<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="http://editors.cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>http://editors.cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 11 to 25.
        
  </description>
  
  
  
  
  <image rdf:resource="http://editors.cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/zero-project-conference-vienna-february-27-28-2014"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/Zeenab.png"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/zainab.jpg"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/livemint-november-12-2013-moulishree-srivastava-you-tube-is-answer-to-what-changed-in-india"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/youtube.jpg"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/copy_of_youtube16.png"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/youtube16.png"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/the-times-of-india-september-22-2013-youths-brainstorm-at-social-summit"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/a2k/news/eenadu-telugu-wikipedia-january-14-2016-youth-responsible-for-protecting-telugu"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/livemint-july-30-2013-joji-thomas-philip-leslie-d-monte-shauvik-ghosh-your-telco-could-help-spy-on-you"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/your-signature-could-help-70-million-read"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/business-standard-october-29-2013-somesh-jha-surabhi-agarwal-your-private-data-may-be-online-courtesy-govt"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/privacy-public-property"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/mxmindia-may-27-2015-dyanne-coelho-your-phone-is-a-surveillance-device-your-isp-a-surveillance-provider"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/dna-july-21-2013-shikha-kumar-your-life-is-an-open-facebook"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="http://editors.cis-india.org/news/zero-project-conference-vienna-february-27-28-2014">
    <title>Zero Project Conference on Accessibility: Innovative Policies and Practices for Persons with Disabilities</title>
    <link>http://editors.cis-india.org/news/zero-project-conference-vienna-february-27-28-2014</link>
    <description>
        &lt;b&gt;Essl Foundation, the World Future Council and the European Foundation Centre convened  an international conference at the United Nations Office in Vienna, Austria on February 27 and 28, 2014. Pranesh Prakash participated in the conference as a speaker. On February 27 he spoke on e-speak and on the following day (February 28) he spoke in a session on Copyright &amp; the Marrakesh Treaty: Opportunities and Challenges.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The conference was attended by over 450 people. Dr. Nirmita Narasimhan had submitted two proposals, one on innovative practices (eSpeak) and one on innovative policy (India's copyright policy). Click on the links below to find more on these:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a class="external-link" href="http://zeroproject.org/wp-content/uploads/2014/02/India_eSpeak-Text-to-Speech-Engine.pdf"&gt;Affordable text-to-speech software from India&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://zeroproject.org/wp-content/uploads/2013/12/Copyright-Amendment-Act_India.pdf"&gt;Copyright exception for accessible formats&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Once again, the Essl Foundation, the World Future Council and the European Foundation Centre have joined forces to convene an international conference in Vienna, Austria. On this occasion we aim to raise awareness about innovative solutions from around the world that advance accessibility for persons with disabilities.  The conference seeks to strengthen the commitment of all stakeholders to promote, protect and advance the rights of persons with disabilities, and to improve their daily lives.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the third Zero Project Conference on “Accesibility: Innovative Policies and Innovative Practices for Persons with Disabilities” parliamentarians, representatives of NGOs and foundations, academics, social entrepreneurs, disability rights activists and the business world will come together to discuss Innovative Policies and Innovative Practices  and explore ways to promote and spread them to other countries.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Innovative Policies: Paving the Way&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Building on the success of our conferences in January 2012 and February 2013, at this Zero Project Conference, 15 Innovative Policies will be presented. They contain promising elements, have achieved identifiable improvements on the ground and point to a positive dynamic change that can be easily replicated in many countries around the world to advance the implementation of the Convention. They overcome conditions that act as barriers to the full exercise of rights by persons with disabilities and constitute the outcome of a multilevel research and selection process.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Innovative Practices: Crucial Steps&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Zero Project team has done extensive research worldwide on the most outstanding projects. The expert network that contributed their expertise in actively nominating and evaluating projects included more than 500 persons worldwide from 120 countries.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These projects cover all areas of accessibility, including built environment, transport, products and services and ICT (information, communication and technology).&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Be part of the Zero Project Network!&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Zero Project Conference gathers in Vienna the world’s leading representatives of the disability rights movement in order to facilitate a direct exchange of experiences. In this way the world’s most innovative and promising solutions are jointly identified, disseminated and further developed in order to make a noticeable improvement in the daily life and legal situation of persons with disabilities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Join the discussion and explore possibilities and potentials  on how global implementation of these exemplary solutions can be advanced!&lt;/p&gt;
&lt;hr /&gt;
&lt;ul&gt;
&lt;li&gt; Click here to see the &lt;a class="external-link" href="http://zeroproject.org/wp-content/uploads/2013/10/At-a-glance-barrierfree-FINAL2.doc"&gt;programme schedule&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Click here to see the &lt;a class="external-link" href="http://zeroproject.org/wp-content/uploads/2013/10/Speakerslist-ZPC-20141.pdf"&gt;speakers list&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/zero-project-conference-vienna-february-27-28-2014'&gt;http://editors.cis-india.org/news/zero-project-conference-vienna-february-27-28-2014&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Copyright</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2014-03-06T08:44:00Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/Zeenab.png">
    <title>Zeenab</title>
    <link>http://editors.cis-india.org/home-images/Zeenab.png</link>
    <description>
        &lt;b&gt;Zeenab Aneez&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/Zeenab.png'&gt;http://editors.cis-india.org/home-images/Zeenab.png&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2017-06-16T13:43:21Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/zainab.jpg">
    <title>Zainab</title>
    <link>http://editors.cis-india.org/home-images/zainab.jpg</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/zainab.jpg'&gt;http://editors.cis-india.org/home-images/zainab.jpg&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2011-11-25T04:40:41Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/livemint-november-12-2013-moulishree-srivastava-you-tube-is-answer-to-what-changed-in-india">
