<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="http://editors.cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>http://editors.cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 3071 to 3085.
        
  </description>
  
  
  
  
  <image rdf:resource="http://editors.cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/privacy/uid-budget"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/privacy/biometrics"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/twitterati-change-world"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/procuring-books"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/mouse-a-tool-of-revolution"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/raw/histories-of-the-internet/blogs/internet-society-and-space-in-indian-cities/city-and-space"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/raw/histories-of-the-internet/blogs/internet-society-and-space-in-indian-cities/internet-society-space-in-indian-cities-a-call-for-peer-review"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/privacy/finance-and-security"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/digital-natives/blog/flash-of-change"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/privacy/privacy-conferencebanglaore"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/digital-wrongs"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/what-are-you-accused"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/one-wikipedian"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/about/newsletters/january-2011-bulletin"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/openness/blog-old/e-gif-iraq-meeting"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/privacy/uid-budget">
    <title>Open Letter to the Finance Committee: UID Budget</title>
    <link>http://editors.cis-india.org/internet-governance/blog/privacy/uid-budget</link>
    <description>
        &lt;b&gt;This note presents the aspects of the UID project, which have not been considered or incorporated into the UID’s budget. The costs include re-enrollment, loss in human time, and the cost of the audit function. &lt;/b&gt;
        
&lt;ol&gt;&lt;li&gt;&lt;strong&gt;Cost of re-enrollment &lt;/strong&gt;&lt;br /&gt;In the report 'Biometrics Design Standards for UID Applications' &lt;a href="#1"&gt;1&lt;/a&gt;&amp;nbsp;a pilot study in India concluded that about two to five per cent of the people did not have viable biometric data. These data have not been taken into account when setting the program budget. Over time biometrics modify, thus re-enrollment will be required. The UIDAI states that given the changing nature of biometric data – biometrics would be collected every five years for children and every ten years for adults. The current project does not give us a clear picture as to what extent the re-enrollment will be required, and how the additional costs will be accounted for. &amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;strong&gt;&amp;nbsp;Cost of loss in human time &lt;/strong&gt;&lt;br /&gt;A time motion study is a tool used to enhance business efficiency and ensure cost effectiveness by reducing the number of motions in performing a task. In their budget, the UIDAI has accounted for the salaries of individuals associated directly with the UIDAI. The UIDAI has not accounted for the loss in human time that will take place by individuals whose daily routine will be impacted by the UID. If a time motion study were to be done only on the UID project, one would find that individuals not paid by the UIDAI, lose potential wages due to the unpaid time they must dedicate towards the scheme – or that businesses will be forced to compensate for the extra time required for each transaction by providing additional personnel. For example: On a train the number of train masters present is calculated according to how many individuals each ticket master can check and process. With the UID, in order to prevent fraud around subsidized train tickets , individuals on the train will have their biometrics checked and authenticated. The below diagram demonstrates how authenticating an individual by their UID and biometric incurs a loss in human time, and thus, the process of collecting train tickets will require more train masters to complete. &lt;br /&gt;&lt;em&gt;Current Process:&lt;/em&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Present ticket to train master&lt;/li&gt;&lt;li&gt;Train master checks identity card and identity on ticket&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;li&gt;Train master ticks ticket, and ticks his list to indicate verification &lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;em&gt;Process with biometrics&lt;/em&gt;: &lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Present &lt;em&gt;Aadhaar&lt;/em&gt; number, fingerprint , and ticket to train master&lt;/li&gt;&lt;li&gt;Train master takes a reading of your fingerprint and sends it to the central database&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;li&gt;Train master waits for approval from the CIDR&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;li&gt;The CIDR gives a yes or no response&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;li&gt;If the answer is no – the train master swipes your finger five times, and then finds alternate forms of identification&amp;nbsp;&lt;/li&gt;&lt;li&gt;Train master provides proof of verification &lt;/li&gt;&lt;/ul&gt;
&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Cost of audit function &lt;/strong&gt;&lt;br /&gt;The bulk of the UID enabled transactions will have financial implications. Every financial transaction involves three or four parties: the person who collects the payment, the person who prepares the documentation, the person who approves the documentation, and finally the person who audits the documentation. In such a context the technology can play the role of the person who: collects, prepares, and approves each transaction. The role of auditing the transaction cannot be played by technology. The audit function is human, and the audit function needs to be worked into the project budget.&amp;nbsp;&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;span class="Apple-style-span"&gt;&lt;a name="1"&gt;1 “Biometrics Design Standards for UID Applications" pg.22&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/privacy/uid-budget'&gt;http://editors.cis-india.org/internet-governance/blog/privacy/uid-budget&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2011-02-17T11:18:16Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/privacy/biometrics">
    <title>Open Letter to the Finance Committe: Biometrics </title>
    <link>http://editors.cis-india.org/internet-governance/blog/privacy/biometrics</link>
    <description>
        &lt;b&gt;This note points out the weaknesses inherent in biometrics and the pitfalls in using them. It  recommends procedural safeguards that should be adopted by the UID in order to make the use of biometrics more secure and inclusive.&lt;/b&gt;
        
&lt;ol&gt;&lt;li&gt;
&lt;p&gt;&amp;nbsp;&lt;strong&gt;Biometrics are not centrally stored and are used only for identification &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Biometrics, as our first letter notes &lt;a href="#1"&gt;1&lt;/a&gt;&amp;nbsp;are better suited for identification, and are inappropriate for authentication. Therefore, the central server need not store biometric information, and need only store the public key of each citizen's digital signature.&lt;a href="#2"&gt;2&lt;/a&gt;&amp;nbsp;Biometrics on a smart card for authentication will allow service providers to determine if the card is being carried by the right person. This configuration of biometrics has many positives. It is :&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&amp;nbsp;Cost effective&lt;/li&gt;&lt;li&gt;&amp;nbsp;More secure&lt;/li&gt;&lt;li&gt;&amp;nbsp;Places the control of biometric information in the hands of the data subject&amp;nbsp; &lt;/li&gt;&lt;/ul&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Use encrypted data, rather than live data &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The UID scheme has stated that biometrics will be encrypted, but has not provided further details. &lt;a href="#3"&gt;3&lt;/a&gt;&lt;/p&gt;
It is recommended that biometrics are:
&lt;ul&gt;&lt;li&gt;Encrypted whenever it is used, stored and transferred;&lt;/li&gt;&lt;li&gt;A biometric should be encrypted to such a degree that it is not possible to reconstruct the biometric data; and&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;After an encrypted version of the biometric is made, the original biometric should be deleted. &lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;In order to perform an identification check – the biometrics presented should be encrypted and then compared to the encrypted version stored on the card. If the card is stolen – the thief would not be able to harvest biometrics.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Security clearance for all associated entities and personnel &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;UID registrations and transactions will be handled by 'registrars' or in other words personnel who work at organizations not directly under the control of the UIDAI. A clear process associated with who can perform transactions and a proper audit system is needed to prevent 'insider' attacks.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Clearly defined alternate identification factors &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;There are many situations in which a biometric cannot be accepted in a transaction. For example, when the biometric changes, is misread, or is unreadable. The UID has recognized this possibility and has stated: &lt;em&gt;“In case of authentication, the operator needs to find an alternate method of authentication if fingerprint verification fails. The operator/application would not know the cause of verification failure. A timeout will be implemented in service after five attempts.”&lt;/em&gt;&lt;a href="#4"&gt;4&lt;/a&gt;&lt;/p&gt;
The alternative identity factors that will be accepted need to be clearly defined and articulate.
&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Standards for acceptance of biometric as authentication factor&lt;/strong&gt;&lt;br /&gt;
&lt;p&gt;The UIDAI has proposed a whole range of authentication factors – pin, password, partial biometrics, full biometrics, mobile phone and combination's thereof. &lt;a href="#5"&gt;5&lt;/a&gt; Some of these authentication factors may also be presented by the data subject over the Internet. As our previous letters have stated – some authentication factors are more secure than others. Therefore, the UIDAI should publish standards for acceptance of different authentication factors based on the security requirements of different types of transactions. Even if biometrics are used as an authentication standard – in our opinion it should only be used for trivial transactions without major financial or citizenship implications.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;&lt;strong&gt;Footnotes:&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="1"&gt;1http://www.cis-india.org/advocacy/igov/privacy-india/letter-to-finance-committee&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="2"&gt;2 Distinguish and separate the authentication process from the identification process:&amp;nbsp;&lt;/a&gt;&lt;span class="Apple-style-span"&gt;&lt;a name="2"&gt;Identification is a comparison of one set of biometric data against all sets of collected biometrics in one central database to verify the identity of the owner of the biometric data. Authentication is a comparison of a biometric against a stored template to validate the existence of that specific biometric&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="3"&gt;3 http://uidai.gov.in/index.php?option=com_fsf&amp;amp;view=faq&amp;amp;Itemid=206&amp;amp;catid=7&amp;nbsp;&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="3"&gt;&lt;/a&gt;&lt;a name="4"&gt;4 Biometric Design Standards for UID Applications: pg 37&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="4"&gt;&lt;/a&gt;&lt;a name="5"&gt;5 UIDAI Strategy Overview. Creating a Unique Identity Number for Every Resident in India. Pg. 28&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/privacy/biometrics'&gt;http://editors.cis-india.org/internet-governance/blog/privacy/biometrics&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2011-02-17T13:12:22Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/twitterati-change-world">
    <title>Can the twitterati change the world?</title>
    <link>http://editors.cis-india.org/news/twitterati-change-world</link>
    <description>
        &lt;b&gt;Whether it is the Ganapati immersion in Mumbai or a labour union dharna at Jantar Mantar or a hunger strike in Kolkata, India has had a rich history of people coming out on the streets. However, as cities are reshaped in the image of a 'world-class city', public spaces are being steadily appropriated into gated communities which cater to an elite section of the population. &lt;/b&gt;
        
