<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="http://editors.cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>http://editors.cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2871 to 2885.
        
  </description>
  
  
  
  
  <image rdf:resource="http://editors.cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/bill-could-kill-internet"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/sopa"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/ijlt-cis-lecture-series-report"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/broadband-long-way-to-go"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/write-stuff"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/book-of-jobs"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/announcement-of-wikimedia-india-program-trust"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/comments-on-finance-committee-statements"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/comments-national-policy-information-technology"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/events/droidcon-india"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/maids-guards-get-fingerprinted"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/netizen-report"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/bio-diversity-informatics-workshop"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/accessibility/e-accessibility-kit-in-russian"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/blocking-content-google-gets-more-requests"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="http://editors.cis-india.org/news/bill-could-kill-internet">
    <title>SOPA: The bill that could kill the Internet</title>
    <link>http://editors.cis-india.org/news/bill-could-kill-internet</link>
    <description>
        &lt;b&gt;As the US government’s House Judiciary Committee begins hearings on the proposed Stop Online Piracy Act, (SOPA), both supporters and opponents are ramping up their campaigning, with big names getting involved. And so they should. SOPA’s stakes are no less than the future of the Internet itself.&lt;/b&gt;
        
&lt;p&gt;The key problem with SOPA is that it seeks to allow any copyright holder to sever any website’s relationship with online advertising networks or credit card processing services, simply by pointing the finger. &lt;a class="external-link" href="http://arstechnica.com/tech-policy/news/2011/10/house-takes-senates-bad-internet-censorship-bill-makes-it-worse.ars"&gt;As Ars Technica explains&lt;/a&gt;:&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Calling its plan a “market-based system to protect US customers and prevent US funding of sites dedicated to theft of US property,” the new bill gives broad powers to private actors. Any holder of intellectual property rights could simply send a letter to ad network operators like Google and to payment processors like MasterCard, Visa, and PayPal, demanding these companies cut off access to any site the IP holder names as an infringer.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;[…] So long as the intellectual property holders include some “specific facts” supporting their infringement claim, ad networks and payment processors will have five days to cut off contact with the website in question.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;The bill also gives the government the power to get an injunction against foreign sites which would force ISPs to, within five days,&amp;nbsp; ”prevent access by its subscribers located within the United States to the foreign infringing site.” Essentially, it obliges ISPs to break their own DNS servers by filtering or redirecting users who try to access an accused site. It would also ban any tools which allow circumvention of such blocks.&lt;/p&gt;
&lt;p&gt;It doesn’t take a genius to see how this could be abused: An aggrieved party accuses a site of infringement, with or without reliable evidence, and suddenly that site can no longer accept credit cards or PayPal payments and its advertising revenue dries up completely. And we know that the IP industry isn’t &lt;a class="external-link" href="http://news.cnet.com/8301-31001_3-57323882-261/warner-bros-denies-abusing-dmca-in-hotfile-case/"&gt;above false accusations of copyright infringement&lt;/a&gt;. It’s not just business websites that could be affected, but &lt;a href="http://editors.cis-india.org/news/https//www.eff.org/deeplinks/2011/11/hollywood-new-war-on-software-freedom-and-internet-innovation" class="external-link"&gt;open source projects too&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://arstechnica.com/tech-policy/news/2011/11/republicans-democrats-google-and-church-of-sweden-unite-to-halt-hollywood.ars"&gt;Opponents currently include&lt;/a&gt; businesses such as&lt;a class="external-link" href="http://news.cnet.com/8301-31921_3-57325134-281/google-facebook-zynga-oppose-new-sopa-copyright-bill/"&gt; Google, Facebook, Zynga&lt;/a&gt;, eBay, Twitter, Yahoo!, AOL, and LinkedIn who, together, sent a letter; advocates such as the Electronic Frontier Foundation, Reporters Without Borders, and Human Rights Watch; as well as eleven members of the House of Representatives who have also written a letter to the House Judiciary Committee. Another letter from human rights groups includes &lt;strong&gt;India’s Centre for Internet and Society&lt;/strong&gt; as well as the Church of Sweden.&lt;/p&gt;
&lt;p&gt;There are also complaints that the House Judiciary Committee is trying to push the legislation through with undue haste.&lt;a class="external-link" href="http://www.pcworld.com/businesscenter/article/243917/lawmakers_seek_alternative_to_stop_online_piracy_act.html"&gt; Says PCWorld&lt;/a&gt;:&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Critics of the legislation also complained that the US House of Representatives Judiciary Committee appears to be fast-tracking the bill before opposition can build. At a 10 am hearing Wednesday, five of six witnesses are likely to speak in favor of SOPA, with only Google opposed. Witnesses the Motion Picture Association of America, trade union the AFL-CIO and pharmaceutical company Pfizer have all voiced support for the bill&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;No public interest groups, Internet engineers or human rights groups have been invited to the hearing, said Gigi Sohn, president of Public Knowledge, a digital rights group. “This is really being railroaded, without a full public debate,” she said&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;Indeed, the tone of the Committee’s so-called fact sheet, which lays out a series of ‘myths’ and ‘facts’, gives cause for concern, implying as it does that they have already decided which side of the fence they will land on. What is also disturbing is that the US Copyright Office — which as a part of the Library of Congress, one would expect to be impartial and evidence-led — &lt;a class="external-link" href="http://news.cnet.com/8301-31921_3-57325554-281/copyright-office-will-endorse-sopa-anti-piracy-bill/"&gt;will be offering an “unqualified endorsement&lt;/a&gt;“:&lt;/p&gt;
&lt;p&gt;“&lt;em&gt;It is my view that if Congress does not continue to provide serious responses to online piracy, the US copyright system will ultimately fail,” [Copyright Office director Maria] Pallante’s testimony says&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Pallante and representatives from Pfizer, the Motion Picture Association of America, the AFL-CIO, and Mastercard, all of whom support the bill, will be testifying tomorrow before the House Judiciary committee&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;For Americans who are unimpressed by this latest move from the content industries to control the Internet, there is a &lt;a class="external-link" href="http://www.devices.com/sendwrite.com/sopa/"&gt;letter writing campaign encouraging people to contact their congressperson&lt;/a&gt;. For non-Americans, Avaaz has set up a &lt;a class="external-link" href="http://www.avaaz.org/en/save_the_internet_d/?wfkAaab"&gt;Save the Internet petition&lt;/a&gt; which currently has 70,000 signatures and is racking up hundreds of new signatures every minute.&lt;/p&gt;
&lt;p&gt;There’s no doubt that tech journalists, free software advocates and digital rights campaigners and internet businesses worldwide will be glued to coverage of today’s Judiciary hearing. But, given the power of the copyright industry’s lobbying arms, it is hard to expect discussions to conclude satisfactorily. It may just be that the entire Internet will have to rely on the strength of the US Constitution, which SOPA may contravene, to save it.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;This article by Suw Charman-Anderson was published in Firspost.Technology on November 16, 2011&lt;/strong&gt;. &lt;strong&gt;The original can be read &lt;a class="external-link" href="http://www.firstpost.com/tech/sopa-the-bill-that-could-kill-the-internet-132765.html"&gt;here&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/bill-could-kill-internet'&gt;http://editors.cis-india.org/news/bill-could-kill-internet&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-11-18T07:26:30Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/sopa">
    <title> International human rights community vs SOPA</title>
    <link>http://editors.cis-india.org/news/sopa</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society was mentioned in a news story published in BoingBoing. Cory Doctorow wrote the story published on November 17, 2011.&lt;/b&gt;
        
&lt;p&gt;An enormous, diverse global coalition of press freedom and human rights groups have signed onto a letter (PDF) opposing America's Stop Online Piracy Act, the worst proposed Internet law in the USA's legislative history. Included signatories are as varied as India's Center for Internet and Society, the Church of Sweden, Colombia's Karisma, the UK Open Rights Group, and Reporters Without Borders. The letter itself is a great piece of writing: "This is as unacceptable to the international community as it would be if a foreign country were to impose similar measures on the United States." (&lt;em&gt;Thanks, Alan!&lt;/em&gt;)&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Read the original published in BoingBoing &lt;a class="external-link" href="http://boingboing.net/2011/11/17/international-human-rights-com.html"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/sopa'&gt;http://editors.cis-india.org/news/sopa&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-11-28T10:15:11Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/ijlt-cis-lecture-series-report">
    <title>The 2nd IJLT-CIS Lecture Series — A Post-event Report</title>
    <link>http://editors.cis-india.org/internet-governance/ijlt-cis-lecture-series-report</link>
    <description>
        &lt;b&gt;The Indian Journal of Law and Technology (IJLT) and the Centre for Internet and Society (CIS), organised the 2nd IJLT-CIS Lecture Series on the 21st and 22nd of May 2011 at the National Law School of India University, Nagarbhavi, Bangalore. The main theme for this year was Emerging Issues in Privacy Law: Law, Policy and Practice.&lt;/b&gt;
        
&lt;h3&gt;Speakers and Topics&lt;/h3&gt;
&lt;p&gt;Spread over two days, the National Law School hosted six speakers who held forth on the different aspects of privacy law, speaking from perspectives that were grounded in theory and actual practice and some that were India-centric while others applied equally to any jurisdiction.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Vivek Durai&lt;/strong&gt;, Partner, Atman Law Partners, addressed the gathering and gave the general introduction to the need for a discussion relating to privacy and the law. He spoke of technology and certain current events, including technological advances, have made privacy an issue with which serious engagement of the law has become imperative. &lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Usha Ramanathan&lt;/strong&gt;, an independent law researcher, spoke of the Unique Identity Project (Aadhar) launched by the Government of India and its implications on the privacy and data relating to the citizens. Ms. Ramanathan was critical of the Government’s plans on the basis that an ill-planned and executed project that sought to collect data such as this could provide easy fodder for data-mining. The latest 2011 rules that outline the relationship between the citizen and the state and the extent of privacy the citizen has in respect of this relationship.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Hamish Fraser&lt;/strong&gt;, a leading Australian practitioner in the field of technology law, addressed the gathering via video conference and spoke about cloud computing and privacy of parties using such facilities. He highlighted how technology such as cloud computing where the storage of data is almost fully virtual, with only the weakest of links to any physical storage space, were being increasingly widely used. He helped provide a practitioners perspective to the lecture as well by discussing how companies and individuals seeking to utilise cloud computing facilities, particularly for business purposes, must check for some essential legal provisions that would allow them to retain control over their data and prevent their data from being misappropriated by the provider of the virtual storage space in the cloud. He briefly also discussed the draft Australian privacy legislation.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Sean Blagsvedt&lt;/strong&gt;, founder of Baba Jobs, discussed the interplay between privacy and transparency and argued convincingly that under certain circumstances, transparency holds greater value than blind protection of privacy. He spoke of his experience in setting up Baba Jobs that seeks to act as a job portal-cum-social networking site for persons providing essential services such as plumbers, electricians, carpenters, house painters, etc. Rather than seeking to strictly protect the details and identity of these persons, Blagsvedt found that one of the most important factors for future employers while considering hiring such service personnel were the details of their previous assignments and testimonials from previous employers – the transparency that Baba Jobs offered became its USP. Blagsvedt talked of how a misplaced over-emphasis on privacy could often lead to greater detriments than benefits and prevent trust due to a lack of information. He concluded by predicting that as people increasingly shifted social and commercial transactions to the online world, the demands for privacy online would soon be offset by demands for greater transparency. &lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Sudhir Krishnaswamy&lt;/strong&gt;, Professor of Law at the Azim Premji University, Bangalore delivered a lecture on the state and privacy in India illustrating the development of the law on the matter. He also discussed about the balance that needs to be struck between the individual’s requirement for privacy and the state’s desire for secrecy. He also spoke about two manners in which to conceptualise privacy — recognising privacy as an inherent right that may be at times restricted to a certain extent, vis-a-vis seeing privacy as a right that the state grants to a citizen.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Abhayraj Naik&lt;/strong&gt;, Assistant Professor, Jindal Global Law School, Sonepat, gave a lecture on informational privacy in comparative contexts. The discussion centred on information surveillance in different jurisdictions and how the values attached to the attribution of information reflects in the laws relating to privacy in those different jurisdictions. His approach included mathematical modelling of information attribution and provided an interdisciplinary approach.&lt;/p&gt;
&lt;h3&gt;Participation&lt;/h3&gt;
&lt;p&gt;The lecture series saw registration from over 50 people, including students from law schools all over the country, practitioners, and even educators. Since the lectures were streamed live online, and this was only the second event in NLS to use this facility apart from the Annual Convocation, many more people listened to the lectures online. The lectures were available online for a period of one week after the conclusion of the lecture series.&lt;/p&gt;
&lt;h2&gt;IJLT-CIS Lecture Series 2011 Registration&lt;/h2&gt;
&lt;p&gt;The following people participated in the event:&lt;/p&gt;
&lt;p&gt;Adithya Banavar, Akanksha Arora, Anand VJ, Aniket Singhania, Ankit 
Verma, Anupama Kumar, Aparna Gokhale, Arjun Krishnamoorthy, Arjun 
Sharma, Arun Menon, Asif Ayaz, B. N. Vivek, Batool, Chirag Tanna, 
Deepakar Livingston.P., Deepthi R, Dheer Bhatnagar, Dinesh Subramany, 
Esha Goel, Gopalakrishnan R., J Suresh, Jamshed Ansari, Kanti Jadia, 
Khadeeja Nadeem, Khumtiya Debbarma, Mani Bhushan, Manish, Nayan Jain, 
Neha Baglani, Panduranga Acharya, Partha Chakravarty, Parul Bali, 
Prashanth Ramdas, Prateek Rath, Preyanka Sapru, Prianca Ravichander, 
Priytosh Singh, Purushotham.G, Ralph A, Ruhi Chanda, S. Badrinath, S. 
Bhushan, S. K. Mohanty, Sahana Manjesh, Sanjana Chappalli, Santosh 
Dindima, Shalini Iyengar, Shalini S, Sibani Saxena, Spoorthy M. S., 
Tarang Shashishekar, Tarun Kovvali, Tejaswini Rajkumar, Vaishali Kant, 
and Y. Shiva Santosh Kumar.&lt;/p&gt;
&lt;p&gt;See the &lt;a href="http://editors.cis-india.org/internet-governance/letter-of-agreement.pdf" class="internal-link" title="Letter of Agreement"&gt;Letter of Agreement&lt;/a&gt; [PDF, 1 MB]&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/ijlt-cis-lecture-series-report'&gt;http://editors.cis-india.org/internet-governance/ijlt-cis-lecture-series-report&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2011-11-17T10:25:56Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/broadband-long-way-to-go">
    <title>Broadband user base still has a long way to go</title>
    <link>http://editors.cis-india.org/news/broadband-long-way-to-go</link>
    <description>
        &lt;b&gt;Internet users in India have crossed the 100-million mark, still distant from China’s nearly 500 million and the 250 million or so in the US, but experts are buoyant about prospects in cyberspace even as low broadband penetration and poor online payment and distribution channels persist as hurdles.&lt;/b&gt;
        
