<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="http://editors.cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>http://editors.cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1741 to 1755.
        
  </description>
  
  
  
  
  <image rdf:resource="http://editors.cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="http://editors.cis-india.org/events/nullcon-goa-2014-intl-security-conference"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/economic-times-december-30-2013-lison-joseph-mongo-db-startup-hired-by-aadhar-got-funds-from-cia-vc-arm"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/feature-on-telugu-wikipedia"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/events/legal-issues-on-cloud-computing"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/consilience-speakers-profiles.pdf"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/sub-tracks.pdf"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/wikipedia-workshop-iisc"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/events/cpdp-2014-reforming-data-protection-global-perspective"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/technology-in-government-and-topics-in-privacy"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/cyberscholars-working-group-mit"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/3rd-global-congress-ip-and-public-interest-open-air-conference-innovation-and-ip-africa"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/whatever-happened-to-privacy"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/a2k/blogs/sccr.pdf"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/a2k/blogs/cis-comments-to-hrd-on-wipo-treaty.pdf"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/times-of-india-december-5-2013-kim-arora-india-for-un-body-to-resolve-internet-governance-issues"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="http://editors.cis-india.org/events/nullcon-goa-2014-intl-security-conference">
    <title>Nullcon Goa Feb 2014 — International Security Conference</title>
    <link>http://editors.cis-india.org/events/nullcon-goa-2014-intl-security-conference</link>
    <description>
        &lt;b&gt;Nullcon (http://nullcon.net) is celebrating its 5th Anniversary with efforts being made to bring key decision makers, thought leaders with an expectation of 500+ participants from the industry and government sector. Nullcon is scheduled from February 12 to 15, 2014  at Bogmallo Beach Resort, Goa, comprising of 2 days of technical trainings, followed by 2days of talks, workshops, exhibition, networking parties and CTFs.&lt;/b&gt;
        &lt;p&gt;The Centre for Internet and Society (CIS) is &lt;a class="external-link" href="http://nullcon.net/website/goa-14/sponsors-and-partners.php"&gt;one of the sponsors&lt;/a&gt; for this event.&lt;/p&gt;
&lt;h3&gt;The Conference&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The nullcon conference is a unique platform for security companies/evangelists to showcase their research and technology. Nullcon hosts Prototype, Exhibition, Trainings, Free Workshops, null Job Fair at the conference. It is an integrated and structured platform which caters to the needs of IT Security industry at large in a comprehensive way.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;About Nullcon&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Nullcon was founded in 2010 with the idea of providing an integrated platform for exchanging information on the latest attack vectors, zero day vulnerabilities and unknown threats. Our motto - "The neXt security thing!" drives the objective of the conference i.e. to discuss and showcase the future of information security and the next-generation of offensive and defensive security technology. The idea started as a gathering for researchers and organizations to brain storm and demonstrate why the current technology is not sufficient and what should be the focus for the coming years pertaining to information security. In addition to security, one of the section of the conference called Desi Jugaad (Hindi for "Local Hack") is dedicated to hacking where we invite researchers who come up with innovative security/tech/non-tech solutions for solving real life challenges or taking up new initiatives.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nullcon is managed and marketed by Payatu Technologies. The idea of nullcon emerged out of null - The open security community, a registered not-for-profit society and the largest active security community in India with over 8 chapters in major cities - Bangalore, Mumbai, Chennai, Pune, Hyderabad, Mysore, Trivandrum and Delhi. As a tribute to the community nullcon funds null to further null's cause and supports all of its initiatives. If you are interested in knowing how null can help your organization and would like to contribute to null, please get in touch with null team at &lt;a href="mailto:info@null.co.in"&gt;info@null.co.in&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Dates&lt;/b&gt;:&lt;br /&gt;Training: February 12 - 13, 2014&lt;br /&gt;Conference: February 14-15, 2014&lt;b&gt;&lt;br /&gt;Registation:&lt;/b&gt; &lt;span&gt;&lt;a href="http://nullcon.net/website/register.php" target="_blank"&gt;http://nullcon.net/website/register.php&lt;/a&gt;&lt;/span&gt;&lt;b&gt;&lt;span&gt;&lt;/span&gt;&lt;/b&gt;&lt;b&gt;&lt;br /&gt;Keynotes&lt;/b&gt;:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Jeff Moss, VP &amp;amp; CSO - ICANN, Founder - Defcon/Blackhat&lt;/li&gt;
&lt;li&gt;Dr. Kiran Bedi, Ex-IPS (Police)&lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/events/nullcon-goa-2014-intl-security-conference'&gt;http://editors.cis-india.org/events/nullcon-goa-2014-intl-security-conference&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-12-13T06:42:48Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/economic-times-december-30-2013-lison-joseph-mongo-db-startup-hired-by-aadhar-got-funds-from-cia-vc-arm">
    <title>MongoDB startup hired by Aadhaar got funds from CIA VC arm</title>
    <link>http://editors.cis-india.org/news/economic-times-december-30-2013-lison-joseph-mongo-db-startup-hired-by-aadhar-got-funds-from-cia-vc-arm</link>
    <description>
        &lt;b&gt;Two weeks ago, Max Schireson, chief executive of MongoDB, a New York-based technology startup, was in New Delhi to sew up a very important contract for his company — with the Unique Identification Authority of India (UIDAI).&lt;/b&gt;
