<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="http://editors.cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>http://editors.cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1291 to 1305.
        
  </description>
  
  
  
  
  <image rdf:resource="http://editors.cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/Rothko2.png"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/Rothko1.png"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/role-of-us-tech-companies-in-govt-surveillance"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/events/fostering-freedom-of-expression"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/Rohinitraininggroupondigitalsecurity.JPG"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/DP6.jpg"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/Rohini.png"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/copy_of_Rohini.png"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/RoadTest.png"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/openness/blog-old/risky-business.odp"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/digital-natives/blog/proposals-for-citizen-media-outreach"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/hindustan-times-january-5-2014-danish-raza-rise-of-the-bot"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/legally-india-feb-7-2013-rip-rahul-cherian-human-rights-activist-inclusive-planet-co-founder"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/rim-offered-security-fixes"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/rightscon-silicon-valley-2016"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="http://editors.cis-india.org/home-images/Rothko2.png">
    <title>Rothko 2</title>
    <link>http://editors.cis-india.org/home-images/Rothko2.png</link>
    <description>
        &lt;b&gt;Rothko 2&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/Rothko2.png'&gt;http://editors.cis-india.org/home-images/Rothko2.png&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2014-03-28T10:55:44Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/Rothko1.png">
    <title>Rothko 1</title>
    <link>http://editors.cis-india.org/home-images/Rothko1.png</link>
    <description>
        &lt;b&gt;Rothko 1&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/Rothko1.png'&gt;http://editors.cis-india.org/home-images/Rothko1.png&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2014-03-28T10:24:53Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/role-of-us-tech-companies-in-govt-surveillance">
    <title>Role of the US Tech Companies in Government Surveillance: A Lecture by Christopher Soghoian </title>
    <link>http://editors.cis-india.org/internet-governance/role-of-us-tech-companies-in-govt-surveillance</link>
    <description>
        &lt;b&gt;Christopher Soghoian will deliver a lecture on the role US tech companies play in assisting government surveillance at the Centre for Internet &amp; Society office in Bangalore on August 27, 2012, from 5.00 p.m. to 7.00 p.m.

&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Your internet, phone and web application providers are all, for the most part, in bed with US and other foreign government agencies. They all routinely disclose their customers' communications and other private data to law enforcement and intelligence agencies. Worse, firms like Google and Microsoft specifically log data in order to assist the government. How many government requests does your ISP get for its customers' communications each year? How many do they comply with? How many do they fight? How much do they charge for the surveillance assistance they provide? Who knows? Most companies have a strict policy of not discussing such topics.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The differences in the privacy practices of the major players in the telecommunications and internet applications market are significant. Some firms retain identifying data for years, while others retain no data at all; some voluntarily provide the government access to user data, while other companies refuse to voluntarily disclose data without a court order; some companies charge government agencies when they request user data, while others disclose it for free. For an individual, later investigated by the police or intelligence services, the data retention practices adopted by their phone company or email provider can significantly impact their freedom.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unfortunately, although many companies claim to care about end-user privacy, and some even that they compete on their privacy features, none seem to be willing to compete on the extent to which they assist or resist the government in its surveillance activities. Because information about each firms' practices is not publicly known, consumers cannot vote with their wallets, and pick service providers that best protect their privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This talk will pierce the veil of secrecy surrounding these practices. Based upon a combination of Freedom of Information Act requests, off the record conversations with industry lawyers, and investigative journalism, the practices of many of these firms will be revealed.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Christopher's Personal Experience&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In the year 2006, the Federal Bureau of Investigation (FBI) raided Christopher’s home at 2.00 a.m. seizing his personal documents and computers. Two attorneys, Stephen Braga and Jennifer Granick came to his defence. With their expert assistance, Christopher was able to get back his possessions within three weeks, and FBI’s criminal and TSA’s civil investigations were closed without any charges being filed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Jennifer Granick came to Christopher’s assistance once again (joined by Steve Leckar) in 2010 after the Federal Trade Commission’s Inspector General investigated Christopher for using his government badge to attend a closed-door surveillance industry conference. It was at that event that Christopher recorded an executive from wireless carrier ‘Sprint’ bragging about the eight million times his company had obtained GPS data on its customers for law enforcement agencies in the previous years.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To know more, read Christopher Soghoian’s dissertation titled "&lt;a href="http://editors.cis-india.org/internet-governance/spies-we-trust" class="internal-link"&gt;The Spies We Trust: Third Party Service Providers and Law Enforcement Surveillance&lt;/a&gt;". [PDF, 1056 Kb]&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;About Christopher Soghoian&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Christopher Soghoian is a privacy researcher and activist, working at the intersection of technology, law and policy. He is a Principal Technologist and Senior Policy Analyst at the American Civil Liberties Union and is based in Washington, D.C.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Soghoian completed his Ph.D. at Indiana University in 2012, which focused on the role that third party service providers play in facilitating law enforcement surveillance of their customers. In order to gather data, he has made extensive use of the Freedom of Information Act, sued the Department of Justice &lt;i&gt;pro se&lt;/i&gt;, and used several other investigative research methods. His research has appeared in publications including the &lt;i&gt;Berkeley Technology Law Journal &lt;/i&gt;and been cited by several federal courts, including the Ninth Circuit Court of Appeals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Between the years, 2009-2010, he was the first ever in-house technologist at the Federal Trade Commission's Division of Privacy and Identity Protection, where he worked on investigations of Facebook, Twitter, MySpace and Netflix. Prior to joining the FTC, he co-created the Do Not Track privacy anti-tracking mechanism now adopted by all of the major web browsers.&lt;/p&gt;
