<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="http://editors.cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>http://editors.cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 31 to 45.
        
  </description>
  
  
  
  
  <image rdf:resource="http://editors.cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="http://editors.cis-india.org/events/you-too-can-write-on-wikipedia-2014-training-workshop"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/times-of-india-march-30-2015-kim-arora-you-can-still-get-into-trouble-for-online-posts"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/digital-natives/blog/you-are-here"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/YojanaNov2014.png"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/yogyakarta-meeting-on-open-culture-and-critical-making"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/Yogesh.jpg"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/Yesha.jpg"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/the-atlantic-wire-november-29-2012-david-wagner-you-can-get-arrested-for-facebook-status-update-now"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/yelena.jpg"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/year-ahead-copyright-2010"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/about/people/Yatharth.png"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/Yamini.jpg"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/yale_logo.png"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/business-world-9-2-2015-abraham-c-mathews-www-the-hackers-haven"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/wsis-high-level-event-open-consultation-process"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="http://editors.cis-india.org/events/you-too-can-write-on-wikipedia-2014-training-workshop">
    <title>You Too Can Write on Wikipedia! — Training workshop</title>
    <link>http://editors.cis-india.org/events/you-too-can-write-on-wikipedia-2014-training-workshop</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society's Access to Knowledge (CIS-A2K) team in collaboration with Andhra Pradesh Tourism Development Corporation and National Institute of Tourims and Hospitality Management is organizing a two-days training workshop (December 5-6, 2013) in Gachibowli, Hyderabad.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;As you may know, Wikipedia is an online encyclopedia, and is the 5th most-visited website in the world! It's completely free to use and re-use, it has no advertising, and is available in more than 280 different languages - including 20+ Indian languages. Wikipedia articles are written by ordinary people who volunteer to share their knowledge with the world.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;What will you gain from Wikipedia editing?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;It improves &lt;b&gt;writing skills&lt;/b&gt;. Wikipedia provides students/professionals/researchers a platform to hone their writing skills. Writing on Wikipedia enhances &lt;b&gt;critical thinking&lt;/b&gt; and the ability&lt;b&gt; to &lt;/b&gt;see all sides of a story. Students will find this incredibility useful in both their personal and professional lives while evaluating the pros and cons of different situations, projects, assignments etc. Wikipedia editing also strengthens &lt;b&gt;research skills&lt;/b&gt;. A Wikipedia editor has to provide credible references by looking up books, journals and online materials. Writing on Wikipedia is a good practice for those who will also work on a thesis or a research project.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Your articles will be read by thousands of people across the globe&lt;/b&gt;. If you edit a Wikipedia article, it is there *forever* and the audience can be any number from the 500 million who read Wikipedia every month!&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;It'll boost your chances in admissions or scholarships or placements&lt;/b&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;It teaches students how to collaborate!&lt;/b&gt; Editing Wikipedia is magical. You add some content and someone from some other part of the class or school or town or country or somewhere else in the world adds a little bit more and makes the contribution that much better. Wikipedia helps one learn how to work productively with other people, even those you don’t know and may never actually meet.&lt;/p&gt;
&lt;p&gt;The workshop will cover the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;What exactly is Wikipedia and how does it work?&lt;/li&gt;
&lt;li&gt;Who edits Wikipedia?&lt;/li&gt;
&lt;li&gt;How do I edit Wikipedia? &lt;/li&gt;
&lt;li&gt;What can I edit?&lt;/li&gt;
&lt;li&gt;How can I input text in Indian languages?&lt;/li&gt;
&lt;li&gt;How do I insert images?&lt;/li&gt;
&lt;li&gt;How do I find and add references?&lt;/li&gt;
&lt;li&gt;Do’s and Don’ts&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;Schedule&lt;/h2&gt;
&lt;p&gt;&lt;span style="text-decoration: underline;"&gt;December 5, 2013&lt;/span&gt; (Day 1)&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Timing&lt;/th&gt;&lt;th&gt;Activity&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;09.30 to 10.00 a.m.&lt;/td&gt;
&lt;td&gt;Welcome and Introduction&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10.00 to 11.15 a.m.&lt;/td&gt;
&lt;td&gt;Building Knowledge Bases and Platforms via Mass Collaboration on the Internet&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11.15 to 11.30 a.m.&lt;/td&gt;
&lt;td&gt;Tea/Coffee Break&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11.30 to 01.00 p.m.&lt;/td&gt;
&lt;td&gt;Wikipedia demonstration + Basics of Wikipedia Editing (hands on activity)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;01.00 to 02.00 p.m.&lt;/td&gt;
&lt;td&gt;Lunch Break&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;02.00 to 02.15 p.m.&lt;/td&gt;
&lt;td&gt;Energizer&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;02.15 to 03.45 p.m.&lt;/td&gt;
&lt;td&gt;Basics of Wikipedia Editing (Hands on activity)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;03.45 to 04.00 p.m.&lt;/td&gt;
&lt;td&gt;Tea/Coffee Break&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;04.00 to 05.30 p.m.&lt;/td&gt;
&lt;td&gt;NPOV on Wikipedia (Spectrogram activity)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;05.30 to 05.45 p.m.&lt;/td&gt;
&lt;td&gt;Look back on what has worked and what has not&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;span style="text-decoration: underline;"&gt;December 6, 2013&lt;/span&gt; (Day 2)&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Timing&lt;/th&gt;&lt;th&gt;Activity&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;09.30 to 11.15 a.m.&lt;/td&gt;
&lt;td&gt;Advanced Wikipedia Editing (Hands on activity)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11.15 to 11.30 a.m.&lt;/td&gt;
&lt;td&gt;Tea/Coffee Break&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11.30 to 01.00 p.m.&lt;/td&gt;
&lt;td&gt;On Wiki activity&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;01.00 to 02.00 p.m.&lt;/td&gt;
&lt;td&gt;Lunch Break&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;02.00 to 02.15 p.m.&lt;/td&gt;
&lt;td&gt;Energizer&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;02.15 to 03.45 p.m.&lt;/td&gt;
&lt;td&gt;Wikimedia projects and Tourism&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;03.45 to 04.00 p.m.&lt;/td&gt;
&lt;td&gt;Tea/Coffee Break&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;04.00 to 05.30 p.m.&lt;/td&gt;
&lt;td&gt;Group Activity – Wiki projects on Tourism&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;05.30 to 05.45 p.m.&lt;/td&gt;
&lt;td&gt;Feedback and Closing session&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;ul&gt;
&lt;li&gt;For map of the venue: click this link: &lt;a class="external-link" href="http://sh.st/r90j"&gt;http://sh.st/r90j&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;For venue: click this link: &lt;a class="external-link" href="http://sh.st/r889"&gt;http://sh.st/r889&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/events/you-too-can-write-on-wikipedia-2014-training-workshop'&gt;http://editors.cis-india.org/events/you-too-can-write-on-wikipedia-2014-training-workshop&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Wikimedia</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    

   <dc:date>2013-12-06T07:55:38Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/times-of-india-march-30-2015-kim-arora-you-can-still-get-into-trouble-for-online-posts">
    <title>You can still get into trouble for online posts: Digital law experts</title>
    <link>http://editors.cis-india.org/internet-governance/news/times-of-india-march-30-2015-kim-arora-you-can-still-get-into-trouble-for-online-posts</link>
    <description>