        &lt;p&gt;The article by Lison Joseph was &lt;a class="external-link" href="http://articles.economictimes.indiatimes.com/2013-12-03/news/44710564_1_uidai-chairman-nandan-nilekani-uid-data-in-q-tel"&gt;published in the Economic Times&lt;/a&gt; on December 3, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The contract is yet to be announced but what could raise eyebrows is the fact that &lt;a href="http://economictimes.indiatimes.com/topic/MongoDB"&gt;MongoDB&lt;/a&gt; is part-funded by the US' &lt;a href="http://economictimes.indiatimes.com/topic/Central%20Intelligence%20Agency"&gt;Central Intelligence Agency&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The company is expected to help in capturing and analysing data related to the ambitious plan to issue a unique identity number — Aadhaar — to over a billion citizens.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;MongoDB, which makes software that helps manage large databases, especially unstructured data, has raised $231 million (Rs1,400 crore) since being founded in 2007. Some of its funding is from In-Q-Tel, the not-for-profit venture capital arm of CIA.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While MongoDB lists In-Q-Tel as one of its investors on its website, the company has not disclosed the quantum of funding received from it. The fund's stated mission is to identify, adapt and deliver innovative technology solutions to support the missions of CIA and the broader US intelligence community.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Besides CIA, In-Q-Tel works with National Geospatial-Intelligence Agency, Defense Intelligence Agency and Department of Homeland Security Science and Technology Directorate.&lt;/p&gt;
&lt;table class="plain" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="http://editors.cis-india.org/home-images/copy_of_crunchingdata.png" alt="crunching data" class="image-inline" title="crunching data" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;"Once an investment is made, IQT (the fund) works with the company and the intelligence community partner agency to complete a work program and facilitate solution delivery," the fund's website said. The quote describes IQT's relationship with any company in which it invests in and is not specific to MongoDB.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Neither &lt;a href="http://economictimes.indiatimes.com/topic/UIDAI"&gt;UIDAI&lt;/a&gt; nor MongoDB responded to queries from ET on whether the CIA link was considered before entering into a partnership. UIDAI Chairman &lt;a href="http://economictimes.indiatimes.com/topic/Nandan%20Nilekani"&gt;Nandan Nilekani&lt;/a&gt; did not respond to emails, messages and phone calls.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A senior UIDAI official confirmed the agency has entered into an agreement with MongoDB and that the company's database software is already being used for analysing the pace at which registration of new beneficiaries is taking place.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is not clear if MongoDB's vendor relationship would be with UID directly or with one of the system integrators that UID works with. Schireson, the CEO, was also one of the national co-chairs for Technology for Obama, an interest group that campaigned for the reelection of President &lt;a href="http://economictimes.indiatimes.com/topic/Barack%20Obama"&gt;Barack Obama&lt;/a&gt; after his first term.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is no evidence in the public domain that the firm is controlled or significantly influenced by the CIA in any manner.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But the revelations of &lt;a href="http://economictimes.indiatimes.com/topic/Edward%20Snowden"&gt;Edward Snowden&lt;/a&gt;, a former NSA contractor-turned-whistleblower that US intelligence agencies routinely intercepted communication in Europe and Asia, including in India has raised concerns. Experts said the UID's centralised design could pose a risk, where even a single mistake can make the whole system disproportionately vulnerable.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The risk exposure because of CIA involvement (could be that) if MongoDB is a data controller, then secret courts and secret court orders could be used to get access to the UID data," said Sunil Abraham, executive director at the Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He added that even if UIDAI is only using the source code without getting into a commercial relationship with MongoDB, they should audit the source code to check if CIA has introduced any back doors. "This is because Snowden has told us that the army of mathematicians working for the US government has compromised some standards even though they were developed in an open, participatory and transparent fashion." MongoDB, whose name is a play on the word humongous, competes with Oracle, IBM and Microsoft. It has around 320 employees and some 600 customers. At its latest round of $150 million in fund-raising in October, the company was valued at about $1.2 billion, according to Bloomberg. Other investors include Intel Capital, Salesforce-.com, Red Hat and Sequoia.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/economic-times-december-30-2013-lison-joseph-mongo-db-startup-hired-by-aadhar-got-funds-from-cia-vc-arm'&gt;http://editors.cis-india.org/news/economic-times-december-30-2013-lison-joseph-mongo-db-startup-hired-by-aadhar-got-funds-from-cia-vc-arm&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-12-13T11:53:32Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/feature-on-telugu-wikipedia">
    <title>A Feature on Telugu Wikipedia</title>
    <link>http://editors.cis-india.org/news/feature-on-telugu-wikipedia</link>
    <description>
        &lt;b&gt;Namaste Telangana newspaper has done a Sunday magazine feature on Telugu Wikipedia on the occasion of the 10th anniversary.&lt;/b&gt;
        &lt;p&gt;&lt;a href="http://editors.cis-india.org/openness/blog-old/telangana.pdf" class="internal-link"&gt;Click to download the file&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/feature-on-telugu-wikipedia'&gt;http://editors.cis-india.org/news/feature-on-telugu-wikipedia&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Wikimedia</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Telugu Wikipedia</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2013-12-30T06:01:59Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/events/legal-issues-on-cloud-computing">
    <title>Legal Issues pertaining to Cloud Computing</title>
    <link>http://editors.cis-india.org/events/legal-issues-on-cloud-computing</link>
    <description>