&lt;p&gt;He is a TEDGlobal 2012 Fellow, was an Open Society Foundations Fellow between the years, 2011-2012, and was a Student Fellow at the Berkman Center for Internet &amp;amp; Society, Harvard University between 2008 and 2009.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/role-of-us-tech-companies-in-govt-surveillance'&gt;http://editors.cis-india.org/internet-governance/role-of-us-tech-companies-in-govt-surveillance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Lecture</dc:subject>
    
    
        <dc:subject>Event Type</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-08-26T11:03:19Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/events/fostering-freedom-of-expression">
    <title>Role of the Internet in Fostering Freedom of Expression and Strengthening Activism in India - A Workshop in Delhi</title>
    <link>http://editors.cis-india.org/events/fostering-freedom-of-expression</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society (India) and the Central American Institute for Studies of Social Democracy DEMOS (Guatemala) have the pleasure to invite you to a day-long workshop on the role of the Internet in fostering freedom of expression and strengthening activism in India. The workshop will take place in the Constitution Club in Delhi on 4 March 2011.&lt;/b&gt;
        
&lt;p&gt;With the significant role reported for new technologies in recent revolutions in Tunesia, Egypt, and elsewhere, activists in India, too, have taken a renewed interest in the potential of the Internet to support their struggles for social change and social justice. But what are some of the potential stumble blocks activists in India might run into in their exploration of the Internet's potential? What are the legal restrictions and frameworks activists should be aware of when they use new technologies in their work? And what can we do to create an environment in which the online world unequivocally supports efforts for greater democratisation and social justice offline, rather than thwart them?&lt;/p&gt;
&lt;p&gt;It is questions such as these that this workshop seeks to answer, through a mix of panel discussions, unconference sessions, a film screening, and technical and legal clinics in its day-long&amp;nbsp;program.&lt;/p&gt;
&lt;p&gt;Our hope is that the workshop will help participants as well as organisers to get a stronger sense of the potential and challenges of online activism in the particular context of India, as&amp;nbsp;well as to start building stronger networks among the activists interested in these issues in the country.&lt;/p&gt;
&lt;p&gt;Participation in the workshop is free. However, we would be grateful if you could confirm your attendance by emailing Anja Kovacs at "anja at cisindia dot org", ideally by 2 March.&lt;/p&gt;
&lt;p&gt;We hope you will join us to contribute your own insights and experiences as well as to learn from others about this important new arena of activists' work.&lt;/p&gt;
&lt;p&gt;Looking forward to welcoming you at the workshop!&lt;/p&gt;
&lt;h2&gt;The Agenda&lt;/h2&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;9.30-9.45: &amp;nbsp; &amp;nbsp;Welcome and introductions&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;9.45-10.15: &amp;nbsp;&amp;nbsp;Introduction to the Internet and freedom of expression&lt;br /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;By Frank La Rue, President of the Central American Institute for Studies of Social Democracy &lt;br /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;and UN Special Rapporteur for Freedom of Expression and Opinion&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;10.15-10.45: Film screening: “Brave New Medium”&lt;br /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;By Delhi-based docu film maker Subasri Krishnan&lt;br /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;The film addresses Internet and censorship in South-East Asia &lt;br /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;while raising &amp;nbsp;pertinent questions about the implications of this lessons for Indian activists, &lt;br /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;and will be screened in the presence of the filmmaker.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;10.45-11.30:&amp;nbsp;Unconference: Online challenges and ways forward for Indian activists: &lt;br /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;where are we today and what to do next?&lt;br /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Small group discussion sessions, as per the priorities of the participants&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;11.30-11.50: Tea/Coffee Break&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;11.50-12.40:&amp;nbsp;Reporting back and plenary discussion: Challenges for freedom of expression on &lt;br /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;the Internet in&amp;nbsp;India and abroad: legal framework, ground realities, alternative visions&amp;nbsp;&lt;br /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;With national and international activists, lawyers and researchers as additional resource persons&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;12.40-13.00:&amp;nbsp;Consultation: Can a global “Internet Bill of Rights” help?&lt;br /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;With Lisa Horner, Dynamic Coalition on Internet Rights and Principles of the UN Internet&lt;br /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Governance Forum&lt;/span&gt;&lt;/p&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;13.00 - 14.00:&amp;nbsp;Lunch Break (lunch will be provided)&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;14.00 - 15.30:&amp;nbsp;Parallel sessions:&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;legal clinic with a representative from Google and human rights lawyers – to answer any&amp;nbsp;legal question regarding freedom of expression online you may have&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;technical clinic with a representative from Tactical Tech – to explore the significance of terms like&lt;br /&gt;“Tor” and “proxy” and ways in which you can stay safe and secure online at all times.&amp;nbsp;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;If you have a laptop, bring it if you intend to attend this session!&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;15.30 - 16.15: Strategies for the way forward&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Moderated by Mr Frank La Rue&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;16.15-16.30 &amp;nbsp;:&amp;nbsp;Closing remarks&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;16.30 - 17.00: Tea/Coffee&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Followed by a public lecture by &lt;strong&gt;Mr. Frank La Rue&lt;/strong&gt; at 6 pm, at the same venue, on &lt;strong&gt;Global Challenges to Freedom of Expression&lt;/strong&gt;. Entrance free. All welcome.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/div&gt;
