<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="http://editors.cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>http://editors.cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 5401 to 5415.
        
  </description>
  
  
  
  
  <image rdf:resource="http://editors.cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/002Front.jpg"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/002Back.jpg"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/001Front.png"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/1.png"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/copyright-amendment"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/internet-mobile-digital-economy-conference.pdf"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/the-hindu-narayan-lakshman-july-25-2014-trolled-from-us-congress-wikipedia-bans-edits"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/times-of-india-sep-5-2012-lubna-kably-sops-can-boost-jobs-for-the-disabled-persons"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/privacy/privacy-matters-report-from-ahmedabad"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/police-agency-targetted"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/cio-july-1-2015-irctc-aadhaar-play-can-violate-sc-order-and-derail-national-security"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/the-times-of-india-april-24-2014-india-wants-core-internet-infrastructure"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/the-telegraph-august-3-2014-i-am-going-to-ruin-you-dear"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/deccan-herald-september-13-2013-help-konkani-wikipedia-come-out-of-incubation"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/university-of-oxford-october-25-2013-free-speech-and-media-in-south-asia"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="http://editors.cis-india.org/home-images/002Front.jpg">
    <title>002Front</title>
    <link>http://editors.cis-india.org/home-images/002Front.jpg</link>
    <description>
        &lt;b&gt;002Front&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/002Front.jpg'&gt;http://editors.cis-india.org/home-images/002Front.jpg&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2012-11-23T05:15:07Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/002Back.jpg">
    <title>002Back</title>
    <link>http://editors.cis-india.org/home-images/002Back.jpg</link>
    <description>
        &lt;b&gt;002Back&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/002Back.jpg'&gt;http://editors.cis-india.org/home-images/002Back.jpg&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2012-11-23T05:16:42Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/001Front.png">
    <title>001Front</title>
    <link>http://editors.cis-india.org/home-images/001Front.png</link>
    <description>
        &lt;b&gt;001Front&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/001Front.png'&gt;http://editors.cis-india.org/home-images/001Front.png&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2012-11-23T04:17:56Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/1.png">
    <title>1</title>
    <link>http://editors.cis-india.org/home-images/1.png</link>
    <description>
        &lt;b&gt;1&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/1.png'&gt;http://editors.cis-india.org/home-images/1.png&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2014-05-06T04:26:17Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/copyright-amendment">
    <title>2(m) or not 2(m)</title>
    <link>http://editors.cis-india.org/news/copyright-amendment</link>
    <description>
        &lt;b&gt;An article by Nilanjana S Roy was published in the Business Standard on February 19, 2011. In this article Nilanjana Roy explains to us how a copyright amendment might change the way we read, write and publish in India.&lt;/b&gt;
        
&lt;p&gt;Call this the war of the slogans. On one side, copyright lawyers and the Ministry of Human Resource Development offer the lure of cheaper books for Indian readers. On the other, publishers and authors speak of the death of Indian publishing as we know it.&lt;/p&gt;
&lt;p&gt;Section 2(m), a proposed amendment to India’s copyright law that would allow the parallel import of books, is a dry piece of legalese, but it’s sparked a blog war, a flurry of publisher white papers, and a wide debate on copyright and territory.&lt;/p&gt;
&lt;p&gt;The rationale is a legally sound one — to align Indian copyright law with Indian patent and trademark law, both of which follow the principle of “international exhaustion”: once a product has been legitimately sold, that product can be resold anywhere in the world without the consent of the owner of the copyright, be that the author or the publisher.&lt;/p&gt;
&lt;p&gt;According to the Association of Publishers of India, “This proviso would mean that books published in any country could be freely made available and sold in India, without this amounting to infringement of copyright.”&lt;/p&gt;
&lt;p&gt;Theoretically, parallel imports would allow a publisher or a printer who does not hold copyright to an Indian edition of a book to print his or her own editions of the book, under certain conditions, and release them back into the Indian market. There is also a fear among publishers that this might lead to widespread “dumping”, where the market is flooded with cheap, remaindered books.”&lt;/p&gt;
&lt;p&gt;When this applies to books, specifically, one side argues that allowing “parallel imports” of books would open up the Indian publishing market to competition and would allow readers access to cheaper books. The other side argues that authors and publishers would suffer, and that in the long run, so would the reader. Thomas Abraham, managing director, Hachette India, states his position succinctly: “This would be the death of publishing and writing as we know it in India — and ironically by a surfeit of books.”&lt;/p&gt;
&lt;p&gt;Step back from the rhetoric and the very complex issues involved about the intricacies of copyright law, territoriality in publishing, the book remainders market and book dumping, and here’s how the amendment is likely to affect readers, authors, publishers and booksellers.&lt;/p&gt;
&lt;h3&gt;Booksellers&lt;/h3&gt;
&lt;p&gt;Perhaps the sharpest summary comes from Landmark Bookstore’s Madhu Mohan: “As booksellers, we want to give our customers a wider range at a lower price. An open market immediately affords both: the cost of this is that publishers with Indian market rights might suffer. The more significantly affected parties are authors, publishers and readers. If, arguably, territorial rights are not sold, authors might earn lower advances. Publishers who have paid for territorial rights, are not able to get the full benefit of their monies. Readers should welcome the change, because at the outset they will get lower priced books.”&lt;/p&gt;
&lt;p&gt;His view is echoed across the bookselling industry, with reactions ranging from indifference to the possible repercussions to cautious alarm — for many booksellers, a weak or damaged Indian publishing industry is also a negative.&lt;/p&gt;
&lt;p&gt;Almost all booksellers agree that the short-term benefits of allowing parallel imports would be to lower the price of books. India already has among the lowest-priced English language books in the world, but it would be interesting to see if even lower prices reeled in a different kind of reader. As Mohan points out, book imports would be cheaper; books published in India by Indian or foreign authors would be adversely affected. The long-term scenario is another matter; if the Indian publishing industry is hit hard, we could be flooded with cheap, low-quality remainders, or lose price benefits in the long run.&lt;/p&gt;
&lt;h3&gt;Authors&lt;/h3&gt;
&lt;p&gt;For authors, what’s key about the 2(m) amendment is the way in which it would affect the writer’s copyright over his/ her work — and also the shifts it might bring about in the industry in general. Copyright lawyer Nandita Saikia observes that once a publisher effectively loses control over an edition of a book — if competing editions are allowed into the market — “This would significantly diminish the ability of publishers to invest in Indian authors and Indian writing.” From Abraham at Hachette to Chiki Sarkar at Random House to Tata McGraw Hill, there seems to be consensus on this aspect of the amendment.&lt;/p&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;In contrast, Pranesh Prakash of the Centre for Internet and Society argues strongly in favour of 2(m) and dismantling the “licence raj” that requires booksellers and distributors to have authorisation to import books: “Allowing people to import goods without permissions (with appropriate duties) is taken for granted in all other areas, so why not copyrighted works? After all, it is not the act of publication that gets affected, but the right of exclusive distribution.”&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;But many authors point out that publishing and bookselling operate differently from other industries, and the dynamics of writing and bookselling are not comparable. Author Amit Varma puts forward the writer’s objections: “As the author of a book, I should have the right to assign the rights to sell my book to any publisher in India that I feel like, and the law should protect that right, and my contract with the publisher. Parallel import obviously makes a mockery of that right, and can deny me significant potential royalties.”&lt;/p&gt;
&lt;h3&gt;Publishers&lt;/h3&gt;
&lt;p&gt;At Penguin India, Andrew Phillips is blunt: “We stand firmly against the amendment. Penguin is both a ‘foreign’ publisher and an Indian publisher and we believe it will affect both parts of our business. We don’t believe the effects will be minor — to the contrary, this would have a fundamental impact on the publishing business both for international authors and Indian authors who aspire to be read outside India.”&lt;/p&gt;
