The Centre for Internet and Society
http://editors.cis-india.org
These are the search results for the query, showing results 11 to 25.
Tulu Wikipedia Tutorial
http://editors.cis-india.org/openness/news/tulu-wikipedia-tutorial
<b>Dr. U.B. Pavanaja trained the people involved in the creation of the videos. </b>
<p>Tutorial video on starting with Tulu Wikipedia which is in incubation:<a class="free external" href="https://incubator.wikimedia.org/wiki/Wp/tcy/%E0%B2%AE%E0%B3%81%E0%B2%96%E0%B3%8D%E0%B2%AF_%E0%B2%AA%E0%B3%81%E0%B2%9F"></a></p>
<p><iframe src="https://commons.wikimedia.org/wiki/File%3ATulu_Wikipedia_Tutorial_01.webm?embedplayer=yes" frameborder="0" height="288" width="512"></iframe></p>
<hr />
<p><br />Tutorial video explaining how to start with Tulu Wikipedia which is in incubator:</p>
<p><iframe src="https://commons.wikimedia.org/wiki/File%3ATuluWikipediaTutorial01-With-Audio.webmhd.webm?embedplayer=yes" frameborder="0" height="288" width="512"></iframe></p>
<hr />
<p><br />Tutorial video explaining how to add new article to Tulu Wikipedia:<br /><br /> <iframe src="https://commons.wikimedia.org/wiki/File%3ATuluWikiTutorial02.webm?embedplayer=yes" frameborder="0" height="288.0891364902507" width="512"></iframe></p>
<hr />
<p><br />Tutorial video explaining how to type in Tulu Wikipedia:<br /><br /> <iframe src="https://commons.wikimedia.org/wiki/File%3ATuluWikiTutorial03.webm?embedplayer=yes" frameborder="0" height="288.0891364902507" width="512"></iframe></p>
<hr />
<p><br />Tutorial video explaining how to format articles in Tulu Wikipedia:<br /><br /> <iframe src="https://commons.wikimedia.org/wiki/File%3ATuluWikiTutorial04.webm?embedplayer=yes" frameborder="0" height="288.0891364902507" width="512"></iframe></p>
<p><br /> The people behind these videos:</p>
<ul>
<li>Prof. Vishwanatha Badikana for Script</li>
<li>Lasya Shetty for Voice</li>
<li>Abhishek Shetty, Saarang Community radio at St Aloysius College Mangaluru for Audio Recording</li>
<li>Soundarya Shetty for Mixing and Editing</li>
<li>Dr. U.B. Pavanaja for Conception, Direction, Mixing and Editing<br /><br /></li></ul>
<p>
For more details visit <a href='http://editors.cis-india.org/openness/news/tulu-wikipedia-tutorial'>http://editors.cis-india.org/openness/news/tulu-wikipedia-tutorial</a>
</p>
No publisherpraskrishnaSocial MediaCIS-A2KAccess to KnowledgeVideoTulu Wikipedia2015-12-15T07:50:52ZNews Item2nd National Language Conference, Bhubaneswar
http://editors.cis-india.org/openness/blog-old/second-national-language-conference-bhubaneswar
<b>Institute of Odia Studies and Research organised 2nd National Language Conference beginning on Monday, March 30, 2015 and ending on April 2, 2015 at the Institute of Physics, Bhubaneswar. This conference was organised in collaboration with the Department of Tourism and Culture. I presented a paper in Odia language in this conference as part of a panel discussion related to Odia language computing.</b>
<p style="text-align: justify; ">I spoke briefly about the issues with Odia being used massively on the Internet and gaining popular with Odia speaking netizens. Odia Wikimedia community and CIS-A2K's efforts has resulted growth in online Odia content. I also shared the potential projects that people could get involved and how collective effort will yield more diversification of the language and its use by today's generation.</p>
<p style="text-align: justify; ">The talk is available on Wikimedia Commons under a Creative Commons Share-Alike 4.0 license.</p>
<hr />
<h2>Video <br /> <iframe frameborder="no" height="450" scrolling="no" src="https://w.soundcloud.com/player/?url=https%3A//api.soundcloud.com/tracks/199183682&auto_play=false&hide_related=false&show_comments=true&show_user=true&show_reposts=false&visual=true" width="90%"></iframe></h2>
<p>
For more details visit <a href='http://editors.cis-india.org/openness/blog-old/second-national-language-conference-bhubaneswar'>http://editors.cis-india.org/openness/blog-old/second-national-language-conference-bhubaneswar</a>
</p>
No publishersubhaVideoOpennessOdia WikipediaAccess to Knowledge2015-04-10T15:23:02ZBlog EntryOdia Wikisource workshop at New Delhi
http://editors.cis-india.org/openness/blog-old/odia-wikisource-workshop-new-delhi-december-14-2014
<b>The Centre for Internet & Society's Access to Knowledge team in collaboration with "The Intellects" organized a seminar in New Delhi on December 14, 2014. Subhashish Panigrahi gave a talk.</b>
<p style="text-align: justify; ">The seminar was on the <a href="http://cis-india.org/news/relevance-of-bhagabat-tungi-in-evolution-of-odia-language">Relevance of Bhagabat Tungi in the evolution of Odia language from Buddha era to digital age</a>. After attending the event one of the participants Pankajmala Sarangi took great interest in <a class="external-link" href="http://cis-india.org/openness/blog/odia-wikisource-goes-live">Odia Wikisource</a> which was then an incubator project. Since then she has digitized three books and is now proofreading <a href="https://or.wikisource.org/wiki/%E0%AC%93%E0%AC%A1%E0%AC%BC%E0%AC%BF%E0%AC%86_%E0%AC%AD%E0%AC%BE%E0%AC%97%E0%AC%AC%E0%AC%A4">Odia Bhagabata</a>, an Odia language classic from the 14th century. Having the <a href="https://or.wikisource.org/wiki/%E0%AC%AC%E0%AC%BF%E0%AC%B6%E0%AD%87%E0%AC%B7:%E0%AC%85%E0%AC%AC%E0%AC%A6%E0%AC%BE%E0%AC%A8/Pmsarangi">highest </a>number of edits in <a class="external-link" href="http://or.wikisource.org/wiki/%E0%AC%AA%E0%AD%8D%E0%AC%B0%E0%AC%A7%E0%AC%BE%E0%AC%A8_%E0%AC%AA%E0%AD%83%E0%AC%B7%E0%AD%8D%E0%AC%A0%E0%AC%BE">Odia Wikisource</a>, Ms. Sarangi took interest to build a community in Delhi. Another Odia Wikilibrarian <a href="https://or.wikisource.org/wiki/%E0%AC%AC%E0%AC%BF%E0%AC%B6%E0%AD%87%E0%AC%B7:%E0%AC%85%E0%AC%AC%E0%AC%A6%E0%AC%BE%E0%AC%A8/Sitikantha_K">Sitikantha Kheti</a> also joined in to organise the first Odia Wikisource workshop in Delhi. These Wikimedians, a Delhi based group The Intellects and CIS-A2K collaboratively conducted a workshop.</p>
<p style="text-align: justify; ">The Intellect's president Debendra Rout addressed the participants and broadly spoke about the goal of the workshop and long term plans in Delhi. Both the Wikilibrarians shared their experience on Odia Wikisource. The workshop started with self introduction of the participants followed by screening of a documentary "Odia: Silalekharu Mobile".</p>
<hr />
<h2 style="text-align: justify; ">Video</h2>
<p><iframe frameborder="0" height="450" src="http://commons.wikimedia.org/wiki/File:Odia-Silalekharu_Mobile.webmhd.webm?embedplayer=yes" width="800"></iframe></p>
<hr />
<p style="text-align: justify; ">A <a href="https://commons.wikimedia.org/wiki/File:Odia_Wikisource_Handbook.pdf">handbook</a> with details on the project, Odia input and keyboard layout was distributed among all. Subhashish Panigrahi demonstrated Odia input and the process of digitization of books on Wikisource. Plans for more workshops and digitization sprints were also charted out.</p>
<p>
For more details visit <a href='http://editors.cis-india.org/openness/blog-old/odia-wikisource-workshop-new-delhi-december-14-2014'>http://editors.cis-india.org/openness/blog-old/odia-wikisource-workshop-new-delhi-december-14-2014</a>
</p>
No publishersubhaAccess to KnowledgeWikimediaWikipediaVideoOpennessOdia Wikipedia2014-12-30T01:08:00ZBlog EntryPrivacy vs. Transparency: An Attempt at Resolving the Dichotomy
http://editors.cis-india.org/openness/blog-old/privacy-v-transparency
<b>The right to privacy has been articulated in international law and in some national laws. In a few countries where the constitution does not explicitly guarantee such a right, courts have read the right to privacy into other rights (e.g., the right to life, the right to equal treatment under law and also the right to freedom of speech and expression).</b>
<hr />
<p><i>With feedback and inputs from Sumandro Chattapadhyay, Elonnai Hickok, Bhairav Acharya and Geetha Hariharan</i>. I would like to apologize for not providing proper citation to Julian Assange when the first version of this blog entry was published. I would also like to thank Micah Sifry for drawing this failure to his attention. The blog post originally published by Omidyar Network <a class="external-link" href="http://www.openup2014.org/privacy-vs-transparency-attempt-resolving-dichotomy/">can be read here</a>. Also see <a class="external-link" href="http://newint.org/features/2015/01/01/privacy-transparency/">http://newint.org/features/2015/01/01/privacy-transparency/</a></p>
