<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="http://editors.cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>http://editors.cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1511 to 1525.
        
  </description>
  
  
  
  
  <image rdf:resource="http://editors.cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/priyanka.jpg"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/private-sector-censors"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/PrivateSector.png"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/igf-2013-workshop-335-privacy-from-regional-regulations-to-global-connections"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/india-today-neha-vashishth-april-6-2017-privacy-what-bengaluru-police-leaks-phone-numbers-on-twitter"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/privacy-speech-at-stake-in-cyberspace-1"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/privacy-security-access-to-rights"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/wilton-park-november-17-19-privacy-security-surveillance"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/publications/privacy-draft-discussion"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/publications/privacy-discussion-paper"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/publications/privacy-data-gathering-technologies"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/publications/privacy-data-agenda"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/events/privacy-by-design"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/privacy-timeline"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/privacy-timeline.pdf"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="http://editors.cis-india.org/home-images/priyanka.jpg">
    <title>Priyanka Sachar</title>
    <link>http://editors.cis-india.org/home-images/priyanka.jpg</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/priyanka.jpg'&gt;http://editors.cis-india.org/home-images/priyanka.jpg&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2012-04-10T09:09:50Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/private-sector-censors">
    <title>Private sector censors</title>
    <link>http://editors.cis-india.org/news/private-sector-censors</link>
    <description>
        &lt;b&gt;If business decides what’s ‘good’ and ‘bad’ speech, it can lead to multiple interpretations and arbitrary decisions. The article by Salil Tripathi was published in LiveMint on April 25, 2012.
&lt;/b&gt;
        
&lt;p&gt;In Milan Kundera’s 1967 Czech novel, Žert (The Joke), Ludvik Jahn sends a postcard to an intense classmate who takes herself too seriously. In the card, he makes sarcastic comments against the Communist Party. Unsurprisingly, others don’t see the joke. He gets expelled from the party, conscripted and has to work in mines.&lt;br /&gt;&lt;br /&gt;While The Joke was a work of fiction, in the real Soviet era as punishment for such actions, many people lost jobs, sometimes their homes; some went to jail, often betrayed by those they trusted. In Czechoslovakia (as the country was then known), the state ran the postal service and those who read the postcard were party members. In India, the private sector provides Internet access and others don’t have the legal right to see what’s being transmitted, unless they are intended recipients, or if the material is broadcast publicly. The state now wants the private sector to police and censor the Internet.&lt;br /&gt;&lt;br /&gt;Under the draconian Information Technology (Intermediaries Guidelines) Rules, 2011, any intermediary (a search engine, a website, a domain name registry, a service provider, or a cyber café) must take down the “offending” material from its website within 36 hours. The intermediary need not inform the person who posted the material, nor would the creator get the right to respond. As Apar Gupta points out on the Indian Law and Technology Blog, in one recent case, based on these rules, an injunction has been granted.&lt;br /&gt;&lt;br /&gt;These rules go significantly beyond the existing restraints on speech. The Constitution limits speech and sections of the criminal code impose further restrictions. To that, add the IT rules’ vaguely defined terms of what can’t be said—content which is “grossly harmful, harassing, blasphemous, defamatory, obscene, pornographic, paedophilic, libelous, invasive of another’s privacy, hateful, or racially, ethnically objectionable, disparaging, relating or encouraging money laundering or gambling or otherwise unlawful in any manner whatever, harms minors in any way, or infringes any patent, trademark, copyright, or other proprietary right”. Who decides that? The intermediaries.&lt;br /&gt;&lt;br /&gt;These rules make the private sector act like the state. Nobody elected business to play such a role; it does not have the expertise, capacity, legal training, or authority to act as the state. Censorship is bad; whether in state or private hands. If business decides what’s “good” and “bad” speech, it can lead to multiple interpretations and arbitrary decisions, without recourse to appeal. In a country where those who feel offended have often threatened violence, businesses will understandably take the cautious approach and not allow anyone to say anything that’s remotely controversial, even if it is an opinion about a film.