        &lt;b&gt;The internet in India is freer now, but individuals could still to get into trouble for online posts, say digital media and law experts. Hailing the Supreme Court judgment on Tuesday as a landmark verdict for free speech in India, experts who have closely read the judgment say there is much to be careful about too. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Kim Arora was &lt;a class="external-link" href="http://timesofindia.indiatimes.com/tech/tech-news/You-can-still-get-into-trouble-for-online-posts-Digital-law-experts/articleshow/46741580.cms"&gt;published in the Times of India&lt;/a&gt; on March 30, 2015. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The scrapping of the contentious section doesn't mean that one has a free run, cautions Sunil Abraham, executive director, Centre for Internet and Society. An online comment can still land you in jail, he says.&lt;br /&gt;&lt;br /&gt;"The judgement in no way means that speech on online platforms will be unregulated now. You can still be charged for pornography or voyeurism under the IT Act. There are many provisions in the Constitution and Indian Penal Code that the government can use to target people it wants to go after. You can be still charged for hate speech or defamation - which is a criminal offence in India - for an online comment," says Abraham.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While lawyer Apar Gupta found the judgment to be forward-looking, he pointed to Para 98 of the 120 page judgment, which addresses Article 14 of the Constitution regarding "discrimination" and talks of the distinction between online and other media.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"We make it clear that there is an intelligible differentia between speech on the internet and other mediums of communication for which separate offences can certainly be created by legislation," says the judgment. "The court has indicated that special offences can be created for the internet. Constant vigilance is the price of liberty. We need to constantly engage with these issues to keep the internet free," says Gupta.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The judgment has been praised for making a distinction between online posts and messages that pertain to advocacy, discussion and incitement. "This is an excellent decision. The SC is saying that no matter what the medium, we stand for constitutional rights. The judges were ready to listen, and ready to share their experience of using the internet also," says Mishi Choudhary, legal director at Software Freedom Law Center, adding, "It was a lost opportunity for the Modi government. They should have gotten rid of section 66 A themselves."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section 69A of the Act, which stands as is, allows non-transparent blocking of online content in the interest of "sovereignty and integrity of India, defense of India, security of the State, friendly relations with foreign states or public order or for preventing incitement to the commission of any cognizable offence relating to above." However, Choudhary says that since it is a narrowly-drawn provision, it ensures more safeguards.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"It will be noticed that Section 69A unlike Section 66A is a narrowly drawn provision with several safeguards. First and foremost, blocking can only be resorted to where the Central Government is satisfied that it is necessary so to do. Secondly, such necessity is relatable only to some of the subjects set out in Article 19(2). Thirdly, reasons have to be recorded in writing in such blocking order so that they may be assailed in a writ petition under Article 226 of the Constitution," she says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Going forward, the government plan of action should focus on balancing safety and freedom on the internet, says Rajya Sabha MP Rajeev Chandrasekhar, who himself was one of the petitioners. "The final endgame has to be one where we have a new law or even a new IT Act which meets the twin objectives of a safe and free internet. The two need not be mutually exclusive," he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(With inputs from Anand J in Bengaluru) &lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/times-of-india-march-30-2015-kim-arora-you-can-still-get-into-trouble-for-online-posts'&gt;http://editors.cis-india.org/internet-governance/news/times-of-india-march-30-2015-kim-arora-you-can-still-get-into-trouble-for-online-posts&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Chilling Effect</dc:subject>
    

   <dc:date>2015-04-02T01:44:32Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/digital-natives/blog/you-are-here">
    <title>You Are Here</title>
    <link>http://editors.cis-india.org/digital-natives/blog/you-are-here</link>
    <description>
        &lt;b&gt;Geo-tagging applications are creating new and impromptu communities of true.&lt;/b&gt;
        &lt;p&gt;As somebody who thinks he is quite “with it” when it comes to digital technologies, my universe was slightly shaken by a bunch of screen-agers. I asked them if they blogged. There were 10 seconds of awkward silence, in which they exchanged looks, cleared throats and fidgeted. I thought I had perhaps crossed a line and they might be uncomfortable sharing their personal blogs with me. The universe of blogs is often restricted to close friends. I was just about to reassure them that they did not have to share theirs, when a bold one looked me in the eye and said, “You still blog? You must be so old! Blogging is, like, so 20th century!” The school kids, their pockets bulging with iPods, PSPs, cellphones and Bluetooth devices all nodded in unison.&lt;/p&gt;
&lt;p&gt;It was a startling realisation that about a decade ago, there were young people, largely in schools and universities, for whom blogging was the coolest thing. Sites like LiveJournal, Blogspot and Wordpress were the hottest addresses. People formed communities, interest groups, meet-up platforms, swap groups and cool-kids’ clubs while providing detailed insights into their personal life and incisive commentary on the world around them. Blogging has been accepted by all sectors of society; governments use them for the dissemination of policies and reports, marketing companies use them to share reviews and invite feedback, schools and universities use them as teaching tools.&lt;/p&gt;
&lt;p&gt;However, after this unsettling adventure, I decided to figure out where the younger generation was spending its time. A little bit of prodding and the screen-agers guided me to interfaces that were more than just screens to access the internet. And so I was introduced to FourSquare, the geo-tagging application that rides on your cellphone and publishes information about your physical location. An app which has become a rage around the world. With the easy availability of smart phones and cheap GPRS access, it has become easy to triangulate one’s position using Global Positioning Systems (via satellite) or your Internet Service Providers. FourSquare, like many other applications, blurs the ever decreasing gap between virtual reality and real life, and now allows users to “check in” at locations that they pass through and publish information about their whereabouts, on sites like Facebook or especially dedicated sites.&lt;/p&gt;
&lt;p&gt;For the digital native it has become a way of forming a support group and a peer network like never before. Of the six digital natives I spoke to, at least two keep track of their close friends through this app. All of them have participated in flash parties, one met his girlfriend because they happened to be in the same coffee shop and sent each other messages. Two confessed to “stalking” somebody in school using the app. And then one told me the story of how FourSquare helped her in a sticky situation. Let’s call her R.&lt;/p&gt;
&lt;p&gt;One night, after a study session with her friends, R and her roommate started their 2 km walk home. On the way, they became aware of a group of boys following them. They were only half-way home and the streets were completely deserted, since it was past midnight. R posted about it on FourSquare, and marked the route she was taking home and sent it to all the people who had checked in at different places on that route. And to her relief and surprise, she immediately received messages on “how to be safe”. One enterprising user asked all the users still awake on the route that R and her friend were taking to come out and stand at their gates. In a matter of minutes, R was delighted to see the streets no longer deserted. On the short walk home, she encountered 17 people, mostly young, standing by and seeing them home to safety. R recalls the incident with pleasure.&lt;/p&gt;
