<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="http://editors.cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>http://editors.cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1881 to 1895.
        
  </description>
  
  
  
  
  <image rdf:resource="http://editors.cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/apc.jpg"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/openness/news/open-source-india-2015"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/OpenSource.png"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/the-hindu-september-22-2015-atul-kabra-open-sesame"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/openness/blog-old/open-science.ppt"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/openpage1low.png"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/openness/blog-old/open-licensing-policy-guidelines.pdf"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/privacy/uid-and-transactions"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/privacy/uid-budget"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/privacy/operational-design"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/privacy/finance-and-security"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/privacy/biometrics"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/a2k/news/live-law-apoorva-mandhani-september-23-2015-open-letter-from-cis-to-pm-modi-on-intellectual-property-rights-issues-on-his-visit-to-us"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/ok-festival-2014"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/openness/blog-old/open-knowledge-day-mysore-media-coverage-zip"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="http://editors.cis-india.org/home-images/apc.jpg">
    <title>Open Spectrum</title>
    <link>http://editors.cis-india.org/home-images/apc.jpg</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/apc.jpg'&gt;http://editors.cis-india.org/home-images/apc.jpg&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2012-06-25T04:02:43Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/openness/news/open-source-india-2015">
    <title>Open Source India 2015</title>
    <link>http://editors.cis-india.org/openness/news/open-source-india-2015</link>
    <description>
        &lt;b&gt;The twelfth Open Source India event organized by EFY Group was held at NIMHANS Convention Centre in Bangalore on November 19 and 20, 2015. Subhashish Panigrahi attended the event for the first day.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;div style="text-align: justify;"&gt;Open Source India (OSI) is the premierconference in Asia targeted at nurturing and promoting the Open Source ecosystem in the subcontinent. Started as LinuxAsia in 2004, OSI has been at the helm of bringing&amp;nbsp; together the Open Source industry and the community in the last 11 years. The 12th edition of OSI this year aimed to take this event a notch higher by focusing on the Open Source ecosystem in Asia, and more specifically, in India.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;hr /&gt;
&lt;div style="text-align: justify;"&gt;For more information see the &lt;a class="external-link" href="http://osidays.com/osidays/wp-content/uploads/2015/08/OSI_brochure-2015_distri.pdf"&gt;brochure of the event&lt;/a&gt;. Schedule of the event on Day 1 &lt;a class="external-link" href="http://osidays.com/osidays/open-source-india-2015-day-1/"&gt;here&lt;/a&gt; and Schedule of the event on Day 2 &lt;a class="external-link" href="http://osidays.com/osidays/wp-content/uploads/2015/11/Web_Schedule_OSI_2015_V7-Day2.pdf"&gt;here&lt;/a&gt;.&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/openness/news/open-source-india-2015'&gt;http://editors.cis-india.org/openness/news/open-source-india-2015&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>CIS-A2K</dc:subject>
    
    
        <dc:subject>Open Source</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2015-12-15T07:46:46Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/OpenSource.png">
    <title>Open Source</title>
    <link>http://editors.cis-india.org/home-images/OpenSource.png</link>
    <description>
        &lt;b&gt;Open Source&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/OpenSource.png'&gt;http://editors.cis-india.org/home-images/OpenSource.png&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2021-11-29T15:08:33Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/the-hindu-september-22-2015-atul-kabra-open-sesame">
    <title>Open sesame</title>
    <link>http://editors.cis-india.org/internet-governance/news/the-hindu-september-22-2015-atul-kabra-open-sesame</link>
    <description>
        &lt;b&gt;The government’s email is shockingly vulnerable.&lt;/b&gt;
        &lt;p class="body" style="text-align: justify; "&gt;The article was published in the &lt;a class="external-link" href="http://www.thehindubusinessline.com/opinion/open-sesame/article7678142.ece"&gt;Hindu&lt;/a&gt; on September 22, 2015. CIS research on private email accounts is mentioned.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;As the Centre moves towards smart cities and a Digital  India, some critics have cited the country’s increased vulnerability to  cyber attacks. To be sure, cyber threat groups could disrupt our  infrastructure by taking control of many systems. Such attacks could be  quite damaging. Yes, they are rare today, but are much more likely to  arise in conjunction with traditional armed conflicts. Cyber criminal  groups target Indian organisations on a daily basis.