&lt;br /&gt;&lt;br /&gt;Decisions will be made on opaque criteria. Apple and Amazon have arbitrarily stopped some products from being sold on their electronic stores, citing “community standards”. Amazon stopped providing server space to WikiLeaks, even though no government had asked it to do so. Credit card companies stopped processing donations going to WikiLeaks, without any legal order. Even Google, which has admirably stood up to China’s bullying, has had to take down content when governments have required that it does so through proper legal channels. India’s record is poor: of the 358 complaints India lodged with Google, 255 were about content that was controversial or political, but not illegal.&lt;br /&gt;&lt;br /&gt;To demonstrate the reach of the rules, the Centre for Internet and Society in Bangalore sent random notices to seven companies, asking them to take down content. Of them, six complied beyond what they were called upon to do—instead of the three pages that the centre asked for, one company blocked an entire website. A few legally worded letters were enough to get compliance from companies. The centre’s executive director, Sunil Abraham, told me recently: “Companies which have no interest in free speech are now taking these decisions. They have the power to do so and they are using it without any sense of responsibility.”&lt;br /&gt;&lt;br /&gt;Aseem Trivedi knows this well. The cartoonist who ran a website called cartoonistsagainstcorruption.com, found that his site had disappeared after a complaint from an individual that the cartoons violated laws. Since then he has been campaigning for freedom on the Internet. Everyone’s freedom is at stake—whether you want to see cartoons of Sonia Gandhi, Narendra Modi, Ramdev, Kisan Hazare, Binayak Sen, Arundhati Roy, Sachin Tendulkar, Poonam Pandey and even Mamata Banerjee. And yet look at what happened to Ambikesh Mahapatra, the professor who sent a cartoon mocking Banerjee to some friends via the Internet. He was arrested and later roughed up. These rules chill speech.&lt;br /&gt;&lt;br /&gt;Last year, Kapil Sibal, minister for information technology, asked companies to screen content manually and censor the Web. The demand was audacious. It showed lack of understanding of how the Internet works and revealed fundamental ignorance of the state’s role: it has to protect the rights of the one who wishes to express and not the one who claims offence.&lt;br /&gt;&lt;br /&gt;In Parliament, P. Rajeev, member of Parliament (Rajya Sabha), wants to annul those rules. Everyone should support him.&lt;/p&gt;
&lt;p&gt;Read the original in LiveMint &lt;a class="external-link" href="http://www.livemint.com/2012/04/25201119/Private-sector-censors.html"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/private-sector-censors'&gt;http://editors.cis-india.org/news/private-sector-censors&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-04-26T13:30:47Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/PrivateSector.png">
    <title>Private Sector</title>
    <link>http://editors.cis-india.org/home-images/PrivateSector.png</link>
    <description>
        &lt;b&gt;Private Sector&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/PrivateSector.png'&gt;http://editors.cis-india.org/home-images/PrivateSector.png&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2014-04-22T11:44:36Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/igf-2013-workshop-335-privacy-from-regional-regulations-to-global-connections">
    <title>Privacy: from regional regulations to global connections ?</title>
    <link>http://editors.cis-india.org/news/igf-2013-workshop-335-privacy-from-regional-regulations-to-global-connections</link>
    <description>
        &lt;b&gt;This workshop is being organised by Internet Society at Bali on October 24. Sunil Abraham is one of the panelists for this.&lt;/b&gt;
        &lt;p&gt;&lt;i&gt;The Internet Governance Forum 2013 is being held at Bali from October   22 to 25. The overarching theme for the 2013 IGF meeting is: "Building   Bridges"- Enhancing Multistakeholder Cooperation for Growth and   Sustainable Development"&lt;/i&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.intgovforum.org/cms/wks2013/workshop_2013_status_list_view.php?xpsltipq_je=335"&gt;Read the original published on the IGF website&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;Theme: Internet Governance Principles&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Internet dissolves geographical boundaries on a greater scale than any prior invention. It allows data, personal and otherwise, to flow across borders, supporting social and economic interactions. However, there is a complex mix of factors at play: multiple policy objectives that are sometimes in conflict; individuals’ rights; the interests of the communities; “monetization” of personal data for short-term and long-term commercial gain; different historical cultural and regulatory approaches to privacy; etc. &lt;br /&gt;&lt;br /&gt;Across a diverse, global Internet, how can we best deal with the tensions that naturally result from differences in personal privacy expectations, economic aspirations, and regulatory regimes, particularly when it comes to online data protection? &lt;br /&gt;&lt;br /&gt;This workshop will explore what core principles and strategies are needed to achieve a balanced and fair approach to data protection that is effective internationally and regionally. In the process, we will examine the possible paths to a global solution, together with impediments, and explore how successful local and regional approaches could be leveraged at the international level.