&lt;p&gt;Although the shrinking of public spaces is not the only reason the younger urban population is engaging with cyber space, it has certainly contributed to the shift. The recent historic transformations that have taken place in Egypt and Tunisia show that the digital sphere, which cannot be wholly regulated or shut down, has become the platform for protest.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;When a 26-year old university graduate in Tunisia lost his only source of income after the police had confiscated his fruit and vegetable cart, he set himself on fire, setting into motion a nationwide protest which resonated through the internet. People poured into the streets and stood fast until the authoritarian president, Zine El Abidine Ben Ali, left the country. "Without the internet, it would be possible for the massacre to happen in silence for us and for the outside world. Five years ago, without Facebook and Twitter, the same uprising would have been smothered, " says an anonymous Tunisian interviewed by @kyrah (Twitter).&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In Egypt, as well, technology was harnessed to spread the word across a huge and unprecedented section of the population within a short span of time, engineering the mob gathering we saw in Tahrir Square.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In the vastly different political context of India, digital activism serves the purpose of increasing openness, access and transparency.&amp;nbsp;&lt;/p&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;Nishant Shah, the Research Director for the Centre for Internet and Society in Bangalore argues that the evolution of digital activism in India in the first decade of the 21st century can be seen through the emphasis on creating open structures of arbitration, justice, policy and jurisdiction. "The effort has been to grant access to the state, its governance and resources to the citizens, " he says.&amp;nbsp;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Initially, digital natives in India were considered programmers or techies who were not just web savvy but technologically aware. For example, Vote Report India, a citizen-driven electionmonitoring platform, was the brainchild of software developers, designers and other professionals. Maesy Angelina, whose research for her MA looked into understanding the involvement of youth in online campaigns in India, argues that the way in which digital natives are perceived has been changed, "Since the Pink Chaddi campaign, a new angle becomes more prominent: one that views digital natives as regular people who have grown up with the internet and are web savvy, but not necessarily techies. "&lt;/p&gt;
&lt;p&gt;Campaigns such as Batti Bandh, Justice for Jessica, the 2008 Gateway of India rally after the Mumbai attacks, and most recently the group called "It's my Arunachal, Dream on China, " have leveraged the existing networks on social media websites.&lt;/p&gt;
&lt;p&gt;However, digital activism when transplanted into a developing country such as India leverages its own forms of discrimination, excluding sections of the population without the cultural, economic and educational capital to gain access to these spaces. While the medium can be useful in generating public dialogue, it is not enough to sustain a movement if it cannot reach non-internet users. Though technology can be used to organise, these protests must then manifest into public gatherings.&amp;nbsp;&lt;/p&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;div&gt;
&lt;div&gt;"The digital can help us in re-appropriating and reclaiming the fast disappearing physical spaces of public engagement, gathering and participation in our cities, " says Shah. "The technology is not an alternative, but is embedded in the physical worlds we inhabit and it becomes a powerful tool to fight back and demand the spaces that are central to the imagination of a coherent, responsible and sapient public. "&lt;/div&gt;
&lt;/div&gt;
&lt;/blockquote&gt;
&lt;p&gt;Fight-Back, an online gender equality campaign launched in 2008, now has about 4, 000 members on its Facebook group, who act as a volunteer database nationally. The group uses its website and social media to create awareness and start a conversation which then translates into events such as their Music for Equality concerts and Women's Day marches. The group's founder, Zubin Driver, 41, argues that digital activism is on the rise in India, "Mobile phone penetration in India is already 700 million. Once internet via mobile phones becomes more common, digital activism will cut across class, caste and geographical boundaries. "&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Parmesh Sahani, the founder of the Godrej Culture Lab and the author of Gay Bombay, says that even though the audience for digital activism is restricted to English-speaking, twittering, Facebooking people, congregating online often leads to people coming out on the streets. "There are great opportunities in the intersections between the digital medium and actual physical spaces. The overspill of the Mumbai Gay Pride parade into cafês near the official route goes to show that activism still persists in the peripheries of regulated spaces. "&amp;nbsp;&lt;/p&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;Though often vilified as armchair activism or slacktivism, digital activism has a role to play in facilitating community building in a changing urban landscape. The new forms of organisation and intervention have the potential to be more inclusive than older modes of social transformation, crossing geographies and communities. "Every medium comes with a promise and possibility of change when it's introduced - television, print, radio, loud speaker, " says Patheja. "The conversations on the internet don't usually end there;the participants of the movement hopefully carry these ideas and beliefs to their other linked communities or spaces. "&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;&lt;/span&gt;&lt;span class="Apple-style-span"&gt;&lt;br /&gt;However, all new platforms come with pitfalls. "The power of the internet and wireless social networks as tools of dissent is now well established, " says Rajni Bakshi, author of Bazaars, Conversations and Freedom. "What is not so well known is that the future of the internet itself is under threat - not just from dictatorships and repressive regimes, but from an assortment of private, profit-motivated entities. "&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;&lt;/span&gt;&lt;span class="Apple-style-span"&gt;&lt;br /&gt;Read the original in the Times of India &lt;a class="external-link" href="http://www.timescrest.com/society/can-the-twitterati-change-the-world-4768"&gt;here&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/twitterati-change-world'&gt;http://editors.cis-india.org/news/twitterati-change-world&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Natives</dc:subject>
    

   <dc:date>2011-04-01T16:30:10Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/procuring-books">
    <title>Procuring books in Indian libraries</title>
    <link>http://editors.cis-india.org/news/procuring-books</link>
    <description>
        &lt;b&gt;Campaign to legalise parallel imports gathers steam.&lt;/b&gt;
        
&lt;p&gt;In a move to advocate the cause of libraries and book readers throughout India, campaigners are telling Kapil Sibal, the Minister of Human Resources Development (HRD), why it is important to legalise parallel imports in India. This move is supported by the International Federation of Library Associations in developing countries.&lt;/p&gt;
&lt;p&gt;Among the proposed amendments to the Copyright Act is a proposal to legalise parallel importation of books into India. This provision is now under threat because a publishers’ association convinced the HRD Minister (who is in charge of copyright law) that no one is calling for parallel importation. If parallel importing is not legalised in developing countries, it becomes impossible for libraries in India to even procure books from Amazon (for instance), especially the ones which have not yet released in India.&lt;/p&gt;
&lt;p&gt;Parallel importation allows books that are (legally) bought overseas to be imported into India without asking the copyright owners permission. Without parallel importation being allowed, purchases made by libraries from foreign sellers (for instance on the Internet) are rendered illegal. International organisations like the International Federation of Library Associations (IFLA), Electronic Information for Libraries (eIFL), and Consumers International all support parallel importation, especially in developing countries.&lt;/p&gt;
&lt;p&gt;For more on the need for parallel importation, see this&lt;a href="http://editors.cis-india.org/advocacy/ipr/blog/parallel-importation-of-books/" class="external-link"&gt; write up&lt;/a&gt; by Pranesh Prakash from the Centre for Internet and Society, Bangalore.&lt;/p&gt;
&lt;p&gt;For the campaign letter sent to Kapil Sibal by February 1st 2011, see below:&lt;/p&gt;
&lt;p&gt;To&lt;br /&gt;Minister for Human Resource Development&lt;br /&gt;Room No 301&lt;br /&gt;Shastri Bhawan&lt;br /&gt;Dr. Rajendra Prasad Road&lt;br /&gt;New Delhi – 110 001&lt;/p&gt;
&lt;p&gt;Date: Tuesday, February 1, 2011&lt;/p&gt;
&lt;p&gt;Dear Shri Sibal,&lt;/p&gt;
&lt;p&gt;Subject: Parallel Importation of Books&lt;/p&gt;
&lt;p&gt;We write to you as an organisation interested in the availability of books for libraries. &amp;nbsp;Recently, a publishers’ association has made public statements that there are no groups that are demanding parallel importation, and that they themselves will be harmed by allowing for parallel importation.&lt;/p&gt;
&lt;p&gt;We wish to inform you that this is not true. &amp;nbsp;We believe that being able to legally purchase a book outside of India and import in into India is crucial for libraries. &amp;nbsp;Many books that we wish to provide for our users—faculties, students, and others—are not available in India and have to be imported from abroad.&lt;/p&gt;
&lt;p&gt;Currently the exception contained in s.51(b) proviso is applicable only to individuals for “private and domestic use” and does not cover libraries. &amp;nbsp;Thus, if parallel importation is prohibited, then we will be unable to buy foreign books directly from foreign sellers. &amp;nbsp;We often have to make purchases on online bookstores such as Amazon and Alibris, and these will be construed to be illegal without parallel importation being legal. &amp;nbsp;We will be left at the mercy of what books are offered by sellers in India, instead of being able to buy what is required by our readers.&lt;/p&gt;
&lt;p&gt;Parallel importation is allowed by the TRIPS agreement (Article 6, “Exhaustion”) &amp;nbsp;as well as by the WIPO Copyright treaty (Article 6, “Right of Distribution”). &amp;nbsp;We hope you will keep our concerns in mind.&lt;/p&gt;
&lt;p&gt;Yours sincerely,&lt;br /&gt;Centre for Internet and Society, Bangalore&lt;/p&gt;
&lt;p&gt;Read the original &lt;a class="external-link" href="http://blog.hrisouthasian.org/2011/02/04/procuring-books-in-indian-libraries/"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/procuring-books'&gt;http://editors.cis-india.org/news/procuring-books&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Intellectual Property Rights</dc:subject>
    

   <dc:date>2011-04-01T16:27:28Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/mouse-a-tool-of-revolution">
    <title>Can the mouse be a tool of revolution in India?</title>
    <link>http://editors.cis-india.org/news/mouse-a-tool-of-revolution</link>
    <description>
        &lt;b&gt;Do you consider yourself a ‘slacktivist’?” Vikram Sengupta considers the question for a couple of seconds, and then excuses himself. “I’ll call you back. I’m in the middle of something right now,” he says, and hangs up. Being called a ‘slacktivist’ is probably not very flattering, first thing in the morning or at any other time of the day. But this writer has been at the receiving end of endless mails from him, mails which sought to impose a burning moral imperative to sign up instantly and save the grand Canadian Musk Ox or the Mexican Dumpy Frog. The question, therefore, is not unjustified. &lt;/b&gt;
        
