<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="http://editors.cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>http://editors.cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 91 to 105.
        
  </description>
  
  
  
  
  <image rdf:resource="http://editors.cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="http://editors.cis-india.org/a2k/copyright-amendment"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/the-week-november-1-2015-sunil-abraham-connected-trouble"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/cis-position-on-net-neutrality"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/a2k/blogs/cis-a2k-work-plan-july-2016-june-2017"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/www-tehelka-com-sunil-abraham-august-23-2012-censoring-the-internet"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/business-standard-march-28-2018-sunil-abraham-cambridge-analytica-scandal-how-india-can-save-democracy-from-facebook"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/a2k/digital-restrictions-management"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/bangalore-mirror-march-29-2015-sunil-abraham-big-win-for-freedom-of-speech-really"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/big-brother-watching-you"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/events/bangalore-chapter-meet-of-dsci-september-26-2015"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/accessibility/blog/availability-and-accessibility-of-government-information-in-public-domain"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/artificial-intelligence-a-full-spectrum-regulatory-challenge-working-draft"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/about/newsletters/april-2016-newsletter"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/anonymity-in-cyberspace"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/about/substantive-areas/new-pedagogies/anonymity-and-privacy"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="http://editors.cis-india.org/a2k/copyright-amendment">
    <title>Copyright Amendment: Bad, but Could Have Been Much Worse</title>
    <link>http://editors.cis-india.org/a2k/copyright-amendment</link>
    <description>
        &lt;b&gt;The changes to the Copyright Act protect the disabled - but are restrictive about cover versions and web freedom, writes Sunil Abraham in this article published in the Business Standard on June 10, 2012.&lt;/b&gt;
        
&lt;p&gt;When the Copyright (Amendment) Act, 2012, was passed unanimously by the Lok Sabha on May 22, it meant that there was little reason for celebration, some not-so-great news, and a lot of pretty bad news.&lt;/p&gt;
&lt;p&gt;The only real reason for unqualified celebration is the amendment’s introduction of a robust exception for the disabled. It is bleeding-edge policy formulation, as it is right up there alongside the Treaty for the Visually Impaired currently being negotiated at the World Intellectual Property Organisation (WIPO). The Indian exception is more robust: first, it is disability-neutral, unlike the treaty which only addresses the needs of the print-impaired; and second, it is works-neutral, unlike the treaty which only addresses books and printed works. In brief, given the very limited circulation of copyrighted works amongst the disabled, they now can convert inaccessible works to accessible formats and share them with each other on a non-profit basis. No royalty needs to be paid to the rights-holders for this conversion and the resultant access. Other reasons to celebrate include the newly introduced exception for non-commercial lending and the extension of fair dealing (or fair use) to all works.&lt;/p&gt;
&lt;p&gt;Now for some middling news. The Digital Rights Management provision makes it an offence punishable with a fine and a two-year jail term to circumvent “effective technological measures” (also called Technological Protection Measures) and remove “rights management information” (RMI). The provision protects public interest since it does not allow rights-holders to claim rights unavailable under copyright law, and does not prevent consumers and citizens from benefiting from the various fair dealing (or fair use) exceptions and limitations.&lt;br /&gt;&lt;br /&gt;Unfortunately, the provision mandates onerous record-keeping for those providing circumvention technologies, and also does not insist that the rights-holder provide the means for circumvent when the consumer or citizen legitimately needs to do so.&lt;br /&gt;&lt;br /&gt;The first piece of bad news is that an inadequate “safe harbour” provision has been introduced for Internet intermediaries. Like the Information Technology Act, the Copyright Act has also gotten the configuration of the intermediary liability regime wrong. This was the opportunity to finally protect common carriers, platforms for social media and commons-based peer-production (such as free software and open content). In short, search engines are finally legal in India, and so are ISPs, virtual private network providers and content delivery networks.&lt;br /&gt;&lt;br /&gt;But unfortunately, social media platforms such as Facebook and peer-production platforms like Wikipedia are not afforded sufficient immunity to thrive as real-time participatory platforms. The take-down procedure is designed to provide instant relief to rights-holders, as intermediaries are supposed to remove content immediately. They have the option of reinstating content if the take-down notice is not followed within three weeks by a court order. This mechanism will have a chilling effect on free speech — given that Indian internet service providers very obviously privilege the interests of intellectual property rights-holders over those of the ISPs’ customers — as most recently illustrated by their over-compliance with certain John Doe court orders emerging from the Madras High Court.&lt;/p&gt;
&lt;p&gt;The second piece of bad news is the extension of the term of protection for photographs. It has gone from being “sixty years after publication” to “sixty years after the death of the photographer”. Sixty years from publication was already in excess of the Agreement on Trade-Related aspects of Intellectual Property Rights (the TRIPS Agreement). Now we are in excess of WIPO Copyright Treaty requirements, even though India is not a signatory. The possibility of grandchildren earning royalties does not serve as an incentive for shutterbugs to take more photos or better photos. It is not even clear if one can monetise the average photo after the first decade. Therefore, the global public domain has been substantially impoverished, without any evidence that this will make the photographers reciprocally wealthier.&lt;br /&gt;&lt;br /&gt;It does not stop there. In the age of hip-hop, trance, jhankar beats and turntables, one would have hoped that our law-makers would at least get the provision for “cover versions” or “remixes” right. Cover versions in India are doubly useful both in terms of aesthetics and profits — and yet the relevant provision can only be described as mediaeval. Cover versions can be produced only after a gap of five years; they have to be restricted to the same medium as the original; payment from them must be made in advance for 5,000 copies (should all those who sang commercially viable cover violations of “Kolaveri Di” be considered lawbreakers?); and there are strict limits on what are acceptable alterations to the original. The “alterations” have to be “reasonable” and “technically necessary”. Today, affordable yet sophisticated multimedia technologies allow teenagers to build professional sound recording studios in their bedrooms — and our government is seeking to restrict them to boring word-for-word and note-for-note covers.&lt;br /&gt;&lt;br /&gt;And it gets worse. Bowing to pressure from foreign publishers’ associations, the government deleted the “parallel importation” provision at the last minute. The inclusion of this provision would have made it clear that works reproduced with the rights-holders’ permission in other countries could be imported into India. Foreign publishers and their lobbyists went all-out with a propaganda campaign predicting a dystopia filled with pirated books, surplus books dumped from overseas and starving, uncompensated authors. Had our government not caved, this clarification in law would have gone a long way in dismantling distribution monopolies and made the market much more competitive. The resultant increase in choice and reduction in cost would have benefited everyone. Human Resources Development Minister Sibal promised both Houses during the passage of the amendment that he would revisit this, and let’s hope he does so — especially for our libraries and our second-hand book stores, and for the students and disabled amongst us.&lt;/p&gt;
&lt;p&gt;The writer is at the Centre for Internet and Society, Bangalore. &lt;a class="external-link" href="mailto:sunil@cis-india.org"&gt;sunil@cis-india.org&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.business-standard.com/india/news/sunil-abraham-copyright-amendment-badcould-have-been-much-worse/476845/"&gt;Click&lt;/a&gt; to read the original published by Business Standard.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/a2k/copyright-amendment'&gt;http://editors.cis-india.org/a2k/copyright-amendment&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Copyright</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2012-06-15T12:29:39Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/the-week-november-1-2015-sunil-abraham-connected-trouble">
    <title>Connected Trouble </title>
    <link>http://editors.cis-india.org/internet-governance/blog/the-week-november-1-2015-sunil-abraham-connected-trouble</link>
    <description>
        &lt;b&gt;The internet of things phenomenon is based on a paradigm shift from thinking of the internet merely as a means to connect individuals, corporations and other institutions to an internet where all devices in (insulin pumps and pacemakers), on (wearable technology) and around (domestic appliances and vehicles) humans beings are connected.&lt;/b&gt;