&lt;br /&gt;&lt;br /&gt;We will also strive to articulate lessons learned from recent initiatives such as the modernisation of the Council of Europe Convention 108, the revision of the OECD Privacy Guidelines, the APEC Cross Border Privacy Rules System, and the proposed revisions to the EU data protection framework, etc. in tackling these challenging issues.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Has the proponent organised a workshop with a similar subject during past IGF meetings?&lt;br /&gt;&lt;/b&gt;Yes&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Indication of how the workshop will build on but go beyond the outcomes previously reached &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The submitter has not previously organised a workshop at the IGF.  However, his colleague has co-organised the following workshops on  related issues:  2012: ICC BASIS and ISOC - Solutions for enabling cross-border data  flows –  &lt;a class="external-link" href="http://wsms1.intgovforum.org/sites/default/files/IGF%202012%20ws86%20report_10%2012%2012%20final.doc"&gt;http://wsms1.intgovforum.org/sites/default/files/IGF%202012%20ws86%20report_10%2012%2012%20final.doc&lt;/a&gt; 2012: CoE and ISOC – Who is following me: tracking the trackers –  &lt;a class="external-link" href="http://wsms1.intgovforum.org/content/no181-who-following-me-tracking-trackers#report"&gt;http://wsms1.intgovforum.org/content/no181-who-following-me-tracking-trackers#report&lt;/a&gt; 2010: ISOC and EFF – The Future of Privacy –  &lt;a class="external-link" href="http://www.internetsociety.org/sites/default/files/future-privacy%2020100914.pdf"&gt;http://www.internetsociety.org/sites/default/files/future-privacy%2020100914.pdf&lt;/a&gt; Background papers:  Report from a WSIS Forum 2012 thematic workshop entitled: “Data Privacy  on a global scale: keeping pace with an evolving environment” – &lt;a class="external-link" href="http://www.internetsociety.org/sites/default/files/Data%20Privacy%20on%20a%20global%20scale_0.pdf"&gt; http://www.internetsociety.org/sites/default/files/Data%20Privacy%20on%20a%20global%20scale_0.pdf&lt;/a&gt; Report  from a IGF2012 workshop entitled “Solutions for enabling cross-border  data flows - &lt;a class="external-link" href="https://www.internetsociety.org/sites/default/files/IGF%202012%20cross-border%20data%20flows.pdf"&gt; https://www.internetsociety.org/sites/default/files/IGF%202012%20cross-border%20data%20flows.pdf&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Background Paper&lt;/h3&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.intgovforum.org/cms/wks2013/workshop_background_paper/29_1373533670.PDF"&gt;Download background paper&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;Co-organisers&lt;/h3&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Ms. Sophie Kwasny, Head of the Data Protection Unit, Council of Europe , Intergovernmental Organizations, FRANCE, Western Europe and Others Group - WEOG&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Mr. Frederic Donck, Internet Society, Technical Community, BELGIUM, Western Europe and Others Group - WEOG&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;b&gt;Have the Proponent or any of the co-organisers organised an IGF workshop before?&lt;/b&gt;&lt;br /&gt;Yes&lt;/p&gt;
&lt;p&gt;The link(s) to the workshop report(s)&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://www.internetsociety.org/sites/default/files/Data%20Privacy%20on%20a%20global%20scale_0.pdf"&gt;http://www.internetsociety.org/sites/default/files/Data%20Privacy%20on%20a%20global%20scale_0.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://https//www.internetsociety.org/sites/default/files/IGF%202012%20cross-border%20data%20flows.pdf"&gt;https://www.internetsociety.org/sites/default/files/IGF%202012%20cross-border%20data%20flows.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Panelists&lt;/h3&gt;
&lt;p&gt;Please click on Biography to view the biography of panelist&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Sophie Kwasny, Head of the Data Protection Unit, Council of Europe , Female, Intergovernmental Organizations, FRANCE, Western Europe and Others Group – WEOG&lt;/li&gt;
&lt;li&gt;Nigel Waters, Public Officer, Australian Privacy Foundation , Male, Civil Society, Australia, Asia-Pacific Group&lt;/li&gt;