&lt;p&gt;When I asked her about the possibility of somebody else harassing them because they knew they were vulnerable, she looked a little perplexed and said, “but they were all my friends,” despite the fact that she did not know any of them and had never met them. They were together in a design of trust that the application provided and because of their digital commonalities, they had become friends and neighbours and communities of support for each other. “And now you are going to blog about it, aren’t you?” asked R, as all of them burst into giggles.&lt;/p&gt;
&lt;p&gt;Read the original in&lt;a class="external-link" href="http://www.indianexpress.com/news/you-are-here/694540/3"&gt; Indian Express&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/digital-natives/blog/you-are-here'&gt;http://editors.cis-india.org/digital-natives/blog/you-are-here&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Natives</dc:subject>
    

   <dc:date>2011-08-04T10:31:31Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/YojanaNov2014.png">
    <title>Yojana</title>
    <link>http://editors.cis-india.org/home-images/YojanaNov2014.png</link>
    <description>
        &lt;b&gt;Yojana article&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/YojanaNov2014.png'&gt;http://editors.cis-india.org/home-images/YojanaNov2014.png&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2014-12-05T01:04:26Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/yogyakarta-meeting-on-open-culture-and-critical-making">
    <title>Yogyakarta Meeting on Open Culture and Critical Making</title>
    <link>http://editors.cis-india.org/news/yogyakarta-meeting-on-open-culture-and-critical-making</link>
    <description>
        &lt;b&gt;Sharath Chandra Ram will be part of the ASIA LABS theme panel and will also be doing community FOSS/FOSH workshops at the Maker events at the event organized by HONF Foundation, Catec, and r0g from June 12 to 15, 2014. &lt;/b&gt;
        &lt;p&gt; &lt;/p&gt;
&lt;p&gt;Venues : Langgeng Art Foundation (LAF) , Ndalem Mangkubumen, Widya Mataram University&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;span&gt;side event:&lt;b&gt;&lt;br /&gt; 03.00pm – 05.30pm (FABLAB_OD24h):&lt;/b&gt;&lt;/span&gt;&lt;br /&gt; &lt;span&gt; Opening Workshop at HONFablab (Fablab Yogyakarta)&lt;/span&gt;&lt;br /&gt; &lt;b&gt;&lt;span&gt;DrawDio Workshop by Helmi Hardian (WAFT, SBY)&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;OPENING | 12 June 2014&lt;/b&gt;&lt;br /&gt; 07.00 PM at Langgeng Art Foundation (LAF) Yogyakarta&lt;/p&gt;
&lt;p&gt;&lt;b&gt;07.00pm – 07.15pm :&lt;/b&gt;&lt;br /&gt; Opening Performance, by Dream Orchestra&lt;/p&gt;
&lt;p&gt;&lt;b&gt;07.15pm – 07.45pm: Welcome Speech and Outline:&lt;/b&gt;&lt;br /&gt; - Ilham Habibie (The Habibie Center, CATEC)&lt;br /&gt; - Stephen Kovats (r0g_)&lt;br /&gt; - Venzha Christ (HONF Foundation) and presents:&lt;br /&gt; - Bapak Muchsan. (Rector of Widya Mataram Univ.)&lt;br /&gt; - Bapak. J. Eka Prijatma (Rector of Sanata Dharma Univ.)&lt;br /&gt; - Gregorius Subanar (Sanata Dharma University)&lt;/p&gt;
&lt;p&gt;&lt;b&gt;08.00pm – 08.30pm:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;Screening Movie “DO TIMI MAKE SINDI”&lt;/b&gt;&lt;br /&gt; Speech: Gentur Suria (Movie Director)&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Opening Exhibition “DO! MAKE!”&lt;/b&gt;&lt;br /&gt; Speech: Irene Agrivina (Exhibition Curator)&lt;/p&gt;
&lt;p&gt;&lt;b&gt;08.30pm – 10.00pm:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;Collaborative Visual and Sound Performance by:&lt;/b&gt;&lt;br /&gt; - Felix Deufel and Friends (DE)&lt;br /&gt; - DJ Wok The Rock (YK)&lt;br /&gt; - DJ Haman &amp;amp; DJ Ones (YK)&lt;/p&gt;
&lt;p&gt;Welcoming Dinner&lt;/p&gt;
&lt;p&gt;&lt;b&gt;10.00pm – 12.00pm:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;Critical Cocktail Session 1.0&lt;/b&gt;&lt;br /&gt; Introduction-get together&lt;/p&gt;
&lt;p&gt;&lt;b&gt;———————–&lt;br /&gt; &lt;span&gt;Side Event:&lt;b&gt;&lt;br /&gt; &lt;b&gt;(FABLAB_OD24h):&lt;/b&gt;&lt;br /&gt; 12 June 2014 | 11.00pm – 12.00pm&lt;br /&gt; Midnight Workshop at HONFablab (Fablab Yogyakarta)&lt;br /&gt; &lt;/b&gt;&lt;/span&gt;&lt;/b&gt;&lt;span&gt;Intelligent Furniture Workshop by DORXLab&lt;/span&gt;&lt;br /&gt; &lt;b&gt;———————–&lt;/b&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;b&gt;CONFERENCE DAY#01 | 13 June 2014&lt;br /&gt; &lt;/b&gt;at Ndalem Mangkubumen, Widya Mataram University&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Side Event:&lt;b&gt;&lt;br /&gt; &lt;b&gt;(FABLAB_OD24h):&lt;/b&gt;&lt;br /&gt; 13 June 2014 | 09.00am – 11.00am&lt;br /&gt; Morning Workshop at HONFablab (Fablab Yogyakarta)&lt;br /&gt; &lt;/b&gt;Edible Book Workshop by Saad Chinoy&lt;/span&gt;&lt;br /&gt; &lt;b&gt;———————–&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;09.00am – 09.15am:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;15 mins Body and Mind Excercise&lt;/b&gt;&lt;br /&gt; short meditation by Craig Warren Smith&lt;/p&gt;
&lt;p&gt;&lt;b&gt;09.30am – 10.00am:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;[proto:type] A &lt;/b&gt;&lt;br /&gt; Opening Speech&lt;br /&gt; &lt;b&gt;Introduction to [proto:type] Y2014 Yogyakarta Meeting of Open Culture and Critical Making&lt;/b&gt;&lt;br /&gt; Technology and Society&lt;br /&gt; by Ilham Habibie (The Habibie Center, CATEC)&lt;/p&gt;
&lt;p&gt;&lt;b&gt;10.00am – 11.30:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;[proto:type] B Session I&lt;/b&gt;&lt;br /&gt; &lt;b&gt;“Open System and Critical ICT4D”&lt;/b&gt;&lt;br /&gt; Moderator: Gregorius Subanar&lt;br /&gt; Panelist:&lt;br /&gt; - Craig Warren Smith&lt;br /&gt; - Etiene Turpin&lt;br /&gt; - Eku Wand&lt;br /&gt; - Sanata Dharma ICT4D&lt;br /&gt; - Yantisa Akhadi&lt;/p&gt;
&lt;p&gt;11.45am – 12.30pm:&lt;br /&gt; Break | Friday Prayer&lt;/p&gt;
&lt;p&gt;12.30pm – 01.15pm:&lt;br /&gt; Open Cultures/P2P Intro &amp;amp; Lunch&lt;/p&gt;
&lt;p&gt;&lt;span&gt;side event:&lt;/span&gt;&lt;br /&gt; &lt;span&gt; 10.00am – 01.30pm:&lt;/span&gt;&lt;br /&gt; &lt;span&gt; &lt;b&gt;Open Workshop at Makers Booth&lt;/b&gt;, Limasan Ndalem Mangkubumen, Widya Mataram University&lt;/span&gt;&lt;br /&gt; &lt;span&gt; Sticthing on Plywood session I by Maken Living Indonesia&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;b&gt;01.30pm – 03.00pm:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;[proto:type] B Session II&lt;/b&gt;&lt;br /&gt; &lt;b&gt;“Open Design and Critical Making”&lt;/b&gt;&lt;br /&gt; Moderator: Bertha Bintari&lt;br /&gt; Panelist:&lt;br /&gt; - Deanna Herst&lt;br /&gt; - Steve McCoy&lt;br /&gt; - Jean Nöel Montagne&lt;br /&gt; - Stefania Druga&lt;br /&gt; - Yoyok Wahyudi Subroto&lt;br /&gt; - Enda Nasution&lt;br /&gt; - Matt Rato (live stream)&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;side event:&lt;/span&gt;&lt;br /&gt; &lt;span&gt; 02.00pm – 04.00pm:&lt;/span&gt;&lt;br /&gt; &lt;span&gt; &lt;b&gt;Open Workshop at Makers Booth&lt;/b&gt;, Limasan Ndalem Mangkubumen, Widya Mataram University&lt;/span&gt;&lt;br /&gt; &lt;span&gt; Fun with Arduino Workshop by Yudianto Asmoro&lt;/span&gt; &lt;span&gt;03.00pm – 05.30pm:&lt;/span&gt;&lt;br /&gt; &lt;span&gt; &lt;b&gt;&lt;b&gt;(FABLAB_OD24h):&lt;/b&gt;&lt;br /&gt; Afternoon Workshop at HONFablab (Fablab Yogyakarta)&lt;br /&gt; &lt;/b&gt;Noise2Noise Workshop by Felix Deufel&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;03.00pm – 03.30pm:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;Critical Cocktail Break&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;04.00pm – 05.00pm:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;[proto:type] C Session III&lt;/b&gt;&lt;br /&gt; &lt;b&gt;“Asia Labs”&lt;/b&gt;&lt;br /&gt; Moderator: Argha Mahendra&lt;br /&gt; Panelist:&lt;br /&gt; - Tommy Surya (Fablab Asia Network)&lt;br /&gt; - Jay Fajardo (Launch Garage – SEA Labs)&lt;br /&gt; - Irene Agrivina (HONF)&lt;/p&gt;
&lt;p&gt;&lt;b&gt;———————–&lt;br /&gt; &lt;/b&gt;&lt;span&gt;side event:&lt;/span&gt;&lt;br /&gt; &lt;span&gt; 04.00pm – 05.30pm:&lt;/span&gt;&lt;br /&gt; &lt;span&gt; &lt;b&gt;Open Workshop at Makers Booth&lt;/b&gt;, Limasan Ndalem Mangkubumen, Widya Mataram University&lt;/span&gt;&lt;br /&gt; &lt;span&gt; Make! with 3D Printer workshop by Weissa Adhiprasetya&lt;/span&gt;&lt;br /&gt; &lt;b&gt;———————–&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;05.00pm – 05.30pm:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;[proto:type] D Session IV&lt;/b&gt;&lt;br /&gt; &lt;b&gt;“Community Development Forum”&lt;/b&gt;&lt;br /&gt; 05.00pm – 05.30pm: Session 4.1 “Open Ecology and Sustainable”&lt;br /&gt; 10 mins presentation for each presenter:&lt;br /&gt; - Performance Klub&lt;br /&gt; - Rumah Kardus&lt;br /&gt; - DORXLab&lt;/p&gt;
&lt;p&gt;05.30pm: Break | Maghrib | Dawn Pray&lt;/p&gt;
&lt;p&gt;06.00pm – 06.30pm: Session 4.2 “(H)acktivism as an open solution&lt;br /&gt; 10 mins presentation for each presenter:&lt;br /&gt; - XXLab&lt;br /&gt; - WAFT&lt;br /&gt; - LPTI Pelataran Mataram&lt;/p&gt;
