<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="http://editors.cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>http://editors.cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1281 to 1295.
        
  </description>
  
  
  
  
  <image rdf:resource="http://editors.cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="http://editors.cis-india.org/a2k/blogs/rti-app-2015.pdf"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/Royson.png"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/Routing.png"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/roundtable-identifying-and-limiting-hate-speech-and-harassment-online"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/roundtable-on-icann-accountability"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/round-table-on-user-safety-on-internet"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/user-safety-internet.pdf"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/round-table-on-privacy-and-data-protection-at-nipfp"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/Rothko4.png"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/Rothko3.png"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/Rothko2.png"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/Rothko1.png"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/role-of-us-tech-companies-in-govt-surveillance"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/events/fostering-freedom-of-expression"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/Rohinitraininggroupondigitalsecurity.JPG"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="http://editors.cis-india.org/a2k/blogs/rti-app-2015.pdf">
    <title>RTI App 2015</title>
    <link>http://editors.cis-india.org/a2k/blogs/rti-app-2015.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/a2k/blogs/rti-app-2015.pdf'&gt;http://editors.cis-india.org/a2k/blogs/rti-app-2015.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2016-11-17T15:20:04Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/Royson.png">
    <title>Royson</title>
    <link>http://editors.cis-india.org/home-images/Royson.png</link>
    <description>
        &lt;b&gt;Royson&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/Royson.png'&gt;http://editors.cis-india.org/home-images/Royson.png&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2014-08-12T10:26:18Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/Routing.png">
    <title>Routing</title>
    <link>http://editors.cis-india.org/home-images/Routing.png</link>
    <description>
        &lt;b&gt;Routing&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/Routing.png'&gt;http://editors.cis-india.org/home-images/Routing.png&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-05-06T06:36:44Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/roundtable-identifying-and-limiting-hate-speech-and-harassment-online">
    <title>Roundtable: Identifying and Limiting Hate Speech and Harassment Online</title>
    <link>http://editors.cis-india.org/internet-governance/news/roundtable-identifying-and-limiting-hate-speech-and-harassment-online</link>
    <description>
        &lt;b&gt;Japreet Grewal attended this event organized by Software Freedom Law Centre at Constitution Club Of India, Rafi Marg, New Delhi on July 28, 2016.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;See the original report published by SFLC &lt;a class="external-link" href="http://sflc.in/summary-report-roundtable-on-identifying-and-limiting-hate-speech-and-harassment-online-new-delhi-july-28-2016/"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;SFLC.in organized a roundtable discussion on 28&lt;sup&gt;th&lt;/sup&gt; July, 2016 in New Delhi to initiate a focused and collaborative  dialogue around the increasingly important issues of online harassment  and hate speech. This roundtable was intended as the first in a series  of discussions around said issues, and was attended by representatives  from various stakeholder groups including intermediary platforms, civil  society groups, and media houses, along with individuals who had  personally experienced such online abuse &amp;amp; harassment. The core  objective of this discussion was to recognize and understand the vast  range of concerns that exist in this sphere, in an effort to develop a  framework for the regulation of such activities, without stepping on the  right to freedom of expression. The discussion was conducted under  Chatham House rules so as to facilitate an uninhibited exchange of  views.&lt;/p&gt;
&lt;p align="justify"&gt;Over the course of the event, the complex and  multifaceted nature of its overarching theme unraveled, as the  discussion moved from underlying social constructs, to responsibilities  of intermediary platforms, adequacy of existing laws, sensitization of  everyday users and effective handling of grievances by law enforcement  agencies. At the very outset, it was highlighted that social media  platforms, with their increasing popularity, are being considered  centralized hubs for businesses and others. However, individuals,  communities &amp;amp; institutions often find themselves at the receiving  end of sustained abuse and threats either on grounds of their actual or  perceived characteristics, or over their online expression. The dynamic  discussion that ensued brought to light significant concerns that would  require a collaborative effort across stakeholder groups to address. For  the sake of clarity, we are categorizing these learnings under the  following heads:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p