<hr />
<p style="text-align: justify; ">In other countries where privacy is not yet an explicit or implicit right, harm to the individual is mitigated using older confidentiality or secrecy law. After the Snowden affair, the rise of social media and the sharing economy, some corporations and governments would like us to believe that “privacy is dead”. Privacy should not and cannot be dead, because that would mean that security is also dead. This is indeed the most dangerous consequence of total surveillance as it is technically impossible to architect a secure information system without privacy as a precondition. And conversely, it is impossible to guarantee privacy without security as a precondition.</p>
<p style="text-align: justify; ">The right to transparency [also known as the right to information or access to information] – while unavailable in international law – is increasingly available in national law. Over the last twenty years this right has become encoded in national laws – and across the world it is being used to hold government accountable and to balance the power asymmetry between states and citizens. Independent and autonomous offices of transparency regulators have been established. Apart from increasing government transparency, corporations are also increasingly required to be transparent as part of generic or industry specific regulation in the public interest. For instance, India’s Companies Act, 2013, requires greater transparency from the private sector. Other areas of human endeavor such as science and development are also becoming increasingly transparent though here it is still left up to self-regulation and there isn’t as much established law. Within science and research more generally, the rise of open data accompanied the growth of the Open Access and citizen science movement.</p>
<p style="text-align: justify; ">So the question before us is: Are these two rights – the right to transparency and the right to privacy – compatible? Is it a zero-sum game? Do we have to sacrifice one right to enforce the other? Unfortunately, many privacy and transparency activists think this is the case and this has resulted in some conflict. I suggest that these rights are completely compatible when it comes to addressing the question of power. These rights do not have to be balanced against one another. There is no need to settle for a sub-optimal solution. <b>Rather this is an optimization problem and the solution is as follows: privacy protections must be inversely proportionate to power and as Julian Assange says transparency requirements should be directly proportionate to power.</b><a href="#fn*" name="fr*">[*] </a></p>
<p style="text-align: justify; ">In most privacy laws, the public interest is an exception to privacy. If public interest is being undermined, then an individual privacy can be infringed upon by the state, by researchers, by the media, etc. And in transparency law, privacy is the exception. If the privacy of an individual can be infringed, transparency is not required unless it is in the public interest. In other words, the “public interest” test allows us to use privacy law and transparency law to address power asymmetries rather than exacerbate them. What constitutes “public interest” is of course left to courts, privacy regulators, and transparency regulators to decide. Like privacy, there are many other exceptions in any given transparency regime including confidentiality and secrecy. Given uneven quality of case law there will be a temptation by the corrupt to conflate exceptions. Here the old common-law principle of “there is no confidence as to the disclosure of iniquity” – which prevents confidentiality law from being used to cover malfeasance or illegality – can be adopted in appropriate jurisdictions.</p>
<p style="text-align: justify; ">Around 10 years ago, the transparency movement gave birth to yet another movement – the open government data movement. The tension between privacy and transparency is most clearly seen in the open government data movement. The open government data movement in some parts of the world is dominated by ahistorical and apolitical technologists, and some of them seem intent on reinventing the wheel. In India, ever since the enactment of the Right to Information Act, 2003, 30 transparency activists are either killed, beaten or criminally intimidated every year. This is the statistic from media coverage alone. Many more silently suffer. RTI or transparency is without a doubt one of the most dangerous sectors within civil society that you could choose to work in. In contrast, not a single open data activist has ever been killed, beaten or criminally intimidated. I suspect this is because open data activists do not sufficiently challenge power hierarchies. Let us look a little bit closely at their work cycle. When a traditional transparency activist asks a question, that is usually enough to get them into trouble. When an open data activist publishes an answer [a dataset nicely scrubbed and machine readable, or a visualization, or a tool] they are often frustrated because nobody seems interested in using it. Often even the activist is unclear what the question is. This is because open data activist works where data is available. Open data activists are obsessed with big datasets, which are easier to find at the bottom of the pyramid. They contribute to growing surveillance practices [the nexus between Internet giants, states, and the security establishment] rather that focusing on sousveillance [citizen surveillance of the state, also referred to as citizen undersight or inverse surveillance]. They seem to be obsessed only with tools and technologies, rather than power asymmetries and injustices.</p>
<p style="text-align: justify; ">Finally, a case study to make my argument easier to understand – Aadhaar or UID, India’s ambitious centralized biometric identity and authentication management system. There are many serious issues with its centralized topology, proprietary technology, and dependence on biometrics as authentication factors – all of which I have written about in the past. In this article, I will explain how my optimization solution can be applied to the project to make it more effective in addressing its primary problem statement that corruption is a necessary outcome of power asymmetries in India.</p>
<p style="text-align: justify; ">In its current avatar – the Aadhaar project hopes to assign biometric-based identities to all citizens. The hope is that, by doing authentication in the last mile, corruption within India’s massive subsidy programmes will be reduced. This, in my view, might marginally reduce retail corruption at the bottom of the pyramid. It will do nothing to address wholesale corruption that occurs as subsidies travel from the top to the bottom of the pyramid. I have advocated over the last two years that we should abandon trying to issue biometric identities to all citizens, thereby making them more transparent to the state. Let us instead issue Aadhaar numbers to all politicians and bureaucrats and instead make the state more transparent to citizens. There is no public interest in reducing privacy for ordinary citizens – the powerless – but there are definitely huge public interest benefits to be secured by increasing transparency of politicians and bureaucrats, who are the powerful.</p>
<p style="text-align: justify; ">The Indian government has recently introduced a biometric-based attendance system for all bureaucrats and has created a portal that allows Indian citizens to track if their bureaucrats are arriving late or leaving early. This unfortunately is just bean counting [for being corrupt and being punctual are not mutually exclusive] and public access to the national portal was turned off because of legitimate protests from some of the bureaucrats. What bureaucrats do in office, who they meet, and which documents they process is more important than when they arrive at or depart from work. The increased transparency or reduced privacy was not contributing to the public interest.</p>