&lt;p&gt;06.30pm – 07.00pm: Session 4.3: Citizen participation for social change&lt;br /&gt; 10 mins presentation for each presenter:&lt;br /&gt; - Hysteria&lt;br /&gt; - C2O&lt;br /&gt; - Explainer Maker&lt;/p&gt;
&lt;p&gt;07.00pm – 07.45pm: Session 4.4: Development at the Entrepreneurial &amp;amp; Grassroots Level&lt;br /&gt; 10 mins presentation for each presenter:&lt;br /&gt; - House The House&lt;br /&gt; - Klub Makan Siang&lt;br /&gt; - Jalan Emas&lt;br /&gt; - Technonatura&lt;/p&gt;
&lt;p&gt;&lt;b&gt;07.45pm: Jalan Emas Documentation&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;08.00pm – 09.30pm: &lt;/b&gt;&lt;br /&gt; &lt;b&gt;[proto:type] DINNER: MEET &amp;amp; GREET&lt;/b&gt;&lt;br /&gt; Venue: Ndalem Kaneman, Widya Mataram University&lt;br /&gt; Gamelan and performance by Among Bekso Dance&lt;/p&gt;
&lt;p&gt;&lt;b&gt;———————–&lt;/b&gt;&lt;br /&gt; &lt;span&gt;09.00pm – 11.30pm:&lt;/span&gt;&lt;br /&gt; &lt;span&gt; &lt;b&gt;&lt;b&gt;(FABLAB_OD24h):&lt;/b&gt;&lt;br /&gt; Midnight Workshop at HONFablab (Fablab Yogyakarta)&lt;br /&gt; &lt;/b&gt;Fun with Electronics Workshop by Satya Anindita&lt;/span&gt;&lt;br /&gt; &lt;b&gt;———————–&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;10.00pm – 12.00pm:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;FAB BAR&lt;/b&gt;&lt;br /&gt; venue: HONFablab (Fablab Yogyakarta)&lt;/p&gt;
&lt;p&gt;&lt;b&gt;CONFERENCE DAY#02 | 14 June 2014&lt;br /&gt; &lt;/b&gt;at Ndalem Mangkubumen, Widya Mataram University&lt;/p&gt;
&lt;p&gt;&lt;b&gt;09.00am – 09.15am:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;15 mins Body and Mind Excercise&lt;/b&gt;&lt;br /&gt; short meditation by Craig Warren Smith&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;b&gt;———————–&lt;/b&gt;&lt;br /&gt; side event:&lt;br /&gt; 09.00am – 10.30am:&lt;br /&gt; &lt;b&gt;&lt;b&gt;(FABLAB_OD24h):&lt;/b&gt;&lt;br /&gt; Morning Workshop at HONFablab (Fablab Yogyakarta)&lt;br /&gt; Explainer Maker by Andre Takdare&lt;/b&gt;&lt;/span&gt;&lt;br /&gt; &lt;span&gt;10.00am – 01.30pm:&lt;/span&gt;&lt;br /&gt; &lt;span&gt;&lt;b&gt;Open Workshop at Makers Booth&lt;/b&gt;, Limasan Ndalem Mangkubumen, Widya Mataram University&lt;/span&gt;&lt;br /&gt; &lt;span&gt;Sticthing on Plywood session II by Maken Living Indonesia&lt;/span&gt;&lt;br /&gt; &lt;b&gt;———————–&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;09.30am – 10.30am:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;[proto:type] E Session V&lt;/b&gt;&lt;br /&gt; &lt;b&gt;“Y2014 to Y2015 Summit of Critical Making 2015″&lt;/b&gt;&lt;br /&gt; Introduction to [proto:type] Y2014 and toward Y2015 by Stephen Kovats ￼&lt;/p&gt;
&lt;p&gt;&lt;b&gt;09.30am – 10.30am:&lt;br /&gt; &lt;/b&gt;&lt;b&gt;[proto:type] F Session VI&lt;br /&gt; “Open Knowledge as a Platform of Sharing”&lt;br /&gt; &lt;/b&gt;Moderator: Wan Zaleha Radzi&lt;br /&gt; Panelist:&lt;br /&gt; - Elisa Anggraeni&lt;br /&gt; - Yuka Narendra&lt;br /&gt; - Saa￼d Chinoy&lt;br /&gt; - Edin Khoo&lt;br /&gt; - Tia Pamungkas&lt;br /&gt; - Inasanti Susanto&lt;/p&gt;
&lt;p&gt;&lt;b&gt;12.00pm – 01.00pm:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;Lunch&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;———————–&lt;br /&gt; &lt;/b&gt;&lt;span&gt;side event:&lt;br /&gt; 12.00pm – 02.30:&lt;/span&gt;&lt;br /&gt;&lt;b&gt;&lt;b&gt;(FABLAB_OD24h):&lt;/b&gt;&lt;br /&gt; Closing FABLAB_OD24h Workshop at HONFablab (Fablab Yogyakarta)&lt;br /&gt; Introduction to Raspberry Pi by Tommy Surya&lt;br /&gt; &lt;/b&gt;————————&lt;/p&gt;
&lt;p&gt;&lt;b&gt;01.30pm – 03.00pm&lt;/b&gt;&lt;br /&gt; &lt;b&gt;[proto:type] F Session VII&lt;br /&gt; ￼￼”Maker Culture: Of Fields and Labs”&lt;br /&gt; &lt;/b&gt;Moderator: Venzha Christ&lt;br /&gt; Panelist:&lt;br /&gt; - Jeong ok Jeon&lt;br /&gt; - Amrin Hakim&lt;br /&gt; - Marton Kocsev&lt;br /&gt; - Gustaff Hariman Iskandar&lt;br /&gt; - Diyanto Imam&lt;/p&gt;
&lt;p&gt;&lt;b&gt;———————–&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;side event:&lt;br /&gt; 02.00pm – 03.30pm:&lt;/span&gt;&lt;br /&gt; &lt;span&gt;&lt;b&gt;Open Workshop at Makers Booth&lt;/b&gt;, Limasan Ndalem Mangkubumen, Widya Mataram University&lt;/span&gt;&lt;br /&gt; &lt;span&gt;DIY BioPlastic Workshop by Irene Agrivina&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;———————–&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;03.30pm:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;[proto:type] G Session VIII&lt;br /&gt; &lt;/b&gt;Closing speech by Venzha Christ&lt;/p&gt;
&lt;p&gt;–move to Makers Camp–&lt;/p&gt;
&lt;p&gt;&lt;b&gt;MAKERS CAMP DAY#01&lt;/b&gt;&lt;br /&gt; Venue: Tembi Village Yogyakarta&lt;br /&gt; &lt;b&gt;02.00pm – 03.30pm:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;Workshop#01&lt;/b&gt;&lt;br /&gt; Hackidemia Workshop by Stefania Druga&lt;/p&gt;
&lt;p&gt;&lt;b&gt;04.00pm – 05.00pm:&lt;br /&gt; Break&lt;/b&gt;&lt;br /&gt; &lt;b&gt;Traditional Music Performance&lt;/b&gt;&lt;br /&gt; by Tembi Village&lt;/p&gt;
&lt;p&gt;&lt;b&gt;06.00pm – 08.00pm:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;Workshop#02&lt;/b&gt;&lt;br /&gt; DIY Organic Subs Workshop by Blah!&lt;/p&gt;
&lt;p&gt;&lt;b&gt;08.00pm – 10.00pm:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;Workshop#03&lt;/b&gt;&lt;br /&gt; How to Make Ceramics Workshop by Tembi Village&lt;/p&gt;
&lt;p&gt;&lt;b&gt;———————–&lt;br /&gt; &lt;/b&gt;&lt;span&gt;side event:&lt;br /&gt; &lt;b&gt;03.00pm – 01.00am +1&lt;/b&gt;&lt;/span&gt;&lt;br /&gt; &lt;span&gt;&lt;b&gt;cellsDISCO!&lt;/b&gt;&lt;br /&gt; DJ Session&lt;br /&gt; &lt;i&gt;&lt;b&gt;DJ Line-up:&lt;/b&gt;&lt;/i&gt;&lt;br /&gt; DJ Hamam (JKT). DJ Ones (YK). DJ Navis (YK). DJ Latex (YK). DJ Noor  (YK). DJ TIM (YK). DJ Metzdub (YK). DJ Lintang Egha (YK). DJ Felix (DE).  DJ Adit (YK). DJ NDA (YK).&lt;br /&gt; &lt;/span&gt;&lt;b&gt;———————–&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;09.00pm – 10.00pm:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;Makers Dinner&lt;/b&gt;&lt;br /&gt; Dinner is served in traditional way of Tembi Village&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;b&gt;MAKERS CAMP DAY#02&lt;/b&gt;&lt;br /&gt; Venue: Tembi Village Yogyakarta&lt;/p&gt;
&lt;p&gt;&lt;b&gt;07.00am – 09.00am:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;Breakfast&lt;/b&gt;&lt;br /&gt; Breakfast is served in traditional way of Tembi&lt;/p&gt;
&lt;p&gt;&lt;b&gt;11.00am – 01.00pm:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;Workshops:&lt;/b&gt;&lt;br /&gt; Workshop#03: DIY Batik by Tembi Village&lt;/p&gt;
&lt;p&gt;Workshop#04: Open Source Hardware by Yudianto Asmoro&lt;/p&gt;
&lt;p&gt;Workshop#05: Body Hacking by Iwan Wijono&lt;/p&gt;
&lt;p&gt;&lt;i&gt;*workshops are happening on the same time in different spot/space. Participants registration are required&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;01.00pm – 02.00pm:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;Lunch Break&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;02.00pm – 04.00pm:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;Workshops:&lt;/b&gt;&lt;br /&gt; Workshop#06: OS Wash Workshop by Jean Nöel Montagne&lt;/p&gt;
&lt;p&gt;Workshop#07: DIY Greenhouse with Automatic Light by Irene Agrivina&lt;/p&gt;
&lt;p&gt;Workshop#08: DIY Holographic Microscope by Irene Agrivina&lt;/p&gt;
&lt;p&gt;&lt;i&gt;*workshops are happening on the same time in different spot/space. Participants registration are required&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;07.00pm – 08.00pm:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;Makers Dinner&lt;/b&gt;&lt;br /&gt; Dinner is served in traditional way of Tembi Village&lt;/p&gt;
&lt;p&gt;&lt;b&gt;———————–&lt;br /&gt; &lt;/b&gt;&lt;span&gt;side event:&lt;br /&gt; &lt;b&gt;02.00pm – 02.00am +1&lt;/b&gt;&lt;/span&gt;&lt;br /&gt; &lt;span&gt;&lt;b&gt;cellSONIC!&lt;/b&gt;&lt;br /&gt; Bands Performance &amp;amp; DJ Session&lt;br /&gt; &lt;i&gt;&lt;b&gt;Bands Line-up:&lt;/b&gt;&lt;/i&gt;&lt;br /&gt; - - Seek Six Sick – Belkastrelka – Cangkang Serigala – Skandal – Talking  Coasty – Summer in Vienna – Luise Najib - Chika and The Pistol Air –  Distorsi Liar – AHAA – Dinosaur Youth – Fashion Statement (YK)&lt;br /&gt; &lt;i&gt;&lt;b&gt;DJ Line-up:&lt;/b&gt;&lt;/i&gt;&lt;br /&gt; DJ Hamam (JKT). DJ Ones (YK). DJ Navis (YK). DJ Latex (YK). DJ  Noor (YK). DJ TIM (YK). DJ Metzdub (YK). DJ Lintang Egha (YK). DJ  Felix (DE). DJ Adit (YK). DJ NDA (YK).&lt;br /&gt; &lt;/span&gt;&lt;b&gt;———————–&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;02.00am – the next morning:&lt;br /&gt; please, have a rest!&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/yogyakarta-meeting-on-open-culture-and-critical-making'&gt;http://editors.cis-india.org/news/yogyakarta-meeting-on-open-culture-and-critical-making&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2014-07-03T08:57:07Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/Yogesh.jpg">
    <title>Yogesh</title>
    <link>http://editors.cis-india.org/home-images/Yogesh.jpg</link>
    <description>