&lt;h2&gt;Information about the Organisers&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;The Centre for Internet and Society&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The Centre for Internet and Society is located in Bangalore, India. It critically engages with concerns of digital pluralism and public accountability in the field of Internet and Society,&amp;nbsp;with particular emphasis on South-South dialogues and exchange. Through multidisciplinary research, intervention, and collaboration, it seeks to explore, understand, and affect the shape&amp;nbsp;and form of the internet, and its relationship with the political, cultural, and social milieu of our times.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;DEMOS Institute&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The Demos Institute, based in Guatemala, is a research centre that promotes democratic alternatives for Guatemala, under the human rights framework. Within DEMOS, there is a&amp;nbsp;research team which supports the mandate of Frank La Rue, United Nations Special Rapporteur on Freedom of Opinion and Expression, in the making of his annual reports before&amp;nbsp;the United Nations Human Rights Council.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/events/fostering-freedom-of-expression'&gt;http://editors.cis-india.org/events/fostering-freedom-of-expression&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-04T07:18:10Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/Rohinitraininggroupondigitalsecurity.JPG">
    <title>Rohini training</title>
    <link>http://editors.cis-india.org/home-images/Rohinitraininggroupondigitalsecurity.JPG</link>
    <description>
        &lt;b&gt;Rohini training&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/Rohinitraininggroupondigitalsecurity.JPG'&gt;http://editors.cis-india.org/home-images/Rohinitraininggroupondigitalsecurity.JPG&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2014-12-27T15:15:12Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/DP6.jpg">
    <title>Rohini Nilekani</title>
    <link>http://editors.cis-india.org/home-images/DP6.jpg</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/DP6.jpg'&gt;http://editors.cis-india.org/home-images/DP6.jpg&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2012-01-16T05:13:19Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/Rohini.png">
    <title>Rohini</title>
    <link>http://editors.cis-india.org/home-images/Rohini.png</link>
    <description>
        &lt;b&gt;Rohini Lakshane&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/Rohini.png'&gt;http://editors.cis-india.org/home-images/Rohini.png&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2014-07-16T07:28:34Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/copy_of_Rohini.png">
    <title>Rohini</title>
    <link>http://editors.cis-india.org/home-images/copy_of_Rohini.png</link>
    <description>
        &lt;b&gt;Rohini&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/copy_of_Rohini.png'&gt;http://editors.cis-india.org/home-images/copy_of_Rohini.png&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2014-08-12T10:18:25Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/RoadTest.png">
    <title>Road test</title>
    <link>http://editors.cis-india.org/home-images/RoadTest.png</link>
    <description>
        &lt;b&gt;Road test&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/RoadTest.png'&gt;http://editors.cis-india.org/home-images/RoadTest.png&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-07-03T05:15:09Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/openness/blog-old/risky-business.odp">
    <title>Risky Business: Transparency, Technology, Security and Privacy</title>
    <link>http://editors.cis-india.org/openness/blog-old/risky-business.odp</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/openness/blog-old/risky-business.odp'&gt;http://editors.cis-india.org/openness/blog-old/risky-business.odp&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2014-11-14T01:24:58Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/digital-natives/blog/proposals-for-citizen-media-outreach">
    <title>Rising Voices Seeks Micro-Grant Proposals for Citizen Media Outreach </title>
    <link>http://editors.cis-india.org/digital-natives/blog/proposals-for-citizen-media-outreach</link>
    <description>
        &lt;b&gt;Rising Voices is seeking project proposals from non-governmental organizations (NGOs) or individuals for funding of up to $4,000 USD for digital media outreach projects around the world. Application Deadline: Friday, February 4, 2011 at 11:59 PM GMT.&lt;/b&gt;
        
&lt;p&gt;It has been more than three years since Rising Voices began with a simple mandate: to help bring new voices from underrepresented communities to the global conversation through the use of citizen media. We have been accomplishing that by providing microgrant funding, as well as technical and mentoring support to our grantee communities. Ever since the first microgrant competition was announced in May 2007, we have provided seed funding to 24 projects from around the world to help turn their ideas into reality. The diversity of these grantee projects has made Rising Voices a unique place on the web to have a firsthand look at places around the world, such as &lt;a class="external-link" href="http://rising.globalvoicesonline.org/projects/project-foko/"&gt;Tamatave, Madagascar&lt;/a&gt; and &lt;a class="external-link" href="http://rising.globalvoicesonline.org/projects/nomad-green-mongolia/"&gt;Ulaanbaatar, Mongolia&lt;/a&gt;, through the first-person accounts of these new bloggers.&lt;/p&gt;
&lt;p&gt;Beginning on January 11th, 2011, Rising Voices is launching the latest round of microgrant funding and is now accepting project proposals from non-governmental organizations (NGOs) or individuals for funding of &lt;strong&gt;up to $4,000 USD&lt;/strong&gt; for digital media outreach projects around the world. Ideal applicants will present innovative and detailed proposals to teach citizen media techniques to underrepresented communities that are poorly positioned to discover and take advantage of tools like blogging, video-blogging, or podcasting on their own.&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Who is Eligible to Apply&lt;/h3&gt;
&lt;p&gt;This funding opportunity is open to both NGOs and private individuals. However, if an NGO does not have experienced citizen media trainers on their staff, it is extremely important that they seek collaboration with the local blogging community to find the right trainer(s) with the necessary skills. On the other hand, it would also be highly beneficial for individual applicants to partner with an existing NGO from the communities they plan to serve in order to strengthen the project's impact.&lt;/p&gt;
&lt;h3&gt;What Kind of Projects May be Funded&lt;/h3&gt;
&lt;p&gt;Rising Voices seeks project proposals that share our mission of bringing voices from new communities, as well as underrepresented language groups to the online global conversation through the use of citizen media. The projects' primary activities should be to provide citizen media training workshops to the target community, as well as ongoing support and mentoring to the participants. Please see our roster of current and alumni grantee projects for examples of previously funded projects.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Examples of potential projects include:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Distributing flip video cameras to local residents to help map and document environmental issues affecting the area and to propose solutions.&lt;/li&gt;&lt;li&gt;Partnering with a local library with a computer lab to train youth how to record and document the history of their local neighborhood by using mp3 recorders to interview local elders.&lt;/li&gt;&lt;li&gt;Organizing blogging workshop for local artisans to help them market their work online, but also tell the story and history of their handicrafts.&lt;/li&gt;&lt;li&gt;Distributing $10 digital cameras to two different groups in different neighborhoods and create a Flickr group where they interact with each other's&amp;nbsp;&amp;nbsp; photographic perspectives of their city.&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;Application Process&lt;/h3&gt;