&lt;p&gt;Abhishek Goenka, partner, BMR Advisors, who leads the firm’s real estate and information technology practice, agreed.&lt;br /&gt;
"While the over 100 million users comprise less than 10% of India’s 
population, it is 20-30% of the urban population, which is an exciting 
enough number," he said.&lt;br /&gt;
&lt;br /&gt;
India and China are strengthening their position in the global Internet ecosystem rapidly, a May 2011 McKinsey report had noted.&lt;br /&gt;
&lt;br /&gt;
"Both countries show growth rates of over 20%," said the report, even as
 it pegged the total (estimated) worldwide contribution of the Internet 
at $1.67 trillion (2.9% of total gross domestic product).&lt;br /&gt;
&lt;br /&gt;
It added that public expenditure on the Internet—including spending for 
consumption and investment by the government on software, hardware, 
services and telecoms—ranged widely from 5% of the total GDP 
contribution in India to more than 20% in the UK, the US, Brazil and 
Russia.&lt;br /&gt;
&lt;br /&gt;
Despite the optimism in the industry, there is a consensus that unless 
broadband numbers and speeds increase, meaningful commerce on the 
Internet will not happen in India.&lt;br /&gt;
&lt;br /&gt;
Broadband subscriber figures stood at a mere 12.69 million in August, 
according to the Telecom Regulatory Authority of India (Trai). In 
contrast, China had around 364 million broadband users (98.1% 
penetration) in 2010, according to InternetWorldStats.&lt;br /&gt;
&lt;br /&gt;
This has a bearing on growth—a 2009 World Bank report suggested that GDP
 expansion in developing countries gets a boost of 1.38 percentage 
points for every 10 percentage point increase in broadband penetration.&lt;br /&gt;
&lt;br /&gt;
An October 2011 report by Ericsson, Arthur D Little and Chalmers 
University of Technology in 33 Organisation of Economic Cooperation and 
Development (OECD) countries, confirmed that doubling the broadband 
speed increases GDP by 0.3% which, in the OECD region, is equivalent to 
$126 billion. The study also revealed that further doubling speed can 
yield growth in excess of 0.3%.&lt;br /&gt;
&lt;br /&gt;
Kartik Hosanagar, an associate professor at Wharton School of the 
University of Pennsylvania, and co-founder of Yodle Inc., agreed that 
the definition of broadband in India (256 kbps and above) should be 
upgraded to international standards (1 Mbps and above) while adding that
 the 100 million mark "is a very important number, since it provides a 
big enough market for large firms wanting to play in it".&lt;br /&gt;
&lt;br /&gt;
Sunil Abraham, executive director at the Centre For Internet and Society
 said the broadband volume was small and that India was not a big market
 like China.&lt;br /&gt;
&lt;br /&gt;
He rued that the government had not done enough to facilitate broadband 
adoption, the way it did for mobile phones. There were around 866 
million wireless connections till this August and 70% of them were 
active, according to Trai.&lt;br /&gt;
&lt;br /&gt;
Shree Parthasarathy, senior director, Enterprise Risk Services, Deloitte
 India, listed weaknesses in the 100 million-plus Internet user base, 
with most people still using it to check email and social sites.&lt;br /&gt;
&lt;br /&gt;
In the 30 urban cities where the survey was conducted, 89% use it to 
access email, 71% for social networking, 64% to search education-related
 content, 55% for chat and 49% to access video, music and images, 
according to the latest IAMAI report.&lt;br /&gt;
&lt;br /&gt;
Online transactions are not a significant part of this as yet. "It will 
increase in years to come, particularly when people begin to see more 
value in e-stores than brick and mortar stores," Parthasarathy said.&lt;br /&gt;
&lt;br /&gt;
Murthy of Pinstorm offered a different perspective—the reach of the 
Internet now rivals television, he said. "To reach an upscale audience 
in India, the Internet is now the only mass medium—TV is a niche medium 
here. This is a reversal of traditional roles."&lt;br /&gt;
&lt;br /&gt;
Goenka of BMR Advisors, however, said the comparison of Internet 
penetration with the reach of TV sets was unfair and that the two 
markets were very different. "TV units are also found in semi-urban and 
rural areas, whereas the 100 million Internet (users) are indicative of 
the spending powers of these users. It is a good indication for 
e-commerce companies."&lt;br /&gt;
&lt;br /&gt;
Analysts like Goenka of BMR Advisors and Raghav Anand, associate 
director, Ernst and Young India, contended that smartphones and 3G 
networks would accelerate the growth of the user base.&lt;br /&gt;
&lt;br /&gt;
“The 120 million Internet user base indicates that the run rate is good,
 and it could be 200 to 250 million in two to three years,” Anand said. 
“The numbers are significant and anyone looking at investing or scaling 
up should do it now. The growth rates are making Internet play very 
interesting.”&lt;br /&gt;
&lt;br /&gt;
Since 75% of the users are young, adult males, “it is a very attractive 
segment for advertisers also”, he said. Of the 250 million Internet 
users in three years that he predicts, “120-130 million would be through
 phones.&lt;/p&gt;
&lt;p&gt;This article by Leslie D’Monte &amp;amp; Deepti Chaudhary was originally published in &lt;strong&gt;Livemint&lt;/strong&gt; on 15 November 2011. It can be read &lt;a class="external-link" href="http://www.livemint.com/2011/11/14204650/Broadband-user-base-still-has.html?h=B"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/broadband-long-way-to-go'&gt;http://editors.cis-india.org/news/broadband-long-way-to-go&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2011-11-16T02:59:38Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/write-stuff">
    <title>The Write Stuff</title>
    <link>http://editors.cis-india.org/news/write-stuff</link>
    <description>
        &lt;b&gt;“Digital natives are no longer those youngsters who fit in the bracket of a Harvard return professional, glued to their PC all day,” says Nishant Shah, director of research, Centre for Internet and Society, a Bengaluru-based organisation. For Nishant, and many youngsters across the globe, digital natives are not any of those secluded geeks who spend hours on the Internet. “I am a homemaker, yet I am a digital native,” says Nilofer Ansher, a community manager who manages members from across three continents.&lt;/b&gt;
        
&lt;p&gt;A housewife, a young college graduate, a freelance writer, an NGO professional and many other individuals are behind the Internet activist flurry. Digital Natives, Fair Observer, PC Tech Magazine are just a few of the newsletters and forums that are connecting youngsters from across the globe and are mobilising them to do something beyond information gathering.&lt;/p&gt;
&lt;p&gt;Youth-related discussions, inventions in make-shift laboratories from the backyards of homes in Nigeria and action against corruption across the globe; these are just some of the activities that these netizens are involved in. “The idea was to build a network of people from across the globe who are passionate about what they do. We are not talking countries, it is all to do with people with similar interests,” says Shah, who collaborated with Hivos to create the online platform called Digital Natives.&lt;/p&gt;
&lt;p&gt;The members collaborate online to write about various issues. But these online movements can have serious repercussions, “In fact, Alaa Abdel-Fattah, one of Egypt’s most vocal activists and bloggers, has been detained. He is our team member. We are now running a campaign supporting his early release,” says Ansher who doubles up as a co-editor of one of these newsletters. Various discussions have led to solutions. “My first challenge was to create a communication system for illiterate farmers. But I wanted a definite solution. So another member from mobile active community sent a message and it worked and we are following the same system,” says Ajay Kumar, manager, ICT operations.&lt;/p&gt;
&lt;p&gt;This article was published in the Deccan Chronicle on 14 November 2011. It can be read &lt;a class="external-link" href="http://www.deccanchronicle.com/tabloid/all-rounders/write-stuff-655"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/write-stuff'&gt;http://editors.cis-india.org/news/write-stuff&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Natives</dc:subject>
    

   <dc:date>2011-11-14T03:32:00Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/book-of-jobs">
    <title>The Book of Jobs</title>
    <link>http://editors.cis-india.org/news/book-of-jobs</link>
    <description>
        &lt;b&gt;The man who made the computer personal, who changed the face of the digital media industry, who was inspired by Zen philosophy to create an eight-billion-dollar empire, Steve Jobs, died last month. Just a few weeks before his death, in the midst of his painful illness, he told Walter Isaacson, the man chosen to write his authorised biography, “I really want to believe that something survives”. And Isaacson wrote him a fairy tale which will make sure that Jobs will be remembered beyond the gizmos and gimmicks.&lt;/b&gt;
        