<p style="text-align: justify; ">Instead of first going after small-ticket corruption at the bottom of the pyramid, maximization of public interest requires us to focus on the top, for there is much greater ROI for the anti-corruption rupee. For example: constructing a digital signature based on audit trails that track all funds and subsidies as they move up and down the pyramid. These audit trails must be made public so that ordinary villagers can be supported by open data activists, journalists, social entrepreneurs, and traditional civil society in verification and course correction.</p>
<p style="text-align: justify; ">I hope open data activists, data scientists, and big data experts will draw inspiration from the giants of the transparency movement in India. I hope they will turn their attention to power, examine power asymmetries and then ask how the Aadhaar project can be leveraged to make India more rather than less equal.</p>
<h3 style="text-align: justify; ">Videos</h3>
<table class="plain">
<tbody>
<tr>
<th>
<p style="text-align: justify; ">Open Up? 2014: Risky Business: Transparency, Technology, Security, and Human Rights</p>
</th>
</tr>
<tr>
<td><iframe frameborder="0" height="315" src="http://www.youtube.com/embed/tDf8TFjxqiQ" width="560"></iframe></td>
</tr>
<tr>
<td><b>Open Up? 2014: Data Collection and Sharing: Transparency and the Private Sector</b></td>
</tr>
<tr>
<td><iframe frameborder="0" height="315" src="http://www.youtube.com/embed/lPHWkYZjqzo" width="560"></iframe></td>
</tr>
</tbody>
</table>
<p>The videos can also be watched on Vimeo:</p>
<ol>
<li><a class="external-link" href="http://vimeo.com/111729069">Open Up? 2014: Risky Business: Transparency, Technology, Security, and Human Rights </a></li>
<li><a class="external-link" href="http://vimeo.com/111748146">Open Up? 2014: Data Collection and Sharing: Transparency and the Private Sector </a></li>
</ol>
<hr />
<p>[<a href="#fr*" name="fn*">*</a>].<a class="external-link" href="http://prospect.org/article/real-significance-wikileaks">http://prospect.org/article/real-significance-wikileaks</a> “Transparency should be proportional to the power that one has.”</p>
<p>Read the presentation on Risky Business: Transparency, Technology, Security and Privacy made at the Pecha Kucha session <a href="http://editors.cis-india.org/openness/blog-old/risky-business.odp" class="internal-link">here</a>. (ODP File, 35 kb)</p>
<p style="text-align: justify; "><i>Disclaimer: The views, opinions, and positions expressed by the author(s) of this blog are theirs alone, and do not necessarily reflect the views, opinions, or positions of Omidyar Network. We make no representations as to accuracy, completeness, timeliness, suitability or validity of any information presented by individual authors of the blogs and will not be liable for any errors, omissions, or delays in this information or any losses, injuries or damages arising from its display or use.</i></p>
<p>
For more details visit <a href='http://editors.cis-india.org/openness/blog-old/privacy-v-transparency'>http://editors.cis-india.org/openness/blog-old/privacy-v-transparency</a>
</p>
No publishersunilPrivacyFeaturedVideoAadhaarOpennessOpen Access2015-03-08T06:26:21ZBlog EntryOdia Littérateur Ramakrushna Nanda's 4 Books Now Available Under a Creative Commons License
http://editors.cis-india.org/openness/blog-old/ramakrushna-nanda-four-books-under-cc-license
<b>Children literature in Odia language went through an ennoblement after the intervention of Ramakrushna Nanda's writings.</b>
<p style="text-align: justify; ">His poetry “<a class="external-link" href="http://en.wikipedia.org/wiki/Ahe_Dayamaya_Biswa_Bihari">Ahe Dayamaya Biswa Bihari</a>” has been sung in every school in Odisha. His work around Odia poetry, language and grammar, essays and encyclopaedia have been greatest resources for children for quite a few decades. CIS-A2K is honored to now bring four of his books under <a class="external-link" href="https://creativecommons.org/licenses/by-sa/4.0/">Creative Commons Share Alike</a> (CC-by-SA 4.0) license:</p>
<ol>
<li>Biswa Parihay (Encyclopaedia)</li>
<li>Lekhanira Pathasala (Grammar)</li>
<li>Bhabi Dekhantu (Compilation of essays)</li>
<li>Pausa Sandhyara Gapa (Compilation of stories)</li>
</ol>
<p>The larger plans after this is to bring these books online on <a href="http://or.wikisource.org/">Odia Wikisource</a> by scanning and digitizing them.</p>
<hr />
<h2>Video</h2>
<table class="plain">
<tbody>
<tr>
<td><a class="external-link" href="http://en.wikipedia.org/wiki/Ramakrushna_Nanda">Ramakrushna Nanda</a>'s son Prabhat Kumar Nanda and daughter-in-law Anasuya Nanda, speak about the journey of the children's magazine the “<i>Sansar</i>” and way forward for Odia Wikisource for today's generation.</td>
</tr>
<tr>
<td><iframe frameborder="0" height="315" src="http://www.youtube.com/embed/eyBwbXTOE1E" width="560"></iframe></td>
</tr>
</tbody>
</table>
<p>
For more details visit <a href='http://editors.cis-india.org/openness/blog-old/ramakrushna-nanda-four-books-under-cc-license'>http://editors.cis-india.org/openness/blog-old/ramakrushna-nanda-four-books-under-cc-license</a>
</p>
No publishersubhaAccess to KnowledgeWikimediaWikipediaVideoOpennessOdia Wikipedia2014-11-06T13:41:49ZBlog EntryBharat Majhi Writings Now Available Under a Creative Commons License
http://editors.cis-india.org/openness/blog-old/bharat-majhi-writings-now-available-under-cc-license
<b>Before the advent of Odia Wikisource becoming live, Centre for Internet and Society's Access to Knowledge (CIS-A2K) got in touch with notable Odia author Bharat Majhi for bringing his writings on the Internet.</b>
<p>Dr. Sailen Routray, Director, <a class="external-link" href="http://kiss.ac.in/">Kalinga Institute of Social Sciences</a> (KISS) (also an institutional partner of <a class="external-link" href="http://meta.wikimedia.org/wiki/India_Access_To_Knowledge">CIS-A2K</a>) played a key role in initiating a dialog with Mr. Majhi. Five of his books are now available under <a class="external-link" href="https://creativecommons.org/licenses/by-sa/4.0/">Creative Commons Share Alike 4.0 </a>(CC-by-SA 4.0) license:</p>
<ol>
<li>Agadhu Duari</li>
<li>Saralarekhaa</li>
<li>Murtikaara</li>
<li>Mahanagara Padya</li>
<li>Highwayre Kuhudi</li>
</ol>
<p style="text-align: justify; ">Bharat Majhi is a known name in Odia literary circle. His writings on societal structures in rural Odisha, the people, their life, aspiration and suffering have been critically acclaimed. These books also become the first Odia modern poetry books to be available under a CC-by-SA license and Mr. Majhi takes another leap of being the first Odia poet to release his literary work under CC-by-SA 4.0 license.</p>
<table class="plain">
<tbody>
<tr>
<th style="text-align: center; ">Video</th>
</tr>
<tr>
<td><iframe frameborder="0" height="450" src="http://commons.wikimedia.org/wiki/File:Odia_poet_Bharat_Majhi_reciting_poetry_from_his_first_book_Agadhu_Duari.webm?embedplayer=yes" width="800"></iframe></td>
</tr>
</tbody>
</table>
<p style="text-align: justify; ">In this video, Odia-language poet Bharat Majhi reciting a poem from his first book Agadhu Duari. He recently released 5 of his books under CC-by-SA 4.0 license by the efforts of Centre for Internet and Society's Access To Knowledge (CIS-A2K) and Kalinga Institute of Social Sciences (KISS).He also tells Subhashish Panigrahi about his dreams of poetry becoming a performing art coming true by it becoming more open. After other Odia author and poet Dr Jagannath Mohanty, Majhi is the first Odia poet to release poem online under CC-by-SA license and his poetry earn the title of the first Odia modern poetry under the same license.</p>
<p>
For more details visit <a href='http://editors.cis-india.org/openness/blog-old/bharat-majhi-writings-now-available-under-cc-license'>http://editors.cis-india.org/openness/blog-old/bharat-majhi-writings-now-available-under-cc-license</a>
</p>
No publishersubhaAccess to KnowledgeWikimediaWikipediaVideoOpennessOdia Wikipedia2014-11-07T15:34:38ZBlog EntryAnvar v. Basheer and the New (Old) Law of Electronic Evidence
http://editors.cis-india.org/internet-governance/blog/anvar-v-basheer-new-old-law-of-electronic-evidence
<b>The Supreme Court of India revised the law on electronic evidence. The judgment will have an impact on the manner in which wiretap tapes are brought before a court. </b>
<p>Read the original <a class="external-link" href="http://notacoda.net/2014/09/25/anvar-v-basheer-and-the-new-old-law-of-electronic-evidence/">published by Law and Policy in India</a> on September 25, 2014.</p>