&lt;p&gt;Interested applicants should complete the online proposal application form (&lt;a class="external-link" href="http://www.surveymonkey.com/s/risingvoicesmicrogrants"&gt;link here&lt;/a&gt;), which should also include a detailed budget. If you would like to download the application questions to complete offline in order to upload later, please download the text document here (&lt;a class="external-link" href="http://rising.globalvoicesonline.org/files/2011/01/Rising-Voices-Grant-Application.pdf"&gt;PDF&lt;/a&gt; format). While we welcome and encourage projects from all corners of the global, all applications must be completed in English.&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;pre&gt;&lt;a class="external-link" href="http://www.surveymonkey.com/s/risingvoicesmicrogrants"&gt;Online Application Form&lt;/a&gt;&lt;/pre&gt;
&lt;p&gt;Rising Voices outreach grants will range from $2,000-4,000 USD. Please be as thoughtful, specific, and realistic as possible when drafting your budgets. Applicants are encouraged to submit budgets for less than the maximum $4,000 USD as smaller grants allow us to fund more projects.&lt;/p&gt;
&lt;p&gt;Rising Voices outreach grants will range from $2,000-4,000 USD. Please be as thoughtful, specific, and realistic as possible when drafting your budgets. Applicants are encouraged to submit budgets for less than the maximum $4,000 USD as smaller grants allow us to fund more projects.&lt;/p&gt;
&lt;p&gt;The application deadline is &lt;strong&gt;February 4th, 2011 at 11:59 PM GMT&lt;/strong&gt;. All applicants will receive a confirmation email indicating that we have received your proposal. The proposals will be reviewed by a committee of Global Voices staff and volunteers, as well as members of previous Rising Voices grantees. We will announce the grant recipients by February 28, 2011.&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Expectations of Successful Grantees&lt;/h3&gt;
&lt;p&gt;Successful projects will be prominently featured on the Global Voices networks. Grantees will be required to sign a grant agreement, which will outline accounting, reporting, and other terms and conditions regarding how funds will be distributed. Grantees will also be required to post regular project updates to the Rising Voices website, be in regular communication with Rising Voices staff, as well as actively participate in the Rising Voices community.&lt;/p&gt;
&lt;p&gt;Feel free to ask questions in the comments section below or by sending an email to eddie [at] globalvoicesonline [dot] org.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;This post is also available in:&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://mg.globalvoicesonline.org/2011/01/11/11977/"&gt;Malagasy&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://pt.globalvoicesonline.org/2011/01/11/rising-voices-abre-selecao-para-fundo-destinado-a-projetos-de-midia-cidada/"&gt;Português&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/digital-natives/blog/proposals-for-citizen-media-outreach'&gt;http://editors.cis-india.org/digital-natives/blog/proposals-for-citizen-media-outreach&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2011-08-04T10:36:50Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/hindustan-times-january-5-2014-danish-raza-rise-of-the-bot">
    <title>Rise of the bot: all you need to know about the latest threat online</title>
    <link>http://editors.cis-india.org/news/hindustan-times-january-5-2014-danish-raza-rise-of-the-bot</link>
    <description>
        &lt;b&gt;In the last week of December, 2013, former union railway minister Pawan Kumar Bansal lodged a police complaint in Chandigarh after witnessing “an unusual rise in his online fan following”. The former minister told the police that his Facebook page had received more than 10,000 likes, within a span of 24 hours. While his allegation that the ‘likes’ were “fabricated” may be true, information technology experts believe a bot was at work.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Danish Raza was &lt;a class="external-link" href="http://www.hindustantimes.com/technology/socialmedia-updates/rise-of-the-bot-all-you-need-to-know-about-internet-s-latest-threat/article1-1169500.aspx"&gt;published in the Hindustan Times&lt;/a&gt; on January 5, 2014. Snehashish Ghosh is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;A bot is a software that mimics human behaviour on the Internet. Bots can be used to create artificial accounts on social media, provide numerous likes on a particular page, send tweets or visit various websites. All this is done without any human involvement.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Bots already constitute a significant percentage of Non Human Traffic (NHT) online, which has, according to some estimates, eclipsed human traffic. Comscore, a US-based Internet technology company noted on its blog that NHT, also known as Artificial Traffic, increased from approximately 6% of the total web traffic in 2011, to 36% in 2012. Last month, a report from Incapsula, a cloud-based security service, which aids the security and performance of websites, stated that more than 60% of web traffic was non-human in 2013. The figure was based on data collected from the 20,000 sites on Incapsula’s network .&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Other than bots, NHT on the web includes traffic generated by Internet routers and back end services used by websites to communicate with third parties.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India is not immune to the problem. According to the Symantec Internet Security Threat Report for 2012, there was a 280% increase in bot infections in India between 2011 and 2012. 17% of bot-infected computers, the highest in the world, are in India and 15% of global bot-net spam is generated here. The report also states that 69 Indian cities are prone to bot infections which includes Bhubaneswar, Surat, Cochin, Jaipur, Visakhapatnam, Indore, Kota, Ghaziabad and Mysore.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Bot spotting&lt;/b&gt;&lt;br /&gt;How do you spot a bot? When a bot or its friend is at work, the browser directs you to sites other than the ones you intend to visit, you get full-page pop ups and pop unders, and when you quit the browser, it gets relaunched after a few minutes. Chances are your computer is part of a chain of online events which create NHT on the web, the purpose of which may be to attack a site or a server.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Why you should be wary&lt;/b&gt;&lt;br /&gt;Malicious traffic, malware, hacking attempts, viruses slow down the Internet and delay legitimate traffic and services. Used to target systems or take down websites, NHT generates fake clicks on advertisements to increase website statistics.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of the perils of ignoring artificial web traffic is that it gets counted for real impressions for which clients end up paying. For example, a website owner may hire the services of a digital marketing firm to publicise the site. In the guise of increasing page views, the marketing firm can produce a bill for fake impressions, supplementing actual human traffic to the page with bot usage.