&lt;h3&gt;Activists vs slacktivists&lt;/h3&gt;
&lt;p&gt;The slick application of the word ‘slacktivist’ is the work of eminent scholar and author of The Net Delusion, Evgeny Morozov. Rather stinging in its import, it refers to people who, while campaigning for social causes, limit their action to the click of a mouse. In an earlier interview with DNA Sunday, Morozov was quick to clarify that he had nothing against online activism (activism through social-networking sites, websites, blogs and online petitions), “but I’d rather see the people signing (petitions) also join some offline political movements and campaign for change in the real world as much as they do in the virtual world,” he had said.&lt;/p&gt;
&lt;p&gt;Sengupta does call back. And when the question is put to him again, he says, “People can call me a ‘slacktivist’ if they want. Look, I don’t have a lot of time to devote to activism and I don’t even know if signing petitions actually works. But when I see that a simple click of mine might possibly help save a rainforest or rid the world of its nuclear arsenal, I can’t just cynically turn away. I don’t know… I feel uncomfortable doing it.”&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The phenomenon of ‘slacktivism’ elicits quite strong responses from the Indian activist community. People who grapple with the hard-knock realities of activism are not amused by the casual, momentary concern of the ‘slacktivist’.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Ashley Tellis is a freelance journalist, academic and gay rights activist. “The central limitation here is that one-click activism [slacktivism] becomes a substitute for sustained campaigns and engagement with persistent inequalities. The Indian middle-class, notorious for its apolitical and consumerist selfishness, can now feel smug and assuage its rotten conscience by thinking it has taken action on the net,” says Tellis, with some emotion.&lt;/p&gt;
&lt;p&gt;While Tellis castigates, in no uncertain terms, the seeming apathy of the middle-class, he also acknowledges its prodigious influence on the Indian socio-political mind space. “The middle-class is an important segment. It has power, it has English, and it has the ability to be heard,” he admits.&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Middle class audience&lt;/h3&gt;
&lt;p&gt;While this helps when it is mobilised for a good cause, many find it problematic that so much influence is concentrated in the hands of a single segment of society. In fact, if you take online activism, the number of people who can be reached through the internet is staggeringly low.&lt;/p&gt;
&lt;p&gt;In a country of approximately 120 crore people, only about 5 crore [as per Indiastats.com] have access to the internet. Compare this to Tunisia, where the figure is an impressive 27%, or Egypt, where internet penetration is 16% [World Bank figures]. Given this lack of net access, more than 95% of Indians are taken out of consideration, in one fell swoop, when it comes to internet-specific activism strategies.&lt;/p&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;Anja Kovacs, a fellow at the Centre for Internet and Society says, “Most of these online campaigns are aligned to the profile of its audience.” She argues, in her essay ‘Inquilab 2.0?’ that if the audience is mostly urban and middle-class, it stands to reason that a majority of online campaigns would deal with issues that are relevant to this particular segment.&amp;nbsp;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Kamayani Bali Mahabal, a lawyer and human rights activist, disagrees with this assessment. “Okay, the audience may be middle class, but the issues aren’t all middle class at all,” she counters indignantly. “Look at the ‘Say No to UID’ campaign — there is no debate or dialogue that has been initiated by Nandan Nilekani, the chairperson of UIDAI [Unique ID Authority of India], and this online campaign has created a platform where people’s issues and concerns can be clarified. Many believe that the UID will have a negative impact on the poor and the migrants; this campaign has gotten people to come together to discuss, debate and strategise as well,” she says.&lt;/p&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;But Kovacs insists, “The fact remains that it is people from the middle-class who represent the voices of a largely silent majority. I find this model of activism questionable.” The accuracy of how the voiceless are being represented is a cause of concern for her, as is the very idea of a platform that denies a large section of a vibrant social democracy the chance to express themselves directly.&amp;nbsp;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;The whole situation, Kovacs seems to indicate, is like Chinese whispers, where information might get altered in the retelling. “There are some innovative enterprises like CGNet Swara that tackle this problem. It’s a citizen journalism service, where ordinary citizens can both call in to record news as well as listen to the recorded messages. And they do put some selected messages online, but such enterprises are few and far between.” she says ruefully.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;An aid to offline activism&lt;/h3&gt;
&lt;p&gt;So as things stand, the internet is an indispensable tool to reach out to the influential Indian middle-class. Yet, given India’s socio-economic reality, it’s also a problematic and, in some cases, ineffective medium. Bali Mahabal, when asked how she reconciles these contradictions, says, “I am an offline as well as an online activist. These are not mutually exclusive roles. I straddle both worlds and I can multi-task!”&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In fact, this is a strategy that a lot of offline activists are warming up to now. In 2010, Himanshu Kumar put up a video in which he said,&amp;nbsp;&lt;/p&gt;
&lt;p&gt;“To the people in the cities, I want to say that… you write something on the internet, it doesn’t make any difference to the government. Neither do people read the internet, nor does the government.” Coming from one of the leading advocates of tribal rights in the Chhattisgarh area, this video was a scathing indictment of online activists.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Kumar, however, seems to have softened his stance on the issue since then. He still maintains that online activism by itself is not sufficient to bring about substantial change, but he speaks of how the internet helped him in his campaign in Dantewada.&lt;/p&gt;
&lt;p&gt;“When we were in Dantewada, it was almost like a different planet. We had no connection to the outside world except through the internet. It annoyed the police quite a bit because they knew that if they tried anything untoward, we could get the word out. So the internet is definitely a value addition to on-the-ground activism, but by itself, it has its limitations.”&amp;nbsp;&lt;/p&gt;
&lt;p&gt;It is clear that the internet as a platform for social activism is here to stay. As access to the net increases among Indians, so will its effectiveness. Kovacs, in her essay writes of a person who says, rather movingly, “I believe that… ordinary people can use this medium [internet] to actually make a difference, you know…to change the world.”&amp;nbsp;&lt;/p&gt;
&lt;p&gt;But if activists want to live up to this unnamed person’s lofty expectations, they also need to be fully conscious of the limitations of the internet as a medium for social change.&lt;/p&gt;
&lt;p&gt;Read the original in DNA &lt;a class="external-link" href="http://www.dnaindia.com/india/report_can-the-mouse-be-a-tool-of-revolution-in-india_1507015"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/mouse-a-tool-of-revolution'&gt;http://editors.cis-india.org/news/mouse-a-tool-of-revolution&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-01T16:26:49Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/raw/histories-of-the-internet/blogs/internet-society-and-space-in-indian-cities/city-and-space">
    <title>Internet, Society &amp; Space in Indian Cities - A Call for Peer Review</title>
    <link>http://editors.cis-india.org/raw/histories-of-the-internet/blogs/internet-society-and-space-in-indian-cities/city-and-space</link>
    <description>
        &lt;b&gt;Pratyush Shankar's research project on "Internet, Society &amp; Space in Indian Cities" is a part of the Researchers @ Work Programme at the Centre for Internet and Society, Bangalore. His monograph explores the trajectories of transformation and perception of cities in India in context with the rise of Information Technologies for communication and presence of an active digital space.&lt;/b&gt;
        &lt;p&gt;There has been, in the fields of design and architecture, a close link between the shape and imagination of the city spaces and the dominant technologies of the time. The study of space (architecture, public places and city form) can lead to very interesting insights into the expression of the society with respect to the dominant technologies. Manuel Castells argues that space is not a mere photo¬copy (reflection) of the society but it is an important expression (Castells, 2009). Fredric Jameson, in his identification of the condition of post-modernity demonstrates how the transition into new technologies is perhaps first and most visibly reflected in the architecture, as physical spaces get materially reconstructed, not only to house the needs and peripheries of the emerging technologies but also to embody their aesthetics in their design and built form (Jameson, 1991).&lt;/p&gt;
&lt;p&gt;Earlier technologies have led to new understandings of the notions of the public and commons. Jurgen Habermas argues on how the emergence of print cultures and technologies led to a structural transformation of the public sphere by creating new and novel forms of participation and political engagement for the print readers. Within cinema studies in India, Ashish Rajadhyaksha and Madhav Prasad have looked at the 'cinematic city' — how material conditions of the city transform to house the cinema technologies, and how the imagination of certain cities is affected by the cinematic representations of these spaces (Rajadhyaksha, 2009). Mike Davis' formulations of an 'Ecology of Fear'(Davis, 1999) and Sean Cubbit's idea of 'The Cinema Effect' (Cubitt, 2005) also show the integral relationship that technologies have with the imagination and materiality of urban spaces.&lt;/p&gt;
&lt;p&gt;I wish to explore the trajectories of transformation and perception of cities in India in context with the rise of Information Technologies for communication and presence of an active digital space. The issue of imagination is an important one here as much as the material realities of our cities. However, to begin with one needs to look at the very idea of cities in the Indian context. The fundamental idea of a city and that of a space becomes important here and has been explored in the chapter on cities. The issue of representation as related to ideas of 'social space' and 'abstract space' (Lefebvre, 1992) has been used as a methodological framework while analyzing cities. The social space of a city here refers to the production of space that is biomorphic and anthropological. From this perspective people and history and memory along with social economic processes play a strong role in its definition. Hence, city spaces cannot be understood as a collection of building and other material production alone but rather as an act of social production involving people over a long period of time. The appropriation and representation of cities is another important concern as it creates an imagination structure and often justifies the material transformation.&lt;/p&gt;
&lt;p&gt;The research is primarily concerned with first creating an understanding of the cities in Indian context from the point of view of their social, technological and material productions. The ideas and representations of space therefore, become critical issues of exploration to understand the nature of imagination of space with reference to Indian cities. An empirical study of issues of spatial transformation was conducted in Bangalore and Gurgaon to find certain patterns and its correlation with the present discourses on the technology and the city. The issue of perception of lived in space, cartography and myth became important issues to understand the nature of the imagination of space and positioning of the digital space. The contradiction of a networked geography with the present spatial arrangement of cities that is the centre of a larger territory becomes important shifts to be accounted for while understanding the new geography. The patterns and possibilities in these new geographies of information technologies have been understood by studying three building programmes in the city. The question of transformation and future of cities and the position of digital space in these times then became an important one to answer. The initial study concerns with laying out a framework for examining the techno-spatial discourses in cities in general while establishing the key characteristics of its narration in the Indian context.&lt;/p&gt;
&lt;p&gt;The Researchers At Work Programme, at the Centre for Internet and Society, advocates an Open and transparent process of knowledge production. We recognise peer review as an essential and an extremely important part of original research, and invite you, with the greatest of pleasures, to participate in our research, and help us in making our arguments and methods stronger. The first draft of the monograph is now available for public review and feedback. Please click on the links below to choose your own format for accessing the document.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://editors.cis-india.org/raw/histories-of-the-internet/internet-city.doc" class="internal-link" title="Internet and City Word File"&gt;Word&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://editors.cis-india.org/raw/histories-of-the-internet/internet-city.pdf" class="internal-link" title="Internet and City PDF file"&gt;PDF&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;We appreciate your time, engagement and feedback that will help us to bring out the monograph in a published form. Please send all comments or feedback by April 5, 2011 to nishant@cis-india.org or you can use your Open ID to login to the website and leave comments to this post.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/raw/histories-of-the-internet/blogs/internet-society-and-space-in-indian-cities/city-and-space'&gt;http://editors.cis-india.org/raw/histories-of-the-internet/blogs/internet-society-and-space-in-indian-cities/city-and-space&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>histories of internet in India</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    

   <dc:date>2012-12-14T10:32:32Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/raw/histories-of-the-internet/blogs/internet-society-and-space-in-indian-cities/internet-society-space-in-indian-cities-a-call-for-peer-review">
    <title>Internet, Society &amp; Space in Indian Cities - A Call for Peer Review  </title>
    <link>http://editors.cis-india.org/raw/histories-of-the-internet/blogs/internet-society-and-space-in-indian-cities/internet-society-space-in-indian-cities-a-call-for-peer-review</link>
    <description>
        &lt;b&gt;Pratyush Shankar's research project on "Internet, Society &amp; Space in Indian Cities" is a part of the Researchers @ Work Programme at the Centre for Internet and Society, Bangalore. His monograph explores the trajectories of transformation and perception of cities in India in context with the rise of Information Technologies for communication and presence of an active digital space.&lt;/b&gt;
        