        &lt;p&gt;The guest column was published in &lt;a class="external-link" href="http://www.theweek.in/columns/guest-columns/connected-trouble.html"&gt;the Week&lt;/a&gt;, issue dated November 1, 2015.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Proponents of IoT are clear that the network effects, efficiency gains, and scientific and technological progress unlocked would be unprecedented, much like the internet itself.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Privacy and security are two sides of the same coin―you cannot have one without the other. The age of IoT is going to be less secure thanks to big data. Globally accepted privacy principles articulated in privacy and data protection laws across the world are in conflict with the big data ideology. As a consequence, the age of internet of things is going to be less stable, secure and resilient. Three privacy principles are violated by most IoT products and services.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Data minimisation&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;According to this privacy principle, the less the personal information about the data subject that is collected and stored by the data controller, the more the data subject's right to privacy is protected. But, big data by definition requires more volume, more variety and more velocity and IoT products usually collect a lot of data, thereby multiplying risk.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Purpose limitation&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;This privacy principle is a consequence of the data minimisation principle. If only the bare minimum of personal information is collected, then it can only be put to a limited number of uses. But, going beyond that would harm the data subject. IoT innovators and entrepreneurs are trying to rapidly increase features, efficiency gains and convenience. Therefore, they don't know what future purposes their technology will be put to tomorrow and, again by definition, resist the principle of purpose limitation.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Privacy by design&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Data protection regulation required that products and services be secure and protect privacy by design and not as a superficial afterthought. IoT products are increasingly being built by startups that are disrupting markets and taking down large technology incumbents. The trouble, however, is that most of these startups do not have sufficient internal security expertise and in their tearing hurry to take products to the market, many IoT products may not be comprehensively tested or audited from a privacy perspective.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are other cyber security principles and internet design principles that are disregarded by the IoT phenomenon, further compromising security and privacy of users.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Centralisation&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Most of the network effects that IoT products contribute to require centralisation of data collected from users and their devices. For instance, if users of a wearable physical activity tracker would like to use gamification to keep each other motivated during exercise, the vendor of that device has to collect and store information about all its users. Since some users always wear them, they become highly granular stores of data that can also be used to inflict privacy harms.&lt;br /&gt;&lt;br /&gt;Decentralisation was a key design principle when the internet was first built. The argument was that you can never take down a decentralised network by bombing any of the nodes. Unfortunately, because of the rise of internet monopolies like Google, the age of cloud computing, and the success of social media giants, the internet is increasingly becoming centralised and, therefore, is much more fragile than it used be. IoT is going to make this worse.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Complexity&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The more complex a particular technology is, the more fragile and vulnerable it is. This is not necessarily true but is usually the case given that more complex technology needs more quality control, more testing and more fixes. IoT technology raises complexity exponentially because the devices that are being connected are complex themselves and were not originally engineered to be connected to the internet. The networks they constitute are nothing like the internet which till now consisted of clients, web servers, chat servers, file servers and database servers, usually quite removed from the physical world. Compromised IoT devices, on the other hand, could be used to inflict direct harm on life and property.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Death of the air gap&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The things that will be connected to the internet were previously separated from the internet through the means of an air gap. This kept them secure but also less useful and usable. In other words, the very act of connecting devices that were previously unconnected will expose them to a range of attacks. Security and privacy related laws, standards, audits and enforcement measures are the best way to address these potential pitfalls. Governments, privacy commissioners and data protections authorities across the world need to act so that the privacy of people and the security of our information society are protected.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/the-week-november-1-2015-sunil-abraham-connected-trouble'&gt;http://editors.cis-india.org/internet-governance/blog/the-week-november-1-2015-sunil-abraham-connected-trouble&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-10-28T16:47:58Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/cis-position-on-net-neutrality">
    <title>CIS's Position on Net Neutrality</title>
    <link>http://editors.cis-india.org/internet-governance/blog/cis-position-on-net-neutrality</link>
    <description>
        &lt;b&gt;As researchers committed to the principle of pluralism we rarely produce institutional positions. This is also because we tend to update our positions based on research outputs. But the lack of clarity around our position on network neutrality has led some stakeholders to believe that we are advocating for forbearance. Nothing can be farther from the truth. Please see below for the current articulation of our common institutional position.&lt;/b&gt;
        &lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ol style="text-align: justify;"&gt;
&lt;li&gt;Net Neutrality violations can potentially have multiple categories of harms —&lt;strong&gt; competition harms, free speech harms, privacy harms, innovation and ‘generativity’ harms, harms to consumer choice and user freedoms, and diversity harms&lt;/strong&gt; thanks to unjust discrimination and gatekeeping by Internet service providers.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Net Neutrality violations (including some those forms of zero-rating that violate net neutrality) can also have different kinds benefits — enabling the &lt;strong&gt;right to freedom of expression&lt;/strong&gt;, and the &lt;strong&gt;freedom of association&lt;/strong&gt;, especially when access to communication and publishing technologies is increased; &lt;strong&gt;increased competition&lt;/strong&gt; [by enabling product differentiation, can potentially allow small ISPs compete against market incumbents]; &lt;strong&gt;increased access&lt;/strong&gt; [usually to a subset of the Internet] by those without any access because they cannot afford it, increased access [usually to a subset of the Internet] by those who don't see any value in the Internet, &lt;strong&gt;reduced payments&lt;/strong&gt; by those who already have access to the Internet especially if their usage is dominated by certain services and destinations.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Given the magnitude and variety of potential harms, &lt;strong&gt;complete forbearance from all regulation is not an option&lt;/strong&gt; for regulators nor is self-regulation sufficient to address all the harms emerging from Net Neutrality violations, since incumbent telecom companies cannot be trusted to effectively self-regulate. Therefore, &lt;strong&gt;CIS calls for the immediate formulation of Net Neutrality regulation&lt;/strong&gt; by the telecom regulator [TRAI] and the notification thereof by the government [Department of Telecom of the Ministry of Information and Communication Technology]. CIS also calls for the eventual enactment of statutory law on Net Neutrality.&amp;nbsp; All such policy must be developed in a transparent fashion after proper consultation with all relevant stakeholders, and after giving citizens an opportunity to comment on draft regulations.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Even though some of these harms may be large, CIS believes that a government cannot apply the precautionary principle in the case of Net Neutrality violations. &lt;strong&gt;Banning technical innovations and business model innovations is not an appropriate policy option. &lt;/strong&gt;The regulation must toe a careful line &lt;strong&gt;to solve the optimization problem: &lt;/strong&gt;refraining from over-regulation of ISPs and harming innovation at the carrier level (and benefits of net neutrality violations mentioned above) while preventing ISPs from harming innovation and user choice.&amp;nbsp; ISPs must be regulated to limit harms from unjust discrimination towards consumers as well as to limit harms from unjust discrimination towards the services they carry on their networks.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Based on regulatory theory, we believe that a regulatory framework that is technologically neutral, that factors in differences in technological context, as well as market realities and existing regulation, and which is able to respond to new evidence is what is ideal.&lt;br /&gt;&lt;br /&gt;This means that we need a framework that has some bright-line rules based, but which allows for flexibility in determining the scope of exceptions and in the application of the rules.&amp;nbsp; Candidate principles to be embodied in the regulation include: &lt;strong&gt;transparency, non-exclusivity, limiting unjust discrimination&lt;/strong&gt;.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;The &lt;strong&gt;harms emerging from walled gardens can be mitigated in a number of ways&lt;/strong&gt;.&amp;nbsp; &lt;strong&gt;On zero-rating the form of regulation must depend on the specific model and the potential harms that result from that model. &lt;/strong&gt;Zero-rating can be: paid for by the end consumer or subsidized by ISPs or subsidized by content providers or subsidized by government or a combination of these; deal-based or criteria-based or government-imposed; ISP-imposed or offered by the ISP and chosen by consumers; Transparent and understood by consumers vs. non-transparent; based on content-type or agnostic to content-type; service-specific or service-class/protocol-specific or service-agnostic; available on one ISP or on all ISPs.