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Almost  two years ago, the IT minister’s office triggered national outrage when  it used a public email service for official communication. There was  much hand-wringing about security practices in a ministry responsible  for setting the technology direction (secure email policy) for the  country. Then in December 2013, the Centre for Internet and Society  revealed that up to 90 per cent of Indian government officials used  private email accounts for professional purposes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A big deal&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Between  then and now, we’ve read about a new email policy and revelations of  several cyber attacks on government officials. And FireEye revealed a  decade-long cyber espionage operation by a group we call ‘APT30’, which  is likely to be sponsored by China. How did they break in? By sending  targeted ‘spear-phish’ emails with malware attached.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Email  doesn’t sound like a big deal. Most of us have been using it for over a  decade, and think we know how to use it right. But when you’re in a  position of authority with access to sensitive information, you  shouldn’t leave it to chance.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Today, state-sponsored  attackers craft these spear-phishing emails after considerable  research. APT30 carefully researched their targets and crafted mails  which would appear extremely relevant, with interesting content. The  moment a victim would open an attachment, an exploit would secretly  install a backdoor. Through that backdoor, groups can compromise the  employee’s entire network and extricate sensitive data. Groups bent on  destruction can deploy malware to destroy the data. They could also take  control of systems managing infrastructure or industrial processes and  create havoc.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Spear-phishing has an open rate of 70  per cent, while regular mass emails had an open rate of just 3 per cent.  Email is the front- door for today’s threat groups. That’s why  governments around the world are improving the security of their email  systems to fend off these spear-phishing threats.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Public concerns&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;When  government employees use webmail for official business, they trade away  their security for convenience. The emails they receive are no longer  screened by cyber security solutions, which detect advanced targeted  email attacks before they reach the inbox. In addition, because people  typically retrieve their webmail in a browser, attackers have a larger  attack surface to exploit when carrying out their attacks. For example,  attackers can coax victims to click on a link to a website, which  delivers an exploit via Adobe Flash.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Webmail opens  the door to threats that would otherwise have been intercepted. When our  government employees use webmail for official business, they leave the  front door wide open to threats. One of the best steps we can take  towards improving our government’s cyber security defences is abandoning  public email services.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;i&gt;The writer is a software architect at the cyber security firm FireEye&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/the-hindu-september-22-2015-atul-kabra-open-sesame'&gt;http://editors.cis-india.org/internet-governance/news/the-hindu-september-22-2015-atul-kabra-open-sesame&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-09-25T01:31:49Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/openness/blog-old/open-science.ppt">
    <title>Open Science Presentation at ICFOSS</title>
    <link>http://editors.cis-india.org/openness/blog-old/open-science.ppt</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/openness/blog-old/open-science.ppt'&gt;http://editors.cis-india.org/openness/blog-old/open-science.ppt&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2014-12-28T01:41:37Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/openpage1low.png">
    <title>Open Page</title>
    <link>http://editors.cis-india.org/home-images/openpage1low.png</link>
    <description>
        &lt;b&gt;Open Page&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/openpage1low.png'&gt;http://editors.cis-india.org/home-images/openpage1low.png&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2012-11-03T10:58:51Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/openness/blog-old/open-licensing-policy-guidelines.pdf">
    <title>Open Licensing Policy Guidelines</title>
    <link>http://editors.cis-india.org/openness/blog-old/open-licensing-policy-guidelines.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/openness/blog-old/open-licensing-policy-guidelines.pdf'&gt;http://editors.cis-india.org/openness/blog-old/open-licensing-policy-guidelines.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2014-05-30T05:55:25Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/privacy/uid-and-transactions">
    <title>Open Letter to the Finance Committee: UID and Transactions</title>
    <link>http://editors.cis-india.org/internet-governance/blog/privacy/uid-and-transactions</link>
    <description>
        &lt;b&gt;Since official documentation from the UIDAI is very limited, we assume that data pertaining to transactions would comprise of the Aadhaar number, identifier of the authenticating device, date-time stamp, and approval/rejection/error code. Recording and maintaining of data pertaining to transactions is very important because it increases transparency and accountability through an audit trail. However, storage of such sensitive data creates many privacy risks, because more often than not metadata gives you as much intelligence as raw data. &lt;/b&gt;
        