&lt;p&gt;The publishers’ arguments are complex, but stripped of the technicalities, they rest on the question of territoriality. When publishing worldwide operates on the basis of territorial agreements — authors sell rights to their works for specific regions — opening up the market unilaterally makes little sense. India might open its market, via 2(m), to competing imports and editions; but Indian publishers don’t have the right to sell similar editions of books in the UK or US markets.&lt;/p&gt;
&lt;p&gt;In other words, the market would open up only in one direction — and this could diminish Indian publishers’ ability to nurture new writing, release Indian editions of foreign authors, and pay authors significant royalties.&lt;/p&gt;
&lt;p&gt;Behind the rhetoric, nothing about this proposed change in copyright laws is simple, and the repercussions for authors and publishers are likely to be both significant and adverse. There’s an interesting parallel in the Australian market, which, like the Indian publishing industry, is thriving but relatively young, and lacks the clout of the formidable US, UK and European markets.&lt;/p&gt;
&lt;p&gt;Two years ago, when the move to allow parallel imports of books was discussed in Australia, that discussion was fierce, impassioned and hotly contested. Nor was it limited to the industry; when readers realised that the debate was really over what they would get to read, which authors would benefit or lose out, and how this would impact their intellectual lives, the debate went public.&lt;/p&gt;
&lt;p&gt;In the case of Australia, it took a full year of discussion before it was finally decided not to introduce parallel imports for the publishing industry. Whatever the possible adverse effects — or benefits — of parallel imports, we haven’t had that discussion yet in India. It’s a necessary one, and it affects anybody equipped with a mind, a wallet and the ability to walk into a bookstore. This would be a good time to have it, before the law is set in stone.&lt;/p&gt;
&lt;p&gt;The original article was published by &lt;a class="external-link" href="http://www.business-standard.com/india/news/2m-or-not-2m/425676/"&gt;Business Standard&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/copyright-amendment'&gt;http://editors.cis-india.org/news/copyright-amendment&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Intellectual Property Rights</dc:subject>
    

   <dc:date>2011-04-01T15:55:48Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/internet-mobile-digital-economy-conference.pdf">
    <title>(IMDEC) 2013</title>
    <link>http://editors.cis-india.org/internet-governance/blog/internet-mobile-digital-economy-conference.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/internet-mobile-digital-economy-conference.pdf'&gt;http://editors.cis-india.org/internet-governance/blog/internet-mobile-digital-economy-conference.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-10-25T06:09:40Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/the-hindu-narayan-lakshman-july-25-2014-trolled-from-us-congress-wikipedia-bans-edits">
    <title>'Trolled' from US Congress, Wikipedia bans edits</title>
    <link>http://editors.cis-india.org/news/the-hindu-narayan-lakshman-july-25-2014-trolled-from-us-congress-wikipedia-bans-edits</link>
    <description>
        &lt;b&gt;Online encyclopaedia Wikipedia has issued a ten-day ban against an anonymous editor of its website located on the premises of the U.S. Congress, after the latter engaged in “disruptive editing,” on a wide range of subjects, from moon-landing conspiracy theories linked to Cuba to naming former U.S. Defence Secretary Donald Rumsfeld as an alien wizard. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Narayan Lakshman was &lt;a class="external-link" href="http://www.thehindu.com/sci-tech/technology/trolled-from-us-congress-wikipedia-bans-edits/article6249959.ece"&gt;published in the Hindu&lt;/a&gt; on July 25, 2014. Pranesh Prakash gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Many of the seemingly humorous edits were tracked by a Twitter ‘bot’ with the handle @CongressEdits, which is driven by a code to automatically monitor Wikipedia for changes to the site made by accounts with a Congressional IP addresses.&lt;br /&gt;&lt;br /&gt;Per the Wikipedia ban, only persons editing the site anonymously are barred from making changes, while Congressional staffers who have created named accounts to log into Wikipedia could continue making edits.&lt;br /&gt;&lt;br /&gt;Yet some reports noted that the changes “have become almost troll-like,” alluding for example to an edit on the assassination of John F. Kennedy, which changed the text to say that alleged assassin Lee Harvey Oswald was acting “on behalf of the regime of Fidel Castro.”&lt;br /&gt;&lt;br /&gt;Another entry revised the biography of Mr. Rumsfeld to describe him as an “alien lizard who eats Mexican babies,” and yet another change suggested that moon-landing conspiracy theories were “promoted by the Cuban government.”&lt;br /&gt;&lt;br /&gt;Pranesh Prakash, Policy Director at the Centre for Internet and Society, said to The Hindu via Twitter that Wikipedia’s ban affected up to 9000 people, while only a few pranksters seem to be indulging in vandalism.&lt;br /&gt;&lt;br /&gt;“Ironically, it is the public nature of @CongressEdits has led to this increase in attention-seeking vandalism,” he said, adding that such bans, if there are more to come, could “effectively kill projects like @CongressEdits.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/the-hindu-narayan-lakshman-july-25-2014-trolled-from-us-congress-wikipedia-bans-edits'&gt;http://editors.cis-india.org/news/the-hindu-narayan-lakshman-july-25-2014-trolled-from-us-congress-wikipedia-bans-edits&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Wikimedia</dc:subject>
    

   <dc:date>2014-07-28T10:22:53Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/times-of-india-sep-5-2012-lubna-kably-sops-can-boost-jobs-for-the-disabled-persons">
    <title>'Sops can boost jobs for disabled persons'</title>
    <link>http://editors.cis-india.org/news/times-of-india-sep-5-2012-lubna-kably-sops-can-boost-jobs-for-the-disabled-persons</link>
    <description>
        &lt;b&gt;A recent report commissioned by the government and the United Nations Development Programme (UNDP) has called for greater incentives to the private sector to boost employment for persons with disabilities (PWDs). Incentives such as grants can be used by the employer to make the workplace more accessible and for providing assistive technologies such as voice software or training.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;Lubna Kably's article was &lt;a class="external-link" href="http://articles.timesofindia.indiatimes.com/2012-09-05/mumbai/33614657_1_pwds-private-sector-ites-sector"&gt;published in the Times of India on September 5, 2012&lt;/a&gt;. Nirmita Narasimhan is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The findings and suggestions of the report, 'Livelihood opportunities for PWDs', are expected to be included in the 12th Five Year Plan (2012-17), which aims to be more inclusive. The government sector has a mandatory quota of 3% for PWDs. For the private sector, the PWD Act, 1995, provides for incentives if at least 5% of the workforce comprises PWDs. Here, the government makes payment of the employer's contributions to the Employees Provident Fund and Employees State Insurance for the first three years as an incentive for PWD employees earning up to Rs 25,000 per month.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some countries have a mandatory PWD job quota for the private sector with penal provisions - Germany (5%), &lt;a href="http://timesofindia.indiatimes.com/topic/Austria"&gt;Austria&lt;/a&gt; (4%), &lt;a href="http://timesofindia.indiatimes.com/topic/Poland"&gt;Poland&lt;/a&gt; (6%), Italy (a sliding scale of up to 7%), Spain (2%) and Japan (1.6%). Others like the USA rely on lucrative tax credit incentive schemes. Some, such as Japan use a carrot-and-stick approach and grants are also available to the private sector.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, experts do not favour a quota regime because of perceived practical difficulties and its failure in the government sector. "There may be practical difficulties for PWDs to execute certain tasks, which would then lead employers to reserve certain types of jobs only for PWDs, leading creation of the kind of stereotypes which we are fighting against," said Nirmita Naraimhan, advocate and program manager, Centre for Internet &amp;amp; Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Only a handful of companies employ PWDs. To boost private sector participation, the PWD employment incentive target (currently 5% of the workforce) must be realistic. Second, lucrative incentives could be a solution," said Javed Abidi, director, NCPEDP (National Centre for Promotion of Employment for Disabled People).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At this juncture, it is largely corporate philosophy that results in PWD hiring, especially in the hospitality and IT/ITeS sector. Cafe Coffee Day (CCD) has around 150 'Silent Brewmasters'. Other staff members are trained in the basics of sign language for optimal team functioning. "CCD's Silent Brewmasters specialize in brewing because of their heightened sense of smell and vision, thereby ensuring the most visually appealing presentation of our coffees. They are each cafe's best quality controllers," said K Ramakrishnan, president (Marketing), CCD.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"We have 110 PWDs in our team (5% of the total work force across 18 hotels) who are hearing and speech impaired. Initially, they functioned in back office operations, but some innovation such as numbered menu cards helps them interact with customers and results in an overall good factor," said Patu Keswani, chairman and MD, The Lemon Tree Hotel Company.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nasscom Foundation helps create a proper ecosystem. "Not only are PWDs placed in the IT-ITES sector, but the companies are helped in undertaking accessibility audits, motivated to generate accessible tools and help others get access to such tools," explained Rita Soni, CEO Nasscom Foundation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;E-Vindhya, where 95% of the workforce comprises PWDs and the rest are hired based on their sensitivity towards their PWD colleagues, is perhaps an exception. But other companies are also adopting an inclusive approach. At MindTree and Mphasis, at least 1% of the workforce comprises PWDs. Infosys BPO, Aegis, &lt;a href="http://economictimes.indiatimes.com/wipro-ltd/stocks/companyid-12799.cms"&gt;Wipro&lt;/a&gt;, and &lt;a href="http://timesofindia.indiatimes.com/topic/IBM"&gt;IBM&lt;/a&gt; are some other companies that adopt an integrated approach in dealing with PWD employees.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/times-of-india-sep-5-2012-lubna-kably-sops-can-boost-jobs-for-the-disabled-persons'&gt;http://editors.cis-india.org/news/times-of-india-sep-5-2012-lubna-kably-sops-can-boost-jobs-for-the-disabled-persons&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Accessibility</dc:subject>
    