&lt;li&gt;Wendy Seltzer, Policy Counsel, World Wide Web Consortium (W3C) , Female, Technical Community, United States, Western Europe and Others Group – WEOG&lt;a href="http://www.intgovforum.org/cms/wks2013/panellist_2013_list_view.php?qbofmmjtu_je=104" target="_blank"&gt;&lt;span&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;Biography&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Joseph Alhadeff, Vice President for Global Public Policy, Chief Privacy Officer, Oracle Corporation, Male, Private Sector, United States, Western Europe and Others Group – WEOG&lt;a href="http://www.intgovforum.org/cms/wks2013/panellist_2013_list_view.php?qbofmmjtu_je=34" target="_blank"&gt;&lt;span&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;Biography&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Sunil Abraham, Executive Director, Centre for Internet and Society (CIS), Bangalore, Male, Civil Society, India, Asia-Pacific Group&lt;a href="http://www.intgovforum.org/cms/wks2013/panellist_2013_list_view.php?qbofmmjtu_je=108" target="_blank"&gt;&lt;span&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;Biography&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;Moderator&lt;/h3&gt;
&lt;p&gt;Frederic Donck, Internet Society, Director European Regional Bureau&lt;/p&gt;
&lt;h3&gt;Remote Moderator&lt;/h3&gt;
&lt;p&gt;Luca Belli, CERSA,Université Panthéon-Assas Sorbonne University&lt;/p&gt;
&lt;h3&gt;Agenda&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Moderator will briefly introduce the session as well as the different panellists. Each panellist will have 2 minutes (maximum) to introduce his/her own perspective on the general issues addressed by the moderator.&lt;br /&gt;&lt;br /&gt;No powerpoints allowed. Very dynamic session with regular interventions from remote participants and audience, as well as between panellists is sought.&lt;br /&gt;&lt;br /&gt;Moderator will work out questions (including through a coordinated approach before the session with panellists) and will organise the session in a way that allows a balanced conversation between all stakeholders (on-site/remotely).&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Inclusiveness of the Session&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Moderator will briefly introduce the session as well as the different panellists. Each panellist will have 2 minutes (maximum) to introduce his/her own perspective on the general issues addressed by the moderator.&lt;br /&gt;&lt;br /&gt;No powerpoints allowed. Very dynamic session with regular interventions from remote participants and audience, as well as between panellists is sought.&lt;br /&gt;&lt;br /&gt;Moderator will work out questions (including through a coordinated approach before the session with panellists) and will organise the session in a way that allows a balanced conversation between all stakeholders (on-site/remotely).&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Suitability for Remote Participation&lt;/h3&gt;
&lt;p&gt;Dynamic interaction with remote participants (ISOC community and chapters, technical community, Businesses, etc.) will be ensured through social medias, jabber, webex, and twitter (hashtag will be provided) etc.&lt;br /&gt;&lt;br /&gt;Coordinated approach with remote moderator will be ensured as well as the necessary communication and information to remote participants in advance of and during the session.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/igf-2013-workshop-335-privacy-from-regional-regulations-to-global-connections'&gt;http://editors.cis-india.org/news/igf-2013-workshop-335-privacy-from-regional-regulations-to-global-connections&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-10-21T08:18:56Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/india-today-neha-vashishth-april-6-2017-privacy-what-bengaluru-police-leaks-phone-numbers-on-twitter">
    <title>Privacy, what? Bengaluru police leaks 46,000 phone numbers on Twitter</title>
    <link>http://editors.cis-india.org/internet-governance/news/india-today-neha-vashishth-april-6-2017-privacy-what-bengaluru-police-leaks-phone-numbers-on-twitter</link>
    <description>
        &lt;b&gt;Bengaluru police made the biggest goof up of all time by releasing private information of people who called 100 to complain since April 2015 and was seemingly unapologetic about the breach of privacy.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;The article by Neha Vashishth was &lt;a class="external-link" href="http://indiatoday.intoday.in/story/bengaluru-police-twitter-breach-privacy-phone-numbers/1/922183.html"&gt;published by India Today&lt;/a&gt; on April 6, 2017. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;We all love our privacy, don't we?&lt;/p&gt;
&lt;p&gt;We  put various locking apps and hide our private pictures on Facebook,  Twitter etc and only share what we want the world to see. But sometimes  even after our countless efforts, we end up losing our information on  the internet. After all, a breach of privacy is the greatest nightmare  one can have.&lt;/p&gt;
&lt;p&gt;Bengaluru police goofed up too when it came to  handling privacy concerns of Bengaluru citizens. The police department  posted phone numbers of thousands of citizens on their Twitter handle  (@BCPCR) who called 100 and complained against harassment, quarrels, and  gambling etc.&lt;/p&gt;
&lt;p&gt;The police posted over 46,000 tweets online since  April 2015 sharing information of people who called on 100 along with  the app known as 'Suraksha' to lodge complaints. The account was made  private as soon as the matter escalated&lt;b&gt;.&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;The police was unapologetic regarding the matter and said that the tweets were auto-generated from their twitter handle @BCPCR.&lt;/p&gt;