        &lt;b&gt;Yogesh&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/Yogesh.jpg'&gt;http://editors.cis-india.org/home-images/Yogesh.jpg&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2012-10-07T15:53:25Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/Yesha.jpg">
    <title>Yesha</title>
    <link>http://editors.cis-india.org/home-images/Yesha.jpg</link>
    <description>
        &lt;b&gt;Yesha Paul&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/Yesha.jpg'&gt;http://editors.cis-india.org/home-images/Yesha.jpg&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2019-08-15T16:46:01Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/the-atlantic-wire-november-29-2012-david-wagner-you-can-get-arrested-for-facebook-status-update-now">
    <title>Yes, You Can Get Arrested for a Facebook Status Update Now</title>
    <link>http://editors.cis-india.org/news/the-atlantic-wire-november-29-2012-david-wagner-you-can-get-arrested-for-facebook-status-update-now</link>
    <description>
        &lt;b&gt;A 21-year-old Indian woman thought Mumbai shouldn't have been shutdown for the funeral of an Islamophobic leader. Broadcasting such opinions on Facebook was apparently grounds for arrest. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article by David Wagner was &lt;a class="external-link" href="http://www.theatlanticwire.com/global/2012/11/yes-you-can-get-arrested-facebook-status-update-now/59450/"&gt;published in the Atlantic Wire&lt;/a&gt; on November 29, 2012. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;A Muslim graduate student, Shaheen Dhada posted a note (&lt;a href="https://www.facebook.com/photo.php?fbid=300712513362810&amp;amp;set=a.299963443437717.55180.299958060104922&amp;amp;type=1"&gt;of her iPhone message&lt;/a&gt;) on her timeline November 18th, writing, "Every day thousands of people die, but still the world moves on ... Today, Mumbai shuts down out of fear, not out of respect." Her status was written in reference to the death of Bal Thackeray, the late leader of Hindu extremist group Shiv Sena, responsible for repeated waves violence against Muslims in the Maharashtra state, &lt;a href="http://www.bbc.co.uk/news/world-asia-india-20383401"&gt;according to the BBC&lt;/a&gt;. Another 21-year-old woman, Rinu Shrinivasan, was also arrested by Indian police for stoking "religious enmity." She'd simply clicked "like" on Dhada's post. &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;A mob of angry Thackeray supporters thronged around the police station Dhada's house. Others vandalized her uncle's clinic two days after her arrest. Mumbai newspaper &lt;/span&gt;&lt;/span&gt;&lt;i&gt;&lt;span&gt;&lt;span&gt;The Hindu &lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;span&gt;&lt;span&gt;&lt;a href="http://www.thehindu.com/news/national/facebook-row-police-to-drop-case-against-girls/article4146343.ece"&gt;reports today&lt;/a&gt; that charges have been dropped against the two arrested women, but those observing the case are worried about the precedent this sets for free speech in India. "I have 3,500 followers on Twitter, and I'm pretty sure I annoy 100 of them on a daily basis," says Centre for Internet and Society director Pranesh Prakash. But should that mean he and others in India should picture themselves in handcuffs every time they type a potentially controversial status update? Retired Supreme Court Justice Markandey Katju tells NPR's Julie McCarthy that, at least in this case, the arrest was totally inappropriate: &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;You can mourn a death in whichever way you want, but you can't bring a  whole city to a stoppage. So what this girl wrote was in consonance with  the verdict of the Supreme Court—nothing illegal.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/the-atlantic-wire-november-29-2012-david-wagner-you-can-get-arrested-for-facebook-status-update-now'&gt;http://editors.cis-india.org/news/the-atlantic-wire-november-29-2012-david-wagner-you-can-get-arrested-for-facebook-status-update-now&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-11-30T08:16:20Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/yelena.jpg">
    <title>yelena</title>
    <link>http://editors.cis-india.org/home-images/yelena.jpg</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/yelena.jpg'&gt;http://editors.cis-india.org/home-images/yelena.jpg&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2011-11-24T09:28:22Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/year-ahead-copyright-2010">
    <title>Year Ahead Copyright 2010: Between An Enforcement “Gold Standard” And Stronger Limitations</title>
    <link>http://editors.cis-india.org/news/year-ahead-copyright-2010</link>
    <description>
        &lt;b&gt;Whereas copyright is increasingly being exchanged for contractual relationships why all the debate and new efforts in national and international copyright legislation. Monika Ernet's article in the Intellectual Property Watch examines this in the wake of the Anti-Counterfeiting Trade Agreement and the international treaty on access to online books for the visually impaired. The article also carries Pranesh Prakash's views on introduction of technical protection measures and the protection of them by law.&lt;/b&gt;
        
&lt;p&gt;The secretly negotiated Anti-Counterfeiting Trade Agreement is now in centre stage in the global debates around copyright, as is a prospective new international treaty on access to online books for the visually impaired which comes as part of a broader push to clarify limitations and exceptions to copyright. But some are asking, why all the debate and new efforts in national and international copyright legislation when copyright is increasing being exchanged for contractual relationships?&lt;/p&gt;
&lt;p&gt;ACTA may bring with it the punishment of internet denial for infringement that has been fiercely discussed in several European countries and adopted in France, New Zealand, South Korea, and Taiwan. ACTA is seen by critics as another push by governments backing their rights holders in the eternal wars over copyright.&lt;/p&gt;
&lt;p&gt;But on the other side, there is much hope that a new treaty for the visually impaired will be negotiated at the World Intellectual Property Organization (WIPO). Open-ended consultations on outstanding issues were promised to be finalised over the early months of 2010 by the WIPO Standing Committee on Copyright and Related Rights.&lt;/p&gt;
&lt;h3&gt;ACTA and Enforcement&lt;/h3&gt;
&lt;p&gt;The seventh round of negotiations for ACTA ended after four days of talks in Guadalajara on 29 January. Round eight is expected for April in Wellington, New Zealand. If you ask the negotiators, they will tell you that they expect to get this done in 2010.&lt;/p&gt;
&lt;p&gt;There seems to be a sense of urgency to complete ACTA just at the moment when a growing list of members of national parliaments from the United States (Congress), the United Kingdom and Germany are asking for access to the ACTA documents and while the first small street protest was organised outside the meeting place in Guadalajara, Mexico. “Are the commitments of negotiators to transparency real or a strategic move?” asked New Zealand’s Labour Party politician Clare Curran before the meeting in Guadalajara.&lt;/p&gt;
&lt;p&gt;“We will have a hearing on ACTA presumably in March,” said EU Member of Parliament Alexander Alvaro, who has questioned the European Commission on the transparency, timeline and scope of the agreement. The Commissioner Designate for International Trade, Karel de Gucht, said clearly: “If there is confidentiality, I will respect it and I have to respect it.” It is impossible, he said, to change the terms during the negotiations.&lt;/p&gt;
&lt;p&gt;While he promised that he would make sure Parliament - which has now to agree to ACTA under the newly in effect Lisbon Treaty - would be “duly informed,” the Parliament which just engaged in its first fights over its new competencies with the European Council and Commission might not take that bite, said Alvaro.&lt;/p&gt;
&lt;p&gt;The Commission, meanwhile, is for 2010 preparing to put forward a follow-up to the IP enforcement directive (IPRED), as a draft text on IPRED II for criminal sanctions is expected to be put forward in May or June, immediately after the evaluation report on IPRED due in April.&lt;/p&gt;
&lt;h3&gt;Rethinking Limitations and Exceptions&lt;/h3&gt;
&lt;p&gt;While there is a big push for ACTA - which International Trademark Association President Richard Heath from Unilever said should be set as “gold standard” - there are growing concerns in academic circles. Annette Kur, IP law expert at the Max Planck Institute of Intellectual Property and Tax Law, said there is a feeling in the expert community that “we cannot go on and on tightening the screw.”&lt;/p&gt;
