<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="http://editors.cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>http://editors.cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 5141 to 5155.
        
  </description>
  
  
  
  
  <image rdf:resource="http://editors.cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="http://editors.cis-india.org/openness/events/ada-lovelace-edit-a-thon-2014"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/a2k/blogs/Activities%20accomplished%20during%202013-2014.pdf"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/privacy-bill"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/activists-cry-foul-against-aadhaar"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/ActiveEditors.png"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/business-standard-july-5-2017-sanjay-kumar-singh-act-now-to-protect-yourself-against-future-ransomware-attacks"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/M3.jpg"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/openness/blog-old/achievements.pdf"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/business-standard-august-22-2016-accessing-pirated-content-might-lead-to-prison-term-and-rs-3-lakh-fine"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/accessibility/publications/accessible-phones-table.doc"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/accessibility/publications/accessible-phones"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/accessibility/publications/accessible-handsets-table.pdf"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/accessibility/publications/accessible-mobile-handsets.pdf"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/accessibility/blog/accessible-mobile-handsets"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/accessibility/publications/accessible-handsets-table.docx"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="http://editors.cis-india.org/openness/events/ada-lovelace-edit-a-thon-2014">
    <title>Ada Lovelace Edit-a-thon 2014</title>
    <link>http://editors.cis-india.org/openness/events/ada-lovelace-edit-a-thon-2014</link>
    <description>
        &lt;b&gt;A Wikipedia edit-a-thon is being held at Urban Solace on October 14, 2014 from 10.00 a.m. to 4.00 p.m. The event is being organized by IndiaBioScience in partnership with the Centre for Internet and Society's Access to Knowledge (CIS-A2K) team. CIS-A2K will conduct the first three edit-a-thons.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;In India, Science as a discipline is subject to many of the same gender  issues as it is worldwide - women scientists are fewer in number than  men, they occupy fewer positions of power, and face distinct issues by  virtue of their gender and the accompanying societal pressures. Women  Scientists in India also tend to be less visible than their male  counterparts, and public awareness of Indian Women Scientists is low.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;IndiaBioScience will be organising a series of public events to raise  the profile of women scientists on one of the most-popular online  encyclopaedias - Wikipedia. At these events, participants will be  encouraged to create and complete profiles of Indian Women in Science.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The last of these events, on October 14 coincides with &lt;a class="mw-redirect" href="https://en.wikipedia.org/wiki/Ada_Lovelace_Day" title="Ada Lovelace Day"&gt;Ada Lovelace Day&lt;/a&gt;, an international day to celebrate the achievements of women in Science, Technology and Math.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To participate sign up below or click here (&lt;a class="free external" href="http://www.indiabioscience.org/content/women-science-wiki-edit-thon" rel="nofollow"&gt;http://www.indiabioscience.org/content/women-science-wiki-edit-thon&lt;/a&gt;)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Lunch and snacks will be provided.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the venue, the events will begin with a short, hands-on introduction  to Wiki editing. Participants can then go on to pick the scientist they  would like to work on. There will be an interaction session with a guest  Woman Scientist around lunch, with a discussion of issues commonly  faced by women in science. In the afternoon session, participants can  continue working on the Wiki pages, with a break for tea. Participants  are requested to bring their laptops. We have a few desktops available  at Saturday's venue for those who cannot do so.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Online participants can find us via &lt;a class="text external" href="https://plus.google.com/+IndiabioscienceOrg" rel="nofollow"&gt;Google Hangout&lt;/a&gt;. Chat with us or dial in for interactions, questions, help or simply to socialize.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Speaker: &lt;a href="https://en.wikipedia.org/wiki/Rohini_Godbole" title="Rohini Godbole"&gt;Rohini Godbole&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;See the event page on &lt;a class="external-link" href="https://en.wikipedia.org/wiki/Wikipedia:Meetup/Bangalore/Ada_Lovelace_Edit-a-thon_2014"&gt;Wikipedia&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/openness/events/ada-lovelace-edit-a-thon-2014'&gt;http://editors.cis-india.org/openness/events/ada-lovelace-edit-a-thon-2014&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Wikimedia</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Edit-a-thon</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2014-10-13T06:30:08Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/a2k/blogs/Activities%20accomplished%20during%202013-2014.pdf">
    <title>Activities accomplished during 2013-2014.pdf</title>
    <link>http://editors.cis-india.org/a2k/blogs/Activities%20accomplished%20during%202013-2014.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/a2k/blogs/Activities%20accomplished%20during%202013-2014.pdf'&gt;http://editors.cis-india.org/a2k/blogs/Activities%20accomplished%20during%202013-2014.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2016-05-26T16:23:12Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/privacy-bill">
    <title>Activists welcome privacy Bill, but point out concerns</title>
    <link>http://editors.cis-india.org/news/privacy-bill</link>
    <description>
        &lt;b&gt;Experts have welcomed the government's move to bring in a law for protecting individual privacy, amid concerns about the potential misuse of personal data it is collecting to execute social welfare and security schemes.&lt;/b&gt;
        