&lt;p&gt;For example – even if you didn’t have access to the Radia recordings – just knowing who she called, when, how frequently, in what order, and for how long, will give quite a comprehensive picture. Thus, we believe that such data should not be fully stored in a central database. By way of an open letter, we suggest three alternative ways of storing and securing data relating to transactions, so that transparency and accountability is preserved without enabling surveillance or profiling of individuals. &amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Partial storage of data relating to transactions&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Once a transaction is processed, half of the UID number is stored in the central database, while the other half of the number is stored with the service provider. Thus, for an agency to reconstruct the audit trail they must seek consent from the service provider and the UIDAI for information regarding a specific transaction. The process would follow steps like these:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;Send part of the Aadhaar number to the CIDR&amp;nbsp;&lt;/li&gt;&lt;li&gt;Service provider stores part of the Aadhaar number locally.&lt;/li&gt;&lt;li&gt;Law enforcement and intelligence agencies seeking transaction data securing required approvals from the Home Ministry and then request data from the UIDAI and service provider&lt;/li&gt;&lt;li&gt;Data is provided by UIDAI and the service provider and combined to reconstruct the audit trail. &amp;nbsp;&lt;/li&gt;&lt;/ol&gt;
&lt;div&gt;
&lt;ul&gt;&lt;li&gt;Storage of the public keys with a custodian&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;p&gt;Similar to the model followed in the new wiretapping regulations&lt;a href="#1"&gt;1&lt;/a&gt;, the transaction details in the central database is secured using several custodians. Thus, no single entity has complete knowledge of access to the database. And if the transaction details are leaked to the public, the custodian can be held responsible for negligence. Thus, for an agency to reconstruct the audit trail they must seek approvals and request encrypted data. The process would follow steps like these:&lt;/p&gt;
&lt;div&gt;
&lt;div&gt;
&lt;ol&gt;&lt;li&gt;Encrypt transaction data with the public key of the ‘custodian’&amp;nbsp;&lt;/li&gt;&lt;li&gt;Store encrypted data in CIDR&amp;nbsp;&lt;/li&gt;&lt;li&gt;Law enforcement and intelligence agencies seeking transaction details require approvals from the Home Ministry, and then request encrypted data from the UIDAI.&amp;nbsp;&lt;/li&gt;&lt;li&gt;The custodian on receipt of the necessary approvals decrypts the data using his/her private key, and then the audit trail becomes available.&amp;nbsp;&lt;/li&gt;&lt;/ol&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;&lt;li&gt;Complete storage of transaction details at the service provider level&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;div&gt;After a transaction is processed, the information is encrypted and stored in a de-centralized manner with the service provider, thus agencies or individuals can only access information regarding a specific transaction at a specific organization. The process would follow steps like these:&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;ul&gt;&lt;li&gt;Encrypt transaction data&amp;nbsp;&lt;/li&gt;&lt;li&gt;Store encrypted data at service provider level&lt;/li&gt;&lt;li&gt;Law enforcement and intelligence agencies seeking transaction details require approvals from the Home Ministry, and then request encrypted data from each service provider. Audit trail is reconstructed by merging data sets from different service providers.&amp;nbsp;&lt;/li&gt;&lt;li&gt;The CIDR will only hold Aadhaar number, date-time stamp, and approval/rejection/error code.&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;h3&gt;Note&lt;/h3&gt;
&lt;p class="discreet"&gt;&lt;a name="1"&gt;1 http://timesofindia.indiatimes.com/india/Tapping-norms-Govt-will-erase-private-talk/articleshow/7407633.cms&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/privacy/uid-and-transactions'&gt;http://editors.cis-india.org/internet-governance/blog/privacy/uid-and-transactions&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2011-02-24T13:35:11Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/privacy/uid-budget">
    <title>Open Letter to the Finance Committee: UID Budget</title>
    <link>http://editors.cis-india.org/internet-governance/blog/privacy/uid-budget</link>
    <description>
        &lt;b&gt;This note presents the aspects of the UID project, which have not been considered or incorporated into the UID’s budget. The costs include re-enrollment, loss in human time, and the cost of the audit function. &lt;/b&gt;
        
&lt;ol&gt;&lt;li&gt;&lt;strong&gt;Cost of re-enrollment &lt;/strong&gt;&lt;br /&gt;In the report 'Biometrics Design Standards for UID Applications' &lt;a href="#1"&gt;1&lt;/a&gt;&amp;nbsp;a pilot study in India concluded that about two to five per cent of the people did not have viable biometric data. These data have not been taken into account when setting the program budget. Over time biometrics modify, thus re-enrollment will be required. The UIDAI states that given the changing nature of biometric data – biometrics would be collected every five years for children and every ten years for adults. The current project does not give us a clear picture as to what extent the re-enrollment will be required, and how the additional costs will be accounted for. &amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;strong&gt;&amp;nbsp;Cost of loss in human time &lt;/strong&gt;&lt;br /&gt;A time motion study is a tool used to enhance business efficiency and ensure cost effectiveness by reducing the number of motions in performing a task. In their budget, the UIDAI has accounted for the salaries of individuals associated directly with the UIDAI. The UIDAI has not accounted for the loss in