&lt;p&gt;Pranesh  Prakash, Policy Director at the Centre for Internet and Society said  the "police officer who ordered to create such an account should be held  responsible if any harm comes to a complainant."&lt;/p&gt;
&lt;p&gt;This not only  created a major breach of privacy of complainants but also risked their  lives. This incident only proves that privacy and sensitivity of the  matter has vanished in today's time.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/india-today-neha-vashishth-april-6-2017-privacy-what-bengaluru-police-leaks-phone-numbers-on-twitter'&gt;http://editors.cis-india.org/internet-governance/news/india-today-neha-vashishth-april-6-2017-privacy-what-bengaluru-police-leaks-phone-numbers-on-twitter&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-04-07T02:57:49Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/privacy-speech-at-stake-in-cyberspace-1">
    <title>Privacy, speech at stake in cyberspace</title>
    <link>http://editors.cis-india.org/news/privacy-speech-at-stake-in-cyberspace-1</link>
    <description>
        &lt;b&gt;Internet censorship is becoming a trend, with many countries around the world filtering the Web in varying degrees, writes Leslie D’Monte in Livemint on February 3, 2012.&lt;/b&gt;
        
&lt;p&gt;Privacy and freedom of expression are gradually being compromised in 
cyberspace, say advocacy groups, with social networking sites and 
Internet companies buckling under pressure from governments to monitor 
and block “objectionable” content.&lt;/p&gt;
&lt;p&gt;Take the case of Twitter Inc., which on 26 January posted on its 
official blog that “...starting today, we give ourselves the ability to 
reactively withhold content from users in a specific country—while 
keeping it available in the rest of the world”. While Twitter reasoned 
that as it continues to grow internationally, it will have to deal with 
“countries that have different ideas about the contours of freedom of 
expression”, activists and bloggers cautioned that the new censorship 
policies could muffle online freedom.&lt;/p&gt;
&lt;p&gt;“The decision of Twitter to censor its content based on the political
 masters’ wishes in each country is an indication that commercial 
interests are always higher than democratic interests for these 
companies. The move of the Indian government to arm-twist the major 
intermediaries is, therefore, expected to succeed in due course once the
 initial resistance wears off,” cautioned Na. Vijayashankar, a 
Bangalore-based e-business consultant and founder secretary of the Cyber
 Society of India.&lt;/p&gt;
&lt;p&gt;In December, minister for communications and information technology 
(IT) Kapil Sibal said in New Delhi that the Centre had no option but to 
“evolve guidelines” to ensure that “blasphemous content on the Internet 
or television is not allowed”, since Internet and social networking 
sites such as Google Inc., Microsoft Corp., Twitter, Yahoo Inc., and 
Facebook Inc. failed “to respond to and cooperate with” the government’s
 request to keep “objectionable” content off their sites.&lt;/p&gt;
&lt;p&gt;A few days later, Sibal clarified that “...this government (of the 
United Progressive Alliance) does not believe in censorship”. And in an 
interview to Mint on 1 February, Gulshan Rai—head of the elite Indian 
Computer Emergency Response Team and coordinator of a committee on 
cyberlaw—said, inter alia, “We value the freedom of speech. We do not 
interfere there.”&lt;/p&gt;
&lt;p&gt;Internet censorship is a rising trend, with approximately 40 
countries filtering the Web in varying degrees, including democratic and
 non-democratic governments. YouTube and Gmail (both from Google), 
BlackBerry maker Research In Motion Ltd, WikiLeaks, Twitter and Facebook
 have all been censored, at different times, in China, Iran, Egypt and 
other countries.&lt;br /&gt;
  &lt;br /&gt;
“The clampdown on online free speech and the roll-out of a multi-tiered 
blanket surveillance regime via the draconian IT Act and its associated 
rules in India is part of a global trend,” said Sunil Abraham, executive
 director of the Centre for Internet and Society. “Big brother 
tendencies with the government have found common cause with powerful 
rights-holders, who are keen to crack down on intellectual property 
rights infringements. This, combined with the dramatic growth of the 
surveillance industry, has resulted in civil liberties being undermined 
across the world for a variety of pretexts ranging from child porn, 
obscenity, hate speech, organized crime, terrorism and piracy.”&lt;/p&gt;
&lt;p&gt;&lt;img src="http://editors.cis-india.org/home-images/statusreport.jpg/image_preview" alt="Status Report" class="image-inline image-inline" title="Status Report" /&gt;&lt;/p&gt;
&lt;p&gt;Transparency Report website—which logs content removal requests it 
receives from governments—the Internet company received 67 requests from
 the Indian government for the removal of 282 content items (such as 
videos critical of politicians) from YouTube and blogs during 
July-December 2010. Google said it complied with 22% of the requests. 