    <title>YouTube is the answer to what has changed in India</title>
    <link>http://editors.cis-india.org/news/livemint-november-12-2013-moulishree-srivastava-you-tube-is-answer-to-what-changed-in-india</link>
    <description>
        &lt;b&gt;Alternative Law Forum’s Lawrence Liang on relaunching Creative Commons, and how it changes the legal landscape of copyright issues. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article by Moulishree Srivastava was published in Livemint on November 20, 2013. &lt;a class="external-link" href="http://www.livemint.com/Consumer/pB9Jexbdv69o2XHexE6r8M/YouTube-is-the-answer-to-what-has-changed-in-India.html"&gt;Lawrence Liang was quoted&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Creative  Commons (CC), a non-profit organization headquartered in Mountain View,  California, US, which enables Internet users to share and use the  creativity and knowledge of others, on Tuesday relaunched its India  chapter after six years. CC provides free copyright licences that give  creators a way to share their creative work, on conditions of their  choice.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In India, for instance, Pratham Books, a not-for-profit publisher,  licenses its content under a CC licence that allows others to use the  content (on certain conditions). And the National Council of Educational  Research and Training has created a portal where digital versions of  its course material have been uploaded under a CC licence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In an interview, &lt;b&gt;&lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Lawrence%20Liang"&gt;Lawrence Liang&lt;/a&gt;&lt;/span&gt; &lt;/b&gt;, co-founder of Alternative Law Forum and chairman of the board at  the Bangalore-based Centre for Internet and Society, which is one of the  CC affiliates in India, spoke about the re-launch, what went wrong the  last time, what it means for the country and how it changes the legal  landscape of copyright issues. Edited excerpts:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;People all over the world are already using CC licences. What does this relaunch mean for India?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There  are two things. One is the legal component. The licences have been  tailor-made for Indian law. Tomorrow, if someone were to use CC licence  and there were violations and it came up in court, this (the CC licence)  would be in compliance with the Indian Copyright Act. The other is, we  have a very large number of young people who are entering the space of  making creative works. The CC means for them to be aware that there are  options they have apart from traditional copyright licensing.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;How does it impact the legal landscape of copyright issues?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In  the US, you have something called derivative rights, which is conversion  of one medium into another medium. In India, you don’t have that idea;  you have the right of adaptation, which is a much more narrowly defined  idea. It has the specific definition of what the adaptation is. There is  the right to adaptation of a work from, say, literary into dramatic,  but it doesn’t mean conversion of a work into any form.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  second is in terms of presumption of how you gain ownership over  copyright, which is slightly different in India than it is in the US.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In  India—section 17 (of the Constitution) lays out different classes of  work—there are different presumptions of who the owner of copyright is,  which becomes very important. For example, if a film-maker wants to  license his work, now it has to be clear that he is the owner of the  copyright in the first place, because the presumption in India would be  that the producer is the owner of the work, whereas in Europe the  producer is the first owner of the work. These are some of the small  differences that CC attempts to clarify.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What went wrong the last time?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When  it was first launched (in India) in 2007, perhaps there wasn’t the  momentum. Last time CC was launched as a licence in India, but not as a  community, which was the key issue. Second, it was institutionally  housed in IIT (Indian Institute of Technology) Bombay and it needed  being pluralized. You can’t depend on CC being housed in one single  institution. It should be in as many institutions as possible, which is  what has happened this time. The crucial thing here is that we will be  developing a community. A lot more people know about CC now than they  did back in 2007.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Why do you think it will succeed?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One  is the overall awareness about open source and alternatives. The other  one, which is more crucial, is, when CC was launched in the US, it was  in response to a very clear crisis. The crisis was that a large number  of users were being prevented from using existing works. &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Lawrence%20Lessig"&gt;Lawrence Lessig&lt;/a&gt;&lt;/span&gt; (one of the co-founders of CC) felt that there was a need to create a  legal alternative. There was already, in a way, a certain kind of  environment which allowed CC to automatically speak to a number of  people’s concerns. In India, we didn’t have that. Copyright was anyway  not being enforced. That’s happening now. So once people could use &lt;span class="brand"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/YouTube"&gt;YouTube&lt;/a&gt;&lt;/span&gt;,  could create remixes, then they suddenly realized that they have used a  film song and other copyrighted content. Then they suddenly realize a  need of legal content as alternative. YouTube is the answer to what has  changed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What does it mean for the media?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It  depends on whether you are looking at it from the perspective of a media  producer or a user. From the perspective of a media producer, one of  the big things that people assume is that everything is copyrighted  until stated otherwise and that you can’t use it. There are a number of  people who will be very happy to use it, but they may not want to use it  commercially. With a CC licence, the boundaries are clear. What you are  allowed to do and what you are not allowed to do is extremely clear.  One of the biggest problems in the digital landscape at the moment is  opacity. You are not sure. There is an image on a website, which seems  to be used in many places. Am I allowed to reproduce it? What is the  extent to which I can use the content? A lot of these will be rendered  clear for media practitioners.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/livemint-november-12-2013-moulishree-srivastava-you-tube-is-answer-to-what-changed-in-india'&gt;http://editors.cis-india.org/news/livemint-november-12-2013-moulishree-srivastava-you-tube-is-answer-to-what-changed-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-11-20T07:00:48Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/youtube.jpg">
    <title>YouTube</title>
    <link>http://editors.cis-india.org/home-images/youtube.jpg</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/youtube.jpg'&gt;http://editors.cis-india.org/home-images/youtube.jpg&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2012-02-17T06:54:45Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/copy_of_youtube16.png">
    <title>Youtube</title>
    <link>http://editors.cis-india.org/home-images/copy_of_youtube16.png</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/copy_of_youtube16.png'&gt;http://editors.cis-india.org/home-images/copy_of_youtube16.png&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2012-05-26T00:38:39Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/youtube16.png">
