken (by the government, civil society
and individuals) to address this?</p>
<h3><strong>Deepak Prince</strong></h3>
<p>One of the most important effects of increasing internet connectivity coupled with universal electronic display screens, multimedia digital objects and supple graphic interfaces, is the proliferation of systems of enunciation. The business letter, typewriter, electric telegraph and radio, each in its own time, transformed how humans make sense in different forms of writing. Some of these survive to this day (forms of address from letters, the abbreviations and ‘cablese’ from telegraph operators etc). Now, we find new spaces of networked sociality emerging at rapid speeds, and everyday, we forget many others that are now outdated, no longer ‘supported’ or desired. How does one study this supple flow of discourse? Deleuze and Guattari’s concept of tracing collective assemblages of enunciation (the structuring structures of discourse) and Gilbert Simondon’s Law of relaxation (where technical elements created by complex ensembles are released into a path of technological evolution where they may or may not crystallize the formation of new ensembles) are two philosophical notions that seek to address this problem. The anthropologist Ilana Gershon suggests that new social media platforms like Facebook have a detrimental effect on sociality because they impose a neo-liberal notion of personhood on its users, through the interface. I take this as my point of departure, and based on ethnographic fieldwork conducted at a new media marketing agency, I attempt to draw out how ‘posting’ is modulated on facebook, about how subjectivity is configured within the complex matrix comprising a constant flow of posts, the economy of ‘liking’, algorithmic sorting and affects that do not cross the threshold of the screen.</p>
<h3><strong>Maitrayee Mukerji</strong></h3>
<p>By some latest estimates, around 35% of the population access the Internet in India using multiple devices. As Indians browse, search, transact and interact online, one can observe the increasing intertwining of the Internet in their everyday lives. But, how much do we know about the influence and impact of the Internet on Indian and in India? Advances in big data technologies provide an exciting opportunity for social science researchers to study the Internet. So, trends can be detected, opinions and sentiments can be calibrated, social networks can be discovered by using technologies for collecting and mining data on people online. But are social science researchers in India equipped enough to do a rigorous and detailed study of the India? Leaving aside debates on epistemology, ontology and methodology of researching Internet using big data analytics, the very first challenge is
limited access to data. A cursory scan of the available research would indicate that the data – tweets, trends, comments, memes etc. have generally been collected manually. The bulk of the data is collected by private companies and available either at a price or by writing programs to access them through APIs. The latter allows only limited extraction of data and more often than not has a learning curve. Access to raw data, through institutional repositories or special permission, if available is only to select few. Legal and ethical issues arise if one considers scrapping websites for data. The essay is an attempt to articulate the challenges in accessing data while making attempts to study the Internet using big data analytics.</p>
<h3><strong>Muhammed Afzal P</strong></h3>
<p><strong><em>Internet Memes as Effective Means of Social and Political Criticism</em></strong></p>
<p>By looking at the user-generated memes posted from the Malayalam Facebook pages “Troll Malayalam” and “International Chalu Union”, this essay argues that political memes function as effective means of social and political criticism in Kerala. In a society where conversations often tend to feature examples from popular films, memes from these pages use images from popular culture including television to respond to current affairs as well as contemporary social and political questions. Often described mistakenly as 'trolls' by the practitioners themselves, a major portion of the memes have a progressive content in terms of discussing questions related to religion, sexuality, nationalism, etc. It won’t be an exaggeration to state that many Malayalis see these memes as instant 'news analysis' of current affairs. The argument of this essay will be advanced through an analysis of the memes that were produced in relation to contemporary socio-political and cultural questions such as beef ban, the rise of right-wing politics in Kerala, the question of religious conservatism, etc. Through this the essay seeks to investigate how internet memes creatively contribute to social movements and also to see how critical questions in cultural criticism are translated into "the popular.'</p>
<h3><strong>Dr. Ravikant Kisana</strong></h3>
<p><strong><em>Archetyping the 'Launda' Humor on the Desi Internet</em></strong></p>
<p>Humor on the internet has proven a massive social unifying force for young, upper class Indian millennials. The humor is not just consumed via Western (mainly US) humor collectives such as 9GAG, Cracked, etc - the proliferation of 'Indian' humor pages on the Facebook and the countless YouTube comedy channels is testament to the localisation of this content. However, the humor which is seen as a unifying force is largely 'launda' aka. 'heteronormative-upper caste-male' in its sensibilities. Comedy collectives like TVF, with its popular channel 'Q-tiyapa' had to create a separate handle 'Girliyapa' to cater to feminist themes. The idea is that humor by default is male, and 'feminist humor' needs a separate space.</p>
<p>This essay seeks to study the 'launda'-cultural attributes of online Indian humor. It will seek to document and wean archetypes of comedy tropes which fit this mode. The area of the documentation will be YouTube comedy channels and Facebook humor pages—however, the same can be extended to Twitter handles and the suchlike.</p>