&amp;nbsp; Zero-rating by a small ISP with 2% penetration will not have the same harms as zero-rating by the largest incumbent ISP.&amp;nbsp; For service-agnostic / content-type agnostic zero-rating, which Mozilla terms ‘&lt;strong&gt;equal rating&lt;/strong&gt;’, CIS advocates for&lt;strong&gt; no regulation.&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;CIS believes that &lt;strong&gt;Net Neutrality regulation for mobile and fixed-line access must be different&lt;/strong&gt; recognizing the fundamental differences in technologies.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;On specialized services CIS believes that there should be logical separation&lt;/strong&gt; and that all details of such specialized services and their impact on the Internet must be made transparent to consumers both individual and institutional, the general public and to the regulator.&amp;nbsp; Further, such services should be available to the user only upon request, and not without their active choice, with the requirement that the service cannot be reasonably provided with ‘best efforts’ delivery guarantee that is available over the Internet, and hence requires discriminatory treatment, or that the discriminatory treatment does not unduly harm the provision of the rest of the Internet to other customers.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;On incentives for telecom operators, CIS believes that the government should consider different models such as waiving contribution to the Universal Service Obligation Fund for prepaid consumers, and freeing up additional spectrum for telecom use without royalty using a shared spectrum paradigm, as well as freeing up more spectrum for use without a licence.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;On reasonable network management CIS still does not have a common institutional position.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/cis-position-on-net-neutrality'&gt;http://editors.cis-india.org/internet-governance/blog/cis-position-on-net-neutrality&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-12-09T13:06:06Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/a2k/blogs/cis-a2k-work-plan-july-2016-june-2017">
    <title>CIS - A2K Work Plan: July 2016 - June 2017</title>
    <link>http://editors.cis-india.org/a2k/blogs/cis-a2k-work-plan-july-2016-june-2017</link>
    <description>
        &lt;b&gt;One of the key mandates of the Access to Knowledge (A2K) program at the Centre for Internet and Society (CIS) is to work towards catalyzing the growth of the free and open knowledge movement in Indic languages. CIS has been a steward of the Wikimedia movement in India since December 2008. Since September 2012, we at CIS-A2K, have been actively involved in growing the movement in India through (i) a grant received from the Wikimedia Foundation (WMF) for the period September 2012 - June 2014, (ii) the FDC Grant received for the period July 2014 - June 2015 and (iii) the FDC Grant received for the period July 2015 - June 2016. Based on the productive experience of working with various Indic Wikimedia communities, CIS-A2K has developed this work plan for July 2016 to June 2017.&lt;/b&gt;
        
&lt;p&gt;This was originally published on &lt;a class="external-link" href="https://meta.wikimedia.org/wiki/CIS-A2K/Work_plan_July_2016_-_June_2017"&gt;Meta-wiki&lt;/a&gt; on April 2, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;We have revised the work plan template taking into account the changed proposal plan sent out by WMF and in light of the feedback that we have received from FDC assessment during last proposal application. The FDC feedback is taken into account at the level of design, RoI and ensuring quality for all our activities.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;CIS-A2K responses towards Indic communities concerns&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;During the last plan period CIS-A2K received the following complaints, suggestions, and feedback. We have attempted to address the concerns under redesigned CIS-A2K 2.0. This table was first prepared during our progress report for the current grant and A2K would like to acknowledge the learnings derived out of the suggestions and feedback it received during the last plan. Please see the table &lt;strong&gt;&lt;a title="Grants:APG/Proposals/2014-2015 round2/The Centre for Internet and Society/Progress report form" href="https://meta.wikimedia.org/wiki/Grants:APG/Proposals/2014-2015_round2/The_Centre_for_Internet_and_Society/Progress_report_form#CIS-A2K_responses_towards_Indic_communities_concerns"&gt;here.&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Background to CIS-A2K Program&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;CIS-A2K is working with the Indic Wikimedia communities since December 2008, when Jimbo Wales came to India and visited Bangalore. In mid-2012 CIS-A2K received a financial grant from the Wikimedia Foundation (WMF) and since then it has been actively involved in growing the Wikimedia and free knowledge movement in India. Following a grant received from WMF for the period September 2012 to June 2014, CIS-A2K received FDC Grant for the periods July 2014 to June 2015 and July 2015 to June 2016. Based on the 41-month experience of working with various Indic Wikimedia communities, CIS-A2K has prepared this year's work plan for July 2016 to June 2017.&lt;/strong&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Objective&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;CIS-A2K is committed to improve Wikimedia movement in India by supporting Indic Wikimedia communities and working on Wikimedia projects and collaborating with FOSS and other like minded movement partners. It also strives to catalyse the growth of open and free knowledge movement in South Asia and especially in India. Our main objectives are:&lt;/strong&gt;&lt;/p&gt;
&lt;ol style="text-align: justify;"&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;&lt;strong&gt;Bringing content under Creative Commons and similar free licenses;&lt;/strong&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;&lt;strong&gt;Supporting and empowering Indic Wikimedia communities;&lt;/strong&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;&lt;strong&gt;Building and maintaining institutional partnerships in order to support the open knowledge movement and creation of open knowledge resources;&lt;/strong&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;&lt;strong&gt;Planning and executing Wikimedia projects with wider community participations and effective consultation;&lt;/strong&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;&lt;strong&gt;Fostering and enabling an appropriate legal and technological ecosystem;&lt;/strong&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;&lt;strong&gt;Building sustainable communities and grooming potential leaders to represent the communities and projects globally.&lt;/strong&gt;&lt;/div&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Context&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;CIS-A2K has focussed on creating sustainable programmes and capacity development for communities in the last few years. CIS-A2K intends to continue its work during the proposed grant period and would continue to focus on the following Indian language Wikimedia projects: Kannada, Konkani, Marathi, Odia, Telugu (Focus Language Areas, FLA). In order to achieve higher RoI, A2K will be including Tulu in its language plan from this plan period.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;CIS-A2K will continue to provide general support and service to all other Indian language Wikimedia communities for all Wikimedia projects as necessary and as requested by the communities or individuals from the community through its request page and needs assessment workshops.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Community strengthening initiatives will be prioritised in order to address the poor participation of Wikimedians from Indian sub continent in particular and global south in general. CIS-A2K has rolled out initiatives such as Train the Trainer and MediaWiki training, focused edit-a-thons and GLAM activities.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;CIS-A2K and Indian language Wikimedia communities would greatly benefit from collaborating with these initiatives and CIS-A2K during this grant period would attempt to bring these communities closer with a series of interactions, hack-a-thons and training sessions.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Our institutional partnerships have played a very important role in content donation, generation of content, attracting new readers and editors and collaborating opportunities with existing community members. They have provided much needed press coverage towards Indian language Wikimedia projects. The institution partnerships and WEP have been redesigned as per community suggestions.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Methodology&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;This work plan has been prepared based on an extensive engagement with various Wikimedia movement participants and enthusiasts in India. These include:&lt;/p&gt;
&lt;ol style="text-align: justify;"&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;Wikimedia community members across all Indic communities: We have talked to a large number of Indic Wikimedia community members and specially community members of our focused language areas;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;Institutional Partners of CIS-A2K: We have taken feedback and suggestions from our institutional partners regarding the challenges of conducting WEP;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;Like-minded advocates of free and open knowledge;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;Surveys and Interviews.&lt;/div&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;h3 style="text-align: justify;"&gt;Performance against plans and projected targets&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Overall&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;img src="http://editors.cis-india.org/home-images/w1.jpg" alt="null" class="image-inline" title="w1" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Kannada&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;img src="http://editors.cis-india.org/home-images/copy_of_w1.jpg" alt="null" class="image-inline" title="w2" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Konkani&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;img src="http://editors.cis-india.org/home-images/copy2_of_w1.jpg" alt="null" class="image-inline" title="w3" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Marathi&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;img src="http://editors.cis-india.org/home-images/copy3_of_w1.jpg" alt="null" class="image-inline" title="w4" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Odia&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;img src="http://editors.cis-india.org/home-images/copy4_of_w1.jpg" alt="null" class="image-inline" title="Odia" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Telugu&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;img src="http://editors.cis-india.org/home-images/copy6_of_w1.jpg" alt="null" class="image-inline" title="w6" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Progress against goals set&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;img src="http://editors.cis-india.org/home-images/copy7_of_w1.jpg" alt="null" class="image-inline" title="Progress" /&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Language Area Work Plans&lt;/h3&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify;"&gt;