    <title>Youtube</title>
    <link>http://editors.cis-india.org/home-images/youtube16.png</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/youtube16.png'&gt;http://editors.cis-india.org/home-images/youtube16.png&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2012-05-26T00:38:21Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/the-times-of-india-september-22-2013-youths-brainstorm-at-social-summit">
    <title>Youths brainstorm at social summit</title>
    <link>http://editors.cis-india.org/news/the-times-of-india-september-22-2013-youths-brainstorm-at-social-summit</link>
    <description>
        &lt;b&gt;This group of youngsters is in the process of developing a smartphone app that will help traffic police and civic agencies strengthen emergency services like ambulances and fire engines.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The event was hosted in CIS on September 21. The Times of India covered this and &lt;a class="external-link" href="http://timesofindia.indiatimes.com/city/bangalore/Youths-brainstorm-at-social-summit/articleshow/22877055.cms"&gt;published the story&lt;/a&gt; on September 22, 2013.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;"Digital signboards and phone alerts can sensitize road users and traffic cops about emergency vehicles ," says the team, which is working on creating prototypes to build emergency response systems for citizens in case of road accidents.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Trupti Chengalath, head of communications for Mahiti.org, Dipankar Nayak, a young architect and Gauri Prasad, a Class 12 student of Canadian International School are part of the team which came together at the Bangalore Social Good Jam on Saturday.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The event, organized at the Centre for Internet and Society, Domlur, saw the participation of schoolchildren, college goers, young professionals and social entrepreneurs , who focused on devising technological solutions to some of the most pressing problems faced by Indian cities . Members of &lt;a class="external-link" href="http://timesofindia.indiatimes.com/topic/ASHOKA"&gt;Ashoka&lt;/a&gt; India , a global association of leading social entrepreneurs , IDEX, a six-month fellowship programme on social enterprise, and the Green Lungi Movement, were part of the session.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Meera Vijayan, consultant , Framework Change, Ashoka, told STOI, "NGOs run by fellows of Ashoka and IDEX will implement these tech-based solutions in different cities and will involve government stakeholders too. These summits have become a global conversation on how to &lt;a class="external-link" href="http://timesofindia.indiatimes.com/topic/Leverage"&gt;leverage&lt;/a&gt; technology for social change. Bangalore was chosen for the first-of-its-kind event in India because IT runs in the blood of the city."&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/the-times-of-india-september-22-2013-youths-brainstorm-at-social-summit'&gt;http://editors.cis-india.org/news/the-times-of-india-september-22-2013-youths-brainstorm-at-social-summit&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-09-25T11:08:03Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/a2k/news/eenadu-telugu-wikipedia-january-14-2016-youth-responsible-for-protecting-telugu">
    <title>Youth is responsible for protecting Telugu</title>
    <link>http://editors.cis-india.org/a2k/news/eenadu-telugu-wikipedia-january-14-2016-youth-responsible-for-protecting-telugu</link>
    <description>
        &lt;b&gt;G. Umamaheshwara Rao, head of linguist research at Hyderabad Central university observed that there is every possibility for Telugu to be extinct soon. Its responsibility of youth to protect and preserve the language. And it is Wikipedia which would help in doing so. &lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;A program was arranged to inaugurate Telugu Wkipedia digital resource center at&amp;nbsp; Andhra Loyola College.&amp;nbsp; Others who were present were Dr. Samala Ramesh Babu, Editor Ammanudi magazine, Fr. GAP Kishore, Principal, Rahmanuddin, Program officer, CIS-A2K, Prof B. Sivakumari, Botany dept, N Srinivas, Statistics dept, Kola Sekhara, Telugu dept, Pavan Santhosh, PA, CIS-A2K.A workshop for 40 students (10 each from Botany, Telugu, Physics and Statistics) took place from 11 to 13 January in the college campus.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Scanned version of article published by Eenaudu on January 14, 2016&lt;br /&gt;&lt;img src="http://editors.cis-india.org/home-images/eenadu1412016.jpg" alt="null" class="image-inline" title="Eenadu Article" /&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/a2k/news/eenadu-telugu-wikipedia-january-14-2016-youth-responsible-for-protecting-telugu'&gt;http://editors.cis-india.org/a2k/news/eenadu-telugu-wikipedia-january-14-2016-youth-responsible-for-protecting-telugu&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>CIS-A2K</dc:subject>
    
    
        <dc:subject>Telugu Wikipedia</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2016-02-05T20:49:00Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/livemint-july-30-2013-joji-thomas-philip-leslie-d-monte-shauvik-ghosh-your-telco-could-help-spy-on-you">
    <title>Your telco could help spy on you</title>
    <link>http://editors.cis-india.org/news/livemint-july-30-2013-joji-thomas-philip-leslie-d-monte-shauvik-ghosh-your-telco-could-help-spy-on-you</link>
    <description>
        &lt;b&gt;Telecom minister gives approval to changes in rules for mobile licences to enable such mass surveillance.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article by Joji Thomas Philip, Leslie D'Monte and Shauvik Ghosh was originally &lt;a class="external-link" href="http://www.livemint.com/Politics/rpWFiDJroLgpLQ6yKdR3pJ/Telcos-to-soon-link-with-government-monitoring-system.html"&gt;published in Livemint&lt;/a&gt; on July 30, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Telecom companies and Internet service providers will soon help the government monitor every call made, every email sent and every website visited, with the Centre deciding to connect their networks to its automated surveillance platform known as the Centralised Monitoring System (CMS).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Communications minister &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Kapil%20Sibal"&gt;Kapil Sibal&lt;/a&gt;&lt;/span&gt; has approved changes in existing rules and new clauses to be inserted  in mobile licences for enabling such mass surveillance, copies of  documents reviewed by &lt;i&gt;Mint&lt;/i&gt; reveal.&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;iframe frameborder="0" height="250" src="http://www.youtube.com/embed/o1r6OSv-WyI" width="320"&gt;&lt;/iframe&gt;&lt;/th&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;The department of telecommunications (DoT) will shortly send a letter to all telcos asking them to connect their “lawful interception system (LIS)” to the CMS “at a regional monitoring centre through an interception, store and forward (ISF) server placed in the licensee’s premises”, according to the documents.&lt;/p&gt;
