<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="http://editors.cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>http://editors.cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2741 to 2755.
        
  </description>
  
  
  
  
  <image rdf:resource="http://editors.cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="http://editors.cis-india.org/a2k/freedom-of-expression-and-ipr-meeting"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/save-your-voice-2014-a-movement-against-web-censorship"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/wordprss-webmaster"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/events-coordinator"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/questioning-the-radical-potential-of-citizen-action"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/consumers-international-meeting-2012"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/big-bet-on-identity"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/digital-natives/media-coverage/an-experiment-in-social-engineering"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/intl-conferernce-on-mobile-law"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/what-is-stewardship-in-cyberspace"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/secure-it-2012"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/content-developers-trainers"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/openness/francis-wins-ept-award"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/digitisation-is-making-e-learning-simple"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/india-debates-limits-to-freedom-of-expression"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="http://editors.cis-india.org/a2k/freedom-of-expression-and-ipr-meeting">
    <title>Expert Meeting on Freedom of Expression and Intellectual Property Rights</title>
    <link>http://editors.cis-india.org/a2k/freedom-of-expression-and-ipr-meeting</link>
    <description>
        &lt;b&gt;This report provides an overview of the discussion from the Expert Meeting on Freedom of Expression and Intellectual Property Rights, organized by ARTICLE 19 in London on November 18, 2011. &lt;/b&gt;
        
