<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="http://editors.cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>http://editors.cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1171 to 1185.
        
  </description>
  
  
  
  
  <image rdf:resource="http://editors.cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/business-world-9-2-2015-abraham-c-mathews-www-the-hackers-haven"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/a2k/blogs/cis-comments_first-draft-of-national-ipr-stategy.pdf"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/a2k/blogs/cis-submission-to-expert-committee.pdf"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/openness/blog-old/samaja-op-ed-jan-2015.pdf"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/accessibility/blog/nvda-e-speak-report-august-november-2014.pdf"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/accessibility/blog/nvda-e-speak-report-june-aug-2014.pdf"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/winter-school-on-privacy-surveillance-data-protection"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/economic-times-jayadevan-pk-neha-alawadhi-india-cyber-security-budget-woefully-inadequate-experts"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/a2k/events/poesis-in-the-information-age"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/openness/news/citizen-media-summit-2015"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/openness/events/code-as-communication"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/openness/news/the-times-of-india-january-20-2015-sandhya-soman-musician-donates-gwalior-gharana-songs-to-free-e-library"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/hindustan-times-january-20-2015-devanik-saha-indiaspend-350-per-cent-surge-in-cyber-crimes-in-last-3-years"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/a2k/news/seventh-global-ip-convention"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/symposium-on-human-rights-and-internet-in-india"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/business-world-9-2-2015-abraham-c-mathews-www-the-hackers-haven">
    <title>WWW: The Hackers’ Haven</title>
    <link>http://editors.cis-india.org/internet-governance/news/business-world-9-2-2015-abraham-c-mathews-www-the-hackers-haven</link>
    <description>
        &lt;b&gt;In an increasingly connected world, it pays to be careful when sharing personal information &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This story by Abraham C. Mathews was published in &lt;a class="external-link" href="http://www.businessworld.in/news/business/it/www-the-hackers%E2%80%99-haven/1707848/page-1.html"&gt;BW | Businessworld Issue Dated 09-02-2015&lt;/a&gt;. Sunil Abraham gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Last year, Whatsapp changed its encryption algorithm several times and, every time, it was breached,” says Saket Modi, hacker, entrepreneur and CEO of Lucideus Technologies, which just created an app that monitors wayward activity on your smartphone. That’s geekspeak for: “Your WhatsApp chats, including deleted ones, would have been accessible to any hacker worth his salt”. And we are talking about a company that was valued at $19 billion at some point during the year. Only in November 2014 did WhatsApp finally embrace end-to-end encryption, which will ostensibly address the issue.&lt;br /&gt; &lt;br /&gt;Or take the sales claim that every smartphone purchaser has heard — “Android is safe from virus.” That’s not, however, what a joint study by security solutions company Kaspersky and Interpol found. In the first half of 2014, 1,75,442 unique malicious programmes targeted at Android were discovered. Clearly a tribute to the platform on which 85 per cent of smartphones run.&lt;br /&gt; &lt;br /&gt;In a TEDx talk last year titled ‘What’s physically possible in the virtual world’, Modi demonstrated how, with access to your smartphone for barely 20 seconds, he can see everything that has ever happened on your phone — text messages, call log, browsing history, and so on. He also showed how fraudulent emails could be disguised so as to appear to have come from a yahoo.com email address, and how you could be hacked even without being connected to the Internet. “There are only two kinds of people in the world,” he says. “Those who know they have been hacked and those who don’t.”&lt;br /&gt; &lt;br /&gt;&lt;b&gt;Epidemic Proportions&lt;/b&gt;&lt;br /&gt;For cyber security, 2014 was annus horribilis. From celebrities whose intimate pictures were dumped on the Internet, to corporates such as Sony, JP Morgan and Target whose records were hacked into and personal information of millions of their customers compromised, it was the year when the proverbial shit hit the fan. Details (names, numbers, even favourite pizza toppings) of six lakh customers of Domino’s Pizza in France and Belgium were stolen for a $40,000 ransom. One hundred and ten million records (credit card details, social security numbers, along with addresses) from Target were stolen. The company later admitted that its sales were “meaningfully weaker” after the data theft was disclosed. One hundred and forty-five million records were stolen from eBay, 109 million from Home Depot and 83 million from JP Morgan during the year.&lt;br /&gt; &lt;br /&gt;In 2013, a group that calls itself the Syrian Electronic Army hacked into Swedish company TrueCaller’s database. TrueCaller, an app, allows you to identify phone numbers. The data is collected from the contact list of those who download the app, which means, it even has details of those who haven’t downloaded or used the app in any way. Estimates put the number of Indians whose numbers could have been stolen at a million.&lt;br /&gt; &lt;br /&gt;Cyber security is not yet a boardroom topic, says Anil Bhasin, MD, India &amp;amp; Saarc, Palo Alto Networks, which claims to create comprehensive security solutions for users but is fast becoming one with the increase in security breach incidents. Enterprises still use legacy technology that at times is 20 years old, he says, giving the example of banks that sometimes have a layer-3 staple inspection firewall, when they should ideally be running on layer-7.