&lt;p&gt;But they warn that overlaps with existing laws, a limited consultation process and failure to keep up with technological advances could undercut the utility of the planned legislation.&lt;/p&gt;
&lt;p&gt;The Union government has set up a panel of secretary-level officials to prepare a blueprint for a law to protect individual privacy and personal data from misuse, even by the government, Mint reported on Monday.&lt;/p&gt;
&lt;p&gt;The government is collecting personal data to operate schemes such as Aadhaar--a project to provide numeric identity cards to all residents, and the National Intelligence Grid (Natgrid), which will track information obtained by 11 law enforcement and intelligence agencies.&lt;/p&gt;
&lt;p&gt;These agencies can access details of phone calls, credit card transactions, visa, immigration and property records, and driving licences of all citizens, as well as their iris and thumb-prints.&lt;/p&gt;
&lt;p&gt;Lawrence Liang, a lawyer who works with Bangalore-based Alternative Law Forum, said the planned law will check the manner in which private companies use the personal data of citizens.&lt;/p&gt;
&lt;p&gt;"Currently, there are only private contracts between individuals and companies on how personal data is used. With this legislation, the individual is more empowered. The state can back him better in case of a dispute," he said.&lt;/p&gt;
&lt;p&gt;Sunil Abraham, executive director of the Bangalore-based Centre for Internet and Society, which has protested Aadhaar's project structure, also welcomed the move.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;"The privacy Bill guidelines are fairly broad. It is early days yet. 
Their will be a large overlap between the privacy and Aadhaar Bills," he
 said.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;Faking biometric data, for instance, isn't a violation of privacy in the proposed law but could be criminally cognizable under the Aadhaar Bill, Abraham said. "It will be interesting to see how these issues are tackled as there are several nuances and grey areas."&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;A scientist at the Institute for Genomics and Integrative Biology in New Delhi said new kinds of privacy issues will emerge because of the imminent rise of bioinformatics applications.&lt;/p&gt;
&lt;p&gt;There are no products or applications today that rely solely on biometric information to breach individual privacy, he said, requesting anonymity.&lt;/p&gt;
&lt;p&gt;"But within five years, it will be easier to collect biometric information and link it to other details such as credit card information and driving licence numbers on a large scale. There could then be issues of privacy that will emerge," he added.&lt;/p&gt;
&lt;p&gt;Leo Saldanah, coordinator at the Bangalore-based Environment Support Group and another critic of Aadhaar, said the planned privacy Bill is a sham.&lt;/p&gt;
&lt;p&gt;"Privacy is anyway enumerated in our constitutional rights under Article 21. But governments have anyway accessed information via phone taps unencumbered," he said. "I don't think the existence of legislation per se will change matters on the ground."&lt;/p&gt;
&lt;p&gt;Link to the article on &lt;a class="external-link" href="http://dailyme.com/story/2010062300000561/activists-privacy-bill-point-concerns.html"&gt;DailyMe&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;For the article in &lt;a class="external-link" href="http://epaper.livemint.com/Default.aspx?Id=38552F6A3347414A695675474755514C62327137543967684A734776784A4349514145755869394D7665673D"&gt;Livemint&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/privacy-bill'&gt;http://editors.cis-india.org/news/privacy-bill&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-02T11:42:47Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/activists-cry-foul-against-aadhaar">
    <title>Activists cry foul against Aadhaar</title>
    <link>http://editors.cis-india.org/news/activists-cry-foul-against-aadhaar</link>
    <description>
        &lt;b&gt;Biometric experts, jurists and social activists today urged the state government to immediately snap ties with the Unique Identification Authority of India (UIDAI) and stop offering Aadhaar numbers to residents. &lt;/b&gt;
        