&lt;p&gt;At the meeting, nineteen international scholars, experts and human 
rights activists met to explore the antagonistic relationship between 
Intellectual Property (IP) and the rights to freedom of expression and 
information (FoE). This conversation is timely if not overdue, as 
governments are increasingly using the pretext of IP protection to place
 unjustified restrictions on the exercise of FoE, particularly on the 
Internet. ARTICLE 19 believes that increasing the profile of the human 
rights perspective in debates on IP law and policy is essential to 
protecting FoE, particularly in the digital environment. The objective 
of the meeting was therefore to develop an appropriate rights framework 
for evaluating IP law and enforcement mechanisms, to advance a policy 
paper on the issue and eventually to establish a set of key principles 
on IP and FoE.&lt;/p&gt;
&lt;p&gt;This report outlines:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;A summary of the discussions that took place during the meeting; and&lt;/li&gt;&lt;li&gt;Outstanding
 issues and those requiring follow-up discussion in order to 
conceptualise and complete a position paper on the subject. &lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;h2&gt;List of Participants&lt;/h2&gt;
&lt;ol&gt;&lt;li&gt;Andrew Puddephatt: Director, Global Partners &amp;amp; Associates&lt;/li&gt;&lt;li&gt;Brett Soloman: Executive Director, ACCESS.&lt;/li&gt;&lt;li&gt;Dinah PoKempner: General Counsel, Human Rights Watch.&lt;/li&gt;&lt;li&gt;Jérémie Zimmermann: Co-founder and spokesperson, LaQuadrature du Net: Internet &amp;amp; Libertés&lt;/li&gt;&lt;li&gt;Jeremy Malcolm: Project Coordinator for IP and Communications; Consumer International.&lt;/li&gt;&lt;li&gt;Jim Killock: Executive Director, Open Rights Group&lt;/li&gt;&lt;li&gt;Michael Camilleri: Human Rights Specialist, Office of the Special Rapporteur for Freedom of Expression at OAS.&lt;/li&gt;&lt;li&gt;Michael Geist: Chair of Internet and E-commerce Law, Univesity of Ottowa.&lt;/li&gt;&lt;li&gt;Pranesh Prakash: Programme Manager, Center for Internet and Society&lt;/li&gt;&lt;li&gt;Raegan MacDonald: Policy Analyst, ACCESS (Brussels)&lt;/li&gt;&lt;li&gt;Saskia Walzel: Senior Policy Advocate, Consumer Focus&lt;/li&gt;&lt;li&gt;Yaman Akdeniz: Associate Professor in Law; Human Rights Law Research Center, Faculty of Law, Istanbul Bilgi University.&lt;/li&gt;&lt;li&gt;Walter van Holst: IT legal consultant, Mitopics&lt;/li&gt;&lt;li&gt;Agnes Callamard: Executive Director, ARTICLE 19&lt;/li&gt;&lt;li&gt;Barbora Bukovska: Senior Direct for Law and Policy, ARTICLE 19&lt;/li&gt;&lt;li&gt;David Banisar: Senior Legal Counsel, ARTICLE 19&lt;/li&gt;&lt;li&gt;Gabrielle Guillemin: Legal Officer, ARTICLE 19&lt;/li&gt;&lt;li&gt;Andrew Smith: Lawyer, ARTICLE 19&lt;/li&gt;&lt;li&gt;Michael Polak: Intern, ARTICLE 19&lt;/li&gt;&lt;/ol&gt;
&lt;h2&gt;Welcome, Introductions, Purpose&amp;nbsp;&lt;/h2&gt;
&lt;p&gt;Agnès Callamard opened the meeting with a welcome and introduction, 
giving a brief overview of ARTICLE 19’s extensive experience over twenty
 years bringing together coalitions to increase the profile of various 
advocacy issues and develop key policy documents, including the Camden 
Principles on FoE and equality, and the Johannesburg Principles on FoE 
and national security.&lt;/p&gt;
&lt;p&gt;In the last three years, the Internet has increasingly come to the 
forefront of ARTICLE 19’s work. During this time it has become clear 
that the agenda for protecting IP negatively impacts FoE, and that there
 is a notable absence of traditional human rights groups engaged with 
the IP agenda or campaigning on its implications for human rights. 
ARTICLE 19 believes that there is a clear need for this gap to be 
filled, for us to enter this dialogue and challenge current 
preconceptions with an alternative human rights narrative that counters 
that promoted by IP industries.&lt;/p&gt;
&lt;p&gt;The purpose of this meeting, therefore, is to develop a strategy for 
promoting the FoE perspective in debates on IP. To do this, it is 
important to first conceptualise the relationship between FoE and IP 
within a rights framework: to identify how or if these interests should 
be balanced and what the areas of conflict and conciliation are. This 
discussion should clarify the best way to proceed, with a view to arrive
 at a policy paper and eventually a set of principles on how to best 
protect FoE in the IP context.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Session 1: Brief comments by participants on issues of concern for freedom of expression campaigners in relation to IPR&lt;/h3&gt;
&lt;p&gt;The objective of the first session was for all participants to 
identify the most significant issues in current debates on freedom of 
expression and IP, and the extent to which some issues may have been 
overlooked, underestimated, or over-emphasised. These issues, ideas and 
perspectives would then guide discussions during the remainder of the 
meeting and at future meetings.&lt;/p&gt;
&lt;p&gt;All participants agreed that applying a human rights framework to 
this debate is an important and worthwhile endeavour. The following 
issues were identified during the discussions:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Conceptual starting point&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Participants agreed that the status quo should not be the “starting 
point” for discussions, and that we should avoid being trapped in the 
narrative that has been developed and imposed by IP rights holders. This
 requires questioning accepted language and norms, pushing the 
boundaries of the debate and thinking outside the box. The proliferation
 of terms such as “piracy”, “theft” and other criminal law language to 
describe non-commercial copyright infringement demonstrates the extent 
to which corporate interest groups have controlled the agenda. We should
 reject these terms and instead adopt positive language that emphasises 
the cultural and economic value of information sharing, and frame IP as a
 potential obstacle to these values. This dialogue should recognise that
 the relationship between people and information has changed in the 
digital age, and that a new generation of people express themselves 
through sharing media online and creating new works such as video 
mash-ups.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A human right to IP? &lt;/strong&gt;&lt;br /&gt;
Several participants questioned whether we should accept interests in IP
 as “human rights”, particularly as the concept is one born from 
censorship. Rejecting IP as a human right would require challenging 
accepted language such as “intellectual property rights” and “rights 
holder”. If we speak of IP interests or claims, rather than human 
rights, then it is also inaccurate to speak of their interaction with 
other rights as a “conflict between rights” that requires “balancing”. 
Instead, certain IP claims, and the detection or enforcement mechanisms 
that support them, should be framed as restrictions on the right to 
freedom of expression.&lt;/p&gt;
&lt;p&gt;Some participants expressed doubts over the value of advocating that 
IP is not a human right when the idea is already embedded and various 
regional courts have already recognised it as such. Such a campaign 
would be difficult and achieve little, particularly as it may require 
changing established agreements such as Berne and TRIPS that would take 
decades to reform. Staying within the existing legal framework may be 
the only pragmatic way to achieve change in the short and medium-term. 
There was agreement that understanding how different treaties and human 
rights instruments or bodies understand IP is important before 
proceeding.&lt;/p&gt;
&lt;p&gt;In the alternative, it was suggested that IP could be viewed as a 
“human right” to the extent that it complements other human rights, such
 as FoE. Copyright is often justified on terms that it is essential for 
incentivising creativity and that it is an “engine” of free speech – 
this argument needs further exploration, as it shows that the two rights
 may sometimes be complementary. ARTICLE 19 is familiar with a strategy 
focussed on complementarity, as the Camden Principles promoted a similar
 approach to advocate that the right to equality and right to FoE were 
mutually reinforcing rather than contradictory. Similarly, participants 
spoke about a “social value” approach to viewing IP as a human right, 
i.e. the greater the social value behind the IP protection, the more 
weight it would have in a rights “balancing” exercise.&lt;/p&gt;
&lt;p&gt;Other suggestions on reframing or reversing IP preconceptions 
included recommending a system where the “public domain” is the norm and
 any monopoly interest the exception. Exceptions would have to be argued
 on a case-by-case basis and would be granted only when it would be in 
the public interest to do so.&lt;/p&gt;
&lt;p&gt;A consensus seemed to develop that rejecting the idea of IP as a 
right would not be a helpful strategy. However, between the various 
alternative suggestions the only agreement seemed to be that the issue 
requires more exploration so that the nature of IP as a right can be 
better understood. It is anticipated that reaching a definite conclusion
 on this issue will inevitably not satisfy everyone, but would be 
necessary to proceed with an advocacy campaign.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The Right to Culture&lt;/strong&gt;&lt;br /&gt;
As well as the right to property and the right to freedom of expression,
 there is also the right to culture in Article 27 of the UDHR and 
Article 15 of the ICESCR. Both instruments reflect the tension between a
 right to access culture and the competing right of individuals to 
protect the material interests in their intellectual property. 
Participants recommended further exploration of the economic, social and
 cultural rights perspective on IP issues and integrating this into a 
campaign.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Pulling apart multiple IP issues&lt;/strong&gt;&lt;br /&gt;
Participants identified a number of ways in which IP engages freedom of 
expression, and that it is therefore important that a FoE analysis dealt
 with these issues separately. One focus should be on the IP protections
 themselves – these give individuals monopolies over information and 
thereby restrict others’ FoE. Within this, the breadth of exceptions 
regimes is important, as these vary significantly between countries, in 
particular the duration of copyright protection and how ‘fair use’ or 
‘fair dealing’ type exceptions are defined. The use of digital rights 
management systems (DRMS) as preventative measures also relate to this 
area. A second focus, and a current “hot topic” in IP circles, is the 
enforcement agenda. This includes the criminalisation of non-commercial 
IP infringement, the privatisation of policing IP infringement and its 
impact on net neutrality, and criminal and civil law protections for 
DRMS.&lt;/p&gt;
&lt;p&gt;The difference between types of IP was also discussed. There are 
different rationales behind copyright, trademarks, and patents. Our 
approach should be as nuanced and specific as possible – when we are 
criticising copyright we should only refer to copyright and not IP 
generally. Unpacking the issues in relation to the different types of IP
 will be important for developing a coherent policy.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The way that international trade agreements have consistently 
augmented IP rights was also highlighted. In relation to electronic 
data, the copyright holder now has so much control over the use of the 
information, particularly through digital rights management systems 
protected by the criminal law, that purchasing such products is 
increasingly more like renting than owning. This augmentation should be 
tracked and highlighted in an advocacy campaign.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Advocacy Strategy&lt;/strong&gt;&lt;br /&gt;
It was also noted that developing a human rights perspective on IP is 
not only an intellectual pursuit but needs to be viewed in terms of a 
citizen movement capable of achieving outcomes. Participants identified 
several further issues that should be considered when developing an 
advocacy strategy.&lt;/p&gt;
&lt;p&gt;One consideration would be how we develop campaigning alliances. Some
 industries are potential allies, in particular Internet intermediaries 
that are increasingly under pressure to be the private police of 
copyright holders. Some artists themselves are also sympathetic to FoE 
arguments. More obviously, consumers and information users should be 
mobilised by a campaign. It is important to develop distinct strategies 
for targeting identified groups that reflects our understanding of their
 diverse interests; this would allow us to build commonalities between 
actors who may normally be regarded as having divergent objectives, and 
mobilise each to push for change in a direction that supports our 
ultimate goal.&lt;/p&gt;
&lt;p&gt;Central to a campaign strategy is also the idea of having a clear 
message as to what the problem is and how it impacts people on a day to 
day basis. The utility of graphics illustrating the inequitable 
geographic distribution of IP interests was recommended as a useful tool
 to demonstrate the scale of this global problem. Ways of countering 
campaigns conducted by IP holders over the last two decades were also 
discussed, in particular how to push back against the idea of copyright 
infringement as “theft”, as has been promoted through slogans such as 
“you wouldn’t steal a handbag.” Illustrative analogies were discussed, 
including viewing IP infringement as mere trespass rather than theft and
 as “copying” rather than depriving a person of property. However, it 
was concluded that these analogies were helpful for developing our 
understanding of the issues, but would not be as effective as campaign 
tools. An effective campaign would have to distinguish between 
background issues and our actual advocacy points, which would be 
focussed on a clear set of key fundamental principles.&lt;/p&gt;
&lt;p&gt;Participants also identified the importance of engaging governments 
and the media on the inconsistency of their policies and coverage of FoE
 and IP. The US, in particular, is loudly proclaiming its commitments to
 FoE on-line whilst simultaneously promoting aggressive enforcements 
mechanisms for IP that directly undermine FoE rights.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The campaign against ACTA in the European Parliament (EP) was also 
recommended as a platform from which to launch further dialogue on FoE 
and IP. Since the meeting, ARTICLE 19 has released a statement on ACTA 
that we have shared with all participants, and plans to circulate this 
statement to various EP committees and MEPs in the coming weeks.&lt;a name="fr1" href="#fn1"&gt;[1]&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Opportunities for strategic litigation were also identified. In 
particular, there are a number of Article 10 ECHR cases pending before 
the European Court of Human Rights on the blocking of websites, many 
being from Turkey.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Session 2: The tension between freedom of expression and IPR&lt;/h3&gt;
&lt;p&gt;The second session began with a presentation by Gabrielle of the 
background paper on intellectual property and freedom of expression. 
Participants gave feedback on issues raised in the paper and suggested 
ways of developing it into a policy paper to compliment an advocacy 
campaign.&lt;/p&gt;
&lt;p&gt;Gabrielle’s opening comments acknowledged that the background paper 
is very much focussed on FoE in the digital age, and is centred more on 
copyright rather than trademarks and patents. Gabrielle outlined the way
 in which conflicts between tangible property rights and freedom of 
expression have been dealt with by the ECHR. She also identified key 
challenges to reframing understandings of IP, in particular in relation 
to the notion that the public domain and information sharing should be 
the norm while information monopolies should be the exception. Gabrielle
 also highlighted the timeliness of this discussion as significant 
changes to the enforcement agenda are taking place; including the 
criminalisation of copyright infringement and DRMS circumvention.&lt;/p&gt;
&lt;p&gt;Participants agreed that the policy paper was an excellent starting 
point for discussions on FoE and IP, and recommended a number of areas 
for further elaboration in future drafts:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;The objective tone of the paper, placing ARTICLE 19 as an impartial arbiter, is a productive starting point.&lt;/li&gt;&lt;li&gt;The legal framework for IP/FoE should be elaborated to acknowledge
 the right to culture as contained in Article 27 of the UDHR and Article
 15 of the IESCR. The ways that states periodically report their IESCR 
compliance could be explored.&lt;/li&gt;&lt;li&gt;Intermediaries should be referred to in broader terms than just as
 ISPs. “Information society service providers” is an umbrella phrase 
that includes search engines, advertisers, payment services.&amp;nbsp;&lt;/li&gt;&lt;li&gt;The Scarlett decision by the ECJ should be incorporated once it is released.&lt;a name="fr2" href="#fn2"&gt;[2]&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The concept of “filtering” is essentially a type of “blocking”, 
both may be referred to as censorship to clarify their immediate impact 
on FoE.&lt;/li&gt;&lt;li&gt;Some participants felt that explaining why the FoE implications are different for civil and criminal law would be helpful.&amp;nbsp;&lt;/li&gt;&lt;li&gt;Participants felt that the section on the implications of the ACTA regime could be built upon.&lt;a name="fr3" href="#fn3"&gt;[3]&lt;/a&gt;&lt;/li&gt;&lt;li&gt;In developing the section on FoE rights, the Latin American view 
of FoE as a collective right may also be worth emphasising. It may also 
be worth comparing the potential balance between IP and FoE to other 
balancing exercises related to privacy or reputational rights.&amp;nbsp;&lt;/li&gt;&lt;li&gt;The differences between copyright, trademarks and patents should be explained.&amp;nbsp;&lt;/li&gt;&lt;li&gt;A section outlining the philosophical foundations of these 
protections, in particular the difference between the US (incentivise 
creation) and European (natural rights) approach to IP might also be 
helpful.&amp;nbsp;&lt;/li&gt;&lt;li&gt;It should be stressed that the failure of IP law to adapt to new 
technologies is the problem, not new technologies themselves. This 
failure undermines the justifications for protecting IP rights.&amp;nbsp;&lt;/li&gt;&lt;li&gt;Greater emphasis should be placed on the way in which the current 
legal framework is based on an ideal of an 18th century author, and does
 not acknowledge the impact of IP on scientific research and 
collaboration, indigenous knowledge, peer-to-peer sharing, the creative 
power of new technology etc.&amp;nbsp;&lt;/li&gt;&lt;li&gt;Positive examples of IP infringement would be useful for 
illustrating why IP protection shouldn’t be safeguarded at all costs. In
 particular, efforts to make works more accessible to minority language 
speakers (crowd-sourcing methods in particular) and the impact that IP 
law has on blind people’s access to information.&amp;nbsp;&lt;/li&gt;&lt;li&gt;Similarly, examples of censorship that make the impact of IP 
protections of FoE clearer to policy makers would be helpful in 
debunking the myth that the interests of the IP industry giants are 
synonymous with those of the individual creators.&amp;nbsp;&lt;/li&gt;&lt;li&gt;It would also be helpful to illustrate that IP protection is also a
 geographic concentration of wealth issues as much as a moral issue.&lt;a name="fr4" href="#fn4"&gt;[4]&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The role of de minimis exception regimes in protecting FoE should also be explored in greater depth.&amp;nbsp;&lt;/li&gt;&lt;li&gt;Several sources were also recommended, including the Association 
littéraire et artistique internationale (ALAI)&lt;a name="fr5" href="#fn5"&gt;[5]&lt;/a&gt;, the International 
Federation of Libraries Association (Stuart Hamilton identified as a 
contact)&lt;a name="fr6" href="#fn6"&gt;[6]&lt;/a&gt; and the OSCE study on Internet Freedom.&lt;a name="fr7" href="#fn7"&gt;[7]&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;Session 3: Key questions, issues and challenges&lt;/h3&gt;
&lt;p&gt;Dave chaired a third session to elaborate upon the key issues 
discussed prior to lunch, with a view to reaching some level of 
consensus on the appropriate scope of restrictions on freedom of 
expression in defence of IPR.&lt;/p&gt;
&lt;p&gt;Gabrielle offered comments on the balance that could be applied 
between the right to property (Article 1 of Protocol 1 to the ECHR) and 
the right to freedom of expression (Article 10 of the ECHR). However, as
 the European Court of Human Rights has not ruled on the balance that 
ought to be struck between these two rights in the context of 
intellectual property, it is difficult to speculate on how it would be 
litigated.&lt;/p&gt;
&lt;p&gt;Participants agreed that the ‘public interest’ is central to 
assessing when property rights can be restricted to promote other 
rights, including FoE. The need to stress the importance of the Internet
 as a public forum was also identified.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The participants also discussed what limitations are appropriate to 
place on IP rights. Various ideas were suggested, but it was concluded 
that any recommended framework on the substance of IP rights would have 
to be compliant with the Berne Convention. This means that in terms of 
copyright duration, the minimum that could be recommended is 50 years. 
It was also stated that any system that recommends a default public 
domain with a system of registration for copyright “exceptions” would 
not be compliant with Berne. The augmentation of IP rights through these
 international agreements was again referenced, as there appears to have
 been a pattern of the US and EU exporting the worst aspects of their IP
 regimes abroad through trade arrangements without elaborating on how 
exceptions to IP rights should be developed. It was also noted that 
copyright holders will continue to support this process, as their 
business model depends upon having as much control over the use of 
information as possible.&lt;/p&gt;
&lt;p&gt;Again participants identified the need to distinguish between the 
limitations that are imposed on FoE by the IP rights themselves, those 
limitations imposed by preventative technological measures and those 
imposed by enforcement mechanisms.&lt;/p&gt;
&lt;p&gt;The importance of distinguishing the different actors involved was 
also emphasised, i.e. whether we are discussing competing rights between
 private creators (e.g. original creator vs. derivative creator) or the 
direct relationship between the state and individuals (e.g. enforcement 
of criminal provisions against an individual infringing IP). It is 
important that our analysis does not conflate private actors with state 
actors, and that it is clear what positive and negative obligations are 
on these parties and the rationale for their application.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;It was suggested that an approach that balances competing human 
rights is appropriate where the interests of two creators are in 
conflict, but perhaps not when the state intervenes to prevent or punish
 IP infringements. Where the state acts to restrict an individual’s 
access to the Internet, it is not a balance issue but an unnecessary and
 disproportionate interference with the right to freedom of expression.&lt;/p&gt;
&lt;p&gt;Participants stressed the economic and social significance of blanket
 (and even many specific) restrictions on Internet access. Blanket 
prohibitions on access to the Internet was compared to solitary 
confinement, and participants agreed that sanctions such as these are 
never necessary or proportionate responses to IP infringement. An 
analogy was made to a statement recently issued by ARTICLE 19 on 
services to counterfeit mobile telephones being shut down in Kenya.&lt;a name="fr8" href="#fn8"&gt;[8]&lt;/a&gt; 
Participants also indicated that these blanket measures are increasingly
 rare, but that states still violate the principles of necessity and 
proportionality through limitations that they impose.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Further FoE concerns were raised in relation to the enforcement of IP
 rights in the digital environment. In order to monitor the Internet for
 IP infringement, it is necessary to monitor the content of all Internet
 communications. This has implications for FoE rights and privacy 
rights, and has a potential chilling effect on all on-line expression.&lt;/p&gt;
&lt;p&gt;There was also some discussion on defining what our working 
definition of FoE should be in this context, particularly in relation to
 use of new technologies and DRMS. Does FoE necessarily include the 
right to scan a document, to use translation technology on it, to copy 
and paste, to save in various formats etc?&lt;/p&gt;
&lt;p&gt;Participants also discussed that the ordinary de minimis exceptions 
cannot simply be transplanted and applied as ‘exceptions’ or defences to
 DRMS circumvention offences. DRMS limit the use of works severely, and 
unless you have the technical knowledge to circumvent these devices, it 
is not possible to take advantage of exceptions or defences.&lt;/p&gt;
&lt;p&gt;There were also discussions on access to justice issues, due to the 
prohibitively expensive cost of contesting litigation against large 
corporations.&lt;/p&gt;
&lt;p&gt;Several participants mentioned that discussions on these issues have a
 tendency to become too narrow in their focus. Examples given were that 
the focus drifts to copyright rather than trademarks and patents, that 
peer2peer sharing gets more attention than other technology uses, and 
that artistic expression is talked about but not technical or scientific
 forms of expression. At the same time, some participants expressed an 
aversion to a “kitchen sink” approach in any campaign, as it may result 
in an incoherent message.&lt;/p&gt;
&lt;p&gt;Various sources were recommended for further reading. These included a
 report by Consumers International on best state practices (Brazil, 
Canada and South Africa mentioned for enacting progressive legislation 
recently),&lt;a name="fr9" href="#fn9"&gt;[9]&lt;/a&gt; and the UN guidelines on consumer protection.&lt;a name="fr10" href="#fn10"&gt;[10]&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;Session 4: Measures for protecting and enforcing IP rights on the Internet: finding a better balance with FOE&lt;/h3&gt;
&lt;p&gt;At the fourth session, Barbora chaired a discussion on procedural 
issues that pose a threat to freedom of expression and Internet freedom.
 Key issues identified at the outset were whether sticking to a human 
rights view that judicial oversight is the best option or is there a 
human rights compliant alternative model? As it was decided in the 
previous session that disconnection is disproportionate, are all forms 
of criminal liability for Internet use disproportionate? And what limits
 should be placed on civil remedies, such as damages-award ceilings.&lt;/p&gt;
&lt;p&gt;Discussions began on whether an administrative model for notice and 
takedown would be appropriate. Advantages that were identified of 
non-judicial models include:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;An administrative system is more effective in terms of time and 
cost. The number of notice and takedown requests that happen on-line 
would overwhelm a traditional judicial organ.&lt;/li&gt;&lt;li&gt;Protections for intermediaries from liability can be built into the system.&lt;/li&gt;&lt;li&gt;Guidelines can ensure compliance with legal certainty, 
transparency, due process, specificity of remedies, protections for the 
identities of users.&amp;nbsp;&lt;/li&gt;&lt;li&gt;Could also be subject to judicial oversight.&lt;/li&gt;&lt;li&gt;That limitations on cost would also “disarm” corporations who 
would not be able to threaten expensive court procedures that intimidate
 individuals into prematurely settling civil actions.&amp;nbsp;&lt;/li&gt;&lt;li&gt;The need for fast remedies in digital infringements was also 
stressed. For example, a website may be created only for the 90 minutes 
of a football game and then disappear – traditional judicial methods 
cannot be used to provide redress in these circumstances. Although this 
may appear to be a “shoot first, aim later” approach, one needs to 
consider these pragmatic concerns. An administrative model is better 
suited to this than a judicial system.&amp;nbsp;&lt;/li&gt;&lt;li&gt;Alternatives to an administrative model included the use of 
non-legal ombudsmen or arbitration proceedings. These measures could 
also keep costs low. &lt;br /&gt;
  &lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;A number of participants disagreed that an administrative model was 
appropriate. Their concerns focussed on the following issues:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;That the independence of an administrative body could not be guaranteed.&lt;/li&gt;&lt;li&gt;That an administrative procedure should never be used to impose criminal liability.&lt;/li&gt;&lt;li&gt;The procedural guarantees in an administrative system are less 
robust, particularly in countries that do not have a strong separation 
of powers. &lt;br /&gt;
  &lt;/li&gt;&lt;li&gt;That the time and cost of a judicial system is necessary to comply with international human rights standards.&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Concerns were also raised about recommending any boilerplate solution
 that should be ‘copy and pasted’ into all national contexts without 
adequate consideration being paid to that country’s legal system or 
traditions. In terms of accuracy of language, it was also commented that
 notice and takedown affects hosts of content, and not ISPs, who are 
mere conduits.&lt;/p&gt;
&lt;p&gt;Systems in place in Canada and Japan for “notice and notice” were 
also discussed. In these systems, the IP holder notifies the 
intermediary, who notifies the user, who has a time to reply before 
action is taken. The role of the intermediary in this system is to 
facilitate communications and they are not subject to liability. The 
accommodation of “emergency requests” could also be considered within 
this system.&lt;/p&gt;
&lt;p&gt;With any notice and takedown system it would also be important to 
make it clear to those controlling the content how you object to a 
takedown notice. Access to justice principles are important here, 
particularly considering the amount of misinformation that has 
circulated in recent years on the nature of IP infringement.&lt;/p&gt;
&lt;p&gt;Various examples were given of forum shopping by IP owners in 
provincial courthouses where judges are less experienced in IP law and 
therefore more responsive to the arguments of IP holders.&lt;/p&gt;
&lt;p&gt;There was also a discussion on why copyright holders would favour 
criminal sanctions as opposed to civil remedies. On the one hand, it 
seems intuitive that the rights holder would rather receive damages than
 have a person fined or imprisoned by the government. It was suggested 
that the criminal law has the advantage of having a more significant 
chilling effect. Also, in criminal cases, the costs of detection and 
enforcement can be placed on the state.&lt;/p&gt;
&lt;p&gt;A number of initial principles were identified through this discussion:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Intermediaries should be immunised from civil liability.&lt;/li&gt;&lt;li&gt;There should not be liability for hyperlinking. It must be distinguished from “re-publication”.&amp;nbsp;&lt;/li&gt;&lt;li&gt;Non-commercial infringement should not be criminalized. It was 
noted that TRIPS requires commercial scale infringement to be 
criminalized. Narrowly defining what is meant by “commercial” is 
important:&lt;br /&gt;
  &lt;/li&gt;&lt;/ul&gt;
&lt;ol&gt;&lt;li&gt;Peer-to-peer sharing should not be considered commercial.&lt;/li&gt;&lt;li&gt;IP infringement committed by individuals should not be considered commercial. &lt;br /&gt;
  &lt;/li&gt;&lt;/ol&gt;
&lt;ul&gt;&lt;li&gt;The need for clarity in the law and for information on IP law to 
be available to end-users facing litigation threats from copyright 
holders. In particular, states should educate individuals in the 
exceptions to copyright protections that serve the public interest.&lt;/li&gt;&lt;li&gt;Possible limitations on damages could be developed.&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;Session 5: Political developments and strategies of response&lt;/h3&gt;
&lt;p&gt;The purpose of the fifth session was to provide participants with the
 opportunity to discuss developing strategies for working together to 
better combat governments’ attempts at restricting FoE on the basis of 
protecting IP.&lt;/p&gt;
&lt;p&gt;The first priority that was identified was to finalise a policy paper
 on the issue. This would perhaps take some time to formulate, and may 
require further meetings to discuss key issues.&lt;/p&gt;
&lt;p&gt;A second priority for advocacy was identified in relation to ACTA, 
which will be voted upon by the European Parliament in the coming 
months. ARTICLE 19 has issued a statement on ACTA that will also be 
circulated among participants.&lt;/p&gt;
&lt;p&gt;A third discussion concerned the possibility of uncovering a 
wikileaks-type “scandal” in which the hypocrisy of copyrights holders, 
and their true motivations, could be exposed. Receiving internal emails 
from whistleblowers interested in exposing such a story would provide a 
good media storm in which to launch an advocacy campaign. Examples of IP
 industries illegally lobbying governments or interfering with the 
administration of justice would be helpful. The involvement of the 
British Phonographic Industry in lobbying for the Digital Economy Act 
was referenced in this discussion.&lt;/p&gt;
&lt;p&gt;The utility of engaging with the copyright industries was also 
discussed. These industries have a reputation for not negotiating– they 
want as much control over information as possible, as control is 
essential to their business model. There may be some utility in 
identifying who our enemies’ enemies are. It was mentioned that the 
occupy movements may be interested in pursuing a human rights narrative 
against corporate property interests. These groups are very much engaged
 in promoting FoE rights.&amp;nbsp; The traditional media was also identified as a
 group that may be interested in supporting a movement for greater FoE 
protections against IP.&lt;/p&gt;
&lt;p&gt;In terms of developing strategy, it was also recommended that we look
 at successful human rights campaigns from the past, particularly any in
 the field of cultural rights. Potential partners for coalition building
 need to be looked at, and many of these partners may be within emerging
 economies such as BRIC or South Africa.&lt;/p&gt;
&lt;p&gt;As we develop a strategy, we need to remain focussed on framing this 
battle as a human rights fight. We need to identify victims, 
perpetrators, and a call to action. A different plan may be needed for 
each audience that we identify. From the experience of activists at the 
meeting, theoretical arguments will not succeed in rousing a 
people-driven campaign. The use of new media, such as campaign videos on
 youtube, that clearly outline the human rights case would be helpful. 
It is also necessary to bridge the gap between popular campaigns and 
videos, and getting those campaigns into the mainstream media and 
creating a political issue out of it. As technology users that would be 
interested in this campaign tend not to vote, making this a political 
issue means making people who do vote understand the issue as one that 
is a mass-scale human rights violation.&lt;/p&gt;
&lt;h2&gt;Concluding comments and closing&lt;/h2&gt;
&lt;p&gt;Agnès closed the session by identifying several key steps:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;The need to revise the policy paper in light of discussions throughout the day’s sessions.&lt;/li&gt;&lt;li&gt;The need to meet again to discuss the revised policy paper and to continue these discussions.&lt;/li&gt;&lt;li&gt;The objective of developing our role as advocates, identifying 
what we can initiate, what existing efforts we can support, and what our
 overall strategy should be.&lt;/li&gt;&lt;/ul&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a name="fn1" href="#fr1"&gt;1&lt;/a&gt;].ARTICLE 19 statement “European Parliament must reject ACTA”, see: &lt;a class="external-link" href="http://www.article19.org/resources.php/resource/2901/en/european-parliament:-reject-anti-counterfeiting-trade-agreement-%28acta%29"&gt;http://www.article19.org/resources.php/resource/2901/en/european-parliament:-reject-anti-counterfeiting-trade-agreement-%28acta%29&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn2" href="#fr2"&gt;2&lt;/a&gt;].This judgment has since been released. See ARTICLE 19 press release: &lt;a class="external-link" href="http://www.article19.org/resources.php/resource/2872/en/landmark-digital-free-speech-ruling-at-european-court-of-justice"&gt; http://www.article19.org/resources.php/resource/2872/en/landmark-digital-free-speech-ruling-at-european-court-of-justice&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn3" href="#fr3"&gt;3&lt;/a&gt;].ARTICLE 19 has since released a statement on ACTA. See:&lt;a class="external-link" href="http://www.article19.org/resources.php/resource/2901/en/european-parliament:-reject-anti-counterfeiting-trade-agreement-(acta)"&gt; http://www.article19.org/resources.php/resource/2901/en/european-parliament:-reject-anti-counterfeiting-trade-agreement-(acta)&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn4" href="#fr4"&gt;4&lt;/a&gt;].&lt;a class="external-link" href="http://www.worldmapper.org/images/largepng/167.png"&gt;http://www.worldmapper.org/images/largepng/167.png&lt;/a&gt; was recommended for its map of patent distribution in 2002.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn5" href="#fr5"&gt;5&lt;/a&gt;].ALAI homepage: &lt;a class="external-link" href="http://alaiorg.vincelette.net/index.php?option=com_content&amp;amp;task=view&amp;amp;id=50&amp;amp;Itemid=24"&gt;http://alaiorg.vincelette.net/index.php?option=com_content&amp;amp;task=view&amp;amp;id=50&amp;amp;Itemid=24&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn6" href="#fr6"&gt;6&lt;/a&gt;].See a list of publications at: &lt;a class="external-link" href="http://www.ifla.org/en/publications"&gt;http://www.ifla.org/en/publications&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn7" href="#fr7"&gt;7&lt;/a&gt;].OSCE study “Freedom of Expression on the Internet” (2010): &lt;a class="external-link" href="http://www.osce.org/fom/80723"&gt;http://www.osce.org/fom/80723&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn8" href="#fr8"&gt;8&lt;/a&gt;].ARTICLE 19 statement on FoE and counterfeit mobile telephones: &lt;a class="external-link" href="http://www.article19.org/resources.php/resource/2762/en/kenya:-free-expression-standards-should-guide-fight-against-%E2%80%9Ccounterfeit%E2%80%9D-mobile-phones"&gt;http://www.article19.org/resources.php/resource/2762/en/kenya:-free-expression-standards-should-guide-fight-against-%E2%80%9Ccounterfeit%E2%80%9D-mobile-phones&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn9" href="#fr9"&gt;9&lt;/a&gt;].&lt;a class="external-link" href="http://a2knetwork.org/watchlist"&gt;http://a2knetwork.org/watchlist&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn10" href="#fr10"&gt;10&lt;/a&gt;].&lt;a class="external-link" href="http://www.un.org/esa/sustdev/publications/consumption_en.pdf"&gt;http://www.un.org/esa/sustdev/publications/consumption_en.pdf&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/a2k/freedom-of-expression-and-ipr-meeting'&gt;http://editors.cis-india.org/a2k/freedom-of-expression-and-ipr-meeting&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2012-03-16T07:41:39Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/save-your-voice-2014-a-movement-against-web-censorship">
    <title>Save Your Voice — A movement against Web censorship</title>
    <link>http://editors.cis-india.org/news/save-your-voice-2014-a-movement-against-web-censorship</link>
    <description>
        &lt;b&gt;‘Save Your Voice (SYV)’ is a movement against Web censorship and its main demand is the repealing of the Information Technology Act, said SYV founders, Aseem Trividi, a cartoonist, and Alok Dixit, a journalist, on Monday. &lt;/b&gt;
        