For the January-June 2011 (latest data available) period, Google 
received 68 content removal requests for 358 items from Indian 
government agencies. Google complied in 51% cases.&lt;/p&gt;
&lt;h3&gt;Entangling the user&lt;/h3&gt;
&lt;p&gt;Even as they face pressure from governments, companies such as Google
 and Facebook are tweaking their policies to allow for sharing of user 
data across multiple product offerings. They claim it will give their 
users a more “intuitive” experience, but advocacy groups say the 
policies are being altered to give advertisers more bang for the buck at
 the expense of user privacy.&lt;/p&gt;
&lt;p&gt;Google, for instance, is making changes to its privacy policies and 
terms of service, which take effect from 1 March. “Regulators globally 
have been calling for shorter, simpler privacy policies—and having one 
policy covering many different products is now fairly standard across 
the Web,” said Alma Whitten, Google’s director of privacy, product and 
engineering, on the official company blog. Google has begun notifying 
users of these changes since 24 January.&lt;/p&gt;
&lt;p&gt;For example, a search for restaurants in Mumbai may throw up Google+ 
posts or photos that people have shared with other users, or that are in
 their albums. Usability can be enhanced, for instance, by allowing 
memos from Google Docs to be read in Gmail, or adding a Gmail contact to
 a meeting in Google Calendar. Google, according to Whitten, does not 
sell personal information nor share it externally without permission 
“except in very limited circumstances like a valid court order”.&lt;/p&gt;
&lt;p&gt;Facebook, on its part, introduced its “Timeline” feature in December,
 which digs up a user’s past and displays it, but does not allow opting 
out of the service. The feature is being introduced for all 800 million 
users, around 40 million of whom are in India. Those not accustomed to 
checking their privacy settings will have a hard time going through the 
hundreds of messages they’ve posted over the last few years (Facebook 
was founded in 2004).&lt;/p&gt;
&lt;p&gt;The Electronic Privacy Information Center said the launch of Timeline
 forces more privacy setting changes on Facebook users, “which flies in 
the face of both privacy and a settlement reached between the firm and 
the US Federal Trade Commission (FTC)”. On 29 November, Facebook agreed 
to an FTC order that bars it from “deceiving” consumers about privacy 
practices and requires it to submit to monitoring for 20 years.&lt;/p&gt;
&lt;p&gt;“Privacy is certainly a very serious concern for Internet users. Some
 of the big brands like Facebook and Google simply have access to too 
much information about the life of their users, and this information 
could easily be misused by the brand or wilfully by someone else. Our 
guidance to consumers and clients is that first and foremost, they 
should be very conscious of these privacy challenges. If we put out any 
communication on a social network, it is akin to broadcast 
communication. By default, choose the tightest privacy setting and then 
gradually loosen up instead of accepting the default privacy setting of 
Facebook or Google. Don’t give out information like cellphone number, 
date of birth...or even names of close relations on social networks,” 
said Hareesh Tibrewala, joint chief executive officer of Social 
Wavelength, a company that advises clients on social media strategies.&lt;/p&gt;
&lt;p&gt;Mahesh Murthy, founder of digital marketing firm Pinstorm, 
acknowledged that “in reality, there is virtually no privacy online. 
Governments and companies try to assure apprehensive citizens about 
privacy, while at the same time doing everything to destroy it in 
reality”.&lt;/p&gt;
&lt;p&gt;He advises marketers to be upfront about their data collection and 
management policies, and declare them prominently on their online 
properties. On an individual level, Murthy takes comfort “in the fact 
that I could just be one of those 3 billion+ Internet users worldwide 
with my data a small part of the swarm out there that no one might take a
 special interest in”.&lt;/p&gt;
&lt;h3&gt;Electronic police state?&lt;/h3&gt;
&lt;p&gt;India has a history of exerting pressure on companies for access to 
communications data. According to Cryptohippie Inc., a provider of 
communication security services, India ranked 26 among the most policed 
states in the world in 2010—“one in which every surveillance camera 
recording, every email sent, every Internet site surfed, every post 
made, every check written, every credit card swipe, every cellphone 
ping…are all criminal evidence, and all are held in searchable 
databases”, according to the company that discontinued the report in 
2011, stating that “…most people are defending their ignorance; not much
 good will come from us repeating ourselves”.&lt;/p&gt;
&lt;p&gt;Currently, the Indian Telegraph Act and the IT Act, 2008 (amendments 
introduced in the IT Act, 2000), give the government the power to 
monitor, intercept and even block online conversations and websites. 
Moreover, under section 79 of the IT Intermediary (Rules and 
Guidelines), 2011, intermediaries—telcos, Internet services providers, 
network services providers, search engines, cyber cafes, Web-hosting 
companies, online auction portals and online payment sites—are mandated 
to exercise “due diligence” and advise users not to share/distribute 
information violative of the law or a person’s privacy and rights. 