&lt;br /&gt; &lt;br /&gt;When companies store your information, you also benefit. For example, when an e-commerce company does so, online shopping becomes faster and easier. But these companies should invest in measures to protect the information, says Sunil Abraham, executive director of the Centre for Internet and Society in Bangalore. But then again, he says, a lot of breaches, like the celebrity iCloud hack, happen because users are negligent with measures designed to protect them. Passwords, for instance.&lt;br /&gt; &lt;br /&gt;A Pew Research report found that only four out of 10 Internet users changed passwords after the ‘heartbleed’ virus (which found a way to unlock encrypted data) was uncovered in April 2014. Only 6 per cent thought their information was stolen. But, in August, it emerged that a Russian crime ring had amassed 1.2 billion user name-password combinations of 500 million email addresses from 4,20,000 websites. A Kaspersky study found that the number of malicious programmes detected rose 10 times in just six months to 6,44,000 in March 2014. This shows the call for vigil cannot not be more critical.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Interestingly, your online financial payments may be relatively more secure, thanks to Reserve Bank of India’s dogged persistence in continuing with the two-step verification process for electronic payments (a one-time password and PIN verification). The central bank drew a lot of flak for barring taxi app Uber from storing payment information and automatically deducting charges at the end of a ride. But Modi isn’t impressed. He likens the two-step verification to a batsman going onto the pitch wearing just a helmet. “The rest of your body is still exposed,” he says.&lt;br /&gt; &lt;br /&gt;&lt;b&gt;Easy Targets&lt;/b&gt;&lt;br /&gt;Here’s one easy hack that Modi describes. Any app that you download from the app store on your phone asks for a set of permissions, which mostly come as an ‘all or nothing’ option. You either grant all the access it asks for, or you can’t download the app. Suppose, you grant a scrabble app access to your text messages. Your number can then be accessed by the app provider. Now think about how your banking transactions are verified — with a one-time password sent as a text message. With access to your text messages, entering that password would hardly be a challenge for hackers, says Modi. Or, suppose you were to set up a new WhatsApp account with that same number. The verification, like we all know, comes through a one-time password sent to your number. With access to your text messages, the hacker is given a virtual key to your entire WhatsApp history.&lt;br /&gt; &lt;br /&gt;Or, take for instance, an app that requests access to your SD card (the storage card in your phone). With that permission, the app gets access to everything on your SD card, including your most private photos. Modi’s company Lucideus recently came out with an app, UnHack, that scans your phone to see which apps can access what data. If you use the app, you will find that not only can Facebook access the call logs on your phone, but apps like Wunderlist (which organises to-do lists) and Pocket (which stores articles for future offline reading) can access your contacts as well. The apps from TED (of  TED Talks fame) as well as Flipkart can see as well as edit your personal photos and documents.&lt;br /&gt; &lt;br /&gt;Companies —Uber, for instance — have in the past been found to be frivolous with data collected. Late last year, Uber greeted a Buzzfeed reporter who had arrived at the company’s New York headquarters with “There you are — I was tracking you”. No prior permission was sought. A venture capitalist, Peter Sims, had written earlier that his exact whereabouts in New York were displayed to a room full of people as part of a demonstration at a company event in Chicago.&lt;br /&gt; &lt;b&gt;&lt;br /&gt;Information Overload&lt;/b&gt;&lt;br /&gt;Adam Tanner, a Harvard fellow and a Forbes columnist, was at an annual conference of the Direct Marketers Association, where he noticed a list of names of 1.8 million people with erectile dysfunction (ED), along with their email addresses and numbers. The organisers claimed the details were volunteered by the people themselves. Knowing that ED is something that men rarely admit to, he made the organisers an offer — “Let me purchase a list of a thousand people, and write to them to see if they know that they are on such a list.” The organisers refused, saying it would be an immoral use of their data. From this, one can tell that the information came from websites that took their details, promising a cure.&lt;br /&gt; &lt;br /&gt;This, and other similar anecdotes made their way to his recent book, What Stays in Vegas, which deals with the world of personal data and the end of privacy as we know it. When Tanner meets Indians, he brings up matrimonial websites. What surprises him is the volume of information that people disclose. To westerners, details such as sub-caste or blood type, as well as in many cases the admission that a person is HIV+ is an outright breach of privacy. That people would volunteer to put this out in public is shocking. “When you are looking for a suitable match, giving the information may be important at the moment, but you must not forget that once something is on the Internet, it can never be completely deleted,” he warns.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But what is the problem if somebody has all the details, you may ask. Is the potential risk greater than the possibility of a perfect match? A PTI report from 2009 talks about a confession by an Indian Mujahideen operative who used information from such sites to get a student identity card as well as a driving licence. Mukul Shrivastava, a partner in the forensic practice at EY, gives you another alarming scenario. Let’s say somebody trawls your Facebook, what is the amount of information that such a person can get access to? Your daily routine, your physical movement, your favourite restaurant or whether you will be at home at a certain time (from a status message like “Can’t wait to watch the Devils trouncing Liverpool at ManU Café tonight!”). Even if a physical attack is not on the agenda, much of the information can be used to guess security questions (favourite cat, first school) and find out required details for phone banking (date of birth, email address, mother’s name). An HDFC Bank official says there is a rise in vishing (the voice equivalent of phishing) attacks, where people with access to bank account numbers as well as personal details pose as bank executives and lure customers with special benefits and convince them to divulge their banking passwords.  &lt;br /&gt; &lt;br /&gt;Security is an individual’s responsibility, says Sunil Abraham. “You have to remember that you have volunteered to put the information online,” he says. Information once put online is not private anymore. It’s like making an announcement in a large hall that is broadcast on TV. That’s what the Internet is. And once the Internet gets to know, it can never really be forgotten, says Vishnu Gopal, chief technology officer at MobME, a mobile value-added services provider. It will be available on some weblink or at least on archive.org, which claims to have ‘435 billion pages saved over time’.&lt;br /&gt; &lt;br /&gt;While reclaiming lost information might be difficult, one can still reclaim privacy. Both Facebook and Gmail have options to disable monitoring by other applications. It might be worthwhile to pay the permissions page a visit. Routine password changes, as well as keying them in every time (rather than saving them on the system) might be worth the trouble. That said, nothing works like caution.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;An Attacking Refrigerator!&lt;/b&gt;&lt;br /&gt;A year ago, Proofpoint, a US-based security solutions provider, noticed an unusual type of cyber attack. Emails were sent in batches of about a lakh, thrice a day, aimed at slowing down large enterprises. What was unique about this attack was that upto 25 per cent of the volume was sent by devices other than computers, laptops, mobile phones or such devices. Instead, the emails came from everyday consumer electronic items like network routers, televisions, and at least one refrigerator, according to the company, with not more than 10 emails from any one device, making the attack difficult to block. This is now known as the first Internet of Things or IoT-based attack, where connected everyday-use devices are hacked into and used as cyber weaponry.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;div&gt;With  the IoT, you have devices talking to one another, opening up multiple  places to be breached, says MobME’s Gopal. From your shoe to T-shirt,  everything becomes a potential bot. India should be concerned. Research  by securities provider Symantec says India tops the list of countries  wherein Distributed Denial of Service (DDoS) attacks originate. DDoS  attacks are those where hundreds of bots target a website (say, an  e-commerce company) on its big discount day, thereby slowing down  traffic to the site. The report says a bot’s services can be bought for  as low as Rs 300 to bring down a site for a few minutes. Monthly  subscription plans are available for lengthier attacks.&lt;/div&gt;
&lt;div&gt;Corporates  can never be too careful, feels Shrivastava who, as part of his  investigations, comes across several instances where companies are  hacked into because of lack of best practices. How many companies have  blocked pen drives on office machinery, he asks. In a tiny device, a  humungous amount of data can be stolen. Till the first incident happens,  nobody realises the importance of security, he says. For example, at  EY, the IT security does not permit copying of the text of emails by the  recipient. Recent reports suggest that the JP Morgan security breach  was the result of neglect of one of its servers in terms of a security  upgrade.&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;According to a study by Microsoft,  the estimated loss to enterprises from lost data in 2014 was $491 billion.&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;&lt;b&gt;You Against The Mafia&lt;/b&gt;&lt;br /&gt;The fight really is about who’s weaker, says Altaf Halde, managing director, Kaspersky Lab-South Asia. “The problem here is the consumer.” Nothing excuses us from not protecting ourselves. That includes getting an anti-virus installed, but most people often disable it when it flags a particular activity that we want to pursue online. &lt;br /&gt; &lt;br /&gt;Halde also brings up the BYOD (bring your own device) culture that is taking root. Asking employees to bring their own devices could help cut costs for a company, but that also brings in their inadequate protection, which could potentially translate into a much higher cost to the company, he says. &lt;br /&gt; &lt;br /&gt;On the other side of the ring is the virtual underground mafia that profits from all types of data that get compromised — details of one’s sexual preferences, favourite restaurants or credit card details. Modi says in underground circles, the going rate for a stolen credit card number is $2.2 for a Visa, $2.5 for a MasterCard and $3 for an AmEx number. Transactions are made through crypto-currencies such as bitcoins, making them virtually untraceable.&lt;br /&gt; &lt;br /&gt;As Modi says, the ideal scenario would be for all of us to throw away our smartphones and live an entirely offline existence. “But since that isn’t feasible, let’s embrace the risk, but with adequate measures to ensure that we are not affected.”&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/business-world-9-2-2015-abraham-c-mathews-www-the-hackers-haven'&gt;http://editors.cis-india.org/internet-governance/news/business-world-9-2-2015-abraham-c-mathews-www-the-hackers-haven&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-02-05T02:20:04Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/a2k/blogs/cis-comments_first-draft-of-national-ipr-stategy.pdf">
    <title>Comments on First Draft of National IP Policy </title>
    <link>http://editors.cis-india.org/a2k/blogs/cis-comments_first-draft-of-national-ipr-stategy.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/a2k/blogs/cis-comments_first-draft-of-national-ipr-stategy.pdf'&gt;http://editors.cis-india.org/a2k/blogs/cis-comments_first-draft-of-national-ipr-stategy.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2015-02-04T13:51:50Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/a2k/blogs/cis-submission-to-expert-committee.pdf">