&lt;p&gt;The biography is an anecdote-filled tale, well told, even though familiar for having been told quite often. It gives you a glimpse of Jobs, who began his life as an adopted child who had discovered early in life that “he was smarter” than his parents. For those who think of Jobs as an icon of our times, the book is filled with delicious tidbits of a life that has been kept fiercely private: his relationships (the story of a 23-year-old woman who he got pregnant and abandoned), his friendships (including how he parted ways with his first business partner Steve Woznaik), his inspirations (how did the name Apple come about, and what exactly is a MacIntosh?), his confrontations (especially the rivalry with Bill Gates), and his roller-coaster ride with Apple (founder-president-poster-boy, who was sent into exile and welcomed back as reigning monarch). Some of the stories are a part of popular lore, some of them will surprise you, some will enthrall you, and yet others, harsh and unflinching, will give you a dekko into what being Steve Jobs meant. Especially to Steve Jobs.&lt;/p&gt;
&lt;p&gt;“Abandoned. Chosen. Special”. For Isaacson, these three concepts shape and define the life of Steve Jobs, and it might be a good idea to break this review under these three heads, only in the reverse order.&lt;/p&gt;
&lt;p&gt;Special: Isaacson, in his introduction, talks about how, following his biographies on Albert Einstein and Benjamin Franklin, he did not immediately see Jobs too as a figure at the intersection of technology and creativity, someone who changed the world. As he admits, it was only when Jobs revealed his fatal illness that Isaacson decided to join the throngs of people who have admired and accepted Jobs as “special”. But while many believe that Jobs changed the world by making the world of the digital seductive, accessible and friendly, Isaacson himself remains unconvinced. It is this lack of conviction that perhaps produces a jarring note in what would otherwise have been a fitting eulogy to a man who remained a bundle of paradoxes, who saw the world in neat binaries of “gods and shitheads”.&lt;/p&gt;
&lt;p&gt;Isaacson does a fantastic job of charting the histories that produced Jobs – the confluence of technology, creativity, hippie lifestyles, fruitarian diets and Zen philosophy that marked his formative decades. He captures the different temporalities, geographies, people and places marked with Jobs’ presence. And yet, when it comes to Jobs himself, there is a wariness, a reluctance to be sucked into his famous “reality distortion field”. Just when an interesting anecdote grabs your attention, Isaacson holds you down and states how special Jobs was. So even when he recounts the famous Xerox PARC raid that Jobs conducted, stealing the GUI (Graphical User Interface) technologies, Isaacson has to come to his rescue and point out that Jobs was a visionary. It tells us as much about history writing — the fact that it is written by winners — as&amp;nbsp;much about Isaacson’s own discomfort with his subject.&lt;/p&gt;
&lt;p&gt;Chosen: Steve Jobs believed throughout his life, even as he transformed from an LSD-consuming, acid-dropping hacker into one of the most notorious businessmen and advertisers in the world, that he was chosen to do something special. He saw himself as a rebel pitched against the big establishment (largely IBM) and till the end of his days, continued to believe in the idea that he was here to change the world — and hey, if messianic activities were accompanied with a multi-billion dollar industry, that’s just god working in mysterious ways, right?&lt;/p&gt;
&lt;p&gt;Isaacson suffers from Jobs’ “chosen” complex differently. He was singled out by Jobs to write this story. He saw himself as “suitably positioned” to tell the tale. And yet, because he brings to the table the keen reflexivity of a historian, he is uncomfortable with this chosen position. As a result, what you get is an extraordinarily rich set of resources which variously endorse, question, challenge and provide alternative viewpoints to the one expressed by Jobs. With more than 100 sources of interview, an incredibly rich survey of the literature about Apple and Jobs, and long hours spent in conversation with Jobs, Isaacson builds for us a book that might be loved or hated but can never be ignored. He goes into the controversies, digs out the dirt, ferrets out little-known encounters, fights and accusations that have hounded Jobs’ personal and professional life, and never hesitates to call a spade a spade, even if he sometimes finds the need to put a little glitter on it.&lt;/p&gt;
&lt;p&gt;Abandoned: Isaacson begins the book in a linear narrative, which, when describing Jobs’ early days, is easy because it takes the form of a pastiche, where different beginnings of people like Steve Woznaik, Bill Atkinson, Nolan Bushnell, Deborah Coleman, Mike Markkula, etc. intersect with Jobs’ life. However, in the second half of the book, especially when we see Jobs’ return to Apple and take over the reins, the book starts feeling abandoned. Isaascon seems overwhelmed by the material, where he has to take care not only of his multi-star ensemble but all the different less visible people — employees, shareholders, partners, enemies — and their reactions to and interactions with Steve Jobs. It was as if, with Next and Pixar on the verge of collapse and Jobs nearly bankrupt, Isaacson abandons his subject. He tries to gather the fairy dust that surrounds Jobs’ ascendance, but the narrative remains lacklustre. The rich anecdotes — Jobs stealing the idea of a tablet from a Microsoft employee — and wrenching interviews with Jobs’ final battles with illness remain, but somewhere the narrative momentum seems to have floundered, and unlike Jobs’ fortunes, never&amp;nbsp;pick up.&lt;/p&gt;
&lt;p&gt;All in all, Walter Isaacson’s Steve Jobs remains faithful to everything that one can expect of a biography of the true computing rock-star who shaped the collective futures of people. It is rigorous, honest, poignant and romantic. There will be many debates about how much Jobs’ reality distortion field affected Isaacson’s own rendering of his life. But those debates are futile. Because, despite the names, dates, figures, the agonising over-accurate perspectives and the attempt to write a history, the book , like Steve Jobs himself, is best read as a fairy tale — a mixture of the real, the imagined, the plausible, the probable and the possible.&lt;/p&gt;
&lt;p&gt;This article by Nishant Shah was published in the Indian Express on 12 November 2011. The original can be read &lt;a class="external-link" href="http://www.indianexpress.com/news/the-book-of-jobs/874689/0"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/book-of-jobs'&gt;http://editors.cis-india.org/news/book-of-jobs&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Books</dc:subject>
    

   <dc:date>2011-11-14T03:27:19Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/announcement-of-wikimedia-india-program-trust">
    <title>The Wikimedia India Program Trust</title>
    <link>http://editors.cis-india.org/news/announcement-of-wikimedia-india-program-trust</link>
    <description>
        &lt;b&gt;A new entity, the “Wikimedia India Program Trust”, has now been formed and registered (in Delhi.) This will be the organization that will eventually drive India programs and house the team in India.&lt;/b&gt;
        
&lt;p&gt;For some time, efforts have gone into creating an organization that would provide an appropriate structure to support Wikimedia program activities in India. &amp;nbsp;Aspects such as the current regulatory framework (regarding funding, taxation, etc.) as well as the legal protection for the India team have been considered to determine this structure. In this context, a host of options (e.g. subsidiary, branch, Section 25) were evaluated and a determination was made towards an independent non-profit public trust. Legal advice has been taken at every stage in this decision.&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Why an Independent Public Trust?&lt;/h3&gt;
&lt;p&gt;The Trust will provide an effective vehicle within India to marshal resources to support programs and partner with local institutions. The objective of the Trust is to promote the objectives of the Wikimedia movement and work closely with the Wikimedia community on various projects with an India focus. It is important to understand that the Trust will not have any editorial control over content on any of the Wikimedia projects. The Trust is a not for profit organization.&lt;/p&gt;
&lt;h3&gt;Introduction of Trustees&lt;/h3&gt;
&lt;p&gt;Trustees have been identified based upon their support for Wikimedia movement's principles and plans in addition to having reputations for good governance and management.&amp;nbsp;Sunil Abraham and Rahul Matthan have been requested to be the initial Trustees. &amp;nbsp;Both are friends of Wikipedia and have extensive experience.&lt;/p&gt;
&lt;p&gt;Sunil is Executive Director of the Centre for Internet &amp;amp; Society (CIS), is a long term advocate of free software and IP reform and has been supporting the Wikimedia community and movement for some time now.&lt;/p&gt;
&lt;p&gt;Rahul is a partner and heads the technology practice at Trilegal. He brings deep expertise and relationships that will be valuable for the Trust.&lt;/p&gt;
&lt;p&gt;These initial Trustees will serve for a term of three years at the maximum. &amp;nbsp;All additional or subsequent Trustees will serve on rotation in accordance with a trustee selection plan that will be prepared.&lt;/p&gt;
&lt;p&gt;Trustees will not be compensated for their services.&amp;nbsp;Governance, Funding, Financial Standards &amp;amp; Communications of the Trust.&amp;nbsp;The Trust will be governed by Trustees who will provide oversight and guidance regarding the operations and governance of the Trust.&amp;nbsp;Since the Trust is an independent organization, it will require funding for its operations which is in compliance with the legal and regulatory framework in India. It will seek funding from private donors within India as well as external sources.&lt;/p&gt;
&lt;p&gt;The Trust has the support of the Wikimedia Foundation which is a United States based non-profit foundation. However, in India all non-profit organizations need to be in existence for 3 years before they can receive funding from sources outside India. In the interim, they can apply for prior-permission under the FCRA regulations to help expedite the process. As a result, the Trust will shortly be applying for approval to receive funds from the Wikimedia Foundation in the future.&lt;/p&gt;
&lt;p&gt;As a Trust, we are required to have an independent external auditor. We have appointed KPMG. KPMG is experienced in auditing non-profit companies and are also auditors for the Wikimedia Foundation.&amp;nbsp;Annually, the Trust will publicly disclose it's independently audited financial statements.&lt;/p&gt;
&lt;p&gt;The Trust will publish a monthly newsletter outlining its current activities and future plans. This will commence in December 2011.&lt;/p&gt;
&lt;h3&gt;Operations of the Trust&lt;/h3&gt;
&lt;p&gt;The trust deed under which the Trust must operate clearly states that the purpose of the Trust is to independently promote the growth of volunteer activities within India in support of effective and unrestricted dissemination of free knowledge to the public.&amp;nbsp;Hisham will serve as the Executive Director of the Trust. Once it is possible, additional employees will be brought on to the Trust.&amp;nbsp;The Trust will eventually have an office in Delhi.&amp;nbsp;In the interim, a temporary office space has been set up to facilitate establishing the Trust and its mission. It is located at Top Floor, G-15, Hauz Khas, New Delhi - 110 016. It's a couple of minutes walk away from IIT Flyover and Hauz Khas Metro. Do drop in! It's a small but cozy place and we'd love to have you over!&lt;/p&gt;
&lt;h3&gt;Conclusion&lt;/h3&gt;
&lt;p&gt;We continue to make progress in setting up program activities to support the growth of Wikimedia in India. We have a long way to go, but are glad that we are starting to build a solid foundation.&amp;nbsp;The following link is for FAQs on this (and related) topics:&amp;nbsp;&lt;br /&gt;&lt;a class="external-link" href="http://goo.gl/8Rdr2"&gt;http://goo.gl/8Rdr2&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;As always, do reach out if you have any comments or questions.&lt;/p&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/announcement-of-wikimedia-india-program-trust'&gt;http://editors.cis-india.org/news/announcement-of-wikimedia-india-program-trust&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2011-11-13T07:58:38Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/comments-on-finance-committee-statements">
    <title>CIS Comments on Finance Committee Statements to Open Letters on Unique Identity</title>
    <link>http://editors.cis-india.org/internet-governance/comments-on-finance-committee-statements</link>
    <description>
        &lt;b&gt;We from the Centre for Internet and Society had sent six open letters to the Parliamentary Finance Committee on the UID. The Committee responded through an email on 12 October 2011. Our response to the points raised is reproduced below.&lt;/b&gt;
        