&lt;p&gt;DNA Correspondent covered a press conference held on March 12, 2012 in Bangalore. Sunil Abraham was quoted in the story.&lt;/p&gt;
&lt;p&gt;Trivedi’s website — www.cartoonistagainstcorruption.com — was banned during Anna Hazare’s movement. Trivedi said: “Mumbai police banned the website without any prior notice and cases of ‘treason’ were also filed. The website was banned without a judicial order and I haven’t received an explanation about the crime committed.”&lt;/p&gt;
&lt;p&gt;Sunil Abraham, executive director, Centre for Internet and Society, said the private sector does not protect the freedom of expression.&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.dnaindia.com/bangalore/report_save-your-voice-a-movement-against-web-censorship_1661820"&gt;Read the original published by Daily News &amp;amp; Analysis on March 13, 2012&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/save-your-voice-2014-a-movement-against-web-censorship'&gt;http://editors.cis-india.org/news/save-your-voice-2014-a-movement-against-web-censorship&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-03-13T11:44:27Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/wordprss-webmaster">
    <title>Short-Term Consultant Required: Wordpress Webmaster</title>
    <link>http://editors.cis-india.org/news/wordprss-webmaster</link>
    <description>
        &lt;b&gt;CIS wishes to commission the improvement of the Privacy India website. The Privacy India website should have a well-organized interface and easily navigable&lt;/b&gt;
        
&lt;p&gt;&lt;strong&gt;Requirements:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;WordPress developer with sufficient relevant experience&lt;/li&gt;&lt;li&gt;Experience in content management&lt;/li&gt;&lt;li&gt;Proven webmaster track record&amp;nbsp;&lt;/li&gt;&lt;li&gt;Savvy and creative&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;To apply for this position, please send your CV to Natasha Vaz (&lt;a class="external-link" href="mailto:natasha@cis-india.org"&gt;natasha@cis-india.org&lt;/a&gt;)&lt;/p&gt;
&lt;p&gt;&lt;a href="http://editors.cis-india.org/news/www.privacy-india.org" class="external-link"&gt;Click here&lt;/a&gt; for the Privacy India website.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/wordprss-webmaster'&gt;http://editors.cis-india.org/news/wordprss-webmaster&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-03-13T11:27:34Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/events-coordinator">
    <title>Short-Term Consultant Required: Events Coordinator</title>
    <link>http://editors.cis-india.org/news/events-coordinator</link>
    <description>
        &lt;b&gt;CIS wishes to commission the planning of 3 privacy meetings in total, scheduled during May and June. Meetings should be well-organized, planned and promoted effectively.&lt;/b&gt;
        
&lt;p&gt;The Events Coordinator should:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Choose a central and convenient Venue&lt;/li&gt;&lt;li&gt;Create the program&lt;/li&gt;&lt;li&gt;Involve relevant multi-stakeholder partners, participants and media&lt;/li&gt;&lt;li&gt;Work with the Privacy India team to organize panels of expert speakers on the topic of discussion&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;To apply for this position, please send your CV to Natasha Vaz (&lt;a class="external-link" href="mailto:natasha@cis-india.org"&gt;natasha@cis-india.org&lt;/a&gt;)&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/events-coordinator'&gt;http://editors.cis-india.org/news/events-coordinator&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-03-13T11:22:08Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/questioning-the-radical-potential-of-citizen-action">
    <title>Digital Natives and the Myth of the Revolution: Questioning the Radical Potential of Citizen Action</title>
    <link>http://editors.cis-india.org/news/questioning-the-radical-potential-of-citizen-action</link>
    <description>
        &lt;b&gt;At UC Santa Cruz, on Monday, March 5, 2012,  Nishant Shah gave a lecture on "Digital Natives and the Myth of the Revolution: Questioning the Radical Potential of Citizen Action". The lecture focused more on the India Against Corruption case-study rather than the theoretical framework to understanding revolutions.&lt;/b&gt;
        
&lt;p&gt;This talk is a thought-in-progress inquiry into the radical claims and potentials of citizen action which has emerged in the last few years in several parts of the world. It seeks to show how citizen action is not necessarily a radical form of politics and that we need to make a distinction between Resistances and Revolutions. It locates Resistance as an endemic condition of governmentality within a State-Citizen-Market relationship and shows how it often strengthens the status-quo rather than radically undermining it. Looking at one particular instance of a campaign against corruption in India, Nishant is seeking to build a framework that can&amp;nbsp; be deployed to understand the dissonance between the claims of the future and the practices of the present that gets produced in such instances of citizen action.&lt;/p&gt;
&lt;p&gt;Follow the original on the&lt;a class="external-link" href="http://film.ucsc.edu/news_events/2012/02/27/nishant_shah"&gt; UC Santa Cruz website&lt;/a&gt;&lt;br /&gt;&lt;a class="external-link" href="http://havc.ucsc.edu/news_events/2012/02/29/digital-natives-and-myth-revolution-questioning-radical-potential-citizen-act"&gt;Also see this &lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/questioning-the-radical-potential-of-citizen-action'&gt;http://editors.cis-india.org/news/questioning-the-radical-potential-of-citizen-action&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Natives</dc:subject>
    

   <dc:date>2012-04-03T07:15:23Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/consumers-international-meeting-2012">
    <title>Consumers International Global Meeting 2012</title>
    <link>http://editors.cis-india.org/news/consumers-international-meeting-2012</link>
    <description>
        &lt;b&gt;Pranesh Prakash participated in the Consumers International Global Meeting held in Kuala Lumpur on March 8 and 9, 2012. He spoke on UN Consumer Guidelines. Robin Brown, Tobias Schönwetter and Guilherme Varella were the other speakers in the session.&lt;/b&gt;
        
&lt;h3&gt;Wednesday 7 March&lt;/h3&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;6:45pm&lt;/td&gt;
&lt;td&gt;Anwar Fazal speech on 50th anniversary of JFK Consumer Rights&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;7:00pm&lt;/td&gt;
&lt;td&gt;Dinner hosted by FOMCA&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Thursday 8 March&lt;/h3&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;8:30am&lt;/td&gt;
&lt;td&gt;Registration&lt;br /&gt;
&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;9:00am&lt;/td&gt;
&lt;td&gt;Welcome (Helen McCallum)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;9:30am &amp;nbsp; &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Introduction and overview (Jeremy Malcolm)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;10:00am&lt;/td&gt;
&lt;td&gt;Introduction to Digital Personal Property (Paul Sweazey)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;11:00am&lt;/td&gt;
&lt;td&gt;Break&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;11:30am&lt;/td&gt;
&lt;td&gt;UN Consumer Guidelines (Robin Brown, Tobias Schönwetter, Pranesh Prakash, Guilherme Varella)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1:00pm&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;2:00pm&lt;/td&gt;
&lt;td&gt;Consumer Protection and IP Abuse Prevention under the WTO Framework (George Tian)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;3:00pm&lt;/td&gt;
&lt;td&gt;Internet governance and consumers (Peng Hwa Ang)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4:00pm&lt;/td&gt;
&lt;td&gt;Break&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4:30pm&amp;nbsp; &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Public Interest Representation in the Information Society (Norbert Bollow)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5:30pm&lt;/td&gt;
&lt;td&gt;Consumers in the information society (Jeremy Malcolm)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;6:30pm&lt;/td&gt;
&lt;td&gt;Break&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;7:30pm &amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;Cultural and culinary outing to pasar malam&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Friday 9 March&lt;/h3&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;8:30am&lt;/td&gt;
&lt;td&gt;Registration&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;9:00am&lt;/td&gt;
&lt;td&gt;M-Lab (Lih Shiun Goh from Google Singapore)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10:00am&lt;/td&gt;
&lt;td&gt; Internet and human rights (Alan Finlay from Association for Progressive Communications)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:00am &amp;nbsp; &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Break&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;11:30am &amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;Global consumer survey on broadband (Jeremy Malcolm, Veridiana Alimonti, Elise Davidson, Marzena Kisielowska-Lipman)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1:00pm &amp;nbsp;&amp;nbsp;&lt;/td&gt;
&lt;td&gt; Lunch&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;2:00pm&lt;/td&gt;
&lt;td&gt; Cyber-security concerns for consumers and businesses (Raj Kumar, IMPACT)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3:00pm&lt;/td&gt;
&lt;td&gt;Broadband nutrition label (Benjamin Lennett, New America Foundation)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4:00pm &amp;nbsp;&amp;nbsp;&lt;/td&gt;
&lt;td&gt; Break&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4:30pm&lt;/td&gt;
&lt;td&gt;Reporting back – open time for member presentations&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;6.00 pm&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Close&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2&gt;Abstracts and biographies&lt;/h2&gt;
&lt;h3&gt;United Nations Guidelines for Consumer Protection&lt;/h3&gt;
&lt;p&gt;This paper provides background to the proposed amendments to update the United Nations Guidelines for Consumer Protection for the digital age. A soft-law instrument, the Guidelines provide an influential standard for the dissemination of good practices in consumer protection, as a mechanism to foster and promote social and economic development. They outline eight areas for developing policies for consumer protection, which are reflected by the eight consumer rights declared by the global consumer movement: rights to satisfaction of basic needs, safety, choice, information, consumer education, redress, representation and a health environment.&lt;br /&gt;&lt;br /&gt;The paper outlines the current global regime of public policy developmment and regualtion relating to access to knowledge. Indicating that many of the issues of concern in terms of access to knowledge are essentially consumer issues it argues that amendments to the Guidelines would form the basis for progress. The paper then details the proposed amendments explaining the basis for each one.&lt;br /&gt;&lt;br /&gt;Joining Robin Brown on the panel will be representatives from our research partners in India, Brazil and South Africa who will be contributing to our research on the Guidelines.&lt;br /&gt;&lt;br /&gt;Robin Brown has 25 years of experience in consumer and business regulatory affairs. He spent 10 years as the chair and chief executive of Australia’s national consumer body, the Australian Federation of Consumer Organisations. Robin has been involved in projects to advance consumer protection and competition policy and regulation in a number of developing countries. In recent years Robin has served as a Councilor of the Australian Consumers’ Association. He holds a BA and a Master of Public Policy from the Australian National University.&lt;br /&gt;&lt;br /&gt;Pranesh Prakash is Programme Manager at the Centre for Internet and Society, Bangalore. He is a graduate with a degree in Arts and Law from National Law School, Bangalore, with a keen interest in the law, economics, and culture of intellectual property rights.&amp;nbsp; He helped found the Indian Journal of Law and Technology, and was part of its editorial board for two years.&amp;nbsp; He is most interested in interdisciplinary research on IP and property law, freedom of speech, and privacy. He has worked with practising lawyers, civil society organizations, and law firms.&lt;br /&gt;&lt;br /&gt;Tobias Schönwetter is a Senior Manager within PricewaterhouseCoopers' South African practice performing legal advisory services specifically relating to innovation, technology and intellectual property (copyright and trademarks). Tobias has studied and practised law in Germany, the US and South Africa and he has led the copyright division at UCT's Intellectual Property Law and Policy Research Unit for several years. His international experience, together with his leadership roles in a number of intellectual property-related projects and research collaborations such as the African Copyright and Access to Knowledge (ACA2K) project and the Open AIR (African Innovation Research and Training) project, has secured his place as an industry expert within the intellectual property and technology sector.&lt;br /&gt;&lt;br /&gt;Guilherme Varella is a lawyer at Idec (Brazilian Institute for Consumer Defense) in telecomunications, Internet and access to knowledge and Master's student in public policies of culture in the Law School of Universidade de São Paulo (University of São Paulo - USP).&lt;/p&gt;
&lt;p&gt;The event was sponsored by the Ford Foundation, the Open Society Institute and IDRC/CRDI. For more information, &lt;a class="external-link" href="http://a2knetwork.org/infosoc2012#un-consumer-guidelines"&gt;see here&lt;/a&gt; on the Access to Knowledge website.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/consumers-international-meeting-2012'&gt;http://editors.cis-india.org/news/consumers-international-meeting-2012&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Consumer Rights</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2012-04-03T07:54:56Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/big-bet-on-identity">
    <title>India’s Big Bet on Identity</title>
    <link>http://editors.cis-india.org/news/big-bet-on-identity</link>
    <description>
        &lt;b&gt;The world’s largest biometric authentication system reaches its first major milestone, but lots of challenges remain, writes Joshua J. Romero in ieeespectrum. Sunil Abraham was quoted in this story which was featured in March 2012 edition.&lt;/b&gt;
        