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Unless there is a curb on this practice of malicious NHT, one stands at risk of being duped by marketers, agencies and even clients,” said Chiragh Cherian, director, online PR at Perfect Relations, a brand management firm. Recent studies have estimated bot traffic to be between 4 - 31% of total web traffic in the US, which translates to between $650 million and $4.7 billion in wasted marketing spend. According to Miaozhen Systems, a leading Chinese advertising technology company, NHT caused advertisers in China to lose approximately US$ 1.6 billion between July 2012 and June 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;How to combat Non-Human Traffic&lt;/b&gt;&lt;br /&gt;Most servers have defence mechanisms to tackle spam and cyber attacks. Websites are also now developing mechanisms such as asking for human authentication which is difficult for a bot to execute. “But even personal computers should be equipped with strong Internet security applications such as anti-virus and anti-spyware to prevent hacking and phishing attempts and to prevent being used as slave machines for distributed cyber attacks,” said Chintu Cherian Abraham, a digital media professional. Figures show that we need to watch out where and how we go online. According to Norton Report, 2013, 61% Indians access their social network accounts from unsecured wi-fi connections, while 42% access bank accounts and 44% shop online using unsecured wi-fi connections.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Social media companies are gradually devising mechanisms to filter bots. “When a page and a fan connect on Facebook, we want to ensure that connection involves a real person interested in hearing from a specific page and engaging with that brand’s content. As such, we have recently increased our automated efforts to remove Likes on Pages that may have been gained by means that violate our terms,” mentions Facebook’s site integrity policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Agency-client intervention is necessary to ensure that artificial traffic is not presented as real. “It’s also important to make all agencies, advertisers and clients aware of their responsibility to keep the Internet free from malicious NHT,” said Chiragh Cherian.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Government involvement is also needed to control the problem of malicious bots. “A lot needs to be done from the government’s side to tackle bots which can be used to target the country’s critical infrastructure such as banking websites,” said Jiten Jain, a cyber security analyst, adding, “Last year, I highlighted the flaws in HDFC’s net banking website which have been rectified now. They could have been exploited to block the net-banking service.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Until we have a robust mechanism to filter out bogus traffic from real, it will be difficult to say whether the social media followers of Bansal and other public figures are human or not.&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="http://editors.cis-india.org/home-images/FactFile.png" alt="Fact File" class="image-inline" title="Fact File" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Know your Bots&lt;/b&gt;&lt;br /&gt;Not all bots are used with a negative intent. Some help in research and monitoring.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Malicious&lt;/b&gt;&lt;br /&gt;Bots can be effectively used to impersonate and to hack accounts leading to financial losses and intellectual property theft. “Theft of personal details, username and password to operate one’s bank account is a classic example of how bots can lead to financial losses. It is an organised cyber crime,” explained Commander (Retd) Mukesh Saini, former national information security coordinator, Government of India. In May 2013, cyber criminals broke into the Mumbai-based account of the RPG group and siphoned off `2.4 crore. Three people were arrested in the case.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The rate at which NHT is increasing is alarming,” says Tinu 	Cherian Abraham. “Any computer connected to the Internet is 	vulnerable to such attacks. The user will not get to know about it 	unless he or she has installed an Internet security application.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Besides bots, computers also generate other kinds of secondary 	activities, while the user is surfing the Internet. This activity 	remains in the background and is never seen by the user, unlike the 	bot-generated pop ups, observes Comscore. For example, your computer 	might be being used as a channel to reach a server with the 	intention of hacking it. And you will never know.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Good&lt;/b&gt;&lt;br /&gt;Not all NHT is bad, though. In fact, 	good bots such as scrapers can be effectively used to conduct 	research. “Wikipedia can be scraped to investigate the frequency 	of edits on a Wikipedia page and track the increase in the number of 	editors,” explained Snehashish Ghosh, policy associate at the 	Bangalore-based Centre for Internet &amp;amp; Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Good bots are also used by search engines to track content on 	websites and enhance their search results. Search bots and other 	good bots formed 31% of total bots, the Incapsula report noted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Social&lt;/b&gt;&lt;br /&gt;Apart from malicious and good 	bots, there are social media bots too. “Extensive analysis is done 	on social media traffic for monitoring, business lead generation, as 	well as reputation management. This has amounted to a lot of 	automated or non-human traffic,” said Abraham.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to Facebook’s filings published in a Forbes report in 	February 2012, around 83 million of its users are bogus. “It’s a 	violation of our policies to use a fake name or operate under a 	false identity, and we encourage people to report any user they 	suspect of doing this, either through the report links we provide on 	the site or through the contact forms in our help centre,” a 	Facebook spokesperson told HT.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Twitter bots have also made its presence felt on the platform. 	“Twitter has witnessed very interesting bots which have found 	appreciation from the community for being funny and creative. The 	microblogging site cracked down on some harmful bots, but still some 	of the advanced level bots slip through the net,” said Ghosh.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In August 2012, London-based firm Digital Evaluators, which 	evaluates social media presence of worldwide companies, released an 	analysis of Twitter followers of the US Presidential Election 	candidates Barack Obama and Mitt Romney. 21.9% of Barack Obama’s 	17.82 million Twitter followers were found to be bogus.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Big Brother&lt;/b&gt;&lt;br /&gt;Ghosh said that the increase 	in NHT related to the Internet of things, the concept which enables 	communication between two or more devices, results in privacy 	issues. “Take a situation where your mobile device is constantly 	tracking your location for the purpose of switching on the air 	conditioner at your home before you reach. Such applications produce 	huge amounts of personal data and there is no clarity whether this 	data is being stored,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“As the new networks link data from products, company assets, 	or the operating environment, they will generate better information 	and analysis, which can enhance decision making significantly. Some 	organisations are starting to deploy these applications in targeted 	areas, while more radical and demanding uses are still in the 	conceptual or experimental stages,” noted a McKinsey &amp;amp; Company 	report on Internet of things.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/hindustan-times-january-5-2014-danish-raza-rise-of-the-bot'&gt;http://editors.cis-india.org/news/hindustan-times-january-5-2014-danish-raza-rise-of-the-bot&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2014-01-31T07:16:36Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/legally-india-feb-7-2013-rip-rahul-cherian-human-rights-activist-inclusive-planet-co-founder">