&lt;p&gt;Dear Members of the Finance Committee,&lt;/p&gt;
&lt;p&gt;Since January 2011, we have sent six open letters on the Unique Identity (UID) project to the Members of the Finance Committee. The Committee has responded through an email dated 12 October 2011. This letter is in reply to the points that were raised.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Finance Committee: "Comparison between SCOSTA and the UID project are not valid since SCOSTA is fundamentally a standard for smart card based authentication and does not work for the objectives of the UID project."&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;CIS&lt;/strong&gt;: We disagree with this statement. The UID Bill states that the aim of the project is to provide identification and authentication services. Biometric technology may be useful for identification. The seventh &amp;nbsp;open letter&amp;nbsp;&lt;a name="fr1" href="#fn1"&gt;[1]&lt;/a&gt;&amp;nbsp;that we sent to the Committee last week uses basic statistical analysis to demonstrate that the FPIR has to be 10−6 or a thousand-fold greater than the current level mandated by UIDAI procurement policy in order to achieve the project goal of building a national database of unique ID's. SCOSTA based smart card technology is more appropriate for the authentication of individuals because:&lt;a name="fr2" href="#fn2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Authentication will be based on asymmetric keys and perhaps pass-phrase or pin. This is known as public key infrastructure, and will allow a person to protect their authentication factor, and easily replace it if compromised.&lt;/li&gt;&lt;li&gt;Authentication through public key infrastructure does not depend on connectivity to a centralized network. This will allow for inclusion of unconnected populations.&amp;nbsp;&lt;/li&gt;&lt;li&gt;Authentication through public key infrastructure establishes mutual trust between citizen and state. Instead of only the citizen being made transparent to the state – the state is also made transparent to the citizens. This will lower the presence of fraudulent institutions and corrupt transactions.&amp;nbsp;&lt;/li&gt;&lt;li&gt;Connection to a centralized server is not required for only the authentication of an individual in a transaction. This will lower the cost of transactions and lower the IT overhead costs.&amp;nbsp;&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;&lt;strong&gt;Finance committee: "The UID project follows a different approach and has multiple objectives like providing identity to the residents of India, and ensuring inclusion of poor and marginalized residents in order to enable access to benefits and services."&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;CIS&lt;/strong&gt;: We disagree with this statement. Biometrics do not ensure the delivery of benefits. As mentioned in our third open letter,&lt;a name="fr3" href="#fn3"&gt;[3]&lt;/a&gt; in every transaction that requires the use of the biometric based UID number, there are four points where corruption is possible and delivery of services will not take place:&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;ul&gt;&lt;li&gt;The technology fails, and does not perform authentication. Lack of connectivity, electricity and non-lab conditions for biometric technology.&amp;nbsp;&lt;/li&gt;&lt;li&gt;The authority fails and delivers a false positive or false negative.&lt;/li&gt;&lt;li&gt;The local agency fails to deliver the service after authentication.&lt;/li&gt;&lt;li&gt;The biometric fails due to biological changes, and thus the individual is denied benefits.&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;Finance Committee: "Eliminating the fakes, duplicates and ghost identities prevalent in other databases."&amp;nbsp;&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&lt;br /&gt;&lt;strong&gt;CIS&lt;/strong&gt;: We disagree with this statement. Biometrics cannot eliminate fakes, duplicates and ghost identities. The deduplication algorithm only checks for uniqueness of biometric information. This can easily be defeated by a.) presenting a combination of two persons biometrics, b.) presenting the biometrics of foreign nationals collected remotely using the Internet, and c.) modifying biometric information using software tools like image editors. This is not a remote technological possibility since many registrars like banks have financial incentives for creating ghost identities for benami bank accounts. The deduplication algorithm and technology is completely black-box and has not been subject to any independent audit. Ideally research organisations like CIS should be provided legal immunity so that we can conduct independent audits of the deduplication technology and provide evidence for policy-makers. Since the deduplication technology has such a direct impact on the quality of citizenship – we recommend that the Finance Committee include proper independent audit provisions in the draft bill.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;Finance Committee: "Provide a platform for authentication in a cost effective and accessible manner."&amp;nbsp;&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&lt;br /&gt;&lt;strong&gt;CIS&lt;/strong&gt;: We disagree with this statement. As our first open letter&lt;a name="fr4" href="#fn4"&gt;[4]&lt;/a&gt; to the Finance Committee notes, biometrics are not appropriate authentication factors. In our opinion the dependency of biometrics on connectivity, deduplication, and centralized storage causes them to be more expensive than smart cards. The onus is upon the UIDAI to demonstrate that biometrics are cheaper than existing systems like magnetic cards used by credit card and debit card companies. If it was truly technologically and economically the better option, surely banks driven by such considerations would have adopted them many years ago.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;Finance Committee: "UIDAI is not issuing cards or smart cards."&amp;nbsp;&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;&lt;br /&gt;CIS&lt;/strong&gt;: We agree with the statement made and that is why it would be possible to defeat the UIDAI authentication system using fevicol and wax as demonstrated by security expert, Jude Terence D'Souza.&lt;a name="fr5" href="#fn5"&gt;[5]&lt;/a&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;Finance Committee: "Cards can be issued by agencies that are providing services."&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;CIS&lt;/strong&gt;: We agree with the statement made and that is why the UIDAI cannot claim the benefits of secure authentication. In other words, agencies providing smart cards will have a more secure authentication based on smart cards and sooner or later citizens will stop using the weaker authentication based on biometrics provided by the UIDAI.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;Finance Committee: "UID authentication does not exclude smart cards – service providers can still choose to issue smart cards to their beneficiaries or customers if they want to."&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&lt;br /&gt;&lt;strong&gt;CIS&lt;/strong&gt;: We agree with this statement but that makes the whole project redundant. If service providers are forced to issue smart cards to their customers, they will have to create separate databases of pins and keys for authentication. The service provider will not be able to authenticate users through the UID system.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;We are grateful to have received a response from the Finance Committee and look forward to more correspondence with the Committee. We would also be very grateful if the Committee could give us an opportunity to come to Delhi on our expense and testify before the committee on legal, technology and privacy related aspects of the project.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;Yours sincerely,&lt;/div&gt;
&lt;div&gt;Elonnai Hickok&amp;nbsp;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a name="fn1" href="#fr1"&gt;1&lt;/a&gt;].&lt;a class="external-link" href="http://goo.gl/93sl2"&gt;http://goo.gl/93sl2&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn2" href="#fr2"&gt;2&lt;/a&gt;].&lt;a class="external-link" href="http://goo.gl/ZrEQr"&gt;http://goo.gl/ZrEQr&lt;/a&gt;,&lt;a class="external-link" href="http://goo.gl/jHRvq"&gt;http://goo.gl/jHRvq&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn3" href="#fr3"&gt;3&lt;/a&gt;].&lt;a class="external-link" href="http://goo.gl/pW3Wi"&gt;http://goo.gl/pW3Wi&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn4" href="#fr4"&gt;4&lt;/a&gt;].&lt;a class="external-link" href="http://goo.gl/ZrEQr"&gt;http://goo.gl/ZrEQr&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn5" href="#fr5"&gt;5&lt;/a&gt;].&lt;a class="external-link" href="http://goo.gl/0z22h"&gt;http://goo.gl/0z22h&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/comments-on-finance-committee-statements'&gt;http://editors.cis-india.org/internet-governance/comments-on-finance-committee-statements&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2011-11-13T02:39:16Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/comments-national-policy-information-technology">
    <title>Comments on the National Policy of Information Technology</title>
    <link>http://editors.cis-india.org/internet-governance/comments-national-policy-information-technology</link>
    <description>
        &lt;b&gt;The NPIT 2011 has the laudable goal of making India a ‘knowledge economy with a global role’ by developing and deploying ICT solutions in all sectors to foster development within India and at a global level. The policy identifies several praiseworthy goals such as the promotion of open standards and open technologies, accessibility for persons with disabilities, affordable ICT services, transparency, accountability, technology development for Indian languages, placing data in public domain for use and value addition, using social media to engage with citizens and investing in indigenous R&amp;D and capacity building. We deeply appreciate this initiative of the Department of Information Technology and offer below brief comments to strengthen the draft.&lt;/b&gt;
        
&lt;h3&gt;Mission&lt;/h3&gt;
&lt;p&gt;It may be important to have one mission which is more citizen centric, for instance, to use ICT to empower and mainstream underprivileged sections of the population such as persons with disabilities, economically disadvantaged people, etc. All of the missions currently listed are related to making India an IT hub and around economic/commercial indicators and the focus on the human development aspect seems to be lacking.&lt;/p&gt;
&lt;h3&gt;Objectives&lt;/h3&gt;
&lt;p&gt;Objectives 8 and 9 which are dealing with government services could specifically mention accessibility. While access for persons with disabilities is covered in objective 12, it does not imply inherent accessibility of all government services, but merely an enablement of those which are required.&lt;/p&gt;
&lt;h3&gt;Enforcement Mechanism&lt;/h3&gt;
&lt;p&gt;While the policy has several commendable goals, there is little indication as to how it will be sought to be implemented. It would be helpful to have clear mention of the responsible authorities and execution mechanisms, including a mechanism for periodic review to ensure that all security, standards and quality guidelines and timelines are met.&lt;/p&gt;
&lt;h3&gt;Development of Language Technologies&lt;/h3&gt;
&lt;p&gt;Since the development of language technologies is extremely crucial to ensure that ICT access is possible for persons in both rural and urban areas, affordability should be stressed as a key aspect of this research and open source solutions may come out of public funded research.&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/comments-national-policy-information-technology'&gt;http://editors.cis-india.org/internet-governance/comments-national-policy-information-technology&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-11-09T10:28:31Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/events/droidcon-india">
    <title>Droidcon India, first Android Conference in Bangalore</title>
    <link>http://editors.cis-india.org/internet-governance/events/droidcon-india</link>
    <description>
        &lt;b&gt;HasGeek is happy to announce the forthcoming Droidcon India on the 18th and 19th of November 2011 at the MLR Convention Centre in Bangalore. Droidcon.com, Bangalore Android User Group, MobileMonday Bangalore, Medianama, Android Advices and the Centre for Internet and Society are the event partners.&lt;/b&gt;
        
&lt;p&gt;Droidcon is India’s first international Android conference and is part of the world’s largest series of Android conferences, with other editions in London, Bucharest (Romania), Brussels, Amsterdam and Berlin. Droidcon India is a response to the booming market for Android, which has seen sales increase by 888.88 per cent in 2010, and reach nearly 50 per cent market share worldwide.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Organized &lt;em&gt;by&lt;/em&gt; developers &lt;em&gt;for&lt;/em&gt; developers, the multi-track two day event will provide a rich variety of content for delegates by attracting the best speakers in the Android community. HasGeek expects the participation of over 400 delegates, including students, developers, UX and UI designers, and people with strong interests in the Android ecosystem, both from India and beyond.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The sessions will be presented in an informal environment that gives everyone a chance to be heard. The theme for the conference covers a range of topics that include building well designed apps, dealing with device diversity, performance optimization, NFC, Arduino, and usage in the Enterprise. For more details about session topics visit&amp;nbsp;&lt;a class="external-link" href="http://goo.gl/F9bEB"&gt;http://goo.gl/F9bEB&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;For registrations and tickets, visit&amp;nbsp;&lt;a class="external-link" href="http://goo.gl/pmXpJ"&gt;http://goo.gl/pmXpJ&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Following the first day conference on November 18, there will be an after party for this event which will be held at the CounterCulture restaurant.&lt;/p&gt;
&lt;p&gt;For more information on tickets and registrations, contact Zainab Bawa @&amp;nbsp;&lt;a class="external-link" href="mailto:zainab@hasgeek.in"&gt;zainab@hasgeek.in&lt;/a&gt;&amp;nbsp;or call @&amp;nbsp;+91 99454 73641.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/events/droidcon-india'&gt;http://editors.cis-india.org/internet-governance/events/droidcon-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event Type</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-11-24T04:17:12Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/maids-guards-get-fingerprinted">
    <title>‘Not mandatory’ but maids, guards get fingerprinted</title>
    <link>http://editors.cis-india.org/news/maids-guards-get-fingerprinted</link>
    <description>
        &lt;b&gt;The Cubbon Park police have begun profiling domestic help in their jurisdiction. Personal details will be stored in a database, which can be accessed by potential employers, writes Hemanth Kashyap in this article published in Bangalore Mirror on 9 November 2011. Sunil Abraham has been quoted in this article.&lt;/b&gt;
        