&lt;p&gt;Talks at WIPO about a treaty to grant exemptions for blind and visually impaired people have shown promise, but might also slow down other initiatives for a re-balancing of copyright that academics were hoping for. The implementation of other elements of the WIPO Development Agenda would be a good counterpoint against the current wave of maximal demands in rights protection, according to Kur.&lt;/p&gt;
&lt;p&gt;But proponents say there is gathering momentum for the visually impaired exception now - including a draft treaty text, which does not exist for any other issue in the committee - and to wait risks losing the chance and gambling on an uncertain and potentially very lengthy process.&lt;/p&gt;
&lt;h3&gt;National Copyright Reforms and FTAs&lt;/h3&gt;
&lt;p&gt;Some ongoing national copyright legislative reforms echo the demand for the re-balancing, with Brazil’s copyright reform the most far-reaching of these, as copyright law expert Volker Grassmuck recently wrote. The Brazilian law could be the first copyright law “balancing copyright with access and usage rights and consumer protection its declared goal,” Grassmuck wrote, but also said that the reform work might be stopped by the Brazilian election campaign in 2010. For several months, a final draft has been announced, Grassmuck told Intellectual Property Watch, yet every time publication has been postponed. “There certainly are concerns that the delay results from industry lobbying against the reform at the highest levels,” Grassmuck said.&lt;/p&gt;
&lt;p&gt;Indian copyright reform (that like the Brazilian effort started in 2005) also has made a reference to amendments to secure limitations and exceptions for the visually impaired, but is more conservative when it comes to other issues. It more closely follows the line of harmonising its regulation to the international treaties, namely the WIPO Copyright Treaty and WIPO Performances and Phonograms Treaty.&lt;/p&gt;
&lt;p&gt;The reform effort just got a new push when the Indian Copyright office published a final draft on 24 December. Pranesh Prakash, programme manager at the Center for Internet and Society in Delhi, said that the introduction of technical protection measures and the protection of these by law would bring a big change in India.&lt;/p&gt;
&lt;p&gt;Prakash said he is afraid that intermediary liability is on the political agenda of the Indian Copyright Office. This would make sense if one considers the negotiations for a free trade agreement between India and the EU that can be expected to include a lengthy section covering intellectual property, copyright and online service provider liability similar to the one in the EU-Korea FTA. The EU-Korea FTA was to be voted on by EU Parliament this week; the EU-India FTA is expected to be finalised in 2010.&lt;/p&gt;
&lt;p&gt;Copyright reforms are also under way in Canada, Hong Kong, Serbia, and in the United Kingdom the digital economy bill is under heavy discussion because of far-reaching regulatory power planned for UK communications regulator OFCOM. In Germany, a third round of copyright law reform is on the agenda with private broadcasting companies, publishers and the music industry asking for better copyright protection.&lt;/p&gt;
&lt;h3&gt;Contracts Instead of Copyright?&lt;/h3&gt;
&lt;p&gt;But while these reforms and treaty and FTA negotiations are ongoing, there is also another trend seen by experts and users of copyright, said Jeanette Hofmann, an internet governance expert. “Copyright, this moral beacon, more and more ceases to play a role in practical terms. As an author I have to live with a complete buy-out and as a copyright customer, let’s say in the library, I am often dependent on the contracts that the library has with private companies, too.”&lt;/p&gt;
&lt;p&gt;Benjamin White, head of the intellectual property at the British Library, has asked the question of whether copyright is still relevant in the digital age. “What I deal with is contracts,” he said, warning that “in most EU member states contracts effectively trump copyright laws. Limitations and exemptions are irrelevant, if there is a contract that says otherwise.” Libraries are contracting with private companies that could help them to fund digitisation projects, but would then regulate access to these objects.&lt;/p&gt;
&lt;p&gt;White said while he credits Google for getting the discussion started on how digitisation could be funded, he also wants to see a debate on whether people are comfortable with one private company having access to million of books. The Google book settlement and contracts with libraries in the US and other countries in effect could be seen as a monopoly being created around orphan works and a way to control access to millions of works for years. The EU Commissioner Designate for the Digital Agenda Neelie Kroes, when asked what she thought of Google’s book project, said she liked competition. Regulation for orphan works is on the EU Commission’s work agenda.&lt;/p&gt;
&lt;p&gt;Competition and more business offers were also said by Swiss IP lawyer Rolf Auf der Maur to be the focus of the music industry instead of enforcement. Auf der Maur, regular panellist at Midem (the largest annual conference of the music industry), said acknowledgement was trickling down in the music industry that collective licence models, for example licensing music to internet service providers, or even thoughts about flat-rates might be better than only focussing on enforcement.&lt;/p&gt;
&lt;p&gt;The major labels are interested in ventures like streaming service Spotify. Paul Brindley, co-Founder of digital music expert consultant Music Alley, said government funding for digital music service models could be expected from the British Technology Strategy Board.&lt;/p&gt;
&lt;p&gt;Yet this message could sound overly optimistic given that the music industry is the party heavily promoting a ‘three strikes and you’re out’ approach against copyright infringers.&lt;/p&gt;
&lt;p&gt;Or might there be rights owners that think what Joe McNamee, political expert for European Digital Rights (EDRI), predicts: “you can forget about enforcement of copyright, if you focus on copyright and do not get the right content in the right formats available to consumers then you will not solve the problem.“ Innovation would be blocked, he warned, and ever stronger enforcement regulation would finally lead to a lot of collateral damages in civil rights.&lt;/p&gt;
&lt;p&gt;For librarian White there also is an urgent need for a change. He said regulators need to create clear rules on access in the digital world like are set out in the Brazilian copyright reform proposal. White said he was hoping that WIPO, whose secretary general, Francis Gurry, had acknowledged the challenge of solving the relationship between private contracts and copyright, would act on the issue of access. Will that happen in 2010?&lt;/p&gt;
&lt;p&gt;Monika Ermert may be reached at &lt;a href="mailto:info@ip-watch.ch"&gt;info@ip-watch.ch&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;For original article on IP Watch, &lt;a class="external-link" href="http://www.ip-watch.org/weblog/2010/02/02/copyright-2010-between-an-enforcement-gold-standard-and-stronger-limitations/"&gt;click here&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/year-ahead-copyright-2010'&gt;http://editors.cis-india.org/news/year-ahead-copyright-2010&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Intellectual Property Rights</dc:subject>
    

   <dc:date>2011-04-02T13:43:24Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/about/people/Yatharth.png">
    <title>Yatharth</title>
    <link>http://editors.cis-india.org/about/people/Yatharth.png</link>
    <description>
        &lt;b&gt;Yatharth&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/about/people/Yatharth.png'&gt;http://editors.cis-india.org/about/people/Yatharth.png&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2022-08-26T01:53:57Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/Yamini.jpg">
    <title>Yamini Aiyar</title>
    <link>http://editors.cis-india.org/home-images/Yamini.jpg</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/Yamini.jpg'&gt;http://editors.cis-india.org/home-images/Yamini.jpg&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2012-04-11T10:13:00Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/yale_logo.png">
    <title>Yale</title>
    <link>http://editors.cis-india.org/home-images/yale_logo.png</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/yale_logo.png'&gt;http://editors.cis-india.org/home-images/yale_logo.png&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2010-09-09T05:57:20Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/business-world-9-2-2015-abraham-c-mathews-www-the-hackers-haven">
    <title>WWW: The Hackers’ Haven</title>
    <link>http://editors.cis-india.org/internet-governance/news/business-world-9-2-2015-abraham-c-mathews-www-the-hackers-haven</link>
    <description>