        &lt;b&gt;The Law and Technology Society of National Law School of India University, Bangalore is organizing the 6th edition of its flagship conference ‘Consilience’ on December 14 and 15, 2013 at NLSIU Campus, Bangalore. The Centre for Internet and Society is supporting this event.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The Conference will see some of the best lawyers, jurists and industry leaders in India speak on different issues surrounding the theme. The Conference is co- branded with ‘&lt;a class="external-link" href="https://www.salesforce.com/crm/what-is-crm/"&gt;Salesforce.com&lt;/a&gt;’, ‘International Technology Law Association’ and the Centre for Internet and Society &lt;span&gt; (&lt;a href="http://www.cis-india.org/"&gt;http://www.cis-india.org/&lt;/a&gt;). Apart  from making an effective contribution towards greater understanding of  the subject, the Conference will lead to a recommendatory policy paper  to the government of India.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Key speakers for the Conference include: &lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;Senapathy (Kris)  Gopalakrishnan (Co-Founder and Executive Vice Chairman, Infosys &amp;amp; President, CII )&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Pavan Duggal (Advocate, Supreme Court)&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Abhishek Malhotra (Founding Partner, TMT Law Practice)&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Azmul Haque (Partner, Shook Lin &amp;amp; Bok, Singapore)&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Chris Edwards (Senior Associate, DLA Piper, Singapore)&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Prof. Rahul De (IIM Bangalore)&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Pamela Kumar (Chair, Cloud Computing Innovation Council of India) &lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Suhaan Mukherji (Expert advisor, Office of Adviser to the Prime Minister of India on Public Information Infrastructure and Innovations)&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Registrations for the Conference are open and fee for the same is as follows:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Students: Rs. 500/-&lt;/li&gt;
&lt;li&gt;Professionals: Rs. 750/-&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Please find attached the concept note, programme schedule and speakers’ profiles. &lt;span&gt;To register, visit &lt;a href="http://www.consilience.co.in/index.php/consilience-2013/register-for-the-conference"&gt;http://www.consilience.co.in/index.php/consilience-2013/register-for-the-conference&lt;/a&gt;. &lt;span&gt;For any other queries, please write to &lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;a href="mailto:ltech.nls@gmail.com"&gt;ltech.nls@gmail.com&lt;/a&gt; .&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;or contact&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Shivam Singla (Ph: +91-9916708701)&lt;/li&gt;
&lt;li&gt;Ayushi Sutaria (Ph: +91-8123925725)&lt;/li&gt;
&lt;/ol&gt; 
&lt;hr /&gt;
&lt;h3&gt;Conference Programme&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Saturday, December 14th, 2013&lt;/strong&gt;&lt;br /&gt;Venue: Conference Hall, Academic Block, NLSIU&lt;/p&gt;
&lt;table class="listing vertical"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;08.30&lt;br /&gt;09.30&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Breakfast and Registration&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;09.45&lt;br /&gt;10.00&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Inauguration&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10.00&lt;br /&gt;10.30&lt;/td&gt;
&lt;td&gt;Keynote Address&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10.30&lt;br /&gt;12.30&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;SESSION 1: INTRODUCTION TO CLOUD COMPUTING&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;How does cloud computing work? - An overview of the basic technical features &lt;/li&gt;
&lt;li&gt;The current legal regime related to cloud computing in India- Main issues and challenges&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th colspan="2" style="text-align: justify; "&gt;Lunch&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13.15&lt;br /&gt;15.15&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;SESSION 2: THE RELATION BETWEEN PARTIES TO CLOUD COMPUTING- USERS, INTERMEDIARIES &lt;br /&gt;AND GOVERNMENT BODIES&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Legal obligations of the intermediaries towards (i) the government and (ii) the users&lt;/li&gt;
&lt;li&gt;Cyber security concerns&lt;/li&gt;
&lt;li&gt;Standards of data protection&lt;/li&gt;
&lt;li&gt;Government's surveillance powers and privacy issues&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th colspan="2" style="text-align: justify; "&gt;Tea Break&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15.30&lt;br /&gt;17.30&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;SESSION 3: REGULATION AND MONITORING OF DATA CONTENT&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Current data control monitoring systems by intermediaries&lt;/li&gt;
&lt;li&gt;Data ownership and intellectual property issues- Possible threats and need for regulation&lt;/li&gt;
&lt;li&gt;Sensitive or critical data- Security concerns relating to their storage&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th colspan="2" style="text-align: justify; "&gt;High Tea/Networking Session&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;strong&gt;Sunday, December 15th, 2013&lt;/strong&gt;&lt;br /&gt;Venue: Conference Hall, Academic Block, NLSIU&lt;/p&gt;
&lt;table class="vertical listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;09.00&lt;br /&gt;10.00&lt;/td&gt;
&lt;td&gt;Breakfast and Registration&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10.00&lt;br /&gt;12.00&lt;/td&gt;
&lt;td&gt;SESSION 4: THE INTERNATIONAL PERSPECTIVE ON CLOUD COMPUTING&lt;br /&gt; 
&lt;ul&gt;
&lt;li&gt;Jurisdiction and choice of law issues- how do we counter the confusion?&lt;/li&gt;
&lt;li&gt;International laws applicable to cloud computing&lt;/li&gt;
&lt;li&gt;Need for a comprehensive international framework to simplify the situation?&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th colspan="2" style="text-align: justify; "&gt;Tea Break&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12.15&lt;br /&gt;14.15&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;SESSION 5: COMPARATIVE ANALYSIS WITH LEGAL FRAMEWORKS IN OTHER COUNTRIES&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Legal frameworks in UK and Singapore &lt;/li&gt;
&lt;li&gt;Beneficial features of these legal regimes and their suitability in the Indian context &lt;/li&gt;
&lt;li&gt;Lessons to be learnt for India&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th colspan="2" style="text-align: justify; "&gt;Lunch&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15.00&lt;br /&gt;17.00&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;SESSION 6: THE WAY FORWARD – SUGGESTIONS AND RECOMMENDATIONS&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Overview of the important challenges and suggestions&lt;/li&gt;
&lt;li&gt;Possible Policy and Legislative steps to improve the Cloud Computing regime in India&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th colspan="2" style="text-align: justify; "&gt;High Tea/Networking Session&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;ol&gt;