&lt;p&gt;It is the safety and security of the middle class versus individual rights of the 'lessers'. No guessing the victor in this battle. Recent crimes committed by household help seem to be enough justification for 'voluntary' profiling of maids, cooks, drivers, gardeners and watchmen. The brief of law-enforcing agencies is to keep the crime graph down, not get too involved in the procedural or sociological nitty-gritty. And in pursuit of this black-and-white objective, the city police have decided to go high-tech in this 'citizen-friendly' initiative.&lt;/p&gt;
&lt;p&gt;Though the police say it is a voluntary exercise, the job prospects of those who demur will obviously be affected. To start with, the Cubbon Park police — with the assistance of a tech firm which operates a website, the ‘us and them’-sounding hamarisuraksha.com — have visited a few buildings in their jurisdiction to profile the servants and security guards there. Personal details like the servant/guard's voter ID card, thumb impression and photograph have been fed into a database, which will be accessible to anyone. Cubbon Park inspector Badrinath is leading the exercise, which will be extended to other high-end localities in the central division.&lt;/p&gt;
&lt;p&gt;According to the cops, the background details on the website will make hiring a domestic help easy and risk-free. The cops feel such a system will also help servants with a clean record land a good job, not just in Bangalore but anywhere in the country. Employers will have to register with the website — one login ID will be given to one apartment complex — after which they can access details of existing or potential domestic help. Employers will also have to inform the cops after hiring a help.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;According to the police, the problem of hiring a reliable domestic help is particularly acute in a city like Bangalore, where thousands from all over the country land up every day in search of a job. There have been numerous cases of theft, robbery and even murder where the accused have fled the city or disguised their identity and continued to work in other households. In the absence of a database, tracking the accused in such cases becomes difficult, say the cops.&lt;/p&gt;
&lt;p&gt;Hamari Suraksha chief Ashwani Kumar Narula said, "It is a three-pronged effort involving the police, our website, and house, mall and security agency owners. The latter will give us the details of their employees and the info will be fed into a central database. A potential employer can, at the click of a mouse, do a background check before hiring a maid or watchman."&amp;nbsp;&lt;/p&gt;
&lt;p&gt;On Tuesday, a camp was held at Vasvani Apartments on St Mark's Road, and hundreds of housemaids, security guards and drivers came forward with their personal details. As it was very new to them, many were perturbed about giving their thumb impressions and photographs. But the police and the website volunteers explained the rationale of the exercise and assured them their details would not be misused.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;"This is the first time I am facing this situation. We are working here for years and have not done anything wrong. I feel bad. But the police explaint why they were doing it and I was relieved," said Leena, who works in Vaswani Apartments.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;"I am not at all worried. Everything depends on our work. If I am in the right, there will be no problem. The police are doing this for our convenience," said Shobha, another housemaid.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;"I am fine with this. I read in the newspapers about the thefts committed by servants, and this exercise by the police will be helpful even for us. I am from Meghalaya and people here don't know anything about me. If my details are on the website, it will be easier to hire me," said Vanmaan, a housemaid in Vaswani Apartments.&lt;/p&gt;
&lt;h3&gt;'Employers are also potential abusers'&lt;/h3&gt;
&lt;p&gt;"It is a voluntary move,” said a senior cop. But does refusal to be profiled immediately put a maid under suspicion or under the threat of unemployment, asked some. They were also worried about the leakage of such data.&lt;/p&gt;
&lt;p&gt;Vijay Menon of the Citizen's Action Forum, a major body of residents across the city, said, "You can collect fingerprints only under a specific law, and not demand fingerprints just because of their profession. It almost amounts to discrimination. I will definitely not be taking my maid for any kind of fingerprinting. Secondly, how safe is the privacy of this information? Why would I want to replicate that information with various stake-holders, increasing the risk of it being leaked?"&lt;/p&gt;
&lt;p class="callout"&gt;Sunil Abraham, executive director, Centre for Internet &amp;amp; Society, said, "I am worried more about the unrealistic power balance it will create. To begin with, the law does not permit this kind of profiling. The only exception to this rule is the National Population Registry, and now the UID. Second, we have had instances of maids being physically abused by their employers too. If you work on the principle that household help can be dangerous and potential thieves (so you want their fingerprints), then you should be collecting fingerprints of employers too because they also can be potential abusers."&lt;/p&gt;
&lt;p&gt;Residents’ welfare associations were almost unanimously positive about the move. N Mukund of the Jayanagar Welfare Association said, "It's a good beginning because security has become a major issue for residents. Despite maids having built a rapport with their employers in many homes, we have had instances of thefts. But it makes no sense to have electronic data in place if it cannot be accessed by my local police station, which doesn't even have an email address."&lt;/p&gt;
&lt;p&gt;Dr Radhakrishna of the Koramangala Residents’ Welfare Association said, "Most of these people do not have a permanent address. How do you address that problem? "&lt;/p&gt;
&lt;p&gt;Vivek Agarwal, of Mantri Sarovar Residents’ Welfare Association, Sarjapur, said, "Already, the household help has to be registered in the jurisdiction police station. If the police want to take it to the next level, I have no problem with it. We live in a huge apartment complex. Many of us are working professionals who need reliable and safe household help."&lt;/p&gt;
&lt;h3&gt;'Enact a law'&lt;/h3&gt;
&lt;div&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;span class="Apple-style-span"&gt;C V Nagesh, expert in criminal law, said as per law (Criminal Procedure Code), police have no right to force a person or section to give their fingerprints to the police if they are not involved in crimes.&amp;nbsp;He said the Cubbon Park police’s effort may be a good cause, but police have no blanket permission to collect fingerprints of servants and others if they are not into any crimes.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;"Law should be enacted, making servant-profiling mandatory and then police or any other agency can collect these details. Then, it becomes legal. If somebody is giving details voluntarily, it is not illegal," said Nagesh.&lt;/span&gt;&lt;/td&gt;
&lt;td&gt;&lt;img src="http://editors.cis-india.org/home-images/nagesh.jpg/image_preview" alt="nagesh" class="image-inline image-inline" title="nagesh" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;span class="Apple-style-span"&gt;T Sunil Kumar, Additional Commissioner of Police (Law and Order), said the police were not forcing anybody to give their fingerprints. "It’s absolutely voluntary on the part of servants, watchmen and others to part with their details. If somebody says he is not interested, we will not force that person."&lt;br /&gt;&lt;br /&gt;The officer said to check crimes involving these people, the police thought of having a database. So, they approached the resident welfare associations. "They (associations) are asking the servants to get the profile done. We are not asking anybody to come and mandatorily give details. But the law doesn’t stop people from voluntarily disclosing their details. The response is massive and there are not many complaints," he said.&lt;br /&gt;&lt;/span&gt;&lt;/td&gt;
&lt;td&gt;&lt;span class="Apple-style-span"&gt;&lt;img src="http://editors.cis-india.org/home-images/copy_of_sunil.jpg/image_preview" alt="sunilkumar" class="image-inline image-inline" title="sunilkumar" /&gt;&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/div&gt;
&lt;h3&gt;Recent crimes involving domestic help&lt;/h3&gt;
&lt;div&gt;
&lt;div&gt;&lt;strong&gt;October 7, 2011&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;Ashraf (26), a security guard killed Anasuya (42), a woman head cashier of a bank, by slitting her throat inside the lift of an apartment at Seshadripuram. He is absconding.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;July 25, 2009&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;Senior High Court advocate S S Naganand’s house in Sadashiv Nagar burgled, gold and diamond jewellery worth over Rs 80 lakh stolen. Police arrest his Gurkha watchman, Deerendar Bahaddur Thapa, and a gang of six Nepali guards and bust 44 cases in Yelahanka and surrounding areas.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;June 26, 2009&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;Jewellery worth Rs 18 lakh stolen from the house of former Infosys director and iGATE CEO Phaneesh Murthy’s upscale villa in Shobha-Lotus, a residential complex in Brooke fields area of Whitefield.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Police arrest his domestic help Shivalinge Gowda (24) and complex electrician Mohammed Ali (24) and recovred the goods from Ali’s sister’s house in Shimoga.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;February 16, 2009&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;Retired IISc professor and mathematician Purushottam Lal Sachdev, 71, his wife Rita, 62, and their son Munna, 35, are found murdered in their house on 80 Feet Road, RT Nagar. Police arrest his domestic help Deepak (36) his wife Suchitra (29) from West Bengal.&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Read the original story published in Bangalore Mirror &lt;a class="external-link" href="http://www.bangaloremirror.com/article/1/20111108201111082250578833d1063b8/%E2%80%98Not-mandatory%E2%80%99-but-maids-guards-get-fingerprinted.html"&gt;here&lt;/a&gt;&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/maids-guards-get-fingerprinted'&gt;http://editors.cis-india.org/news/maids-guards-get-fingerprinted&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2011-11-09T05:16:43Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/netizen-report">
    <title>Netizen Report: Transparency Edition</title>
    <link>http://editors.cis-india.org/news/netizen-report</link>
    <description>
        &lt;b&gt;Global Voices Online has carried a feature story, "Netizen Report: Transparency Edition". We at CIS had filed an RTI application about website blocking. This is reflected in this article by Rebecca MacKinnon which was posted online on 7 November 2011.&lt;/b&gt;
        