Intermediaries are expected to act on a complaint within 36 hours of 
receiving it, and remove such content when warranted. In case the 
intermediary doesn’t find the content objectionable, the matter will 
have to be contested in a court of law.&lt;/p&gt;
&lt;p&gt;“The Indian government can, and should, monitor conversations and 
websites if it believes the content can harm the security, defence, 
sovereignty and integrity of the country,” maintained Pavan Duggal, a 
Supreme Court lawyer and a cyberlaw expert, but wondered how it would go
 about implementing the task of monitoring conversation on an 
unstructured Internet. “The intention is good, but the path is not 
clear,” said Duggal, who envisions a lot of cases being filed against 
misuse of these laws.&lt;/p&gt;
&lt;p&gt;“While the affected party can lodge a complaint with the 
intermediary, removal has to follow a due process, which should include 
suitable documentary evidence placed by the party. There should be a 
process of examination through an ombudsman, a process of arbitration 
where the request is disputed or a court order as may be required on a 
case to case basis,” said Vijayashankar of the Cyber Society of India.&lt;/p&gt;
&lt;p&gt;

&lt;a class="external-link" href="http://www.livemint.com/2012/02/02215454/Privacy-speech-at-stake-in-cy.html?h=B"&gt;The original was published in Livemint on 3 February 2012&lt;/a&gt;. Sunil Abraham was quoted in it.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/privacy-speech-at-stake-in-cyberspace-1'&gt;http://editors.cis-india.org/news/privacy-speech-at-stake-in-cyberspace-1&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2012-02-03T11:27:58Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/privacy-security-access-to-rights">
    <title>Privacy, Security, and Access to Rights: A Technical and Policy Analyses</title>
    <link>http://editors.cis-india.org/news/privacy-security-access-to-rights</link>
    <description>
        &lt;b&gt;Privacy and security are often presented as zero-sum outcomes with respect to issues affecting Internet governance. This dichotomous treatment often results in policy outcomes that directly limit access and rights. The meanings of privacy and security, however, are not used uniformly and often vary with the regards to the issue at hand (i.e. financial crimes, copyright enforcement) as well as cultural and political context.&lt;/b&gt;
        
&lt;p&gt;This workshop aims to explore the nuances in the relationship between privacy and security through a series of technical demonstrations alongside policy analyses from different regions to determine how rights and access can be best protected.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The Workshop Agenda is as follows:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;Introduction - Workshop Agenda, Issues, and Panelists (5 minutes)&amp;nbsp;&lt;/li&gt;&lt;li&gt;Regional Perspectives - Cultural and Policy Understandings of Privacy and Security, and the implications for access and rights (20 min)&lt;/li&gt;&lt;li&gt;Technical Perspectives - Designing privacy and security through technology (20 min)&lt;/li&gt;&lt;li&gt;Policy Opportunities and Challenges (10 min)&lt;/li&gt;&lt;li&gt;Question and Answer (30 min)&lt;/li&gt;&lt;/ol&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;&lt;strong&gt;Which of the five broad IGF Themes or the Cross-Cutting Priorities does your workshop fall under?&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;Security, Openness and Privacy&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;&lt;strong&gt;Have you organized an IGF workshop before?&lt;/strong&gt; No&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;If so, please provide the link to the report&lt;/strong&gt;:&lt;/div&gt;
&lt;div&gt;No link to this report&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;Provide the names and affiliations of the panellists you are planning to invite&lt;/strong&gt;:&lt;br /&gt;Invited Panelists:&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;ul&gt;&lt;li&gt;&amp;nbsp;Karen Reilly, Tor Project (United States)&lt;/li&gt;&lt;li&gt;Carlos Affonso Pereira de Souza, Centro de Technologica e Socieda (Brazil)&lt;/li&gt;&lt;li&gt;Smari McCarthy, International Modern Media Initiative (Iceland)&lt;/li&gt;&lt;li&gt;Christopher Soghoian, Indiana University (United States)&lt;/li&gt;&lt;li&gt;Bob Pepper, Cisco (United States)*&amp;nbsp;&lt;/li&gt;&lt;li&gt;Sunil Abraham (India)&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;Remote Moderator:&lt;/div&gt;
&lt;div&gt;Cameran Ashraf, University of California, Los Angeles&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;&lt;strong&gt;Provide the name of the organizer(s) of the workshop and their affiliation to various stakeholder groups&lt;/strong&gt;:&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;&lt;li&gt;Kim Pham, Expression Technologies, Civil Society&lt;/li&gt;&lt;li&gt;Karen Reilly, Tor Project, Technical/Civil Society&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;Organization&lt;/strong&gt;: Expression Technologies&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;Contact Person&lt;/strong&gt;: Kim Pham&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;See the &lt;a class="external-link" href="http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=WSProposals2011View&amp;amp;wspid=219"&gt;event details&lt;/a&gt; on the IGF website&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/privacy-security-access-to-rights'&gt;http://editors.cis-india.org/news/privacy-security-access-to-rights&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2011-09-22T09:28:56Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/wilton-park-november-17-19-privacy-security-surveillance">
    <title>Privacy, security and surveillance: tackling international dilemmas and dangers in the digital realm</title>
    <link>http://editors.cis-india.org/internet-governance/news/wilton-park-november-17-19-privacy-security-surveillance</link>