&lt;p&gt;Telcos including &lt;span class="company"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Bharat%20Sanchar%20Nigam%20Ltd"&gt;Bharat Sanchar Nigam Ltd&lt;/a&gt;&lt;/span&gt; (&lt;span class="brand"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/BSNL"&gt;BSNL&lt;/a&gt;&lt;/span&gt;), &lt;span class="company"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Mahanagar%20Telephone%20Nigam%20Ltd"&gt;Mahanagar Telephone Nigam Ltd &lt;/a&gt;&lt;/span&gt;(MTNL), &lt;span class="company"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Reliance%20Communications%20Ltd"&gt;Reliance Communications Ltd&lt;/a&gt;&lt;/span&gt;, &lt;span class="company"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Bharti%20Airtel%20Ltd"&gt;Bharti Airtel Ltd&lt;/a&gt;&lt;/span&gt;, &lt;span class="company"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Vodafone%20India%20Ltd"&gt;Vodafone India Ltd&lt;/a&gt;&lt;/span&gt; and &lt;span class="company"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Tata%20TeleServices%20Ltd"&gt;Tata TeleServices Ltd&lt;/a&gt;&lt;/span&gt; declined to comment on questions emailed in this regard.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;“The automated process of the CMS will be subjected to the same  regulatory scrutiny as is available in the present manual system under  Section 5(2) of Indian Telegraph Act and Rules 419-A thereunder, with  the added advantage of having a safeguard against any illegal  provisioning by the telecom service providers in the present system,  however, remote it may be,” DoT said in an email reply to a  questionnaire with a brief on CMS.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Safeguard has also been built against any unauthorized provisioning by having a different interception provisioning agency than the interception requisitioning and monitoring agencies thus having an inbuilt system of checks and balances. Further, a non-erasable command log will be maintained by the system, which can be examined anytime for misuse, thus having an additional safeguard,” DoT said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The CMS was approved by the cabinet committee on security (CCS) on 16 June 2011, with government funding of Rs.400 crore. It is expected to enable the government to monitor all forms of communication, from emails to online activity to phone calls, text messages and faxes by automating the existing process of interception and monitoring. The government completed a pilot project in September 2011 under which the Centre for Development of Telematics (C-DoT) installed two ISF servers, one of them for MTNL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The interception services have been integrated and tested successfully for these two telecom services providers (TSPs),” the note said, referring to MTNL and Tata Communications Ltd. MTNL officials declined to comment. There was no response to queries by Tata Communications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It added that training had been imparted to six law enforcement agencies—the Intelligence Bureau, the Central Bureau of Investigation, the Directorate of Revenue Intelligence, the Research and Analysis Wing, the Delhi Police and the National Investigation Agency.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the documents also reveal that the CMS project is getting delayed over technical issues such as lawful interception systems sending the intercept-related information (IRI) in “their own proprietary format”; difficulty in tracing the movement of “the target from the home network to the roaming network”; and how to independently provision voice and data interception of mobile users.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government is simultaneously devising a strategy to counter criticism from the media and privacy lobby groups that this surveillance platform has no privacy safeguards. Mint reported on 13 July that fresh questions were raised on the CMS infringing on the rights of individuals, especially in the wake of the US government’s PRISM surveillance project.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In an  internal note on 16 July to help Sibal brief the media, DoT said even  as the CMS will automate the existing process of interception and  monitoring “... all safeguards that are currently in place in the manual  mode of interception will continue”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The note argued that  implementation of the CMS “will rather enhance the privacy of the  citizens” since it will not be necessary to take the authorization (for  tapping) to the nodal officer of the telecom service providers “who  comes to know whose or which phone is being intercepted”. The  note added that after the CMS is implemented, provisioning of  interception will be done by a CMS authority, who would be different  from the law enforcement agency authorities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The  law enforcement agency (LEA) cannot provision for interception and  monitoring and the CMS authority cannot see the content but would be  able to provision the request from the LEA.Hence, complete check and  balance will be ensured. Further, a non-erasable command log will be  maintained by the system, which can be examined anytime for misuse, thus  having an additional safeguard,” added the department’s note briefing  the minister.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Also,  acknowledging that “questions were being asked about the practices of  Indian agencies and the privacy and rights of its citizens”, national  security adviser &lt;a href="http://www.livemint.com/Search/Link/Keyword/Shivshankar%20Menon"&gt;Shivshankar Menon&lt;/a&gt; in a 23 June note to the ministries of home, external affairs and  telecom, the department of electronics and information technology, and  the cabinet secretary said: “Only home secretaries of the Centre and  states can authorize such monitoring; orders are valid for two months,  are not extendable beyond six months; records are to be maintained, use  of storage is limited and a review committee of cabinet secretary, law  secretary and secretary of the telecom department regularly screens all  cases.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Menon also admitted that when it came to individual privacy rights, there were “larger issues that needed serious consideration and wider consultation with industry, advocacy groups and NGOs (non-governmental organizations) as has been the case so far in the draft privacy Bill... For data protection and retention in India, however, there may be a need to consider legislation or strengthening existing legislation, as the march of technology has made most present laws irrelevant.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Privacy experts are convinced that safeguards are needed, especially since India does not have a privacy law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“To safeguard public interest, the government should also draft a law  that will make it a criminal offence if a CMS authority is found in  possession of any personal information culled through the CMS. That will  prove to be a deterrent,” said &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Sunil%20Abraham"&gt;Sunil Abraham&lt;/a&gt;&lt;/span&gt;,  executive director of the Centre for Internet and Society, a privacy  lobby body. “Also, the government must build an audit trail using PKI  (public key encryption) and people as an additional safeguard.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“As I understand it, there is also no clear statutory backing for the CMS,” said &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Apar%20Gupta"&gt;Apar Gupta&lt;/a&gt;&lt;/span&gt;,  a partner at law firm Advani and Co. that specializes in information  technology (IT) law. “What is important is that every tapping order  should be backed by a reason. This was the case with the manual process.  Will this be possible in an automated surveillance system such as the  CMS?”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“What is disturbing is that there is no transparency with regard to the  CMS. Everything is happening under the radar with media reports  periodically giving us glimpses into the project,” he said. “A state  should protect its interests but should do so in a manner that  safeguards privacy and limits abuse.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to the &lt;i&gt;Freedom on the Net 2012&lt;/i&gt; report by Freedom House,  an independent privacy watchdog body, of the 47 countries analysed, 19  had introduced new laws or other directives since January 2011 that  could affect free speech online, violate users’ privacy, or punish  individuals who post certain types of content. India, which scored 39  points out of 100 (score achieved out of 100 for censoring the  Internet), was termed partly free by the report, which was released on  24 September.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Globally, 79% of the respondents in another study said they were  concerned about their privacy online, with India (94%), Brazil (90%) and  Spain (90%) showing the highest level of concern, according to a June  survey undertaken by research firm ComRes, and commissioned by Big  Brother Watch, an online privacy campaign.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/livemint-july-30-2013-joji-thomas-philip-leslie-d-monte-shauvik-ghosh-your-telco-could-help-spy-on-you'&gt;http://editors.cis-india.org/news/livemint-july-30-2013-joji-thomas-philip-leslie-d-monte-shauvik-ghosh-your-telco-could-help-spy-on-you&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-30T06:13:07Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/your-signature-could-help-70-million-read">