&lt;div id="parent-fieldname-text" class="plain kssattr-atfieldname-text kssattr-templateId- kssattr-macro-text-field-view inlineEditable"&gt;
&lt;p&gt;There has been, in the fields of design and architecture, a close 
link between the shape and imagination of the city spaces and the 
dominant technologies of the time. The study of space (architecture, 
public places and city form) can lead to very interesting insights into 
the expression of the society with respect to the dominant technologies.
 Manuel Castells argues that space is not a mere photo¬copy (reflection)
 of the society but it is an important expression (Castells, 2009). 
Fredric Jameson, in his identification of the condition of 
post-modernity demonstrates how the transition into new technologies is 
perhaps first and most visibly reflected in the architecture, as 
physical spaces get materially reconstructed, not only to house the 
needs and peripheries of the emerging technologies but also to embody 
their aesthetics in their design and built form (Jameson, 1991).&lt;/p&gt;
&lt;p&gt;Earlier technologies have led to new understandings of the notions of
 the public and commons. Jurgen Habermas argues on how the emergence of 
print cultures and technologies led to a structural transformation of 
the public sphere by creating new and novel forms of participation and 
political engagement for the print readers. Within cinema studies in 
India, Ashish Rajadhyaksha and Madhav Prasad have looked at the 
'cinematic city' — how material conditions of the city transform to 
house the cinema technologies, and how the imagination of certain cities
 is affected by the cinematic representations of these spaces 
(Rajadhyaksha, 2009). Mike Davis' formulations of an 'Ecology of 
Fear'(Davis, 1999) and Sean Cubbit's idea of 'The Cinema Effect' 
(Cubitt, 2005) also show the integral relationship that technologies 
have with the imagination and materiality of urban spaces.&lt;/p&gt;
&lt;p&gt;I wish to explore the trajectories of transformation and perception 
of cities in India in context with the rise of Information Technologies 
for communication and presence of an active digital space. The issue of 
imagination is an important one here as much as the material realities 
of our cities. However, to begin with one needs to look at the very idea
 of cities in the Indian context. The fundamental idea of a city and 
that of a space becomes important here and has been explored in the 
chapter on cities. The issue of representation as related to ideas of 
'social space' and 'abstract space' (Lefebvre, 1992) has been used as a 
methodological framework while analyzing cities. The social space of a 
city here refers to the production of space that is biomorphic and 
anthropological. From this perspective people and history and memory 
along with social economic processes play a strong role in its 
definition. Hence, city spaces cannot be understood as a collection of 
building and other material production alone but rather as an act of 
social production involving people over a long period of time. The 
appropriation and representation of cities is another important concern 
as it creates an imagination structure and often justifies the material 
transformation.&lt;/p&gt;
&lt;p&gt;The research is primarily concerned with first creating an 
understanding of the cities in Indian context from the point of view of 
their social, technological and material productions. The ideas and 
representations of space therefore, become critical issues of 
exploration to understand the nature of imagination of space with 
reference to Indian cities. An empirical study of issues of spatial 
transformation was conducted in Bangalore and Gurgaon to find certain 
patterns and its correlation with the present discourses on the 
technology and the city. The issue of perception of lived in space, 
cartography and myth became important issues to understand the nature of
 the imagination of space and positioning of the digital space. The 
contradiction of a networked geography with the present spatial 
arrangement of cities that is the centre of a larger territory becomes 
important shifts to be accounted for while understanding the new 
geography. The patterns and possibilities in these new geographies of 
information technologies have been understood by studying three building
 programmes in the city. The question of transformation and future of 
cities and the position of digital space in these times then became an 
important one to answer. The initial study concerns with laying out a 
framework for examining the techno-spatial discourses in cities in 
general while establishing the key characteristics of its narration in 
the Indian context.&lt;/p&gt;
&lt;p&gt;The Researchers At Work Programme, at the Centre for Internet and 
Society, advocates an Open and transparent process of knowledge 
production. We recognise peer review as an essential and an extremely 
important part of original research, and invite you, with the greatest 
of pleasures, to participate in our research, and help us in making our 
arguments and methods stronger. The first draft of the monograph is now 
available for public review and feedback. Please click on the links 
below to choose your own format for accessing the document.&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;a title="Internet and City Word File" class="internal-link" href="http://cis-india.jail.kaeru.my:8090/website/research/cis-raw/internet-city.doc"&gt;Word&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a title="Internet and City PDF file" class="internal-link" href="http://cis-india.jail.kaeru.my:8090/website/research/cis-raw/internet-city.pdf"&gt;PDF&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;We appreciate your time, engagement and feedback that will help us to
 bring out the monograph in a published form. Please send all comments 
or feedback by April 5, 2011 to nishant@cis-india.org or you can use 
your Open ID to login to the website and leave comments to this post.&lt;/p&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/raw/histories-of-the-internet/blogs/internet-society-and-space-in-indian-cities/internet-society-space-in-indian-cities-a-call-for-peer-review'&gt;http://editors.cis-india.org/raw/histories-of-the-internet/blogs/internet-society-and-space-in-indian-cities/internet-society-space-in-indian-cities-a-call-for-peer-review&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Histories of Internet</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Internet Histories</dc:subject>
    

   <dc:date>2015-04-06T15:52:21Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/privacy/finance-and-security">
    <title>Open Letter to the Finance Committee: Finance and Security </title>
    <link>http://editors.cis-india.org/internet-governance/blog/privacy/finance-and-security</link>
    <description>
        &lt;b&gt;This note explores the three connections between finance and security and demonstrates the cost implications of operating a centrally designed identity management system as proposed by the UID. In doing so, it shows how the monitoring, storing, and securing of transactional data in a centralized database fall short of meeting the project's objectives of authentication, and thus is an additional cost. Further, it is argued that the blanket monitoring of the transaction database is not an effective method of detecting fraud, and is an expensive component of the project. &lt;/b&gt;
        
&lt;ul&gt;&lt;li&gt;Operating a centralized identity management system that requires the use of a remote database for every transaction is always more expensive than a decentralized identity management system that could optionally use a local database. &amp;nbsp;&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;Centralized database costs&lt;/h3&gt;
&lt;ol&gt;&lt;li&gt;Both public and private keys must be centrally stored&lt;/li&gt;&lt;li&gt;All transactions require connectivity for the sending and &amp;nbsp;receiving of authentication of data, and have an associated &amp;nbsp;connectivity cost&lt;/li&gt;&lt;li&gt;Securing all data at a &amp;nbsp;central database has &amp;nbsp;augmented costs &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/li&gt;&lt;/ol&gt;
&lt;h3&gt;Decentralized database costs &amp;nbsp;&amp;nbsp;&lt;/h3&gt;
&lt;ol&gt;&lt;li&gt;Only the public key must be centrally stored&lt;/li&gt;&lt;li&gt;Some transactions require connectivity for the sending and receiving of authentication data&lt;/li&gt;&lt;/ol&gt;
&lt;ul&gt;&lt;li&gt;The cost of building an identity management system that includes recording, monitoring, and securing each transaction is more than the cost of building only an identity authentication system. &amp;nbsp;The goal of the project is to identify a person. Recording each transaction will add unnecessary cost.&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;
&lt;table style="text-align: center;" class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: left;"&gt;Cost of identity authentication system&lt;/td&gt;
&lt;td style="text-align: left;"&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: left;"&gt;Cost of monitoring transactions &amp;nbsp;&lt;/td&gt;
&lt;td style="text-align: left;"&gt;&amp;gt; Cost of identity authentication system&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: left;"&gt;&amp;nbsp;Cost of securing transaction data&lt;/td&gt;
&lt;td style="text-align: left;"&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;ul&gt;&lt;li&gt;Increasing security or fighting fraud can be done in two ways - having a targeted approach or through blanket monitoring. The UID scheme, through the monitoring of the transaction database featuring trillions of transaction by 1.2 billion people is a blanket approach, and will provide lower return on investment than a targeted approach. &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/privacy/finance-and-security'&gt;http://editors.cis-india.org/internet-governance/blog/privacy/finance-and-security&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2011-02-17T11:57:42Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/digital-natives/blog/flash-of-change">
    <title>A FLASH of Change</title>
    <link>http://editors.cis-india.org/digital-natives/blog/flash-of-change</link>
    <description>
        &lt;b&gt;A fortnightly column on ‘Digital Natives’ authored by Nishant Shah is featured in the Sunday Eye, the national edition of Indian Express, Delhi, from September 2010 onwards. In this article published on February 6, 2011, Nishant Shah writes that citizens are organising, congregating, acting and thereby creating revolutions.&lt;/b&gt;
        
&lt;p&gt;Imagine you are in your favourite mall, walking around, looking at familiar shops, staring at the latest fashions in the windows, chatting with your friends and scouting for food. And suddenly, a bunch of people, who were just there, as a part of the larger scene, start dancing. They churn out well orchestrated but easy-to-replicate moves and for the length of a song, they convert the mall into an impromptu dance floor and then disperse. Or how about when walking through a park, you suddenly see a crowd of young and old, coming together to have a vigorous pillow fight and then after a few minutes of riotous laughter, they disappear into the blue? What would you do if you were faced with something like this in the expected and safe environments that you are used to?&lt;/p&gt;
&lt;p&gt;The next time you see something like this, remember that you have just seen a flash mob. Organise, congregate, act, disperse — that is the anatomy of a flash mob. It is a form of mobilisation where anonymous strangers, who are connected via mobile and Web-based communication structures, come together in public spaces to perform a series of pre-determined actions for a brief period of time. They are generally fun, create a lot of confusion for those not in the know, and infuse everybody with a sense of wonder. They fuel conversations by transforming regular places with something that is new and unexpected.&lt;/p&gt;
&lt;p&gt;I was recently at the Godrej India Culture Lab in Mumbai, to speak about digital natives, flash mobs and how they have the potential to change the world. Flash mobs are often seen to be frivolous and seen to achieve “mere fun” more than anything else. While I do want to make a case for how “mere fun” is actually the strongest means of political subversion and protest, something else erupted that made us all spectators of History (with the capital H) in the last two weeks.&lt;/p&gt;
&lt;p&gt;In Egypt, tens of thousands of protesters came out into the streets of Cairo, Alexandria, Suez, and other cities, to demand the overthrow of an authoritarian government that has been unable to meet the needs of its citizens. In a dramatic unfolding of events, starting on January 25, young people in Egypt used Facebook, Twitter, SMS, emails and other forms of digital communication to come together in an unprecedented show of protest on the streets.&lt;/p&gt;
&lt;p&gt;What has happened in the last few days is now the stuff of legend. There were digital blackouts and information blockages. The internet was blocked in the country so that protesters would be left in the dark. Mobile phone companies and internet service providers were ordered to debilitate the entire communication infrastructure so that word would not spread — within or outside Egypt. But such is the strength of the digital medium that the signal was lost, but the voice survived. It found echoes and resonances around the world. In a matter of hours, “Egypt” and “Jan 25” emerged as the most tagged messages on Twitter, with more than 2,500 tweets per second. The civic hackers in Egypt found&amp;nbsp;supporters around the world, who not only spread their message but also provided them with legal and political infrastructure to make sure that their voice was heard.&lt;/p&gt;
&lt;p&gt;This revolution, in the first month of the second decade of the 21st century, is not only about the present but also about what the future will hold. The young — digital natives who are integrated with the circuits of technology mobilisation and networking — were able to use these platforms to fight for their rights for freedom, dignity and expression. And all this was orchestrated using viral networking technologies and digital communication assemblages. I do not want to go into analysing Egypt’s politics, but I do want to highlight that the democratic citizen-driven future is already here.&lt;/p&gt;
&lt;p&gt;The ways in which digital natives are able to harvest the technologies of mass communication and outreach are an indication of how the contours of global governance are going to be shaped. Citizen journalism, citizen action and civic collaboration are the new weapons of social change and transformation that the young are able to use effectively. Across the world, flash mobs like these bring together virtual strangers in spaces of physical solidarity. True, a lot of them are fun and games. But in participating in these playful structures, digital natives also develop new cultures of trust, belonging, participation, collaboration and mobilisation that remind us that we do not inherit the world from our ancestors, we borrow it from our children. And they now have the power to ask us questions for which we might not always have the answers.&lt;/p&gt;
&lt;p&gt;Original article was published by &lt;a class="external-link" href="http://www.indianexpress.com/news/a-flash-of-change/746504/"&gt;Indian Express&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/digital-natives/blog/flash-of-change'&gt;http://editors.cis-india.org/digital-natives/blog/flash-of-change&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Natives</dc:subject>
    