&lt;p&gt;Arguing that the creation of Aadhaar numbers had no legislative base as the National Identification Authority of India Bill, 2010, was pending with Parliament, civil society members said UIDAI’s project was unconstitutional.&lt;br /&gt;&lt;br /&gt;They pointed out that the parliamentary standing committee had termed the biometric project “directionless”.&lt;br /&gt;&lt;br /&gt;“The biometric database of citizens, management of which will remain in the hands of some private companies, severely infringes on the right of citizens to privacy. A rule relating to security of biometric data is yet to come up, but UIDAI is going on generating them,” said Usha Ramanathan, a jurist from Delhi at a meeting on the UID project here.&lt;br /&gt;&lt;br /&gt;The meet on Aadhaar was convened in the state capital by the Indian Social Action Forum. The participants included social activist Dayamani Barla, director of Bangalore-based Centre for Internet and Society Sunil Abraham, biometric expert from Mumbai J.T. D’ Souza and member of Citizens’ Forum for Civil Liberties Gopal Krishna, among others.&lt;br /&gt;&lt;br /&gt;The unique numbers are expected to be utilised extensively, from opening bank accounts to applying for LPG connections. UIDAI has already generated roughly 10 crore unique numbers.&lt;br /&gt;&lt;br /&gt;Neither the Citizenship Act, 1955, nor Citizenship Rules of 2003 permit collection of biometrics, the experts added. “Both the UID and National Population Registrar projects adopt technology that risks national and individual security,” observed D’ Souza.&lt;/p&gt;
&lt;p&gt;The news was published in the Telegraph on Thursday, 12 January 2012. Read the original story &lt;a class="external-link" href="http://www.telegraphindia.com/1120112/jsp/jharkhand/story_14994745.jsp"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/activists-cry-foul-against-aadhaar'&gt;http://editors.cis-india.org/news/activists-cry-foul-against-aadhaar&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-01-31T04:24:39Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/ActiveEditors.png">
    <title>Active Editors</title>
    <link>http://editors.cis-india.org/home-images/ActiveEditors.png</link>
    <description>
        &lt;b&gt;Active Editors in Wikipedia&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/ActiveEditors.png'&gt;http://editors.cis-india.org/home-images/ActiveEditors.png&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-07-03T09:09:41Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/business-standard-july-5-2017-sanjay-kumar-singh-act-now-to-protect-yourself-against-future-ransomware-attacks">
    <title>Act now to protect yourself against future ransomware attacks</title>
    <link>http://editors.cis-india.org/internet-governance/news/business-standard-july-5-2017-sanjay-kumar-singh-act-now-to-protect-yourself-against-future-ransomware-attacks</link>
    <description>
        &lt;b&gt;There was Wannacry, then Petya, and several other lesser-known ones: With ransomware attacks coming thick and fast, get proactive about protecting yourself.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Sanjay Kumar Singh was published by &lt;a class="external-link" href="http://www.business-standard.com/article/markets/act-now-to-protect-yourself-against-future-attacks-117070400742_1.html"&gt;Business Standard&lt;/a&gt; on July 5, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The Wannacry ransomware attack in May was followed by the Petya attack last week. This attack affected the Ukrainian government and large corporates like Maersk and Merck. In India it affected the operations of terminals at Jawaharlal Nehru Port Trust (JNPT), operated by Maersk. According to Kaspersky Lab, the rate of ransomware attacks on businesses grew from one every 120 seconds in January 2016 to one every 40 seconds by October that year. The rate of attack on individuals' computers rose from one every 20 seconds to one every 10 seconds over this period. Today, it has become imperative for everyone, including entrepreneurs and small business owners, to learn how to defend themselves against such attacks.          &lt;br /&gt;&lt;br /&gt;A trend witnessed in 2016 was the growth of ransomware-as-a-service business model. "Code creators offer their malicious product on demand, selling uniquely modified versions to criminals who then distribute it through spam and websites, paying a commission to the creator," says Altaf Halde, managing director, Kaspersky Lab (South Asia). He adds that the growth of cashless payments in India will undoubtedly attract the attention of cyber criminals and lead to more attacks in future.   &lt;br /&gt;&lt;br /&gt;Next, let us turn to how ransomware works. An operating system (OS) is a large and complicated piece of software with millions of lines of software code. A malware exploits vulnerabilities within the OS to infiltrate it. An infiltration can happen in multiple ways: if you download a malicious email attachment, visit a code-carrying web site, via an infected pen drive, and so on.&lt;br /&gt;&lt;br /&gt;Ransomware is a form of malware that encrypts the files in a critical part of the computer, such as My Documents or Desktop, where people usually store their files. It could also encrypt specific file types, say, such .doc files. The user is then informed that his files have been encrypted along with the warning that unless he pays up within the next few hours his files will be deleted. Says Udbhav Tiwari, policy officer at the Centre for Internet and Society, Bengaluru: "You first have to first pay the attackers using anonymous money like bitcoins and then they give you the key for decrypting your files."&lt;br /&gt;&lt;br /&gt;A ransomware attack can be dealt with in two ways: either pay the money and get the files unlocked, or find a way to circumvent the encryption. The latter option can, however, take a fair bit of time.&lt;/p&gt;
&lt;table class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;p&gt;Safeguard measure you should adopt&lt;/p&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;br /&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Back up important files regularly. Check periodically that these files have not  got damaged&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Enable ‘Show file extensions’ option in Windows settings. Stay away from extensions like “exe”, “vbs” and “scr”. Many &lt;a href="http://www.howtogeek.com/137270/50-file-extensions-that-are-potentially-dangerous-on-windows/" target="_blank"&gt;familiar file types can be dangerous&lt;/a&gt; as scammers use multiple extensions (like hot-chics.avi.exe or doc.scr)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;If you discover an unknown process on your machine, cut off the Internet connection immediately&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;If you have been infected, find the name of the ransomware. If it's an older version, your files can be restored. For restoration tools visit &lt;a href="https://www.nomoreransom.org/" target="_blank"&gt;https://www.nomoreransom.org/&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Among the safeguard measures you should adopt, first and foremost, never open a suspicious file. By being vigilant you can avoid a lot of ransomware attacks.&lt;br /&gt;&lt;br /&gt;Most malware exploit vulnerabilities within the OS. "These vulnerabilities are frequently patched by the creators of the OS. But if people use pirated OS, or don't upgrade it regularly, they could land in trouble," says Tiwari. Soon after the Wannacry attack, Microsoft had issued a patch. People who updated their computers immediately didn't get affected by it. Also, use the latest version of an OS.&lt;br /&gt;&lt;br /&gt; Use a quality antivirus (AV) solution, which is usually one you have to pay for. A high-quality AV can even protect you against vulnerabilities not patched by the OS manufacturer. AVs scan files. If they detect patterns indicating the presence of malware, they lock them apart from the rest of the computer, thereby preventing them from spreading.&lt;br /&gt;&lt;br /&gt; One option is to use an OS that is less vulnerable, like Mac and Linux. Fewer malware are designed for these OS as fewer people use them.&lt;br /&gt;&lt;br /&gt;Finally, if your files do get encrypted, don’t pay the ransom, unless instant access to those files is critical. "Each payment only fuels this unlawful business," says Halde.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/business-standard-july-5-2017-sanjay-kumar-singh-act-now-to-protect-yourself-against-future-ransomware-attacks'&gt;http://editors.cis-india.org/internet-governance/news/business-standard-july-5-2017-sanjay-kumar-singh-act-now-to-protect-yourself-against-future-ransomware-attacks&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-07-10T14:46:14Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/M3.jpg">
    <title>acorn</title>
    <link>http://editors.cis-india.org/home-images/M3.jpg</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/M3.jpg'&gt;http://editors.cis-india.org/home-images/M3.jpg&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2012-04-10T09:01:38Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/openness/blog-old/achievements.pdf">
    <title>Achievements</title>
    <link>http://editors.cis-india.org/openness/blog-old/achievements.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/openness/blog-old/achievements.pdf'&gt;http://editors.cis-india.org/openness/blog-old/achievements.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-09-23T07:25:01Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/business-standard-august-22-2016-accessing-pirated-content-might-lead-to-prison-term-and-rs-3-lakh-fine">
    <title>Accessing pirated content might lead to prison term &amp; Rs 3-lakh fine</title>
    <link>http://editors.cis-india.org/internet-governance/news/business-standard-august-22-2016-accessing-pirated-content-might-lead-to-prison-term-and-rs-3-lakh-fine</link>
    <description>
        &lt;b&gt;India puts onus of downloading and viewing pirated content on individuals.