&lt;p&gt;&lt;strong&gt;Driving around Bangalore&lt;/strong&gt;, it’s immediately clear that the infrastructure hasn’t kept up with the IT boom in this once-sleepy South Indian city. Auto rickshaws, scooters, and motorcycles squeeze into a tight phalanx at each red light and choke the air with exhaust. Construction, such as the concrete supports of the new metro rail line that looms overhead, causes detours everywhere, and in spots the entire road abruptly disintegrates into gravel.&lt;/p&gt;
&lt;p&gt;But something miraculous happens as you make your way south, past the outer ring road. A ramp lifts a select few vehicles out of the weaving traffic and onto an elevated tollway, where you suddenly have a bird’s-eye view of the urban landscape. This is the road to Electronic City, an oasis of glass and steel high-rises overlooking pristine black asphalt paths that snake through the perfectly manicured lawns of tech companies like Wipro, IBM, and Infosys Technologies.&lt;/p&gt;
&lt;p&gt;“If you can have such good roads in the Infosys campus, why are the roads outside so terrible?” That’s the common question foreign visitors would ask Nandan Nilekani, one of the company’s cofounders. “Politics” was his usual reply, according to Nilekani’s 2008 book, Imagining India. Now the man who has been called the Bill Gates of India has jumped into politics to try to use what he learned at the IT giant to transform the dysfunctional country that lies beyond the borders of Electronic City.&lt;/p&gt;
&lt;p&gt;Since July 2009, Nilekani has been a cabinet minister, leading hundreds of engineers and entrepreneurs as chairman of the Unique Identification Authority of India (UIDAI). By the most conservative estimates, &lt;a class="external-link" href="http://ibnlive.in.com/news/its-official-37-live-below-poverty-line/113522-3.html"&gt;at least a third of the country’s 1.2 billion citizens live below the poverty line&lt;/a&gt; and outside the formal economy. The UIDAI is expected to connect those hundreds of millions of people to government programs, save public money, reduce fraud and corruption, and foster new business opportunities—all by creating an unprecedented biometric system and outside the formal economy. The UIDAI is expected to connect those hundreds of millions of people to government programs, save public money, reduce fraud and corruption, and foster new business opportunities—all by creating an unprecedented biometric system.&lt;/p&gt;
&lt;p&gt;“On the one hand, within India and across the world, people of Indian descent have done some remarkable work,” says Nilekani. “And on the other hand, here is a country that needs to solve some very basic problems. This project marries these two worlds.” UIDAI plans to use fingerprints and iris scans to assign every person in the country a unique &lt;a class="external-link" href="http://uidai.gov.in/what-is-aadhaar-number.html"&gt;12-digit ID number&lt;/a&gt; that can be verified online. It’s one of the biggest IT projects in the world, and getting bigger: By early February, &lt;a class="external-link" href="https://portal.uidai.gov.in/uidwebportal/dashboard.do"&gt;the UIDAI had issued 130 million ID numbers&lt;/a&gt;, and it can issue up to a million more IDs every day. The agency has set up 36 000 enrollment stations staffed by 87 000 certified enrollment operators. In India the project is called Aadhaar, &lt;a class="external-link" href="http://www.deccanherald.com/content/212980/how-does-govt-justify-aadhaar.html"&gt;which means “foundation” or “support&lt;/a&gt;,” because it’s meant to be a fundamental technology platform that will enable dozens of new public and private services to be created.&lt;/p&gt;
&lt;p&gt;That’s if it all works. It’s easy to list major challenges: How exactly do you collect biometrics from every single person in the world’s second most populous country, especially those living at the margins? How do you keep bad data from getting into the database in a country rife with corruption? And how can you build the entire system around online authentication in a country where&lt;a class="external-link" href="http://www.google.com/publicdata/explore?ds=d5bncppjof8f9_&amp;amp;ctype=l&amp;amp;strail=false&amp;amp;bcs=d&amp;amp;nselm=h&amp;amp;met_y=it_net_user_p2&amp;amp;scale_y=lin&amp;amp;ind_y=false&amp;amp;rdim=region&amp;amp;idim=country:IND&amp;amp;ifdim=region&amp;amp;tstart=-310503600000&amp;amp;tend=1298955600000"&gt; fewer than one in 20 people have access to the Internet&lt;/a&gt;?&lt;/p&gt;
&lt;p&gt;The answers to these questions are getting more than the usual amount of scrutiny, because a lot of political fortunes are riding on the UIDAI.&lt;br /&gt;&lt;br /&gt;The program has been heavily supported by the ruling Indian National Congress party; Nilekani was appointed by the prime minister himself, Manmohan Singh. But Singh and his Congress party have had a difficult time enacting many of their biggest policy goals, and the UIDAI has increasingly become the target of criticism.&lt;br /&gt;&lt;br /&gt;Earlier this year, the whole scheme seemed in imminent danger of collapse, when a parliamentary committee killed the bill that would have given the program statutory authority, and a political turf war erupted between the UIDAI and the National Population Register, another government project collecting biometrics for the national census. But by late January the two sides &lt;a class="external-link" href="http://www.livemint.com/2011/10/24002230/Govt-approves-Rs-8800-crore-f.html"&gt;had reached an agreement&lt;/a&gt; to share biometric data collection, and Aadhaar is once again moving full steam ahead with a new mandate and &lt;a class="external-link" href="http://uidai.gov.in/images/FrontPageUpdates/budget_estimates_2011_12.pdf"&gt;an estimated budget this year of 15 billion rupees [PDF]&lt;/a&gt; (about US $300 million).&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center"&gt;&lt;img src="http://editors.cis-india.org/home-images/joshua.jpg/image_preview" alt="joshua" class="image-inline image-inline" title="joshua" /&gt;&lt;/p&gt;
&lt;div align="center" class="artBdyImgBy"&gt; Photo: Joshua J. Romero&lt;/div&gt;
&lt;strong&gt;EXISTING DOCUMENTS: &lt;/strong&gt;A poster lists the variety of IDs a  person can use to register for an Aadhaar number.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;div align="center" class="artBdyImgCptn"&gt;
&lt;div align="left"&gt;&lt;strong&gt;To understand why the government&lt;/strong&gt; has invested so heavily, it helps to know the current state of affairs in India. Aadhaar is meant to provide a form of identification that’s free, national, impossible to counterfeit—and available to everyone. “There’s an ID divide,” Nilekani explains, between people who have multiple official IDs and the hundreds of millions who have none. Only about 60 million people in India have passports, he says, and only about 100 million have photo ID bank cards. The most prevalent document is a voter ID card, which has been issued to about 700 million people, covering just over half of the country. But these and the rest of the official IDs created by the country’s vast bureaucracy all have shortcomings.&lt;br /&gt;&lt;br /&gt;The primary reason for creating a biometric ID system is to give India’s poorest citizens better access to an array of welfare programs. India spends about 2 percent of its gross domestic product on social programs like the Public Distribution System, which provides subsidized rice, wheat, and other staples, and a rural employment scheme that guarantees 100 days of work. But all such programs suffer from severe ­“leakage”: According to the World Bank, &lt;a class="external-link" href="http://www.worldbank.org.in/WBSITE/EXTERNAL/COUNTRIES/SOUTHASIAEXT/INDIAEXTN/0,,contentMDK:22915689~pagePK:141137~piPK:141127~theSitePK:295584,00.html"&gt;corrupt officials and middlemen siphon away 59 percent of the money&lt;/a&gt; before it reaches the intended recipients. Eventually, the government hopes to provide funds directly to each person who needs them.&lt;br /&gt;&lt;br /&gt;Most states issue ration cards, but they usually aren’t valid in other states. An official ID that can be used throughout the country is increasingly important as more and more people move away from their hometowns to follow employment, Nilekani says.&lt;br /&gt;&lt;br /&gt;Complicating the problem further, existing ID cards are easy to duplicate. Some states have more names on their food ration lists than there are people living in the state. To fight counterfeiting, the Aadhaar team decided to use biometrics instead of issuing just another ID card. From the beginning, they consulted biometric experts, used existing standards when they could, and studied similar systems like the U.S. Visitor and Immigrant Status Indicator Technology program, run by the U.S. Department of Homeland Security.&lt;br /&gt;&lt;br /&gt;One thing the team realized early on is that a single biometric measurement wasn’t enough to guarantee uniqueness. In proof-of-concept studies, researchers determined that only by using all 10 finger­prints and a scan of both irises could error rates be kept manageable. Adding iris scans also makes the program more inclusive for people whose fingerprints have been worn down by manual labor.&lt;br /&gt;
&lt;div align="center"&gt;&amp;nbsp;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;div align="center"&gt;&lt;img src="http://editors.cis-india.org/home-images/necessarygear.jpg/image_preview" alt="necessarygear" class="image-inline image-inline" title="necessarygear" /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div align="center"&gt;Photos, clockwise from left: Ruth Fremson/The New York Times/Redux; Joshua J. Romero (2)&lt;br /&gt;NECESSARY
 GEAR: Each enrollment station has the same basic set of equipment, 
including an iris scanner [top], a fingerprint scanner [bottom right], a
 webcam and light [bottom left], a laptop, a second monitor for the 
resident to view, and a scanner and printer to handle documents.&lt;/div&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;br /&gt;
&lt;div align="left"&gt;&lt;strong&gt;Getting an Aadhaar number&lt;/strong&gt; is not a quick process. One Friday after midnight, I watch dozens of families wait patiently in a municipal building where only half the lights are on and there’s always a baby crying. While Anurodh Kanchan waits, he explains that he came at this hour because he’d heard the lines were even longer during the day. He’d already been once before to schedule this appointment. Now his 7-year-old daughter dozes on his wife’s shoulder as the whole family waits another half an hour for the enrollment agent to return from a break.&lt;br /&gt;&lt;br /&gt;Hiring and training people to work as agents has been one of the project’s biggest logistical challenges. The UIDAI outsources enrollment to “registrars”—often state governments or banks—which in turn hire accredited agencies to actually set up and staff the centers. The agencies get paid a flat rate for each successful enrollment, as do the agents they hire. A coordinator for one of the largest agencies told me that his organization had significantly overestimated how many enrollments an agent could complete in a day. UIDAI says that an average station (see photos, “Necessary Gear”) can process each enrollment in under 10 minutes, but in the days I spent observing, it wasn’t uncommon for the process to take twice as long. And if you’re an agent looking at a line of people stretching out the door, it’s easy to see how you might begin to rush through your tasks.&lt;br /&gt;&lt;br /&gt;That’s why enforcing quality is left to a piece of software known as the enrollment client, installed on each agent’s laptop. The program manages every step of the process and was developed jointly by engineers at UIDAI and MindTree, an Indian IT company. Because enrollment often takes place in remote locations with no Internet access, the client must be fully independent and be able to run off a single laptop. The developers also had to make sure that the enrollment client could work seamlessly with any of the 11 ­biometric devices from various manufacturers that had been certified for use. And the initial version had to be built fast: MindTree won the contract at the end of April 2010, and the UIDAI wanted to enroll the first resi­dent by that August.&lt;br /&gt;&lt;br /&gt;MindTree met the deadline, and the client it designed now manages to prevent and correct most errors an enrollment agent might make. In addition to a simple quality check, the software looks for self-consistency—for instance, verifying that each fingerprint isn’t coming from the operator or another recently enrolled resident and that all 10 fingerprints and two irises are distinct from each other. If something goes wrong in a biometric capture, the software tells the operator how to correct it—for instance, it can distinguish between a facial photo that’s too dark and one in which the person was photographed at the wrong angle.&lt;br /&gt;&lt;br /&gt;Still, over the last 21 months, the software engineers have had to continually improve the program to address new challenges encountered in the field. For example, when the UIDAI began enrolling people in the Punjab region of North India, where many men wear long beards and large turbans, enrollment agents had a hard time taking a photo that the software considered acceptable: The turban would be interpreted as an unacceptable background, or the automatic cropping feature would crop around the turban instead of the face. The software team was able to quickly tweak the parameters and release a new version of the client so that enrollment could continue.&lt;br /&gt;&lt;br /&gt;It isn’t just the biometric collection that’s tricky. A resident must also supply basic demographic data—name, age, gender, and address. Residents can fill out paper forms in any of the 16 official Indian languages, which agents must first transfer to the computer and then translate into an English version of the form. This is by far the most time-consuming part of the process, and MindTree has tried to speed it up by building transliteration into the client software. But Indic languages have many variations—some are written right to left, and many use unique character sets. Still, the agent is expected to check the results and clean up minor mistakes.&lt;br /&gt;&lt;br /&gt;There are obviously both privacy and security concerns when you’re collecting personal data from more than a billion people. “You can’t change your biometrics,” points out Sunil Abraham, the &lt;a href="http://editors.cis-india.org/about/people/staff/cis-staff" class="external-link"&gt;execu­tive director at the Center for Internet and Society&lt;/a&gt;, in Bangalore, so if they become compromised, it’s a difficult problem to fix.&lt;br /&gt;&lt;br /&gt;Among the precautions the UIDAI takes is to encrypt all data as soon as they’re collected. The data can be decrypted only by UIDAI servers, so the records aren’t even accessible to the operator or enrollment agency that collected them. At the end of each day, all the encrypted enrollment data are stored on USB flash drives, and the drives are transported to a place with Internet access so the data can be uploaded to UIDAI’s servers. It’s in the best interests of the enrollment agencies to safeguard the data, because otherwise they won’t get paid.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;From the enrollment ­centers &lt;/strong&gt;the action moves to the racks of servers at the UIDAI Central Information Data Repository, which is also in Bangalore. Here is where dedupli­cation—checking each new enrollment against every other record in the database—will arguably make this identity scheme rise above the rest. Ensuring that no person can get two numbers is key to making biometrics a worthwhile investment. A few years ago, one Indian state collected biometrics for everyone below the poverty line, but it didn’t have the technology or a plan to prevent duplicates. It ended up capturing 1.2 times the population, which resulted in a significant leakage of benefits.&lt;br /&gt;&lt;br /&gt;Many critics, including members of Parliament, have doubted that it’s even possible to deduplicate records from the entire Indian populace. It’s certainly a big task. In order to issue 1 million Aadhaar numbers in a single day, the current maximum rate, the data center must conduct 100 trillion person matches. To improve this process, the UIDAI came up with an unusual arrangement. Rather than hiring a single firm for the job, it awarded the project to three contractors, each responsible for processing a portion of the enrollments, with the overlapping records used to compare performance between the systems. This arrangement lets the UIDAI know if a system isn’t working correctly and also gives the companies a financial incentive to improve their software—they’ll get to process more records, and get paid more, if their products perform better. The vendors were even required to use the same kind of hardware to build their systems, so the agency isn’t tied to any one company.&lt;br /&gt;&lt;br /&gt;In late January, the UIDAI released &lt;a class="external-link" href="http://uidai.gov.in/images/FrontPageUpdates/role_of_biometric_technology_in_aadhaar_jan21_2012.pdf"&gt;a report [PDF]&lt;/a&gt; that for the first time detailed the results of this deduplication effort. There are two primary factors that determine the accuracy of a biometric system: the false-positive rate, which in this case is how often a newly registered person is incorrectly judged to be already enrolled, and the false-negative rate, which is how often true duplicates are not recognized as such. To measure the false-positive rate, the UIDAI tested 4 million unique records against a subset of the enrollment database containing 84 million records: Of the unique records, 2309 were falsely rejected, for a false-­positive rate of 0.057 percent. The agency also tested 31 399 known duplicates. The system caught all but 11, for a false-­negative rate of 0.035 percent.&lt;br /&gt;&lt;br /&gt;The false-positive rate applies to the total number of records in the database. As that number grows, the rate should increase in a linear fashion, because there are more opportunities for false matches. The false-negative rate, on the other hand, applies only to the small minority of enrollments that really are true duplicates (the UIDAI estimates that these make up only 0.5 percent of all incoming enrollments). Because the false-­negative rate doesn’t depend on the total number of records, it should remain steady unless more people try to enroll multiple times.&lt;br /&gt;&lt;br /&gt;R.S. Sharma, the director general of UIDAI, says that preventing all duplicates with technology alone is impossible. There are some people who just can’t be uniquely identified through biometrics, because the data for them aren’t good enough—­children under age 5, for instance, and people with multiple disabilities. That’s why the responsibility for accuracy and uniqueness isn’t all left up to the software. Several full-time employees manually review the roughly 0.2 percent of cases that the software can’t handle, resolving errors and looking for evidence of fraud.&lt;br /&gt;&lt;br /&gt;Even if the system isn’t perfect, it’s likely to be much better than any existing alternative, simply because it will elimi­nate “ghost identities,” says M.R. Madhavan, who works at the Centre for Policy Research, in New Delhi. “At least people who died in 1995 or 2005 will not get into the system,” he says.&lt;br /&gt;&lt;br /&gt;
&lt;div align="center"&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;div align="center"&gt;&lt;img src="http://editors.cis-india.org/home-images/authentication.jpg/image_preview" alt="authentication" class="image-inline image-inline" title="authentication" /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div align="center" class="artBdyImgBy"&gt; Photo: Joshua J. Romero&lt;/div&gt;
&lt;div align="center" class="artBdyImgCptn"&gt; &lt;strong&gt;AUTHENTICATION TERMINAL: &lt;/strong&gt;Widespread use of Aadhaar will  rely on biometric terminals, like this prototype at MindTree.&lt;/div&gt;
&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;div align="left"&gt;&lt;strong&gt;Now that the UIDAI &lt;/strong&gt;has shown it can collect biometric and demographic data and eliminate duplicate enrollments, much of the attention will shift to the authentication system, where people can prove their identity with just the swipe of a finger. Such systems are still under development, so most residents I met weren’t clear about the benefits of the program. When I asked people why they were enrolling, they often had vague reasons: “It might make it easier to get my benefits,” said one middle-aged woman in Bangalore. “I heard you’ll need it to buy heating gas,” said another woman. “I think it’s mandatory,” an elderly man told me. Nilekani thinks that getting authentication services up and running will be the best way to demonstrate the power of the entire project.&lt;br /&gt;&lt;br /&gt;Here’s how such a futuristic system might work: Walking up to a wirelessly connected terminal at a local shop, a person will type in his name and Aadhaar number, and then he’ll scan his fingerprints. The data will be sent to a central database, where the Aadhaar number will be used to locate his record. The submitted name and biometric data will be compared to those on file, and the software will determine whether they match.&lt;br /&gt;&lt;br /&gt;The UIDAI imagines that such biometric terminals will eventually be ubiquitous. The first devices deployed will ­likely be micro-­ATMs in rural shops. These machines process transactions electronically, just like a full-size ATM, ­except they don’t store and dispense cash—that gets handled from the shopkeeper’s till. The hope is that such systems will ­deliver ­financial services to the 40 percent of the Indian population who have never had bank accounts. When people enroll for Aadhaar, they simply need to check a box and an Aadhaar-­enabled bank account will be created for them.&lt;br /&gt;&lt;br /&gt;In January, the UIDAI began a pilot project in the state of Jharkhand, where workers in the rural employment program could collect cash payments by scanning their fingerprints at a micro-ATM. Another pilot program in Maharashtra transferred small amounts of money to individual Aadhaar numbers, showing that bank servers could be easily linked with the UIDAI system.&lt;br /&gt;&lt;br /&gt;The authentication system is already available as an application programming interface (API), which means it won’t be limited to just government programs and banks. Private service providers could use it to verify new customers as well. Take India’s vaunted mobile-phone culture: Phone companies are currently required to collect and retain significant documentation for every person they sell a SIM card to, as I found out in the two days I spent collecting the photos and local references I needed to get one myself. “If you look at any service provider, they’re not going to offer the mobile-phone service unless they verify who you are,” says Bala Parthasarathy, an entrepreneur who worked in Silicon Valley but came back to India to volunteer on the project for a year. Parthasarathy says that using Aadhaar for identity verification could provide the telephone companies with major savings.&lt;br /&gt;&lt;br /&gt;Still, setting up a nationwide network of biometric terminals has plenty of its own challenges. First, India will need better connectivity. Wireless voice networks now cover most of the country, but wireless data networks have trailed behind. Current penetration of 3G is mostly just in the cities, says Debabrata Das, an IEEE member and a professor of electrical engineering at the International Institute of Information Technology, Bangalore, who has been studying the network challenges of authentication as a technical advisor for the state of Karnataka.&lt;br /&gt;&lt;br /&gt;The API will also need to be flexible enough to handle varia­tions in the demographic data that are submitted. The system can’t enforce strict matches: Many Indians use initials in their names, and there is no guarantee that they will always spell their names the same way in English. Further, sometimes a married woman will use her father’s family name instead of her husband’s. Because of the ambiguity in names and addresses, the database must be able to perform partial and fuzzy matches. Eventually, Sharma says, the UIDAI hopes to be able to do database matching for all the Indian languages as well, so the API will continue to undergo revisions.&lt;br /&gt;&lt;br /&gt;Now the UIDAI must wait for its partners to begin taking advantage of the system, and Nilekani admits that starting up such services is largely beyond his control. Cooperation with other agencies and industries is all part of Nilekani’s approach to how government initiatives should work. “The big thing to my mind has been, How do you create a model of change, and how do you carry a lot of people with it? How do you think this through in a way that everyone comes on board?” he says. In building the project to this point, he’s managed to bring, if not everyone, then certainly a pretty diverse crowd: technical experts; national, state, and local officials; banks and businesses; and all those millions who willingly wait in line for hours.&lt;br /&gt;&lt;br /&gt;“Everyone puts their own aspirations on it…like Obama,” he jokes. But the downside of being so inclusive is that as the project matures, it may be difficult to keep all the interested parties happy, and there’s bound to be disappointment if the project fails to achieve all its lofty ambitions.&lt;br /&gt;&lt;br /&gt;The project has made it this far by adapting quickly as problems arise. “Think of it as multigeneration, continuous improvement,” Nilekani says. “You launch and get feedback and you get criticism. You need to build a rapid feedback loop, which is what we’ve built.”&lt;br /&gt;&lt;br /&gt;&lt;a class="external-link" href="http://m.spectrum.ieee.org/computing/software/indias-big-bet-on-identity/0"&gt;Read the original here&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/big-bet-on-identity'&gt;http://editors.cis-india.org/news/big-bet-on-identity&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-03-07T05:44:12Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/digital-natives/media-coverage/an-experiment-in-social-engineering">
    <title>An Experiment in Social Engineering: The Cultural Context of an Avatar</title>
    <link>http://editors.cis-india.org/digital-natives/media-coverage/an-experiment-in-social-engineering</link>
    <description>
        &lt;b&gt;Pramod K. Nayar reviews Nilofar Shamim Ansher’s essay ‘Engineering a Cyber Twin’ (Digital Alternatives with a Cause? Book One: To Be).&lt;/b&gt;
        