&lt;p&gt;Here at Global Voices Advocacy we believe that transparency by governments and companies about how and when censorship and surveillance takes place is a base-line requirement if the Internet is ever to be governed in a manner that is compatible with free expression, dissent, and citizens' right to organize and assemble. Thus we applaud Google's latest &lt;a class="external-link" href="http://www.google.com/transparencyreport/"&gt;Transparency Report &lt;/a&gt;- the company's fourth such report detailing government requests for user data and content removal, as well as the traffic flows (or lack thereof) to Google webistes across the world since July 2009. The new data for &lt;a class="external-link" href="http://www.google.com/transparencyreport/governmentrequests/#2011-06"&gt;January-June 2011 &lt;/a&gt;contains more detail than in the past, including data on how Google responded to the requests and whether they were honored. The data comes with a list of caveats including that automated content removal is not logged and that some data cannot be released due to local law. Nonetheless, we hope that Google's data will provide an interesting snap shot of the state of Internet affairs and the data could be used to hold governments accountable to their censorship activities. We believe that if all Internet companies disclosed similar data, the world would be further on its way to being a better place. Many articles have been written analyzing the data. A few of them include:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;TechPresident: &lt;a class="external-link" href="http://techpresident.com/blog-entry/google-data-shows-government-internet-surveillance-far-outstrips-wiretap-requests"&gt;Google Data Shows Government Internet Surveillance Far Outstrips Wiretap Requests&lt;/a&gt;&lt;/li&gt;&lt;li&gt;WIRED: &lt;a class="external-link" href="http://www.wired.com/threatlevel/2011/10/google-data-requests"&gt;U.S. Requests for Google User Data Spike 29 Percent in Six Months&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Huffington Post:The 13 Countries That Request The Most User Data From Google&lt;/li&gt;&lt;li&gt;CNet: &lt;a class="external-link" href="http://www.huffingtonpost.com/2011/11/01/google-user-data-countries-requests_n_1070313.html"&gt;Google: Governments seek more about you than ever&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;br /&gt;Adding to the publicly available data about censorship around the world, the Open Net Initiative has &lt;a class="external-link" href="http://opennet.net/blog/2011/11/oni-summarized-global-internet-filtering-data-now-available-download"&gt;released its research data on global Internet filtering&lt;/a&gt;, covering seventy-four countries.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Thuggery&lt;/strong&gt;: Read the latest news on GVA about bloggers jailed in Egypt, Syria, and Kuwait and spread the word.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Surveillance&lt;/strong&gt;: As &lt;a class="external-link" href="http://advocacy.globalvoicesonline.org/2011/10/10/bluecoat-us-technology-surveilling-syrian-citizens-online/"&gt;GVA&lt;/a&gt; and others have recently reported, 13 Internet filtering devices produced by the California-based company Blue Coat have made their way to &lt;strong&gt;Syria&lt;/strong&gt;.&amp;nbsp;&lt;a class="external-link" href="http://online.wsj.com/article/SB10001424052970203687504577001911398596328.html"&gt; According to the Wall Street Journal&lt;/a&gt;, Blue Coat executives say that the company will not sell the devices to countries that are under embargo by the United States, and that the devices found in Syria had been sold to a dealer who claimed they were destined for Iraq.&lt;/p&gt;
&lt;p&gt;The Wall Street Journal has had several other items related to the role of companies in global surveillance, including a report on how China's Huawei &lt;a class="external-link" href="http://online.wsj.com/article/SB10001424052970204644504576651503577823210.html"&gt;has been peddling &lt;/a&gt;its mobile phone tracking and censoring equipment to &lt;strong&gt;Iran&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;In &lt;strong&gt;India&lt;/strong&gt;, Research in Motion &lt;a class="external-link" href="http://online.wsj.com/article/SB10001424052970204505304577001592335138870.html#ixzz1cxcl5IIg"&gt;has set up a facility &lt;/a&gt;in Mumbai to help the Indian government carry out lawful surveillance of its BlackBerry services including the messenger chat service, but the WSJ reports that India still has no method to intercept and decode BlackBerry enterprise email.&lt;/p&gt;
&lt;p&gt;In &lt;strong&gt;Russia&lt;/strong&gt;, bloggers' influence &lt;a class="external-link" href="http://www.rferl.org/content/russian_bloggers_gain_prominence_kremlin_takes_notice/24357352.html"&gt;has apparently made the Kremlin nervous&lt;/a&gt;. Reporters Without Borders has condemned plans by the Russian government to deploy new software to track “extremist” content on the web, highlighting concerns about an over-broad definition of “extremist,” and the arbitrary and disproportionate approach to punishment and sanctions against websites. For more on the Russian Internet be sure to follow Global Voices' &lt;a class="external-link" href="http://globalvoicesonline.org/-/special/runet-echo/"&gt;Runet Echo Project&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Moving on the &lt;strong&gt;United States&lt;/strong&gt;, The Guardian has a &lt;a class="external-link" href="http://www.guardian.co.uk/technology/2011/nov/01/governments-hacking-techniques-surveillance"&gt;fascinating report &lt;/a&gt;on the super-secret Intelligence Support Systems World Americas conference held recently in Washington DC, at which surveillance professionals shared the latest surveillance technologies and innovations that they don't want you to know about. Hacktivist and friend of GVA &lt;a class="external-link" href="http://advocacy.globalvoicesonline.org/2009/12/14/interview-with-jacob-appelbaum-from-tor/"&gt;Jacob Appelbaum &lt;/a&gt;managed to get in, but was thrown out.&lt;/p&gt;
&lt;p&gt;On a more positive note in the &lt;strong&gt;United States&lt;/strong&gt;, the Washington Post reports that since 2009 many Internet companies &lt;a class="external-link" href="http://www.washingtonpost.com/world/national-security/fbi-going-to-court-more-often-to-get-personal-internet-usage-data/2011/10/25/gIQAM7s2GM_story.html?wpisrc=nl_headlines"&gt;have been more assertive &lt;/a&gt;about challenging “national security letters” from the FBI requesting information about users.&lt;/p&gt;
&lt;p&gt;The Guardian reports that Civil liberties and privacy groups in the &lt;strong&gt;United Kingdom&lt;/strong&gt; &lt;a class="external-link" href="http://www.guardian.co.uk/uk/2011/oct/30/metropolitan-police-mobile-phone-surveillance"&gt;have raised concerns &lt;/a&gt;about the deployment by the London Metropolitan Police of a "covert &lt;a class="external-link" href="http://www.guardian.co.uk/uk/surveillance"&gt;surveillance&lt;/a&gt; technology that can masquerade as a mobile phone network, transmitting a signal that allows authorities to shut off phones remotely, intercept communications and gather data about thousands of users in a targeted area."&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.techdirt.com/articles/20111021/11554216450/eu-politician-wants-internet-surveillance-built-into-every-operating-system.shtml"&gt;Techdirt reports &lt;/a&gt;on the &lt;strong&gt;European Union&lt;/strong&gt;'s desire to have a “black box' built in to operating systems that would store a record of all of the computer's internet usage. The EU argues that this ability would be useful in cracking down on child pornography.&amp;nbsp; The system that the EU is looking at as a possible candidate for role of ‘black box' is called LogBox. &lt;a class="external-link" href="http://www.fabioghioni.net/blog/2011/10/20/internet-e-l%E2%80%99arbitrio-assoluto-sui-dati-dei-service-provider-presentata-al-parlamento-l%E2%80%99iniziativa-per-un-sistema-di-controllo-sotto-garante/"&gt;The developer of LogBox &lt;/a&gt;claims that the device is for preserving the freedoms and privacy of internet users, although Techdirt points out the fact that this device does little to ‘protect' the privacy of online users, it in fact, would make anonymous actions on the internet much more difficult and would provide governments and law enforcement a huge set of data on every internet user.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Censorship&lt;/strong&gt;: The chief executives of &lt;strong&gt;China&lt;/strong&gt;'s 39 top Internet, telecom, and computer companies &lt;a class="external-link" href="http://www.ft.com/cms/s/09d9a5ba-0886-11e1-9fe8-00144feabdc0,Authorised=false.html?_i_location=http%3A%2F%2Fwww.ft.com%2Fcms%2Fs%2F0%2F09d9a5ba-0886-11e1-9fe8-00144feabdc0.html&amp;amp;_i_referer=http%3A%2F%2Fadvocacy.globalvoicesonline.org%2F2011%2F11%2F07%2Fnetizenreport-transparency%2F#axzz1cxn3nQD5"&gt;have agreed to &lt;/a&gt;“strengthen self-control, self-restraint and strict self-discipline” in order to “contain the tendency of spreading online rumours, pornography, fraud and other illegal, harmful information on the internet.” The move comes amidst a &lt;a class="external-link" href="http://www.voanews.com/english/news/asia/China-to-Tighten-Controls-on-Internet-Social-Media-133062308.html"&gt;broader crackdown &lt;/a&gt;on &lt;a class="external-link" href="http://www.nytimes.com/2011/10/27/world/asia/china-imposes-new-limits-on-entertainment-and-bloggers.html?_r=1"&gt;the Internet and social media&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;In &lt;strong&gt;India&lt;/strong&gt;, the Bangalore-based Centre for Internet and Society &lt;a href="http://editors.cis-india.org/internet-governance/blog/analysis-dit-response-2nd-rti-blocking" class="external-link"&gt;submitted a right to information request &lt;/a&gt;to the government's Department of Information Technology, asking for more information about website blocking. Based on &lt;a href="http://editors.cis-india.org/internet-governance/dit-response-2nd-rti-blocking" class="external-link"&gt;DIT's response &lt;/a&gt;the Centre observes that “The data provided by the government seemingly conflicts with the data released by the likes of Google." Their conclusion: "Either the DIT is not providing us all the relevant information on blocking, or is not following the law."&lt;/p&gt;
&lt;p&gt;Courts in &lt;a class="external-link" href="http://www.edri.org/edrigram/number9.19/belgium-isp-blocking-pirate-bay"&gt;&lt;strong&gt;Belgium&lt;/strong&gt;&lt;/a&gt; and&lt;a class="external-link" href="https://torrentfreak.com/finnish-isp-ordered-to-block-the-pirate-bay-111026/"&gt; &lt;strong&gt;Finland&lt;/strong&gt; &lt;/a&gt;have ordered ISPs to block the Pirate Bay.&lt;/p&gt;
&lt;p&gt;The &lt;strong&gt;U.S.&lt;/strong&gt; House Judiciary Committee has recently proposed a&lt;a class="external-link" href="http://judiciary.house.gov/hearings/pdf/112%20HR%203261.pdf"&gt; bill &lt;/a&gt;aimed at protecting intellectual property online that some critics describe as the &lt;a class="external-link" href="http://censorshipinamerica.com/2011/10/26/internet-censorship-protect-ip-renamed-e-parasites-act-would-create-the-great-firewall-of-america/"&gt;beginning of a "Great Firewall of America"&lt;/a&gt;.&lt;a class="external-link" href="https://www.eff.org/deeplinks/2011/10/disastrous-ip-legislation-back-%E2%80%93-and-it%E2%80%99s-worse-ever"&gt; The Electronic Frontier Foundation &lt;/a&gt;and others have detailed the bill's problems, including lack of due process, near certainty of over-blocking and abuse, imposition of excessive liability on Internet intermediaries, global legitimization of DNS censorship and potential fragmentation of the Internet, among other things. It is considered even worse than its evil fraternal twin in the Senate, the &lt;a class="external-link" href="https://secure.wikimedia.org/wikipedia/en/wiki/Protect_IP_Act"&gt;PROTECT IP Act &lt;/a&gt;which is also opposed by many tech companies and non-profit groups. Despite such opposition, the bill draws relatively &lt;a class="external-link" href="http://opinion.latimes.com/opinionla/2011/10/technology-a-bipartisan-attempt-to-regulate-the-internet.html"&gt;broad support from lawmakers&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Net Neutrality: South Africa&lt;/strong&gt;n technology journalist Jan Vermeulen ran the &lt;a class="external-link" href="http://mybroadband.co.za/news/broadband/36728-how-much-does-your-isp-shape-your-downloads.html"&gt;M-Lab's Glasnost Test on South African ISP's&lt;/a&gt; to see whether their stated bandwith shaping policies match up with reality.&lt;/p&gt;
&lt;p&gt;The growth of bandwidth intensive internet applications in South Korea has made Net Neutrality &lt;a class="external-link" href="http://koreajoongangdaily.joinsmsn.com/news/article/Article.aspx?aid=2943014"&gt;an important issue there&lt;/a&gt;. &lt;strong&gt;South Korea&lt;/strong&gt;n ISP's are reporting that it is becoming increasingly difficult to maintain neutral practices with content. The three largest telecommunications companies in Korea are worried by the rise of &lt;a class="external-link" href="http://www.samsung.com/us/smarttv/index.html?cid=ppc_smt_goo_Smart+TV+-+Awareness_Smart+TV_smart+tv&amp;amp;K_CLICKID=5b86c4c9-6936-eac8-bbe5-00004db65f45"&gt;Smart TV's&lt;/a&gt;, which use Internet connections as opposed to traditional cable or satellite links to provide content. The ISP's want to charge companies varying amounts depending on the type and amount of content sent.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Internet Governance&lt;/strong&gt;: ICANN held its &lt;a class="external-link" href="http://dakar42.icann.org/"&gt;42nd public meeting in Dakar, Senegal &lt;/a&gt;late last month. Wendy Seltzer &lt;a class="external-link" href="http://advocacy.globalvoicesonline.org/2011/11/05/icann-why-the-registrar-accreditation-agreement-matters-for-free-speech/"&gt;reported here on GVA &lt;/a&gt;why the seemingly arcane debates about domain name registrar accreditation is important. Konstantinos Komaitis, an active member of ICANN's &lt;a class="external-link" href="https://community.icann.org/display/gnsononcomstake/Home"&gt;Non-Commercial Stakeholder Group &lt;/a&gt;(Global Voices is also a member),&lt;a class="external-link" href="http://www.komaitis.org/1/post/2011/10/icann-41-the-fight-over-multistakeholderism.html"&gt; describes the struggle &lt;/a&gt;that is taking place took place between governments and other ICANN stakeholders over whether some stakeholders are more equal than others within ICANN's multi-stakeholder governance model.&amp;nbsp; Kieren McCarthy at dotNext also has an&lt;a class="external-link" href="http://news.dot-nxt.com/2011/10/24/governments-registrars-fight"&gt; in-depth report and analysis &lt;/a&gt;on the clash between governments and registrars over law enforcement regarding domain names. Over at the Internet Governance Project Milton Mueller &lt;a class="external-link" href="http://blog.internetgovernance.org/blog/_archives/2011/11/6/4934244.html"&gt;takes an in-depth look &lt;/a&gt;at the politics surrounding the Non-Commercial Stakeholder Group and related constituencies, and the fight for civil society representation at ICANN.&lt;/p&gt;
&lt;p&gt;India has &lt;a class="external-link" href="http://www.thehindu.com/sci-tech/internet/article2604526.ece"&gt;published a formal proposal &lt;/a&gt;to put the UN in charge of overseeing Internet governance. For different analyses by three Internet governance wonks see&lt;a class="external-link" href="http://news.dot-nxt.com/2011/10/27/india-proposes-government-control-internet"&gt; Kieren McCarthy&lt;/a&gt;, &lt;a class="external-link" href="http://blog.internetgovernance.org/blog/_archives/2011/10/29/4929042.html"&gt;Milton Mueller&lt;/a&gt;, and &lt;a class="external-link" href="http://igfwatch.org/discussion-board/indias-proposal-for-a-un-committee-for-internet-related-policies-cirp#mlYafW43YceAy1o6AicM_g"&gt;Jeremy Malcolm&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;The International Telecommunications Union has approved a new protocol for relaying biometric information. The protocol is intended to enable doctors to communicate data about patients safely and is geared towards developing countries where the access to medical care in rural areas is poor and communication between clinics and doctors would provide better patient care. You can read the full &lt;a class="external-link" href="http://www.itu.int/ITU-T/newslog/Using+Telecommunication+To+Transfer+Biometric+Information.aspx"&gt;press release here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Netizen Power&lt;/strong&gt;: Lee Yoo Eun at Global Voices reports that the October 26th Seoul mayoral election was swayed by the use of twitter. Read the &lt;a class="external-link" href="http://globalvoicesonline.org/2011/10/27/south-korea-tweeting-elections-against-all-odds/"&gt;full article here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;African entrepreneur Herman Chinery-Hesse gave a speech at the Tech 4 Africa conference highlighting what the rise of Internet Communication Technologies has done for Africa.&amp;nbsp; A synopsis of his talk can be found on the Tech4Africa.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sovereigns of Cyberspace&lt;/strong&gt;: Facebook has introduced a &lt;a class="external-link" href="https://threatpost.com/en_us/blogs/facebook-testing-guardian-angels-feature-getting-locked-accounts-102811"&gt;new “guardian angel” feature &lt;/a&gt;to help users restore locked accounts.&lt;/p&gt;
&lt;p&gt;The &lt;a class="external-link" href="http://www.edri.org/edrigram/number9.21/austrian-big-brother-awards-2011"&gt;13th Austrian Big Brother Awards &lt;/a&gt;were held on October 25th in Vienna. “Winners” included the CEO of Telekom Austria, the Ministers of Interior and Justice, and the head of the anti-terror police unit. Mark Zuckerberg received the “lifelong menace” award and a “Defender of Liberty” award went to the creators of the “&lt;a class="external-link" href="http://europe-v-facebook.org/"&gt;Europe versus Facebook&lt;/a&gt;” campaign.&lt;/p&gt;
&lt;p&gt;The&lt;a class="external-link" href="https://www.rightscon.org/"&gt; Silicon Valley Human Rights Conference &lt;/a&gt;was held in San Francisco in late October (see GVA's report, Jillian York's report, and The Economist's) and released the &lt;a class="external-link" href="http://www.rightscon.org/2011/10/silicon-valley-human-rights-standards/"&gt;Silicon Valley Standard&lt;/a&gt;, a set of 15 principles that technology companies should follow in order to protect human rights.&lt;/p&gt;
&lt;p&gt;China's Weibo &lt;a class="external-link" href="http://technode.com/2011/10/30/sina-weibo-launching-english-version-soon-with-the-partnership-of-flipboard-and-instagram/"&gt;plans to launch an English version &lt;/a&gt;in partnership with Flipboard and Instagram. Will they agree to follow the Silicon Valley Standard?&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Security Alert&lt;/strong&gt;: The security researcher Barnaby Jack has found it possible to conduct a &lt;a class="external-link" href="http://www.infosecurity-magazine.com/view/21601/barnaby-jack-hacks-diabetes-insulin-pump-live-at-hacker-halted/"&gt;blind attack on insulin pumps&lt;/a&gt;.&amp;nbsp; While there have been no reports of anyone being harmed by such an attack, this highlights how far behind security technologies are when it comes to wireless devices that are embedded in critical infrastructure and medicine.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Publications&lt;/strong&gt;:&lt;a class="external-link" href="http://themonkeycage.org/blog/2011/10/22/digital-cameras-reduce-electoral-corruption/"&gt; Digital Cameras Reduce Electoral Corruption &lt;/a&gt;by Michael Callen and James Long.&lt;/p&gt;
&lt;p&gt;Events: Check out this &lt;a class="external-link" href="https://www.google.com/calendar/embed?src=openinternetdigest%40gmail.com&amp;amp;ctz=America/New_York"&gt;handy calendar of Internet-related events&lt;/a&gt; around the world, courtesy of Internews!&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Access Contested: Security, Identity, and Resistance in Asian Cyberspace&lt;/em&gt;, by the OpenNet Initiative, to be officially released in December. Part I of the book (including a chapter by yours truly) can be read online or downloaded &lt;a class="external-link" href="http://citizenlab.org/2011/09/access-contested-is-now-available/"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Note: This report was compiled with considerable help from Ted Eby and Weiping Li.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Read the original article &lt;a class="external-link" href="http://advocacy.globalvoicesonline.org/2011/11/07/netizenreport-transparency/"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/netizen-report'&gt;http://editors.cis-india.org/news/netizen-report&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>RTI</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-11-09T04:31:48Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/bio-diversity-informatics-workshop">
    <title>Western Ghats Portal: Workshop on Biodiversity Informatics</title>
    <link>http://editors.cis-india.org/news/bio-diversity-informatics-workshop</link>
    <description>
        &lt;b&gt;The Western Ghats portal team is organising a one-day workshop to explore the contemporary state on biodiversity informatics on 25 November 2011 at Ashoka Trust for Research in Ecology and Environment (ATREE), Bangalore.&lt;/b&gt;
        