&lt;p&gt;CIS-A2K has put in significant efforts across four focus language areas Kannada, Konkani, Odia and Telugu during the previous work plans. CIS-A2K proposed and initiated Marathi as a focus language project during the last proposal plan. As A2K's strategy of working with FLA has resulted in community building and sustainable outreach efforts, we intend to work with the nascent Tulu community towards making Tulu Wikipedia live.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The &lt;a title="CIS-A2K/Work plan July 2016 - June 2017/Tulu" href="https://meta.wikimedia.org/wiki/CIS-A2K/Work_plan_July_2016_-_June_2017/Tulu"&gt;Tulu Wikipedia&lt;/a&gt; plan is a 'minimal cost program' and is not budgeted same as the other FLA. A2K has been able to build a strong community in Mangalore for the Kannada and Konkani Wikimedia projects. Tulu community draws its editor base and institutional support from Mangalore, hence A2K's plans towards Kannada and Konkani Wikimedia projects can also have the added dimension of Tulu Wikipedia incubation activities.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Detailed work-plan for each of these language areas may be seen here (in alphabetical order):&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;&lt;a title="CIS-A2K/Work plan July 2016 - June 2017/Kannada" href="https://meta.wikimedia.org/wiki/CIS-A2K/Work_plan_July_2016_-_June_2017/Kannada"&gt;Kannada&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a title="CIS-A2K/Work plan July 2016 - June 2017/Konkani" href="https://meta.wikimedia.org/wiki/CIS-A2K/Work_plan_July_2016_-_June_2017/Konkani"&gt;Konkani&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a title="CIS-A2K/Work plan July 2016 - June 2017/Marathi" href="https://meta.wikimedia.org/wiki/CIS-A2K/Work_plan_July_2016_-_June_2017/Marathi"&gt;Marathi&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a title="CIS-A2K/Work plan July 2016 - June 2017/Odia" href="https://meta.wikimedia.org/wiki/CIS-A2K/Work_plan_July_2016_-_June_2017/Odia"&gt;Odia&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a title="CIS-A2K/Work plan July 2016 - June 2017/Telugu" href="https://meta.wikimedia.org/wiki/CIS-A2K/Work_plan_July_2016_-_June_2017/Telugu"&gt;Telugu&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="http://editors.cis-india.org/home-images/copy8_of_w1.jpg/@@images/ab0f737d-8061-40d7-bcad-f3850817771a.jpeg" alt="null" class="image-inline" title="Women's Wikipedia Editathon" /&gt;&lt;/p&gt;
&lt;p style="text-align: center;"&gt;Woman's day editathon at Christ University&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Some of the key factors that determined the July 2016-June 2017 work plan:&lt;/strong&gt;&lt;/p&gt;
&lt;ol style="text-align: justify;"&gt;
&lt;li&gt;&lt;strong&gt;Development of Focus Language Area Plan:&lt;/strong&gt; A2K's strategy of building a plan along with the consultation of the community and further customised as per the feedback received by communities and FDC Staff have resulted well across five languages. CIS-A2K is pleased to inform that during July 2015-June 2016 it engaged with all the five focus language area plans as it has been able to recruit program officers and program associates for the vacant positions. It is important to note that while we are engaging with Tulu Wikipedia community with intentions of making Tulu Wikipedia live, it is also a 'minimal cost' program. It helps A2K in acheiving higher RoI for monetary resources and optimisation of staff and volunteer expertise.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;A2K 2.0 as a response to FDC and Indic Wikimedians' Feedback:&lt;/strong&gt; As a learning derived out of FDC, WMF Board and Indic Wikimedians suggestions, CIS-A2K has revised its program structure and composition of work. Please find details of revised divisional of responsibilities of A2K team.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Partnership and networking with institutions and groups:&lt;/strong&gt; CIS-A2K has had the privilege of partnering with educational institutions and developmental organisations. These partnerships and collaborations not only resulted in significant quality-content contributions, but also lead to the diversification and expansion of that particular language Wikimedia community. In order to strengthen the communities, increase participation and conduct GLAM activities and attract content donation A2K would look out for possible institutional partnerships.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Providing sustainability and developing leadership skills:&lt;/strong&gt; A2K has always worked towards enabling Indian Language Wikimedia communities to achieve sustainability and visibility amongst the global communities. We have been greatly privilege to work with the Focus Language Communities and would like to pass on our learning through collaborations with other language communities, while exiting few of our current FLA programs. Through our skill building initiatives such as Train-the-Trainer, Media Wiki Training and Train-a-Wikipedian A2K has also been able to support growth of a new community of volunteers to support the existing community.&lt;/li&gt;&lt;/ol&gt;
&lt;h3&gt;&lt;span id="Community_Strengthening_Initiatives" class="mw-headline"&gt;Community Strengthening Initiatives&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;span id="Community_Strengthening_Initiatives" class="mw-headline"&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/span&gt;&lt;span class="mw-headline"&gt;CIS-A2K started two community strengthening initiatives— &lt;a title="TTT" class="mw-redirect" href="https://meta.wikimedia.org/wiki/TTT"&gt;Train-the-Trainer&lt;/a&gt; and &lt;a title="MWTTT" class="mw-redirect" href="https://meta.wikimedia.org/wiki/MWTTT"&gt;MediaWiki Training&lt;/a&gt; to grow and strengthen the Indic Wikimedia projects and the associated communities, both qualitatively and quantitatively. The earlier iteration of these two programs played an important role in connecting the Indian language Wikimedia communities and fostering multi-lingual projects. This year also CIS-A2K proposes to undertake these two successful community strengthening initiatives. In mid-March 2016, CIS-A2K conducted a 2-day-long nationwide Wikipedia Education Program review workshop that brought students and faculty members from institutions that are running WEP in partnership with CIS-A2K and several important topics such as structural challenges such as academic schedule, institutional interest, faculty buy-in and more importantly response by the students were discussed. This year also CIS-A2K proposes to conduct such a workshop.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span id="Creating_Movement_Resources" class="mw-headline"&gt;Creating Movement Resources&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span id="Creating_Movement_Resources" class="mw-headline"&gt; &lt;/span&gt;CIS-A2K has been creating resources to help Indic Wikimedia communities. All the resources are created after assessing the communities' need assessment and close interactions with many of the active community members.&lt;/p&gt;
&lt;p&gt;CIS-A2K proposed to create the following resources (this also include printed resources):&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Wikipedia editing tutorials&lt;/li&gt;
&lt;li&gt;PEG and IEG application handbooks;&lt;/li&gt;
&lt;li&gt;Handbook on how apply for various WMF scholarships;&lt;/li&gt;
&lt;li&gt;Handbook on best practices for Wiki-events, workshops, meetup, outreach and other programs;&lt;/li&gt;
&lt;li&gt;FAQ for content donors –give this job to a law school intern. No need of this handbook to be translated to Indian languages.&lt;/li&gt;
&lt;li&gt;Bookmarks creation to increase awareness about Indian Wikimedia Projects;&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;General Support and Service to the Movement&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;CIS-A2K regularly supports Indic-language Wikimedia communities to conduct workshops, edit-a-thons and events to improve their projects. All these requests are placed at &lt;a title="Talk:CIS-A2K/Requests" href="https://meta.wikimedia.org/wiki/Talk:CIS-A2K/Requests"&gt;CIS-A2K request page&lt;/a&gt; and fulfilled after extensive community discussion and needs assessment.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Currently CIS-A2K is working on a program named &lt;a title="CIS-A2K/Train-a-Wikipedian" href="https://meta.wikimedia.org/wiki/CIS-A2K/Train-a-Wikipedian"&gt;Train-a-Wikipedian&lt;/a&gt; (TAW) to identify enthusiastic Indic Wikipedians and train and groom them to develop their editing skills. We'll continue empowering Indic Wikimedia community members through this program.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Learning and Evaluation&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Following the &lt;a title="Grants:Learning &amp;amp; Evaluation/Global metrics" href="https://meta.wikimedia.org/wiki/Grants:Learning_%26_Evaluation/Global_metrics"&gt;Global metrics&lt;/a&gt; and discussions some members of the Wikimedia community, the A2K program had put together some evaluation tools to assess the impact of its work during the last year. We have included some more metrics for evaluation this year.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Evaluation tools&lt;/strong&gt;&lt;/p&gt;
&lt;dt&gt;Participation&lt;/dt&gt;
&lt;ol&gt;
&lt;li&gt;Number of active editors involved&lt;/li&gt;
&lt;li&gt;Number of newly registered users&lt;/li&gt;
&lt;li&gt;Number of individuals involved&lt;/li&gt;&lt;/ol&gt;