&lt;p&gt;‘Engineering a Cyber Twin’ is an attempt to inventory the ontological features of an avatar. Beginning with the assumption that representation of the self – which implies, at once, recognition of one’s self but also the publicly available narrative of the self – is controlled and controllable, Ansher moves on to representation online. What are the cues that enable viewers of avatars to recognize &lt;em&gt;Ansher’s&lt;/em&gt; avatar? What are the parameters of evaluating avatar behaviour, as opposed to, say offline behaviour? Ansher here intervenes with a significant question: why do we always have to ‘read’ the avatar as divided from or compared with the self? Is it an ‘either/or’ equation between self and online avatar?&lt;/p&gt;
&lt;p&gt;Examining her cybertwin on MyCybertwin.com, Ansher describes how she designed her avatar. The process included filling out a detailed questionnaire from which the avatar takes its shape, attitudes, values and determines its responses. Essentially, as Ansher discovers, the ‘cyber twin runs on scripts running in my head [sic]’. The personality type to which the twin belongs to must be chosen from a set of six types – which, as Ansher correctly points out, leaves little room for fluidity beyond what the programmer has designed. This also implies that Ansher’s self and the cyber twin function within severe constraints of personality and responses to the personality of the other. When Ansher communicates with the cyber twin the twin picks up keywords from Ansher’s script and conveys them back as its (her?) ‘response’, all suggesting a packaged response. This ensures that there are not too many permutations and combinations or ‘layers’ (Ansher’s term) to the cyber twin’s personality.&lt;/p&gt;
&lt;p&gt;Ansher wonders what it would take for the twin to discover motivation, or human ‘sentiments’ such as love or care. Does the avatar really constitute a separate entity, or is it a severely limited extension of what Ansher has chosen from the questionnaire.&amp;nbsp; Ansher has deeper metaphysical questions that connect archives (of information, including the questionnaire) with larger issues of an ethical nature. For example, Ansher notes that she can’t teach her twin ‘good’ and bad’ behaviour from just a questionnaire. Ansher concludes that the twin has not ‘earned the right’ to represent her as her online version.&lt;/p&gt;
&lt;p&gt;This is a pithy essay that explores the exhilarations, excitements and tensions of online lives (such avatar lives quietly avoid the domain of messy body functions and fluids).&amp;nbsp; Ansher is spot on in her evaluation of the cyber twin as a limited ‘identity’ where the code – the DNA, or the questionnaire – is itself based on a very short list of normative values and personality ‘types’. She is also correct to argue that the self in real life is not a set of stock responses even if these responses are what have been socialized into us. The self evolves, alters, shifts and these are not always programmable or predictable.&amp;nbsp; Ansher rightly does not go so far as to explore sentience in computers and programming (the stuff of sci-fi), but is concerned with the dynamics of interaction between a sentient creature (her real self) and the avatar.&lt;/p&gt;
&lt;p&gt;The ‘engineering’ in Ansher’s title must take on an ironic tone: the avatar is an experiment in social engineering as well where the norms of self-making and meaning-making are cultural and engineering an avatar with stock responses (to which then Ansher responds in the chat) with predilections, preferences and prejudices constitutes a kind of cultural work. When for instance Ansher writes: ‘she [the avatar] doesn’t add layers to her identity so much as reinforce the various traits that go into defining it’ she has isolated the key issue here:&amp;nbsp; the cultural work that produces avatars and online iconography with specific traits are trapped within and limited by the contexts in which real selves grow. Both partake of each other: the cultural work produces the Ansher-self and this Ansher-self produces her avatar. The difference of course is that the Ansher-self is not fixed, is complicated and defiantly unpredictable.&lt;/p&gt;
&lt;p&gt;This is an important essay that sidesteps the risks of both hagiography (of digital worlds) and the panic Luddite reactions (not responses, but reactions) to the ‘other’ world. I would have liked a bit more – to be fair, this might be entirely due to the space constraints in the volume – on the eversion of the digital world that we now see: where the digital, the cyber- or the ‘other’ world is not just out there but around us, in us, since we occupy, almost simultaneously, the offline and online today.&amp;nbsp; So, to answer the question raised in the first paragraph, one does not see the cybertwin in terms of an ‘either/or’ with the self. It is simultaneously the radically different other and the extension of the self. The self itself is a series of posturings, role-playings and performances. The online avatar is also one more of these. The presentation of the self in everyday life, to adapt the title of &lt;a class="external-link" href="http://en.wikipedia.org/wiki/The_Presentation_of_Self_in_Everyday_Life"&gt;Goffman’s pioneering work&lt;/a&gt;, now includes status messages, scraps, posts, tweets and avatars. The narrative of the self is now inclusive of the sometimes fictional narratives put online by the self. Profile and impression management is also about how one dresses online.&lt;/p&gt;
&lt;p&gt;It would also be interesting to examine the various clusters of avatars in such services as MyCybertwin.com or Second Life, to develop a taxonomy of avatars. If, as suggested above, it is cultural work that carries over into designing avatars then such a taxonomy might say something about the societies and structures from which such avatars emerge.&lt;/p&gt;
&lt;p&gt;Ansher’s essay draws attention to the complicated ontology of the avatar but also reflects, with considerable intensity, on the dynamic relation of online and offline selves. Thus she eschews a simplistic binary of offline/online, preferring to focus on the domain of interaction between the two ‘personae’ of the same self.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Pramod K. Nayar&lt;/p&gt;
&lt;p&gt;&lt;img src="http://editors.cis-india.org/home-images/pramodnayar.jpg/image_preview" title="Pramod Nayar" height="176" width="235" alt="Pramod Nayar" class="image-inline image-inline" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Pramod K. Nayar &lt;/strong&gt;teaches at the Department of English, University of Hyderabad, India. His recent publications include Writing Wrongs: The Cultural Construction of Human Rights in India (Routledge 2012), States of Sentiment: Exploring the Cultures of Emotion (Orient BlackSwan 2011), An Introduction to New Media and Cybercultures (Wiley-Blackwell 2010), Postcolonialism: A Guide for the Perplexed (Continuum 2010), Packaging Life: Cultures of the Everyday (Sage 2009), Seeing Stars: Spectacle, Society and Celebrity Culture (Sage 2009) among others. His forthcoming books include Digital Cool: Life in the Age of New Media (Orient BlackSwan) and Colonial Voices: The Discourses of Empire (Wiley-Blackwell).&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/digital-natives/media-coverage/an-experiment-in-social-engineering'&gt;http://editors.cis-india.org/digital-natives/media-coverage/an-experiment-in-social-engineering&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Book Review</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    

   <dc:date>2012-03-06T06:03:19Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/intl-conferernce-on-mobile-law">
    <title>International Conference on Mobile Law</title>
    <link>http://editors.cis-india.org/news/intl-conferernce-on-mobile-law</link>
    <description>
        &lt;b&gt;Pranesh Prakash spoke in the panel on Mobiles -  Privacy and Social Media on March 1, 2012.&lt;/b&gt;
        