<h3><strong>Siddharth Rao and Kiran Kumar</strong></h3>
<p><strong><em>Chota Recharge and the Chota Internet</em></strong></p>
<p>Uniform and affordable Internet is emerging as one of the fundamental civil rights in developing countries. However in India, the connectivity is far from uniform across the regions, where the disparity is evident in the infrastructure, the cost of access and telecommunication services to provide Internet facilities among different economic classes. In spite of having a large mobile user base, the mobile Internet are still remarkably slower in some of the developing countries. Especially in India, it falls below 50% even in comparison with the performance of its developing counterparts!</p>
<p>This essay presents a study of connectivity and performance trends based on an exploratory analysis of mobile Internet measurement data from India. In order to assess the state of mobile networks and its readiness in adopting the different mobile standards (2G, 3G, and 4G) for commercial use, we discuss the spread, penetration, interoperability and the congestion trends.</p>
<p>Based on our analysis, we argue that the network operators have taken negligible measures to scale the mobile Internet. Affordable Internet is definitely for everyone. But, the affordability of the Internet in terms of cost
does not necessarily imply the rightful access to Internet services. Chota recharge is possibly leading us to chota (shrunken) Internet!</p>
<h3><strong>Smarika Kumar</strong></h3>
<p><strong><em>Why Mythologies are Crucial to Understand Governance on the Internet: The Case of Online Maps</em></strong></p>
<p>How does one study internet in India? This essay proposes to provide one possible answer to this question through its central argument that internet, like other technologies, is very much a part of a “mythological” or “fictional” narrative of the history of this country, and without an understanding of these mythologies, the development of internet governance in the country cannot be hoped to be understood. This central argument is traced in the essay through the debates and discussions on law and policymaking around online maps. The essay, in its first part, explores what a “mythological” account of the history of India might mean, and what role technological developments play in it. It does so by tracing the narrative of mapmaking in medieval India and its deep ties with magic, secrecy and mythical stories. It then surveys how modern mapping surveys in the colonial period interacted with the idea of the “native”, and argues that such interactions created a dichotomy between “native” sciences, folklore on the one hand, and colonial achievements, national security on the other. It argues that it is this latter strand of a certain “national security” vision of technology which found dominant voice in the regulation
of maps in India post-independence, yet the sense of the unknown, mystical, or “mythological” in such technological deployment as mapmaking requires, survived. The essay finally uses such evidence to trace how even in online
interactions, and internet governance design in India- this aspect of the mystical and the fear of it often sustains, driven by a (repressed?) memory of mythology, through the use of analogies. And it is within this twilight
zone, within this frontier between “mythology” and nation-building, that a governance design for online maps is being presently constructed in India. The essay then argues that it becomes crucial to understand such mythologies around technology generally and internet specifically and the manner they interact with law and policymaking in order to really get a sense of a 21st century India’s experience of the internet.</p>
<h3><strong>Sujeet George</strong></h3>
<p><strong><em>Understanding Reddit: The Indian Context</em></strong></p>
<p>Even as social networking sites like Facebook and Twitter seek to carve a niche within the Indian social media landscape, the presence and impact of news aggregator website reddit seems relatively unnoticed. Known for its excessive self-referentiality and inability to emerge from a restricted pool of informational flow, reddit nevertheless has come to be a major focal point of convergence of news and public opinion, especially in the United States. The web interface, which allows for users with overlapping interests to converge under a common platform namely the “subreddit,” allows the possibility of understanding questions of user taste and the directions in which information and user attention flow.</p>
<p>This paper seeks to offer a preliminary gesture towards understanding reddit’s usage and breadth in the Indian context. Through an analysis of the “India” subreddit and examining the manner and context in which information and ideas are shared, proposed, and debunked, the paper aspires to formulate a methodology for interrogating sites like reddit that offer the possibilities of social mediation, even as users maintain a limited amount of privacy. At the
same time, to what extent can such news aggregator sites direct the ways in which opinions and news flows change course as a true marker of information generation responding to user inputs.</p>
<h3><strong>Supratim Pal</strong></h3>
<p>India, being a multilingual country, owes a lot to the Internet for adding words to the vocabulary of everyday use in different languages.</p>
<p>This paper would critically examine how Net words like "selfie", "wall", "profile" and others have changed the way Indians write or talk. For example, a word like "nijaswi" was not there in Bengali language five years back but is used across several platforms as a translation of "selfie".</p>
<p>On one hand, computer-mediated communication (CMC) has helped us to express in short messages and on the other, we all have picked up use of punctuation marks like colon or a semicolon to express our emotion - which have got another name, "emoticons".</p>