&lt;/b&gt;
        &lt;p align="justify"&gt;The article by Alnoor Peermohammed was published in the &lt;a href="http://www.business-standard.com/article/technology/accessing-pirated-content-might-lead-to-prison-term-rs-3-lakh-fine-116082201042_1.html"&gt;Business Standard&lt;/a&gt; on August 22, 2016. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr align="justify" size="2" width="100%" /&gt;
&lt;div align="justify"&gt;The central government is putting the onus of downloading and viewing  of copyrighted content from sites it has blocked (with the help of  internet service providers) on users.&lt;/div&gt;
&lt;div align="justify"&gt;&lt;/div&gt;
&lt;div align="justify"&gt;Visiting torrent (a particular type of files) websites while on Tata  Communications’ network recently had users being shown a message that  viewing or downloading content on those sites could land them in prison  for up to three years and a fine of up to Rs 3 lakh.&lt;/div&gt;
&lt;div align="justify"&gt;&lt;/div&gt;
&lt;div align="justify"&gt;“There is not enough room in our prisons to keep these infringers and  enough time in our courts to try them. It might sound very exciting as a  message to put out but, essentially, they’re trying to scare people  into good behaviour,” said Sunil Abraham, executive director at research  firm Centre for Internet and Society.
&lt;div id="div-gpt-ad-1466593210966-0"&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div align="justify"&gt;&lt;/div&gt;
&lt;div align="justify"&gt;There has been no change to the Copyright Act of 1957 or the  Information Technology Act of 2000 for the updated notice being shown to  users upon visiting blocked sites. Under these provisions, visiting a  site, which is blocked is not illegal, unless it is child pornography.&lt;br /&gt; &lt;br /&gt;
&lt;div&gt;“Copyright infringement happens all the time and even in developed  countries, the rates are very high. Crackdowns on individuals and  consumers are never going to solve the problem,” added Abraham.&lt;/div&gt;
&lt;div&gt;Experts say the most the government could do is prosecute a couple of  people and make examples of them, to dissuade others. This practice is  followed globally. There are no examples, though, in India of  prosecution for copyright infringement of online content.&lt;br /&gt; &lt;br /&gt;
&lt;div&gt;The recent alteration of the statement seen by users on Tata networks  was done on the directives of the Bombay High Court, after the company  appealed that showing individual messages for why each website was  blocked was not feasible. The resulting message sparked media frenzy  that visitors of blocked websites could now be imprisoned.&lt;/div&gt;
&lt;div&gt;Other media reports revealed that the recent blocking of websites by  internet service providers was prompted by court orders to prevent  piracy of &lt;i&gt;Dishoom&lt;/i&gt;, the Bollywood movie. &lt;br /&gt; &lt;br /&gt; &lt;span class="p-content"&gt;Globally, there’s been a move to clamp on  torrent websites which host pirated content, aided by large information  technology entities such as Apple or Facebook. Last month, the US  authorities arrested Kickass Torrents’ founder, Arten Vaulin, and  blocked all the domains of the website, only to have it resurface a day  later.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/business-standard-august-22-2016-accessing-pirated-content-might-lead-to-prison-term-and-rs-3-lakh-fine'&gt;http://editors.cis-india.org/internet-governance/news/business-standard-august-22-2016-accessing-pirated-content-might-lead-to-prison-term-and-rs-3-lakh-fine&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Information Technology</dc:subject>
    