    <description>
        &lt;b&gt;Pranesh Prakash was a panelist in the session "Beyond the familiar: how do other countries deal with security and surveillance oversight?" The event was organized by Wilton Park between November 17 and 19, 2014.&lt;/b&gt;
        &lt;p&gt;Complete details of the programme can be &lt;a class="external-link" href="https://www.wiltonpark.org.uk/wp-content/uploads/WP1361-programme.pdf"&gt;accessed here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/wilton-park-november-17-19-privacy-security-surveillance'&gt;http://editors.cis-india.org/internet-governance/news/wilton-park-november-17-19-privacy-security-surveillance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-12-15T12:56:49Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/publications/privacy-draft-discussion">
    <title>Privacy, Draft Discussion</title>
    <link>http://editors.cis-india.org/internet-governance/publications/privacy-draft-discussion</link>
    <description>
        &lt;b&gt;Discussion paper&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/publications/privacy-draft-discussion'&gt;http://editors.cis-india.org/internet-governance/publications/privacy-draft-discussion&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2010-09-10T09:51:11Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/publications/privacy-discussion-paper">
    <title>Privacy, Data-Gathering Technologies Draft Discussion Paper</title>
    <link>http://editors.cis-india.org/internet-governance/publications/privacy-discussion-paper</link>
    <description>
        &lt;b&gt;Discussion paper&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/publications/privacy-discussion-paper'&gt;http://editors.cis-india.org/internet-governance/publications/privacy-discussion-paper&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2010-09-10T09:46:10Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/publications/privacy-data-gathering-technologies">
    <title>Privacy, Data-Gathering Technologies Draft Discussion Paper</title>
    <link>http://editors.cis-india.org/internet-governance/publications/privacy-data-gathering-technologies</link>
    <description>
        &lt;b&gt;Discussion paper&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/publications/privacy-data-gathering-technologies'&gt;http://editors.cis-india.org/internet-governance/publications/privacy-data-gathering-technologies&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2010-09-10T09:42:30Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/publications/privacy-data-agenda">
    <title>Privacy, Data-Gathering Agenda</title>
    <link>http://editors.cis-india.org/internet-governance/publications/privacy-data-agenda</link>
    <description>
        &lt;b&gt;Agenda&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/publications/privacy-data-agenda'&gt;http://editors.cis-india.org/internet-governance/publications/privacy-data-agenda&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2010-09-10T09:39:09Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/events/privacy-by-design">
    <title>Privacy, By Design</title>
    <link>http://editors.cis-india.org/events/privacy-by-design</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society invites people and organizations in the business of 'privacy online' to engage with it in Privacy, By Design — an open space discussion that brings together coders, developers, users and entrepreneurs interested in the design of privacy online.   &lt;/b&gt;
        
&lt;p&gt;&lt;img class="image-left" src="../advocacy/igov/it-act/PrivacybyDesignPoster.jpg/image_preview" alt="Privacy by Design " height="266" width="344" /&gt;Is Privacy something we are born with or is it constructed for us? Different actors like governments, markets, cultural negotiators, are often attributed the responsibility of defining what it means to be 'private'.&amp;nbsp; In our rapidly digitizing world, Internet and digital technologies have emerged as new factors that influence the design of privacy. Ranging from social networking systems to e-governance projects and economic transactions to interpersonal relationships, the design of privacy online has become a central concern.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Privacy, By Design&lt;/em&gt; is a part of The Identity Project (TIP), a collaboration between the Centre for Internet and Society and the Centre for the Study of Culture and Society. It is a research inquiry that hopes to consolidate multiple perspectives, and ideas in an attempt to initiate a dialogue between people who are in the business of designing platforms and applications that pivot around privacy. For instance: How do the platforms we use define our understanding of privacy? What does privacy in the cloud look like? What are the parameters by which privacy is defined within the digital world? What role do digital technologies play in producing the 'privacy effect?'&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/events/privacy-by-design'&gt;http://editors.cis-india.org/events/privacy-by-design&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-12T06:45:36Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/privacy-timeline">
    <title>Privacy Timeline</title>
    <link>http://editors.cis-india.org/internet-governance/blog/privacy-timeline</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/privacy-timeline'&gt;http://editors.cis-india.org/internet-governance/blog/privacy-timeline&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-06-03T09:48:18Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/privacy-timeline.pdf">
    <title>Privacy Timeline</title>
    <link>http://editors.cis-india.org/internet-governance/blog/privacy-timeline.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/privacy-timeline.pdf'&gt;http://editors.cis-india.org/internet-governance/blog/privacy-timeline.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-09-26T10:08:07Z</dc:date>
   <dc:type>File</dc:type>
   </item>




</rdf:RDF>