<hr />
<h3>The case</h3>
<p style="text-align: justify; ">On 18 September 2014, the Supreme Court of India delivered its judgment in the case of <a href="https://www.google.co.in/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&uact=8&ved=0CBwQFjAA&url=http%3A%2F%2Fjudis.nic.in%2Fsupremecourt%2Fimgs1.aspx%3Ffilename%3D41931&ei=D6sjVOaeL8njuQSM7YDYAQ&usg=AFQjCNGzIq7qaNntgpFmwprehVy3D__AAA&bvm=bv.76247554,d.c2E" target="_blank"><i>Anvar</i> v. <i>P. K. Basheer</i></a> (Civil Appeal 4226 of 2012) to declare new law in respect of the evidentiary admissibility of the contents of electronic records. In doing so, Justice Kurian Joseph, speaking for a bench that included Chief Justice Rajendra M. Lodha and Justice Rohinton F. Nariman, overruled an earlier Supreme Court judgment in the 1995 case of <a href="http://indiankanoon.org/doc/1769219/" target="_blank"><i>State (NCT of Delhi)</i> v. <i>Navjot Sandhu alias Afsan Guru</i></a>(2005) 11 SCC 600, popularly known as the Parliament Attacks case, and re-interpreted the application of sections 63, 65, and 65B of the <a href="http://www.advocatekhoj.com/library/bareacts/indianevidence/index.php?Title=Indian%20Evidence%20Act,%201872" target="_blank">Indian Evidence Act, 1872</a> (“Evidence Act”). To appreciate the implications of this judgment, a little background may be required.</p>
<h3 style="text-align: justify; ">The hearsay rule</h3>
<p style="text-align: justify; ">The Evidence Act was drafted to codify principles of evidence in the common law. Traditionally, a fundamental rule of evidence is that oral evidence may be adduced to prove all facts, except documents, provided always that the oral evidence is direct. Oral evidence that is not direct is challenged by the hearsay rule and, unless it is saved by one of the exceptions to the hearsay rule, is inadmissible. In India, this principle is stated in <a href="http://www.advocatekhoj.com/library/bareacts/indianevidence/59.php?Title=Indian%20Evidence%20Act,%201872&STitle=Proof%20of%20facts%20by%20oral%20evidence" target="_blank">sections 59</a> and <a href="http://www.advocatekhoj.com/library/bareacts/indianevidence/60.php?Title=Indian%20Evidence%20Act,%201872&STitle=Oral%20evidence%20must%20be%20direct" target="_blank">60</a> of the Evidence Act.</p>
<p style="text-align: justify; ">The hearsay rule is both fundamental and complex; a proper examination would require a lengthy excursus, but a simple explanation should suffice. In the landmark House of Lords decision in <i>R</i> v. <i>Sharp</i> [1988] 1 All ER 65, Lord Havers – the controversial prosecutor who went on to become the Lord Chancellor – described hearsay as “<i>Any assertion other than one made by a person while giving oral evidence in the proceedings is inadmissible as evidence of any fact or opinion asserted.</i>” This definition was applied by courts across the common law world. <a href="http://www.legislation.gov.uk/ukpga/2003/44/section/114" target="_blank">Section 114</a> of the United Kingdom’s (UK) Criminal Justice Act, 2003, which modernised British criminal procedure, uses simpler language: “<i>a statement not made in oral evidence in the proceedings.</i>”</p>
<p style="text-align: justify; ">Hearsay evidence is anything said outside a court by a person absent from a trial, but which is offered by a third person during the trial as evidence. The law excludes hearsay evidence because it is difficult or impossible to determine its truth and accuracy, which is usually achieved through cross examination. Since the person who made the statement and the person to whom it was said cannot be cross examined, a third person’s account of it is excluded. There are a few exceptions to this rule which need no explanation here; they may be left to another post.</p>
<h3>Hearsay in documents</h3>
<p style="text-align: justify; ">The hearsay rule is straightforward in relation to oral evidence but a little less so in relation to documents. As mentioned earlier, oral evidence cannot prove the contents of documents. This is because it would disturb the hearsay rule (since the document is absent, the truth or accuracy of the oral evidence cannot be compared to the document). In order to prove the contents of a document, <a href="http://www.advocatekhoj.com/library/bareacts/indianevidence/61.php?Title=Indian%20Evidence%20Act,%201872&STitle=Proof%20of%20contents%20of%20documents" target="_blank">either primary or secondary evidence</a> must be offered.</p>
<p style="text-align: justify; ">Primary evidence of the contents of a document is the document itself [<a href="http://www.advocatekhoj.com/library/bareacts/indianevidence/62.php?Title=Indian%20Evidence%20Act,%201872&STitle=Primary%20evidence" target="_blank">section 62</a> of the Evidence Act]. The process of compelling the production of a document in court is called ‘discovery’. Upon discovery, a document speaks for itself. Secondary evidence of the contents of a document is, amongst other things, certified copies of that document, copies made by mechanical processes that insure accuracy, and oral accounts of the contents by someone who has seen that document. <a href="http://www.advocatekhoj.com/library/bareacts/indianevidence/63.php?Title=Indian%20Evidence%20Act,%201872&STitle=Secondary%20evidence" target="_blank">Section 63</a> of the Evidence Act lists the secondary evidence that may prove the contents of a document.</p>
<p style="text-align: justify; ">Secondary evidence of documentary content is an attempt at reconciling the hearsay rule with the difficulties of securing the discovery of documents. There are many situations where the original document simply cannot be produced for a variety of reasons. <a href="http://www.advocatekhoj.com/library/bareacts/indianevidence/65.php?Title=Indian%20Evidence%20Act,%201872&STitle=Cases%20in%20which%20secondary%20evidence%20relating%20to%20documents%20may%20be%20given" target="_blank">Section 65</a> of the Evidence Act lists the situations in which the original document need not be produced; instead, the secondary evidence listed in section 63 can be used to prove its content. These situations arise when the original document (i) is in hostile possession; (ii) has been stipulated to by the prejudiced party; (iii) is lost or destroyed; (iv) cannot be easily moved, i.e. physically brought to the court; (v) is a public document of the state; (vi) can be proved by certified copies when the law narrowly permits; and (vii) is a collection of several documents.</p>
<h3 style="text-align: justify; ">Electronic documents</h3>
<p style="text-align: justify; ">As documents came to be digitised, the hearsay rule faced several new challenges. While the law had mostly anticipated primary evidence (i.e. the original document itself) and had created special conditions for secondary evidence, increasing digitisation meant that more and more documents were electronically stored. As a result, the adduction of secondary evidence of documents increased. In the <i>Anvar</i> case, the Supreme Court noted that “<i>there is a revolution in the way that evidence is produced before the court</i>”.</p>
<p style="text-align: justify; ">In India before 2000, electronically stored information was treated as a document and secondary evidence of these electronic ‘documents’ was adduced through printed reproductions or transcripts, the authenticity of which was certified by a competent signatory. The signatory would identify her signature in court and be open to cross examination. This simple procedure met the conditions of both sections 63 and 65 of the Evidence Act. In this manner, Indian courts simply adapted a law drafted over one century earlier in Victorian England. However, as the pace and proliferation of technology expanded, and as the creation and storage of electronic information grew more complex, the law had to change more substantially.</p>
<h3>New provisions for electronic records</h3>
<p style="text-align: justify; ">To bridge the widening gap between law and technology, Parliament enacted the <a href="http://www.vakilno1.com/bareacts/informationtechnologyact/informationtechnologyact.html" target="_blank">Information Technology Act, 2000</a> (“IT Act”) [official pdf <a href="http://www.dot.gov.in/sites/default/files/itbill2000_0.pdf" target="_blank">here</a>] that, amongst other things, created new definitions of “data”, “electronic record”, and “computer”. According to section 2(1)(t) of the IT Act, an electronic record is “<i>data, record or data generated, image or sound stored, received or sent in an electronic form or micro film or computer generated micro fiche</i>” (sic).</p>