    <title>Your Signature Could Help 70 Million Read</title>
    <link>http://editors.cis-india.org/news/your-signature-could-help-70-million-read</link>
    <description>
        &lt;b&gt;A humble signature campaign in the city intends to take on a law that prevents the print-impaired from reading. You too can join in and support the cause.&lt;/b&gt;
        
&lt;p&gt;Picture this: You are on a lazy weekend getaway with easy access to a hammock, cool lemonade and your favourite book. This might sound like oh-so common bliss to you, but this scenario is off bounds for over 70 million Indians. The "print-impaired", or in other words, those who cannot read due to a disability, don't have access to nearly 99% of material printed today.&amp;nbsp; A campaign is currently on in Mumbai to change the law, and your endorsement could make a difference.&lt;/p&gt;
&lt;p&gt;"The issue facing a print-impaired person is that when you have a book in standard print, it poses a problem to read," says Dr Sam Taraporevala, Associate Professor and Head of Department, Sociology at St Xavier's College.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Changing the format of a standard book is considered illegal under the Copyright Act of 1957. The Act does not permit conversion of books into a format that can be accessible for the print-impaired (through Braille, screen readers or a digital talking book format, to name a few). To counter this issue and make books accessible to all, Dr Taraporevala (also Director of the Xavier's Resource Centre for the Visually Challenged), has launched a signature campaign.&lt;/p&gt;
&lt;p&gt;"The advantage technology offers is that if an author or publisher wants to make his work accessible, he can do so in real time." The campaign, which is part of a global initiative by the World Blind Union (WBU), Sight Savers International and other organisations, is the first of its kind for the city.&amp;nbsp; It aims at collecting 500 signatures of authors and publishers, who will be directly responsible for bringing about a change. Signing the intent form does not in any way mean that the author is handing over the rights of his book.&lt;/p&gt;
&lt;p&gt;"There is a concern among authors about providing an accessible copy of the book, that it might lead to piracy," says Dr Taraporevala.&amp;nbsp; "I don't condone piracy but it's a reality and this will not add to it significantly. Why allow injustice to prevail because of an artificial fear?"&lt;/p&gt;
&lt;p&gt;Three hundred signatures down and 200 more to go, the race is on for the January 22 deadline. But Dr Taraporevala remains unperturbed. "We will do it. I don't know how but I want to believe anything is possible."&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.mid-day.com/whatson/2010/jan/190110-campaign-St-Xavier-College-Mumbai.htm"&gt;See the original article on Mid-Day&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/your-signature-could-help-70-million-read'&gt;http://editors.cis-india.org/news/your-signature-could-help-70-million-read&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Accessibility</dc:subject>
    

   <dc:date>2011-04-02T13:10:48Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/business-standard-october-29-2013-somesh-jha-surabhi-agarwal-your-private-data-may-be-online-courtesy-govt">
    <title>Your private data may be online, courtesy govt</title>
    <link>http://editors.cis-india.org/news/business-standard-october-29-2013-somesh-jha-surabhi-agarwal-your-private-data-may-be-online-courtesy-govt</link>
    <description>
        &lt;b&gt;Some depts have posted bank account &amp; income details on net for transparency; experts cry privacy breach.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article by Somesh Jha and Surabhi Agarwal was &lt;a class="external-link" href="http://www.business-standard.com/article/economy-policy/your-private-data-may-be-online-courtesy-govt-113102800020_1.html"&gt;published in the Business Standard&lt;/a&gt; on October 29, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;To push the government's agenda of greater transparency and  accountability, several states and central departments might be,  unwittingly, following a bare-it-all approach in posting citizen data  online. And, even sensitive and personal information, such as bank  account numbers and income status, is not being spared. A Business  Standard investigation reveals, with so much citizen data already in the  public domain and more getting added every day, the government could be  jeopardising the privacy of its 1.2 billion citizens, who stand exposed  to a variety of risks, including those of 360-degree profiling and  financial frauds.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For instance, the Centre's National Rural Employment Guarantee Scheme  puts out full bank account numbers of its beneficiaries, along with  details like the amount they received. So, one can easily know the bank  in which most residents of, say, Punjab's Machhiwara district have their  accounts. Also, their account numbers are complete, with photographs.  In the case of Haryana's 25-year-old Ram (surname withheld), the  photograph is not available but one can get his financial details on the  portal, along with the first eight digits of his &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Aadhaar" target="_blank"&gt;Aadhaar&lt;/a&gt; number (the last four have been muted).&lt;br /&gt; &lt;br /&gt; Sample this: The occupation and yearly income of one Amrita of Uttar  Pradesh are just a matter of a few clicks and so are her ration card  number, full address, age, father's/husband's name, category and poverty  status. A farmer from Amethi district, she doesn't have a gas or an  electricity connection, but Lucknow-based Manu, who earns Rs 4 lakh a  year, does have. Amrita's yearly income is Rs 1.2 lakh a year. These  details are all there on their respective ration cards, out in the open  on the government website of Uttar Pradesh, a state that might have gone  overboard in revealing citizen data under the ongoing computerisation  of the public distribution system.&lt;br /&gt; &lt;br /&gt; "If people start publishing information like these and the government  doesn't regulate it through a data protection law, criminal minds can  harvest and combine all databases accurately," says Sunil Abraham,  executive director of Centre for Internet and Society, a Bangalore based  think-tank. People often create passwords and pins based on dates and  numbers very important to them. "A little bit of intelligence and some  amount of social engineering could lead to guesses... and financial  fraud." Even by sifting through just three databases, it is quite easy  to get a random person's details like voter identity card number,  address, name, age, date of birth, ration card number, information on  family members, along with income status and photograph.&lt;br /&gt; &lt;br /&gt; One can argue the electoral roll is a public document and there is  nothing wrong with a person's voter identity card number, full address,  name, age, father's name and even date of birth being easily searcheable  online. But a few states like Uttarakhand have even published  photographs, an element barred from online posting under the law.  