align="justify"&gt;&lt;span&gt;Conceptual understanding of online harassment and hate &lt;/span&gt;&lt;span&gt;speech&lt;/span&gt;&lt;span&gt;:&lt;/span&gt; It was discussed at length that hate speech and speech that culminates  in harassment on the online sphere, are reflective of the social outlook  of the country at large. Women were seen as more frequent targets of  harassment in the form of rape threats, sexual remarks, and name  calling, whereas men are mostly called out for their beliefs and  opinions. When discussing hate speech relations, it was considered  important to take note of the power dynamics at play amongst the  stronger groups, and the vulnerable ones. Limiting such content gets  specially complicated considering the apprehension that in an effort to  monitor hate speech and harassment, free speech may get stifled. The  paradox of anonymity being an enabler of free speech, as well the reason  for unabashed harassment adds yet another layer of complexity to the  issue. Moreover, it was felt that a nuanced distinction needed to be  made regarding the systematic attacks by online mobs against a  particular person, as opposed to hateful and/or harassing speech that  engages on a one to one level. This all culminated in a realization that  this issue goes beyond the online domain, into the societal mindset  that is amplified on the Internet, and that the faint line between free  speech, and hateful &amp;amp; harassing speech is very difficult to  pin-point.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="justify"&gt;&lt;span&gt;Role of intermediaries&lt;/span&gt;:  It was the opinion of the representatives of intermediary platforms at  the roundtable that the current legal frameworks in the country are  sufficient to tackle this issue and they should operate in compliance  with such laws. While the specific terms of service may differ in terms  of permissible content depending on the type of service being provided  by the intermediary, these platforms do invariably keep a check on the  content being generated and evaluate them for compliance with the  applicable terms of service. Additionally, platforms that have the  option of users creating &amp;amp; generating their own content, give the  user various tools such as block, filter, un-follow, and other  customized options to moderate the content they receive. though the  intermediaries, in their own words ‘ are not a delete squad, but a  compliance team’, it was said that they ran the perpetual risk of either  censoring content that should not have been censored, or not censoring  enough of the content that should have been censored. This incentivizes  them to exercise zero-tolerance policies in certain areas such as child  sexual abuse or terrorism, and resort to immediate take down of content  related to such themes. However, in spite of the sheer volume of  material that is generated and reported, it was felt that a completely  automated approach cannot be followed for filtering hateful and  harassing content that violates terms of service Taking down content and  expression requires processing various factors that determine the  context of that material, and this calls for a subjective approach that  requires a set of human eyes. Therefore, the intermediaries do have  tools for users that protect them from hate and harassing speech, and  they work with certain safety experts to ensure that the users feel safe  while using their services.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="justify"&gt;&lt;span&gt;Adequacy of legal frameworks&lt;/span&gt;:  A distinction was drawn over the course of the discussion between hate  speech as a social as opposed to a legal concept. For legal purposes,  speech would not attract penalties until it incites a real threat of  violence and civic disorder. However, the law is not sufficiently  equipped to deal with speech that does not incite violence, but causes  psychological damage. It was undisputed that the concerns in this area  cannot be solved by creating more statutes. Going down this road could  lead to the creation of a Section 66A equivalent that would lead to  censorship through law and cause a chilling effect on freedom of  expression. It was emphasized that the existing laws have adequate  provisions, but a strict implementation is required.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="justify"&gt;&lt;span&gt;Response from law enforcement agencies&lt;/span&gt;:  An evaluation of this point led to the conclusion that people who are  harassed online, or are the targets of hate speech, are hesitant to  approach the police and law enforcement agencies for their help. There  have been instances where the police is unable to help due to the  limited application of laws in such cases, as mentioned above.