<p style="text-align: justify; ">The IT Act amended <a href="http://www.advocatekhoj.com/library/bareacts/indianevidence/59.php?Title=Indian%20Evidence%20Act,%201872&STitle=Proof%20of%20facts%20by%20oral%20evidence" target="_blank">section 59</a> of the Evidence Act to exclude electronic records from the probative force of oral evidence in the same manner as it excluded documents. This is the re-application of the documentary hearsay rule to electronic records. But, instead of submitting electronic records to the test of secondary evidence – which, for documents, is contained in sections 63 and 65, it inserted two new evidentiary rules for electronic records in the Evidence Act: <a href="http://www.advocatekhoj.com/library/bareacts/indianevidence/65a.php?Title=Indian%20Evidence%20Act,%201872&STitle=Special%20provisions%20as%20to%20evidence%20relating%20to%20electronic%20record" target="_blank">section 65A</a> and <a href="http://www.advocatekhoj.com/library/bareacts/indianevidence/65b.php?Title=Indian%20Evidence%20Act,%201872&STitle=Admissibility%20of%20electronic%20records" target="_blank">section 65B</a>.</p>
<p style="text-align: justify; ">Section 65A of the Evidence Act creates special law for electronic evidence:</p>
<p style="padding-left: 30px; "><b><i>65A. Special provisions as to evidence relating to electronic record. –</i></b><i> </i><i>The contents of electronic records may be proved in accordance with the provisions of section 65B.</i></p>
<p style="text-align: justify; ">Section 65A of the Evidence Act performs the same function for electronic records that <a href="http://www.advocatekhoj.com/library/bareacts/indianevidence/61.php?Title=Indian%20Evidence%20Act,%201872&STitle=Proof%20of%20contents%20of%20documents" target="_blank">section 61</a> does for documentary evidence: it creates a separate procedure, distinct from the simple procedure for oral evidence, to ensure that the adduction of electronic records obeys the hearsay rule. It also secures other interests, such as the authenticity of the technology and the sanctity of the information retrieval procedure. But section 65A is further distinguished because it is a special law that stands apart from the documentary evidence procedure in sections 63 and 65.</p>
<p style="text-align: justify; "><a href="http://www.advocatekhoj.com/library/bareacts/indianevidence/65b.php?Title=Indian%20Evidence%20Act,%201872&STitle=Admissibility%20of%20electronic%20records" target="_blank">Section 65B</a> of the Evidence Act details this special procedure for adducing electronic records in evidence. Sub-section (2) lists the technological conditions upon which a duplicate copy (including a print-out) of an original electronic record may be used: (i) at the time of the creation of the electronic record, the computer that produced it must have been in regular use; (ii) the kind of information contained in the electronic record must have been regularly and ordinarily fed in to the computer; (iii) the computer was operating properly; and, (iv) the duplicate copy must be a reproduction of the original electronic record.</p>
<p style="text-align: justify; ">Sub-section (4) of section 65B of the Evidence Act lists additional non-technical qualifying conditions to establish the authenticity of electronic evidence. This provision requires the production of a certificate by a senior person who was responsible for the computer on which the electronic record was created, or is stored. The certificate must uniquely identify the original electronic record, describe the manner of its creation, describe the device that created it, and certify compliance with the technological conditions of sub-section (2) of section 65B.</p>
<h3 style="text-align: justify; ">Non-use of the special provisions</h3>
<p style="text-align: justify; ">However, the special law and procedure created by sections 65A and 65B of the Evidence Act for electronic evidence were not used. Disappointingly, the cause of this non-use does not involve the law at all. India’s lower judiciary – the third tier of courts, where trials are undertaken – is vastly inept and technologically unsound. With exceptions, trial judges simply do not know the technology the IT Act comprehends. It is easier to carry on treating electronically stored information as documentary evidence. The reasons for this are systemic in India and, I suspect, endemic to poor developing countries. India’s justice system is decrepit and poorly funded. As long as the judicial system is not modernised, India’s trial judges will remain clueless about electronic evidence and the means of ensuring its authenticity.</p>
<p style="text-align: justify; ">By bypassing the special law on electronic records, Indian courts have continued to apply the provisions of sections 63 and 65 of the Evidence Act, which pertain to documents, to electronically stored information. Simply put, the courts have basically ignored sections 65A and 65B of the Evidence Act. Curiously, this state of affairs was blessed by the Supreme Court in Navjot Sandhu (the Parliament Attacks case), which was a particularly high-profile appeal from an emotive terrorism trial. On the question of the defence’s challenge to the authenticity and accuracy of certain call data records (CDRs) that the prosecution relied on, which were purported to be reproductions of the original electronically stored records, a Division Bench of Justice P. Venkatarama Reddi and Justice P. P. Naolekar held:</p>
<p style="text-align: justify; padding-left: 30px; "><i>According to Section 63, secondary evidence means and includes, among other things, “copies made from the original by mechanical processes which in themselves ensure the accuracy of the copy, and copies compared with such copies”. Section 65 enables secondary evidence of the contents of a document to be adduced if the original is of such a nature as not to be easily movable. It is not in dispute that the information contained in the call records is stored in huge servers which cannot be easily moved and produced in the court. That is what the High Court has also observed at para 276. Hence, printouts taken from the computers/servers by mechanical process and certified by a responsible official of the service-providing company can be led into evidence through a witness who can identify the signatures of the certifying officer or otherwise speak to the facts based on his personal knowledge.</i></p>
<h3 style="text-align: justify; ">Flawed justice and political expediency in wiretap cases</h3>
<p style="text-align: justify; ">The Supreme Court’s finding in Navjot Sandhu (quoted above) raised uncomfortable questions about the integrity of prosecution evidence, especially in trials related to national security or in high-profile cases of political importance. The state’s investigation of the Parliament Attacks was shoddy with respect to the interception of telephone calls. The Supreme Court’s judgment notes in prs. 148, 153, and 154 that the law and procedure of wiretaps was violated in several ways.</p>
<p style="text-align: justify; ">The Evidence Act mandates a special procedure for electronic records precisely because printed copies of such information are vulnerable to manipulation and abuse. This is what the veteran defence counsel, Mr. Shanti Bhushan, pointed out in <i>Navjot Sandhu</i> [see pr. 148] where there were discrepancies in the CDRs led in evidence by the prosecution. Despite these infirmities, which should have disqualified the evidence until the state demonstrated the absence of <i>mala fide</i> conduct, the Supreme Court stepped in to certify the secondary evidence itself, even though it is not competent to do so. The court did not compare the printed CDRs to the original electronic record. Essentially, the court allowed hearsay evidence. This is exactly the sort of situation that section 65B of the Evidence Act intended to avoid by requiring an impartial certificate under sub-section (4) that also speaks to compliance with the technical requirements of sub-section (2).</p>
<p>When the lack of a proper certificate regarding the authenticity and integrity of the evidence was pointed out, this is what the Supreme Court said in pr. 150:</p>