human time that will take place by individuals whose daily routine will be impacted by the UID. If a time motion study were to be done only on the UID project, one would find that individuals not paid by the UIDAI, lose potential wages due to the unpaid time they must dedicate towards the scheme – or that businesses will be forced to compensate for the extra time required for each transaction by providing additional personnel. For example: On a train the number of train masters present is calculated according to how many individuals each ticket master can check and process. With the UID, in order to prevent fraud around subsidized train tickets , individuals on the train will have their biometrics checked and authenticated. The below diagram demonstrates how authenticating an individual by their UID and biometric incurs a loss in human time, and thus, the process of collecting train tickets will require more train masters to complete. &lt;br /&gt;&lt;em&gt;Current Process:&lt;/em&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Present ticket to train master&lt;/li&gt;&lt;li&gt;Train master checks identity card and identity on ticket&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;li&gt;Train master ticks ticket, and ticks his list to indicate verification &lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;em&gt;Process with biometrics&lt;/em&gt;: &lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Present &lt;em&gt;Aadhaar&lt;/em&gt; number, fingerprint , and ticket to train master&lt;/li&gt;&lt;li&gt;Train master takes a reading of your fingerprint and sends it to the central database&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;li&gt;Train master waits for approval from the CIDR&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;li&gt;The CIDR gives a yes or no response&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;li&gt;If the answer is no – the train master swipes your finger five times, and then finds alternate forms of identification&amp;nbsp;&lt;/li&gt;&lt;li&gt;Train master provides proof of verification &lt;/li&gt;&lt;/ul&gt;
&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Cost of audit function &lt;/strong&gt;&lt;br /&gt;The bulk of the UID enabled transactions will have financial implications. Every financial transaction involves three or four parties: the person who collects the payment, the person who prepares the documentation, the person who approves the documentation, and finally the person who audits the documentation. In such a context the technology can play the role of the person who: collects, prepares, and approves each transaction. The role of auditing the transaction cannot be played by technology. The audit function is human, and the audit function needs to be worked into the project budget.&amp;nbsp;&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;span class="Apple-style-span"&gt;&lt;a name="1"&gt;1 “Biometrics Design Standards for UID Applications" pg.22&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/privacy/uid-budget'&gt;http://editors.cis-india.org/internet-governance/blog/privacy/uid-budget&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2011-02-17T11:18:16Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/privacy/operational-design">
    <title>Open Letter to the Finance Committee: Operational Design</title>
    <link>http://editors.cis-india.org/internet-governance/blog/privacy/operational-design</link>
    <description>
        &lt;b&gt;The objective of the UID project is to provide identity infrastructure that is not susceptible to fraud or error. This note highlights parts of the operational design of the project, which are flawed. We plead that each point be taken into consideration and that the design be suitably revised.&lt;/b&gt;
        
&lt;h3&gt;Flawed aspects of the operational design&lt;/h3&gt;
&lt;ul&gt;&lt;li&gt;During enrolment: false identities&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Initial proof of one’s identity is best proved through multiple, standardized documents.&amp;nbsp;The UID lists seventeen acceptable documents.&lt;a href="#1"&gt;1&lt;/a&gt;&amp;nbsp;&lt;span class="Apple-style-span"&gt;Acceptance and verification of only one of these identities is necessary for enrolment. This is a lower standard than existing forms of identity such as the Passport or the PAN card.&lt;a href="#2"&gt;2&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;strong&gt;During transactions: technology will not solve corruption&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;In every transaction that requires the use of the &lt;em&gt;Aadhaar&lt;/em&gt; number, there are four points where corruption is possible and delivery of services will not take place:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;The technology fails, and does not perform authentication;&lt;/li&gt;&lt;li&gt;The authority fails and delivers a false positive or false negative;&lt;/li&gt;&lt;li&gt;The local administrator fails to deliver the service after authentication;&lt;/li&gt;&lt;li&gt;The biometric fails due to biological changes, and thus the individual is denied benefits; and&lt;/li&gt;&lt;li&gt;Fraudulent use of face biometrics at the transaction level.&lt;/li&gt;&lt;/ol&gt;
&lt;ul&gt;&lt;li&gt;&lt;strong&gt;During transactions: high cost of centralization with limited benefits&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Verifying unique identity for every transaction will introduce an unnecessary authentication overhead. In the UID Bill, there is provision for standardized authentication fees.&lt;a href="#3"&gt;3&lt;/a&gt;&lt;/p&gt;
At some point service providers will pass on the authentication cost through a required authentication fee to the residents. This will take place with no entitlement of any service or guarantee against fraud.