   <dc:date>2012-09-12T03:51:46Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/privacy/privacy-matters-report-from-ahmedabad">
    <title>'Privacy Matters', Ahmedabad: Conference Report </title>
    <link>http://editors.cis-india.org/internet-governance/blog/privacy/privacy-matters-report-from-ahmedabad</link>
    <description>
        &lt;b&gt;On 26 March 2011, civil society, lawyers, judges, students and NGO’s, gathered together at the Ahmedabad Management Association to take part in 'Privacy Matters' –  a public conference organised by Privacy India in partnership with IDRC and Research Foundation for Governance in India (RFGI) — to discuss the challenges of  privacy in India, with an emphasis on national security and privacy. The conference was opened by Prashant Iyengar, head researcher at Privacy India and Kanan Drhu, director of RFGI. Mr. Iyengar explained Privacy India’s mandate to raise awareness of privacy, spark civil action, and promote democratic dialogue around privacy challenges and violations in India. RFGI is a think tank established in 2009 which aims to research, promote, and implement various reforms to improve the legal and political process in Gujarat and across India. ‘Privacy Matters – Ahmedabad’ is the third conference out of the eight that Privacy India will be hosting across India. The next conference will take place in Hyderabad on 9 April 2011. It will focus on human rights and privacy.&lt;/b&gt;
        
&lt;h2&gt;The keynote speech, delivered by Usha Ramanathan, focused on links not often made between privacy and social phenomenon.&lt;br /&gt;&lt;/h2&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p align="left"&gt;&lt;img class="image-left" src="../it-act/usha.jpg/image_preview" alt="Usha Ramanathan " /&gt;Ms. Usha Ramanathan opened the conference by examining the links not often made between privacy and personal security, between databases and national security, and the centrality of dislodging privacy in projects of social control. In her presentation she spoke about the inverse relationship between national and personal security, making the point that an important part of privacy is the ability of an individual to secure their own person. Today, because national security follows a policy of ubiquitous surveillance, it is almost impossible for an individual to secure their person from the state. Ms. Ramanathan also traced the beginnings of ubiquitous surveillance to the increasing global fear of terrorism, and the national break down of the criminal justice system in India. Instead of looking to the roots of terrorism and the roots of failure in the criminal justice system, the Indian State has responded to both these factors by superimposing a system of surveillance on top of the existing rule. Consequently, the state has become pan-optical — closely following the movement of its entire population. The state has been able to achieve this level of surveillance through technology, which it has used to create identifiers for its population. The use of technology by the state mediates a link between corporate interest and state interest. Thus, by facilitating the easy and ubiquitous creation of identifiers and surveillance, technology is changing the idea and the nature of privacy. For example, it is now important that a privacy law allows for individuals to protect and secure their identity, something that every individual has and every individual controls, while regulating the creation and external use of identifiers — something that is used by another (not you) to distinguish a person from the rest of the population.&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Questions to Consider&lt;/h3&gt;
&lt;ul&gt;&lt;li&gt;How can privacy legislation work to positively regulate the use of technology by the government, so that invasion of privacy does not consequently become state policy?&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;How can privacy legislation distinguish between and work to protect an identity while regulating the creation and use of personal information as identifiers?&lt;/li&gt;&lt;/ul&gt;
&lt;h2&gt;Session I of the Conference featured a Judicial Perspective of Privacy and a Presentation on the Connections between Privacy and the Federal Income Tax Regime in India.&lt;/h2&gt;
&lt;h3&gt;Privacy and the Constitution&lt;/h3&gt;
&lt;img class="image-right" src="../it-act/judge.jpg/image_preview" alt="Justice Bhatt" /&gt;
&lt;p&gt;&lt;strong&gt;&amp;nbsp;J N Bhatt&lt;/strong&gt;, the former Chief Justice of Gujarat and Bihar, and currently the head of the Gujarat State Law Commission, spoke about privacy as a fundamental right that has been written into articles 19 and 21 of the Constitution of India. Important points from his presentation include:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;&amp;nbsp;As privacy is already a recognized fundamental right, the question at hand is not if there is a right to privacy, but instead how can the right to privacy be best proliferated.&amp;nbsp;&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;Within the question of how a privacy can best be proliferated, is a question about rights and duties. Wherever there is a right to privacy there is also a corresponding duty to privacy — as rights and duties are interdependent.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;Though privacy has been recognized as a fundamental right in India, when looking at the actual assertion of the right, it is important to be aware of the cultural realities of India. India is a country with 39 per cent of her population living below the poverty line, with an even lower literacy rate, and there is a direct connection between the assertion of civil liberties, an individual’s civic sense, and education.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;When looking at how to best proliferate the right to privacy, governance and common law, a methodology to reach the poorest of the poor should be laid out first.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;Questions to Consider&lt;/h3&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;What is the best way to proliferate the right to privacy ?&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;What legal structures need to be in place to ensure that the poor can assert their right to privacy?&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;What social structures need to be in place to ensure that the poor can assert their right to privacy?&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;&lt;img class="image-left" src="../it-act/profdrhu.jpg/image_preview" alt="Prof. Drhu" /&gt;&amp;nbsp;Privacy and the Indian Tax Regime&lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Professor Amal Dhru&lt;/strong&gt;, visiting professor from the Indian Institute of Management, Ahmedabad and a practicing Chartered Accountant spoke on the connections between privacy and the federal income tax regime in India. In his presentation he explained how the information collected by the federal income tax regime in India can be both useful in holding a citizen accountable, and invasive of one’s personal privacy if mis-used. Important points from his presentation include:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;The Indian tax regime highlights the tension between public interest as tax evasion is considered an exception to the right to privacy as it is a matter of public interest.&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;&amp;nbsp;There is a lack of confidence in the existing banking and tax system in India. For example in the business sector, Indian investors have deposited over 700 billion dollars abroad as they are given complete privacy and security over their money. &lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;Though there is a lack of confidence in the current banking and tax system, a tighter law is not necessarily the solution. For example, studies have found that tighter tax regimes lead to greater evasion, while looser tax regimes have higher compliance rates.&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;On April 1, 2011 the new tax codes for India will be implemented. The reform will give enormous power to tax offices, and as the tax authorities will become equipped to do taxes smarter – this will come at a cost to citizen’s privacy. &lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;Questions to Consider&lt;/h3&gt;