&lt;li&gt;Click to read the &lt;a href="http://editors.cis-india.org/internet-governance/blog/sub-tracks.pdf" class="internal-link"&gt;sub tracks&lt;/a&gt; for discussion&lt;/li&gt;
&lt;li&gt;Access the &lt;a href="http://editors.cis-india.org/internet-governance/blog/consilience-speakers-profiles.pdf" class="internal-link"&gt;speakers' profiles here&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/events/legal-issues-on-cloud-computing'&gt;http://editors.cis-india.org/events/legal-issues-on-cloud-computing&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2022-02-07T15:29:00Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/consilience-speakers-profiles.pdf">
    <title>Consilience Speakers Profile</title>
    <link>http://editors.cis-india.org/internet-governance/blog/consilience-speakers-profiles.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/consilience-speakers-profiles.pdf'&gt;http://editors.cis-india.org/internet-governance/blog/consilience-speakers-profiles.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-12-11T10:11:10Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/sub-tracks.pdf">
    <title>Sub Tracks</title>
    <link>http://editors.cis-india.org/internet-governance/blog/sub-tracks.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/sub-tracks.pdf'&gt;http://editors.cis-india.org/internet-governance/blog/sub-tracks.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-12-11T10:08:35Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/wikipedia-workshop-iisc">
    <title>A Wikipedia Workshop at IISC</title>
    <link>http://editors.cis-india.org/news/wikipedia-workshop-iisc</link>
    <description>
        &lt;b&gt;Along with Wikipedian Shiju Alex we supported the Assamese Wikipedians to organize a workshop at IISC. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Assamese Wikipedian Gitartha Bordoloi took a session explaining about Wikipedia. Almost 13 scholars from Assam who are currently researching at IISC took part in this workshop. This also opened a new avenue for us to start an Assamese Wiki community in Bangalore.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Click to &lt;a href="http://editors.cis-india.org/openness/blog-old/assamese-wikipedia-iisc.pdf" class="internal-link"&gt;download&lt;/a&gt; the original published by Amarasom Gl Publications. The link to the original is &lt;a class="external-link" href="http://amarasom.glpublications.in/Details.aspx?id=15925&amp;amp;boxid=123232281"&gt;here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/wikipedia-workshop-iisc'&gt;http://editors.cis-india.org/news/wikipedia-workshop-iisc&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Wikimedia</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2013-12-31T03:38:30Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/events/cpdp-2014-reforming-data-protection-global-perspective">
    <title>CPDP 2014 Reforming Data Protection: The Global Perspective</title>
    <link>http://editors.cis-india.org/events/cpdp-2014-reforming-data-protection-global-perspective</link>
    <description>
        &lt;b&gt;Already in its 7th edition, the annual Computer Privacy and Data Protection conference (organised by CPDP) is being held in Brussels from January 22 to 24, 2014. Malavika Jayaram will be speaking at this event.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;The Centre for Internet and Society is &lt;a class="external-link" href="http://www.cpdpconferences.org/wednesday22january2014.html"&gt;one of the sponsors&lt;/a&gt; for this event. Click &lt;a class="external-link" href="http://www.cpdpconferences.org/wednesday22january2014.html"&gt;here&lt;/a&gt; to read the full programme.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;CPDP is a &lt;b&gt;non-profit platform&lt;/b&gt; originally founded in 2007 by research groups from the Vrije Universiteit Brussel, the Université de Namur and Tilburg University, which has now grown significantly and incorporates a consortium of 21 conference partners.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CPDP offers the &lt;b&gt;cutting edge in legal, regulatory, academic and technological development in privacy and data protection&lt;/b&gt;. In an atmosphere of independence and mutual respect, CPDP gathers academics, lawyers, practitioners, policy-makers, computer scientists and civil society from all over the world to exchange ideas and discuss the latest emerging issues and trends. This unique multidisciplinary formula has served to make CPDP &lt;b&gt;one of the leading data protection and privacy conferences in Europe and around the world&lt;/b&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CPDP2014 has become &lt;b&gt;truly global&lt;/b&gt;: it is co-organized by conference partners from Europe and the United States, and devotes panels to Latin-America and India. Moreover, CPDP is reaching out to the Asia-Pacific with speakers coming from all over the region.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The progressive growth of CPDP will culminate in an unprecedented 7&lt;sup&gt;th&lt;/sup&gt; edition. A terrific programme will include &lt;b&gt;more than 60 panels&lt;/b&gt; held over three consecutive days. The panels will focus on key issues that cover &lt;b&gt;all current debates&lt;/b&gt;: The data protection reform in the European Union, PRISM, big data, cybercrime, data retention, cloud computing, enforcement by Data Protection Authorities, biometrics, e-health, privacy by design, and much, much more. In addition, there will be a day event on the ethical issues of data collection on minorities, and the use of technology to advance the status of Roma.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CPDP will offer valuable contributions from the &lt;b&gt;leading names in the field&lt;/b&gt;, including key &lt;b&gt;representatives from all the major European institutions&lt;/b&gt; - the European Commission, the European Parliament, the European Data Protection Supervisor, and the Council of Europe.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition to the well-known classic &lt;b&gt;Pecha Kucha&lt;/b&gt; side event, there will be several &lt;b&gt;public debates&lt;/b&gt; held in the evenings – both in Dutch and English.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CDP2014 will continue to pay particular attention to &lt;b&gt;high-level and innovative research from PhD Students and outstanding junior researchers &lt;/b&gt;by organizing sessions completely devoted to their work. CPDP2014 will also remain home to several &lt;b&gt;award ceremonies,&lt;/b&gt; such as the award for the best Multidisciplinary Privacy Paper and the EPIC International Champion of Freedom Award.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Whether you are involved in the Conference as a sponsor, supporter, partner or participant or not, CPDP2014 welcomes you to join the event and contribute to the debate on emerging privacy and data protection issues.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For up to date information, registration and the programme, please visit &lt;a href="http://www.cpdpconferences.org/"&gt;http://www.cpdpconferences.org/&lt;/a&gt; and follow CPDP on Facebook (cpdpconferences) and Twitter (@cpdpconferences).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If you have any questions please contact: &lt;a href="mailto:info@cpdpconferences.org"&gt;info@cpdpconferences.org&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/events/cpdp-2014-reforming-data-protection-global-perspective'&gt;http://editors.cis-india.org/events/cpdp-2014-reforming-data-protection-global-perspective&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-12-11T03:39:50Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/technology-in-government-and-topics-in-privacy">