    
        <dc:subject>Copyright</dc:subject>
    

   <dc:date>2016-08-23T02:47:52Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/accessibility/publications/accessible-phones-table.doc">
    <title>Accessible Phones Word </title>
    <link>http://editors.cis-india.org/accessibility/publications/accessible-phones-table.doc</link>
    <description>
        &lt;b&gt;word doc&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/accessibility/publications/accessible-phones-table.doc'&gt;http://editors.cis-india.org/accessibility/publications/accessible-phones-table.doc&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2011-03-10T07:33:05Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/accessibility/publications/accessible-phones">
    <title>Accessible Phones</title>
    <link>http://editors.cis-india.org/accessibility/publications/accessible-phones</link>
    <description>
        &lt;b&gt;word doc&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/accessibility/publications/accessible-phones'&gt;http://editors.cis-india.org/accessibility/publications/accessible-phones&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2011-03-10T07:26:29Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/accessibility/publications/accessible-handsets-table.pdf">
    <title>Accessible Mobiles Table PDF</title>
    <link>http://editors.cis-india.org/accessibility/publications/accessible-handsets-table.pdf</link>
    <description>
        &lt;b&gt;pdf&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/accessibility/publications/accessible-handsets-table.pdf'&gt;http://editors.cis-india.org/accessibility/publications/accessible-handsets-table.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Accessibility</dc:subject>
    