&lt;ul&gt;&lt;li&gt;&lt;strong&gt;During redressal: no guarantee of quick and adequate remedies&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;The delivery of services is guaranteed only when there is an optional way for transactions to be completed. If an &lt;em&gt;Aadhaar&lt;/em&gt; number holder attempts to complete a transaction, and the UIDAI rejects it, the individual can make a request for re-verification with the registrar.&lt;a href="#4"&gt;4&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;
If the UIDAI still rejects the request, the individual must file a complaint to the UIDAI contact centre and wait for appropriate remedial action,&lt;a href="#5"&gt;5&lt;/a&gt;&amp;nbsp;yet the UIDAI is not liable for the loss of service.&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;strong&gt;During upgrades of the system: patchwork approach to data protection&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;It is more secure to have pro-active data protection than re-active data protection. The data protection legislation that is meant to secure data processed in the UID project will be established only after the UID bill becomes law. One can only assume that the UID will respond to every new policy development in a patchwork fashion.&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="1"&gt;1http://uidai.gov.in/index.php?option=com_fsf&amp;amp;view=faq&amp;amp;Itemid=206&amp;amp;catid=24&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="2"&gt;2 http://passport.nic.in/, http://nrisharejunction.com/pan.aspx&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="3"&gt;3 Chapter 3, Section 23 (2) (o): The National Identification Authority of India Bill 2010&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="4"&gt;4 http://uidai.gov.in/UID_PDF/Front_Page_Articles/Documents/Strategy_Overveiw-001.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="5"&gt;5 http://uidai.gov.in/images/FrontPageUpdates/aadhaarhandbookver1.2.pdf pg.18&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/privacy/operational-design'&gt;http://editors.cis-india.org/internet-governance/blog/privacy/operational-design&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2011-02-17T10:02:46Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/privacy/finance-and-security">
    <title>Open Letter to the Finance Committee: Finance and Security </title>
    <link>http://editors.cis-india.org/internet-governance/blog/privacy/finance-and-security</link>
    <description>
        &lt;b&gt;This note explores the three connections between finance and security and demonstrates the cost implications of operating a centrally designed identity management system as proposed by the UID. In doing so, it shows how the monitoring, storing, and securing of transactional data in a centralized database fall short of meeting the project's objectives of authentication, and thus is an additional cost. Further, it is argued that the blanket monitoring of the transaction database is not an effective method of detecting fraud, and is an expensive component of the project. &lt;/b&gt;
        
&lt;ul&gt;&lt;li&gt;Operating a centralized identity management system that requires the use of a remote database for every transaction is always more expensive than a decentralized identity management system that could optionally use a local database. &amp;nbsp;&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;Centralized database costs&lt;/h3&gt;
&lt;ol&gt;&lt;li&gt;Both public and private keys must be centrally stored&lt;/li&gt;&lt;li&gt;All transactions require connectivity for the sending and &amp;nbsp;receiving of authentication of data, and have an associated &amp;nbsp;connectivity cost&lt;/li&gt;&lt;li&gt;Securing all data at a &amp;nbsp;central database has &amp;nbsp;augmented costs &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/li&gt;&lt;/ol&gt;
&lt;h3&gt;Decentralized database costs &amp;nbsp;&amp;nbsp;&lt;/h3&gt;
&lt;ol&gt;&lt;li&gt;Only the public key must be centrally stored&lt;/li&gt;&lt;li&gt;Some transactions require connectivity for the sending and receiving of authentication data&lt;/li&gt;&lt;/ol&gt;
&lt;ul&gt;&lt;li&gt;The cost of building an identity management system that includes recording, monitoring, and securing each transaction is more than the cost of building only an identity authentication system. &amp;nbsp;The goal of the project is to identify a person. Recording each transaction will add unnecessary cost.&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;
&lt;table style="text-align: center;" class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: left;"&gt;Cost of identity authentication system&lt;/td&gt;