    <title>Technology in Government and Topics in Privacy</title>
    <link>http://editors.cis-india.org/news/technology-in-government-and-topics-in-privacy</link>
    <description>
        &lt;b&gt;Malavika Jayaram is a speaker at an event organized by Data Privacy Lab at CGIS Cafe, Cambridge Street, Harvard University Campus. She will speak on Biometrics in Beta – India's Identity Experiment on December 9, 2013.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Technology in Government (TIG) and Topics in Privacy (TIP) consist of weekly discussions and brainstorming sessions on all aspects of privacy (TIP) and uses of technology to assess and solve societal, political, and government problems (TIG). Discussions are often inspired by a real-world problems being faced by the lead discussant, who may be from industry, government, or academia. Practice talks and presentations on specific techniques and topics are also common.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Abstract of the Talk&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;India's identity juggernaut - the Unique Identity (UID) project that has registered around 450 million people and is yet to be fully realized - is already the world's largest biometrics identity scheme. Based on the premise that centralized de-duplication and authentication will establish uniqueness and eliminate fraud, it is hailed as a game changer and a silver bullet that will solve myriad problems and improve welfare delivery, yet its conception and architecture raise significant concerns. In addition to the UID project, there is a slew of "Big Brother" systems that together form a matrix of identity and surveillance schemes: the UID is intended as a common identifier across this matrix as well as other public and private databases. Indian authorities frame Big Data as a panacea for fraud, corruption and abuse, without apprehending the further fraud, corruption and abuse that joined up databases can themselves engender. The creation of a privacy-invading technology layer not simply as a barrier to online participation but to social participation writ large is not fully appreciated by policy makers. Malavika will provide an overview of the identity landscape including the implications for privacy and free speech, and more broadly, democracy and openness.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Malavika Jayaram&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Malavika is a Fellow at the Berkman Center for Internet and Society at Harvard, focusing on privacy, identity and free expression, especially in the context of India's biometric ID project. A Fellow at the Centre for Internet and Society, Bangalore, she is the author of the India chapter for the Data Protection &amp;amp; Privacy volume in the Getting the Deal Done series. She is one of 10 Indian lawyers in The International Who's Who of Internet e-Commerce &amp;amp; Data Protection Lawyers directory. In August 2013, she was voted one of India's leading lawyers - one of only 8 women to be featured in the "40 under 45" survey conducted by Law Business Research, London. In a different life, she spent 8 years in London, practicing law with global law firm Allen &amp;amp; Overy in the Communications, Media &amp;amp; Technology group, and as VP and Technology Counsel at Citigroup. During 2012-2013, She was a Visiting Scholar at the Annenberg School for Communication, University of Pennsylvania.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Click to read more on the event originally &lt;a class="external-link" href="http://dataprivacylab.org/TIP/index.html#talk10"&gt;published by Data Privacy Lab here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/technology-in-government-and-topics-in-privacy'&gt;http://editors.cis-india.org/news/technology-in-government-and-topics-in-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-12-27T10:20:33Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/cyberscholars-working-group-mit">
    <title>Cyberscholars Working Group at MIT</title>
    <link>http://editors.cis-india.org/news/cyberscholars-working-group-mit</link>
    <description>
        &lt;b&gt;Malavika Jayaram is giving a talk on Biometrics or Bust - India’s Identity Crisis at this event organised by Berkman Center for Internet &amp; Society on December 12 at 6.00 p.m.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Read the original &lt;a class="external-link" href="https://cyber.law.harvard.edu/events/cyberscholars/12/mit"&gt;published by Harvard University here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Cyberscholar Working Group is a forum for fellows and affiliates of MIT, Yale Law School Information Society Project, Columbia University, and the Berkman Center for Internet &amp;amp; Society at Harvard University to discuss their ongoing research. Each session is focused on the peer review and discussion of current projects submitted by a presenter. Meeting alternatively at Harvard, MIT, Yale, the working group aims to expand the shared knowledge of young scholars by bringing together these preeminent centers of thought on issues confronting the information age. Discussion sessions are designed to facilitate advancements in the individual research of presenters and in turn encourage exposure among the participants to the multi-disciplinary features of the issues addressed by their own work.