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="justify"&gt;&lt;span&gt;Possible remedies&lt;/span&gt;: As a part of this roundtable, SFLC.in had proposed a set of &lt;a href="http://sflc.in/wp-content/uploads/2016/08/BestPractices_OnlineHarassment_SFLCin.pdf"&gt;best practices&lt;/a&gt; aimed at limiting hateful and harassing content online. These were  intended as self-regulatory measures that could be followed by  intermediaries functioning as speech platforms, where users could create  and publish content without pre-filtrations. Amongst the measures that  was discussed extensively was the practice of promoting ‘counter speech’  on the platforms that are most frequently used to spread hateful  propaganda and harassment. This was generally seen as an effective  counter-measure deserving further exploration, and one of the  intermediaries mentioned a project they were formulating on ‘counter  radicalization’. However, concerns were raised with respect to the  identification of areas that would benefit from counter speech, and its  effectiveness with respect to mob attacks. Another unique approach  suggested by the participants was to ‘vaccinate’ first time users by  educating them about the enormity and complexity of the Internet,  including intiation of such users to the idea that freedom of expression  online often crosses over to hate speech and harassment. This would act  as an initiation process to understand the working of the Internet and  the prevalence of hateful and harassing content on its numerous speech  platforms, so that first-time users are not discouraged from using the  Internet merely due to the presence of negative content. An interesting  suggestion for the platforms was to work towards a mechanism that is  more offender centric, and facilitates the tracking of repeat offenders  along with providing tools of blocking for users.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p align="justify"&gt;This roundtable served in exploring the many layers  of hateful and harassing speech that runs across roles and  responsibilities of various stakeholder groups and concerns that are  deeply entrenched in our societal outlook. The increasing frequency and  amount of such content on the Internet is an indication of the urgent  need to collaborate and develop a framework for limiting such speech,  while balancing the fundamental right to freedom of expression. We thank  all the participants and appreciate their valuable contributions that  facilitated a better understanding of the overall theme.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/roundtable-identifying-and-limiting-hate-speech-and-harassment-online'&gt;http://editors.cis-india.org/internet-governance/news/roundtable-identifying-and-limiting-hate-speech-and-harassment-online&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-08-09T13:31:58Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/roundtable-on-icann-accountability">
    <title>Roundtable on ICANN Accountability </title>
    <link>http://editors.cis-india.org/internet-governance/news/roundtable-on-icann-accountability</link>
    <description>
        &lt;b&gt;The roundtable was organised by the Department of Electronics and Information Technology (DeitY), National Internet Exchange of India and Centre for Communication Governance, National Law University, Delhi at the Indian International Centre, New Delhi on 13 March 2015. Geetha Hariharan participated in the roundtable.&lt;/b&gt;
        &lt;table class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Timings&lt;/th&gt;&lt;th&gt;Programme&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10.00 &lt;br /&gt;10.30&lt;/td&gt;
&lt;td&gt;Welcome Address by Chimayi Arun, Research Director, Centre for Communication Governance at National Law University, Delhi&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10.30&lt;br /&gt;10.40&lt;/td&gt;
&lt;td&gt;Introductory Remarks by Dr. Ajay Kumar (IAS) Joint Secretary, DeitY&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10.45&lt;br /&gt;11.15&lt;/td&gt;
&lt;td&gt;Session I: NTIA IANA Functions' Stewardship Transition&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13.15&lt;br /&gt;14.30&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14.30&lt;br /&gt;16.30&lt;/td&gt;
&lt;td&gt;Session II: Accountability and Transparency at ICANN&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;16.30&lt;/td&gt;
&lt;td&gt;Tea&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/roundtable-on-icann-accountability'&gt;http://editors.cis-india.org/internet-governance/news/roundtable-on-icann-accountability&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-04-03T16:54:41Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/round-table-on-user-safety-on-internet">
    <title>Round-table on User Safety on the Internet</title>
    <link>http://editors.cis-india.org/news/round-table-on-user-safety-on-internet</link>
    <description>
        &lt;b&gt;Elonnai Hickok participated in this round-table meeting organized by Consumer Voice in collaboration with Google at Infantry Road, Bangalore on April 24, 2014.&lt;/b&gt;
        &lt;p&gt;Click to &lt;a href="http://editors.cis-india.org/internet-governance/blog/user-safety-internet.pdf" class="internal-link"&gt;download&lt;/a&gt; the agenda.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/round-table-on-user-safety-on-internet'&gt;http://editors.cis-india.org/news/round-table-on-user-safety-on-internet&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-05-06T09:55:07Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/user-safety-internet.pdf">
    <title>Round-table on User Safety Internet </title>
    <link>http://editors.cis-india.org/internet-governance/blog/user-safety-internet.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/user-safety-internet.pdf'&gt;http://editors.cis-india.org/internet-governance/blog/user-safety-internet.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2014-05-06T09:53:02Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/round-table-on-privacy-and-data-protection-at-nipfp">
    <title>Round Table on Privacy and Data Protection at NIPFP </title>
    <link>http://editors.cis-india.org/internet-governance/news/round-table-on-privacy-and-data-protection-at-nipfp</link>
    <description>
        &lt;b&gt;National Institute of Public Finance &amp; Policy organized a round-table on privacy and data protection on March 24, 2017 in New Delhi. &lt;/b&gt;