   <dc:date>2011-08-22T12:47:35Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/accessibility/publications/accessible-mobile-handsets.pdf">
    <title>Accessible Mobile Handsets Table</title>
    <link>http://editors.cis-india.org/accessibility/publications/accessible-mobile-handsets.pdf</link>
    <description>
        &lt;b&gt;pdf&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/accessibility/publications/accessible-mobile-handsets.pdf'&gt;http://editors.cis-india.org/accessibility/publications/accessible-mobile-handsets.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2011-04-11T05:40:41Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/accessibility/blog/accessible-mobile-handsets">
    <title>Accessible Mobile Handsets in India: An Overview </title>
    <link>http://editors.cis-india.org/accessibility/blog/accessible-mobile-handsets</link>
    <description>
        &lt;b&gt;Over a thousand mobile handsets are sold in India today and new models are launched almost every few weeks. However, the number of accessible handsets continues to be disproportionately low.  The Centre for Internet and Society conducted a research on the mobile market to gauge how many handsets in India are accessible for persons with disabilities. Handsets were judged on the basis of a few common accessibility features and pricing. &lt;/b&gt;
        &lt;p&gt;The findings reveal that 108 handset models came with screen readers and 100 were magnifier compatible. Thirty one of them were touch phones and only 15 models had QWERTY keypads.&lt;/p&gt;
&lt;p&gt;The study found that the price of 60 of the available options was either high or very high (Rs. 10,000 and above) and only 48 handsets are available at a reasonable or low price.&lt;/p&gt;
&lt;p&gt;For available handset options for persons with disabilities, click below:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://editors.cis-india.org/accessibility/accessible-mobile-handsets.pdf" class="internal-link" title="Accessible Mobile Handsets Table"&gt;PDF&lt;/a&gt; [612 kb]&lt;/li&gt;
&lt;li&gt;&lt;a href="http://editors.cis-india.org/accessibility/accessible-handsets.odt" class="internal-link" title="Accessible Handsets"&gt;Open Office&lt;/a&gt; [24 kb]&lt;/li&gt;
&lt;li&gt;&lt;a href="http://editors.cis-india.org/accessibility/accessible-handsets.docx" class="internal-link" title="Accessible Handsets Phones"&gt;Word &lt;/a&gt; [42kb]&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Some of the major cross platform and proprietary mobile operating systems were also examined for their accessibility features. These included Windows Mobile, iPhone for Apple, Blackberry, Android, Symbian and Windows Phone 7.  All the operating systems offer features such as font customization, menu style, menu icons and voice recognition. However, only two offer built-in screen readers and only one OS offers a built in screen magnifier. Three operating systems support third party screen readers and two also support third party screen magnifiers.&lt;/p&gt;
&lt;p&gt;The table [click on the links below] (also compiled by Mukesh Sharma) provides more details on the features offered by various operating systems:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://editors.cis-india.org/accessibility/accessible-handsets-table.docx" class="internal-link" title="Accessible Handsets Table"&gt;Word&lt;/a&gt; [14 kb]&lt;/li&gt;
&lt;li&gt;&lt;a href="http://editors.cis-india.org/accessibility/accessible-handsets-table.pdf" class="internal-link" title="Accessible Mobiles Table PDF"&gt;PDF&lt;/a&gt; [16 kb]&lt;/li&gt;
&lt;li&gt;&lt;a href="http://editors.cis-india.org/accessibility/accessible-hand-sets-table.odt" class="internal-link" title="Accessible Handsets Mobile"&gt;Open Office&lt;/a&gt; [15 kb]&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/accessibility/blog/accessible-mobile-handsets'&gt;http://editors.cis-india.org/accessibility/blog/accessible-mobile-handsets&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Accessibility</dc:subject>
    

   <dc:date>2012-12-14T10:29:30Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/accessibility/publications/accessible-handsets-table.docx">
    <title>Accessible Handsets Table</title>
    <link>http://editors.cis-india.org/accessibility/publications/accessible-handsets-table.docx</link>
    <description>
        &lt;b&gt;word document&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/accessibility/publications/accessible-handsets-table.docx'&gt;http://editors.cis-india.org/accessibility/publications/accessible-handsets-table.docx&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2011-04-11T05:56:11Z</dc:date>
   <dc:type>File</dc:type>
   </item>




</rdf:RDF>