   <dc:date>2012-01-03T10:22:18Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/privacy/privacy-conferencebanglaore">
    <title>Conference Report: 'Privacy Matters' Bangalore </title>
    <link>http://editors.cis-india.org/internet-governance/blog/privacy/privacy-conferencebanglaore</link>
    <description>
        &lt;b&gt;On February 5th the  'Privacy Matters" conference  was held at the TERI Regional Center in Bangalore. The event was a full day and centered around issues of privacy including: privacy rights of minorities, privacy and open government data, and privacy and identity.&lt;/b&gt;
        
&lt;h2&gt;Conference Summary&lt;/h2&gt;
&lt;p&gt;&amp;nbsp;On the 5th of February, civil society, lawyers, students, NGO’s, and representatives from the IT companies gathered together at the TERI Southern Regional Center to take part in 'Privacy Matters' - a public conference held to discuss&amp;nbsp; privacy&amp;nbsp; issues in India, and the privacy legislation that has been proposed in the parliament. The conference was opened&amp;nbsp; by Prashant Iyengar, head researcher at Privacy India. Mr. Iyengar explained the mandate of Privacy India, which is to raise awareness of privacy, spark civil action, and promote democratic dialogue around privacy challenges and violations in India.&lt;/p&gt;
&lt;h2&gt;Keynote: Ashish Rajadhyakksha, Senior fellow, Centre for the Study of Culture &amp;amp; Society&lt;/h2&gt;
&lt;p&gt;Mr. Rajadhyaksha delivered the keynote speech. In his presentation he focused on privacy in relation to the changing nature of the individual. He pointed out how humans are now becoming technologically enhanced individuals - in essence cybernetic organisms. These technological enhancements can be both positive and negative, but in both cases come with multiple and complicated questions of privacy, because the technological enhancements facilitate everyday life but at the same time create possible privacy violations. He further raised the point that people are not aware of these privacy implications, and thus violations of privacy are not seen as coercive acts, and people do not see their liberty as being placed at risk or challenged.&lt;/p&gt;
&lt;h3&gt;QUESTIONS TO CONSIDER&lt;/h3&gt;
&lt;ul&gt;&lt;li&gt;How do we define claim rights vs. liberty rights in terms of privacy ?&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;How do we define our rights in terms of privacy? &lt;/li&gt;&lt;/ul&gt;
&lt;h2&gt;Privacy and Minorities: Session I of the conference focused on the privacy rights of minorities and privacy and open government data&lt;/h2&gt;
&lt;p&gt;Zainab Bawa, CIS RAW fellow spoke on Privacy and Open Government Data. Her presentation, titled Property Rights, Privacy, and Open Government Data looked at how data by governmental agencies is handled. Her research is specifically on land records and the government. In her work she looks at:&lt;/p&gt;
&lt;p&gt;How data bases are designed&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&amp;nbsp;How documents are translated into English&lt;/li&gt;&lt;li&gt;&amp;nbsp;How hard copy documents are digitized&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;How information is posted&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;What are the privacy implications for all these processes&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Shubha Chacko from Sangama spoke on the issues of sex workers and questions of privacy. Ms. Chacko opened her presentation by pointing out that there is a common conception that sex workers have no rights to privacy. She then talked about the precarious position sex workers find themselves in, because the law and society find it offensive that a sex worker brings into the public sphere what society believes is&amp;nbsp; to happen in the private. Ms.Chacko also spoke on the invasive techniques that sex workers are subjected to such as HIV intervention and open disclosure of health records, and how these invasive techniques take away the privacy of sex workers. Furthermore, the nature of sex workers work means that they are not privy to the same right of anonymity that many believe is an important principle of privacy. Ms. Chacko closed her presentation by pointing out that the UID might actually bring privacy to sex workers. Closing the panel, Sahana Basavapatna spoke on refugees, the UID, and privacy. Ms. Basavapatna spoke about the difficult situation that refugees are placed in as they have no identity in India, but are also easily identified.&lt;/p&gt;
&lt;h3&gt;QUESTIONS TO CONSIDER&lt;/h3&gt;
&lt;ul&gt;&lt;li&gt;How can a privacy legislation insure that when data bases are 
architected, they are structured in a way that is appropriate for that 
type of data?&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;How can a privacy legislation work to ensure that when records are digitized, information is not lost or manipulated? &lt;/li&gt;&lt;li&gt;&amp;nbsp;What are ways in which the Government can post&amp;nbsp; data, so that it
 is both open and not in violation of an individual’s privacy?&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;How can a privacy legislation ensure anonymity for all citizens when necessary?&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;Should specific steps be taken in a privacy legislation to ensure the privacy of minorities such as refugees and sex&amp;nbsp; workers?&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;How can a privacy legislation be framed and implemented in order to not perpetuate existing societal stigmas?&lt;/li&gt;&lt;/ul&gt;
&lt;h2&gt;Identity and Privacy: Session III of the conference focused on identity and privacy&lt;/h2&gt;
&lt;p&gt;Hamish Fraser (Partner at Truman Hoyle, Sydney, Australia) spoke on the Australia Identity card, and how, among other reasons, it was privacy concerns that squashed the identity card in Australia. Furthermore, out of the attempt to make an Australian Identity Card, the Privacy Act of 1995 was passed. Currently in Australia individuals do not have identity cards, but instead they have numbers for different services – such as a tax number, a health number, and a driver license number. These numbers are not unique, and one number for a certain service cannot be used for another service, thus the government cannot track an individual by their number. Mr. Hamish also touched on the ten principles of privacy that the Australian legislation adopts, and pointed out that though the legislation does not have strong teeth, in Australia there is a strong culture of privacy that makes the law enforceable. Michael Whitener (Principal and co-founder of VistaLaw International LLC) spoke next. His presentation titled “Science Fiction Becomes Reality, but at What Cost” focused on the privacy aspects of biometrics and changing technology.&lt;/p&gt;
&lt;p&gt;Raman Chima, Privacy analyst for Google, was the final speaker on the panel. Mr. Chima worked to expose myths that people hold about why Google collects information, and how they use that information. For instance Google gathers limited information to develop valuable products and services, and to develop innovative products that reflect strong privacy standards.&amp;nbsp; Mr. Chima also pointed out that though online tracking can have negative implications, it also has many positive implications - such as allowing spam to be stopped and tracking disease in areas. He concluded his presentation by urging citizens to become more informed, and ask for more rights. He also pointed out that privacy has yet to be spelled out and presented in a way that any person can comprehend, understand, respect, and follows&lt;/p&gt;
&lt;h3&gt;QUESTIONS TO CONSIDER&lt;/h3&gt;
&lt;ul&gt;&lt;li&gt;Should a privacy legislation regulate how much access to private citizens records is the government granted? &lt;/li&gt;&lt;li&gt;How can a privacy legislation be drafted and implemented, so that is practical and applicable for the common citizen?&lt;/li&gt;&lt;li&gt;How are court regulators going to balance the privacy rights against the need for authentication? &lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;What will be the requirements for securing storage of biometric data? &lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;How will a legislation or privacy policy respond to security breaches?&lt;/li&gt;&lt;li&gt;How will legislation answer the question of what constitutes "consent"?&amp;nbsp; &lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;What privacy principles should a privacy legislation in India enforce? &lt;/li&gt;&lt;li&gt;Should a privacy legislation allow an individual to be “forgotten”?&lt;/li&gt;&lt;li&gt;&amp;nbsp;How could a privacy legislation be given either legal or social teeth in India?&lt;/li&gt;&lt;/ul&gt;
&lt;h2&gt;Privacy and Social networking Session IV of the conference focused on privacy and social networking&lt;/h2&gt;
&lt;p&gt;Ujjvala Ballal from Inclusive Planet , a social networking site for the disabled, focused her presentation on the privacy rights of the disabled. She raised the point that disabled people have been struggling for equal access rights for many years. In the process they have lost much of the privacy that they have a right to. She went on to explain that there are many privacy issues that are unique to a disabled persons. Some of which include: the disclosure of their disability, the stigma that comes along with their disability, and the denial of services based on their disability.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Gagan K. (NLSIU Law Student) spoke on Privacy Issues in Social Networking Websites. Gagan pointed out that on social networking sites privacy issues include:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&amp;nbsp; Data mining&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;&amp;nbsp; Profiling&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;&amp;nbsp; Third party disclosure. &lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;QUESTIONS TO CONSIDER&lt;/h3&gt;
&lt;ul&gt;&lt;li&gt;&amp;nbsp; Should information pertaining to the disabled be held to higher standards of privacy, because of its sensitive nature?&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;&amp;nbsp; How can a privacy legislation be drafted, so it is accessible to the disabled?&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;&amp;nbsp;Could a privacy legislation construct regulations on the handling of data, in order to prevent profiling and discrimination? &lt;/li&gt;&lt;/ul&gt;
&lt;h2&gt;Conclusion: the concluding session was a time for discussion and&amp;nbsp; opinion sharing&lt;/h2&gt;
&lt;p&gt;From the closing session, and the above sessions many themes and questions pertaining to privacy came out that will need to be addressed when considering the way forward&amp;nbsp; for a privacy legislation including:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Property rights and privacy&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;The right to be forgotten &lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;Privacy rights of minorities &lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;Privacy and open government data- how is it collected, transferred, stored, and reproduced&lt;/li&gt;&lt;li&gt;Privacy and foreigners (refugees, illegal migration, etc)&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;Recognizing privacy rights in a changing technological society &lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;Privacy implications of biometric usage &lt;/li&gt;&lt;li&gt;Privacy rights superseding identification needs &lt;/li&gt;&lt;li&gt;Corporate privacy policies &lt;/li&gt;&lt;li&gt;Privacy rights and the disabled&lt;/li&gt;&lt;li&gt;Privacy rights and social networking&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/privacy/privacy-conferencebanglaore'&gt;http://editors.cis-india.org/internet-governance/blog/privacy/privacy-conferencebanglaore&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2011-02-08T05:13:24Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/digital-wrongs">
    <title>Digital Wrongs </title>
    <link>http://editors.cis-india.org/news/digital-wrongs</link>
    <description>
        &lt;b&gt;Protecting Intellectual Property Rights. This article by Rohin Dharmakumar was published in Forbes India  on January 28, 2011. &lt;/b&gt;
        