<p style="text-align: justify; padding-left: 30px; "><i>Irrespective of the compliance of the requirements of Section 65B, which is a provision dealing with admissibility of electronic records, there is no bar to adducing secondary evidence under the other provisions of the Evidence Act, namely, Sections 63 and 65. It may be that the certificate containing the details in sub-section (4) of Section 65B is not filed in the instant case, but that does not mean that secondary evidence cannot be given even if the law permits such evidence to be given in the circumstances mentioned in the relevant provisions, namely, Sections 63 and 65.</i></p>
<p style="text-align: justify; ">In the years that followed, printed versions of CDRs were admitted in evidence if they were certified by an officer of the telephone company under sections 63 and 65 of the Evidence Act. The special procedure of section 65B was ignored. This has led to confusion and counter-claims. For instance, the 2011 case of <a href="http://indiankanoon.org/doc/1082001/" target="_blank"><i>Amar Singh</i> v. <i>Union of India</i></a> (2011) 7 SCC 69 saw all the parties, including the state and the telephone company, dispute the authenticity of the printed transcripts of the CDRs, as well as the authorisation itself. Currently, in the case of <i>Ratan Tata</i> v. <i>Union of India</i> Writ Petition (Civil) 398 of 2010, a compact disc (CD) containing intercepted telephone calls was introduced in the Supreme Court without following any of the procedure contained in the Evidence Act.</p>
<h3>Returning sanity to electronic record evidence, but at a price</h3>
<p style="text-align: justify; ">In 2007, the United States District Court for Maryland handed down a landmark decision in <a href="https://www.google.co.in/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&uact=8&ved=0CB4QFjAA&url=http%3A%2F%2Fwww.mdd.uscourts.gov%2Fopinions%2Fopinions%2Florraine%2520v.%2520markel%2520-%2520esiadmissibility%2520opinion.pdf&ei=LrEjVLTKEdLiuQTGvYHgAw&usg=AFQjCNEGlYKs3f11PxzwjmFccTUynlIVzA&bvm=bv.76247554,d.c2E" target="_blank"><i>Lorraine</i> v. <i>Markel American Insurance Company</i></a>241 FRD 534 (D. Md. 2007) that clarified the rules regarding the discovery of electronically stored information. In American federal courts, the law of evidence is set out in the <a href="http://www.law.cornell.edu/rules/fre" target="_blank">Federal Rules of Evidence</a>. <i>Lorraine</i> held when electronically stored information is offered as evidence, the following tests need to be affirmed for it to be admissible: (i) is the information relevant; (ii) is it authentic; (iii) is it hearsay; (iv) is it original or, if it is a duplicate, is there admissible secondary evidence to support it; and (v) does its probative value survive the test of unfair prejudice?</p>
<p style="text-align: justify; ">In a small way, <i>Anvar</i> does for India what <i>Lorraine</i> did for US federal courts. In <i>Anvar</i>, the Supreme Court unequivocally returned Indian electronic evidence law to the special procedure created under section 65B of the Evidence Act. It did this by applying the maxim <i>generalia specialibus non derogant</i> (“the general does not detract from the specific”), which is a restatement of the principle <i>lex specialis derogat legi generali</i> (“special law repeals general law”). The Supreme Court held that the provisions of sections 65A and 65B of the Evidence Act created special law that overrides the general law of documentary evidence [see pr. 19]:</p>
<p style="text-align: justify; "><i>Proof of electronic record is a special provision introduced by the IT Act amending various provisions under the Evidence Act. The very caption of Section 65Aof the Evidence Act, read with Sections 59 and 65B is sufficient to hold that the special provisions on evidence relating to electronic record shall be governed by the procedure prescribed under Section 65B ofthe Evidence Act. That is a complete code in itself. Being a special law, the general law under Sections 63 and 65 has to yield.</i></p>
<p style="text-align: justify; ">By doing so, it disqualified oral evidence offered to attest secondary documentary evidence [see pr. 17]:</p>
<p style="text-align: justify; padding-left: 30px; "><i>The Evidence Act does not contemplate or permit the proof of an electronic record by oral evidence if requirements under Section 65B of the Evidence Act are not complied with, as the law now stands in India.</i></p>
<p style="text-align: justify; ">The scope for oral evidence is offered later. Once electronic evidence is properly adduced according to section 65B of the Evidence Act, along with the certificate of sub-section (4), the other party may challenge the genuineness of the original electronic record. If the original electronic record is challenged, <a href="http://www.advocatekhoj.com/library/bareacts/indianevidence/22a.php?Title=Indian%20Evidence%20Act,%201872&STitle=When%20oral%20admission%20as%20to%20contents%20of%20electronic%20records%20are%20relevant" target="_blank">section 22A</a> of the Evidence Act permits oral evidence as to its genuineness only. Note that section 22A disqualifies oral evidence as to the contents of the electronic record, only the genuineness of the record may be discussed. In this regard, relevant oral evidence as to the genuineness of the record can be offered by the Examiner of Electronic Evidence, an expert witness under section 45A of the Evidence Act who is appointed under section 79A of the IT Act.</p>
<p style="text-align: justify; ">While <i>Anvar</i> is welcome for straightening out the messy evidentiary practice regarding electronically stored information that <i>Navjot Sandhu</i>had endorsed, it will extract a price from transparency and open government. The portion of <i>Navjot Sandhu</i> that was overruled dealt with wiretaps. In India, the wiretap empowerment is contained in <a href="http://indiankanoon.org/doc/1445510/" target="_blank">section 5(2)</a>of the <a href="http://indiankanoon.org/doc/357830/" target="_blank">Indian Telegraph Act, 1885</a> (“Telegraph Act”). The Telegraph Act is an inherited colonial law. Section 5(2) of the Telegraph Act was almost exactly duplicated thirteen years later by <a href="http://indiankanoon.org/doc/72724899/" target="_blank">section 26</a> of the Indian Post Office Act, 1898. When the latter was referred to a Select Committee, P. Ananda Charlu – a prominent lawyer, Indian nationalist leader, and one of the original founders of the Indian National Congress in 1885 – criticised its lack of transparency, saying: “<i>a strong and just government must not shrink from daylight</i>”.</p>
<p style="text-align: justify; ">Wiretap leaks have become an important means of discovering governmental abuse of power, corruption, and illegality. For instance, the massive fraud enacted by under-selling 2G spectrum by A. Raja, the former telecom minister, supposedly India’s most expensive corruption scandal, caught the public’s imagination only after taped wiretapped conversations were leaked. Some of these conversations were recorded on to a CD and brought to the Supreme Court’s attention. There is no way that a whistle blower, or a person in possession of electronic evidence, can obtain the certification required by section 65B(4) of the Evidence Act without the state coming to know about it and, presumably, attempting to stop its publication.</p>
<p><i>Anvar</i> neatly ties up electronic evidence, but it will probably discourage public interest disclosure of inquity.</p>
<h2>Video</h2>
<p><iframe frameborder="0" height="360" src="http://www.youtube.com/embed/n6V6BfdRorw?feature=player_embedded" width="400"></iframe></p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/blog/anvar-v-basheer-new-old-law-of-electronic-evidence'>http://editors.cis-india.org/internet-governance/blog/anvar-v-basheer-new-old-law-of-electronic-evidence</a>
</p>
No publisherbhairavVideoInternet GovernancePrivacy2014-12-04T15:53:01ZBlog EntryRe-Wiring Women's Rights Debates in the Digital Age
http://editors.cis-india.org/internet-governance/news/re-wiring-women-rights-debates-in-digital-age
<b>IT for Change in partnership with Kutch Mahila Vikas Sangathan and ANANDI organized this event on September 13 and 14, 2014. Rohini Lakshane participated as a speaker.