&lt;h2&gt;Draft Agenda&lt;/h2&gt;
&lt;h3&gt;March 1, 2012&lt;br /&gt;&lt;/h3&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;9:00am to 9:30am&lt;/td&gt;
&lt;td&gt; Registration&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;9:30am to 10:45am &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Inauguration Session&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10:45am to 11:15am&amp;nbsp; &lt;br /&gt;&lt;/td&gt;
&lt;td&gt; Icml Tea&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:15am to 11:45am&lt;/td&gt;
&lt;td&gt; Session I: Mobile law- An introduction&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:45am to 1:15pm&lt;/td&gt;
&lt;td&gt;Session II: Mobile Revolution, Mcommerce and Crimes&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1:15pm to 2:00pm&lt;/td&gt;
&lt;td&gt; Icml Lunch&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2:00pm to 3:15pm&lt;/td&gt;
&lt;td&gt;Session III: Mobiles -&amp;nbsp; Privacy &amp;amp; Social Media&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3:15pm to 3:30pm &amp;nbsp;&amp;nbsp;&lt;/td&gt;
&lt;td&gt; Icml Tea&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3:30pm to 4:45pm&lt;/td&gt;
&lt;td&gt;Session IV: Mobiles &amp;amp; Security&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4:45pm to 6:00pm&lt;/td&gt;
&lt;td&gt;Session V: Safe Harbour Protection for Mobiles Service Providers In India&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;March 2, 2012&lt;/h3&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;9:30am to 11:00am&lt;/td&gt;
&lt;td&gt;Session VI-Mobile Banking &amp;amp; Payments&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:00am to 11:30am&amp;nbsp; &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Icml Tea&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:30 am to 12:15pm&lt;/td&gt;
&lt;td&gt;Session VII:&amp;nbsp; Mobile Law Challenges in India&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12:15pm to 1:30pm&lt;/td&gt;
&lt;td&gt;&amp;nbsp; Icml Lunch&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1:30pm to 2:15pm&lt;/td&gt;
&lt;td&gt; Session VIII:&amp;nbsp; Mobile Governance&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2:15pm to 3:30pm&lt;/td&gt;
&lt;td&gt;Icml Tea&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3:30pm to 3:45pm&lt;/td&gt;
&lt;td&gt;Session IX: Internet Governance In The Mobile Ecosystem&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3:45pm to 5:00pm&lt;/td&gt;
&lt;td&gt; Session X : 2G Spectrum Allocation: Post Supreme Court Judgment- Challenges &amp;amp; Opportunities&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5:00pm&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&amp;nbsp; Valedictory Function&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;a class="external-link" href="http://mobilelawconf.wordpress.com/program/"&gt;Read the original here&lt;/a&gt;
&lt;p&gt;Venue: ASSOCHAM House, 47, Prithvi Raj Road, New Delhi, India&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/intl-conferernce-on-mobile-law'&gt;http://editors.cis-india.org/news/intl-conferernce-on-mobile-law&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-04-03T08:24:37Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/what-is-stewardship-in-cyberspace">
    <title>What is Stewardship in Cyberspace?</title>
    <link>http://editors.cis-india.org/news/what-is-stewardship-in-cyberspace</link>
    <description>
        &lt;b&gt;The aim of the annual Canada Centre Cyber Dialogue is to convene an influential mix of global leaders from government, civil society, academia and private enterprise to participate in a series of facilitated public plenary conversations and working groups around cyberspace security and governance.
&lt;/b&gt;
        
&lt;p&gt;The second annual Cyber Dialogue forum takes place March 18-19 2012 
in Toronto, Canada. Building upon last year's successful dialogue - 
Securing the Cyber Commons? - this year's Cyber Dialogue will address 
the question: &lt;em&gt;What is Stewardship in Cyberspace? &lt;br /&gt;
&lt;/em&gt;&lt;/p&gt;
&lt;h2&gt;Agenda&lt;/h2&gt;
&lt;h3&gt;Day One&lt;/h3&gt;
&lt;p&gt;Location: Innis Town Hall, 2 Sussex Avenue, Toronto &lt;br /&gt;

  &lt;a class="external-link" href="http://www.utoronto.ca/townhall/"&gt;venue information&lt;/a&gt;&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;14:30 – 15:15&lt;/td&gt;
&lt;td&gt;WELCOME AND OPENING PLENARY: What is Stewardship in Cyberspace?&lt;br /&gt;
Ron Deibert (Canada Centre / Citizen Lab / Munk School)&lt;br /&gt;
Cyberspace – the global domain of digital electronic telecommunications –
 is nearing a turning point. Pressure is building towards a 
“constitutional moment”. Major governments have begun to debate what 
should be the “rules of the road” for cyberspace, but agreement appears 
far off. A mixed transnational common pool resource that cuts across 
political jurisdictions and the public and private sectors, cyberspace 
has become the operating system for global communications and commerce 
almost by a series of accidents. Cyberspace functions, and arguably 
functions very well, in spite of no grand blueprint or central 
organizing structure. Yet the pressures around the existing system are 
growing, the demands for some kind of alternative design are mounting, 
armed forces are debating offensive operations in cyberspace and 
competing strategies are being developed rapidly that will impact on the
 future of cyberspace.&lt;br /&gt;
  &lt;br /&gt;
Is there a role for “stewardship” in cyberspace? What does it mean to be
 a “steward” as a government, a government’s armed forces, a company, an
 NGO, a social movement, an engineer, a hacktivist, or a citizen? How 
should these actors behave in cyberspace? Do they have different roles 
as stewards? What should they do or not do? Where are the gaps? What is 
an appropriate balance? Do we need stewardship in cyberspace at all? And
 how does stewardship relate to strategy in cyberspace?&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15:15-17:00&lt;/td&gt;
&lt;td&gt;Plenary Panel and Discussions&lt;br /&gt;
Moderator: Misha Glenny&lt;br /&gt;
Panelists: Evgeny Morozov, James Lewis, Marietje Schaake, Bob Boorstin, Sunil Abraham,&lt;br /&gt;
Melissa Hathaway&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;18:00&lt;/td&gt;
&lt;td&gt;Reception and Gala Dinner sponsored by Google Inc.&lt;br /&gt;
Park Hyatt, 4 Avenue Road, Toronto&lt;br /&gt;
  &lt;a class="external-link" href="http://parktoronto.hyatt.com/hyatt/hotels/services/maps/index.jsp;jsessionid=7E2DF127A96D9A68CB8569397AFF47DF.atg07-prd-atg3?icamp=propMapDirections"&gt;map and directions&lt;/a&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Day Two&lt;/h3&gt;
&lt;p&gt;Location: Munk School of Global Affairs, The Vivian and David Campbell Conference Facility&lt;br /&gt;
  &lt;a class="external-link" href="http://www.munkschool.utoronto.ca/pages/location/"&gt;venue information&lt;/a&gt;&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;8:00-8:45&lt;/td&gt;
&lt;td&gt;BREAKFAST sponsored by Microsoft&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;8:45-10:15&lt;/td&gt;
&lt;td&gt;PANEL ONE: What Next for “Rules of the Road”?&lt;br /&gt;
A wide gulf seems to separate blocks of countries around any kind of 
shared global norms in cyberspace. Positions are solidifying and 
governments and other actors are lobbying and coalescing around 
different visions of cyberspace – one defined as a kind of “global 
commons” and another around a more territorialized vision in line with 
state sovereignty. Where, if any, are the areas of common agreement? Is 
it desirable to create or advocate a single set of “cyberspace norms” to
 govern cyberspace in the first place? What are the existing centres of 
power in cyberspace? Can we map these poles and the relations between 
them? What is the appropriate balance between openness and security in 
cyberspace?&lt;br /&gt;
  &lt;br /&gt;
Moderator: Janice Stein&lt;br /&gt;
Panelists: Michele Markoff, Nigel Inkster, Arif Lalani, Detlev Wolter, Johan Hallenborg, Robert Dresen&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10:15 – 10:30&lt;/td&gt;
&lt;td&gt;COFFEE BREAK sponsored by ISOC and Afilias&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10:30 – 12:00&lt;/td&gt;
&lt;td&gt;PANEL TWO: Who Should Police Cyberspace?&lt;br /&gt;
How should Cyberspace be Policed? Should it be policed at all or left to
 its own devices? How should malicious networks, like botnets, be 
neutralized? By whom? What lessons can be derived from past experiences?
 How do we create effective policing across borders without establishing
 a global police state in cyberspace? Should governments control 
cyberspace policing and capabilities or should they be downloaded to 
those who operate the infrastructure (e.g. telecommunications companies,
 ISPs)? As cyberspace is mostly in the hands of private sector actors, 
there is a growing worldwide trend towards intermediary liability – 
putting more and more responsibilities in the hands of the private 
sector. What are the existing cases that demonstrate intermediary 
liability? What are the unintended consequences of those cases? Where 
are the accountability gaps? How should civil society and other actors 
be included in policing the Internet? What is the proper mix? Where does
 accountability begin, where does it end, and who’s in charge? How do we
 preserve a distributed cyberspace governance regime without encouraging
 vigilantism? Should private sector actors sell products and services 
that contribute to cyberspace instability and closure? If not, how 
should they be regulated?&lt;br /&gt;
Moderator: Milton Mueller&lt;br /&gt;
Panelists: Paul Vixie, Andrew Cushman, Michael Welch, Theo de Vries, Gus Hosein, Jeff Brueggeman,&lt;br /&gt;
Eric Davis&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12:00 – 13:30&lt;/td&gt;
&lt;td&gt;LUNCH sponsored by Microsoft&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13:30 – 15:00&lt;/td&gt;
&lt;td&gt;PANEL THREE: What are the Limits of Dissent in Cyberspace?&lt;br /&gt;
The Arab Spring demonstrates the latent agency of technologically savvy,
 networked youth. But the Arab Spring model has its (arguably) darker 
side in the UK riots, the newly emerging networked politics of the 
Occupy movement, and new forms of agency like WikiLeaks and Anonymous. 
Should these new forms of political agency be defended as sometimes 
messy but necessary characteristics of global networked democracy, or 
should they be criminalized and suppressed? Who is to judge? What are 
the limits to dissent online? How should stewardship for citizens, 
activists, dissenters, and protestors in cyberspace be expressed or 
defined? As cyberspace expands to the global South, will the limits of 
dissent be defined in different ways than they have been up until now?&lt;br /&gt;
  &lt;br /&gt;
Moderator: Jillian York&lt;br /&gt;
Panelists: Jac S.M. Kee, Sarah Wynn-Williams, Shahzad Ahmad, Brett Solomon, Lhadon Tethong,&lt;br /&gt;
Isaac Mao, Dunja Mijatovic&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15:00 – 15:30&lt;/td&gt;
&lt;td&gt;COFFEE BREAK sponsored by ISOC and Afilias&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15:30 – 16:45&lt;/td&gt;
&lt;td&gt;PANEL FOUR: What is Strategy, Stewardship, and War in Cyberspace?&lt;br /&gt;
How should armed forces conceptualize strategy in cyberspace? How should
 they conceptualize stewardship? What will war in cyberspace look like? 
Who will do the fighting? What capabilities do we require to sustain 
operations in and through cyberspace? How should war fighting in 
cyberspace relate to existing rules of armed conflict? If Canada needs a
 cyber-command what should it look like, and what should be its mission,
 role and authorities? How will it support or change Canada’s ability to
 project power in warfighting, peacekeeping and everything in between? 
As a “middle power”, will Canada’s approach to cyberspace operations 
provide a model that might be adopted by other countries evolving their 
war fighting capabilities in this domain?&lt;br /&gt;
Moderator: Rafal Rohozinski&lt;br /&gt;
Panelists: LCol. Francois Castonguay, Col. Bill Sternhagen, Col T.X. Hammes, Franklin Kramer, James Farwell&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;16:45 – 17:00&lt;/td&gt;
&lt;td&gt;SUMMARY AND CLOSE&lt;br /&gt;
Ron Deibert (Canada Centre / Citizen Lab / Munk School)&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;a class="external-link" href="http://www.cyberdialogue.ca/agenda/"&gt;Link to the original&lt;/a&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/what-is-stewardship-in-cyberspace'&gt;http://editors.cis-india.org/news/what-is-stewardship-in-cyberspace&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2012-02-29T15:19:30Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/secure-it-2012">
    <title>Secure IT 2012 — Securing Citizens through Technology</title>
    <link>http://editors.cis-india.org/news/secure-it-2012</link>
    <description>
        &lt;b&gt;The event is co-organised by DST and NSDI, Govt. of India in partnership with Elets Technomedia Pvt. Ltd. on March 1, 2012 at Claridges in New Delhi.&lt;/b&gt;
        