&lt;p&gt;Imagine you are in the mood for some fun and so you create a spoof video, the sort that you find on YouTube everyday. If the changes proposed under the Indian Copyright (Amendment) Bill, 2010 come through, you won’t be able to do that.&lt;/p&gt;
&lt;p&gt;The bill explicitly recognises the technology protection measures that publishers wrap around their content, commonly known as digital rights management (DRM), but without placing any limitations on it.&lt;/p&gt;
&lt;p&gt;So there’s a good chance a parody clip that uses video clips from a news show or of a baby dancing to the tune of ‘Sheila ki Jawani’ could be taken down by over eager copyright owners.&lt;/p&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;Pranesh Prakash, a program manager with Bangalore-based Centre for Internet and Society, a non-profit civil society policy advocacy and research body, says such a scenario is perfectly possible under the proposed new law. “Providing legal backing to technological protection measures without imposing appropriate duties means that companies can effectively expand their rights to whatever technology can do. It’s a ridiculous situation,” he says.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;div&gt;
&lt;div&gt;Even worse, the law provides for criminal liability for breaking such DRM. Ask the Indian developers behind ‘PlayFair’, an open source software that allowed consumers to bypass Apple’s FairPlay DRM.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;The developers were forced to stop their project even though Apple challenged them under the US DMCA law, which has no jurisdiction in India. They still folded because as individuals they didn't have the wherewithal to challenge Apple in a court.&lt;/div&gt;
&lt;/div&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;div&gt;
&lt;div&gt;
&lt;div&gt;“Our basic principle is that generally large corporations have the wherewithal to go to court and get orders, but individuals don’t. That balance must be maintained in the law, that everything isn’t presumptively violative of the law,” says Prakash.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/blockquote&gt;
&lt;div&gt;
&lt;div&gt;Many fear of what might happen when digital rights management actually starts getting protection under Indian law. Raman Jit Singh Chima, a policy analyst with Google India’s legal team, says the present version of the amendment is unclear on intermediary liability and ‘fair dealing’. Simply put, if a user does something illegal, even the service provider or search site that was used may become liable for the offence.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;“Unless the government or a court of law interprets it otherwise, this could mean users submitting their content for approval before uploading, with approvals taking months due to the volume of information on the Internet,” says Chima.&lt;br /&gt;&lt;br /&gt;Read the original in Forbes India &lt;a class="external-link" href="http://business.in.com/article/boardroom/battleground-india-nine-major-conflicts-shaping-your-lifes/21712/0"&gt;here&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/digital-wrongs'&gt;http://editors.cis-india.org/news/digital-wrongs&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Intellectual Property Rights</dc:subject>
    

   <dc:date>2011-04-01T16:26:11Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/what-are-you-accused">
    <title>What Are You Accused of? Find Out Online </title>
    <link>http://editors.cis-india.org/news/what-are-you-accused</link>
    <description>
        &lt;b&gt;Starting Tuesday, police authorities in the Indian capital will make many crime reports, also known as First Information Reports, publicly accessible from its Web site. The report can be attained by entering details such as the name of the accused or victim and also the area where the crime took place. So far, no crime reports have been posted on the Web site.&lt;/b&gt;
        
&lt;p&gt;The step is meant to help people who have been accused of a crime, and who aren’t able to find out from police—or who are perhaps reluctant to approach a police station—find out what exactly they’re supposed to have done.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;“In case a police officer refuses to reveal the First Information Report, the accused can get a copy online and defend himself,” Rajan Bhagat, Delhi police spokesman told India Real Time Tuesday.&lt;/p&gt;
&lt;p&gt;After police register a crime report, they’re supposed to carry out an investigation and then decide whether or not to bring charges.&lt;/p&gt;
&lt;p&gt;Mr. Bhagat said the crime reports were being put online to comply with a 35-page Delhi High Court &lt;a class="external-link" href="http://lobis.nic.in/dhc/DMA/judgement/06-12-2010/DMA06122010CRLW4682010.pdf"&gt;order&lt;/a&gt;&amp;nbsp;on December 6.&lt;/p&gt;
&lt;p&gt;“The liberty of an individual is inextricably linked with his right to be aware how he has been booked under law and on what allegations,” the court said at the time in an order that quotes Cuban revolutionary &lt;a class="external-link" href="http://en.wikipedia.org/wiki/Jose_Marti"&gt;José Martí &lt;/a&gt;.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Mr. Bhagat said the software for uploading the FIRs has been installed at all police stations across the capital. The crime report is supposed to be made available online within 24 hours after a crime is registered.&lt;/p&gt;
&lt;p&gt;Depending on whether the crime reports are searchable or not, and if people other than those named in the reports can access them, they could also prove useful for analyzing crime patterns in the city.&lt;/p&gt;
&lt;p&gt;Of course, there exists some ambiguity in the new process, including how many crime reports will actually end up being uploaded online.&lt;/p&gt;
&lt;p&gt;Crime reports for offences categorized as “sensitive” need not be uploaded. These include issues of terrorist acts, crimes relating to national security, rape, murder, kidnapping for ransom and “cases in which desperate gangsters are involved and there is the danger of witnesses or the complainant being intimidated,” the court order said.&lt;/p&gt;
&lt;p&gt;“We cannot reveal the identity of serious criminals; this can hamper the investigation process,” said Mr. Bhagat, adding that the decision for a crime report not to be uploaded must be made by a senior police officer together with a local magistrate from the area where the crime was committed.&lt;/p&gt;
&lt;p&gt;Some legal experts aren’t happy about the “selective” airing of information by the Delhi police.&lt;/p&gt;
&lt;p&gt;“The service would be a complete failure,” said Pinaki Misra, senior counsel at the Delhi High Court.&lt;/p&gt;
&lt;p&gt;Mr. Misra said the First Information Report is a public document–the first step towards registering criminal activity–and it should be freely accessible.&lt;/p&gt;
&lt;p&gt;“There’s no reason why such information should be deemed confidential and selectively uploaded,” he said.&lt;/p&gt;
&lt;p&gt;But others said there was good reason to avoid making a crime report public in some cases, such as to protect the identity of victims of sexual crimes, or even to protect suspects in cases where crimes could instigate violence against them.&lt;/p&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;Sunil Abraham, executive director at the Center for Internet and Society, a think-tank based in Bangalore, said the Delhi police’s new initiative was “a positive step with necessary safeguards.”&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;He added that the disclosure of too much information by police or other investigating agencies can sometimes lead to incidents of “mob justice,” pointing to recent occasions where bystanders have &lt;a class="external-link" href="http://www.hindustantimes.com/Serial-slasher-strikes-Talwar-outside-court/Article1-654743.aspx"&gt;attacked people&lt;/a&gt;&amp;nbsp;involved in highly publicized cases at their court appearances.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;“The onus now is on the Delhi police as to how and what they put it in actual practice,” Mr. Abraham said.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Read the original &lt;a class="external-link" href="http://blogs.wsj.com/indiarealtime/2011/02/01/what-are-you-accused-of-find-out-online/"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/what-are-you-accused'&gt;http://editors.cis-india.org/news/what-are-you-accused&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-01T16:48:30Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/one-wikipedian">
    <title>One among the clan of Wikipedians</title>
    <link>http://editors.cis-india.org/news/one-wikipedian</link>
    <description>
        &lt;b&gt;In 2005, I lived in Johannesburg and worked as an activist to make knowledge more accessible. Between fighting copyright treaties in Geneva that would give corporations an even bigger stranglehold on our minds and finding ways to supply cheap textbooks to township schools, I talked about my work frequently. After one such event, organised by Nhlanhla Mabaso, the godfather of free and open source software in the country, I met two people who were particularly interested in my work. Their names were Angela Beesley and Erik Moller; they looked like college students, and said that they were helping to build an online encyclopaedia called Wikipedia. They were bright, warm and open - and I was hooked.&lt;/b&gt;
        