&lt;dl&gt;&lt;dt&gt;Content&lt;/dt&gt;&lt;/dl&gt;
&lt;ol&gt;
&lt;li&gt;Number of new images/media added to Wikimedia article pages&lt;/li&gt;
&lt;li&gt;Number of new images/media uploaded to Wikimedia Commons&lt;/li&gt;
&lt;li&gt;Number of articles added or improved on Wikimedia projects&lt;/li&gt;
&lt;li&gt;Number of bytes added to and/or deleted from Wikimedia projects&lt;/li&gt;&lt;/ol&gt;
&lt;h3&gt;Reports&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;CIS-A2K will undertake monthly and annually review of our work using the above evaluation tools. CIS-A2K report activities and progress to Wikimedia foundation in monthly meetings.&lt;sup&gt;&lt;a href="https://meta.wikimedia.org/wiki/CIS-A2K/Work_plan_July_2016_-_June_2017#cite_note-1"&gt;[1]&lt;/a&gt;&lt;/sup&gt; CIS-A2K team will also report the successes and learnings to the Wikimedia India &amp;amp; the Global Community. CIS-A2K team will actively review progress of each language area plan in collaboration with the respective Wikimedia community. Based on this feedback we will undertake mid-course corrections, should there be a need. To summarize following reports will be published in the year of 2016 - 2017:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Progress report (for the current grant)&lt;/li&gt;
&lt;li&gt;Impact Report (July 2016 - June 2017)&lt;/li&gt;
&lt;li&gt;Monthly report to Wikimedia foundation;&lt;/li&gt;
&lt;li&gt;Monthly Newsletters&lt;/li&gt;
&lt;li&gt;Annual report to CIS&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;Monthly Review and Learning Sessions&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Last year we &lt;a title="CIS-A2K/Work plan July 2015 - June 2016" href="https://meta.wikimedia.org/wiki/CIS-A2K/Work_plan_July_2015_-_June_2016#Monthly_review_and_learning_sessions"&gt;wrote about&lt;/a&gt; conducting monthly review and learning sessions. Currently CIS-A2K is conducting monthly learning sessions to critically reflect on the successes and failures of our work internally. The learnings are shared with Wikimedia Foundation for their feedback and suggestion. We'll continue conducting monthly reviews and learnings and progress will be shared with Wikimedia Foundation. We will try to share the same the Wikimedia India members.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Budget&lt;/h3&gt;
&lt;p&gt;Please find link to CIS-A2K program budget for proposed grant period July 2016-June 2017 &lt;a title="CIS-A2K/Work plan July 2016 - June 2017/Budget" href="https://meta.wikimedia.org/wiki/CIS-A2K/Work_plan_July_2016_-_June_2017/Budget"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;Feedback&lt;/h3&gt;
&lt;p&gt;We appreciate your valuable feedback. However, for the sake of structured engagement by everyone, we request you to consider the following before you share your feedback.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;For feedback on the overall A2K Work Plan you can write &lt;a title="Talk:CIS-A2K/Work plan July 2016 - June 2017" href="https://meta.wikimedia.org/wiki/Talk:CIS-A2K/Work_plan_July_2016_-_June_2017"&gt;&lt;strong&gt;here&lt;/strong&gt;&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;For feedback on respective Language area plans, please write on the discussion page of the respective language plan.&lt;/li&gt;&lt;/ul&gt;
&lt;dl&gt;&lt;dd&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a title="CIS-A2K/Work plan July 2016 - June 2017/Kannada" href="https://meta.wikimedia.org/wiki/CIS-A2K/Work_plan_July_2016_-_June_2017/Kannada"&gt;&lt;strong&gt;Kannada&lt;/strong&gt;&lt;/a&gt; plan (&lt;a title="Talk:CIS-A2K/Work plan July 2016 - June 2017/Kannada" href="https://meta.wikimedia.org/wiki/Talk:CIS-A2K/Work_plan_July_2016_-_June_2017/Kannada"&gt;&lt;strong&gt;discussions&lt;/strong&gt;&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;&lt;a title="CIS-A2K/Work plan July 2016 - June 2017/Konkani" href="https://meta.wikimedia.org/wiki/CIS-A2K/Work_plan_July_2016_-_June_2017/Konkani"&gt;&lt;strong&gt;Konkani&lt;/strong&gt;&lt;/a&gt; plan (&lt;a title="Talk:CIS-A2K/Work plan July 2016 - June 2017/Konkani" href="https://meta.wikimedia.org/wiki/Talk:CIS-A2K/Work_plan_July_2016_-_June_2017/Konkani"&gt;&lt;strong&gt;discussions&lt;/strong&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a title="CIS-A2K/Work plan July 2016 - June 2017/Marathi" href="https://meta.wikimedia.org/wiki/CIS-A2K/Work_plan_July_2016_-_June_2017/Marathi"&gt;&lt;strong&gt;Marathi&lt;/strong&gt;&lt;/a&gt; plan (&lt;a title="Talk:CIS-A2K/Work plan July 2016 - June 2017/Marathi" href="https://meta.wikimedia.org/wiki/Talk:CIS-A2K/Work_plan_July_2016_-_June_2017/Marathi"&gt;&lt;strong&gt;discussions&lt;/strong&gt;&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;&lt;a title="CIS-A2K/Work plan July 2016 - June 2017/Odia" href="https://meta.wikimedia.org/wiki/CIS-A2K/Work_plan_July_2016_-_June_2017/Odia"&gt;&lt;strong&gt;Odia&lt;/strong&gt;&lt;/a&gt; plan (&lt;a title="Talk:CIS-A2K/Work plan July 2014 - June 2015/Odia" href="https://meta.wikimedia.org/wiki/Talk:CIS-A2K/Work_plan_July_2014_-_June_2015/Odia"&gt;&lt;strong&gt;discussions&lt;/strong&gt;&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;&lt;a title="CIS-A2K/Work plan July 2016 - June 2017/Telugu" href="https://meta.wikimedia.org/wiki/CIS-A2K/Work_plan_July_2016_-_June_2017/Telugu"&gt;&lt;strong&gt;Telugu&lt;/strong&gt;&lt;/a&gt; plan (&lt;a title="Talk:CIS-A2K/Work plan July 2014 - June 2015/Telugu" href="https://meta.wikimedia.org/wiki/Talk:CIS-A2K/Work_plan_July_2014_-_June_2015/Telugu"&gt;&lt;strong&gt;discussions&lt;/strong&gt;&lt;/a&gt;)&lt;/li&gt;&lt;/ul&gt;
&lt;/dd&gt;&lt;/dl&gt;
&lt;ul&gt;
&lt;li&gt;Alternatively you could also share your feedback over e-mail at tanveer@cis-india.org. Please use the subject line Feedback on Work Plan.&lt;/li&gt;
&lt;li&gt;Should you feel the need to discuss any aspect of the plan before sharing your feedback, please write to us and we can set up a telephone/Skype call.&lt;/li&gt;&lt;/ul&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/a2k/blogs/cis-a2k-work-plan-july-2016-june-2017'&gt;http://editors.cis-india.org/a2k/blogs/cis-a2k-work-plan-july-2016-june-2017&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>CIS-A2K</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Wikimedia</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    

   <dc:date>2016-04-29T09:36:45Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/www-tehelka-com-sunil-abraham-august-23-2012-censoring-the-internet">
    <title>Censoring the Internet: A brief manual</title>
    <link>http://editors.cis-india.org/internet-governance/www-tehelka-com-sunil-abraham-august-23-2012-censoring-the-internet</link>
    <description>
        &lt;b&gt;Blocking websites on the Internet should be proportionate to harm they intend. However, the government of India's approach is against the principles of natural justice.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Published in &lt;a class="external-link" href="http://www.tehelka.com/story_main53.asp?filename=Ws230812Internet.asp"&gt;Tehelka&lt;/a&gt; on August 23, 2012.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;When:&lt;/b&gt; Speech should be regulated when there is harm, or when there is clear and imminent harm. The extent of regulation must be in proportion to the harm.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The mass exodus of people from the Northeast, from certain Indian-cities is clear indication of a ‘public order’ crisis. The government of India, for the very first time, has legitimate reasons for cracking down on intermediaries such as Google and Facebook and their users, unlike in the past when only the egos of politicians, bureaucrats and others in public office or public life were at stake. In most cases temporary restrictions on speech are sufficient to mitigate harm. When potential for harm has dissipated the restrictions should be lifted. Whilst videos and images related to the violations of the human-rights to the Rohingya community might be sensitive material today, there is no reason why such content should be blocked forever, unlike, for example, in the case of child pornography.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;How:&lt;/b&gt; Does this mean that the Internet rules that were notified in April last year were future-looking policies justified in retrospect? No. When a block is implemented, or a takedown is complied with, three types of notices are required — either immediately or after the imminent harm has been prevented. First, the censored individuals/groups should be informed, so that they can seek redressal and reinstatement; second, those trying to consume the censored material must be warned; and third, the general public has a right to know either immediately or in due course.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even in authoritarian states like Saudi Arabia, visitors to blocked websites are given clear reasons why the website was blocked along with contact details to seek redressal. There are, also, safe harbour provisions for intermediaries, meaning that they absolve themselves of liability in exchange for acting upon takedown orders sent by non-state actors. Suitable safeguards are required to prevent over-compliance by intermediaries, and the resulting chilling effect on free speech as demonstrated by CIS's research. The intermediary liability rules under the Indian IT Act 2008 have no such safeguards and therefore does not comply with principles of natural justice.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Who:&lt;/b&gt; Block and takedown orders need to be very specific. The advisory note issued to Internet intermediaries by the Department of Electronics and Information Technology, Ministry of Communications &amp;amp; Information Technology on the 17 August did not mention details such as URLs, user accounts, group names and content identifiers. Most of the censored material at first glance, appears to be communal in nature. Unfortunately, there are several URLs from mainstream media publications, a few Wikipedia pages and also at least two blog entries debunking rumours in the list, perhaps because of oversight. Images of unrelated human rights violations featuring people with similar racial features are being used to fuel the current rumours. However, blocking all websites featuring such images will not stop such rumour mongering. Censorship must be targeted and proportionate to the potential harm.