&lt;h2&gt;Schedule&lt;/h2&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;span class="Apple-style-span"&gt;09:00 – 09:20&lt;/span&gt;&lt;/td&gt;
&lt;td&gt;&lt;span class="Apple-style-span"&gt;Registration of participants&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;span class="Apple-style-span"&gt;09:20 – 09:30&lt;/span&gt;&lt;/td&gt;
&lt;td&gt;&lt;span class="Apple-style-span"&gt;Welcome / Introduction&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;span class="Apple-style-span"&gt;09:30 – 11:15&lt;/span&gt;&lt;/td&gt;
&lt;td&gt;&lt;span class="Apple-style-span"&gt;Plenary talks - Technology behind biodiversity informatics (3 talks)&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;span class="Apple-style-span"&gt;11:15 – 11:30&lt;/span&gt;&lt;/td&gt;
&lt;td&gt;&lt;span class="Apple-style-span"&gt;Tea break&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;span class="Apple-style-span"&gt;11:30 – 12:30&lt;/span&gt;&lt;/td&gt;
&lt;td&gt;&lt;span class="Apple-style-span"&gt;Plenary talks - Scientific commons and policy (2 talks)&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;span class="Apple-style-span"&gt;12:30 – 13:00&lt;/span&gt;&lt;/td&gt;
&lt;td&gt;&lt;span class="Apple-style-span"&gt;Discussion&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;span class="Apple-style-span"&gt;13:00 – 14:00&lt;/span&gt;&lt;/td&gt;
&lt;td&gt;&lt;span class="Apple-style-span"&gt;&amp;nbsp;Lunch break&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;span class="Apple-style-span"&gt;14:00 – 16:00&lt;/span&gt;&lt;/td&gt;
&lt;td&gt;&lt;span class="Apple-style-span"&gt;Biodiversity portals in India - Presentations by different teams/panel discussion&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;span class="Apple-style-span"&gt;16:00 – 16:15&lt;/span&gt;&lt;/td&gt;
&lt;td&gt;&lt;span class="Apple-style-span"&gt;Tea break&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;span class="Apple-style-span"&gt;16:15 – 17:00&lt;/span&gt;&lt;/td&gt;
&lt;td&gt;&lt;span class="Apple-style-span"&gt;Discussions and networking&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2&gt;Spheres of the Workshop:&lt;/h2&gt;
&lt;h3&gt;Plenary I: Technology behind biodiversity informatics - 0930 - 1115 hrs&lt;/h3&gt;
&lt;div&gt;
&lt;div&gt;&lt;strong&gt;Development of Information System, Open Data standards, Archive and Geospatial solutions,&amp;nbsp;Visualization in Bhuvan - Arul Raj&lt;/strong&gt;, National Remote Sensing Centre (NRSC), Indian Space&amp;nbsp;Research Organisation (ISRO) - 20 mins + 10 mins discussion&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;&lt;strong&gt;Exploring the semantic web for species pages - M. Sravanthi&lt;/strong&gt;, Western Ghats Portal - 20 mins +&amp;nbsp;10 mins discussion&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;&lt;strong&gt;Challenges on the emerging discipline of Biodiversity Informatics - Donald Hobern&lt;/strong&gt;, Atlas of&amp;nbsp;Living Australia - 30mins + 10 mins discussion&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;Focus&lt;/strong&gt;:&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;The objective of this session is to understand the global developments in biodiversity informatics in&amp;nbsp;relation with developments in India. The session will focus on:&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;ul&gt;&lt;li&gt;&amp;nbsp;the evolution of the discipline of biodiversity informatics and its current status&lt;/li&gt;&lt;li&gt;the development of standards in Indian context&lt;/li&gt;&lt;li&gt;the technologies for biodiversity informatics&lt;/li&gt;&lt;li&gt;the challenges in biodiversity informatics&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;&lt;strong&gt;Plenary II: Scientific commons and policy - 1130 - 1300 hrs&lt;/strong&gt;&lt;/h3&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;&lt;strong&gt;Commons in the context of Biodiversity Information - Danish Sheikh&lt;/strong&gt;, Alternative Law Forum - 20&amp;nbsp;mins + 10 mins&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;&lt;strong&gt;Open data in the scientific realm - Sunil Abraham&lt;/strong&gt;, Centre for Internet and Society - 20 mins + 10&amp;nbsp;mins&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;Discussion on Scientific commons and Policy - 30 mins&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;Focus&lt;/strong&gt;:&lt;br /&gt;
&lt;div&gt;The objective of the session is to understand the commons principle and its implications for scientific&amp;nbsp;research. The session will focus on:&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;&lt;li&gt;the experience of developing a creative commons policy in Indian scenario and the resulting impacts for scientific collaboration, open data and open access&lt;/li&gt;&lt;li&gt;policy and social implications of open data sharing&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;h3&gt;Plenary III - Biodiversity portals in India - 1400 - 1700 hrs&lt;/h3&gt;
&lt;div&gt;&lt;strong&gt;Moderation&lt;/strong&gt;: R. Prabhakar/ MD Madhusudhan&lt;br /&gt;&lt;strong&gt;Panelists&lt;/strong&gt;: (Introductory note by each of the panelists - 10 minutes each)&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;Suhel Quader&lt;/strong&gt;, Season Watch (&lt;a class="external-link" href="http://www.seasonwatch.in"&gt;www.seasonwatch.in&lt;/a&gt;), Migrant Watch (&lt;a class="external-link" href="http://www.migrantwatch.in"&gt;www.migrantwatch.in&lt;/a&gt;)&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;Sanjay Molur&lt;/strong&gt;, Pterocount (&lt;a class="external-link" href="http://www.pterocount.org/"&gt;www.pterocount.org/&lt;/a&gt;)&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;K.N.Ganeshaiah&lt;/strong&gt; - Indian Bioresource Information Network (www.ibin.co.in)&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;Ramesh BR&lt;/strong&gt; - Western Ghats Portal (&lt;a class="external-link" href="http://www.thewesternghats.in/"&gt;www.thewesternghats.in/&lt;/a&gt;)&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;Shwetank Verma&lt;/strong&gt;, Biodiversity of India, formerly Project Brahma (&lt;a class="external-link" href="http://www.biodiversityofindia.org"&gt;http://www.biodiversityofindia.org&lt;/a&gt;)&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;Krishnamegh Kunte&lt;/strong&gt;, ifoundbutterflies &lt;a class="external-link" href="http://ifoundbutterflies.org/"&gt;(http://ifoundbutterflies.org/&lt;/a&gt;)&lt;br /&gt;&lt;strong&gt;Vijay Barve&lt;/strong&gt;, DiversityIndia (&lt;a class="external-link" href="http://diversityindia.org/"&gt;http://diversityindia.org/&lt;/a&gt;)&lt;br /&gt;&lt;strong&gt;Deepak Menon&lt;/strong&gt;, India Water Portal (&lt;a class="external-link" href="http://www.indiawaterportal.org/"&gt;http://www.indiawaterportal.org/&lt;/a&gt;)&lt;br /&gt;&lt;strong&gt;Chitra Ravi&lt;/strong&gt;, India Biodiversity Portal (&lt;a class="external-link" href="http://indiabiodiversity.org/"&gt;http://indiabiodiversity.org/&lt;/a&gt;)&lt;br /&gt;&lt;strong&gt;Mr D.K Ved&lt;/strong&gt;, Foundation for Revitalisation of Local Health Traditions (&lt;a class="external-link" href="http://envis.frlht.org"&gt;http://envis.frlht.org&lt;/a&gt;)&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;Focus&lt;/strong&gt;:&lt;br /&gt;
&lt;div&gt;The objective of the session is to learn from each other’s experience and develop a combined vision&amp;nbsp;for the future of biodiversity informatics in India. The panelists will present a focused summary of the&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;ul&gt;&lt;li&gt;key features available on their portals&lt;/li&gt;&lt;li&gt;the experience of building the portal&lt;/li&gt;&lt;li&gt;the key lessons learnt&lt;/li&gt;&lt;li&gt;future plans&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;We believe these four aspects will be of common interest to all participants and the presentations are&amp;nbsp;expected to stimulate discussion around these four aspects.&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;Summary of the Day&lt;/strong&gt;: R Prabhakar - Call for synergy/collaboration/Thank you!!&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;h2&gt;Concept Note&lt;/h2&gt;
&lt;div&gt;
&lt;div&gt;Rapid advancements in the domains of computer Science and information technologies have allowed&amp;nbsp;integration of biodiversity information and analytical capabilities to collaborate on social networks,&amp;nbsp;leading to the emergence of a new discipline, Biodiversity Informatics. The dynamics in this discipline&amp;nbsp;are defined by integrating multiplicity with the semantic web and enabling of democratic social&amp;nbsp;networks focused on biodiversity. We are bound to see tremendous diversification in the scope of&amp;nbsp;biodiversity informatics globally and in India.&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;Harnessing technology for aggregating, storing, querying and analyzing biodiversity data has seen&amp;nbsp;major developments over the last decade. There has been a plethora of biodiversity information&amp;nbsp;resources that include mailing lists and discussions groups, occurrence records, geographical&amp;nbsp;databases, biodiversity image libraries, institutional databases, species description pages, specimen&amp;nbsp;records of herbaria and museum databases, and biodiversity focused Internet sites. The challenges&amp;nbsp;on the biodiversity informatics landscape are on two fronts: (1) A semantic web framework to link&amp;nbsp;these biodiversity information islands; and (2) Effective and flexible data exchange standards for&amp;nbsp;seamless information sharing among these sites.&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;The evolution of social networks and communities around biodiversity information systems has&amp;nbsp;been a unique factor in influencing the ways in which these information systems have developed.&amp;nbsp;The assimilation and aggregation of user-generated biodiversity data and dissemination under&amp;nbsp;the 'commons' principle has gained momentum globally. It has changed the way scientific&amp;nbsp;collaborations are being made, and created possibilities for effective citizen-science initiatives. It is&amp;nbsp;now possible to ask fresh questions, with more data, newer methods, better tools and for citizens to&amp;nbsp;participate and report data from different geographies. With this, local-level data can be integrated&amp;nbsp;with large-scale data leading to a better understanding of biodiversity.&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;With the increased penetration of the Internet into developing economies, and the widespread&amp;nbsp;adoption of web technologies, biodiversity informatics has spawned an impressive variety of&amp;nbsp;initiatives. These initiatives range from global knowledge bases and networks, national initiatives,&amp;nbsp;eco-region based initiatives, as well as sharply focused initiatives which address a single species or&amp;nbsp;event. There have been tangible advantages for stakeholders from these initiatives which has inspired&amp;nbsp;many other endeavours. Success stories exist at both global and local level, and learning from these&amp;nbsp;experiences can help one understand the multi-faceted nature of this discipline.&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;The Western Ghats Portal team is organising a one-day workshop to explore the contemporary state&amp;nbsp;of biodiversity informatics as expressed in three spheres: i) technology behind biodiversity informatics,&amp;nbsp;ii) scientific commons and policy and iii) biodiversity portals in India. With these objectives in mind,&amp;nbsp;we welcome your active participation during the workshop. It could provide an opportunity for us to&amp;nbsp;interact and learn from similar endeavors in this discipline.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Download the agenda &lt;a href="http://editors.cis-india.org/openness/wgp-agenda.pdf" class="internal-link" title="Western Ghats Portal Workshop in Bangalore"&gt;here&lt;/a&gt;&amp;nbsp;[PDF, 124 kb]&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/bio-diversity-informatics-workshop'&gt;http://editors.cis-india.org/news/bio-diversity-informatics-workshop&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Data</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2011-11-08T05:01:14Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/accessibility/e-accessibility-kit-in-russian">
    <title>e-Accessibility Policy Handbook for Persons with Disabilities (Russian Version)</title>
    <link>http://editors.cis-india.org/accessibility/e-accessibility-kit-in-russian</link>
    <description>
        &lt;b&gt;The e-Accessibility Policy Handbook for Persons with Disabilities is based upon the online ITU-G3ict e-Accessibility Policy Toolkit for Persons with Disabilities (www.e-accessibilitytoolkit.org) which was released in February 2010. This is the Russian translation of the same.&lt;/b&gt;
        