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This month's presentations include:&lt;br /&gt; &lt;b&gt;(1) "Lines of Control: Networks of Imperialism and Independence in India (1840-1947)"&lt;/b&gt;&lt;br /&gt;Abstract: This paper examines the history of communications networks in India and the relationship between communications and second-order networks. It draws attention to the wave of colonial network development that took place in India between 1840 and 1948. During these years, Britain constructed a series shipping, rail and telegraph networks to achieve a set of military and commercial goals. This paper studies how first- and second-order networks developed, and the intended and unintended effects of these networks on Indiaʼs economics, politics, and identity. The paper draws on economic and social studies of colonial communications networks in India, original reports by British officials and the Colonial Office, and the literature focusing on the role of technology in British imperialism. It shows how Indiaʼs colonial communication networks, built to augment and extend British control over the subcontinent, became conduits for Indian resistance and nationalism.&lt;br /&gt;Keywords: shipping, telegraph, railroads, imperialism, nationalism, network theory, India&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Colin Agur &lt;/b&gt;is a PhD candidate at Columbia University and Visiting Fellow at Yale Law School's Information Society Project. His research examines India's telecommunications, focusing on mobile network formation and second-order effects of network growth. He spent the 2012-13 academic year in Delhi and Chennai, conducting document analysis, interviews with industry figures and participant observation related to mobile phone usage. He has published articles about Indian media and culture in Harvard's Nieman Lab, the Journal of Asian and African Studies and Journalism (forthcoming), and about telecommunications history in Information and Culture.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;(2) Big Data Dramas in the 1960s and 1970s&lt;/b&gt;&lt;br /&gt;Abstract: The recent frenzy in discussing NSA activities and the collecting of Big Data show a widespread critical concern for the current practice of gathering and using personal data. These concerns have their history. In my presentation, I track the beginnings of a growing public awareness and sensitivity towards the societal handling of personal data. I argue that the early computerization phase during the 1960s and 1970s played a crucial role in discussing these issues. Media reports, popular books, scientific publications, and political hearings all of a sudden began – often in quite different ways – to address and question contemporary practices of collecting, sharing, and storing of personal data. Their authors explored and negotiated all kind of societal settings where personal data played a significant role at that time. There have been concerns about these issues with personal data before, but – as I will show in my presentation – not on this broad societal level and to this extent as in the late 1960s and early 1970s. I argue that during that time, the usage of personal data became a highly controversial matter not only of public, but also of private interest.My inquiry examines how the term “data“ and in particular the collection of personal data became loaded with cultural and emotional significance in scientific and media discussions in the 1960s and 1970s in the United States and in Germany. Furthermore, it explores how the early computerization affected our societal handling of data long before the personal computer entered our private lives.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Julia Fleischhack&lt;/b&gt; is a visiting postdoctoral research fellow in the program in Science, Technology, and Society at the Massachusetts Institute of Technology. She holds a PhD in anthropology from Zürich University. Her current research is on data centers from the private sector and funded by the Fritz Thyssen foundation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;(3) Biometrics or Bust - India’s Identity Crisis&lt;/b&gt;&lt;br /&gt;Abstract: India's identity juggernaut - the Unique Identity (UID) project that has registered around 500 million people and is yet to be fully realized - is already the world's largest ever biometrics identity scheme. Grounded in the premise that centralized de-duplication and authentication will uniquely identify people and eliminate fraud, it is hailed as a game changer and a silver bullet that will solve myriad socio-economic problems, yet its conception and architecture raise significant concerns. Its implementation as a techno-utopian project in a legal vacuum, despite the potential for abuse and exclusion, give pause to the much-vaunted claims of transforming welfare delivery and galvanizing financial inclusion. I will provide an overview of the identity project and highlight some of the key implications for privacy and free speech, and more broadly, democracy and openness. I will also unpack some of the narratives being constructed, describe the current public discourse and legal developments, and locate the project within the broader surveillance state and database nation that India is morphing into.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Malavika Jayaram&lt;/b&gt; is a Fellow at the Berkman Center for Internet and Society at Harvard, focusing on privacy, identity and free expression. A Fellow at the Centre for Internet and Society, Bangalore, she is one of 10 Indian lawyers in The International Who's Who of Internet e-Commerce &amp;amp; Data Protection directory. In August 2013, she was voted one of India's leading lawyers - one of only 8 women to be featured in the "40 under 45" survey conducted by Law Business Research, London.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/cyberscholars-working-group-mit'&gt;http://editors.cis-india.org/news/cyberscholars-working-group-mit&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-01-09T06:41:31Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/3rd-global-congress-ip-and-public-interest-open-air-conference-innovation-and-ip-africa">
    <title>3rd Global Congress on IP and the Public Interest &amp; Open A.I.R. Conference on Innovation and IP in Africa </title>
    <link>http://editors.cis-india.org/news/3rd-global-congress-ip-and-public-interest-open-air-conference-innovation-and-ip-africa</link>
    <description>
        &lt;b&gt;From 9 to 13 December 2013, delegates from national and international governmental governmental entities, the private sector, civil society, and academia gathered for five days of interconnected events in Cape Town. &lt;/b&gt;