        &lt;p&gt;Click to see the &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/nipfp-round-table-on-privacy-and-data-protection"&gt;agenda&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/round-table-on-privacy-and-data-protection-at-nipfp'&gt;http://editors.cis-india.org/internet-governance/news/round-table-on-privacy-and-data-protection-at-nipfp&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-03-27T16:02:59Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/Rothko4.png">
    <title>Rothko Chapel</title>
    <link>http://editors.cis-india.org/home-images/Rothko4.png</link>
    <description>
        &lt;b&gt;Rothko Chapel&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/Rothko4.png'&gt;http://editors.cis-india.org/home-images/Rothko4.png&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2014-03-28T12:15:47Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/Rothko3.png">
    <title>Rothko 3</title>
    <link>http://editors.cis-india.org/home-images/Rothko3.png</link>
    <description>
        &lt;b&gt;Rothko 3&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/Rothko3.png'&gt;http://editors.cis-india.org/home-images/Rothko3.png&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2014-03-28T11:03:03Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/Rothko2.png">
    <title>Rothko 2</title>
    <link>http://editors.cis-india.org/home-images/Rothko2.png</link>
    <description>
        &lt;b&gt;Rothko 2&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/Rothko2.png'&gt;http://editors.cis-india.org/home-images/Rothko2.png&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2014-03-28T10:55:44Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/Rothko1.png">
    <title>Rothko 1</title>
    <link>http://editors.cis-india.org/home-images/Rothko1.png</link>
    <description>
        &lt;b&gt;Rothko 1&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/Rothko1.png'&gt;http://editors.cis-india.org/home-images/Rothko1.png&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2014-03-28T10:24:53Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/role-of-us-tech-companies-in-govt-surveillance">
    <title>Role of the US Tech Companies in Government Surveillance: A Lecture by Christopher Soghoian </title>
    <link>http://editors.cis-india.org/internet-governance/role-of-us-tech-companies-in-govt-surveillance</link>
    <description>
        &lt;b&gt;Christopher Soghoian will deliver a lecture on the role US tech companies play in assisting government surveillance at the Centre for Internet &amp; Society office in Bangalore on August 27, 2012, from 5.00 p.m. to 7.00 p.m.

&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Your internet, phone and web application providers are all, for the most part, in bed with US and other foreign government agencies. They all routinely disclose their customers' communications and other private data to law enforcement and intelligence agencies. Worse, firms like Google and Microsoft specifically log data in order to assist the government. How many government requests does your ISP get for its customers' communications each year? How many do they comply with? How many do they fight? How much do they charge for the surveillance assistance they provide? Who knows? Most companies have a strict policy of not discussing such topics.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The differences in the privacy practices of the major players in the telecommunications and internet applications market are significant. Some firms retain identifying data for years, while others retain no data at all; some voluntarily provide the government access to user data, while other companies refuse to voluntarily disclose data without a court order; some companies charge government agencies when they request user data, while others disclose it for free. For an individual, later investigated by the police or intelligence services, the data retention practices adopted by their phone company or email provider can significantly impact their freedom.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unfortunately, although many companies claim to care about end-user privacy, and some even that they compete on their privacy features, none seem to be willing to compete on the extent to which they assist or resist the government in its surveillance activities. Because information about each firms' practices is not publicly known, consumers cannot vote with their wallets, and pick service providers that best protect their privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This talk will pierce the veil of secrecy surrounding these practices. Based upon a combination of Freedom of Information Act requests, off the record conversations with industry lawyers, and investigative journalism, the practices of many of these firms will be revealed.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Christopher's Personal Experience&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In the year 2006, the Federal Bureau of Investigation (FBI) raided Christopher’s home at 2.00 a.m. seizing his personal documents and computers. Two attorneys, Stephen Braga and Jennifer Granick came to his defence. With their expert assistance, Christopher was able to get back his possessions within three weeks, and FBI’s criminal and TSA’s civil investigations were closed without any charges being filed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Jennifer Granick came to Christopher’s assistance once again (joined by Steve Leckar) in 2010 after the Federal Trade Commission’s Inspector General investigated Christopher for using his government badge to attend a closed-door surveillance industry conference. It was at that event that Christopher recorded an executive from wireless carrier ‘Sprint’ bragging about the eight million times his company had obtained GPS data on its customers for law enforcement agencies in the previous years.