&lt;td style="text-align: left;"&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: left;"&gt;Cost of monitoring transactions &amp;nbsp;&lt;/td&gt;
&lt;td style="text-align: left;"&gt;&amp;gt; Cost of identity authentication system&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: left;"&gt;&amp;nbsp;Cost of securing transaction data&lt;/td&gt;
&lt;td style="text-align: left;"&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;ul&gt;&lt;li&gt;Increasing security or fighting fraud can be done in two ways - having a targeted approach or through blanket monitoring. The UID scheme, through the monitoring of the transaction database featuring trillions of transaction by 1.2 billion people is a blanket approach, and will provide lower return on investment than a targeted approach. &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/privacy/finance-and-security'&gt;http://editors.cis-india.org/internet-governance/blog/privacy/finance-and-security&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2011-02-17T11:57:42Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/privacy/biometrics">
    <title>Open Letter to the Finance Committe: Biometrics </title>
    <link>http://editors.cis-india.org/internet-governance/blog/privacy/biometrics</link>
    <description>
        &lt;b&gt;This note points out the weaknesses inherent in biometrics and the pitfalls in using them. It  recommends procedural safeguards that should be adopted by the UID in order to make the use of biometrics more secure and inclusive.&lt;/b&gt;
        
&lt;ol&gt;&lt;li&gt;
&lt;p&gt;&amp;nbsp;&lt;strong&gt;Biometrics are not centrally stored and are used only for identification &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Biometrics, as our first letter notes &lt;a href="#1"&gt;1&lt;/a&gt;&amp;nbsp;are better suited for identification, and are inappropriate for authentication. Therefore, the central server need not store biometric information, and need only store the public key of each citizen's digital signature.&lt;a href="#2"&gt;2&lt;/a&gt;&amp;nbsp;Biometrics on a smart card for authentication will allow service providers to determine if the card is being carried by the right person. This configuration of biometrics has many positives. It is :&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&amp;nbsp;Cost effective&lt;/li&gt;&lt;li&gt;&amp;nbsp;More secure&lt;/li&gt;&lt;li&gt;&amp;nbsp;Places the control of biometric information in the hands of the data subject&amp;nbsp; &lt;/li&gt;&lt;/ul&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Use encrypted data, rather than live data &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The UID scheme has stated that biometrics will be encrypted, but has not provided further details. &lt;a href="#3"&gt;3&lt;/a&gt;&lt;/p&gt;
It is recommended that biometrics are:
&lt;ul&gt;&lt;li&gt;Encrypted whenever it is used, stored and transferred;&lt;/li&gt;&lt;li&gt;A biometric should be encrypted to such a degree that it is not possible to reconstruct the biometric data; and&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;After an encrypted version of the biometric is made, the original biometric should be deleted. &lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;In order to perform an identification check – the biometrics presented should be encrypted and then compared to the encrypted version stored on the card. If the card is stolen – the thief would not be able to harvest biometrics.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Security clearance for all associated entities and personnel &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;UID registrations and transactions will be handled by 'registrars' or in other words personnel who work at organizations not directly under the control of the UIDAI. A clear process associated with who can perform transactions and a proper audit system is needed to prevent 'insider' attacks.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Clearly defined alternate identification factors &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;There are many situations in which a biometric cannot be accepted in a transaction. For example, when the biometric changes, is misread, or is unreadable. The UID has recognized this possibility and has stated: &lt;em&gt;“In case of authentication, the operator needs to find an alternate method of authentication if fingerprint verification fails. The operator/application would not know the cause of verification failure. A timeout will be implemented in service after five attempts.”&lt;/em&gt;&lt;a href="#4"&gt;4&lt;/a&gt;&lt;/p&gt;
The alternative identity factors that will be accepted need to be clearly defined and articulate.