<p>The paper would be more practical in approach than theoretical. For example, it would feature chat (another example of CMC) conversations 10 years ago when hardly an emoticon was used, and that of today's when we cannot think of a chat without a "smiley" or a "sticker". Even the linguist, David Crystal, probably could not have thought that in 15 years, the language (not just lingua franca, English) would change worldwide since he first tried to theorize Internet language in 2001.</p>
<p>Today, a linguist need not to have a proper publication to introduce a word in any language but Netizens can re-invent words like "troll" or "roast" to criticize one or "superlike" to celebrate an achievement or even "unfriend" someone to just relax.</p>
<h3><strong>Surfatial</strong></h3>
<p>Surfatial is a trans-local collective that operates through the internet. We use conversations to aid learning outside established structures. We are concerned with enabling disinhibition through the internet, for expressing
what may not be feasible in physical reality. What role does partial or complete anonymity play in this process of seeking “safe” zones of expression? Fake profiles on social media offer such zones, while perhaps also operating to propagate, mislead or troll.</p>
<p>Our essay would argue:</p>
<ol><li>That there is a desire to participate in speculative fora in the Indian cultural context and the internet has created space for philosophical questioning among contemporary Indian participants which can develop further, despite common assertions that online spaces are largely uncivil and abusive.</li>
<li>That anonymous and pseudonymous content production offers a method for exploring and expressing with a certain degree of freedom.</li>
<li>Spam-like methods used in sub-cultural outreach efforts on social media have proved effective in puncturing filter bubbles.</li></ol>
<p>Our essay would be drawn from experiments via Surfatial’s online engagement platforms (Surfatial’s Study groups and post_writer project) to examine:</p>
<ol><li>Extent of participation.</li>
<li>Disinhibition facilitation and dialoguing.</li>
<li>Reach.</li>
<li>Emergence and development of ideas.</li>
<li>Creating an archive of internet activity and re-processing it into new forms of presentation.</li></ol>
<p> </p>
<p>
For more details visit <a href='http://editors.cis-india.org/raw/studying-internet-in-india-2016-selected-abstracts'>http://editors.cis-india.org/raw/studying-internet-in-india-2016-selected-abstracts</a>
</p>
No publishersumandroResearchers at WorkFeaturedInternet StudiesRAW Blog2016-07-06T06:24:42ZBlog EntryStrategies to Organise Platform Workers
http://editors.cis-india.org/raw/strategies-to-organise-platform-workers-rightscon
<b>In 2022, the Centre for Internet and Society hosted a panel with Akkanut Wantanasombut, Ayoade Ibrahim, Rikta Krishnaswamy, and Sofía Scasserra at RightsCon, an annual summit on technology and human rights. </b>
<p><b><a class="external-link" href="http://cis-india.org/raw/strategies-to-organise-platform-workers/at_download/file">Click</a></b> to download the full report</p>
<hr />
<h3>Event Report</h3>
<p style="text-align: justify; ">This event report is based on proceedings from a panel hosted at the 2022 edition of RightsCon. Hosted by the labour and digitalisation team at CIS, the panel brought together seasoned labour organisers, activists, and researchers working across Thailand, Nigeria, India, and Argentina. The panellists represented a diverse group of worker organisations, including transnational federations, national unions, and informally organised movements.<br /><br />Their experiences of organising in research and practice infused our discussion with insight into collective action struggles across varied sectors and platform economies in the global south. Collective resistance among platform workers has witnessed a sustained rise in these economies over the past three years, with demands for transparency and accountability from platforms, and for a guarantee of rights and protections from governments.<br /><br />Through this panel, we sought to answer:</p>
<ol>
<li>How have workers’ organisations overcome challenges in sustained collective action?</li>
<li>What have been unique aspects of organising in the global south?</li>
<li>Which strategies have been gaining traction for organising workers and mobilising other stakeholders?</li>
</ol>
<p style="text-align: justify; "><br />Placing workers’ participation front and centre, the panellists incorporated common threads around campaigning, education, and mobilisation for increasing worker participation, as well as bargaining with the government for legal and social protections. The panellists highlighted that it’s the resilience and resistance led by workers that drive the way for sustained organising. This panel hoped to spotlight steps taken in that direction, where organising efforts strive to form, sustain, and champion worker-led movements.</p>
<h3 style="text-align: justify; ">Contributors</h3>
<p><b>Panellists: </b><br />Akkanut Wantanasombut<br />Ayoade Ibrahim<br />Rikta Krishnawamy <br />Sofía Scasserra</p>
<p><b>Worker organisations in focus:</b><br />Tamsang-Tamsong<br />National Union of Professional App-based Transport Workers<br />International Alliance of App-based Transport Workers<br />All India Gig Workers’ Union <br />Federación Argentina de Empleados de Comercio y Servicios<br />Asociación de Personal de Plataformas</p>
<p><b>Conceptualisation and planning</b>: Ambika Tandon, Chiara Furtado, Aayush Rathi, and Abhishek Sekharan</p>
<p><b>Author</b>: Chiara Furtado<br /><b>Reviewers</b>: Ambika Tandon and Nishkala Sekhar<br /><b>Designer</b>: Annushka Jaliwala<br /><br />This event report is part of research supported by the Internet Society Foundation under the ‘Labour futures’ grant.</p>
<p>
For more details visit <a href='http://editors.cis-india.org/raw/strategies-to-organise-platform-workers-rightscon'>http://editors.cis-india.org/raw/strategies-to-organise-platform-workers-rightscon</a>
</p>
No publisherfurtadoLabour FuturesDigital EconomyResearchers at WorkGig WorkPlatform-WorkFeaturedRAW ResearchHomepage2023-10-22T09:54:52ZBlog Entry