&lt;h2&gt;Draft Agenda&lt;/h2&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;9.00 am – 9.30 am&lt;/td&gt;
&lt;td&gt;Registration &amp;amp; Tea&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;9.30 am – 11.00 am&lt;/td&gt;
&lt;td&gt;Inaugural Session&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Securing Citizens through Technology&lt;/h3&gt;
&lt;p&gt;The SecureIT 2012 Inaugural Session would present an overview of the security scenario in the country, and place the use of ICT towards ensuring national security centrestage. The inaugural would also highlight the use that ICT is being put for in effective disaster management, minimising material as well as human loss.&lt;/p&gt;
&lt;p&gt;The session would aim at identifying a policy roadmap towards making effective use of ICT for the purposes of national security, well-being of citizens and businesses in times of disaster and an uncertain external environment and identify the major policy objectives for the sector as a whole.&lt;/p&gt;
&lt;p&gt;Introductory Remarks: Dr Ravi Gupta, CEO Elets Technomedia and Editor-in-Chief, egov&lt;br /&gt;Welcome Address: Dr M P Narayanan, President, Centre for Science, Development and Media Studies&lt;br /&gt;Inaugural Address: Anil K Sinha, Vice Chairman, Bihar State Disaster Management Authority, Government of Bihar – Chief Guest, SecureIT 2012&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Panel Discussion&lt;/strong&gt;:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;S Regunathan, Former Chief Secretary, Government of NCT of Delhi&lt;/li&gt;&lt;li&gt;R S Sharma, Director General, UIDAI&lt;/li&gt;&lt;li&gt;Shankar Aggarwal, Additional Secretary, Ministry of Defence, Government of India&lt;/li&gt;&lt;li&gt;Shambhu Singh, Joint Secretary (North East), Ministry of Home Affairs, Government of India&lt;/li&gt;&lt;li&gt;Ajay Sawhney, CEO, National e-Governance Division, Government of India&lt;/li&gt;&lt;li&gt;Major General (Dr) R Siva Kumar, Head, (NRDMS), Government of India&lt;/li&gt;&lt;/ul&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;11. 00 am – 11.30 am&lt;/td&gt;
&lt;td&gt;Networking Tea&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11.30 am – 1.30 pm&lt;/td&gt;
&lt;td&gt;Technical Session 1&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Information Security – Securing Networks, Communications, Data and Applications&lt;/h3&gt;
&lt;p&gt;In the modern Information Age, knowledge is power like never before. A robust, secure communications network is not only desired, it is an absolute imperative in order to allow efficient functioning of the state. The communications networks have to be secured from state and non-state actors inimical to India. This session would highlight some major threats to the national communications infrastructure and the policies being adopted to counter these threats.&lt;/p&gt;
&lt;p&gt;Chair: Ravi S Saxena, Additional Chief Secretary, DST, Government of Gujarat&lt;br /&gt;Key Note Speaker: Dr Gulshan Rai, Director General, CERT-In&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Distinguished Panellists&lt;/strong&gt;:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;S K Basu, Vice President, NIIT Technologies&lt;/li&gt;&lt;li&gt;Manas Sarkar, Head Pre-Sales (India &amp;amp; SAARC), Trend Micro&lt;/li&gt;&lt;li&gt;Ruchin Kumar, Principal Solution Architect, India and SAARC, Safenet India Pvt Ltd&lt;/li&gt;&lt;li&gt;Dr Kamlesh Bajaj, CEO, Data Security Council of India&lt;/li&gt;&lt;li&gt;Rajan Raj Pant, Controller, Ministry of Science and Technology, Government of Nepal&lt;/li&gt;&lt;li&gt;Prof. Anjali Kaushik, Management Development Institute, Gurgaon&lt;/li&gt;&lt;/ul&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;1.30 pm – 2.30 pm&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2.30 pm – 5.00 pm&lt;/td&gt;
&lt;td&gt;Technical Session 2&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;&lt;strong&gt;ICT in National Security and Policing&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;India faces a multiplicity of security challenges from within and without. Conventional responses to these challenges are no longer adequate and technology is being increasingly deployed to make the nation safer and more secure for residents, visitors and businesses. The legal framework has also been modified to incorporate modern technological advances.&lt;/p&gt;
&lt;p&gt;The MHA has embarked upon a major project – Crime and Criminal Tracking System (CCTNS) that is expected to bring about a major overhaul of the policing system of the country.&amp;nbsp; In this session, CCTNS and state adaptations of ICT in policing would be discussed along with an overview of technological advances in the field of security.&lt;/p&gt;
&lt;p&gt;Chair: S Suresh Kumar, Joint Secretary (Centre-State), Ministry of Home Affairs, Government of India&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Distinguished Panellists:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;NSN Murty, General Manager, Smarter Planet Solutions - India/ South Asia, IBM&lt;/li&gt;&lt;li&gt;Col Vishu Sikka, (Retd) General Manager – Defence, Aerospace &amp;amp; Public Security, SAP India &amp;amp; Subcontinent&lt;/li&gt;&lt;li&gt;Joachim Murat, Director of Sagem Morpho Security Pvt Ltd.&lt;/li&gt;&lt;li&gt;Hemant Sharma, Vice- Chair, BSA India Committee&lt;/li&gt;&lt;li&gt;Raj Prem Khilnani, DGP (Homeguard and Civil Defence), Maharashtra&lt;/li&gt;&lt;li&gt;Rajvir P Sharma, Additional Director General of Police, Bangalore Metropolitan Task Force&lt;/li&gt;&lt;li&gt;Loknath Behra, IGP, National Investigation Agency&lt;/li&gt;&lt;li&gt;Purushottam Sharma, IGP, State Crime Records Bureau, Madhya Pradesh&lt;/li&gt;&lt;li&gt;Ranjan Dwivedi, IGP, UP Police&lt;/li&gt;&lt;li&gt;Sanjay Sahay, IGP, Karnataka State Police&lt;/li&gt;&lt;/ul&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;5.00 pm – 5. 30 pm&lt;/td&gt;
&lt;td&gt;Networking Tea&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5.30 pm – 7.00 pm&lt;/td&gt;
&lt;td&gt;Technical Session 3&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Managing Information for Safety and Security&lt;/h3&gt;
&lt;p&gt;In the modern age, ICT is deployed in a variety of ways for enhancing citizen safety and security. ICT is being widely used for disaster management, urban planning, census operations etc.&lt;/p&gt;
&lt;p&gt;In this session, discussions would highlight some path-breaking uses of ICT for enhancing citizen safety in a number of diverse settings.&lt;/p&gt;
&lt;p&gt;Chair: N Ravishanker, Additional Secretary, Universal Service Obligation Fund, DIT, Govt of India&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Distinguished Panellists&lt;/strong&gt;:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Sandeep Sehgal, IBM, VP, Public Sector, India and South Asia&lt;/li&gt;&lt;li&gt;Sanjeev Mital, CEO, National Institute of Smart Governance (NISG), Government of India&lt;/li&gt;&lt;li&gt;Dr R C Sethi, Additional Registrar General of India&lt;/li&gt;&lt;li&gt;Maj Gen R C Padhi, Assistant Surveyor General, Survey of India&lt;/li&gt;&lt;li&gt;Sunil Abraham, Executive Director, Center For Internet Society&lt;/li&gt;&lt;li&gt;V S Prakash, Director, Karnataka State Natural Disaster Monitoring Centre, Karnataka&lt;/li&gt;&lt;li&gt;Rajiv P Saxena, Deputy Director General, National Informatics Centre, Government of India&lt;/li&gt;&lt;li&gt;Jay Kay Gupta, Fire Chief, Delhi Development Authority&lt;/li&gt;&lt;/ul&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;7.00 pm onwards&lt;/td&gt;
&lt;td&gt;Valedictory Session: Way Ahead High Tea&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;
VIDEO&lt;/p&gt;
&amp;nbsp;&lt;iframe src="http://blip.tv/play/AYLx1jEA.html?p=1" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;&lt;embed type="application/x-shockwave-flash" src="http://a.blip.tv/api.swf#AYLx1jEA" style="display:none"&gt;&lt;/embed&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/secure-it-2012'&gt;http://editors.cis-india.org/news/secure-it-2012&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Video</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Information Technology</dc:subject>
    
    
        <dc:subject>ICT</dc:subject>
    

   <dc:date>2012-04-28T04:06:47Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/content-developers-trainers">
    <title>Content Developers/Trainers</title>
    <link>http://editors.cis-india.org/news/content-developers-trainers</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society is hiring for the full-time position of a content developer/trainer to work on an upcoming project Building Knowledge and Capacity around Telecommunication Policies in India. &lt;/b&gt;
        
&lt;p&gt;The objective is to create an on line repository of telecommunication-related information and learning materials targeted at a multi stakeholder audience; organise interactive public lectures and workshops around the country to disseminate awareness on telecom issues; as well as use traditional and new forms of media to impart information to academia, civil society, policy makers and the general public.&lt;/p&gt;
&lt;p&gt;Candidates do not need to have a technical background or be experts in the field of telecommunication; however, some experience/interest in telecom related issues is needed.&lt;/p&gt;
&lt;p&gt;Other requirements are:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Excellent analytical and writing skills&lt;/li&gt;&lt;li&gt;Visualization skills&lt;/li&gt;&lt;li&gt;Good communication, presentation and training skills&lt;/li&gt;&lt;li&gt;Basic computer skills&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;To apply, please send your CV and three examples of writing to &lt;a class="external-link" href="mailto:yelena@cis-india.org"&gt;yelena@cis-india.org&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;CIS is committed to equitable employment and is encouraging female job candidates. Please refer to the above e-mail address for further inquiries. &lt;/em&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/content-developers-trainers'&gt;http://editors.cis-india.org/news/content-developers-trainers&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Telecom</dc:subject>
    

   <dc:date>2012-02-29T13:42:51Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/openness/francis-wins-ept-award">
    <title>Francis Bags EPT Award for Open Access in Developing World</title>
    <link>http://editors.cis-india.org/openness/francis-wins-ept-award</link>
    <description>
        &lt;b&gt;The Electronic Publishing Trust recently announced a new annual award to be made to individuals working in developed countries who have made significant contribution for the cause of open access and free exchange of research findings. There were 30 nominations from 17 countries around the world and Dr. Francis Jayakanth from the National Centre of Science Information, Indian Institute of Science, Bangalore was selected for the inaugural EPT Award for Open Access in the Developing World by a committee that went through all the nominations.  &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The award function organised by the Electronic Publishing Trust for Development and the Centre for Internet and Society (CIS), Bangalore was held at the Sambasivan Auditorium, M S Swaminathan Research Foundation (MSSRF) in Chennai on 14 February 2012. Leading luminaries such as Prof. M.S. Swaminathan, Prof. Subbiah Arunachalam, Prof. G Baskaran and Prof. K Mangala Sunder participated in the award felicitation ceremony.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Giving the welcome speech, Prof. Arunachalam, distinguished fellow at CIS said that Dr. Jayakanth works for the Indian Institute of Science, Bangalore, has trained many students and helped a number of institutes to set up open access repositories. Prof. Arunachalam added that the event is being celebrated in India as the winner is from India and specified that it is being held at the MS Swaminathan Foundation as this was the institution that hosted the first workshop to promote open access. Prof. Swaminathan had a vital role in arranging funds for the workshop. About 50 people had learnt what open access was, how to set up open access repositories, how to use the EPrints software, etc. For this very reason it was decided to hold the event in Chennai and not Bangalore where Dr. Jayakanth is based.&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="http://editors.cis-india.org/home-images/Francis7.jpg/image_preview" alt="Participants in the Award Function" class="image-inline image-inline" title="Participants in the Award Function" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Felicitating Dr. Jayakanth, Prof. Swaminathan who presented the award added that it is important to highlight the contributions of those who really convert the concept of social inclusion to reality. He said that today every politician talks about inclusive growth. What is this inclusive growth, how do you convert exclusion to inclusion? Exclusion creates large problems, social problems, economic problems, etc. On a concluding note, Prof. Swaminathan said that the Prime Minister, Dr. Manmohan Singh has declared 2012-13 as the year of science and he hopes that there will be a new science policy and technology policy and that he hopes that a very important component of that should be methods of ensuring open access including open access to knowledge and open access to literature.&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="http://editors.cis-india.org/home-images/Francis3.jpg/image_preview" title="Francis Jayakanth" height="166" width="174" alt="Francis Jayakanth" class="image-inline image-inline" /&gt;&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;In his award acceptance speech, Dr. Jayakanth said that the atmosphere  was very overwhelming and never in his two-and-a-half decade old career  he had the opportunity to speak amidst such luminaries and added that it  was a privilege and prestige to have received the award from Prof.  Swaminathan, the father of the Green Revolution in India. He also added  that no event in India or elsewhere is complete without the active  participation and mentioning of the name of Prof. Arunachalam, the  greatest advocate of open access that India has seen so far, and that he  wouldn’t have been here at the award ceremony but for the timely  intervention of Prof. Arunachalam. &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Dr. Jayakanth concluded by saying  that he would like to thank Prof. NV Joshi, Prof. Derek Law, Prof. Alma  Swan, Prof. Balaram, Prof. N Balakrishnan, Prof. Giridhar, and Prof. TB Rajashekar, and  particularly the students of the information and knowledge management  programme at the National Centre of Science Information, Indian  Institute of Science, who were responsible for the growth of a  repository granting more visibility to the 32,000 publications that are  part of the repository.&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="http://editors.cis-india.org/home-images/Mangala.jpg/image_preview" title="Mangala Sunder" height="130" width="177" alt="Mangala Sunder" class="image-inline image-inline" /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Prof. Mangala Sunder of IIT Madras and Prof. G Baskaran of the Institute  of Mathematical Sciences, Chennai, also participated in the event.  Prof. Sunder said that it is for the kind of information that we talk  about, which we want to make public for which champions like Dr.  Jayakanth have been working on the sidelines but working so efficiently  to get institution after institution to convert what is known as a rigid  framework into a flexible more open policy of bringing their scientific  content to their intellectual information content. He said that he  works in the area of content development from the point of view of  education and he understands the difficulty of bringing material to the  public. &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;There are many issues, such as issues about copyright, issues about people owning the information, issues about people feeling very rigid on what they want to say in the public, etc. Dr. Jayakanth has gone through all these exercises for the last 30 years in slowly creating the “little after little” what are called the waterways to finally see that everyone benefits. The linking of science, knowledge and sustainable development to open access to information, open access to research and open access to content completes the whole cycle of knowledge.&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="http://editors.cis-india.org/home-images/Baskaran.jpg/image_preview" title="Prof. Basakaran" height="177" width="117" alt="Prof. Basakaran" class="image-inline image-inline" /&gt;&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Prof. Baskaran said that it is a very well deserved award and Dr.  Jayakanth has definitely raised the bar for future awardees. Prof.  Baskaran stressed upon the aspects of open access. He said that as a  theoretical physicist he understands the need for open access very well.  Physicists, when they have new research results place them in arXiv,  the open access repository for preprints in physics. Some people wonder  what if some physicists deposit all kinds of articles in the arXiv.  Experience has shown that 99 per cent of the articles appear in good  journals later. He added that once it is put in the arXiv, the whole  world gets access and a bad paper will be noticed and commented upon by  many. No one likes to be the author of such a paper! He urged that other  sciences, especially the life sciences should have a repository similar  to arXiv and requested Prof. Swaminathan to take the intiative at  MSSRF. &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;hr /&gt;
&lt;h2&gt;Dr. Francis Jayakanth&lt;/h2&gt;
&lt;p align="left"&gt;&lt;img src="http://editors.cis-india.org/home-images/Francis1.jpg/image_preview" alt="Francis with the Award" class="image-inline image-inline" title="Francis with the Award" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Dr. Francis Jayakanth is a library-trained scientific assistant based at the National Centre for Science Information (NCSI), the information centre of the Indian Institute of Science (IISc) in Bangalore. He has played a significant role in the establishment of India’s first institutional repository (IR) (&lt;a class="external-link" href="http://eprints.iisc.ernet.in"&gt;http://eprints.iisc.ernet.in&lt;/a&gt;). He now manages the IR and has provided technical support for establishing IRs in many other universities and institutes in India. He has been the key resource person at many events to train people in setting up IRs and open access journals. He has delivered presentations on IRs, open access journals, the OAI protocol, OAI compliance, and the benefits of open access to authors and institutions and the role of libraries. He has developed a free and open source software tool (CDSOAI), which is widely used. Dr. Jayakanth can indeed be considered an open access ‘renaissance man’, an advocate and technical expert in all aspect of open access development and an inspiration to all, both at the research and policy level.&lt;/p&gt;
&lt;p&gt;&lt;a href="http://editors.cis-india.org/openness/francis-jayakanth-presentation" class="internal-link" title="Francis Jayakanth's Presentation"&gt;See Francis's presentation on Who Benefits from Open Access to Scholarly Literature?&lt;/a&gt; [Powerpoint, 1523 KB]&lt;/p&gt;
&lt;p&gt;&lt;b&gt;See the video of the award function below:&lt;/b&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="250" src="http://blip.tv/play/AYLtr00A.html?p=1" width="250"&gt;&lt;/iframe&gt;
&lt;object classid="clsid:d27cdb6e-ae6d-11cf-96b8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,40,0" height="100" width="100"&gt;
&lt;param name="src" value="http://a.blip.tv/api.swf#AYLtr00A"&gt;&lt;embed height="100" width="100" src="http://a.blip.tv/api.swf#AYLtr00A" type="application/x-shockwave-flash"&gt;&lt;/embed&gt;
&lt;/object&gt;
&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/openness/francis-wins-ept-award'&gt;http://editors.cis-india.org/openness/francis-wins-ept-award&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Award</dc:subject>
    
    
        <dc:subject>Open Content</dc:subject>
    
    
        <dc:subject>Video</dc:subject>
    
    
        <dc:subject>Open Access</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2013-08-03T05:36:54Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/digitisation-is-making-e-learning-simple">
    <title>Digitisation is making e-learning simple</title>
    <link>http://editors.cis-india.org/news/digitisation-is-making-e-learning-simple</link>
    <description>
        &lt;b&gt;Though the computer literacy in India is low, some companies are effectively spreading education using digital contents riding on the Internet. &lt;/b&gt;
        