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To know more, read Christopher Soghoian’s dissertation titled "&lt;a href="http://editors.cis-india.org/internet-governance/spies-we-trust" class="internal-link"&gt;The Spies We Trust: Third Party Service Providers and Law Enforcement Surveillance&lt;/a&gt;". [PDF, 1056 Kb]&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;About Christopher Soghoian&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Christopher Soghoian is a privacy researcher and activist, working at the intersection of technology, law and policy. He is a Principal Technologist and Senior Policy Analyst at the American Civil Liberties Union and is based in Washington, D.C.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Soghoian completed his Ph.D. at Indiana University in 2012, which focused on the role that third party service providers play in facilitating law enforcement surveillance of their customers. In order to gather data, he has made extensive use of the Freedom of Information Act, sued the Department of Justice &lt;i&gt;pro se&lt;/i&gt;, and used several other investigative research methods. His research has appeared in publications including the &lt;i&gt;Berkeley Technology Law Journal &lt;/i&gt;and been cited by several federal courts, including the Ninth Circuit Court of Appeals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Between the years, 2009-2010, he was the first ever in-house technologist at the Federal Trade Commission's Division of Privacy and Identity Protection, where he worked on investigations of Facebook, Twitter, MySpace and Netflix. Prior to joining the FTC, he co-created the Do Not Track privacy anti-tracking mechanism now adopted by all of the major web browsers.&lt;/p&gt;
&lt;p&gt;He is a TEDGlobal 2012 Fellow, was an Open Society Foundations Fellow between the years, 2011-2012, and was a Student Fellow at the Berkman Center for Internet &amp;amp; Society, Harvard University between 2008 and 2009.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/role-of-us-tech-companies-in-govt-surveillance'&gt;http://editors.cis-india.org/internet-governance/role-of-us-tech-companies-in-govt-surveillance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Lecture</dc:subject>
    
    
        <dc:subject>Event Type</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-08-26T11:03:19Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/events/fostering-freedom-of-expression">
    <title>Role of the Internet in Fostering Freedom of Expression and Strengthening Activism in India - A Workshop in Delhi</title>
    <link>http://editors.cis-india.org/events/fostering-freedom-of-expression</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society (India) and the Central American Institute for Studies of Social Democracy DEMOS (Guatemala) have the pleasure to invite you to a day-long workshop on the role of the Internet in fostering freedom of expression and strengthening activism in India. The workshop will take place in the Constitution Club in Delhi on 4 March 2011.&lt;/b&gt;
        
&lt;p&gt;With the significant role reported for new technologies in recent revolutions in Tunesia, Egypt, and elsewhere, activists in India, too, have taken a renewed interest in the potential of the Internet to support their struggles for social change and social justice. But what are some of the potential stumble blocks activists in India might run into in their exploration of the Internet's potential? What are the legal restrictions and frameworks activists should be aware of when they use new technologies in their work? And what can we do to create an environment in which the online world unequivocally supports efforts for greater democratisation and social justice offline, rather than thwart them?&lt;/p&gt;
&lt;p&gt;It is questions such as these that this workshop seeks to answer, through a mix of panel discussions, unconference sessions, a film screening, and technical and legal clinics in its day-long&amp;nbsp;program.&lt;/p&gt;
&lt;p&gt;Our hope is that the workshop will help participants as well as organisers to get a stronger sense of the potential and challenges of online activism in the particular context of India, as&amp;nbsp;well as to start building stronger networks among the activists interested in these issues in the country.&lt;/p&gt;
&lt;p&gt;Participation in the workshop is free. However, we would be grateful if you could confirm your attendance by emailing Anja Kovacs at "anja at cisindia dot org", ideally by 2 March.&lt;/p&gt;
&lt;p&gt;We hope you will join us to contribute your own insights and experiences as well as to learn from others about this important new arena of activists' work.&lt;/p&gt;
&lt;p&gt;Looking forward to welcoming you at the workshop!&lt;/p&gt;