&lt;ul&gt;&lt;li&gt;&amp;nbsp;Just as a tighter tax law leads to a higher percentage of tax evasion, will a tight privacy law simply lead to greater numbers of privacy violations?&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;What creates public confidence in a law?&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;Should a privacy legislation be responsible for defining the public good?&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;Should privacy protection of tax-related information be incorporated into a privacy legislation or contained only in tax law?&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;To what extent should tax authorities be allowed to investigate potential tax evasion i.e., one’s computer, house or e-mail? &lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;How does one balance the private vs. the public good? &lt;/li&gt;&lt;/ul&gt;
&lt;h2&gt;&amp;nbsp;Session II of the Conference focused on National Security and Privacy, and Cultural Conceptions of Privacy &lt;br /&gt;&lt;/h2&gt;
&lt;h3&gt;National Security and Privacy&lt;img class="image-right" src="../it-act/mathew.jpg/image_preview" alt="Mr. Thomas " /&gt;&lt;/h3&gt;
&lt;p style="text-align: left;"&gt;In the second session on Privacy and National Security, Colonel Mathew Thomas spoke on privacy and national security. Colonel Thomas is a management consultant and activity leader for development centers and has held top positions in the Indian Army, and the Defence Research and Development Organisation, where he headed the missile manufacturing facility. Sharing his personal experiences in the army he explained the connection between privacy and national security. Important points from his presentation include:&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&amp;nbsp;National Security is often not an internal threat, but instead an external threat. &lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;There is a connection between the increase in surveillance and liberalization of Government. &lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;More surveillance does not bring more security. &lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;Foreign software poses as a threat to national security.&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;Greater security is gained through intelligent use and analysis of data. &lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;A strong national security plan should not rely solely on surveillance of its citizens. &amp;nbsp;Instead national security should be brought about through strong economic policies, non-reliance on foreign software, neutrality in foreign policy, fair trade policies, rural development and prevention of migration to cities, and having a politically honest and accountable governance.&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;Questions to Consider&lt;/h3&gt;
&lt;ul&gt;&lt;li&gt;Is it effective for&amp;nbsp; privacy to be compromised in the name of anti- terror laws?&lt;/li&gt;&lt;li&gt;&amp;nbsp;Can the development and distribution of indigenous software protect national privacy?&lt;/li&gt;&lt;li&gt;&amp;nbsp;How can strong economic policies indirectly protect &amp;nbsp;an individual's privacy?&lt;/li&gt;&lt;li&gt;&amp;nbsp;How can a strong foreign policy protect an Indian citizen's privacy when it is stored or sent abroad?&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;&amp;nbsp;&lt;img class="image-left" src="../it-act/gagan.jpg/image_preview" alt="Gagan Sethi" /&gt;Privacy as a Cultural Construct&lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;Gagan Sethi from the Centre for Social Justice, Ahmedabad shared his opinion on privacy. Important points from his presentation include:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;Privacy is a cultural construct that changes with context, perspective, and time.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;When considering a privacy policy it is important to create a policy that does not strictly define what privacy is and what it is not, but instead create a policy that defines and promotes a common respect for human dignity.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;Questions to Consider&lt;/h3&gt;
&lt;ul&gt;&lt;li&gt;&amp;nbsp; If a privacy policy is developed to promote a common respect for human dignity – will it be effective?&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;Can you develop a policy that has a loose definition and mandate, but has strong legal teeth?&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;h2&gt;Session III of the Conference focused on Minority Identities and Privacy, Prisoner Rights, and Cyber Security.&lt;/h2&gt;
&lt;h3&gt;Privacy and Minority Identities&lt;img class="image-right" src="../it-act/copy_of_bobby.jpg/image_preview" alt="Bobby Kuhnu " /&gt;&lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Bobby Kuhnu&lt;/strong&gt;, a lawyer and activist, presented in the third session on Privacy, Minority Identities, and Security. &amp;nbsp;In his talk Mr. Kuhnu through the use of three examples examined the ideological underpinnings of the discourse on privacy and its bearings on socially marginalized identities in the context of the Indian State and the constitutional right to privacy. Important points from his presentation include:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;In India, names can be sensitive and personal information like one’s religion, family, caste, and background can all be known through a&amp;nbsp; name.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;Because of the sensitivity of a person’s name, many people do not feel safe or comfortable in their own identity.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;Reservation lists and public postings of information, can and have been used to discriminate and violate another’s privacy.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;Questions to Consider&lt;/h3&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;Should a privacy legislation requirement throughout&amp;nbsp; institutions and government bodies that names should not be publicly displayed to the point of identification?&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;What is the most effective way of legally protecting an individual from discrimination based on their name?&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;Perspectives of Privacy&amp;nbsp; &lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;&lt;img class="image-left" src="../it-act/interns.jpg/image_preview" alt="Interns " /&gt;In the last portion of the day, Yash Sampat and Aditya Yagnik spoke on the origins of privacy and privacy in the cyber world. Vimmi Surti spoke on prisoner's rights and privacy and Ramswaroop Chaudhary presented on minority identities in South Asia and privacy. Important points from their presentation include:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;&amp;nbsp;Internet has led to an increase in privacy violations.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;The result of privacy infringements is often the deprivation of individuals from safe access to services availed to them.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;When looking at privacy as the protection of human dignity, prisoner’s rights are violated through overcrowding in prisons, poor health, and poor sanitation.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;Questions to Consider&lt;/h3&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;&amp;nbsp;Are there legal mechanisms that can be put in place to ensure the least amount of deprivation to services when an individual’s privacy is invaded?&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;&amp;nbsp;To what extent should prisoners be availed the right to privacy?&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;h2&gt;The concluding session was a time for discussion and&amp;nbsp; opinion sharing&lt;img class="image-right" src="../it-act/kananandjudge.jpg/image_preview" alt="Kanan and the Judge " /&gt;&lt;/h2&gt;
&lt;p&gt;From the closing session, and the above sessions many themes and questions pertaining to privacy came out that will need to be addressed when considering the way forward &amp;nbsp;for a privacy legislation including:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Regulation of ubiquitous surveillance in the name of national security&lt;/li&gt;&lt;li&gt;Regulation over public display of names and personal information&lt;/li&gt;&lt;li&gt;The need to distinguish between identity and identifier. &lt;/li&gt;&lt;li&gt;The need to protect an individual's identity while regulating the production and use of identifiers.&lt;/li&gt;&lt;li&gt;Privacy rights and prisoners: what does the right to privacy mean to a prisoner, i.e., clean facilities and health care. &lt;/li&gt;&lt;li&gt;Can the right to privacy be a platform for individuals to claim sanitary/safe working and living conditions. &lt;/li&gt;&lt;li&gt;Recognize the changing nature of&amp;nbsp; privacy rights in a technological society.&lt;/li&gt;&lt;li&gt;Privacy implications of biometric usage.&lt;/li&gt;&lt;li&gt;Creation of a definition of when privacy rights will supersede identification needs.&lt;/li&gt;&lt;li&gt;How can government institutions, like the tax department, incorporate and protect the right to privacy with the collection of large amounts of data for more efficient services. &lt;/li&gt;&lt;li&gt;Privacy and the family&lt;/li&gt;&lt;/ul&gt;
&lt;strong&gt;
&lt;div&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;/strong&gt;
&lt;div class="pullquote"&gt;&lt;strong&gt;
Download the report and agenda&amp;nbsp;&lt;a href="http://editors.cis-india.org/internet-governance/blog/privacy-conference-ahmedabad.pdf" class="internal-link" title="Privacy Conference in Ahmedabad PDF"&gt;here&lt;/a&gt;&amp;nbsp;[pdf - 452kb]&lt;/strong&gt;&lt;/div&gt;