&lt;p&gt;Like most people, I had already started using Wikipedia by then. And also like most people, I hadn't bothered to figure out how I could participate in it. I spent the next year making nervous, anonymous edits to the entries of obscure sci-fi writers who I thought deserved more attention. I went to a meeting in Frankfurt where Wikipedians from around the world were gathering for the very first time and was relieved to discover a bunch of people who were as socially awkward as I was. I met serious people with funny names like Notafish, SJ and Anthere; I watched Richard Stallman thoughtfully pick out bits of butter and jam from his wayward beard at breakfast.&lt;/p&gt;
&lt;p&gt;On stage, one evening, I moderated a panel of global voices. The trajectories of two people from that panel are instructive. Ting Chen, then a chronically shy and prolific editor of the German and Chinese Wikipedias, now chairs the board of trustees of the Wikimedia Foundation. Hossein Derakhshan, at the time a prominent Iranian blogger, was subsequently arrested in Iran and sentenced to a 19-year prison term for supposedly spreading anti-state propaganda.&lt;/p&gt;
&lt;h3&gt;Back home again&lt;/h3&gt;
&lt;p&gt;As for me, I moved back to Bangalore. And forgot all about Wikipedia for a while. Moving home wasn't a conscious choice; I drifted into it automatically - I had grown up here, my parents and sister lived here. At first, there was little to like. I grew up in a city where we bought eggs from the cranky woman who reared hens two houses away from us; a city in which Zafar Futehally could ride in to town from his farmhouse in Dodda Gubbi, leave his horse in a makeshift stable in my parents' garden, walk to Brigade Road to do his shopping from Mathias &amp;amp; Sons, and return for lunch and a quick nap before riding back. (I realise how old this makes me seem).&lt;/p&gt;
&lt;p&gt;I rented a flat in Cooke Town, and decided that I liked my new neighbourhood.&lt;/p&gt;
&lt;p&gt;I reminded myself of all the reasons I knew for liking Bangalore - Koshy's, Pecos, Adiga's, Premier Bookshop, Blossom and the Alternative Law Forum. I found new reasons: 1 Shanthi Road, Gallery SKE and a magical, dimly-lit bar called Upbeat.&lt;/p&gt;
&lt;p&gt;And then, there were the Wikipedians.&lt;/p&gt;
&lt;h3&gt;New outlook&lt;/h3&gt;
&lt;p&gt;Bangalore used to bore me because I found it's middle-class boring. I can't say the same any longer. Four years and hundreds of encounters with Wikipedians later, I'm kind of excited about being home. I've been witness to some extraordinary, selfless, tireless and downright funny instances of community work, and I've seen people turn Wikipedia into something local and lovable. I've even overcome my own nervousness, and actually started editing. Perhaps it's only natural that the world's most significant repository of free knowledge would find friends here; I'm still a little surprised, and certainly very grateful.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;( Achal Prabhala is a researcher and writer in Bangalore; he works on intellectual property rights in relation to medicine and knowledge, and serves on the board of the Centre for Internet &amp;amp; Society and on the advisory board of the Wikimedia Foundation.)&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Read the original in the Hindu &lt;a class="external-link" href="http://www.thehindu.com/todays-paper/tp-features/tp-neighbourhood/article1128553.ece"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/one-wikipedian'&gt;http://editors.cis-india.org/news/one-wikipedian&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2011-04-01T16:49:05Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/about/newsletters/january-2011-bulletin">
    <title>January 2011 Bulletin</title>
    <link>http://editors.cis-india.org/about/newsletters/january-2011-bulletin</link>
    <description>
        &lt;b&gt;Greetings from the Centre for Internet and Society! It gives us immense pleasure to present regular updates on the progress of our research on the mainstream Internet media. In this issue of we bring our latest project updates, news and media coverage:&lt;/b&gt;
        &lt;h2&gt;&lt;b&gt;Researchers@Work&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;RAW is a multidisciplinary research initiative. CIS believes that in order to understand the contemporary concerns in the field of Internet and society, it is necessary to produce local and contextual accounts of the interaction between the Internet and socio-cultural and geo-political structures. To build original research knowledge base, the RAW programme has been collaborating with different organisations and individuals to focus on its three year thematic of Histories of the Internets in India. Monographs finalised from these projects have been published on the CIS website for public review:&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Digital Natives&lt;/b&gt;&lt;/h2&gt;
&lt;p&gt;CIS has interest in developing Digital Identities as a core research area and looks at practices, policies and scholarships in the field to explore relationships between Internet, technology and identity.&lt;/p&gt;
&lt;h3&gt;Column on Digital Natives&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A fortnightly column on ‘Digital Natives’ authored by Nishant Shah is featured in the Sunday Eye, the national edition of Indian Express, Delhi, from 19 September 2010 onwards. The following article was published in the Indian Express recently:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://bit.ly/h2E3Jd"&gt;Is That a Friend on Your Wall?&lt;/a&gt; [published in the Indian Express on 9 January 2010]&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Workshop&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The third and final workshop in the Digital Natives with a Cause? research project will take place in Santiago, Chile, from the 8 to 10 February. Open Call and FAQs for the workshop are online:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://bit.ly/emKslL"&gt;Digital Natives with a Cause? Workshop in Santiago – An Open Call&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://bit.ly/eCu2it"&gt;Digital Natives with a Cause? Workshop in Santiago – Some FAQs&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Blog Entry by Maesey Angelina&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Maesy Angelina is a MA candidate on International Development, specializing in Children and Youth Studies at the International Institute of Social Studies, Erasmus University of Rotterdam. She is working on her research on the activism of digital natives under the Hivos-CIS Digital Natives Knowledge Programme. She spent a month at CIS, working on her dissertation, exploring the Blank Noise Project under the Digital Natives with a Cause framework. She writes a series of blog entries. The latest is:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://bit.ly/hjbzB0"&gt;The Digital Tipping Point&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Announcement&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://bit.ly/h92qtI"&gt;Rising Voices Seeks Micro-Grant Proposals for Citizen Media Outreach&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Accessibility&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Estimates of the percentage of the world's population that is disabled vary considerably. But what is certain is that if we count functional disability, then a large proportion of the world's population is disabled in one way or another. At CIS we work to ensure that the digital technologies, which empower disabled people and provide them with independence, are allowed to do so in practice and by the law. To this end, we support web accessibility guidelines, and change in copyright laws that currently disempower the persons with disabilities.&lt;/p&gt;
&lt;h3&gt;New Blog Entry&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://bit.ly/fgOaHa"&gt;Accessibility in Telecommunications&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Intellectual Property&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Copyright, patents and trademarks are the most important components on the Internet. CIS believes that access to knowledge and culture is essential as it promotes creativity and innovation and bridges the gaps between the developed and developing world positively. Hence, the campaigns for an international treaty on copyright exceptions for print-impaired, advocating against PUPFIP Bill, calls for the WIPO Broadcast Treaty to be restricted to broadcast, questioning the demonization of 'pirates', and supporting endeavours that explore and question the current copyright regime. Our latest endeavour has resulted into these:&lt;/p&gt;
&lt;h3&gt;New Blog Entry&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://bit.ly/igNQMW"&gt;New Release of IPR Chapter of India-EU Free Trade Agreement&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Internet Governance&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Although there may not be one centralised authority that rules the Internet, the Internet does not just run by its own volition: for it to operate in a stable and reliable manner, there needs to be in place infrastructure, a functional domain name system, ways to curtail cybercrime across borders, etc. The Tunis Agenda of the second World Summit on the Information Society (WSIS), paragraph 34 defined Internet governance as “the development and application by governments, the private sector and civil society, in their respective roles, of shared principles, norms, rules, decision-making procedures, and programmes that shape the evolution and use of the Internet.” Within the larger field of Internet governance, the Internet Governance Forum (IGF), a multi-stakeholder policy dialogue forum that was instituted by the WSIS processes and that is their only formal outcome, has fast emerged as one of the key institutions.  As the definition quoted above indicates, a unique feature of the field of Internet governance is that, unlike many other governance spheres, it does not only involve governments.  Historically, not only governments but also the technical community and private players have played a crucial role in the development of the Internet.  In the context of the IGF, that role is not only explicitly acknowledged but also institutionalised as the IGF formally brings together governments, private players and civil society actors from all areas of and organisations involved in Internet governance. Moreover, now that the open and egalitarian potential of the Internet is increasingly under attack, this unique nature of the IGF, in addition to its WSIS roots, has made it a prime venue to remind stakeholders in all areas of Internet governance of the commitment they have made earlier to building a “people-centred, inclusive and development-oriented Information Society” (WSIS Geneva Principles, Para 1).  CIS involvement in the field of Internet governance has the following shape:&lt;/p&gt;
&lt;h3&gt;New Blog Entry&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://bit.ly/fOB4sL"&gt;Jurisdictional Issues in Cyberspace&lt;/a&gt;&lt;b&gt; &lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;b&gt;Privacy&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;CIS has undertaken many new and exciting projects. One of these, "Privacy in Asia", is funded by Privacy International (PI), UK and is being completed in collaboration with Society and Action Group. "Privacy in Asia" is a two-year project that commenced on 24 March 2010 and will complete within two years from the commencement date, unless otherwise agreed to by the parties. The project was set up with the objective of raising awareness, sparking civil action and promoting democratic dialogue around privacy challenges and violations in India.  In furtherance of these goals it aims to draft and promote an over-arching privacy legislation in India by drawing upon legal and academic resources and consultations with the public.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apart from "Privacy in Asia" CIS is also participating in the " Privacy and Identity"  project, which is funded by the Ford Foundation and managed by the Centre for Study of Culture and Society. The project is a research inquiry into the history of Privacy in India and how it shapes the contemporary debates around technology mediated identity projects like &lt;i&gt;Aadhaar&lt;/i&gt;. The "Privacy and Identity" project started in August 2010.&lt;/p&gt;
&lt;h3&gt;New Blog Entries&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://bit.ly/eWxry1"&gt;Privacy Matters — Conference Report&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://bit.ly/gocDqf"&gt;An Open Letter to the Finance Committee&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://editors.cis-india.org/advocacy/igov/privacy-india/privacy-UIDdec17"&gt;Does the UID Reflect India?&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Staff Update&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Prashant Iyengar is a lawyer and legal scholar who has worked extensively on intellectual property issues particularly focusing on copyright reform and open access. He is a past recipient of an Open Society Institute fellowship for research into Open Information Policy, and has been affiliated with the Alternative Law Forum – a collective of lawyers in Bangalore engaged in human rights practice.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prashant joined the Centre for Internet and Society as a lead researcher in the Privacy India project recently.&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Telecom&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The growth in telecommunications in India has been impressive. While the potential for growth and returns exist, a range of issues need to be addressed for this potential to be realized. One aspect is more extensive rural coverage and the second aspect is a countrywide access to broadband which is low at about eight million subscriptions. Both require effective and efficient use of networks and resources, including spectrum. It is imperative to resolve these issues in the common interest of users and service providers. CIS campaigns to facilitate this.&lt;/p&gt;
&lt;h3&gt;Column&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Shyam Ponappa is a Distinguished Fellow at CIS. He writes regularly on Telecom issues in the Business Standard and these articles are mirrored on the CIS website as well.&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://bit.ly/grwFzq"&gt;The policy langurs&lt;/a&gt; [published on 6  January 2011]&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;News &amp;amp; Media Coverage&lt;/b&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://bit.ly/hcNWgX"&gt;Civic hackers seek to find their feet in India&lt;/a&gt; (Livemint, 24 January 2011) and (IndiaInfoline, January 2011)&lt;/li&gt;
&lt;li&gt;&lt;a href="http://bit.ly/ihsya0"&gt;A Tweet and a poke from the CEO&lt;/a&gt; (Livemint, 24 January 2011)&lt;/li&gt;
&lt;li&gt;&lt;a href="http://bit.ly/g19Yrv"&gt;Clicktivism &amp;amp; a brave new world order&lt;/a&gt; (Mail Today, 2 January 2011)&lt;/li&gt;
&lt;li&gt;&lt;a href="http://bit.ly/eiyWsT"&gt;Would it be a unique identity crisis&lt;/a&gt;? (Bangalore Mirror, 2 January 2011)&lt;/li&gt;
&lt;li&gt;&lt;a href="http://bit.ly/gnJNzc"&gt;Nel suk dei nativi digitali. Perché gli studenti 2.0 hanno bisogno di una bussola per orientarsi&lt;/a&gt; (Il Sore24 ORE, 2 January 2011)&lt;/li&gt;
&lt;li&gt;&lt;a href="http://bit.ly/fvn4Fw"&gt;A Refreshing Start!&lt;/a&gt; (Verveonline, Volume 19, Issue 1, January, 2011)&lt;/li&gt;
&lt;li&gt;&lt;a href="http://bit.ly/glcDk1"&gt;Getting Connected&lt;/a&gt; (Livemint, January 2011)&lt;/li&gt;
&lt;li&gt;&lt;a href="http://bit.ly/eN0Njz"&gt;Knowledge Warriors&lt;/a&gt; (Il Sore24 ORE, January 2011)&lt;/li&gt;
&lt;li&gt;&lt;a href="http://bit.ly/f5m3fg"&gt;Nishant Shah Quoted in Livemint 2011 Tweet-out&lt;/a&gt; (Livemint, January 2011)&lt;/li&gt;
&lt;li&gt;&lt;a href="http://bit.ly/eti5N2"&gt;Digital Natives with a Cause? - Workshop in Chile seeks participants&lt;/a&gt; (Bahama islands info, 30 December 2010)&lt;/li&gt;
&lt;li&gt;&lt;a href="http://bit.ly/h1YBgf"&gt;Mothers discuss kids, music, fashions, on Net&lt;/a&gt; (The Hindu, 26 December 2010)&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Follow us elsewhere&lt;/b&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Get short, timely messages from us on &lt;a href="http://twitter.com/cis_india"&gt;Twitter&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Follow CIS on &lt;a href="http://identi.ca/main/remote?nickname=cis"&gt;identi.ca&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Join the CIS group on &lt;a href="http://www.facebook.com/group.php?gid=28535315687"&gt;Facebook&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Visit us at &lt;a href="http://www.cis-india.org/"&gt;www.cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Looking forward to hearing from you. Please feel free to write to us for any queries or details required. If you do not wish to receive these emails, please do write to us and we will unsubscribe your mail ID from the mailing list.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/about/newsletters/january-2011-bulletin'&gt;http://editors.cis-india.org/about/newsletters/january-2011-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2012-07-30T11:25:44Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/openness/blog-old/e-gif-iraq-meeting">
    <title>E-Governance Interoperability Framework — Meeting in Iraq</title>
    <link>http://editors.cis-india.org/openness/blog-old/e-gif-iraq-meeting</link>
    <description>
        &lt;b&gt;A meeting to create a plan of action for the development of e-Governance Interoperability Framework (e-GIF) in Iraq and include formulation of an e-GIF policy and technical document within the larger framework of public sector modernization, was held from 25 to 27 January 2011. Sunil Abraham was the main resource person for this meeting. &lt;/b&gt;
        