        &lt;b&gt;In an increasingly connected world, it pays to be careful when sharing personal information &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This story by Abraham C. Mathews was published in &lt;a class="external-link" href="http://www.businessworld.in/news/business/it/www-the-hackers%E2%80%99-haven/1707848/page-1.html"&gt;BW | Businessworld Issue Dated 09-02-2015&lt;/a&gt;. Sunil Abraham gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Last year, Whatsapp changed its encryption algorithm several times and, every time, it was breached,” says Saket Modi, hacker, entrepreneur and CEO of Lucideus Technologies, which just created an app that monitors wayward activity on your smartphone. That’s geekspeak for: “Your WhatsApp chats, including deleted ones, would have been accessible to any hacker worth his salt”. And we are talking about a company that was valued at $19 billion at some point during the year. Only in November 2014 did WhatsApp finally embrace end-to-end encryption, which will ostensibly address the issue.&lt;br /&gt; &lt;br /&gt;Or take the sales claim that every smartphone purchaser has heard — “Android is safe from virus.” That’s not, however, what a joint study by security solutions company Kaspersky and Interpol found. In the first half of 2014, 1,75,442 unique malicious programmes targeted at Android were discovered. Clearly a tribute to the platform on which 85 per cent of smartphones run.&lt;br /&gt; &lt;br /&gt;In a TEDx talk last year titled ‘What’s physically possible in the virtual world’, Modi demonstrated how, with access to your smartphone for barely 20 seconds, he can see everything that has ever happened on your phone — text messages, call log, browsing history, and so on. He also showed how fraudulent emails could be disguised so as to appear to have come from a yahoo.com email address, and how you could be hacked even without being connected to the Internet. “There are only two kinds of people in the world,” he says. “Those who know they have been hacked and those who don’t.”&lt;br /&gt; &lt;br /&gt;&lt;b&gt;Epidemic Proportions&lt;/b&gt;&lt;br /&gt;For cyber security, 2014 was annus horribilis. From celebrities whose intimate pictures were dumped on the Internet, to corporates such as Sony, JP Morgan and Target whose records were hacked into and personal information of millions of their customers compromised, it was the year when the proverbial shit hit the fan. Details (names, numbers, even favourite pizza toppings) of six lakh customers of Domino’s Pizza in France and Belgium were stolen for a $40,000 ransom. One hundred and ten million records (credit card details, social security numbers, along with addresses) from Target were stolen. The company later admitted that its sales were “meaningfully weaker” after the data theft was disclosed. One hundred and forty-five million records were stolen from eBay, 109 million from Home Depot and 83 million from JP Morgan during the year.&lt;br /&gt; &lt;br /&gt;In 2013, a group that calls itself the Syrian Electronic Army hacked into Swedish company TrueCaller’s database. TrueCaller, an app, allows you to identify phone numbers. The data is collected from the contact list of those who download the app, which means, it even has details of those who haven’t downloaded or used the app in any way. Estimates put the number of Indians whose numbers could have been stolen at a million.&lt;br /&gt; &lt;br /&gt;Cyber security is not yet a boardroom topic, says Anil Bhasin, MD, India &amp;amp; Saarc, Palo Alto Networks, which claims to create comprehensive security solutions for users but is fast becoming one with the increase in security breach incidents. Enterprises still use legacy technology that at times is 20 years old, he says, giving the example of banks that sometimes have a layer-3 staple inspection firewall, when they should ideally be running on layer-7.&lt;br /&gt; &lt;br /&gt;When companies store your information, you also benefit. For example, when an e-commerce company does so, online shopping becomes faster and easier. But these companies should invest in measures to protect the information, says Sunil Abraham, executive director of the Centre for Internet and Society in Bangalore. But then again, he says, a lot of breaches, like the celebrity iCloud hack, happen because users are negligent with measures designed to protect them. Passwords, for instance.&lt;br /&gt; &lt;br /&gt;A Pew Research report found that only four out of 10 Internet users changed passwords after the ‘heartbleed’ virus (which found a way to unlock encrypted data) was uncovered in April 2014. Only 6 per cent thought their information was stolen. But, in August, it emerged that a Russian crime ring had amassed 1.2 billion user name-password combinations of 500 million email addresses from 4,20,000 websites. A Kaspersky study found that the number of malicious programmes detected rose 10 times in just six months to 6,44,000 in March 2014. This shows the call for vigil cannot not be more critical.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Interestingly, your online financial payments may be relatively more secure, thanks to Reserve Bank of India’s dogged persistence in continuing with the two-step verification process for electronic payments (a one-time password and PIN verification). The central bank drew a lot of flak for barring taxi app Uber from storing payment information and automatically deducting charges at the end of a ride. But Modi isn’t impressed. He likens the two-step verification to a batsman going onto the pitch wearing just a helmet. “The rest of your body is still exposed,” he says.&lt;br /&gt; &lt;br /&gt;&lt;b&gt;Easy Targets&lt;/b&gt;&lt;br /&gt;Here’s one easy hack that Modi describes. Any app that you download from the app store on your phone asks for a set of permissions, which mostly come as an ‘all or nothing’ option. You either grant all the access it asks for, or you can’t download the app. Suppose, you grant a scrabble app access to your text messages. Your number can then be accessed by the app provider. Now think about how your banking transactions are verified — with a one-time password sent as a text message. With access to your text messages, entering that password would hardly be a challenge for hackers, says Modi. Or, suppose you were to set up a new WhatsApp account with that same number. The verification, like we all know, comes through a one-time password sent to your number. With access to your text messages, the hacker is given a virtual key to your entire WhatsApp history.&lt;br /&gt; &lt;br /&gt;Or, take for instance, an app that requests access to your SD card (the storage card in your phone). With that permission, the app gets access to everything on your SD card, including your most private photos. Modi’s company Lucideus recently came out with an app, UnHack, that scans your phone to see which apps can access what data. If you use the app, you will find that not only can Facebook access the call logs on your phone, but apps like Wunderlist (which organises to-do lists) and Pocket (which stores articles for future offline reading) can access your contacts as well. The apps from TED (of  TED Talks fame) as well as Flipkart can see as well as edit your personal photos and documents.&lt;br /&gt; &lt;br /&gt;Companies —Uber, for instance — have in the past been found to be frivolous with data collected. Late last year, Uber greeted a Buzzfeed reporter who had arrived at the company’s New York headquarters with “There you are — I was tracking you”. No prior permission was sought. A venture capitalist, Peter Sims, had written earlier that his exact whereabouts in New York were displayed to a room full of people as part of a demonstration at a company event in Chicago.&lt;br /&gt; &lt;b&gt;&lt;br /&gt;Information Overload&lt;/b&gt;&lt;br /&gt;Adam Tanner, a Harvard fellow and a Forbes columnist, was at an annual conference of the Direct Marketers Association, where he noticed a list of names of 1.8 million people with erectile dysfunction (ED), along with their email addresses and numbers. The organisers claimed the details were volunteered by the people themselves. Knowing that ED is something that men rarely admit to, he made the organisers an offer — “Let me purchase a list of a thousand people, and write to them to see if they know that they are on such a list.” The organisers refused, saying it would be an immoral use of their data. From this, one can tell that the information came from websites that took their details, promising a cure.&lt;br /&gt; &lt;br /&gt;This, and other similar anecdotes made their way to his recent book, What Stays in Vegas, which deals with the world of personal data and the end of privacy as we know it. When Tanner meets Indians, he brings up matrimonial websites. What surprises him is the volume of information that people disclose. To westerners, details such as sub-caste or blood type, as well as in many cases the admission that a person is HIV+ is an outright breach of privacy. That people would volunteer to put this out in public is shocking. “When you are looking for a suitable match, giving the information may be important at the moment, but you must not forget that once something is on the Internet, it can never be completely deleted,” he warns.