&lt;p&gt;The &lt;a class="external-link" href="http://g3ict.org/resource_center/e-Accessibility%20Policy%20Handbook"&gt;Toolkit&lt;/a&gt; and its companion handbook have contributions from more than 60 experts around the world on ICT accessibility and is a most valuable addition to policy makers and regulators, advocacy and research organisations and persons with disabilities on the implementation of the ICT dispositions of the CRPD.&lt;/p&gt;
&lt;p&gt;The handbook is a joint publication of ITU, G3ict and the Centre for Internet and Society, in cooperation with The Hans Foun­da­tion. The book is com­piled and edit­ed by Nir­mi­ta Narasimhan. Preface by Dr. Hamadoun I. Toure, Sec­re­tary-​Gen­er­al, In­ter­na­tion­al Telecom­mu­ni­ca­tion Union. Introduction by Dr. Sami Al-​Basheer, Di­rec­tor, ITU-D. Foreword by Axel Leblois, Ex­ec­u­tive Di­rec­tor, G3ict.&lt;/p&gt;
&lt;p&gt;UNIC Moscow (United Nations Information Centre - Moscow) has translated the English version of the kit to Russian. For more information on the translation initiative by UNIC Moscow,&lt;a class="external-link" href="http://www.unic.ru/news_inf/viewer.php?uid=164"&gt; click here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Download the Russian version &lt;a href="http://editors.cis-india.org/accessibility/e-accessibility-russian-handbook.pdf" class="internal-link" title="e-Accessibility Policy Handbook (Russian Version)"&gt;here&lt;/a&gt;&amp;nbsp;(PDF, 1045 kb)&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/accessibility/e-accessibility-kit-in-russian'&gt;http://editors.cis-india.org/accessibility/e-accessibility-kit-in-russian&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Books</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Publications</dc:subject>
    

   <dc:date>2012-04-26T10:04:08Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/blocking-content-google-gets-more-requests">
    <title>Blocking online content: Google gets more requests than govt</title>
    <link>http://editors.cis-india.org/news/blocking-content-google-gets-more-requests</link>
    <description>
        &lt;b&gt;Allowing a peek into what kind of information is requested to be blocked online and by who, the Department of Information Technology (DIT), in response to an RTI (Right to Information) query, has provided some intriguing details, says Pallavi Polanki in this article published in Firstpost.com on 2 November 2011.&lt;/b&gt;
        
&lt;p&gt;DIT lists names of bureaucrats, police officers and one politician who requested blocking content online as well as the websites they identified.&lt;/p&gt;
&lt;p&gt;In all, 68 individual items were requested to be blocked under the Information Technology (Procedure and Safeguards for Blocking Access of Information by Public) Rules 2009, to the DIT, which is the only authority mandated by the Information Technology Act 2000, to order blocking online content.&lt;/p&gt;
&lt;p&gt;Speaking to Firstpost, Pranesh Prakash, programme manager at the Centre for Internet and Society, Bangalore, who requested for the information under the RTI Act — and has posted it on a blog analysing the information received from DIT — said, "Information from a previous RTI application uncovered what all websites were officially blocked by the DIT, while this one uncovers what all website blocking requests the DIT received."&amp;nbsp;&lt;/p&gt;
&lt;p&gt;No prizes for guessing; pornographic sites topped the list of websites requested to be blocked. Mumbai’s Joint Commissioner of Police (Crime) listed 60 adult content sites in his request. However, the DIT doesn’t seem to have accepted the officer’s request. The sites remain accessible.&lt;/p&gt;
&lt;p style="text-align: left;"&gt;&lt;span class="Apple-style-span"&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="http://editors.cis-india.org/home-images/copy_of_google380.jpg/image_preview" alt="Google's 380" class="image-inline image-inline" title="Google's 380" /&gt;&lt;/td&gt;
&lt;td&gt;Haneef Ali, Andhra Pradesh State President of the Bharatiya Janata Minority Morcha, is the only politician on the list. He requested the blocking of a&amp;nbsp;&lt;a class="external-link" href="http://ashsyumul.blogspot.com/2009/12/penginaan-terhadap-islam.html"&gt;blogpost&lt;/a&gt;, the title of which translates to "insult against Islam".&lt;br /&gt;&lt;br /&gt;Up to four requests were made for blocking of political content, two of which came from Tamil Nadu.&amp;nbsp;&lt;br /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;The secretary, Public (Law and Order) Department requested for the website tamil.net.in to be blocked and the principal secretary, IT Department, requested a blog to be shut down. Only the first request seems to have been accepted.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Also, in the line of political fire was a Wikipedia entry for Sukhbir Singh Badal. The principal secretary, IT Department, Punjab, requested the Wikipedia entry with the address ‘en.wikipedia.org/Wiki/Sukhbir Singh Badal’ to be blocked. However, Wikipedia does have an entry for the deputy chief minister of Punjab with a slightly tweaked address.&lt;/p&gt;
&lt;p&gt;Not surprisingly, Mumbai’s Joint Commissioner of Police (Crime) wanted a YouTube video ( identified in Prakash’s blog as a video of Bal Thackeray’s speech) to be blocked. Click on the link and a message from YouTube reads: "This video has been removed because its content violated YouTube’s Terms of Service. Sorry about that."&lt;/p&gt;
&lt;p&gt;A betting site betfair.com was sought to be shut down by a senior inspector from Mumbai’s cyber crime cell. No luck. The site remains up and running.&lt;/p&gt;
&lt;p&gt;Finally, Maharashtra’s Commissioner sent in &lt;a class="external-link" href="http://www.topix.net/"&gt;two&lt;/a&gt; &lt;a class="external-link" href="http://www.exbii.com/"&gt;requests&lt;/a&gt;: &amp;nbsp;Both are running.&lt;/p&gt;
&lt;p&gt;Now for the interesting part: Prakash states that the data provided by the government "seemingly conflicts with the data released by the likes of Google (via its Transparency Report)."&lt;/p&gt;
&lt;p&gt;According to Google’s &lt;a class="external-link" href="http://www.google.com/transparencyreport/governmentrequests/IN/"&gt;Transparency Report&lt;/a&gt;, released on 25 October, Google received requests for 358 individual items to be removed from its different services between January and June 2011. And 407 such requests were made in 2010.&lt;/p&gt;
&lt;p&gt;Information provided by DIT, however, shows that only requests for 68 items (64 websites, one blog, and three specific web-pages) from eight separate requests were made to it. Of these, only three were for Google’s services (two for Blogger and one for YouTube), points out Prakash.&lt;/p&gt;
&lt;p&gt;While only DIT has the authority to order blocks, Google data shows that requests to ‘remove content’ far outnumber the requests made to DIT, suggesting that Google is receiving these requests directly from law enforcement agencies.&lt;/p&gt;
&lt;p&gt;"The only explanation for this is that an order to ‘block for access… or cause to be blocked for access by the public’ is taken to be different from an order for removal of content… That would mean that while blocking is regulated by the IT Act, forcible removal of content is not. Thus, it would seem that forcible removal of online content is happening without clear regulation or limits,"states Prakash. (emphasis added).&lt;/p&gt;
&lt;p&gt;Prakash makes the case that when law enforcement agencies send requests to companies like Google to remove content they are "operating outside bounds set up by the Indian Penal Code and the Code of Criminal Procedure as also the Information Technology Act."&lt;br /&gt;&lt;br /&gt;He adds that companies tend to comply with such ‘requests’ even when they are not under legal obligation to do so because it might appear to them to "violate their own terms of service (which generally include a wide clause about content being in accordance with all local laws), community guidelines."&lt;/p&gt;
&lt;p&gt;"This way, the intention of Parliament in enacting Section 69A of the IT Act — to regulate government censorship of the Internet and bring it within the bounds laid down in the Constitution—is defeated," states Prakash.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;This article has been republished from Firstpost.com. The original can be read &lt;a class="external-link" href="http://www.firstpost.com/india/google-indias-new-department-of-information-technology-121170.html"&gt;here&lt;/a&gt;.&amp;nbsp;You can read Firstpost’s continuing RTI coverage &lt;a class="external-link" href="http://goo.gl/SlCgT"&gt;here&lt;/a&gt;.&lt;/strong&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/blocking-content-google-gets-more-requests'&gt;http://editors.cis-india.org/news/blocking-content-google-gets-more-requests&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2011-11-03T10:45:25Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