&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Standards for acceptance of biometric as authentication factor&lt;/strong&gt;&lt;br /&gt;
&lt;p&gt;The UIDAI has proposed a whole range of authentication factors – pin, password, partial biometrics, full biometrics, mobile phone and combination's thereof. &lt;a href="#5"&gt;5&lt;/a&gt; Some of these authentication factors may also be presented by the data subject over the Internet. As our previous letters have stated – some authentication factors are more secure than others. Therefore, the UIDAI should publish standards for acceptance of different authentication factors based on the security requirements of different types of transactions. Even if biometrics are used as an authentication standard – in our opinion it should only be used for trivial transactions without major financial or citizenship implications.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;&lt;strong&gt;Footnotes:&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="1"&gt;1http://www.cis-india.org/advocacy/igov/privacy-india/letter-to-finance-committee&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="2"&gt;2 Distinguish and separate the authentication process from the identification process:&amp;nbsp;&lt;/a&gt;&lt;span class="Apple-style-span"&gt;&lt;a name="2"&gt;Identification is a comparison of one set of biometric data against all sets of collected biometrics in one central database to verify the identity of the owner of the biometric data. Authentication is a comparison of a biometric against a stored template to validate the existence of that specific biometric&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="3"&gt;3 http://uidai.gov.in/index.php?option=com_fsf&amp;amp;view=faq&amp;amp;Itemid=206&amp;amp;catid=7&amp;nbsp;&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="3"&gt;&lt;/a&gt;&lt;a name="4"&gt;4 Biometric Design Standards for UID Applications: pg 37&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="4"&gt;&lt;/a&gt;&lt;a name="5"&gt;5 UIDAI Strategy Overview. Creating a Unique Identity Number for Every Resident in India. Pg. 28&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/privacy/biometrics'&gt;http://editors.cis-india.org/internet-governance/blog/privacy/biometrics&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2011-02-17T13:12:22Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/a2k/news/live-law-apoorva-mandhani-september-23-2015-open-letter-from-cis-to-pm-modi-on-intellectual-property-rights-issues-on-his-visit-to-us">
    <title>Open letter from CIS to PM Modi on Intellectual Property Rights issues on his Visit to US</title>
    <link>http://editors.cis-india.org/a2k/news/live-law-apoorva-mandhani-september-23-2015-open-letter-from-cis-to-pm-modi-on-intellectual-property-rights-issues-on-his-visit-to-us</link>
    <description>
        &lt;b&gt;Centre for Internet and Society, through its Policy Director Mr. Pranesh Prakash and Programme Officer Nehaa Chaudhari has addressed an open letter to Prime Minister Narendra Modi on the intellectual property right issues concerning his visit to the United State of America in September, 2015.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Apoorva Mandhani was &lt;a class="external-link" href="http://www.livelaw.in/open-letter-from-cis-to-pm-modi-on-intellectual-property-rights-issues-on-his-visit-to-us/"&gt;published by LiveLaw&lt;/a&gt; on September 23, 2015. CIS Open Letter &lt;a class="external-link" href="http://cis-india.org/a2k/blogs/open-letter-on-intellectual-property-rights-issues-during-your-visit-to-the-united-states-of-america-in-september-2015"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The letter makes a two-fold request: first&lt;i&gt;, &lt;/i&gt;that the Government of the USA be requested to ratify the Marrakesh Treaty for visually impaired persons and second,&lt;i&gt; &lt;/i&gt;that the Indian Government should not enter into any negotiations around the Trans-Pacific Partnership trade agreement.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The letter relies on the statistics released by the &lt;a href="http://www.worldblindunion.org/English/our-work/our-priorities/Pages/right-2-read-campaign.aspx"&gt;World Blind Union&lt;/a&gt;,  according to which 90% of all published material is not accessible to  blind or print disabled people. The severity of the ‘book famine’, it  says, was highlighted by India in its Closing Statement at the  Diplomatic Conference convened to conclude the Marrakesh Treaty.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India was the &lt;a href="http://cis-india.org/accessibility/blog/indias-ratification-of-marrakesh-treaty-celebrated"&gt;first country&lt;/a&gt; to ratify the Marrakesh Treaty in June, 2014. However, the Marrakesh  Treaty will come into effect only after 20 Member States have ratified  it or acceded to it. As per information available from the &lt;a href="http://www.wipo.int/treaties/en/ShowResults.jsp?lang=en&amp;amp;treaty_id=843"&gt;World Intellectual Property Organization&lt;/a&gt;,  only 9 countries have ratified or acceded to the treaty and USA is not  one of it. The letter therefore requests Mr. Modi to request USA ratify  the Marrakesh Treaty at the earliest.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It says, &lt;i&gt;“The USA is home to some of  the largest publishers of both academic and other/leisure material  including Penguin Random House, Harper Collins, John Wiley &amp;amp; Sons,  the RELX Group, McGraw-Hill Education, Scholastic and Cengage Learning  to name a few. It accounts for a large volume of the world’s book and  other print material export. The active participation of the USA through  the ratification of the Marrakesh treaty is critical if the treaty is  to be truly effective.”