        &lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham participated as a speaker in the sessions on Bridging into  the Global Congress: Global Issues, Local Answers?, &lt;a class="external-link" href="http://www.openair.org.za/content/user-rights"&gt;User Rights Track: What Medicines Can Teach Tech: Exploring Patent Pooling and Compulsory Licensing in the Indian Mobile Device Market&lt;/a&gt;, &lt;a class="external-link" href="http://www.openair.org.za/content/user-rights"&gt;User Rights Track: Reclaiming the World Trade Organisation: A Modest Proposal for a WTO Agreement on the Supply of Global Public Goods&lt;/a&gt;, and was a keynote speaker on &lt;a href="http://editors.cis-india.org/a2k/blog/freedom-continuum.pdf" class="external-link"&gt;The Freedom Continuum&lt;/a&gt;. Nehaa  Chaudhari also participated in this event. Click to read more about the event published on the website of open A.I.R. &lt;a class="external-link" href="http://www.openair.org.za/content/3rd-global-congress-ip-and-public-interest-open-air-conference-innovation-and-ip-africa"&gt;here&lt;/a&gt;.  The full programme can be seen &lt;a href="http://editors.cis-india.org/a2k/blogs/3rd-global-congress-ip-and-public-interest-open-air-conference-innovation-and-ip-africa.pdf" class="internal-link"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Participants will engage with diverse perspectives and future scenarios for intellectual property (IP), innovation and development during the combined  3rd Global Congress on IP and the Public Interest and Open A.I.R. Conference on Innovation and IP in Africa.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The event is now fully subscribed&lt;/b&gt;, with only  registrations invited by Congress &amp;amp; Conference organisers being  accpted. For further details, please visit this website's &lt;a href="http://www.openair.org.za/capetown2013"&gt;Cape Town 2013&lt;/a&gt; page.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The &lt;a href="http://www.uct.ac.za/" target="_blank"&gt;University of Cape Town (UCT)&lt;/a&gt; Faculty of Law's &lt;a href="http://uctipunit.wordpress.com/" target="_blank"&gt;IP Unit &lt;/a&gt;is serving as host of the Congress &amp;amp; Conference. Implementating partners include the &lt;a href="http://www.aucegypt.edu/Business/A2K4D/Pages/default.aspx" target="_blank"&gt;Access to Knowledge for&lt;/a&gt;&lt;a href="http://www.aucegypt.edu/Business/A2K4D/Pages/default.aspx" target="_blank"&gt; Development Center (A2K4D)&lt;/a&gt; at The American University in Cairo, the &lt;a href="http://nials-nigeria.org/" target="_blank"&gt;Nigerian Institute of Advanced Legal Studies (NIALS)&lt;/a&gt; at the University of Lagos, the&lt;a href="http://cipitlawstrath.wordpress.com" target="_blank"&gt; Centre for IP and IT Law (CIPIT) &lt;/a&gt;at Srathmore University in Nairobi, the &lt;a href="http://www.commonlaw.uottawa.ca/index.php"&gt;Faculty of Law &lt;/a&gt;at the University of Ottawa and the &lt;a href="http://www.wcl.american.edu/pijip/" target="_blank"&gt;Program on Information Justice and Intellectual Property &lt;br /&gt;&lt;/a&gt;at American University in Washington, DC.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Congress and Conference funding is being provided by Canada’s &lt;a href="http://www.idrc.ca/EN/Pages/default.aspx" target="_blank"&gt;International Development Research Centre (IDRC)&lt;/a&gt;, Germany’s &lt;a href="http://www.bmz.de/en/index.html" target="_blank"&gt;Federal Ministry for Economic Cooperation and Development (BMZ)&lt;/a&gt; and the &lt;a href="http://www.opensocietyfoundations.org" target="_blank"&gt;Open Society Foundations&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Date: Monday, 9 December, 2013 to Friday, 13 December, 2013&lt;br /&gt;Place: Cape Town&lt;br /&gt;Type of Event: Conference&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham provided a hilarious talk on The Freedom Continuum. An example: “Freedom is like the Kama Sutra – there are many positions one can take.” Mr. Abraham also brilliantly suggested a method for plausible deniability in the world of biometric identification and oppressive government oversight. By posting all of my biometric information (fingerprints, eye scans, etc.) on the internet, I can plausibly deny any crimes or contracts or tracking by the government because, well, it’s all online so it couldn’t have been me, right? So we should (paradoxically) fight incursion into data privacy simply by releasing all biometric data about ourselves.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Also quite amusing was the comparison of the IP debate to Tom and Jerry, that iconic Cat (Kat?) and Mouse duo who are perpetually chasing one another. Tom the Cat represents Big Business, corporate interests, the USTR, etc. Tom is chasing (but can never quite catch) Jerry the Mouse, who represents civil society, human rights activists, the open source movement, etc. An audience member pointedly observed that Jerry typically runs around for a bit and then disappears into a hole in the wall, where he stays for some time before emerging to torture Tom again. The obvious point is that activists (i.e., the audience at the Global Congress) will never make substantial progress until they stop disappearing for long periods of time and start acting more like a cat (or even, perhaps, like a dog).&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/3rd-global-congress-ip-and-public-interest-open-air-conference-innovation-and-ip-africa'&gt;http://editors.cis-india.org/news/3rd-global-congress-ip-and-public-interest-open-air-conference-innovation-and-ip-africa&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2014-01-05T02:52:03Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/whatever-happened-to-privacy">
    <title>"Whatever happened to Privacy?" - International Activism Conference</title>
    <link>http://editors.cis-india.org/news/whatever-happened-to-privacy</link>
    <description>
        &lt;b&gt;Maria Xynou gave a keynote speech and participated as a panelist on the "Suspect Societies" panel. The event was organized by Heinrich Boell Foundation in Berlin on December 5 and 6, 2013.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;"Whatever happened to privacy" brought together international activists on focal topics and combined bar camp style work sessions and political round tables with a classic public event, It focussed on an issue which has far reaching consequences for politically active people across the world - the issue of privacy and surveillance. The revelations around the NSA and GCHQ as well as other countries secret service digital surveillance activities have spurred political debate. This debate was intensified at "Whatever happened to Privacy?" formulating political demands, developing action strategies and debating questions such as:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;What cultural and political value does privacy have today?&lt;/li&gt;
&lt;li&gt;What are the societal implications of the wide spread "I have nothing to hide" attitude?&lt;/li&gt;
&lt;li&gt;What political actions are necessary to protect citizens from mass surveillance and what tools exist for people to secure their communications, movements and lives?&lt;/li&gt;
&lt;/ol&gt; 
&lt;hr /&gt;