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Why:&lt;/b&gt; Speaking aloud just once in the analog world could either result in harm or good. Imagine shouting “bomb” in a crowded airport. The network effect of technologies such as SMS, social media and micro-blogging amplifies the impact of speech. Article 19(2) of the Constitution of India lists eight reasons for which reasonable restrictions may be applied to the right to free speech. This applies to both analog and speech mediated via networked technologies. Some of these restrictions such as 'public order' and 'incitement to discrimination, hostility or violence' are part of international treaties such as the International Covenant on Civil and Political Rights. Fringe phenomenon and exceptional circumstances should not be the basis for formulating policy. For example — knives used as murder weapons does not necessitate regulations on cutlery. Similarly, criminalising rumour mongering will not prevent false information from going viral, online, and disrupting public order. Videos and photos are doctored and manipulated for a wide variety of legitimate reasons. The existing law regulating speech in the interests of public order are sufficient to deal with the circulation of falsehoods on social media.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Sunil Abraham is the Executive Director of Bangalore based research organisation, the Centre for Internet and Society&lt;/i&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/www-tehelka-com-sunil-abraham-august-23-2012-censoring-the-internet'&gt;http://editors.cis-india.org/internet-governance/www-tehelka-com-sunil-abraham-august-23-2012-censoring-the-internet&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-08-24T09:39:03Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/business-standard-march-28-2018-sunil-abraham-cambridge-analytica-scandal-how-india-can-save-democracy-from-facebook">
    <title>Cambridge Analytica scandal: How India can save democracy from Facebook</title>
    <link>http://editors.cis-india.org/internet-governance/blog/business-standard-march-28-2018-sunil-abraham-cambridge-analytica-scandal-how-india-can-save-democracy-from-facebook</link>
    <description>
        &lt;b&gt;Hegemonic incumbents like Google and Facebook need to be tackled with regulation; govt should use procurement power to fund open source alternatives.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in the &lt;a class="external-link" href="http://www.business-standard.com/article/economy-policy/cambridge-analytica-scandal-how-india-can-save-democracy-from-facebook-118032800146_1.html"&gt;Business Standard&lt;/a&gt; on March 28, 2018&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;&lt;em&gt;The Cambridge Analytica scandal came to light when &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=whistleblower" target="_blank"&gt;whistleblower &lt;/a&gt;Wylie accused Cambridge Analytica of gathering details of 50 million Facebook users. Cambridge Analytica used this data to psychologically profile these users and manipulated their opinion in favour of Donald Trump. BJP and Congress have accused each other of using the services of Cambridge Analytica in India as well. How can India safeguard the democratic process against such intervention? The author tries to answer this question in this Business Standard Special.&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;&lt;em&gt;&lt;/em&gt;&lt;/strong&gt;Those that celebrate the big data/artificial intelligence moment claim that traditional approaches to data protection are no longer relevant and therefore must be abandoned. The Cambridge Analytica episode, if anything, demonstrates how wrong they are. The principles of data protection need to be reinvented and weaponized, not discarded. In this article I shall discuss the reinvention of three such data protection principles. Apart from this I shall also briefly explore competition law solutions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;&lt;em&gt;Collect data only if mandated by regulation&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;&lt;em&gt;&lt;/em&gt;&lt;/strong&gt;One, data minimization is the principle that requires the data controller to collect data only if mandated to do so by regulation or because it is a prerequisite for providing a functionality. For example, Facebook’s messenger app on Android harvests call records and meta-data, without any consumer facing feature on the app that justifies such collection. Therefore, this is a clear violation of the data minimization principle. One of the ways to reinvent this principle is by borrowing from the best practices around warnings and labels on packaging introduced by the global anti-tobacco campaign. A permanent bar could be required in all apps, stating ‘Facebook holds W number of records across X databases over the time period Y, which totals Z Gb’. Each of these alphabets could be a hyperlink, allowing the user to easily drill down to the individual data record.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;em&gt;&lt;strong&gt;Consent must be explicit, informed and voluntary&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;em&gt;&lt;strong&gt;&lt;/strong&gt;&lt;/em&gt;Two, the principle of consent requires that the data controller secure explicit, informed and voluntary consent from the data subject unless there are exceptional circumstances. Unfortunately, consent has been reduced to a mockery today through obfuscation by lawyers in verbose “privacy notices” and “terms of services”. To reinvent consent we need to bring ‘Do Not Dial’ registries into the era of big data. A website maintained by the future Indian data protection regulator could allow individuals to check against their unique identifiers (email, phone number, Aadhaar). The website would provide a list of all data controllers that are holding personal information against a particular unique identifier. The data subject should then be able to revoke consent with one-click. Once consent is revoked, the data controller would have to delete all personal information that they hold, unless retention of such information is required under law (for example, in banking law). One-click revocation of consent will make data controllers like Facebook treat data subjects with greater respect.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;em&gt;&lt;strong&gt;There must be a right to &lt;/strong&gt;&lt;/em&gt;&lt;em&gt;&lt;strong&gt;explanation&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;em&gt;&lt;strong&gt;&lt;/strong&gt;&lt;/em&gt;Three, the right to explanation, most commonly associated with the General Data Protection Directive from the EU, is a principle that requires the data controller to make transparent the automated decision-making process when personal information is implicated. So far it has been seen as a reactive measure for user empowerment. In other words, the explanation is provided only when there is a demand for it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Facebook feeds that were used for manipulation through micro-targeting of content is an example of such automated decision making. Regulation in India should require a user empowerment panel accessible through a prominent icon that appears repeatedly in the feed. On clicking the icon the user will be able to modify the objectives that the algorithm is maximizing for. She can then choose to see content that targets a bisexual rather than a heterosexual, a Muslim rather than a Hindu, a conservative rather a liberal, etc. At the moment, Facebook only allows the user to stop being targeted for advertisements based on certain categories. However, to be less susceptible to psychological manipulation, the user should be allowed to define these categories, for both content and advertisements.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;em&gt;&lt;strong&gt;How to fix the business model?&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;em&gt;&lt;strong&gt;&lt;/strong&gt;&lt;/em&gt;From a competition perspective, Google and Facebook have destroyed the business model for real news, and replaced it with a business model for fake news, by monopolizing digital advertising revenues. Their algorithms are designed to maximize the amount of time that users spend on their platforms, and therefore, don’t have any incentive to distinguish between truth and falsehood. This contemporary crisis requires three types of interventions: one, appropriate taxation and transparency to the public, so that the revenue streams for fake news factories can be ended; two, the construction of a common infrastructure that can be shared by all traditional and new media companies in order to recapture digital advertising revenues; and three, immediate action by the competition regulator to protect competition between advertising networks operating in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;em&gt;&lt;strong&gt;The Google challenge&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;em&gt;&lt;strong&gt;&lt;/strong&gt;&lt;/em&gt;With Google, the situation is even worse, since Google has dominance in both the ad network market and in the operating system market. During the birth of competition law, policy-makers and decision-makers acted to protect competition per se. This is because they saw competition as an essential component of democracy, open society, innovation, and a functioning market. When the economists from the Chicago school began to influence competition policy in the USA, they advocated for a singular focus on the maximization of consumer interest. The adoption of this ideology has resulted in competition regulators standing powerlessly by while internet giants wreck our economy and polity. We need to return to the foundational principles of competition law, which might even mean breaking Google into two companies. The operating system should be divorced from other services and products to prevent them from taking advantage of vertical integration. We as a nation need to start discussing the possible end stages of such a breakup.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In conclusion, all the fixes that have been listed above require either the enactment of a data protection law, or the amendment of our existing competition law. This, as we all know, can take many years. However, there is an opportunity for the government to act immediately if it wishes to. By utilizing procurement power, the central and state governments of India could support free and open source software alternatives to Google’s products especially in the education sector. The government could also stop using Facebook, Google and Twitter for e-governance, and thereby stop providing free advertising for these companies for print and broadcast media. This will make it easier for emerging firms to dislodge hegemonic incumbents.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/business-standard-march-28-2018-sunil-abraham-cambridge-analytica-scandal-how-india-can-save-democracy-from-facebook'&gt;http://editors.cis-india.org/internet-governance/blog/business-standard-march-28-2018-sunil-abraham-cambridge-analytica-scandal-how-india-can-save-democracy-from-facebook&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Facebook</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-03-28T15:44:00Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/a2k/digital-restrictions-management">