    <title>CIS Submission to the Expert Committee: Broadening of Definitions in the Proposed Broadcast Treaty Compared to Other International Conventions </title>
    <link>http://editors.cis-india.org/a2k/blogs/cis-submission-to-expert-committee.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/a2k/blogs/cis-submission-to-expert-committee.pdf'&gt;http://editors.cis-india.org/a2k/blogs/cis-submission-to-expert-committee.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2015-02-02T16:52:51Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/openness/blog-old/samaja-op-ed-jan-2015.pdf">
    <title>Samaja Op-ed (January 2015)</title>
    <link>http://editors.cis-india.org/openness/blog-old/samaja-op-ed-jan-2015.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/openness/blog-old/samaja-op-ed-jan-2015.pdf'&gt;http://editors.cis-india.org/openness/blog-old/samaja-op-ed-jan-2015.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2015-01-31T04:49:05Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/accessibility/blog/nvda-e-speak-report-august-november-2014.pdf">
    <title>NVDA Quarterly Report: August to November 2014</title>
    <link>http://editors.cis-india.org/accessibility/blog/nvda-e-speak-report-august-november-2014.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/accessibility/blog/nvda-e-speak-report-august-november-2014.pdf'&gt;http://editors.cis-india.org/accessibility/blog/nvda-e-speak-report-august-november-2014.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2015-01-31T01:02:01Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/accessibility/blog/nvda-e-speak-report-june-aug-2014.pdf">
    <title>NVDA Quarterly Report: June to August 2014</title>
    <link>http://editors.cis-india.org/accessibility/blog/nvda-e-speak-report-june-aug-2014.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/accessibility/blog/nvda-e-speak-report-june-aug-2014.pdf'&gt;http://editors.cis-india.org/accessibility/blog/nvda-e-speak-report-june-aug-2014.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2015-01-31T00:58:23Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/winter-school-on-privacy-surveillance-data-protection">
    <title>Winter School on Privacy, Surveillance and Data Protection </title>
    <link>http://editors.cis-india.org/internet-governance/news/winter-school-on-privacy-surveillance-data-protection</link>
    <description>
        &lt;b&gt;The   Centre   for   Communication   Governance   (CCG)   in   collaboration   with   the  UNESCO  Chair  on  Freedom  of  Communication  and  Information at  the  University  of  Hamburg  and  the  Hans   Bredow   conducted a week-long winter school on 'Privacy, Surveillance and Data Protection at National Law University, Delhi, from January 19 to 23, 2015.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The winter school focused on the law governing privacy in the EU and in India and covered issues ranging from surveillance to data protection. German and Indian members of faculty used interactive methods of teaching and group activities in each session, to help students from Germany, India and Israel contribute to the classroom and learn from each other.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Bhairav Acharya was a speaker at the event. He spoke on 'privacy theory'. More &lt;a class="external-link" href="http://www.nludelhi.ac.in/wp-content/uploads/CCG-at-NLUD-Call-for-Delhi-Winter-School.pdf"&gt;information here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/winter-school-on-privacy-surveillance-data-protection'&gt;http://editors.cis-india.org/internet-governance/news/winter-school-on-privacy-surveillance-data-protection&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-02-07T00:37:55Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/economic-times-jayadevan-pk-neha-alawadhi-india-cyber-security-budget-woefully-inadequate-experts">
    <title>India’s cyber-security budget 'woefully inadequate': Experts</title>
    <link>http://editors.cis-india.org/internet-governance/news/economic-times-jayadevan-pk-neha-alawadhi-india-cyber-security-budget-woefully-inadequate-experts</link>
    <description>
        &lt;b&gt;India's cyber-security budget was more than doubled last year. Yet, it is "woefully inadequate" in the wake of revelations made by US National Security Agency contractor Edward Snowden and increasing cyber-attacks on government infrastructure, according to experts.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Jayadevan P.K. and Neha Alawadhi was &lt;a class="external-link" href="http://articles.economictimes.indiatimes.com/2015-01-28/news/58546771_1_cyber-security-cert-in-national-cyber-coordination-centre"&gt;published in the Economic Times &lt;/a&gt;on January 28, 2015. Sunil Abraham was quoted in this.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;In&lt;/p&gt;
&lt;p&gt;2014-15, the Department of IT has set  aside Rs 116 crore for cyber  security. The country has proposed to set  up a national cyber  coordination centre (NCCC) with a separate budget  of Rs 1,000 crore. The  coordination centre is still awaiting Cabinet  clearance. "Allocation is  woefully inadequate given Snowden's  revelations - we need at least 10  times that amount," said &lt;a href="http://economictimes.indiatimes.com/topic/Sunil%20Abraham"&gt;Sunil Abraham&lt;/a&gt;, &lt;a href="http://economictimes.indiatimes.com/topic/executive%20director"&gt;executive director&lt;/a&gt; at &lt;a href="http://economictimes.indiatimes.com/topic/Center%20for%20Internet"&gt;Center for Internet&lt;/a&gt; and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to the Computer Emergency  Response Team-India (CERT-In),  reported attacks on Indian websites have  increased nearly five times in  the past four years. Until mid-2014,  CERT-In recorded more than 60,000  incidents.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Cyber security of government  infrastructure faces  multiple issues. It needs better hardware and  software audits and  implementation of proposed projects.