Experts argue a massive digitisation exercise is underway in the country  and, with the lack of standards and clear advisories from the Centre,  the situation could worsen in the future.&lt;br /&gt; &lt;br /&gt; A Cabinet minister, who did not wish to be named, said there was a  continuous tug-of-war between the imperative of privacy, which doesn't  allow you to share information; and transparency, which says you should  share it. "Also, the Right to Information Act says if somebody is  receiving government subsidy, it is public information." However, the  Indian laws might not be consistent on this issue as "under Section 43a  of the Information Technology Act, any kind of financial information is  classified as 'sensitive personal information' and can't be put online,"  says an official of the communications and information technology  ministry who has closely worked on drafting of the IT Act.&lt;br /&gt; &lt;br /&gt; But, the IT Act provides an exception for matters covered under the RTI  Act. This could infer that when the recently-approved Food Security Act  comes into being, the income status of two-thirds of the population  (that the Act covers) could be posted online. Also, the law would permit  bank account numbers of beneficiaries of various welfare schemes like  cooking gas subsidy under the ongoing direct benefit transfer scheme to  be made public, as subsidies are transferred directly to accounts under  the project.&lt;br /&gt; &lt;br /&gt; A statement from the office of Rural Development Minister &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Jairam+Ramesh" target="_blank"&gt;Jairam Ramesh&lt;/a&gt; explained the National Rural Employment Guarantee Act provided for  "making available for public scrutiny" all accounts and records related  to the scheme. It added "there appears to be no evident risk of  misappropriation or financial fraud". Sudhir Kumar, secretary in the  Department of Food and Public Distribution, says the whole system needs  to be transparent, especially when huge government subsidy is going out  in the case of PDS. However, "if states are putting unnecessary details  online, it can be looked into". Deputy Election Commissioner Alok Shukla  says, according to an EC order, states are not allowed to put  photographs of voters online to ensure their privacy is safeguarded.  These will be removed if such cases are found. He adds a standard  protocol is also being worked out for states.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/business-standard-october-29-2013-somesh-jha-surabhi-agarwal-your-private-data-may-be-online-courtesy-govt'&gt;http://editors.cis-india.org/news/business-standard-october-29-2013-somesh-jha-surabhi-agarwal-your-private-data-may-be-online-courtesy-govt&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-10-29T05:50:59Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/privacy-public-property">
    <title>Your Privacy is Public Property</title>
    <link>http://editors.cis-india.org/news/privacy-public-property</link>
    <description>
        &lt;b&gt;Rules issued by a control-obsessed government have armed officials with widespread powers to pry into your private life. This article was published in Mail Today on Sunday, May 15, 2011.&lt;/b&gt;
        
&lt;p&gt;The government has gifted itself the power to pry into your electronic personal details without a search warrant. With new IT Rules, it can lay claim to an array of your most sensitive and zealously guarded personal details — ranging from your ATM pin, your net banking password, your credit card details, to the status of your mental health, your DNA profile, and even your sexual orientation. “These rules are a complete invasion of privacy&lt;br /&gt;with immense potentiality of misuse,” says Supreme Court advocate and cyber law expert Pawan Duggal. Drawing attention to the fact that such executive orders are often drafted by government officials who aren’t legally qualified, Duggal asks: "Our medical records and sexual orientation have no bearing on the verification of our identity or our cyber crime record. So why should the state want access to this data?" That is not all. Every key stroke you make at a cyber cafe will now be under the scanner — with cafe owners being asked to maintain logs of your online activities for a minimum of one year. The rules have also turned the heat on internet service providers and social-networking sites to remove objectionable content posted on them, leading to strong objections from Google.&lt;/p&gt;
&lt;p&gt;Under provisions of the Indian Post Office Act, 1898, The Indian Telegraph Act, 1885, and the Information Technology Act, 2000, the state already has the power to snoop through the letters you post, the emails you send and the calls you make. But while such surveillance came with several checks and balances, cyber law experts and internet activists say that the government can now access private data with far more ease.&lt;/p&gt;
&lt;p&gt;"Whenever any government agency needs to access information on individuals, detailed processes need to be followed so that the rights of the citizen are protected. You need a magistrate — who is not part of the government — to sign a search warrant. A home secretary with the centre or state has to sanction a phone tapping request," points out M.R. Madhavan, head of research, PRS Legislative Research.&lt;/p&gt;
&lt;p&gt;These safeguards have not been included for access to electronic databases. "An investigating officer simply needs to give a request in writing, in contravention of all other norms," says Madhavan.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Your privacy is being violated at several levels with the new rules, says Sunil Abraham, executive director of Bangalore’s Centre for Internet and Society. "Cyber cafe owners across the country can now take photos of women coming to their cafes. They also have to show their identity proof. Many women fear they can be harassed on the basis of this information." Cyber cafe owners also have to maintain records on who you are mailing, the subject, how often you access a web page, the packets of data sent and received, etc. Be prepared for rampant leakage of personal information with this provision, warns Abraham.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;"A boy who fancies you could easily bribe the cafe owner to get the list of websites you access. The owner will have all the information on you stored for a minimum of one year. No process of destroying the logs has been specified by the IT rules and regulations," says Abraham.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;The trouble, says Venkatesh Nayak, the Programme Coordinator for Access to Information, Commonwealth Human Rights Initiative, is that everyone is suspect in the eyes of the government because of the perception that terrorists don’t function like organised crime syndicates.&lt;br /&gt;&lt;br /&gt;Privacy concerns are taken far more seriously in the West. "In countries which have a data protection law, there are data protection tribunals and data protection commissioners. It is not that easy for governments to collect sensitive information on individuals and keep it away from them," says Nayak.&lt;/p&gt;
&lt;p&gt;The government, meanwhile, denies any invasion of privacy with the rules. "The intent of the rules is to protect sensitive personal information. The rules do not give any undue powers to government agencies for free access of sensitive personal information," the department of Information Technology has said in a statement.&lt;/p&gt;
&lt;p&gt;Cyber experts aren’t convinced, and believe that the days of greater surveillance lie ahead. "After 9/11, the US Homeland Security had started accessing databases of public libraries to find out what people were reading. The day may not be far for us," is Nayak’s dark projection.&lt;/p&gt;