&lt;p&gt;&lt;a class="external-link" href="http://www.deccanherald.com/content/226629/digitisation-making-e-learning-simple.html"&gt;This article by Shayan Ghosh was published in the Deccan Herald on February 13, 2012&lt;/a&gt;. Sunil Abraham was quoted in this.&lt;/p&gt;
&lt;p&gt;The business of education is all set for a transformation in the country as the government, recently, announced that it will purchase some 100,000 low-cost Aakash tablets from Datawind, the Canadian company that has developed this equipment.&lt;/p&gt;
&lt;p&gt;These tablets would then be distributed to schools and colleges in India, where students would get them for free. This move of going the e-way and the limitations the low cost tablet has revealed has seen a lot of criticism all over, however, the e-learning industry in India is going to be one of the biggest game changers in recent times.&lt;/p&gt;
&lt;p&gt;E-learning service provider Tata Interactive Systems (TIS) CEO Sanjaya Sharma recalls his experiences when he began his company in 1990. “There was no e-learning then. It was computer-based training along with multimedia training that existed,” says Sharma. However, times changed slowly as TIS began getting clients. One of its first clients was the Confederation of Indian Industry (CII) with whom it did a project involving VGA monitors. This product was later sold to 32 other organisations.&lt;br /&gt;&lt;br /&gt;Now, the company has many Fortune-500 customers to itself and is also conducting business with universities and publishers abroad. Sharma is very optimistic about the present Indian e-learning market, though he believes that it has just begun to take shape. “Adoption happened much earlier abroad, than in India,” Sharma added.&lt;br /&gt;TIS is coming big on the e-learning in schools with their Tata ClassEdge, a solution for interactive teaching in schools.&lt;br /&gt;&lt;br /&gt;Tata ClassEdge is an innovative and comprehensive educational solution from TIS, designed to help teachers deliver quality instruction, with an effective blend of classroom activities and interactive multimedia demonstrations.&lt;br /&gt;&lt;br /&gt;For this purpose, the company would be providing its services to partially government-aided schools apart from private schools. Study estimates that there are around 80,000 government schools; 150,000 partially-funded schools and 105,000 government schools in the country. TIS is also going to reach out to government schools soon with a different pricing model within a couple of years.&lt;br /&gt;&lt;br /&gt;Through ClassEdge, teachers will have access to lesson plans that they can use to make their classes engaging and memorable. The plans are customised for students and it provides tips to elicit student participation, including reinforcement activities for struggling learners and challenging assignments for high achievers.&lt;br /&gt;&lt;br /&gt;Teachers can use animations to explain difficult topics. They can engage children through stories that teach. They could use interactive games to get students to interact with the medium and have fun while learning.&lt;/p&gt;
&lt;p&gt;Sharma strongly believes that the education sector in India is going to take advantages of technology in the coming years and will improve in the process. “I definitely feel that technology should be available to every individual,” adds Sharma.&lt;br /&gt;Meanwhile, another institute AVAGMAH (avagmah.com) is making good business with its online learning platform deemed for the higher education space. AVAGMAH offers UGC-recognised degrees for MBA (Global) in sales &amp;amp; marketing, HR management and banking &amp;amp; finance. The education platform is entirely online and the student must attend classes on the Internet.&lt;br /&gt;&lt;br /&gt;“The faculty conducts a class and students sit at home, taking lessons. That was my aim and that’s what AVAGMAH offers,” says AVAGMAH Online School CEO Karthik K S. The platform for this online school was developed in 2007 and it had also won an award for innovation from Nasscom, the same year. However, the content generation took another two years and only in 2009, was AVAGMAH ready to deliver education online and commence its first batch.&amp;nbsp; The institute now has more than 6,000 students to its name and the number keeps growing with each passing day.&lt;br /&gt;&lt;br /&gt;The ease of access, they feel, is drawing people towards online education as they can log into their classes after their day’s work and have a quick session with the faculty. “Internet can reach places where prevalent education systems cannot. We have students logging in from places like Palanpur in Gujarat and also from places like Guwahati,” explained Karthik. He also says that the content can be delivered on low bandwidth Internet connections making it easier for narrowband users to access it. On the cost factor of such courses and how viable it would be for the not-so-rich sections of India, he pointed out that AVAGMAH offers two-year MBA courses for Rs 40,000 per year.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;“Online education is going to drastically change the learning space in India as technology becomes more accessible,” added Karthik.&lt;br /&gt;&lt;br /&gt;Karnataka, the state with the most developments happening in the IT space, is no doubt heralding the e-learning spree in India with various initiatives to bring this form of education to all. In the year 2009, NIIT had announced a partnership with the Government of Karnataka (Department of Social Welfare - DSW), the Karnataka Vocational Training &amp;amp; Skill Development Corporation Ltd (KVSTDC) and the Department of Employment and Training (DET) to provide e-learning to young under-graduates residing in DSW hostels.&lt;br /&gt;&lt;br /&gt;The vision of this project is to enable the students in the government hostels to use their free time to enhance their skill sets by acquiring some of the soft skills and life skills that are required in most job areas, and in the process, providing the latest learning technologies at the student’s doorstep.&lt;br /&gt;&lt;br /&gt;IT major Intel India and the Karnataka Government’s Sarva Shiksha Abhiyan, last year, launched ‘Computers on Wheels’, an e-learning pilot programme, in five districts of the state.&lt;br /&gt;&lt;br /&gt;The pilot programme includes digital instruction materials from ‘Educomp’, an education solutions provider. The programme enables teachers to utilise a variety of learning strategies and tools to cater to the diverse learning styles and abilities of students, making education more engaging and inclusive for all. Under the ‘Computers on Wheels’ approach, netbooks are housed in a cart and can be moved between classrooms as needed.&lt;/p&gt;
&lt;p&gt;Not only has the Internet found a newer way in traditional courses, but it has also made advances in supplementary education. Atano, a Mumbai-based company, has come up with a unique idea of providing e-books for vocational courses on its website. Imagine living cities like Meerut, Shimla, Jaipur, Guwahati, Indore, Cochin or even in the metros, one can download a supplementary e-Book at a click of a button. Supplementary education books can be downloaded on the individual’s Windows PC, Android platform, or even Mac (iPads).&lt;/p&gt;
&lt;h3&gt;Cost-effective option&lt;/h3&gt;
&lt;p&gt;Industry experts are of the opinion that this sector has a huge potential and more so, in a country where education finds it tough to reach remote places.&lt;/p&gt;
&lt;p&gt;“The country needs e-learning as it is the best way to reach out to millions and moreover this sector is very promising,” says head of IT &amp;amp; ITeS Practice at KPMG, Pradeep Udhas.&lt;/p&gt;
&lt;p&gt;He adds that not only in traditional courses, but also in vocational courses, e-learning will be the trend-setter.&lt;/p&gt;
&lt;p&gt;Another initiative by Manipal Global Education Services, EduNxt enables interactive learning environment which includes small group mentoring, virtual classrooms, simulation, self-study content, recorded presentations and shared browsing.&lt;br /&gt;Launched by Sikkim Manipal University-Distance Education in 2009, it helps all the Distance Education students through their online platform.&lt;/p&gt;
&lt;p&gt;The university believes that it develops a sense of togetherness among the members and different stakeholders of the huge community within the platform.&lt;/p&gt;
&lt;p&gt;The platform has functionality which provides a student to interact with 65 core faculty and 6,500 supporting faculty counselors in order to utilise the varied expertise and vast experience of this community.&lt;/p&gt;
&lt;p&gt;“We may have progressed from just computer-based learning to technology-enabled solutions in the classroom, but the objective has remained intact, improving the learning experience by making it more engaging,” said Pearson Education Services COO Srikanth B Iyer.&lt;br /&gt;&lt;br /&gt;Iyer adds that in their current avatar, e-learning solutions are not seen as replacements for teachers, but aids which will help teachers deliver lessons better, thereby increasing the quality of the learning experience.&lt;br /&gt;&lt;br /&gt;However, Centre for Internet &amp;amp; Society Executive Director Sunil Abraham feels that learning should not be restricted to the Internet and interactive classroom sessions but should be made available on mobile phones through audio files as mobile penetration is much higher compared to Internet reach.&lt;/p&gt;
&lt;p&gt;“Audio files can also be productive and a learning experience for people who can’t afford the Internet,” explained Abraham.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/digitisation-is-making-e-learning-simple'&gt;http://editors.cis-india.org/news/digitisation-is-making-e-learning-simple&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-02-28T10:05:20Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/india-debates-limits-to-freedom-of-expression">
    <title>India debates limits to freedom of expression</title>
    <link>http://editors.cis-india.org/news/india-debates-limits-to-freedom-of-expression</link>
    <description>
        &lt;b&gt;From Google to Facebook, from world-famous author Salman Rushdie to a little-known political cartoonist, it has become increasingly easy in recent months to offend the Indian government, and to incur the wrath of the censor or even the threat of legal action.&lt;/b&gt;
        
&lt;p&gt;&lt;a class="external-link" href="http://www.washingtonpost.com/world/asia_pacific/india-debates-limits-to-freedom-of-expression/2012/02/02/gIQAHkOY9Q_story.html"&gt;This article by Simon Denyer was published in the Washington Post on February 13, 2012&lt;/a&gt;. Sunil Abraham has been quoted in this.&lt;/p&gt;
&lt;p&gt;In the world’s largest democracy, many Indians say freedom of expression is under attack, and along with it the values of pluralism and tolerance that have bound this nation of 1.2 billion people together since independence from Britain more than 64 years ago.&lt;/p&gt;
&lt;p&gt;India’s democracy is nothing if not raucous. The huge array of newspapers and 24-hour television news channels are often vociferous in their criticism of politicians. But the media’s determination to root out corruption in the past two years has prompted a backlash. Talk of more stringent regulation is mounting.&lt;/p&gt;
&lt;p&gt;At the same time, artists say their creative freedom has been steadily eroded. Even &lt;a class="external-link" href="http://www.washingtonpost.com/blogs/blogpost/post/mitt-romney-joke-on-jay-leno-angers-indian-sikhs/2012/01/23/gIQAYJX4KQ_blog.html"&gt;Jay Leno managed to offend Indian Sikhs&lt;/a&gt; — and prompt an official government complaint — with a satirical reference to their holiest shrine, the Golden Temple, in a joke about Mitt Romney’s vacation homes.&lt;/p&gt;
&lt;p&gt;At fault, many say, is a thin-skinned government that gives in to the demands of violent mobs, ostensibly to make political gains but in fact to suppress its critics.&lt;/p&gt;
&lt;p&gt;“For a country that takes great pride in its democracy and history of free speech, the present situation is troubling,” said Nilanjana Roy, a columnist and literary critic. “Especially in the creative sphere, the last two decades have been progressively intolerant.”&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Targeting authors, artists &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Rushdie, whose novel “The Satanic Verses” was banned in India in 1988,&lt;a class="external-link" href="http://www.washingtonpost.com/blogs/blogpost/post/salman-rushdie-video-interview-canceled-amid-muslim-protests/2012/01/24/gIQAtVRUNQ_blog.html"&gt; was forced to cancel appearances at the Jaipur Literature Festival&lt;/a&gt; last month after threats of violence from Muslim groups and a warning about a possible assassination attempt — information he said was probably fabricated by authorities to keep him away.&lt;/p&gt;
&lt;p&gt;Wary of alienating Muslim voters in ongoing state elections, not a single Indian politician spoke out in favor of Rushdie’s right to be heard.&lt;/p&gt;
&lt;p&gt;Last month, &lt;a class="external-link" href="http://cpj.org/blog/2012/01/indias-challenge-intolerance-vs-intellectual-freed.php"&gt;the screening of a documentary on Kashmir was canceled&lt;/a&gt; at a college in the city of Pune after right-wing Hindus objected, and an artist was beaten in his gallery in Delhi for showing nude paintings of actresses and models that his attackers claimed were an insult to the country.&lt;/p&gt;
&lt;p&gt;The release of the &lt;a class="external-link" href="http://timesofindia.indiatimes.com/india/Kolkata-Book-Fair-cancels-release-of-Taslima-Nasreens-book/articleshow/11715363.cms"&gt;latest book by Bangladeshi author Taslima Nasreen&lt;/a&gt; was canceled in Kolkata after Muslims protested, and &lt;a href="http://editors.cis-india.org/news/cpj.org/blog/2012/01/can-an-indian-cartoonist-be-barred-from-mocking-th.php" class="external-link"&gt;Aseem Trivedi, a 25-year-old political cartoonist&lt;/a&gt;, was charged with treason and insulting India’s national emblems in drawings inspired by activist Anna Hazare’s anti-corruption movement.&lt;/p&gt;
&lt;p&gt;But perhaps the most shocking episode for advocates of freedom of expression has been &lt;a class="external-link" href="http://www.washingtonpost.com/blogs/blogpost/post/facebook-google-tell-india-they-wont-screen-for-derogatory-content/2011/12/06/gIQAUo59YO_blog.html"&gt;the government’s attempt to muzzle Facebook and Google&lt;/a&gt; — and prosecute the companies’ executives — for content posted on their sites deemed to be offensive. “Like China, we can block all such Web sites,” warned the judge hearing the case in the Delhi High Court.&lt;/p&gt;
&lt;p&gt;The government cites images insulting to one or another of India’s religions, content it says could provoke unrest. It is up to social media sites, the government says, to manually screen and censor all potentially offensive content or face prosecution.&lt;/p&gt;
&lt;p&gt;“No freedom can be absolute,” said the chairman of the Press Council of India, Justice Markandey Katju. “The hold of religion is very strong in India, and you have to respect that. You can’t go insulting people.”&lt;/p&gt;
&lt;p&gt;Katju’s concerns are perhaps understandable in a country whose birth was scarred by the mass murder of Hindus and Muslims at the time of independence in 1947. But the effect, critics say, is to give the mob the power of veto and take away a fundamental right in a free society: the right to offend others.&lt;/p&gt;
&lt;p&gt;Sunil Abraham at the Center for Internet and Society says the government’s proposals on Web censorship would kill the vibrancy of the Internet in India. Wikipedia founder Jimmy Wales warned that they would scare off investors and crush the country’s potential to become a true leader in the Internet industry.&lt;/p&gt;
&lt;p&gt;The irony, according to critics, is that the concern over religiously offensive content was little more than an excuse: What appears to have really offended the ruling Congress party were defamatory images of their idolized leader, Sonia Gandhi.&lt;/p&gt;
&lt;p&gt;“The myth that is spread is that the government is acting against hate speech and obscenity. But when the government acts to control information on the Internet, it is usually defamatory or potentially defamatory content against people and politicians,” Abraham said.&lt;/p&gt;
&lt;p&gt;Almost a year ago, &lt;a class="external-link" href="http://www.washingtonpost.com/wp-dyn/content/article/2011/02/16/AR2011021602323.html"&gt;Prime Minister Manmohan Singh said the media &lt;/a&gt;were undermining the nation’s self-confidence by harping on official corruption. Since then, talk of tighter media regulation has grown louder.&lt;/p&gt;
&lt;p&gt;And despite the vibrancy of India’s mainstream English-language media, the country’s ranking on the press freedom index of the journalism advocacy group &lt;a class="external-link" href="http://en.rsf.org/press-freedom-index-2011-2012,1043.html"&gt;Reporters Without Borders&lt;/a&gt; has dropped, from 105th in 2009 to 131st last year.&lt;/p&gt;
&lt;h3&gt;An optimistic view&lt;/h3&gt;
&lt;p&gt;Arnab Goswami, the editor and anchor of the Times Now television channel, points to television’s dramatic success in exposing official corruption in the past two years to argue that there is plenty to be optimistic about.&lt;br /&gt;&lt;br /&gt;Courts in India generally have a better record than do politicians of defending freedom of expression. And there are people in government, including Information and Broadcasting Minister Ambika Soni, determined to resist the temptation to take a harder line.&lt;br /&gt;&lt;br /&gt;“The pressure was enormous, to control the media, to clamp down on the media,” she said. “But I did withstand the pressure.”&lt;br /&gt;&lt;br /&gt;Soni said she sees self-regulation by the media rather than official regulation as the way forward. She maintains that, for example, the debate about Rushdie has not necessarily done India any harm.&lt;br /&gt;&lt;br /&gt;“That’s the strength of Indian society,” she said. “You have discussed it, everyone has had their say on the matter, the government has had its share of criticism, yet we’ve moved on.”&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/india-debates-limits-to-freedom-of-expression'&gt;http://editors.cis-india.org/news/india-debates-limits-to-freedom-of-expression&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-02-28T09:50:37Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