&lt;h2&gt;The Agenda&lt;/h2&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;9.30-9.45: &amp;nbsp; &amp;nbsp;Welcome and introductions&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;9.45-10.15: &amp;nbsp;&amp;nbsp;Introduction to the Internet and freedom of expression&lt;br /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;By Frank La Rue, President of the Central American Institute for Studies of Social Democracy &lt;br /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;and UN Special Rapporteur for Freedom of Expression and Opinion&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;10.15-10.45: Film screening: “Brave New Medium”&lt;br /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;By Delhi-based docu film maker Subasri Krishnan&lt;br /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;The film addresses Internet and censorship in South-East Asia &lt;br /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;while raising &amp;nbsp;pertinent questions about the implications of this lessons for Indian activists, &lt;br /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;and will be screened in the presence of the filmmaker.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;10.45-11.30:&amp;nbsp;Unconference: Online challenges and ways forward for Indian activists: &lt;br /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;where are we today and what to do next?&lt;br /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Small group discussion sessions, as per the priorities of the participants&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;11.30-11.50: Tea/Coffee Break&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;11.50-12.40:&amp;nbsp;Reporting back and plenary discussion: Challenges for freedom of expression on &lt;br /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;the Internet in&amp;nbsp;India and abroad: legal framework, ground realities, alternative visions&amp;nbsp;&lt;br /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;With national and international activists, lawyers and researchers as additional resource persons&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;12.40-13.00:&amp;nbsp;Consultation: Can a global “Internet Bill of Rights” help?&lt;br /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;With Lisa Horner, Dynamic Coalition on Internet Rights and Principles of the UN Internet&lt;br /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Governance Forum&lt;/span&gt;&lt;/p&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;13.00 - 14.00:&amp;nbsp;Lunch Break (lunch will be provided)&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;14.00 - 15.30:&amp;nbsp;Parallel sessions:&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;legal clinic with a representative from Google and human rights lawyers – to answer any&amp;nbsp;legal question regarding freedom of expression online you may have&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;technical clinic with a representative from Tactical Tech – to explore the significance of terms like&lt;br /&gt;“Tor” and “proxy” and ways in which you can stay safe and secure online at all times.&amp;nbsp;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;If you have a laptop, bring it if you intend to attend this session!&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;15.30 - 16.15: Strategies for the way forward&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Moderated by Mr Frank La Rue&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;16.15-16.30 &amp;nbsp;:&amp;nbsp;Closing remarks&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;16.30 - 17.00: Tea/Coffee&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Followed by a public lecture by &lt;strong&gt;Mr. Frank La Rue&lt;/strong&gt; at 6 pm, at the same venue, on &lt;strong&gt;Global Challenges to Freedom of Expression&lt;/strong&gt;. Entrance free. All welcome.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/div&gt;
&lt;h2&gt;Information about the Organisers&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;The Centre for Internet and Society&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The Centre for Internet and Society is located in Bangalore, India. It critically engages with concerns of digital pluralism and public accountability in the field of Internet and Society,&amp;nbsp;with particular emphasis on South-South dialogues and exchange. Through multidisciplinary research, intervention, and collaboration, it seeks to explore, understand, and affect the shape&amp;nbsp;and form of the internet, and its relationship with the political, cultural, and social milieu of our times.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;DEMOS Institute&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The Demos Institute, based in Guatemala, is a research centre that promotes democratic alternatives for Guatemala, under the human rights framework. Within DEMOS, there is a&amp;nbsp;research team which supports the mandate of Frank La Rue, United Nations Special Rapporteur on Freedom of Opinion and Expression, in the making of his annual reports before&amp;nbsp;the United Nations Human Rights Council.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/events/fostering-freedom-of-expression'&gt;http://editors.cis-india.org/events/fostering-freedom-of-expression&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-04T07:18:10Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/Rohinitraininggroupondigitalsecurity.JPG">
    <title>Rohini training</title>
    <link>http://editors.cis-india.org/home-images/Rohinitraininggroupondigitalsecurity.JPG</link>
    <description>
        &lt;b&gt;Rohini training&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/Rohinitraininggroupondigitalsecurity.JPG'&gt;http://editors.cis-india.org/home-images/Rohinitraininggroupondigitalsecurity.JPG&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2014-12-27T15:15:12Z</dc:date>
   <dc:type>Image</dc:type>
   </item>




</rdf:RDF>