    <title> RIP: Rahul Cherian, human rights activist, Inclusive Planet co-founder </title>
    <link>http://editors.cis-india.org/news/legally-india-feb-7-2013-rip-rahul-cherian-human-rights-activist-inclusive-planet-co-founder</link>
    <description>
        &lt;b&gt;RIPRahul Cherian, an expert and policy activist in disability law, intellectual property (IP) law and technology law passed away today at the age of 39, while on a family holiday in Goa.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The blog post was &lt;a class="external-link" href="http://www.legallyindia.com/News/rip-rahul-cherian-human-rights-activist-inclusive-planet-co-founder"&gt;published in Legally India&lt;/a&gt; on February 7, 2013&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The 1998 NLSIU Bangalore graduate is understood to have succumbed to an infection after several days in intensive care.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Together  with fellow NLSIU alumnus Sachin Malhan, Cherian had co-founded  Inclusive Planet Centre for Disability and Policy in October 2009, as a  non-governmental organisation supporting stakeholders and public bodies  about laws and policies affecting persons with disabilities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As  head of policy initiatives at Inclusive Planet, he was involved in  drafting the Treaty for the Visually Impaired currently being agreed  upon by the World Intellectual Property Organisation (WIPO) in Geneva,  aiming to make copyrighted, printed materials more easily available to  the visually impaired and others with print disabilities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Cherian  was also a fellow at the Bangalore-based Centre for Internet and  Society (CIS), a legal expert on the Ministry of Social Justice and  Empowerment’s panel on disability laws, and an advisor to a plethora of  government initiatives related to the disability sector.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He was also a partner at IndoJuris Law Offices in Chennai, having acted as managing partner of the firm between 2003 and 2008.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Cherian is survived by his wife Anjana, his parents and his brother and sister.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According  to Cherian’s colleague Amba Salelkar, a remembrance meeting will be  held on Sunday at 11.00 am at Vidya Sagar, No.1, Ranjith Road,  Kotturpuram, Chennai.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Reactions: &lt;/b&gt;&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;&lt;a href="http://www.twitter.com/mumbaicentral" target="_blank"&gt;@mumbaicentral&lt;/a&gt;,  who worked with Cherian at Inclusive Planet, tweeted: “He was in Goa  for the weekend and he was hospitalized with high grade fever, diagnosed  as septicemia. Rahul took the foremost steps to recognition of the  rights of this disabled in Indian Policy and legislation. Latest  achievement being framing the recommendations on access for the disabled  to the Justice Verma Committee. Which have been incorporated in the  ordinance too. He will also be remembered for his efforts in amending  the copyright act to gain the "right to read" for persons with  disabilities.&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.twitter.com/latelyontime" target="_blank"&gt;@latelyontime&lt;/a&gt;: “Rahul Cherian, colleague, fellow-writer and role model, inspiration. You shall be missed.”&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.twitter.com/juditrius" target="_blank"&gt;@juditrius&lt;/a&gt;:  “Rahul Cherian, disability activist, co-founder of Inclusive Planet  &amp;amp; exceptional human being just passed away. He will be very much  missed.”&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.twitter.com/DaHammerstein" target="_blank"&gt;@DaHammerstein&lt;/a&gt;:  “Premature death of Rahul Cherian, Indian dir. Inclusive Planet ,  fighter for digital, disability rights, loss for human rights  community.”&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.twitter.com/SivaThambisetty" target="_blank"&gt;@SivaThambisetty&lt;/a&gt;:  “A very dear friend died today. Rahul Cherian @inclusive planet, clever  incorrigible #Disability rts in #India have lost a campaign leader.”&lt;/p&gt;
&lt;p&gt;&lt;a href="mailto:s@sauravdatta29" target="_blank"&gt;@sauravdatta29&lt;/a&gt; tweeted: “Rahul Cherian, one of those lawyers with an abiding commitment to social justice.”&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.twitter.com/mtonykurian" target="_blank"&gt;@mtonykurian&lt;/a&gt;: “this awesome article by rahul cherian of #disability and #sexuality &lt;a href="http://t.co/9S5SeSFc" target="_blank"&gt;http://t.co/9S5SeSFc&lt;/a&gt;" [Indian Express] and “i lost a mentor, disabled of india lost an expert. sad.”&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.twitter.com/chaosbogey" target="_blank"&gt;@chaosbogey&lt;/a&gt;: “I met Rahul Cherian maybe five times? but I was a little more in love with him each time...”&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.twitter.com/sunilchandy" target="_blank"&gt;@sunilchandy&lt;/a&gt;: “Rahul Cherian, a music nut, an enabler, an encourager, a great guy :(“&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3 style="text-align: justify; "&gt;Further reading:&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="http://inclusiveplanet.org.in/" target="_blank"&gt;Inclusive Planet&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;&lt;a href="http://editors.cis-india.org/" target="_blank"&gt;Centre for Internet and Society (CIS)&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.thebetterindia.com/6430/tbi-this-ability-rahul-cherian-working-towards-an-inclusive-planet/" target="_blank"&gt;November 2012 interview with Cherian about his work at Inclusive Planet&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.livemint.com/Leisure/XI9RYpDDaAFor6c0n1iKhP/Inclusive-Planet--Finding-the-right-websight.html" target="_blank"&gt;Article about Inclusive Planet in &lt;i&gt;Mint&lt;/i&gt;&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.legallyindia.com/20091203322/Analysis/lawyers-get-involved-the-right-to-read"&gt;2009 Legally India article about Cherian and other lawyers who get “socially involved”&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/playlist?list=PLLw9jWaZPEpxl8O_1B3XlSPVeAIzRKmfT" target="_blank"&gt;Seven videos of Cherian during the WIPO negotiations&lt;/a&gt; (via &lt;a href="http://www.twitter.com/gkjohn" target="_blank"&gt;@gkjohn&lt;/a&gt; on Twitter)
&lt;div class="moduletable"&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/legally-india-feb-7-2013-rip-rahul-cherian-human-rights-activist-inclusive-planet-co-founder'&gt;http://editors.cis-india.org/news/legally-india-feb-7-2013-rip-rahul-cherian-human-rights-activist-inclusive-planet-co-founder&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Accessibility</dc:subject>
    