&lt;p&gt;For video and more info, &lt;a class="external-link" href="http://www.boell.de/en/whatever-happened-privacy"&gt;click here&lt;/a&gt;&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/whatever-happened-to-privacy'&gt;http://editors.cis-india.org/news/whatever-happened-to-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-02-03T05:56:27Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/a2k/blogs/sccr.pdf">
    <title>SCCR Working Document</title>
    <link>http://editors.cis-india.org/a2k/blogs/sccr.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/a2k/blogs/sccr.pdf'&gt;http://editors.cis-india.org/a2k/blogs/sccr.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-12-07T07:55:27Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/a2k/blogs/cis-comments-to-hrd-on-wipo-treaty.pdf">
    <title>CIS Comments to HRD Ministry on WIPO Treaty</title>
    <link>http://editors.cis-india.org/a2k/blogs/cis-comments-to-hrd-on-wipo-treaty.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/a2k/blogs/cis-comments-to-hrd-on-wipo-treaty.pdf'&gt;http://editors.cis-india.org/a2k/blogs/cis-comments-to-hrd-on-wipo-treaty.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-12-07T04:43:08Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/times-of-india-december-5-2013-kim-arora-india-for-un-body-to-resolve-internet-governance-issues">
    <title>India for UN body to resolve internet governance issues</title>
    <link>http://editors.cis-india.org/news/times-of-india-december-5-2013-kim-arora-india-for-un-body-to-resolve-internet-governance-issues</link>
    <description>
        &lt;b&gt;Multi-stakeholder or multi-lateral - two words encapsulating diametrically opposite views on internet governance stands at the heart of a raging debate across the globe.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article by Kim Arora was &lt;a class="external-link" href="http://articles.timesofindia.indiatimes.com/2013-12-05/internet/44806628_1_critical-internet-resources-enhanced-cooperation-internet-governance-issues"&gt;published in the Times of India&lt;/a&gt; on December 5, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;At the Working Group on Enhanced Cooperation (WGEC) meeting in Geneva last month, India suggested forming a multi-lateral UN body to co-ordinate on internet governance issues. And several activists feel that is not the right way forward.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Multi-stakeholder control over the world wide web means parties other than governments, which include the tech community, academia, businesses and civil society. In a multi-lateral arrangement, only the governments will be the decision-makers and every other stakeholder barring the state, is relegated to a purely advisory role. Simply put, the choice is between total state control over the internet or a more democratic set-up where other sections of society are also represented.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Civil society and businesses are concerned that being relegated to an advisory role rather than a decision-making one could lead to disregarding or dumping their inputs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Everyone must have a seat at the table," says Rajan Mathews, director general of the Cellular Operators Association of India (COAI). "If you are designing a new model, it is important that it is as inclusive as possible. That will create better decisions. It will also discourage back-door bargaining between governments," says Anja Kovacs of the Internet Democracy Project.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The internet architecture has always been controlled by the US. The demand for a more democratised set-up, where other countries also have a voice, started in early 2000s. In 2005, a consensus document, Tunis Agenda, had been signed under the aegis of the UN. It laid out much of the terms of the debate around internet governance, including the focus on enhanced cooperation and the need for a multi-stakeholder model.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2011, India put forward a detailed proposal for a multi-lateral UN body that was widely criticised by activists and business bodies at home. In Geneva this November, India's answer to a question on implementing "enhanced cooperation" in a WGEC questionnaire, went like this: "A suitable multilateral, transparent and democratic mechanism must be created where governments, on an equal footing, may carry out their roles and responsibilities in international public policy issues pertaining to the Internet and public policy issues pertaining to coordination and management of critical Internet resources, in consultation with all other stakeholders."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ajay Kumar of the Department of Electronics and Communication Technology (DeitY), was a part of the delegation representing India at Geneva. The DeitY falls under the union ministry of communication and information technology. Kumar told TOI, that while there is a relook at the 2011 proposal, India has been following the Tunis Agenda when it comes to enhanced cooperation between different countries and other stakeholders.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nonetheless, Parminder Jeet Singh of the NGO IT for Change has supported the government position at the WGEC meeting. The two other civil society bodies from India at Geneva wanted a multi-stakeholder model. Singh feels that the proposal may have an important role to play at a later stage when "real political talk shapes up". "We don't agree that a Google or an IT for Change should vote in the decision-making about actual public policies. We understand the fear (behind such an arrangement) but we prefer that public policy decisions at global level remain with governments as they are legitimate representatives of the people," he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, Sunil Abraham, executive director of the Center for Internet and Society, warns against the governmental tendency to centralize and for being opaque. He also feels that a single model, whether multilateral or multi-stakeholder, will not work. Every model must change with every issue being brought to the table, he says. "For instance, something like controlling child pornography, will need one kind of model to deal with. The same won't work when dealing with hate speech," Abraham points out.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Activists are hoping that the Brazil global multi-stakeholder meeting in April next year will take the issue of democratised internet governance forward.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/times-of-india-december-5-2013-kim-arora-india-for-un-body-to-resolve-internet-governance-issues'&gt;http://editors.cis-india.org/news/times-of-india-december-5-2013-kim-arora-india-for-un-body-to-resolve-internet-governance-issues&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-12-26T08:51:05Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