&lt;p class="callout"&gt;&lt;strong&gt;Also see Matthew's &lt;a href="http://editors.cis-india.org/internet-governance/blog/privacy-ahmedabad-conference-presentation.pptx" class="internal-link" title="Privacy Conference in Ahmedabad Powerpoint Presentation"&gt;presentation&lt;/a&gt;&amp;nbsp;[powerpoint file 116kb]&lt;/strong&gt;&lt;/p&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/privacy/privacy-matters-report-from-ahmedabad'&gt;http://editors.cis-india.org/internet-governance/blog/privacy/privacy-matters-report-from-ahmedabad&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2011-04-04T04:45:49Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/police-agency-targetted">
    <title>'Pakistan' hackers target India's top police agency</title>
    <link>http://editors.cis-india.org/news/police-agency-targetted</link>
    <description>
        &lt;b&gt;Cyber-attackers who identified themselves as the "Pakistan Cyber Army" have hacked the website of India's top police agency, officials said on Saturday. The website of the Central Bureau of Investigation (CBI) was hacked by programmers who left a message saying that the attack was in revenge for similar Indian assaults on Pakistani sites, Press Trust of India said. The hackers signed their message on the Indian police website: "Long Live Pakistan."&lt;/b&gt;
        
&lt;p&gt;CBI authorities said they were working to restore the site, which offered information to the public.&lt;/p&gt;
&lt;p&gt;The spokeswoman said she could not comment on Indian media reports that more than 200 other Indian sites had also been attacked by Pakistani hackers.&lt;/p&gt;
&lt;p&gt;"We came to know the CBI site had been compromised Friday night," the spokeswoman told AFP, asking not to be named. "It will take us a couple of days to restore the site."&lt;/p&gt;
&lt;p&gt;She said she could not immediately say who was responsible for the attack.&lt;/p&gt;
&lt;p&gt;The CBI has "registered a case" and is investigating the attack, she said.&lt;/p&gt;
&lt;p&gt;The message posted on the CBI site said the attack was "in response to the Pakistani websites hacked by 'Indian Cyber Army'," the Press Trust of India (PTI) reported.&lt;/p&gt;
&lt;p&gt;"Hacked hahaa funny," the message said. "Let us see what you investigating agency so called CBI can do" (sic).&lt;/p&gt;
&lt;p&gt;Hackers had also infiltrated the server of the National Informatics Centre (NIC), which maintains most of the government's websites, PTI reported.&lt;/p&gt;
&lt;p&gt;In August, a group also calling itself the "Pakistan Cyber Army" hacked into the website of independent Indian MP Vijay Mallya, a flamboyant liquor baron, who is also head of Kingfisher Airlines.&lt;/p&gt;
&lt;p&gt;The group claims to have hacked a number of Indian websites in recent years, including India's state-run Oil and Natural Gas Corporation, in retaliation for Indian hackers accessing Pakistan sites.&lt;/p&gt;
&lt;p&gt;Indian IT specialists have long lamented what they say is a lack of awareness about Internet security across the country, including in the corridors of power.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Sunil Abraham, executive director of the Bangalore-based Centre for Internet and Society, said it would have been easy for attackers to get into the CBI public site as it was "not a particularly sensitive" one.&lt;/p&gt;
&lt;p&gt;The Indian government "has a very low level of cyber awareness and cyber security. We don't take cyber security as seriously as the rest of the world," he said.&lt;/p&gt;
&lt;p&gt;He added that the government needed to "make at least 10 times the current level of investment to get their standards to match the rest of the world."&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;According to the Indian Computer Emergency Response Team, a government agency that tracks IT security issues, more than 3,600 Indian websites were hacked in the first six months of this year.&lt;/p&gt;
&lt;p&gt;Read the original news &lt;a class="external-link" href="http://www.google.com/hostednews/afp/article/ALeqM5jFVJWh2e2-i7-ll6pAuGUOsETcbQ?docId=CNG.eb6f793d7e091dc5315bb6b6cbcea713.551"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/police-agency-targetted'&gt;http://editors.cis-india.org/news/police-agency-targetted&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-02T01:26:57Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/cio-july-1-2015-irctc-aadhaar-play-can-violate-sc-order-and-derail-national-security">
    <title>'IRCTC’s Aadhaar play can violate SC order and derail National Security'</title>
    <link>http://editors.cis-india.org/internet-governance/news/cio-july-1-2015-irctc-aadhaar-play-can-violate-sc-order-and-derail-national-security</link>
    <description>
        &lt;b&gt;Your online railway bookings are going to become a wee bit more difficult if they aren’t already so. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog entry by Shubhra Rishi was &lt;a class="external-link" href="http://www.cio.in/feature/%27irctc%E2%80%99s-aadhaar-play-can-violate-sc-order-and-derail-national-security%27"&gt;published by CIO.IN&lt;/a&gt; on July 1, 2015. Sunil Abraham gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;That is, if the IRCTC makes Aadhaar card compulsory during the registration process for e-ticketing. The move, according to a recent announcement by IRCTC, will ensure that users registering on the IRCTC website are properly identified of their identity and address through the Aadhaar card number verification.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So in case, you already have an Aadhaar card, then you need not worry. For those who don't have it yet or are reluctant to apply for it, are in for a tough time.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to Sandip Dutta, public relations officer at IRCTC, the plan, although still in the &lt;a href="http://aadhaarcarduid.org/railway-reservation-planning-to-be-done-using-aadhaar/"&gt;preliminary state&lt;/a&gt;, is to make Aadhaar compulsory which will prevent touts from further exploiting the e-ticketing platform.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;IRCTC which already has around three crore registered users, adds 15,000 new registrations every day. Just to give you the scale of an IRCTC website, a 15-minute &lt;a href="http://www.cio.in/feature/how-irctc%E2%80%99s-new-servers-make-bookings-and-enquiries-easier"&gt;tatkal window has about 1,000,000 people&lt;/a&gt; trying to log on to the IRCTC website. This means a new user won't be able to book a railway ticket on the IRCTC site until he owns an Aadhaar card.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Also Read: &lt;a href="http://www.cio.in/article/indian-cisos-don-t-trust-uid-their-data"&gt;Indian CISO don’t trust UID with their data&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"This is a complete overkill and will only result in harassment of an ordinary citizen," says Sunil Abraham, executive director at &lt;a href="http://cis-india.org/"&gt;The Centre for Internet &amp;amp; Society&lt;/a&gt;. "Aadhaar, he says, should be used to prevent politicians and bureaucrats from engaging in big-ticket fraud or whole-sale corruption. It should be used to make the state more accountable to citizens and not the other way around. It is unfortunate that techno-utopians are using biometric technology to fight retail corruption or small-ticket fraud.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If IRCTC makes Aadhaar mandatory for user registrations, they will be in direct violation of the Supreme Court's &lt;a href="http://www.dnaindia.com/india/report-supreme-court-turns-down-centres-plea-to-modify-interim-order-on-aadhar-cards-they-are-not-compulsory-1900570"&gt;interim order of September 23, 2013&lt;/a&gt; where it has ordered that no person should suffer for not getting the Aadhaar card in spite of the authority making it mandatory, since government says it is voluntary.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On &lt;a href="http://indiatoday.intoday.in/education/story/supreme-court-nulls-the-mandatory-status-of-aadhaar-card-scheme-in-india/1/424229.html"&gt;March 24, 2014 again, the Supreme Court reiterated its earlier order of 2013&lt;/a&gt; and directed all government authorities and departments to modify their forms/circulars, etc., so as to not compulsorily require an Aadhaar number. In the same order the Supreme Court also restrained the UIDAI from transferring any biometric data to any agency without the consent of the person in writing as an interim measure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to cyber law expert and Supreme Court Lawyer, Pavan Duggal, till the time Aadhaar has been brought to a legislative sanctity, no government agency must make it compulsory and if they do so, they will be in gross violation of the order and will be held for contempt of court. "&lt;a href="http://pib.nic.in/newsite/erelease.aspx?relid=100438"&gt;The National Identification Authority of India Bill&lt;/a&gt; that intends to give statutory backing to UIDAI (introduced in Rajya Sabha in 2010) is yet to be passed by the Parliament. Aadhaar is also non-compliant with the Information Technology Act 2000," says Duggal. Aadhaar, he says, is the unwanted child that hasn't proven legitimacy yet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The illegitimacy, which continues to prevail due to several anomalies in the UIDAI’s Aadhaar allotment process. In March this year, about &lt;a href="http://www.hindustantimes.com/newdelhi/aadhaar-registrations-in-delhi-outstrip-population/article1-1328023.aspx"&gt;20 million people enrolled in Delhi for an Aadhaar identification numbe&lt;/a&gt;r, according to Census. However, the UIDAI generated about 17.7 million unique numbers in Delhi, about a million more than the city population.