    <title>ಡಿಜಿಟಲ್ ನಿರ್ಬಂಧಗಳ ನಿರ್ವಹಣೆ</title>
    <link>http://editors.cis-india.org/a2k/digital-restrictions-management</link>
    <description>
        &lt;b&gt;ಸ್ವತಂತ್ರ ತಂತ್ರಾಂಶ ಪ್ರತಿಷ್ಠಾನದ ಸ್ಥಾಪಕ ರಿಚರ್ಡ್ ಸ್ಟಾಲ್‌ಮನ್ ಡಿಆರ್‌ಎಂ (ಡಿಜಿಟಲ್ ರೈಟ್ಸ್ ಮ್ಯಾನೇಜ್‌ಮೆಂಟ್) ಎಂಬ ಪರಿಕಲ್ಪನೆಯನ್ನು `ಡಿಜಿಟಲ್ ರೆಸ್ಟ್ರಿಕ್ಷನ್ ಮ್ಯಾನೇಜ್ಮೆಂಟ್` ಎಂದು ಬಿಡಿಸಿಡುತ್ತಾರೆ. ಅವರ ದೃಷ್ಟಿಯಲ್ಲಿ ಇದು ಡಿಜಿಟಲ್ ಹಕ್ಕುಗಳ ನಿರ್ವಹಣೆಯಲ್ಲ. ಡಿಜಿಟಲ್ ನಿರ್ಬಂಧಗಳ ನಿರ್ವಹಣೆ. ಈ ಡಿಆರ್‌ಎಂ ತಂತ್ರ ಬಳಕೆದಾರನ ಹಕ್ಕುಗಳನ್ನು ನಿಯಂತ್ರಿಸುತ್ತದೆ. &lt;/b&gt;
        
&lt;p&gt;&lt;a class="external-link" href="http://prajavani.net/include/story.php?news=562&amp;amp;section=51&amp;amp;menuid=15"&gt;The article was published in Prajavani on June 9, 2012&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;ಕಾಪಿ ರೈಟ್ ಹೊಂದಿರುವವನಿಗೆ ಬಳಕೆದಾರನ ಹಾರ್ಡ್‌ವೇರ್, ಸಾಫ್ಟ್‌ವೇರ್ ಮತ್ತು ಅದರಲ್ಲಿ ನೋಡುವ, ಆಲಿಸುವ ಮತ್ತು ಓದುವ ವಸ್ತು-ವಿಷಯದ ಮೇಲೆಯೂ ನಿಯಂತ್ರಣ ಹೇರುವ ಅನೈತಿಕ ಅಧಿಕಾರವನ್ನು ಕೊಟ್ಟು ಬಿಡುತ್ತದೆ ಎಂಬುದು ಸ್ಟಾಲ್‌ಮನ್ ಅವರ ಅಭಿಪ್ರಾಯ.&lt;/p&gt;
&lt;p&gt;ಕಾಪಿರೈಟ್‌ನ ಮಾಲೀಕರು ಈ ಡಿಆರ್‌ಎಂ ತಂತ್ರ ತಮ್ಮ ಹಕ್ಕಿನ ಉಲ್ಲಂಘನೆಯನ್ನು ತಡೆಯುತ್ತದೆ ಎಂದು ಹೇಳುತ್ತಾರಾದರೂ ಇದು ಜಾರಿಯಲ್ಲಿರುವ ಅನೇಕ ದೇಶಗಳ ಉದಾಹರಣೆಯನ್ನು ಮುಂದಿಟ್ಟುಕೊಂಡು ನೋಡಿದರೆ ಬಳಕೆದಾರನ ಮಟ್ಟಿಗೆ ಡಿಆರ್‌ಎಂ ಜ್ಞಾನದ ಬಾಗಿಲುಗಳನ್ನು ಮುಚ್ಚುತ್ತದೆ ಎಂಬುದೇ ನಿಜ.&lt;/p&gt;
&lt;p&gt;ಕಾಪಿರೈಟ್ ಕಾಯ್ದೆಯನ್ವಯ ಅಸ್ತಿತ್ವದಲ್ಲೇ ಇರದ ಹಕ್ಕುಗಳನ್ನು ಈ ಡಿಆರ್‌ಎಂ ಕಾಪಿರೈಟ್‌ನ ಮಾಲೀಕರಿಗೆ ನೀಡಿಬಿಡುತ್ತದೆ.&amp;nbsp; ಅಂಗವಿಕಲರು ತಮಗೆ ಓದಲು ಅನುಕೂಲವಾಗುವ ಮಾಧ್ಯಮಕ್ಕೆ ಒಂದು ಪುಸ್ತಕವನ್ನು ಪರಿವರ್ತಿಸಿಕೊಳ್ಳುವುದು, ಸಂಶೋಧಕರು ಪುಸ್ತಕ ಅಥವಾ ಈ ಬಗೆಯ ಜ್ಞಾನದ ಮಾಧ್ಯಮಒಂದರಲ್ಲಿರುವ ವಿಷಯವನ್ನು ತಮ್ಮ ಸಂಶೋಧನೆಗೆ ಬಳಸಿಕೊಳ್ಳುವುದು, ಹಾಗೆಯೇ ಸಿನಿಮಾ, ಸಾಫ್ಟ್‌ವೇರ್ ಇತ್ಯಾದಿಗಳನ್ನು ವೈಯಕ್ತಿಕ ಬಳಕೆಗಾಗಿ ಉಳಿಸಿ ಇಟ್ಟುಕೊಳ್ಳಲು (ಬ್ಯಾಕ್‌ಅಪ್) ಬೇಕಾದಂತೆ ಪರಿವರ್ತಿಸಿಕೊಳ್ಳುವುದು, ಸಾಫ್ಟ್‌ವೇರ್‌ನಂಥ ಉತ್ಪನ್ನ ಗಳನ್ನು ಅವುಗಳನ್ನು ಉದ್ದೇಶಿತ ಉಪಯೋಗ ಕ್ಕಿಂತ ಭಿನ್ನ ಬಗೆಯಲ್ಲಿ ಬಳಸುವುದು,&amp;nbsp; ಉದ್ದೇಶಿತ ವೇದಿಕೆಗಳಿಗಿಂತ ಭಿನ್ನವಾದ ವೇದಿಕೆಗಳಲ್ಲಿ ಬಳಸಲು ಸಾಧ್ಯವಾಗುವಂತೆ ಸಾಫ್ಟ್‌ವೇರ್‌ಗಳಂಥ ಉತ್ಪನ್ನಗಳನ್ನು ರಿವರ್ಸ್ ಇಂಜಿನಿಯರಿಂಗ್ ಮಾಡುವಂಥ ಕ್ರಿಯೆಗಳಿಗೆ ಕಾಪಿರೈಟ್ ಕಾಯ್ದೆ ಅನುವು ಮಾಡಿಕೊಡುತ್ತದೆ.&lt;/p&gt;
&lt;p&gt;ಆದರೆ ಡಿಆರ್‌ಎಂ ತಂತ್ರಜ್ಞಾನ ಕಾನೂನುಬದ್ಧವಾಗಿಯೇ ಇರುವ ಈ ಎಲ್ಲಾ ಕೆಲಸಗಳಿಗೂ ತಡೆಯೊಡುತ್ತದೆ.2011ರ ತಿದ್ದುಪಡಿಯೊಂದಿಗೆ ಹೊಸ ರೂಪ ಪಡೆದುಕೊಂಡಿರುವ 1957ರ ಕಾಪಿರೈಟ್ ಕಾಯ್ದೆ ತಂತ್ರಜ್ಞಾನದ ಮೂಲಕ ಕಾಪಿರೈಟ್ ಉಲ್ಲಂಘನೆಯನ್ನು ತಡೆಯುವ ವಿಧಾನಕ್ಕೆ ಕಾನೂನಿನ ಮಾನ್ಯತೆಯನ್ನು ನೀಡಿದೆ.&lt;/p&gt;
&lt;p&gt;ತನ್ನ ಹಕ್ಕಿನ ಉಲ್ಲಂಘನೆಯನ್ನು ತಡೆಯುವು ದಕ್ಕಾಗಿ ಕಾಪಿರೈಟ್ ಮಾಲೀಕ ಅಳವಡಿಸಿರುವ ತಂತ್ರಜ್ಞಾನವನ್ನು ಹ್ಯಾಕ್ ಮಾಡುವಂಥ ಕೆಲಸ ಮಾಡಿದವರಿಗೆ ಎರಡು ವರ್ಷಗಳ ಕಾರಾಗೃಹ ವಾಸದಂಥ ಶಿಕ್ಷೆಯೂ ಹೊಸ ಕಾನೂನಿನಲ್ಲಿದೆ. ಹಾಗೆಂದು ಈ ಕಾನೂನು ಬಹಳ ಋಣಾತ್ಮಕವಷ್ಟೇ ಆಗಿದೆ ಎನ್ನಲು ಸಾಧ್ಯವಿಲ್ಲ.&lt;/p&gt;
&lt;p&gt;ಇದರಲ್ಲಿ ಮೂರು ಅತಿ ಮುಖ್ಯ ಧನಾತ್ಮಕ ಅಂಶಗಳಿವೆ. ಮೊದಲನೆಯದ್ದು ಸಾರ್ವತ್ರಿಕ ಲಭ್ಯತೆಯ ವಸ್ತು-ವಿಷಯಗಳನ್ನು ಈ ಬಗೆಯ ತಂತ್ರಜ್ಞಾನ ಉಪಯೋಗಿಸಿ ಬಳಕೆದಾರರನ್ನು ನಿರ್ಬಂಧಿಸಲು ಅವಕಾಶವಿಲ್ಲ. ಎರಡನೆಯದ್ದು ತಂತ್ರಜ್ಞಾನದ ಮಿತಿಯನ್ನು ಪರೀಕ್ಷಿಸುವ ಉದ್ದೇಶದಿಂದ ನಡೆಸಲಾಗುವ ಹ್ಯಾಕಿಂಗ್&amp;nbsp; ಅಪರಾಧವಲ್ಲ. ಮೂರನೆಯದ್ದು ಹೀಗೆ ತಂತ್ರಜ್ಞಾನದ ಮಿತಿಗಳನ್ನು ಬಳಸಿಕೊಳ್ಳುವ ಮತ್ತೊಂದು ತಾಂತ್ರಿಕ ವಿಧಾನವನ್ನು ಆವಿಷ್ಕರಿಸುವುದನ್ನು ಕಾನೂನು ತಡೆಯುತ್ತಿಲ್ಲ.&lt;/p&gt;
&lt;p&gt;ಒಂದು ವಿಡಿಯೋ/ಆಡಿಯೋ ಕಂಪೆನಿ ಒಂದು ಡಿವಿಡಿಯನ್ನು ಕೇವಲ ಮೈಕ್ರೋಸಾಫ್ಟ್ ಮೀಡಿಯಾ ಪ್ಲೇಯರ್‌ನಲ್ಲಿ ಮಾತ್ರ ವೀಕ್ಷಿಸಲು ಅಥವಾ ಆಲಿಸಲು ಸಾಧ್ಯವಿರುವಂತೆ ಡಿಆರ್‌ಎಂ ಮಾಡಿದ್ದರೆ ಲೀನಕ್ಸ್ ಹೊಂದಿರುವ ಬಳಕೆದಾರರು ಅದನ್ನು ತಮ್ಮ ಕಂಪ್ಯೂಟರ್‌ಗಳಲ್ಲಿ ನೋಡಲು ಸಾಧ್ಯವಿರುವಂತೆ ಪರಿವರ್ತಿಸಿ ಕೊಳ್ಳುವುದು ಅಪರಾಧವಲ್ಲ. ಇಲ್ಲಿ ಕಾಪಿರೈಟ್ ಉಲ್ಲಂಘನೆಯಾಗುವುದಿಲ್ಲ.&lt;/p&gt;
&lt;p&gt;ಹಾಗೆಯೇ ಆಡಿಯೋ ಪುಸ್ತಕವೊಂದನ್ನು ಬಿಡುಗಡೆ ಮಾಡಿರುವ ಕಂಪೆನಿ ಅದನ್ನು ಅಂಧರು ಬಳಸಿಕೊಳ್ಳಲಾಗದಂತೆ ಡಿಆರ್‌ಎಂ ಬಳಸಿದ್ದರೆ ಅಂಧರಿಗೆ ಅದನ್ನು ತಮಗೆ ಬೇಕಾದ ಸ್ವರೂಪಕ್ಕೆ ಪರಿವರ್ತಿಸಿಕೊಂಡು ಬಳಸುವ ಸ್ವಾತಂತ್ರ್ಯವನ್ನು ಕಾಯ್ದೆ ನೀಡುತ್ತದೆ. ಹಾಗೆಯೇ ಗೆಳೆಯನೊಬ್ಬನಿಂದ ಪಡೆದ ಡಿಆರ್‌ಎಂ ಇರುವ ಡಿವಿಡಿಯಿಂದ ಶಿಕ್ಷಕರೊಬ್ಬರು ತಮ್ಮ ತರಗತಿ ಅನುಕೂಲಕ್ಕಾಗಿ ಪ್ರತಿ ಮಾಡಿಕೊಂಡು ವಿಡಿಯೋ ಕ್ಲಿಪ್‌ಗಳನ್ನು ರೂಪಿಸಿದರೂ ಅದು ಅಪರಾಧವಾಗು ವುದಿಲ್ಲ. ಹಾಗೆಯೇ ತಂತ್ರಜ್ಞನೊಬ್ಬ ಅಂತರ ಜಾಲಸಂಪರ್ಕವನ್ನು ಬಳಸಿ ಆಡಬಲ್ಲ ಕಂಪ್ಯೂಟರ್ ಗೇಮ್ ಒಂದರಲ್ಲಿ ಸ್ಪೈವೇರ್ ಇದೆ ಅನುಮಾನಿಸಿ ಅದರ ಆಕರ ಸಂಕೇತಗಳನ್ನು ನೋಡಿ ಬದಲಾಯಿಸಲು ಪ್ರಯತ್ನಿಸಿದರೆ ಅದು ತಪ್ಪಲ್ಲ.&lt;/p&gt;
&lt;p&gt;ಈ ಸವಲತ್ತನ್ನು ಭದ್ರತಾ ಏಜನ್ಸಿಗಳೂ ಬಳಸಿಕೊಳ್ಳಲು ಸಾಧ್ಯವಿದೆ. ಹಾಗೆಯೇ ಜಾಗತಿಕ ಮಾರುಕಟ್ಟೆಯಲ್ಲಿರುವ ಪ್ರಖ್ಯಾತವಾಗಿರುವ ಒಂದು ಸಾಫ್ಟ್‌ವೇರನ್ನು ಹೋಲುವಂಥದ್ದೇ ಉತ್ಪನ್ನವನ್ನು ಬೆಂಗಳೂರಿನ ಉತ್ಸಾಹಿಯೊಬ್ಬ ರೂಪಿಸಿ ಜಾಗತಿಕವಾಗಿ ಮಾರಾಟ ಮಾಡಲು ಹೊರಟರೂ ಅದನ್ನು ನಿಯಮ ತಪ್ಪು ಎನ್ನುವುದಿಲ್ಲ. ಆದರೆ ಇದರಲ್ಲಿ ಆತ ಅನುಕರಿ ಸುತ್ತಿರುವ ಉತ್ಪನ್ನ ಬಳಸಿರುವ ಆಕರ ಸಂಕೇತಗಳು ಇರಬಾರದಷ್ಟೇ.&lt;/p&gt;
&lt;p&gt;ಎಲ್ಲವನ್ನೂ ಮಸಿ ನುಂಗಿತು ಎಂಬಂತೆ ಈ ಕಾಯ್ದೆಯಲ್ಲಿರುವ ಎರಡು ಋಣಾತ್ಮಕ ಅಂಶಗಳು ಅದರ ಧನಾತ್ಮಕತೆಗೆ ದೊಡ್ಡ ಮಿತಿಯನ್ನು ಹೇರಿಬಿಟ್ಟಿವೆ. ನಿರ್ದಿಷ್ಟ ಉತ್ಪನ್ನವನ್ನು ಪರಿವರ್ತಿಸಲು ಬೇಕಿರುವ ತಂತ್ರಜ್ಞಾನವನ್ನು ಒದಗಿಸುವ ಕಂಪೆನಿಗಳು ಅದನ್ನು ಯಾರಿಗೆ ಮಾರಿದ್ದೇವೆ ಎಂಬ ದಾಖಲೆಗಳನ್ನು ಇಟ್ಟುಕೊಳ್ಳಬೇಕೆಂಬ ನಿಯಮವಿದೆ.&lt;/p&gt;
&lt;p&gt;ಅಂದರೆ ಇದೊಂದು ಬಗೆಯಲ್ಲಿ ಪರೋಕ್ಷವಾಗಿ ಈ ತಂತ್ರಜ್ಞಾನವನ್ನು ಬಳಸುವುದರ ಮೇಲೆ ಹೇರಿರುವ ನಿಯಂತ್ರಣದಂತಿದೆ. ಯಾರಿಗೆ ಮಾರಿದ್ದೇವೆಂಬ ದಾಖಲೆಯನ್ನು ಕಡ್ಡಾಯವಾಗಿ ಇಟ್ಟುಕೊಳ್ಳುತ್ತಾ ಹೋಗುವ ಕ್ರಿಯೆಯೇ ಮಾರಾಟ ಗಾರರ ಉತ್ಸಾಹಕ್ಕೆ ತಣ್ಣೀರೆರಚುತ್ತದೆ.&lt;/p&gt;
&lt;p&gt;ಹಾಗೆಯೇ ಬಳಕೆದಾರರು ತಮ್ಮ `ಪರಿವರ್ತಿಸುವ ಹಕ್ಕನ್ನು` ಚಲಾಯಿಸಲು ಅಗತ್ಯವಿರುವ ಸವಲತ್ತು ಒದಗಿಸುವುದಕ್ಕೆ ಕಾಪಿರೈಟ್ ಮಾಲೀಕರನ್ನು ಬಾಧ್ಯಸ್ಥರನ್ನಾಗಿಸಿಲ್ಲ. ಅಂದರೆ ಬಳಕೆದಾರನಿಗೆ ಹಕ್ಕಿದೆ. ಆದರೆ ಅದನ್ನು ಚಲಾಯಿಸುವ ಅವಕಾಶದ ಬಗ್ಗೆ ಮಾತ್ರ ಖಾತರಿ ಇಲ್ಲ ಎಂಬ ಸ್ಥಿತಿ ಇದೆ.&lt;/p&gt;
&lt;p&gt;ಲೇಖಕರು ಸೆಂಟರ್ ಫಾರ್ ಇಂಟರ್‌ನೆಟ್‌ಅಂಡ್ ಸೊಸೈಟಿಯ ಕಾರ್ಯನಿರ್ವಾಹಕ ನಿರ್ದೇಶಕರು&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;English translation below:&lt;/p&gt;
&lt;h2&gt;Digital Restrictions Management&lt;/h2&gt;
&lt;p&gt;As Richard Stallman the founder of the Free Software movement puts it the correct expansion of the acronym DRM is Digital Restrictions Management and not Digital Rights Management. According to his analysis DRM is used to limit the rights of consumers and enables rights-holders to exercise unethical control over the consumer's hardware, software and content.&lt;/p&gt;
&lt;p&gt;Even though copyrights holders will tell us that DRM helps cut down on wilful and unwitting infringement. For consumers and members of the general public  evidence from other countries reveal that DRM in most cases undermines access to knowledge. DRM permits the copyright holder to claim rights that don't exist as per copyright law and to restrict fair dealing (also referred to as far use) guarantees. Fair dealing protections include access by the disabled, use in research or academic context, archiving or making a personal backup, reverse engineering for academic reasons to to create interoperable/competing products/services etc.&lt;/p&gt;
&lt;p&gt;The 2012 amendment to the Indian Copyright Act 1957 has resulted in legal recognition for effective technological measures [also called Technological Protection Measures or TPMs] and rights management information [RMI] applied for protecting the rights of the copyright-holder.&amp;nbsp; Circumvention of&amp;nbsp; such a measure could result in a 2 year jail term and a fine.&lt;br /&gt;&lt;br /&gt;The DRM provisions per the amendment does three things correctly. One, it does not allow copyright-holder to use technological measure as a means to enclose public domain content or secure rights that are not granted to them under the Act. Two, any circumvention to exercise limitations and exceptions under the fair dealing provisions of the Act is not considered to be an offence. Three, it does not criminalise the creation of circumvention technologies. Unfortunately, however the Amendment also gets two things wrong. One, there are onerous recording keeping mandates for those providing circumvention technologies to consumers and members of the general public. Two, the provision does not make the rights-holder responsible for providing the means to consumers and members of the general public who wish to exercise their right to circumvention.&lt;br /&gt;&lt;br /&gt;Suppose a movie studio released DVD version of its films with DRM that only worked with Microsoft Windows operating system. Those who bought the DVD but ran GNU/Linux or any other operating system would then have a right to circumvent the DRM and republish the content in an video encoding format. This would not be considered an offence because the customer is not attempting any copyright infringement.&lt;br /&gt;&lt;br /&gt;Suppose a publishing house only released audio versions of its books with DRM that prevented accessibility to the content by the disabled. Another newly-introduced exception specifically for the disabled would apply if the rights-holder has ignored the disabled as a market but not making available accessible versions of their content. In other words, the disabled have a right to make accessible versions for themselves and therefore circumvent the DRM if necessary.&lt;/p&gt;
&lt;p&gt;Suppose the very same movie studio also ensured that the DRM on its DVDs prevented customers from extracting video clips. If a teacher borrowed the film from a friend and then used circumvention technology to copy and paste video clips into her classroom presentation. This would not be considered an offence as she was only taking advantage of an exception meant for educational institutions.&lt;br /&gt;&lt;br /&gt;Suppose a security researcher suspected the DRM technology in network enabled gaming console contained spy-ware. He would have the right to circumvent the DRM and reverse engineer the source code of the console in order to audit the code for the existence of back-doors. This exception will also be used by law enforcement agencies and military/intelligence organisations to purge our supply-chain of electronic infrastructure of spy-ware.&lt;/p&gt;
&lt;p&gt;Finally assume a young entrepreneur from Bengaluru wanted to make a competing and yet interoperable product based on an existing product with global market penetration. Assume that the developers of the existing product used DRM to keep their source code and file format inaccessible to competitors. Again under the latest amendment our friend would have the right to circumvent the DRM as long as the code he write is not copied from the existing product.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/a2k/digital-restrictions-management'&gt;http://editors.cis-india.org/a2k/digital-restrictions-management&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Copyright</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2012-06-18T11:19:35Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/bangalore-mirror-march-29-2015-sunil-abraham-big-win-for-freedom-of-speech-really">
    <title>Big win for freedom of speech. Really?</title>
    <link>http://editors.cis-india.org/internet-governance/blog/bangalore-mirror-march-29-2015-sunil-abraham-big-win-for-freedom-of-speech-really</link>
    <description>
        &lt;b&gt;The 66A ruling was historic, but what about the provisions regulating speech online and offline that still exist within the ITA, the IPC and other laws.