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to &lt;a href="http://economictimes.indiatimes.com/topic/Sivarama%20Krishnan"&gt;Sivarama Krishnan&lt;/a&gt;, executive director at consultancy firm PwC which works on various government projects, cyber security budgets might be &lt;a href="http://economictimes.indiatimes.com/topic/spread"&gt;spread&lt;/a&gt; across various government departments and the allocation has seen encouraging growth since the &lt;a href="http://economictimes.indiatimes.com/topic/Narendra%20Modi%20government"&gt;Narendra Modi government&lt;/a&gt; has come into power. "In real essence, the government spending in   security has been growing," said Krishnan. "Every Digital India   discussion ends with cyber security being talked about."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Experts  also pointed out the need for a  singular view of the government's cyber  security infrastructure.  "Various states are doing many things for cyber  security. Once these  kinds of islands are get set up, it would be worth  seeing how the  government is going to integrate all of them to convert  into a  productive vehicle," said Krishnan.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Experts also pointed out the need for a  singular view of the  government's cyber security infrastructure.  "Various states are doing  many things for cyber security. Once these  kinds of islands are get set  up, it would be worth seeing how the  government is going to integrate  all of them to convert into a  productive vehicle," said Krishnan.&lt;/p&gt;
&lt;p&gt;2014-15, the Department of IT has set  aside Rs 116 crore for cyber  security. The country has proposed to set  up a national cyber  coordination centre (NCCC) with a separate budget  of Rs 1,000 crore. The  coordination centre is still awaiting Cabinet  clearance. "Allocation is  woefully inadequate given Snowden's  revelations - we need at least 10  times that amount," said &lt;a href="http://economictimes.indiatimes.com/topic/Sunil%20Abraham"&gt;Sunil Abraham&lt;/a&gt;, &lt;a href="http://economictimes.indiatimes.com/topic/executive%20director"&gt;executive director&lt;/a&gt; at &lt;a href="http://economictimes.indiatimes.com/topic/Center%20for%20Internet"&gt;Center for Internet&lt;/a&gt; and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to the Computer Emergency  Response Team-India (CERT-In),  reported attacks on Indian websites have  increased nearly five times in  the past four years. Until mid-2014,  CERT-In recorded more than 60,000  incidents.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Cyber security of government  infrastructure faces  multiple issues. It needs better hardware and  software audits and  implementation of proposed projects.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to &lt;a href="http://economictimes.indiatimes.com/topic/Sivarama%20Krishnan"&gt;Sivarama Krishnan&lt;/a&gt;, executive director at consultancy firm PwC which works on various government projects, cyber security budgets might be &lt;a href="http://economictimes.indiatimes.com/topic/spread"&gt;spread&lt;/a&gt; across various government departments and the allocation has seen encouraging growth since the &lt;a href="http://economictimes.indiatimes.com/topic/Narendra%20Modi%20government"&gt;Narendra Modi government&lt;/a&gt; has come into power. "In real essence, the government spending in   security has been growing," said Krishnan. "Every Digital India   discussion ends with cyber security being talked about."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Experts  also pointed out the need for a  singular view of the government's cyber  security infrastructure.  "Various states are doing many things for cyber  security. Once these  kinds of islands are get set up, it would be worth  seeing how the  government is going to integrate all of them to convert  into a  productive vehicle," said Krishnan.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Experts also pointed out the need for a  singular view of the  government's cyber security infrastructure.  "Various states are doing  many things for cyber security. Once these  kinds of islands are get set  up, it would be worth seeing how the  government is going to integrate  all of them to convert into a  productive vehicle," said Krishnan.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/economic-times-jayadevan-pk-neha-alawadhi-india-cyber-security-budget-woefully-inadequate-experts'&gt;http://editors.cis-india.org/internet-governance/news/economic-times-jayadevan-pk-neha-alawadhi-india-cyber-security-budget-woefully-inadequate-experts&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2015-02-09T01:20:07Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/a2k/events/poesis-in-the-information-age">
    <title>Poesis in the Information Age: Language and its Limit[ation]s</title>
    <link>http://editors.cis-india.org/a2k/events/poesis-in-the-information-age</link>
    <description>
        &lt;b&gt;Alec Schachner, an independent scholar, translator, multi-genre musician and sound artist will give a talk on the limits/limitations of languages at the Centre for Internet &amp; Society's office on January 30, 2015 at 5 p.m.&lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;The Talk&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;An examination of the limits/limitations of language(s) through the lens of contemporary Vietnamese poetics and print culture, aiming to open a deeper dialogue on the nature of self/state expression and censorship in the age of internet connectivity.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Alec Schachner&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Alec graduated from Columbia College with a degree in Sociocultural  Anthropology, English &amp;amp; Comparative Literature, Creative Writing and  Music Theory/Composition. Alec currently resides in Vietnam, where he  has served as lecturer on literature for 5 years with the Faculty of  English Linguistics and Literature at the Vietnam National University of  Social Sciences and Humanities HCMC. He is working on English  translations of several anthologies of Vietnamese poetry, one of which -  &lt;i&gt;the purification festival in April&lt;/i&gt; - just went to print across  VN earlier this month. He is also pursuing research into contemporary  Saigonese print culture and the social/cyber mileus surrounding literary  circles/movements in the post-Socialist cultural sphere.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/a2k/events/poesis-in-the-information-age'&gt;http://editors.cis-india.org/a2k/events/poesis-in-the-information-age&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2015-01-26T13:57:34Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/openness/news/citizen-media-summit-2015">