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In another incident, Aadhaar numbers were assigned to adult residents in 13 of the country's 36 states, and union territories surpassed their respective population as per 2011 census figures. However, the UIDAI blames that ‘gaps’ in census evaluation may have resulted in inaccuracy of the population data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There have also been bizarre instances in the past &lt;a href="http://timesofindia.indiatimes.com/india/Dogs-trees-and-chairs-have-Aadhaar-cards/articleshow/20359001.cms"&gt;where some Aadhaar cards displayed pictures of an empty chair&lt;/a&gt;, a tree, and a dog instead of the actual applicant.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So how does it aid unscrupulous elements in misusing the flaws of the Aadhaar card system?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To start with, Aadhaar captures biometrics of a user, which is neither permanent nor immovable, says Dr. Anupam Saraph, innovator, professor and an advisor in governance, informatics and strategic planning.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"&lt;a href="https://en.wikipedia.org/wiki/Biometrics"&gt;Biometrics&lt;/a&gt; change during the life of a person, sometimes even within a year, or without warning. Biometrics can be easily stolen, replicated or misused as has been demonstrated by instances of fingerprints and iris scans of high profile targets being hacked. The enrollment agencies that have captured the biometric have the entire demographic and biometric database in their possession and as such it can be misused or stolen. Once the biometric fails or is stolen, all the functions that have crept to link access to the biometric are denied with little or no recourse to the victim," says Saraph.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Another benign scenario may be large scale fake bookings to make tickets pricier, the malignant scenario will be entire trains used to transfer armies of anti-nationals and terrorists. Therefore, the Railway Minister must rise to cancel any such plans," says Saraph, and the Home Minister and Defence Minister must immediately scrap the linkage of Aadhaar to any database, require that the entire UID is destroyed as was done in the UK. “This kind of compromise requires the initiation of a time-bound judicial probe by a retired CAG and Supreme Court Judge supported by the CBI to investigate the exposure of the country to serious threats to national security due to UID,” he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And therefore, the bigger question isn't whether Aadhaar should be made compulsory or not, but whether it is a foolproof method to validate someone's identity. If it isn’t, then why is IRCTC playing the Aadhaar card?&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/cio-july-1-2015-irctc-aadhaar-play-can-violate-sc-order-and-derail-national-security'&gt;http://editors.cis-india.org/internet-governance/news/cio-july-1-2015-irctc-aadhaar-play-can-violate-sc-order-and-derail-national-security&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-07-07T15:10:08Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/the-times-of-india-april-24-2014-india-wants-core-internet-infrastructure">
    <title>'India wants core internet infrastructure'</title>
    <link>http://editors.cis-india.org/news/the-times-of-india-april-24-2014-india-wants-core-internet-infrastructure</link>
    <description>
        &lt;b&gt;India wants "core internet infrastructure" to be part of an international legal system that would accommodate governments, civil society and other stakeholders. In typical Indian diplomatic style, its position can be interpreted to mean everything and nothing. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;The article by Indrani Bagchi was &lt;a class="external-link" href="http://timesofindia.indiatimes.com/tech/tech-news/India-wants-core-internet-infrastructure/articleshow/34165412.cms"&gt;published in the Times of India&lt;/a&gt; on April 24, 2014. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;An MEA team led by Vinay Kwatra, joint secretary told the Net Mundial in Brazil on Thursday, "The elements of India's approach on internet governance respond to its growing complexity and rests in supporting the dynamism, security and openness of a single and un-fragmented cyberspace. We also support innovation, and robust private sector investments to augment internet's continuing growth and evolution."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Indian position is essentially an MEA position, because there has been little prior inter-agency consultation certainly in the government. In fact, while the MEA had decided upon its team almost a month ago, the Department of Information Technology only woke up last week.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was only on Friday that the nodal ministry for IT-related issues even agreed to send a team to Brazil on Monday — the same team that the MEA was sending. If nothing else, sources said, this only highlighted the lack of seriousness within the Indian system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In Brazil, Kwatra said internet should have a democratic governing system, involving everyone, which would essentially mean creating a parallel international system. The internet is essentially owned and led by the US, controlled by the fact that the overwhelming number of root servers are situated in that country. But after the Edward Snowden leaks on&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;NSA surveillance, the US' intentions and practices have come under a cloud.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While India does not want the status quo to continue, there is no clarity whether India favours a multilateral or a multi-stakeholder system. India, like China, wants a strong state presence in the decision making process of internet governance, because "it is used for transactions of core economic, civil and defence assets at national level and in the process, countries are placing their core national security interests in this medium." On the other hand, it wants unfettered access to knowledge and technology as a nation-building and governance tool.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Additionally, India wants non-governmental stakeholders to be properly audited "there should also be a clear delineation of principles governing their participation - including their accountability, representativeness, transparency, and inclusiveness. Clearly, it makes it even more important that we define the multistakeholderism."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is a crying need for India to clearly define the future it expects to thrive in.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abhraham of the Centre for Internet and Society in Bangalore says India should take the lead in defining new internet rules, keeping its future in mind. "We could use patent pools and compulsory licensing to provide affordable and innovative digital hardware to the developing world. This would ensure that rights-holders, innovators, manufactures, consumers and government would all benefit ... We could explore flat-fee licensing models like a broadband copyright cess or levy to ensure that users get content at affordable rates and rights-holders get some royalty from all internet users in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This will go a long way in undermining the copyright enforcement based censorship regime that has been established by the US. When it comes to privacy - we could enact a world-class privacy law and establish an independent, autonomous and proactive privacy commissioner who will keep both private and state actors on a short lease. Then we need a scientific, targeted surveillance regime that is in compliance with human rights principles. This will make India simultaneously an IP and privacy haven and thereby attract huge investment from the private sector, and also earn the goodwill of global civil society and independent media." This is more than the Indian government has thought of.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While no binding decisions are expected from Brazil this week, the high profile event is expected to trigger a high level debate on possible reforms. India, say officials, need to hone its position to come up with concrete proposals. This is imperative, after the US made two crucial decisions on internet governance this year.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In March the US announced by September 2015 it would give up oversight of the Internet Corporation for Assigned of Names and Numbers (ICANN), a non-profit group based in California that assigns domain names. But the US is clear it will not hand over control to any organization that can be controlled by any other country. This week, the US' FCC has dealt a body blow to the concept of "net neutrality" (which essentially functions on the premise that access to the internet is the same for everyone) by allowing companies like Disney and Google to pay for premium internet speeds. Countries like China, Russia, Saudi Arabia (maybe even Iran) seek to control net access for their citizens as a measure of political control. Second, cyber offensives by countries who are ramping up capacity in these fields could take over internet governance structures if they are not crafted carefully enough. On the flip side, as Sunil Abraham of the Centre for Internet and Society puts it, "The US censorship regime is really no better than China's. China censors political speech - US censors access to knowledge thanks to the intellectual property (IP) rightsholder lobby.."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If the US is relinquishing control over ICANN, the next global battle is likely to be over who takes over that mantle. Which, in turn, makes it important to get net governance right. At least China has a plan — it wants the UN to take control. India wants a bit of this and a bit of that, without actually giving it a shape, which makes it impossible for India to shape the future of the debate.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/the-times-of-india-april-24-2014-india-wants-core-internet-infrastructure'&gt;http://editors.cis-india.org/news/the-times-of-india-april-24-2014-india-wants-core-internet-infrastructure&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>NETmundial</dc:subject>
    