&lt;p&gt;Read the original published by Mail Today &lt;a class="external-link" href="http://epaper.mailtoday.in/1552011/epaperpdf/1552011-md-hr-29.pdf"&gt;here&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/privacy-public-property'&gt;http://editors.cis-india.org/news/privacy-public-property&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2011-05-18T02:28:11Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/mxmindia-may-27-2015-dyanne-coelho-your-phone-is-a-surveillance-device-your-isp-a-surveillance-provider">
    <title>Your phone is a surveillance device, your ISP a surveillance provider…: Pranesh Prakash</title>
    <link>http://editors.cis-india.org/internet-governance/news/mxmindia-may-27-2015-dyanne-coelho-your-phone-is-a-surveillance-device-your-isp-a-surveillance-provider</link>
    <description>
        &lt;b&gt;“In India there is no special privilege for journalists over ordinary citizens,” Pranesh Prakash, Policy Director at the Centre for Internet and Society began at the workshop entitled ‘Digital Security for Journalists’ organised by the Mumbai Press Club and the Centre for Internet and Society. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post was &lt;a class="external-link" href="http://www.mxmindia.com/2015/05/your-phone-is-a-surveillance-device-your-isp-a-surveillance-provider-and-facebook-and-google-are-spyware-pranesh-prakash/"&gt;published by mxmindia.com&lt;/a&gt; on May 27, 2015. Pranesh Prakash gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;“Even if you don’t care about your own security/privacy, think about you sources. Your sources want privacy,” Prakash said as he began the workshop on how to assess security threats, how to protect sources and how to prevent your ISP from leaking out information. With the growth of the internet since the 1980s, we know we can’t trust everyone; police stations, governments, all engage in surveillance of some sort, he pointed out. Prakash went on to explain the ‘Threat Model’, wherein journalists ought to ask questions like what are you protecting, who are you protecting yourself against, what do you hope to achieve and to what lengths are you willing to go? All of the measures you are going to take to protect your source are going to be inconvenient. Security is always at the cost of convenience he reiterated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Data threat can be intercepted at two levels, Prakash explained; data in transit and data at rest. The important question to ask is which you wish to secure, because the means to secure both are very different.Emails being sent to someone can be intercepted by an outside source in transit. It is easier to secure you own data on your computer, but an email is so much more difficult to secure because there are multiple points where the information is stored. Targeted surveillance is much more difficult to protect yourself against than mass surveillance.&lt;br /&gt;&lt;br /&gt;For WiFi, password protected networks form an encryption, one more barrier to protect you. However, a WEP encrypted network is easy to break through. You need at least a WPAII to be secure enough. Airport networks usually ask for a password after connecting to the WiFi. That too is easy to see through. Avoid using these networks for sensitive work.&lt;br /&gt;&lt;br /&gt; One must keep in mind who they want to secure the data from; whether from a casual threat or an Intelligence Agency like the National Security Agency (NSA), National Technical Research Organisation (NTRO) or Intelligence Bureau (IB).Mass surveillance or non-targeted surveillance is not legal in India. However. the NTRO engages in mass surveillance, for which it was criticised in a Mint article, following which they shifted only to the national borders for surveillance. It is also possible for the NSA to tamper with your laptop before delivery.The NSA’s ANT catalogue has been working on a technology that has a device that can fit within the connector that connects to your keyboards and it can last there years and years without detection. Hence Prakash suggests that if a journalist is working on a sensitive story that if leaked could cause a ruckus, he/she would be safer buying a new computer and paying for it in hard cash.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The more important a source is, the less you must use your phone, Prakash pointed out. Phones leak information time and again, information of time and location. The NSA uses it, the police use it. If you are meeting with someone and you both have your phone, then information that you have met is transmitted. Even without GPS it can track your location, when you receive/send a call/message, as your mobile network needs to access the cell tower you are around in order to reach you.&lt;br /&gt;&lt;br /&gt;Encrypted emails still leak identities. If the police look into an encrypted email, they will still know who you are communicating with. Background information you are doing on a story can also give away a lot you don’t want to be given away. Even with an encrypted email, they have access to your location, IP address, the sender and the receiver of the email, time stamp, Mac id and IMEI.&lt;br /&gt;&lt;br /&gt;End-to-end encryption is the way out here.This means that no one in the middle, including the company can read the emails you send from your company server. End-to-end encryption is the most inconvenient. End-to-end encryption means that you and the party concerned need to come up with a code that the other party needs to be able to decrypt. The software both parties use also needs to be compatible.&lt;br /&gt;&lt;br /&gt;“I recommend using WhatsApp over Viber and Line, Skype over other alternatives and Twitter is also safe, but never use Facebook for sensitive conversations that you don’t want to get out,” Prakash said. WhatsApp is safer than normal text messaging he points out. Prakash recommended an app called Conversations to use for messaging on your phone. It is safer than both normal SMSing and WhatsApp. An SMS leaks metadata, he explains, that’s why it is preferable to use data or apps that use the internet.&lt;br /&gt;&lt;br /&gt;In the 2G network space, only Airtel and Docomo use at least a weak encryption.All the rest use no encryption. Anyone can snoop in on your conversations. Instead one must use data-enabled apps for calling like RedPhone, he suggested. This is a great way to protect your source.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Most people are known to repeat passwords for various accounts. Never repeat a password, Prakash advised. Maintain different passwords for all your accounts. It is the safest. And if you are unable to remember them all, then use password managementsoftware like LastPass or KeyPass. These enable you to key in and store all your passwords in one place and you only have to remember the password to your LastPass/KeyPass account. But if you forget your master password, then there is no way to recover all your other passwords.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The session concluded with Prakash working hands-on with the journalists, helping them to download the required software on their laptops and mobile phones. This knowledge is vital for all journalists in order to protect themselves and their sources when doing a high profile, sensitive story, Prakash said.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/mxmindia-may-27-2015-dyanne-coelho-your-phone-is-a-surveillance-device-your-isp-a-surveillance-provider'&gt;http://editors.cis-india.org/internet-governance/news/mxmindia-may-27-2015-dyanne-coelho-your-phone-is-a-surveillance-device-your-isp-a-surveillance-provider&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-06-17T14:53:40Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/dna-july-21-2013-shikha-kumar-your-life-is-an-open-facebook">
    <title>Your life's an open Facebook</title>
    <link>http://editors.cis-india.org/news/dna-july-21-2013-shikha-kumar-your-life-is-an-open-facebook</link>
    <description>