    <title>Citizen Media Summit 2015</title>
    <link>http://editors.cis-india.org/openness/news/citizen-media-summit-2015</link>
    <description>
        &lt;b&gt;The Citizen Media Summit 2015 was held in Cebu City, Philippines on January 24 and 25, 2015. Subhashish Panigrahi was a speaker at the event.&lt;/b&gt;
        &lt;p&gt;&lt;a class="external-link" href="http://globalvoicescitizenmediasum2015.sched.org/event/d28731386f15de314b3a90ddf1cd90c2#.VNd1tix8h8c"&gt;Click to read more on the programme schedule on the Global Voices website&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/openness/news/citizen-media-summit-2015'&gt;http://editors.cis-india.org/openness/news/citizen-media-summit-2015&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    

   <dc:date>2015-02-08T14:57:29Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/openness/events/code-as-communication">
    <title>Code As Communication</title>
    <link>http://editors.cis-india.org/openness/events/code-as-communication</link>
    <description>
        &lt;b&gt;Gene Kogan will give a talk at the Centre for Internet &amp; Society's Bangalore office on February 2, 2015. The talk will be from 5 p.m. to 7 p.m. Gene's talk will draw analogies between software, communication, creativity, and expressivity. Programming has a long history of comparison to other written media, with inevitable consequences on our legal policy over authorship and ownership.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;With the emergence of free "creative coding" and "live coding" platforms like Processing, OpenFrameworks, PureData, vvvv, and SuperCollider, the boundaries between code and creative expression have further eroded, initiating inquiry as to its overlap with "traditional" creative writing. We are confronted with old questions within new contexts. As existing institutions incorporate emerging technologies into their creative programs and new ones take root and solidify, how do we make an infrastructure which most effectively and transparently fosters the development of creative technology? How do we ensure that this process is fair and democratic, and at greatest benefit and lowest cost to the public? What rights should users and developers receive? As the distinction between art and technology becomes blurry, what relevance does the FOSS movement have in cultivating cultural production?&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Gene Kogan&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Gene Kogan is a programmer and artist who writes free software for new and emerging technologies. He creates tools for live music, dance, theatre, and performance art. He contributes to numerous open-source software projects, and frequently gives workshops and demonstrations on topics related to code and art.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Follow Gene Kogan elsewhere:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Website: &lt;a class="moz-txt-link-rfc2396E" href="http://www.genekogan.com"&gt;http://www.genekogan.com&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Vimeo: &lt;a class="moz-txt-link-rfc2396E" href="http://www.vimeo.com/genekogan"&gt;http://www.vimeo.com/genekogan&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Soundcloud: &lt;a class="moz-txt-link-rfc2396E" href="http://www.soundcloud.com/genekogan"&gt;http://www.soundcloud.com/genekogan&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Flickr: &lt;a class="moz-txt-link-rfc2396E" href="http://www.flickr.com/genekogan"&gt;http://www.flickr.com/genekogan&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Github: &lt;a class="moz-txt-link-rfc2396E" href="http://www.github.com/genekogan"&gt;http://www.github.com/genekogan&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Twitter: &lt;a class="moz-txt-link-rfc2396E" href="http://www.twitter.com/genekogan"&gt;http://www.twitter.com/genekogan&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/openness/events/code-as-communication'&gt;http://editors.cis-india.org/openness/events/code-as-communication&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Coding</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    

   <dc:date>2015-01-23T03:12:15Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/openness/news/the-times-of-india-january-20-2015-sandhya-soman-musician-donates-gwalior-gharana-songs-to-free-e-library">
    <title>Musician donates Gwalior Gharana songs to free e-library</title>
    <link>http://editors.cis-india.org/openness/news/the-times-of-india-january-20-2015-sandhya-soman-musician-donates-gwalior-gharana-songs-to-free-e-library</link>
    <description>
        &lt;b&gt;A few years ago, Mumbai-based musician Neela Bhagwat realized that her old notebooks filled with lyrics and notations of age-old 'bandishes' were in tatters. Afraid that she might lose them forever, Bhagwat decided to make fresh copies.&lt;/b&gt;