</b>
<p>Website:<br /> <a class="moz-txt-link-freetext" href="http://www.itforchange.net/ITfC_Course_Re-wiring_womens_rights/index.php/Agenda">http://www.itforchange.net/ITfC_Course_Re-wiring_womens_rights/index.php/Agenda</a><br /> <br /> Speakers List:<br /> <a class="moz-txt-link-freetext" href="http://www.itforchange.net/ITfC_Course_Re-wiring_womens_rights/index.php/Session_speakers">http://www.itforchange.net/ITfC_Course_Re-wiring_womens_rights/index.php/Session_speakers</a></p>
<hr />
<h3>Video</h3>
<table class="listing">
<tbody>
<tr>
<th><iframe frameborder="0" height="315" src="https://www.youtube.com/embed/vjSY1WUlLRw" width="560"></iframe></th>
</tr>
</tbody>
</table>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/news/re-wiring-women-rights-debates-in-digital-age'>http://editors.cis-india.org/internet-governance/news/re-wiring-women-rights-debates-in-digital-age</a>
</p>
No publisherpraskrishnaGenderVideoInternet GovernanceICT2015-02-12T17:07:32ZNews ItemRegion as Frame: Politics, Presence, Practice
http://editors.cis-india.org/news/region-as-frame-politics-presence-practice
<b>IAMCR's 2014 conference will take place in Hyderabad, India from 15-19 July. The conference theme is Region as Frame: Politics, Presence, Practice. The event is organized by International Association for Media and Communication Research.</b>
<p>Sunil Abraham is a speaker in the following panels:</p>
<ul>
<li>Governing Digital Spaces: Issues of Access, Privacy and Freedom (Friday, July 18, 2014, 11.00 - 12.30)</li>
<li>UNESCO panel debate (Friday, July 18, 2014, 12.30 - 14.00)</li>
<li>Special Session on Research Paths In and Outside of the Academy (Friday, July 18, 2014, 14.00 - 15.30)</li>
</ul>
<hr />
<p><a href="http://editors.cis-india.org/internet-governance/blog/iamcr-conference-2014.pdf" class="external-link">Click to download the brochure of the event here</a> (PDF 7.33 Mb)</p>
<h2>Video</h2>
<p><iframe frameborder="0" height="315" src="http://www.youtube.com/embed/WcfkSYxEOW0" width="560"></iframe></p>
<p>
For more details visit <a href='http://editors.cis-india.org/news/region-as-frame-politics-presence-practice'>http://editors.cis-india.org/news/region-as-frame-politics-presence-practice</a>
</p>
No publisherpraskrishnaVideo2014-09-09T09:26:50ZNews ItemThe Future of Cyber Governance
http://editors.cis-india.org/news/future-of-cyber-governance
<b>Hague Institute for Global Justice in association with the Observer Research Foundation, Ministry of Foreign Affairs of Netherlands, and the Netherlands Institute for International Relations - Clingendael organized a conference on the Future of Cyber Governance at the Hague from May 13 to 15, 2014. Sunil Abraham was a speaker at this event.</b>
<h2 style="text-align: justify; ">Global Governance Reform Initiative</h2>
<p style="text-align: justify; ">The Global Governance Reform Initiative (GGRI) seeks to overcome the challenges of global governance in three important domains – cyberspace, oceans and migration – by improving the efficiency, effectiveness and legitimacy of collective actions undertaken by relevant stakeholders.</p>
<p style="text-align: justify; ">The current focus of the GGRI is the governance of cyberspace. How cyberspace is governed has significant implications for a range of critical issues, from national security to the protection of individuals’ rights and freedoms. Yet, the governance of cyberspace is highly contested. Tensions exist between those who favour private sector-led, decentralized forms of governance, and those who favour state-led, centralized forms of governance. There is, therefore, a pressing need for practicable policies which can help balance competing demands effectively.</p>
<p style="text-align: justify; ">The conference is a platform for 17 outstanding academics and professionals representing a range of countries and sectors to present papers addressing key issues related to the governance of cyberspace. The authors were selected through a competitive application process which sought to balance the candidates’ professional and geographic backgrounds in a manner that would maximize the quality and policy-relevance of the research.</p>
<p style="text-align: justify; ">During the conference, the participants will present their papers to a select group of seasoned experts on cyber governance. These experts will provide the participants with constructive feedback on their research findings and policy recommendations. The aim of the conference is to allow the participants to engage in a rigorous analysis of the selected governance challenges in order to craft practicable policy recommendations aimed at improving the governance of cyberspace. The authors of the best papers will be invited to present their work at the 2014 India Conference on Cyber Security and Cyber Governance, organized by the Observer Research Foundation, New Delhi.<br />The Hague Institute undertakes this project in collaboration with the Netherlands Ministry of Foreign Affairs, the Observer Research Foundation (New Delhi), and the Netherlands Institute of International Relations – Clingendael.</p>
<hr />
<p style="text-align: justify; ">See the <a href="http://editors.cis-india.org/internet-governance/blog/global-governance-reform-initiative.pdf" class="internal-link">full details of the programme here</a>.</p>
<hr />
<h2>Video</h2>
<p><iframe frameborder="0" height="315" src="http://www.youtube.com/embed/dblYECIVHs8" width="360"></iframe></p>
<p>
For more details visit <a href='http://editors.cis-india.org/news/future-of-cyber-governance'>http://editors.cis-india.org/news/future-of-cyber-governance</a>
</p>
No publisherpraskrishnaVideoInternet Governance2014-05-27T10:05:43ZNews ItemPooja Tople on Wikimedia Projects
http://editors.cis-india.org/openness/blog-old/pooja-tople-wikipedia-projects
<b>The Centre for Internet and Society's Access to Knowledge team (CIS-A2K) in collaboration with the Goa University is working to build Konkani Wikipedia. As part of this program it organised the Konkani Vishwakosh Digitization Program recently.</b>
<h3>Video</h3>
<table class="plain">
<tbody>
<tr>
<th><iframe frameborder="0" height="320" src="http://commons.wikimedia.org/wiki/File:Wikipedians_speak_-_Participant_of_Konkani_Vishwakosh_Digitization_Project,_Pooja_Tople.webmhd.webm?embedplayer=yes" width="320"></iframe></th>