   <dc:date>2013-03-09T07:13:41Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/rim-offered-security-fixes">
    <title>RIM Offered Security Fixes </title>
    <link>http://editors.cis-india.org/news/rim-offered-security-fixes</link>
    <description>
        &lt;b&gt;In India Talks, BlackBerry Maker Said It Could Share Metadata, Notes Show&lt;/b&gt;
        
&lt;p&gt;Research In Motion&amp;nbsp; Ltd. has offered information and tools to help India conduct surveillance of wireless email and messaging services on RIM's popular BlackBerry, say people familiar with the negotiations, illuminating RIM's dealings as it seeks to balance sovereign security concerns with its customers' privacy.&lt;/p&gt;
&lt;p&gt;In a series of discussions that intensified this summer, RIM offered to provide crucial information that would help the Indian government track down messages sent via the company's popular and encrypted corporate email service, according to those familiar with the confidential talks and to minutes of meetings reviewed by The Wall Street Journal.&lt;/p&gt;
&lt;p&gt;In a July 26 meeting, RIM representatives told Indian officials "they have a setup to help the security agencies in tracking the messages in which security agencies are interested," according to an Indian government summary of the meeting.&lt;/p&gt;
&lt;p&gt;The Waterloo, Ontario, company has become an industry leader in part on the strength of a secure technology that offers information privacy to customers. But as RIM seeks to expand, it is grappling with how its promise of user confidentiality is encountering resistance from governments around the globe.&lt;/p&gt;
&lt;p&gt;RIM's challenge, along with Google&amp;nbsp; Inc.'s face-off with China over censorship issues, illustrates the growing tensions between Western technology giants, who seek to woo millions of emerging-market consumers with increasingly sophisticated technology, and governments that are trying to maintain security in the face of it.&lt;/p&gt;
&lt;p&gt;The stakes are high in India, the world's No. 2 wireless market, behind China, with 635 million subscribers. Emerging economies are vital to RIM as its smartphones face competition in North America from Apple&amp;nbsp; Inc.'s iPhone and devices that run on Google's Android software. RIM's new international subscribers for the first time outnumbered new North American subscribers in the quarter that ended Feb. 27, according to brokerage GMP Securities.&lt;/p&gt;
&lt;p&gt;Discussions between RIM and India took a public turn Thursday when India's government threatened to block some BlackBerry services from the country's telecommunications networks unless the services could be opened to surveillance by Aug. 31. On Friday, an Indian government official said RIM had assured India it would meet the deadline.&lt;/p&gt;
&lt;p&gt;A spokesman for RIM in India declined to comment on negotiations with India. Sachin Pilot, India's Minister of State for Communications and Information Technology said Friday there are promising signs that the company is willing to cooperate, but there's no deal "until I have something in writing."&lt;/p&gt;
&lt;p&gt;RIM has come under scrutiny in recent months amid contentious negotiations with countries including the United Arab Emirates and Saudi Arabia, which have also sought to monitor BlackBerry services for threats to national security.&lt;/p&gt;
&lt;p&gt;A person familiar with the negotiations in the U.A.E. said officials in the region believed RIM had been holding back from them technological solutions that had been offered to Western governments, specifically in regards to BlackBerry Messenger.&lt;/p&gt;
&lt;p&gt;RIM declines to discuss its negotiations with governments and didn't comment on negotiations in India and other countries.&lt;/p&gt;
&lt;p&gt;In a statement issued Thursday, RIM outlined its guidelines for how far it is willing to go in helping carriers meet surveillance needs. RIM said it will only help carriers meet strict national-security rules, won't provide more access than its competitors already do and won't alter the security architecture of its corporate email servers in response to government needs.&lt;/p&gt;
&lt;p&gt;"RIM maintains a consistent global standard for lawful access requirements that does not include special deals for specific countries," the statement said.&lt;/p&gt;
&lt;p&gt;Governments are pressuring RIM to comply with their demands for information in part because unlike other smartphone vendors, it operates its own network of servers, the biggest of which is in Canada, outside their monitoring reach and jurisdiction.&lt;/p&gt;
&lt;p&gt;That contrasts with devices such as the iPhone, which don't operate their own email services. Governments generally have laws that allow them to monitor traffic on mobile and computer networks operating within their own countries.&lt;/p&gt;
&lt;p&gt;Talks between RIM and various countries have centered mostly on data routed through the company's system for corporate emails, BlackBerry Enterprise Server, and its instant-messaging service, BlackBerry Messenger, whose high levels of encryption can prevent government monitors from deciphering content or determining sender or recipient. RIM has said that even it can't decrypt BlackBerry corporate emails.&lt;/p&gt;
&lt;p&gt;India's security services argue they need access to selected emails to ward off criminal and terrorist threats. "In terms of our issues of national security, any responsible government would not want to compromise," said Mr. Pilot, the communications minister. "I don't think what we are asking is out of the ordinary vis-à-vis other countries."&lt;/p&gt;
&lt;p&gt;Security and technology experts say each country has different surveillance needs, technology infrastructures and laws governing how security forces and police can access data. It is generally Internet service providers and telecommunications carriers that must implement the country's monitoring regime, and the kinds of help RIM gives carriers in doing that varies with each nation, says a person familiar with RIM's operations.&lt;/p&gt;
&lt;p&gt;According to minutes taken by the Indian side, the parties discussed whether RIM could provide "metadata" from encrypted corporate emails—information such as the email's sender and recipient and the time sent. "After some persuasion, the [RIM] representative agreed that they can provide the metadata of the message," according to an Indian summary of one discussion.&lt;/p&gt;
&lt;p&gt;Cyber-security experts say such metadata would give government intelligence services important leads to locate BlackBerry traffic on corporate email servers, where messages are in decrypted form. It wasn't clear under what circumstances RIM would agree to divulge such information.&lt;/p&gt;
&lt;p&gt;In the meetings, RIM also promised to develop tools to help Indian authorities tap into third-party Internet chat services, such as Google's Gmail, that run on its handsets, according to the meeting minutes. It isn't clear whether or how RIM has proposed to help security officials decode BlackBerry Messenger.&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&amp;nbsp;&lt;a class="external-link" href="http://blogs.wsj.com/indiarealtime/2010/08/13/backupberry-options-for-blackberry-addicts/?KEYWORDS=RIM"&gt;Just in Case: Backup Options for Addicts&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://online.wsj.com/article/SB10001424052748703960004575426942856075682.html"&gt;RIM Optimistic About India&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://online.wsj.com/article/SB10001424052748704388504575420050826635826.html"&gt;Saudis Await RIM Ruling&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;RIM also appears to have put itself in a role of educating Indian officials over the operation of its network and on network security in general, suggesting to officials that emails that aren't subject to heavy corporate encryption can be viewed with assistance from local carriers.&lt;/p&gt;