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;&lt;span class="Apple-style-span"&gt;Mr. Abdul Kareem Al-Samaraii, Minister of Science and Technology and&amp;nbsp;Mr. Peter Bachelor, Deputy Country Director,&amp;nbsp;UNDP gave the opening remarks.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;span class="Apple-style-span"&gt;&lt;span class="Apple-style-span"&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/td&gt;
&lt;td&gt;&lt;span class="Apple-style-span"&gt;
&lt;p style="text-align: left;"&gt;&lt;span class="Apple-style-span"&gt;&lt;span class="Apple-style-span"&gt;&lt;img src="http://editors.cis-india.org/home-images/copy_of_egifiraqmeeting.jpg/image_preview" style="float: none;" title="EGif" class="image-inline image-inline" alt="EGif" /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2&gt;&lt;span class="Apple-style-span"&gt;E-GIF Meeting Agenda,&amp;nbsp;ERBIL, 25-27 January 2011&lt;/span&gt;&lt;/h2&gt;
&lt;div&gt;
&lt;table style="text-align: center;" class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: center;"&gt;&amp;nbsp;&lt;strong&gt;Tuesday&lt;/strong&gt; 25/1/2011&amp;nbsp;&lt;/td&gt;
&lt;td style="text-align: center;"&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: center;"&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&amp;nbsp;&lt;/td&gt;
&lt;td style="text-align: center;"&gt;
&lt;div style="text-align: left;"&gt;08:30 – 09:00&lt;/div&gt;
&lt;div style="text-align: left;"&gt;Opening Remarks&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;ul&gt;&lt;li&gt;H.E. &amp;nbsp;Mr Abdul Kareem Al-Samaraii,&amp;nbsp;Minister of Science and Technology&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Mr. Peter Bachelor/ Deputy Country Director, UNDP&amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;09:00 – 10:00&lt;/div&gt;
&lt;div&gt;e-GIF overview &amp;nbsp;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;&lt;li&gt;Introducing the GIF: Benefits of Interoperability for e-Governance&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;GIF Context&amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;GIF Technical Content: Standard Categorisation &amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;How we can Develop Effective GIF Policy Document and GIF Action Plan: Presentation on GIF templates &amp;nbsp;(GIF text and action Plan) that required to be filled by the end of the workshop&amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;10:00 – 10:30&lt;strong&gt;&amp;nbsp;&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;Coffee Break&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;10:30 – 12:00&lt;/div&gt;
&lt;div&gt;Survey and base-line for&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;&lt;li&gt;Map of existing and proposed e-governance and ICT4D projects.&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;
&lt;div&gt;
&lt;ol&gt;&lt;li&gt;User Interface and accessibility&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;&lt;/span&gt;&lt;span class="Apple-style-span"&gt;Storage and database schema&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;&lt;/span&gt;&lt;span class="Apple-style-span"&gt;Multi-modal input and output&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Access control and security&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Network schema&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Document flow and work-flow&lt;/span&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;ul&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Discussion on specific challenges and opportunities faced when attempting interoperability.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;span class="Apple-style-span"&gt;12:00 – 13:30&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Discussion on the co-existence of the GIF with existing/proposed laws and policies&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;
&lt;div&gt;
&lt;ol&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;E-governance and ICT4D&amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Copyright&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Patents (software only)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;FOSS/Open Standards/Open Content/Open Data&amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Privacy and Data Protection&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Right to Information/Freedom of Information/Access to Information/Public Information&lt;/span&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;span class="Apple-style-span"&gt;13:30 – 14:30&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;ul&gt;&lt;li&gt;Lunch Break&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;
&lt;span class="Apple-style-span"&gt;14:30 – 16:00&lt;/span&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Discussion on definition of “Open Standards”&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;
&lt;div&gt;
&lt;ol&gt;&lt;li&gt;Existing definitions of Open Standards&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;RAND, FRAND and Royalty Free&amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;De Facto and De Jure Standards&amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Standards Setting Organisations&amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Governance of Standards&amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Single Standard vs. Multiple Standards&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Relationship between FOSS and Open Standards&lt;/span&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;ul&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Review of international best practice&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;
&lt;div&gt;
&lt;ol&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;European Union&amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;US&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Brazil&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Russia&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;India&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Indonesia&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;China&lt;/span&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;span class="Apple-style-span"&gt;16:00 – 16:15&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;ul&gt;&lt;li&gt;Coffee Break&lt;/li&gt;&lt;/ul&gt;
&lt;span class="Apple-style-span"&gt;16.15 - 17.45&lt;br /&gt;&lt;/span&gt;
&lt;ul&gt;&lt;li&gt;Discussion on degree of openness&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;
&lt;div&gt;
&lt;ol&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Hardware/Software/File Formats&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Maturity of the standard&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Adoption in Iraq&lt;/span&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;ul&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Policy Objectives of the GIF&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;
&lt;div&gt;
&lt;ol&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Neutral playing-field / vendor independence&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Obsolescence&amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Data convergence&amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Cost-reduction&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Domestic ICT industry&lt;/span&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: center;"&gt;&lt;strong&gt;Wednesday&lt;/strong&gt; 26/1/2011&amp;nbsp;&amp;nbsp;&lt;/td&gt;
&lt;td style="text-align: left;"&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: center;"&gt;&amp;nbsp;&lt;/td&gt;
&lt;td style="text-align: left;"&gt;
&lt;span class="Apple-style-span"&gt;08:30 – 10:00&lt;/span&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Discussion on Organisational Architecture to Interoperability:&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;
&lt;ol&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Enterprise Architecture&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Service Oriented Architecture&lt;/span&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;/div&gt;
&lt;ul&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Example &amp;nbsp;on Germany’s Slandered and Architecture of E-Government Application (SAGA) that contain both the architecture and standard for interoperability / or any other relevant example&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;span class="Apple-style-span"&gt;10.00 - 10.30&lt;br /&gt;&lt;/span&gt;
&lt;ul&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Coffee Break&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;span class="Apple-style-span"&gt;10.30 - 13.00&lt;br /&gt;&lt;/span&gt;
&lt;ul&gt;&lt;li&gt;Governance of the Government Interoperability Framework: Creating the GIF&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;
&lt;div&gt;
&lt;ol&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Organisational Structure: Authority/Agency/Ministerial Committee/Adjunct to the President/Prime Minister's office.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Light vs. Heavy regulation: Broad principles vs. Lists approach [Inclusion lists, exclusion lists, least common denominator approach]&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Exemptions and Limitation: Reactive vs. proactive. Formal vs. informal.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Versioning: Mechanism and time-frame for revising the GIF. Pre-determined&amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Monitoring of Compliance: Agency responsible and protocol to be observed. Random vs. blanket approach. &amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Sanctions: Design of remedies and punitive measures to discourage non-compliance. &amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Incentives: Design of awards and prizes for those who comply first, most, at the least-cost, etc.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Documentation and Public Consultation: How will the process of developing, implementing and monitoring the GIF incorporate public consultation and be documented.&amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Capacity Building&lt;/span&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;span class="Apple-style-span"&gt;13.00 - 14.00&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;ul&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Lunch Break&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;span class="Apple-style-span"&gt;14.00 - 15.30&lt;br /&gt;&lt;/span&gt;
&lt;ul&gt;&lt;li&gt;Discussion on specific standards for the GIF &amp;nbsp;[categorization based on Indian GIF] with a focus on current problem areas&amp;nbsp;(G2G, G2B)&lt;/li&gt;&lt;/ul&gt;
&lt;ol&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Presentation And Archival Domain&amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Data Integration Domain&amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Data Interchange Domain&lt;/span&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;span class="Apple-style-span"&gt;15.30 - 15.45&lt;br /&gt;&lt;/span&gt;
&lt;ul&gt;&lt;li&gt;Coffee Break&lt;/li&gt;&lt;/ul&gt;
&lt;span class="Apple-style-span"&gt;15.45 - 17.15&lt;br /&gt;&lt;/span&gt;
&lt;ul&gt;&lt;li&gt;Discussion on specific standards for the GIF &amp;nbsp;[categorization based on Indian GIF] with a focus on (G2C) and local Governorates and emerging areas&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;
&lt;span class="Apple-style-span"&gt;
&lt;ol&gt;&lt;li&gt;Presentation And Archival Domain&amp;nbsp;&lt;/li&gt;&lt;li&gt;Data Integration Domain&amp;nbsp;&lt;/li&gt;&lt;li&gt;Data Interchange Domain&lt;/li&gt;&lt;/ol&gt;
&lt;/span&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: center;"&gt;&lt;strong&gt;&amp;nbsp;Thursday&lt;/strong&gt; 27/1/2011&lt;/td&gt;
&lt;td style="text-align: left;"&gt;
&lt;span class="Apple-style-span"&gt;08.30 - 11.30&lt;br /&gt;&lt;/span&gt;
&lt;ul&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;&amp;nbsp;Unplanned time for collaborative work on the text of the GIF&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Draft of E-GIF Action Plan &amp;nbsp;and Working Groups&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;span class="Apple-style-span"&gt;11.30 - 12.00&lt;br /&gt;&lt;/span&gt;
&lt;ul&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Coffee Break&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;span class="Apple-style-span"&gt;12.00 - 14.00&lt;br /&gt;&lt;/span&gt;
&lt;ul&gt;&lt;li&gt;Review on e-governance plan of action&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Out of GIF scope&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;span class="Apple-style-span"&gt;14.00 - 14.30&lt;br /&gt;&lt;/span&gt;
&lt;ul&gt;&lt;li&gt;Workshop Closing Session and Looking Forward&lt;/li&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: center;"&gt;&amp;nbsp;&lt;/td&gt;
&lt;td style="text-align: center;"&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/openness/blog-old/e-gif-iraq-meeting'&gt;http://editors.cis-india.org/openness/blog-old/e-gif-iraq-meeting&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2011-08-18T05:04:49Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