</tr>
<tr>
<td style="text-align: justify; ">Above: Participant of Konkani Vishwakosh Digitization Project, Pooja Tople, talks about her experiences with Wikimedia Projects</td>
</tr>
</tbody>
</table>
<p>
For more details visit <a href='http://editors.cis-india.org/openness/blog-old/pooja-tople-wikipedia-projects'>http://editors.cis-india.org/openness/blog-old/pooja-tople-wikipedia-projects</a>
</p>
No publishernitikaAccess to KnowledgeWikimediaWikipediaKonkani WikipediaVideoOpenness2013-12-31T11:04:59ZBlog EntryDarshana Mandrekar speaks on Konkani Wikipedia
http://editors.cis-india.org/openness/blog-old/darshana-mandrekar-on-konkani-wikipedia
<b>The Centre for Internet and Society's Access to Knowledge team (CIS-A2K) in collaboration with the Goa University is working to build Konkani Wikipedia. As part of this program it organised the Konkani Vishwakosh Digitization Program recently. </b>
<p style="text-align: justify; ">Darshana Mandrekar a participant at the Konkani Vishwakosh Digitization Program speaks about her inspiration to edit Konkani Wikipedia.</p>
<h3>Video</h3>
<table class="plain">
<tbody>
<tr>
<th><iframe frameborder="0" height="320" src="http://commons.wikimedia.org/wiki/File:Wikipedians_Speak_-_Konkani_Wikipedia_Editor,_Darshana_Mandrekar.webmhd.webm?embedplayer=yes" width="320"></iframe></th>
</tr>
<tr>
<td>Above: Darshana Mandrekar speaks about Konkani Wikipedia<br /></td>
</tr>
</tbody>
</table>
<p>
For more details visit <a href='http://editors.cis-india.org/openness/blog-old/darshana-mandrekar-on-konkani-wikipedia'>http://editors.cis-india.org/openness/blog-old/darshana-mandrekar-on-konkani-wikipedia</a>
</p>
No publishernitikaAccess to KnowledgeWikimediaWikipediaKonkani WikipediaVideoOpenness2013-12-31T10:38:07ZBlog EntryDarshan Kandolkar on Konkani Vishwakosh Digitization Process
http://editors.cis-india.org/openness/blog-old/darshan-kandolkar-konkani-vishwakosh-digitization-process
<b>The Centre for Internet and Society's Access to Knowledge team (CIS-A2K) in collaboration with the Goa University is working to build Konkani Wikipedia. As part of this program it organised the Konkani Vishwakosh Digitization Program recently.</b>
<p style="text-align: justify; ">Darshan Kandolkar, talks about his experience with Konkani Vishwakosh Digitization Process and Konkani translation sprint.</p>
<h3 style="text-align: justify; ">Video</h3>
<table class="plain">
<tbody>
<tr>
<th><iframe frameborder="0" height="320" src="http://commons.wikimedia.org/wiki/File:Wikipedians_speak_-_Konkani_Wikipedia_Editor,_Darshan_Kandolkar.webmhd.webm?embedplayer=yes" width="320"></iframe></th>
</tr>
<tr>
<td>Above: Darshan Kandolkar's interview on Konkani Wikipedia<br /></td>
</tr>
</tbody>
</table>
<p>
For more details visit <a href='http://editors.cis-india.org/openness/blog-old/darshan-kandolkar-konkani-vishwakosh-digitization-process'>http://editors.cis-india.org/openness/blog-old/darshan-kandolkar-konkani-vishwakosh-digitization-process</a>
</p>
No publishernitikaAccess to KnowledgeWikimediaWikipediaKonkani WikipediaVideoOpenness2013-12-31T10:47:46ZBlog EntryVarsha Kavlekar on Konkani Wikipedia Incubator
http://editors.cis-india.org/openness/blog-old/varsha-kavlekar-konkani-wikipedia-incubator
<b>The Centre for Internet and Society's Access to Knowledge team (CIS-A2K) in collaboration with the Goa University is working to build Konkani Wikipedia. As part of this program it organised the Konkani Vishwakosh Digitization Program recently.</b>
<p style="text-align: justify; ">Konkani Wikipedia Editor, Varsha Kavlekar, talks about her experience with Konkani Wikipedia Incubator.</p>
<h3 style="text-align: justify; ">Video</h3>
<table class="plain">
<tbody>
<tr>
<th><iframe frameborder="0" height="320" src="http://commons.wikimedia.org/wiki/File:Wikipedians_speak_-_Konkani_Wikipedia_Editor,_Varsha_Kavlekar.webmsd.webm?embedplayer=yes" width="320"></iframe></th>
</tr>
<tr>
<td>Above: Varsha speaks about Konkani Wikipedia<br /></td>
</tr>
</tbody>
</table>
<p>
For more details visit <a href='http://editors.cis-india.org/openness/blog-old/varsha-kavlekar-konkani-wikipedia-incubator'>http://editors.cis-india.org/openness/blog-old/varsha-kavlekar-konkani-wikipedia-incubator</a>
</p>
No publishernitikaAccess to KnowledgeWikimediaWikipediaKonkani WikipediaVideoOpenness2013-12-31T10:56:22ZBlog EntryPriyadarshini Tadkodkar on Konkani language
http://editors.cis-india.org/openness/blog-old/priyadarshini-tadkodkar-konkani-language
<b>CIS-A2K team interviewed Priyadarshini Tadkodkar about Konkani language. She speaks how editing/contributing to Konkani Wikipedia would help students.</b>
<p style="text-align: justify; ">Centre for Internet and Society's Access To Knowledge <a class="external-link" href="http://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Programme_Plan">(CIS-A2K) team</a> was there in <a class="external-link" href="http://www.unigoa.ac.in/">Goa University</a> to conduct a four day long Konkani Wikipedia workshop for the MA Konkani students. During these days Subhashish Panigrahi of CIS-A2K caught up with Dr. Priyadarshini Tadkodkar, Head, Konkani department of Goa University and asked about the brief history of Konkani language. In this video Dr. Tadkodkar shares the origin and movements that has affected Konkani, influence of other languages on it and the documentation process of the language. The Census Department of India, 2001 figures put the number of Konkani speakers in India as 2,489,015. Out of these, around 6 lakh were in Goa, 7 lakh in Karnataka, 3 lakh in Maharashtra, 6 lakh in Kerala and rest live outside of India, either as expatriates or citizens of other countries (NRIs).</p>
<hr />
<h3 style="text-align: justify; ">Video</h3>
<table class="plain">
<tbody>
<tr>
<th><iframe frameborder="0" height="315" src="http://www.youtube.com/embed/ZU67gw90EJo" width="520"></iframe></th>
</tr>
<tr>
<td>Above: Video of Priyadarshini Tadkodkar speaking on Konkani language<br /></td>
</tr>
</tbody>
</table>
<p>
For more details visit <a href='http://editors.cis-india.org/openness/blog-old/priyadarshini-tadkodkar-konkani-language'>http://editors.cis-india.org/openness/blog-old/priyadarshini-tadkodkar-konkani-language</a>
</p>
No publishersubhaAccess to KnowledgeWikimediaWikipediaKonkani WikipediaVideoOpenness2014-01-31T06:20:11ZBlog Entry