   <dc:date>2014-05-05T10:29:30Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/the-telegraph-august-3-2014-i-am-going-to-ruin-you-dear">
    <title>'I'm going to ruin you, dear'</title>
    <link>http://editors.cis-india.org/internet-governance/news/the-telegraph-august-3-2014-i-am-going-to-ruin-you-dear</link>
    <description>
        &lt;b&gt;Revenge porn is sweeping across the developed world. And now it's being seen in India. The culprit, says Prasun Chaudhuri, is often a former friend, partner, relative or colleague.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This article by Prasun Chaudhuri with additional reporting by Varuna Verma in Bangalore was &lt;a class="external-link" href="http://www.telegraphindia.com/1140803/jsp/7days/18682133.jsp"&gt;published in the Telegraph&lt;/a&gt; on August 3, 2014. Rohini Lakshane gave her inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;How would you feel if you casually opened a mail and found the link to a  pornographic site — and it turned out to contain pictures of yourself  naked? That's what Kalpana did. She clicked on a link sent to her and,  to her horror, found that the face of the girl who "was available for  sex" was hers. Her stomach lurched when she saw that the pictures showed  her own bedroom. The site also contained her personal and contact  details.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Kalpana was shattered. The subject line of the mail had said "I'm going  to ruin you, dear". It had seemed like a prank. Only, it wasn't. It was a  very real and malevolent attempt to destroy her reputation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The 24-year-old Mumbai-based bank executive had become a victim of revenge porn — a new form of cybercrime in which ex-lovers or boyfriends upload intimate photos and videos of their former partners for the world to see. Mostly, the sexually explicit pictures are of women posted by jilted or spurned men.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Kalpana's photos, it was later found, were posted by her recently divorced husband, Pranay. They were taken when the two lived together.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Revenge porn is a trend sweeping across the developed world — from the US and Japan to countries in Europe. And now it's being seen in India, fuelled by the growing access to the Internet and camera-wielding mobile phones — all that is needed for taking and posting offensive pictures.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Now that you have gadgets you tend to capture every moment of your life in pictures or videos," Calcutta-based psychiatrist J.R. Ram points out. "Not only that, you want to share these images through networking apps in your mobile phone or the Internet — without ever thinking of the consequences."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;National Crimes Record Bureau (NCRB) figures — released on July 1, 2014 — show a 63.7 per cent rise in cyber offences from 2012 to 2013. During this period, the category "transmission of obscene content in electronic form" reflects a quantum jump —104.2 per cent — with 1,203 cases registered and 737 people arrested. "The data show cyber offences against women have increased sharply," NCRB director-general R.R. Verma says. "But we do not have any specific data on revenge crimes."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;More and more such cases, however, are now coming to light. Kalpana lodged a complaint with the Navgarh police station in Mumbai. Ashish was arrested under a number of sections of the Indian Penal Code and the Information Technology Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sneha, a 22-year-old college student from Udupi in Karnataka, also went to the police with the complaint that her ex-boyfriend had put up her photographs and videos on the Internet. M.B. Boralingaiah, superintendent of police, Manipal district, says the boy was arrested and sent to judicial custody.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"There has been an exponential rise in the number of cases of cyber revenge being reported to the police," Boralingaiah says. "This could also be because of increasing awareness of cyber laws, which prompts more people to approach the police." The Karnataka police are now setting up cyber crime police stations at regional levels across the state. Currently, only one police station, in Bangalore, deals with such crimes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The profile of the criminal in revenge porn, Boralingaiah adds, is different from that of the average criminal plotting a scam using the Internet. In all the cases that have been reported, the accused is a former friend, partner, relative or colleague with no criminal history. They are also educated, intelligent and technologically savvy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And that is why, despite suspicions, it is not always easy to catch the offender. The police say they have to first track down the origin of the pornographic site where the pictures are posted. "When we receive a complaint we try to locate the IP address (the unique identifier for the computer)," says Siddhartha Chakraborty, in charge of Cyber Police Station, Lalbazar, Calcutta. "But these crooks are clever enough to use some fake IP address of a distant country."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Once the police zero in on the IP address, it asks the web hosts to remove the offensive images, which they normally do. "But the procedure can take weeks or even months," Chakraborty adds.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Debarati Halder, a lawyer and cyber victim counsellor based at Tirunelvelli, Tamil Nadu, says she comes across 10-15 cases of revenge porn every month across the country, mostly involving college students. Often, the victims themselves take pictures while taking a shower or in their inner wear and share them with their boyfriends.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Many young women, Halder says, see such acts as symbols of independence or defiance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Taking 'sexy' images of themselves offers them a false sense of liberty, bypassing the repression imposed upon them in the real world," she says. "They feel relatively uninhibited in cyberspace and tend to experiment with their looks and sexuality, but are unable to determine where to draw the line."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The young are not greatly concerned with privacy and security on the Internet, Canada-based Internet safety expert &lt;a href="http://www.terrycutler.com" target="_blank"&gt;Terry Cutler&lt;/a&gt; stresses. "They don't understand that once you send out an inappropriate photo or video, you no longer control it."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are, according to some estimates, at least 3,000 voyeuristic websites where such pictures can be posted. The visuals are often copied and replicated across multiple porn sites, making it virtually impossible for the authorities to wipe off the digital prints. "Often these clips are available on mirror sites, web archives and caches. Video footage can also go viral on social networks and porn buffs even share these images offline," Chakraborty warns.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But people seldom think that the intimate pictures that they shoot with their lovers may one day become public. "When you're in love you trust your partner. You don't expect him to use these pictures to humiliate you when things fall apart," says Antara, a 32-year-old IT analyst in a government agency who has been a victim of revenge porn. She says that her husband, to seek a quick divorce, uploaded intimate pictures on porn sites to show that she was a woman of "bad character".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Also worrying is that a large number of women are victims of non-consensual and amateur pornography. Abir Atarthy, a Calcutta-based cyber-security expert, recently solved a case in which a college student found her pictures, shot in her bedroom, circulating on a social networking site.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"She was shocked because she not taken those pictures, nor had anybody else," Atarthy says. A thorough check revealed that a boy whose advances she had spurned had installed a hidden spy program in her laptop. "The program — capable of switching on the webcam even if the machine was offline — had been taking her snaps from her private life and sending the visuals to the youth whenever she connected to the Internet," he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rohini Lakshané, a researcher at the Bangalore-based Centre for Internet and Society, describes such non-consensual acts as sexually violent crimes. "I don't like to use the term 'revenge porn', for it's an act of violence against women," she says. "Sometimes women are even raped and coerced into sex, filmed, threatened and blackmailed over the release of the footage online," Lakshané says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The intention is to humiliate the woman and make her life miserable is the equivalent of throwing acid on her face, holds Dr Subhrangshu Aditya, a student counsellor at Jadavpur University, Calcutta. "These men can't accept rejection and it's their way to settle scores."