&lt;p&gt;Governments that have been reviewing their data-access arrangements with RIM have been sharing information with each other, said an official in the region with knowledge of the Indian negotiations.&lt;/p&gt;
&lt;p&gt;The U.A.E. and Saudi Arabia, the Middle East's largest economies, upped their ante with RIM weeks before India did. Both countries have been negotiating with RIM for the same kinds of access to data that India wants, but people familiar with talks in the Gulf countries say they have been acrimonious.&lt;/p&gt;
&lt;p&gt;Government officials say RIM has taken a condescending attitude to developing countries' security demands, and say they believe the company was holding out on solutions to access information, such as on BlackBerry Messenger, that had been offered to other countries.&lt;/p&gt;
&lt;p&gt;"They refuse to listen to us," said a person familiar with the negotiations. "It's like we aren't speaking the same language."&lt;/p&gt;
&lt;p&gt;Anger boiled over last month with the U.A.E. announcing a ban on BlackBerry email, Internet and instant-messaging services from Oct. 11, citing a lack of progress in more than three years of negotiations. Saudi Arabia followed with a threatened ban on BlackBerry Messenger.&lt;/p&gt;
&lt;p&gt;Tensions were fueled when RIM co-CEO Michael Lazaridis&amp;nbsp; said in an interview earlier this month with The Wall Street Journal that many of the nations the company deals with aren't tech-savvy and don't understand the Internet. "We work with these countries to educate them," he said.&lt;/p&gt;
&lt;p&gt;Negotiations between the U.A.E. and RIM are ongoing. The government says it remains optimistic of a solution. In Saudi Arabia, telecommunications regulators announced earlier this week that RIM had offered them a technical fix that would let them access data from BlackBerry Messenger.&lt;/p&gt;
&lt;p&gt;In RIM's home country of Canada, the U.S. and other countries, police and security agents typically must get a court order to gain access to things like the content of emails.&lt;/p&gt;
&lt;p&gt;India's regulations in this area are murky. An 1885 law that has been updated over the years allows the government to intercept Internet traffic "on the occurrence of any public emergency." A 2008 law gives bureaucrats in various agencies the authority to order monitoring of any entity's Web traffic, though the matter can be challenged in court.&lt;/p&gt;
&lt;p&gt;It remains unclear whether RIM's promise to provide metadata to corporate messages will be enough to satisfy India's concerns. A more drastic solution, says Sunil Abraham of the Bangalore-based Center for Internet and Society, would be for the government to require RIM to build a BlackBerry data center within India—something that could cost tens of millions of dollars, people familiar with the matter say—and then classify the company as an Indian Internet service provider.&lt;/p&gt;
&lt;p&gt;Such a move would put India on stronger legal footing, analysts say, to demand data from RIM as well as companies whose employees use BlackBerrys. Under such a scenario, "the government would be allowed to get a room inside RIM and install whatever machines they want to monitor that traffic," Mr. Abraham said.&lt;/p&gt;
&lt;p&gt;It wasn't clear from the government documents summarizing the meetings between RIM and the government whether such an option is being considered. The company would vehemently oppose such a classification, people familiar with the situation say. In the U.A.E, RIM has balked at the government's request that it set up a local data center, people familiar with those negotiations said.&lt;/p&gt;
&lt;p&gt;Read the original in &lt;a class="external-link" href="http://online.wsj.com/article/SB10001424052748703960004575427312899373090.html?mod=googlenews_wsj"&gt;Wall Street Journal&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/rim-offered-security-fixes'&gt;http://editors.cis-india.org/news/rim-offered-security-fixes&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Telecom</dc:subject>
    

   <dc:date>2011-04-02T10:24:12Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/rightscon-silicon-valley-2016">
    <title>RightsCon Silicon Valley 2016</title>
    <link>http://editors.cis-india.org/internet-governance/news/rightscon-silicon-valley-2016</link>
    <description>
        &lt;b&gt;RightsCon is the world’s leading event convened around the issues of the internet and human rights. The annual conference convenes business leaders, visionaries, technologists, legal experts, civil society members, activists, and government representatives from across the globe on issues at the intersection of tech and human rights.  The event was organized by RightsCon.&lt;/b&gt;
        &lt;h2&gt;Program&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;This year, we had three days of&lt;a href="http://rightscon.sched.org/"&gt;&lt;span style="text-decoration: underline;"&gt;programming&lt;/span&gt;&lt;/a&gt;plus  a day of satellite events (Day Zero satellite events + three full days  of main programming), tackling some of today’s most challenging business  and policy issues: freedom of expression, online harassment and  countering violent extremism, privacy and digital security, encryption,  network discrimination and connectivity, human rights, trade and  business, transparency reporting, digital inclusion, internet  governance, and much more. &lt;a href="http://rightscon.sched.org/"&gt;&lt;span style="text-decoration: underline;"&gt;Click here&lt;/span&gt;&lt;/a&gt; to see our program schedule.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With 250+ sessions and over 1,000 registered participants, RightsCon 2016 provided unparalleled opportunities to engage with leading speakers and organizations, both in sessions and through private meetings and discussions. It was also home to an array of parties, movie screenings, and social events throughout the week to help participants meet others in the space.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Elonnai Hickok participated in the following panels and meetings at RightsCon held at Mission Bay Conference Center in San Francisco, California from March 30 to April 1, 2016:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. Beyond CSR: Promoting Strong Human Rights Performance - Centre for Law and Democracy &lt;br /&gt;2. Ranking ICT Companies on Digital Rights; A How to Guide - Ranking Digital Rights &lt;br /&gt;3. Who is an Intermediary? Harmonizing Definitions? - CIS &lt;br /&gt;4. Manila Principles: One Year Later - CIS and EFF &lt;br /&gt;5. Cross Border Data Requests - American University Washington College of Law, University of Kentucky College of Law. &lt;br /&gt;6. Closed door meeting for Ranking Digital Rights &lt;br /&gt;7. GNI meeting on Mutual Legal Assistance&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="https://www.rightscon.org/event-info/"&gt;More info on the RightsCon website&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/rightscon-silicon-valley-2016'&gt;http://editors.cis-india.org/internet-governance/news/rightscon-silicon-valley-2016&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-04-06T15:10:21Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