        &lt;p&gt;The article by Sandhya Soman was &lt;a class="external-link" href="http://timesofindia.indiatimes.com/city/mumbai/Musician-donates-Gwalior-Gharana-songs-to-free-e-library/articleshow/45947631.cms"&gt;published in the Times of India&lt;/a&gt; on January 20, 2015. T. Vishnu Vardhan gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Once she wrote it all down, Bhagwat handed over the notebooks to a  team to upload her collection of around 330 bandishes of the Gwalior  gharana to a free, online library.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;"I was always keen on sharing the compositions with others. Digitization  is the way to go as it can be accessed from anywhere," says Bhagwat.  Based on her notebooks, around 337 bandishes have been converted to PDF  format by student and music researcher Tejaswini Niranjana. "I will be  uploading them soon to Wikisource, which is one of the platforms of  Wikipedia," says Niranjana.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Bhagwat and a few other music-lovers like her are taking up digital  archiving projects to preserve India's cultural heritage without any  institutional support or grant. "I have about 337 bandishes, my guru had  more than 1,000 and his guru would've had still more. So much has got  lost now," says Bhagwat. Even if she is willing to teach, few are able  to understand, internalize and work on these classical compositions. "No  student of mine has learnt all of it. So I thought it best to keep them  in the public domain," says Bhagwat.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Along with music students, scholars also find these projects helpful.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;For example, Andhra Pradesh-based lexicographer Peddi Sambasiva Rao has  created a master index of all the compositions of Annamacharya for  Telugu Wikisource recently. Now, he is in the process of digitizing the  lyrics of all the 15,000 songs of the 15th century composer along with a  fellow enthusiast. "Carnatic music lovers find it difficult to locate  individual songs as there are 29 volumes of Annamacharya's works.  Instead of publishing the index as a book, I thought of approaching  Wikipedia, which is known to everyone," says Rao.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;As the index is in Unicode, the standard text encoding format, the  Telugu kirtanas will soon come up on search engines, says T Vishnu  Vardhan, programme director, Access to Knowledge, CIS, which helped host  these projects. "By June, we hope to have the entire Annamacharya  kirtanas at a single source and eventually do the same for the songs of  the Gwalior Gharana. This is the only way to make our cultural heritage  accessible to future generations," says Vardhan.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Bhagwat says cultural and educations institutions should take the lead  in digital archiving as the benefits are multi-fold. Once the bandishes  are online, Bhagwat's students abroad will have the text along with the  DVDs that she has brought out. "By the second or third Skype lesson,  they would've learnt it," says Bhagwat.&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/openness/news/the-times-of-india-january-20-2015-sandhya-soman-musician-donates-gwalior-gharana-songs-to-free-e-library'&gt;http://editors.cis-india.org/openness/news/the-times-of-india-january-20-2015-sandhya-soman-musician-donates-gwalior-gharana-songs-to-free-e-library&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Wikimedia</dc:subject>
    

   <dc:date>2015-01-22T15:25:49Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/hindustan-times-january-20-2015-devanik-saha-indiaspend-350-per-cent-surge-in-cyber-crimes-in-last-3-years">
    <title>350% surge in Cyber crimes in last 3 years</title>
    <link>http://editors.cis-india.org/internet-governance/news/hindustan-times-january-20-2015-devanik-saha-indiaspend-350-per-cent-surge-in-cyber-crimes-in-last-3-years</link>
    <description>
        &lt;b&gt;India’s registered cyber crimes leapt 350% in three years but the legal system is struggling to cope with more and more lawbreakers exploiting the anonymity of the internet.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://www.hindustantimes.com/india-news/350-surge-in-cyber-crimes-in-last-3-years/article1-1308635.aspx"&gt;published in the Hindustan Times&lt;/a&gt; on January 20, 2015. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;National Crime Records Bureau statistics show number of recorded cases of cyber crime jumped to 4,356 from 966 in the three years up to 2013, with India being more susceptible to digital attacks because of the increasing number of net users in the fast-growing economy.&lt;br /&gt;&lt;br /&gt;“Illegal gains” and “harassment” are the top cyber crime motives, the data reveal, though the majority of the crimes were registered under the “others” category — 2,144 cases in 2013. Analysts say such a high number of cases being pigeonholed in this section implies current laws and regulations aren’t detailed enough to tackle cyber crime.  The challenge is daunting for India — estimated to have 302 million internet users by the end-2014 and set to have the second largest number of netizens in the world after China this year.&lt;br /&gt;&lt;br /&gt;Data show that the age group of 18-30 accounts for the highest percentage of cyber crime with 1,638 persons arrested out of 3,301 in 2013.  The surge in cyber crime may also have been brought on by inefficiencies in the legal system with activists challenging some cyber laws considered too draconian for a modern, democratic society.&lt;br /&gt;&lt;br /&gt;Various sections of the IT Act were deeply flawed as they were “copy-paste jobs” from British and American laws, said Sunil Abraham, founder-director of Bengaluru-based Centre for Internet &amp;amp; Society.  To prevent such abuses, the Supreme Court ruled in 2013 that arrests could only be made after clearance from an inspector general of police in a city and a superintendent of police in a district.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(Devanik Saha is Data Editor at The Political Indian; Indiaspend.org is a data-driven, public-interest journalism non-profit)&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/hindustan-times-january-20-2015-devanik-saha-indiaspend-350-per-cent-surge-in-cyber-crimes-in-last-3-years'&gt;http://editors.cis-india.org/internet-governance/news/hindustan-times-january-20-2015-devanik-saha-indiaspend-350-per-cent-surge-in-cyber-crimes-in-last-3-years&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-02-07T16:13:59Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/a2k/news/seventh-global-ip-convention">
    <title>Seventh Global Intellectual Property Convention</title>
    <link>http://editors.cis-india.org/a2k/news/seventh-global-ip-convention</link>
    <description>
        &lt;b&gt;The Seventh Global IP Convention took place in Mumbai from January 15 to 17, 2015. Rohini Lakshané attended the event.&lt;/b&gt;