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The victim, the experts say, doesn't just feel betrayed but often falls into depression — not just because of the ex-partner's action but because she sees herself as a partner in the crime, for the pictures uploaded may have been shot with her consent. "Their guardians also blame her for this and avoid reporting the matter to the police apprehending a bigger scandal," Halder adds.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The lawyer urges victims of such crimes to always approach the police. "Indian women have a strong legal recourse against perpetrators of revenge porn," she says. The amended 354 [C] of the Criminal Law (Amended) Act 2013, also known as the "voyeurism section", criminalises capturing and sharing images of a woman in private space. Section 66(E) of the IT Act criminalises the publication and transmission of images of an individual's private parts without his or her consent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"These are watertight laws, strong enough to book an offender," she says, adding that the law also protects a victim's identity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Across the world, laws are now being framed to punish cyber porn offenders. In January, Israel voted to define posting of images without consent as sexual harassment, punishable by up to five years in jail. Many states in the US already have laws against revenge porn and Britain may bring in one soon.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But perhaps the best way to prevent such crimes is by safeguarding privacy — at home and in the virtual world (see box). Cyber security expert Cutler sums it up aptly: "Just think this before you click the send button: If I were to post the visual on the Internet, would I care if it landed on the front page of a newspaper or the 8pm news?"&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Some names have been changed to protect identities&lt;/i&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;How to Safeguard Your Privacy?&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Get acquainted with the privacy settings of the social networks, dating and matrimonial websites you use&lt;/li&gt;
&lt;li&gt;Do not upload any single close-shot picture on the Internet; this can be morphed and misused&lt;/li&gt;
&lt;li&gt;Never film yourself during sexually intimate acts; even if you delete the pictures and videos these can be recovered from your device&lt;/li&gt;
&lt;li&gt;Watch out for weird webcam activity; malicious software can easily infect your computer or phone and control the webcam&lt;/li&gt;
&lt;li&gt;Remove your memory card from your mobile or format the hard disc of your computer before giving the device to service centres&lt;/li&gt;
&lt;li&gt;Don't give your device to others and always lock your applications (especially picture galleries) in your mobile&lt;/li&gt;
&lt;li&gt;Install and update antivirus and antimalware in your device&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/the-telegraph-august-3-2014-i-am-going-to-ruin-you-dear'&gt;http://editors.cis-india.org/internet-governance/news/the-telegraph-august-3-2014-i-am-going-to-ruin-you-dear&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-09-09T09:55:47Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/deccan-herald-september-13-2013-help-konkani-wikipedia-come-out-of-incubation">
    <title>'Help Konkani Wikipedia come out of incubation'</title>
    <link>http://editors.cis-india.org/news/deccan-herald-september-13-2013-help-konkani-wikipedia-come-out-of-incubation</link>
    <description>
        &lt;b&gt;The functioning of the free online encyclopedia, ‘Wikipedia,’ is like a true democracy. It is for the people and by the people, said The Centre for Internet and Society Programme Officer (Indian Languages) Pavanaja U B.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://www.deccanherald.com/content/356925/039help-konkani-wikipedia-come-incubation039.html"&gt;published in the Deccan Herald on September 13, 2013&lt;/a&gt;. Dr. U.B.Pavanaja was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;He was speaking after inaugurating, "Wikipedia Editing Workshop," organised by Aloysius Institute of Management and Information Technology (AIMIT) in association with The Centre for Internet and Society in Mangalore on Friday.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Stressing on the need for more Wikipedia contributors and editors from India, he explained to students the simplicity of creating a account in Wikipedia and editing articles.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Wikipedia has 50 crore unique visitors and three crore are from India. There are 6,000 editors registered from India, of which, around 2000 people edit in Indian vernacular languages, and only 450 are very active, he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are around 98,000 odd articles in Hindi, 14,600 odd articles in Kannada. However, Konkani Wikipedia is in incubation for the last seven years, as there are only 133 articles and very few registered editors. “To get it out of incubation, many should write Konkani articles for Wikipedia,” he said and added that out of 133 Konkani articles in Wikipedia, over 100 are in Devnagari script, 31 in Roman and just two in Kannada script and none in Malayalam.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pavanaja added that being a contributor and editor of Wikipedia, will be a positive add on to ones resume. "Today's IT companies need logical thinkers and problem solvers. Writing for Wikipedia, enables one to think and research, hence benefiting one’s personally," he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He also regretted that some people try to vandalise Wikipedia, with disruptive editing and deleting articles. Though, this will be corrected by other Wikipedia users instantly, it wastes precious time. Everyone benefits from Wikipedia, hence the contributor should have a positive outlook with regard to helping people and sharing knowledge, he said&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He further added, that maintaining a neutral point of view, giving significant coverage and writing on notable topics is important. One should give opposing views and no personal views should be reflected, he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;St Aloysius College Rector Fr Denzil Lobo said that the present generation is lucky to have knowledge at their finger tips, and they should make the best use of it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;AIMIT Director Rev Fr Pradeep Sequeira, Wikpedia Volunteer Harriet Vidhyasagar among others were present.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/deccan-herald-september-13-2013-help-konkani-wikipedia-come-out-of-incubation'&gt;http://editors.cis-india.org/news/deccan-herald-september-13-2013-help-konkani-wikipedia-come-out-of-incubation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Wikimedia</dc:subject>
    

   <dc:date>2013-09-17T10:10:38Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/university-of-oxford-october-25-2013-free-speech-and-media-in-south-asia">
    <title>'Free Speech and Media in South Asia: Human Rights Concerns in a Globalizing World'</title>
    <link>http://editors.cis-india.org/news/university-of-oxford-october-25-2013-free-speech-and-media-in-south-asia</link>
    <description>
        &lt;b&gt;A seminar organized by the Programme in Comparative Media Law and Policy, Centre for Socio-Legal Studies, University of Oxford, in collaboration with the Centre for Media and Governance, National Law University, Delhi. Chinmayi Arun is one of the speakers.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p class="bodya" style="text-align: justify; "&gt;Click to read the original &lt;a class="external-link" href="http://www.politics.ox.ac.uk/index.php/details/3543-free-speech-and-media-in-south-asia-human-rights-concerns-in-a-globalizing-world.html"&gt;published by Oxford University Press here&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="bodya" style="text-align: justify; "&gt;&lt;b&gt;Speakers:&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Salil Tripathi, English PEN&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Defending Freedom of Expression in India&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Emrys Shoemaker, London School of Economics&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Mobile Communication and Internet Regulation in Pakistan: Mapping Social Implications&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Chinmayi Arun, National Law University, Delhi&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Privacy and Surveillance&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Kumaravadivel Guruparan, University College London&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Digital Media as Part of the Sri Lankan State's 'Counter-insurgency' Programme&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Chair: Nicole Stremlau, PCMLP&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This panel discussion will explore contemporary issues that envelop  both the digital and the traditional media in South Asia. It will look  at the effects of surveillance, prior restraints on speech,  intermediaries and other key factors on the public sphere. It will also  consider, in this context, the relationship of the traditional media  with the Internet. This discussion will take place in the backdrop of  evolving democratic engagement in India, and the constitutional  jurisprudence that attempts to keep pace with it and with developments  in communication technology. It will offer comparative perspectives from  other countries grappling with similar concerns.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/university-of-oxford-october-25-2013-free-speech-and-media-in-south-asia'&gt;http://editors.cis-india.org/news/university-of-oxford-october-25-2013-free-speech-and-media-in-south-asia&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-11-08T05:33:22Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