&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With regard to the Trans-Pacific  Partnership trade agreement, the letter communicates its concern  regarding the secrecy of negotiations as well as the content of the  chapter on intellectual property in the TPP.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provisions sought to be imposed through  the TPP mandate the inclusion of TRIPS plus provisions in national laws,  envisage possible extensions in term of protection on patents, restrict  copyright exceptions and limitations, extend copyright protection terms  and impose a higher liability on intermediaries. All these provisions,  it says, &lt;i&gt;“would be disastrous for an emerging economy such as  India’s, which is a heavy user of intellectual property and not a heavy  producer of the same.”&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Highlighting CIS’s concerns, the letter  requests that any engagement in TPP negotiations be preceded by national  consultations on the same, soliciting input from various stakeholders  with diverging interests, including academia, civil society, industry  associations, large Indian corporations, small and medium enterprises  and multi- national corporations, rights holders associations and other  interest groups.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/a2k/news/live-law-apoorva-mandhani-september-23-2015-open-letter-from-cis-to-pm-modi-on-intellectual-property-rights-issues-on-his-visit-to-us'&gt;http://editors.cis-india.org/a2k/news/live-law-apoorva-mandhani-september-23-2015-open-letter-from-cis-to-pm-modi-on-intellectual-property-rights-issues-on-his-visit-to-us&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2015-09-24T02:48:32Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/ok-festival-2014">
    <title>Open Knowledge Festival 2014</title>
    <link>http://editors.cis-india.org/news/ok-festival-2014</link>
    <description>
        &lt;b&gt;Subhashish Panigrahi represented India as the India Ambassador of OpenGLAM local in Berlin. The event was organized by Google, Omidyar, et.al., in Berlin from July 15 to 17, 2014.&lt;/b&gt;
        &lt;p&gt;Click to read the details on the &lt;a class="external-link" href="http://okfestival2014.sched.org/event/3c54b973ef6fe84c004ec52c4cf621aa#.U9Yd4aPO2aM"&gt;website here&lt;/a&gt;. See the &lt;a class="external-link" href="http://2014.okfestival.org/about-programme/"&gt;official programme here&lt;/a&gt;. Download Subhashish's presentation &lt;a href="http://editors.cis-india.org/openness/blog/ok-festival.pdf" class="external-link"&gt;at this page&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Subhashish presented on the following:&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Situation in India&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Wikimedia India chapter and WMF's India program working on first India GLAM project&lt;/li&gt;
&lt;li&gt;Good traction of image contribution through Wiki Loves Monuments photo contest&lt;/li&gt;
&lt;li&gt;Mass communication and other media institutes slowly taking interest in open audio library&lt;/li&gt;
&lt;li&gt;Digitization is a priority across government departments, with funding available&lt;/li&gt;
&lt;li&gt;Majority of GLAMs lack knowledge about open culture, need for outreach&lt;/li&gt;
&lt;li&gt;Relicensing and book digitization have gained public interest&lt;/li&gt;
&lt;li&gt;Goals of the survey&lt;/li&gt;
&lt;li&gt;Data&lt;/li&gt;
&lt;li&gt;Mapping the sector&lt;/li&gt;
&lt;li&gt;Encourage institutions to think beyond their digital strategy&lt;/li&gt;
&lt;li&gt;Show institutions what is there for them&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;What we have done so far&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Started filing Right to Information (RT) asking state government departments for lists of institutions&lt;/li&gt;
&lt;li&gt;Reached out to WMIN (Wikimedia India chapter) for help in creating a list&lt;/li&gt;
&lt;li&gt;Difficulty with getting people and contact details&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Collaborative Presentation&lt;/h2&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="356" marginheight="0" marginwidth="0" scrolling="no" src="http://www.slideshare.net/slideshow/embed_code/37285446" width="427"&gt; &lt;/iframe&gt;&lt;/p&gt;
&lt;div&gt;&lt;b&gt; &lt;a href="https://de.slideshare.net/beatestermann/ok-fest2014-glamsurveyworkshop20140717" target="_blank" title="OKFest2014 glam-survey_workshop_20140717"&gt;OKFest2014 glam-survey_workshop_20140717&lt;/a&gt; &lt;/b&gt; from &lt;b&gt;&lt;a href="http://www.slideshare.net/beatestermann" target="_blank"&gt;Beat Estermann&lt;/a&gt;&lt;/b&gt;&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/ok-festival-2014'&gt;http://editors.cis-india.org/news/ok-festival-2014&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Wikimedia</dc:subject>
    

   <dc:date>2014-07-28T10:17:38Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/openness/blog-old/open-knowledge-day-mysore-media-coverage-zip">
    <title>Open Knowledge Day in Mysore (Media Coverage)</title>
    <link>http://editors.cis-india.org/openness/blog-old/open-knowledge-day-mysore-media-coverage-zip</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/openness/blog-old/open-knowledge-day-mysore-media-coverage-zip'&gt;http://editors.cis-india.org/openness/blog-old/open-knowledge-day-mysore-media-coverage-zip&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2014-07-24T07:01:16Z</dc:date>
   <dc:type>File</dc:type>
   </item>




</rdf:RDF>