        &lt;h3&gt;Agenda&lt;/h3&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Time&lt;/th&gt;&lt;th&gt;Detail&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;08.00&lt;br /&gt;09.00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;Registration&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;09.00&lt;br /&gt;10.30&lt;/td&gt;
&lt;td&gt;Inaugural Session (Majestic I &amp;amp; II)&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10.30&lt;br /&gt;11.00&lt;/td&gt;
&lt;td&gt;Coffee Break and Networking Session&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11.00&lt;br /&gt;12.30&lt;/td&gt;
&lt;td&gt;Plenary Session I: Power of IP: Gateway to Growth (Majestic I &amp;amp; II) &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12.30&lt;br /&gt;13.30&lt;/td&gt;
&lt;td&gt;Lunch Break &amp;amp; Networking Session&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13.30&lt;br /&gt;15.30&lt;/td&gt;
&lt;td&gt;Technical Session: I, II &amp;amp; III&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15.30&lt;br /&gt;16.00&lt;/td&gt;
&lt;td&gt;Coffee Break and Networking Session&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;16.00&lt;br /&gt;18.00&lt;/td&gt;
&lt;td&gt;Technical Session: IV, V &amp;amp; VI&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;For more info on the event, &lt;a class="external-link" href="http://iprconference.com/"&gt;click here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/a2k/news/seventh-global-ip-convention'&gt;http://editors.cis-india.org/a2k/news/seventh-global-ip-convention&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2015-02-12T16:59:01Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/symposium-on-human-rights-and-internet-in-india">
    <title>Symposium on Human Rights and the Internet in India</title>
    <link>http://editors.cis-india.org/internet-governance/news/symposium-on-human-rights-and-internet-in-india</link>
    <description>
        &lt;b&gt;On January 17, 2015 the Center for Communication Governance at National Law University, Delhi in collaboration with the UNESCO Chair on Freedom of Communication and Information at the University of Hamburg hosted a pubic symposium on “Human Rights and Internet in India” as a Network of Centers (NoC) regional event. Bhairav Acharya was a panelist.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;See the &lt;a class="external-link" href="http://networkofcenters.net/sites/networkofcenters.net/files/dehli-concept-note.pdf"&gt;concept note here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The event convened a diverse group of collaborators working on issues of Privacy, Surveillance, Data Protection, Freedom of Expression and Intermediary Liability in India, the surrounding region, and internationally.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Agenda | Saturday, January 17 | Public Symposium&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Opening words&lt;br /&gt; &lt;i&gt;Prof. (Dr.) Ranbir Singh, Vice Chancellor, National Law University, Delhi&lt;/i&gt;&lt;br /&gt; &lt;i&gt;Prof. (Dr.) Wolfgang Schulz, Director, Alexander von Humboldt Institute for Internet &amp;amp; Society &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;b&gt;17:45 – 19:00 Panel I: Surveillance &amp;amp; Databases: Experiences &amp;amp; Privacy&lt;/b&gt;&lt;/b&gt;&lt;br /&gt; The panel will explore how surveillance in India might become more  consistent with international human rights standards and Indian  constitutional values. It will also discuss the consequences of  ubiquitous database programs for citizens’ human rights. This will  include comparative perspectives around similar problems and a  discussion of privacy-compatible practices in other countries.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Panelists:&lt;/b&gt;&lt;br /&gt; &lt;i&gt;Dr. Usha Ramanathan, Independent Law Researcher&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Mr. Bhairav Acharya, Lawyer, Supreme Court of India and Adviser Centre for Internet &amp;amp; Society, Bangalore&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Mr. Saikat Datta, Editor (National Security), Hindustan Times&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Professor KS Park, Former Commissioner, Korea Communications Standards Commission and Professor, Korea University Law School&lt;/i&gt;&lt;br /&gt; &lt;b&gt; &lt;/b&gt;&lt;br /&gt; &lt;b&gt;&lt;b&gt;19:00 – 20:15 Panel II: Unpacking the Intermediary Liability Debate in India&lt;/b&gt;&lt;/b&gt;&lt;br /&gt; The panel will focus on the legal framework governing Internet platforms  in India, especially with regard to online content and its implications  for rights of the citizens. It has been argued that the current legal  framework creates incentives for online intermediaries to take down  content even when no substantive notice or legitimate reasons have been  offered. The panel will consider the debate around intermediary  liability in India in light of the ongoing litigation at the Supreme  Court. It will reflect on the international experience with intermediary  liability legislation and discuss how to ensure that laws support an  innovative and competitive environment for intermediaries, while  ensuring that they prioritize the preservation of their users’ human  rights.&lt;br /&gt; &lt;b&gt; &lt;/b&gt;&lt;br /&gt; &lt;b&gt;Panelists:&lt;/b&gt;&lt;br /&gt; &lt;i&gt;Dr. Joris van Hoboken, Fellow, Information Law Institute at NYU School of Law&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Professor (Dr.) Wolfgang Schulz, Director, Alexander von Humboldt Institute for Internet &amp;amp; Society (HIIG)&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Mr. Raman Jit Singh Chima, Lawyer&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Chinmayi Arun and Sarvjeet Singh, Centre for Communication Governance at National Law University, Delhi&lt;/i&gt;&lt;b&gt; &lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/symposium-on-human-rights-and-internet-in-india'&gt;http://editors.cis-india.org/internet-governance/news/symposium-on-human-rights-and-internet-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-02-07T00:50:00Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