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But what is the problem if somebody has all the details, you may ask. Is the potential risk greater than the possibility of a perfect match? A PTI report from 2009 talks about a confession by an Indian Mujahideen operative who used information from such sites to get a student identity card as well as a driving licence. Mukul Shrivastava, a partner in the forensic practice at EY, gives you another alarming scenario. Let’s say somebody trawls your Facebook, what is the amount of information that such a person can get access to? Your daily routine, your physical movement, your favourite restaurant or whether you will be at home at a certain time (from a status message like “Can’t wait to watch the Devils trouncing Liverpool at ManU Café tonight!”). Even if a physical attack is not on the agenda, much of the information can be used to guess security questions (favourite cat, first school) and find out required details for phone banking (date of birth, email address, mother’s name). An HDFC Bank official says there is a rise in vishing (the voice equivalent of phishing) attacks, where people with access to bank account numbers as well as personal details pose as bank executives and lure customers with special benefits and convince them to divulge their banking passwords.  &lt;br /&gt; &lt;br /&gt;Security is an individual’s responsibility, says Sunil Abraham. “You have to remember that you have volunteered to put the information online,” he says. Information once put online is not private anymore. It’s like making an announcement in a large hall that is broadcast on TV. That’s what the Internet is. And once the Internet gets to know, it can never really be forgotten, says Vishnu Gopal, chief technology officer at MobME, a mobile value-added services provider. It will be available on some weblink or at least on archive.org, which claims to have ‘435 billion pages saved over time’.&lt;br /&gt; &lt;br /&gt;While reclaiming lost information might be difficult, one can still reclaim privacy. Both Facebook and Gmail have options to disable monitoring by other applications. It might be worthwhile to pay the permissions page a visit. Routine password changes, as well as keying them in every time (rather than saving them on the system) might be worth the trouble. That said, nothing works like caution.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;An Attacking Refrigerator!&lt;/b&gt;&lt;br /&gt;A year ago, Proofpoint, a US-based security solutions provider, noticed an unusual type of cyber attack. Emails were sent in batches of about a lakh, thrice a day, aimed at slowing down large enterprises. What was unique about this attack was that upto 25 per cent of the volume was sent by devices other than computers, laptops, mobile phones or such devices. Instead, the emails came from everyday consumer electronic items like network routers, televisions, and at least one refrigerator, according to the company, with not more than 10 emails from any one device, making the attack difficult to block. This is now known as the first Internet of Things or IoT-based attack, where connected everyday-use devices are hacked into and used as cyber weaponry.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;div&gt;With  the IoT, you have devices talking to one another, opening up multiple  places to be breached, says MobME’s Gopal. From your shoe to T-shirt,  everything becomes a potential bot. India should be concerned. Research  by securities provider Symantec says India tops the list of countries  wherein Distributed Denial of Service (DDoS) attacks originate. DDoS  attacks are those where hundreds of bots target a website (say, an  e-commerce company) on its big discount day, thereby slowing down  traffic to the site. The report says a bot’s services can be bought for  as low as Rs 300 to bring down a site for a few minutes. Monthly  subscription plans are available for lengthier attacks.&lt;/div&gt;
&lt;div&gt;Corporates  can never be too careful, feels Shrivastava who, as part of his  investigations, comes across several instances where companies are  hacked into because of lack of best practices. How many companies have  blocked pen drives on office machinery, he asks. In a tiny device, a  humungous amount of data can be stolen. Till the first incident happens,  nobody realises the importance of security, he says. For example, at  EY, the IT security does not permit copying of the text of emails by the  recipient. Recent reports suggest that the JP Morgan security breach  was the result of neglect of one of its servers in terms of a security  upgrade.&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;According to a study by Microsoft,  the estimated loss to enterprises from lost data in 2014 was $491 billion.&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;&lt;b&gt;You Against The Mafia&lt;/b&gt;&lt;br /&gt;The fight really is about who’s weaker, says Altaf Halde, managing director, Kaspersky Lab-South Asia. “The problem here is the consumer.” Nothing excuses us from not protecting ourselves. That includes getting an anti-virus installed, but most people often disable it when it flags a particular activity that we want to pursue online. &lt;br /&gt; &lt;br /&gt;Halde also brings up the BYOD (bring your own device) culture that is taking root. Asking employees to bring their own devices could help cut costs for a company, but that also brings in their inadequate protection, which could potentially translate into a much higher cost to the company, he says. &lt;br /&gt; &lt;br /&gt;On the other side of the ring is the virtual underground mafia that profits from all types of data that get compromised — details of one’s sexual preferences, favourite restaurants or credit card details. Modi says in underground circles, the going rate for a stolen credit card number is $2.2 for a Visa, $2.5 for a MasterCard and $3 for an AmEx number. Transactions are made through crypto-currencies such as bitcoins, making them virtually untraceable.&lt;br /&gt; &lt;br /&gt;As Modi says, the ideal scenario would be for all of us to throw away our smartphones and live an entirely offline existence. “But since that isn’t feasible, let’s embrace the risk, but with adequate measures to ensure that we are not affected.”&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/business-world-9-2-2015-abraham-c-mathews-www-the-hackers-haven'&gt;http://editors.cis-india.org/internet-governance/news/business-world-9-2-2015-abraham-c-mathews-www-the-hackers-haven&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-02-05T02:20:04Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/wsis-high-level-event-open-consultation-process">
    <title>WSIS+10 High-Level Event: Open Consultation Process</title>
    <link>http://editors.cis-india.org/news/wsis-high-level-event-open-consultation-process</link>
    <description>
        &lt;b&gt;Jyoti Panday represented the Centre for Internet and Society (CIS) at the WSIS+10 High-Level Event:Open Consultation Process held in Geneva from May 28 to 31, 2014. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The Fifth Physical Meeting marked Phase Six of the Open Consultation Process for the WSIS+10 High-Level Event (HLE) to be held in Geneva from June 10 to 13, 2014.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The meeting saw the culmination of the multistakeholder review process on the WSIS+10 Statement on the Implementation of the WSIS Outcomes and the WSIS+10 Vision for WSIS Beyond 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS made interventions on text related to increasing women's participation, freedom of expression, media rights, data privacy, network security and human rights.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS also endorsed text on action line 'Media' which reaffirmed committment to freedom of expression, data privacy and media rights offline and online including protection of sources, publishers and journalists.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/wsis-final-agreed-draft.pdf" class="internal-link"&gt;Download the final agreed draft&lt;/a&gt; of the WSIS+10 Statement on the Implementation of WSIS Outcomes that will be deliberated upon and agreed at the HLE, for your reference.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/wsis-high-level-event-open-consultation-process'&gt;http://editors.cis-india.org/news/wsis-high-level-event-open-consultation-process&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-06-04T10:14:01Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