        &lt;b&gt;The jury's out on Facebook's newly introduced Graph Search. While some argue that it's a stalker's dream come true, others say it's a great tool for social research. Shikha Kumar jumps right into the debate.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://www.dnaindia.com/lifestyle/1863603/report-your-life-s-an-open-facebook"&gt;Shikha Kumar's article was published in DNA on July 21, 2013&lt;/a&gt;. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Do this little exercise. Log on to Facebook and type ‘friends of  friends who are single’ or ‘friends of friends who like dancing’ in the  search bar on the top left hand of the screen. A long list of names with  photographs of people you may have never seen in your life will pop up  in front of you. Better still (or worse, depending on perspective), you  can refine this search further with the drop down menu on the right hand  side of the screen; you can filter the results on the basis of gender,  employer, current city, hometown and so on.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Now, depending on whether you are paranoid about your privacy, or don’t  give a damn (since the government is snooping on us anyway), you will  either view this feature as a stalker’s dream come true or just another  irritant to rant about for a day and then forget.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Whatever your reaction, Graph Search, an upgrade on Facebook’s  rudimentary ‘search’, is here to stay and it holds the potential to  forever change the ‘search’ behaviour of its members.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;HOW DOES IT WORK?&lt;br /&gt; Put simply, Graph Search is the Google search of Facebook. It indexes  every little detail you have shared on Facebook — every drunken ‘like’,  every status update, every unflattering photograph you are tagged in,  every joke you’ve shared — so that a simple search can throw up pretty  specific answers. A beta version was unveiled to a select audience in  January but it went live for all English (US) users early last week.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A look at a Tumblr blog called ‘Actual Facebook Graph Searches’ gives  an indication of how specific the results can get. Ranging from humorous  to downright outrageous, some queries posted included ‘Single women who  live nearby and who are interested in men and like Getting Drunk’ and  ‘Married people who like Prostitutes.’&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is exactly why people like Adarsh Matham, a 29-year-old tech  writer, cite as reason for never having been on Facebook. While he does  admit the new feature can be very useful in finding jobs, dates, new  friends and local businesses, he says the downsides trump the benefits.  “Imagine if some pervert searches for ‘girls who like Fifty Shades of  Grey in Mumbai’… It will make it easier for him to stalk them,” says  Matham.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If you use your imagination, the list won’t end. Imagine what perverts  at your workplace and in your apartment complex who are not ‘friends’  with you on Facebook can do with information they glean about you thanks  to Graph Search.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Matham is particularly concerned with Graph Search’s misuse in India  because of our social attitudes and tendency to slot people into types  and judge them immediately. “One of the first things that people do when  they go for a job or on a date is a Google search. Soon they will do a  Graph Search too. This is a complete intrusion of one’s privacy.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham, director at the Bangalore-based Centre for Internet and  Society, thinks the privacy implications are worrying because the  average Indian user is not a ‘power’ user who fully exploits the site’s  advanced features and is thus unclear about what personal information is  public or private. “People need to be very cautious as they’re leaving  behind a digital trail that is always searchable unlike on other  platforms like Twitter. It’s like tattooing yourself, it’s permanent but  you may not be comfortable with it in the future,” he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A brilliant format&lt;/b&gt;&lt;br /&gt; Privacy concerns aside, many have warmed up to the benefits of Graph  Search. Raghu Mohan, a Bangalore-based writer with YourStory.in, has  used it for over six months and has only good things to say about it. “I  think it’s a remarkable engineering feat. Any platform with a user data  of over a billion people needs to come up with such a search facility,”  says Mohan, adding that the tool has been very useful in finding  work-related data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Chetan Asher, founder and CEO of Tonic Media, a social media agency,  agrees with him, saying the new feature is “very exciting” purely  because of its ability to index information that was always there, but  was buried somewhere. “The simple phrase-like format is brilliant… It  completely changes the way you network and mine for information.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mohan adds that start-ups can benefit with what the feature offers.  “Though not a complete marketing tool, Graph Search patterns can also  provide more targeted behaviour for advertisers.” Mohan also looks at  the feature as a social influencer. “If I’m looking to buy a new car,  I’d rather use Graph Search to find out opinions based on my friends’  recommendations than a web search involving strangers,” he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;From his experience, Asher says that the site doesn’t compromise the  privacy settings that the user has set. But Ankit Tuteja, a 23-year-old  technology expert in Delhi, would beg to differ with this. Tuteja has  experimented with random searches to gauge how the feature worked with  different privacy settings and found that Facebook tends to override  certain security settings. “The security of your photographs are a major  cause for concern,” he cautions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For those concerned about privacy, it’s best to think carefully before  ‘liking’ or uploading anything as it will remain in the digital realm  forever, says Abraham. Mohan shrugs off privacy concerns as overrated.  “You lost your personal life when you went online. Stalking can happen  otherwise too.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This innovation is clearly important to the company. While Asher says  it is part of Facebook’s long-term plans to move beyond networking,  Abraham says that faced with slow overall growth globally (except in  markets like India), such innovations are just an attempt to keep its  user base intact.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The more things change...&lt;/b&gt;&lt;br /&gt; Whatever the reaction, Facebook is probably banking on the fact that  after initial protests and social media debates, people will come around  to accepting this intrusion into their private lives.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The American news satire website The Onion pretty much nailed this  when, in a satirical piece, it ‘quoted’ Zuckerberg as saying: “Facebook  will introduce a bunch of new features that everyone will hate, that  will make your experience worse, you will complain about it, and then  you will realize you are utterly powerless to do anything about these  new features, at which point you will move on and continue to use our  product every single day. Any users who strongly disagree with their  policy should feel free to deactivate their accounts and reactivate them  two days later.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Admit it, you’ll probably be one of them.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/dna-july-21-2013-shikha-kumar-your-life-is-an-open-facebook'&gt;http://editors.cis-india.org/news/dna-july-21-2013-shikha-kumar-your-life-is-an-open-facebook&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-26T04:53:11Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