&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in &lt;a class="external-link" href="http://www.bangaloremirror.com/columns/views/Big-win-for-freedom-of-speech-Really/articleshow/46730694.cms"&gt;Bangalore Mirror&lt;/a&gt; on March 29, 2015.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="advenueINTEXT"&gt;The &lt;i&gt;Shreya Singhal v.  Union of India&lt;/i&gt; ruling on the Information Technology Act 2000 (ITA) was  truly a historic moment in Indian free speech jurisprudence. Few  anticipated the striking down of the draconian Sec. 66A in its entirety,  for introducing additional unconstitutional limits to free speech  through its vague and imprecise language. The Supreme Court also read  down Sec. 79(3)(b) and the intermediary liability rules — requiring a  court order or a government notification to take down content and  relieving intermediaries of the responsibility for determining legality  of content. However, the court left the provision for website blocking,  69A, as it stood.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span id="advenueINTEXT"&gt;66A criminalised those  that use a computer resource or a communication device to send one of  the three classes of information listed below — some of which was  redundant as they were already offences under the IPC (sections  indicated in brackets below) or other sections of the ITA: &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span id="advenueINTEXT"&gt;Information that was grossly offensive or menacing in character;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;False information for causing annoyance, inconvenience, danger,  obstruction, insult, injury [44], criminal intimidation [506], enmity,  hatred [295A] or ill will.&lt;span&gt;&lt;span&gt;&lt;span id="advenueINTEXT"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span id="advenueINTEXT"&gt;Annoying or inconvenient message - to  deal spam OR to deceive or to mislead the addressee or recipient about  the origin of such messages - presumably for phishing, which  incidentally is dealt with more properly in Sec. 66D of ITA. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span id="advenueINTEXT"&gt;The regulatory vacuum  created by the striking down of 66A can be addressed by parliament by  ITA to reintroduce a well-crafted anti-spam provision that does not  infringe upon human rights.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span id="advenueINTEXT"&gt;The intermediary liability  section 79 and the associated rules were introduced to encourage free  speech by granting immunity to intermediaries for content created by  their users, unless they failed to act on take down notices. However,  this provision proved to have a chilling effect on free speech, with  risk-aversive intermediaries over-complying with takedown notices as  they were unable to distinguish between legal and illegal content.  Shreya Singhal solves half the problem - whether intermediaries decide  either to remove or retain content in response to take down notices sent  by non-government entities and individuals they remain immune from  liability. But government entities can continue to censor speech using  takedown notices without any oversight, transparency or adherence to the  principles of natural justice. The recently launched Manila Principles  developed by the CIS and others gives a more complete set of best  practices that could be used to fix Sec. 79 through an amendment. For  example - "abusive or bad take down notices should be penalized."&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span id="advenueINTEXT"&gt;Website-blocking under 69a  is mostly an opaque procedure as per the letter of the law as it does  not require the user to be informed [because the alternative of  informing the intermediary is deemed sufficient], and given a chance to  be heard, and a secrecy rule prevents all documentation related to the  procedure from being disclosed to the public. There is both an  optimistic and a pessimistic view on what the bench has said when it  upheld this section. Constitutional law expert Gautam Bhatia is of the  view that the judge has made informing the user mandatory and has also  overridden the secrecy provision by requiring a written order that can  be assailed through writ petitions. But a more pessimistic reading is  that the bench found the section constitutional and was satisfied with  the safeguards and was only reiterating the procedure in the judgment.  The trouble is the opacity of the procedure is worse than the current  text of the law - there is no evidence that users have ever been  notified and RTI requests for documentation related to block orders have  been rejected using the secrecy rule.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span id="advenueINTEXT"&gt;Does the striking down of  66A mean that speech on the internet is completely free and completely  unregulated? No, several provisions that regulate speech online and  offline still exist within the ITA, the IPC and other laws. Within the  ITA - infringing the privacy of individuals [ 66E], transmission of  obscene material [67], including sexually explicit material [Sec. 67A],  and also child pornography [67B], the Cyber Cafe Rules which require  intermediaries to install web filters.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span id="advenueINTEXT"&gt;In the IPC, several  sections regulate speech that define closely the intent and ingredients  required in a precise way, something 66A did not do. Sedition is defined  in Sec. 124A, with restrictions on speech in the case of causing  hatred, contempt or disaffection towards the state. Promoting enmity  between different groups on grounds of religion, race, place of birth,  residence, language etc is criminalised [153A], and imputations or  assertions prejudicial to national integration are also prohibited  [153B]. Certain restrictions on speech have also been made in terms of  protecting the privacy and dignity of individuals for ex. disclosure of a  victim's identity in sensitive cases [228], insulting the modesty of a  woman [509]. Defamation [499] and conduct intended to cause public  mischief by way of statements, rumours, reports [505] remain  criminalized; and in 2013 cyber stalking [354D] has also been added. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span id="advenueINTEXT"&gt;&lt;b&gt;[with inputs from Vidushi Marda] The author is the director of The Centre for Internet and Society&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/bangalore-mirror-march-29-2015-sunil-abraham-big-win-for-freedom-of-speech-really'&gt;http://editors.cis-india.org/internet-governance/blog/bangalore-mirror-march-29-2015-sunil-abraham-big-win-for-freedom-of-speech-really&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2015-03-29T01:20:51Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/big-brother-watching-you">
    <title>Big Brother is Watching You</title>
    <link>http://editors.cis-india.org/internet-governance/blog/big-brother-watching-you</link>
    <description>
        &lt;b&gt;The government is massively expanding its surveillance power over law-abiding citizens and businesses, says Sunil Abraham in this article published by the Deccan Herald on June 1, 2011.&lt;/b&gt;
        
&lt;p&gt;Imagine: An HIV positive woman calls a help-line from an ISD/STD booth. The booth operator can get to know who she called, when and for how long. But he would not have any idea on who she is or where she lives.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Now, instead of a phone call, imagine that she uses a cyber café to seek help on a website for HIV positive people. The cyber-cafe operator would have a copy of her ID – remember that many ID documents have phone numbers and addresses. He may then take her photograph using his own camera. One can only hope that he will take only a mug-shot without using the zoom lens inappropriately. He would also use a software – to log her Internet activities and make a reasonable guess on her HIV status.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The average Facebook page may have 50 different URLs to display the various images, animations and videos that are linked to that page. Each of those URLs would be stored, regardless of whether she scrolls down to see any of them.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The cyber-cafe operator is obliged under the Cyber Cafe rules to store this information for a period of one year. But there are no clear guidelines on when and how he should dispose of these logs. An unethical operator could leak the logs to a marketeer, a spammer, a neighbourhood Romeo or the local moral police. A careless operator maybe vulnerable to digital or physical theft and before you know it, such logs could end up on the Internet.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Ever since 26/11, cyber-cafes in metros have been photocopying ID documents – but so far not a single terrorist attack has been foiled or a crime solved thanks to this highly intrusive measure. But despite the lack of evidence to prove the efficacy of the current levels of surveillance, the government has decided to expand them exponentially.&lt;/p&gt;
&lt;p&gt;Imagine again: A media organisation such as Deccan Herald is investigating a public interest issue with the help of a whistle-blower or an anonymous informant. Deccan Herald reporters may think that by turning the encryption on when using Gmail or Hotmail they are protecting their source.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;But the ISP serving Deccan Herald is obliged by the license terms to log all traffic be it broadband, dial-up or mobile users passing through it. Again, there are no clear guidelines on when to delete these logs and none of the Indian ISPs publicly publish a data retention policy. Besides retaining data, the ISPs have to install real-time surveillance equipment within their network infrastructure and make them available for government officials. If a government official wants to track who is talking to Deccan Herald reporters, he just has to ask. &amp;nbsp;&lt;/p&gt;
&lt;p&gt;With ISPs and online service providers – all the police have to do is send an information request under Section 92 of the Code of Criminal Procedure. In other words, they don't even have to bother about a court order. Between January 2010 to June 2010 Google received 1,430 information requests from India. &amp;nbsp;Many other companies, for example, Microsoft, are not as transparent as Google about the state surveillance. So we will never know what they are subjected to.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;If the whistle-blower was using Blackberry, all traffic would be transferred from the device to the RIM's Network Operation Centre situated outside India in an encrypted tunnel before it travels onto the Internet. This prevents the government from learning which mail server is being used from the logs and surveillance equipment at the ISP premises. And that is why the government has been engaged in a five-year long public fight with RIM over access to Blackberry traffic.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Now, thanks to the IT Act, the government can demand the service providers, including RIM, to hand over the decryption keys by accusing any individual of a variety of vague offenses -- for example engaging in communication that is ‘grossly harmful’ or ‘harms minors in any way’ – &amp;nbsp;under the IT Act. Refusal to hand over the keys is punishable with a jail term of three years.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Finally, imagine that an Indian enterprise is developing trade-secrets or handling trade-secrets on behalf of their international partners. This enterprise is using a VPN or virtual private network for confidential digital communication. As per the ISP license all encryption above 40-bit is only permitted with written permission from DoT along with mandatory deposit of the decryption key.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In the age of wire-tap leaks, only a miniscule minority of international business partners would trust the government of India not to leak or misuse the keys that have been deposited with them. Most individuals, SMEs and large enterprises routinely use encryption higher than 40 bit strength. For example, Gmail uses128 bit and Skype uses 256 bit encryption. Many services use dynamic encryption, that is generate &amp;nbsp;different keys for each session.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;So far I have not heard of anyone who has actually secured permission or deposited the keys. In other words, the Indian enterprise has two choices – either break the law to protect business confidentiality or obey it and lose clients.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The IT Act (Amendment 2008) and its associated Rules, notified in April this year are a massive expansion of blanket surveillance on ordinary, law-abiding Indians. They represent a paradigm shift in surveillance and a significant dilution in privacy protections afforded to citizens under the Telegraph Act.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;This has terrifying consequences for our plural society, free media and businesses. Department of Information Technology in particular Dr. Gulshan Rai's office has so far only brushed aside these concerns and denied receiving feedback from the industry and civil society. If our media continues to ignore this clamp down on our civil liberties, we will soon have to furnish ID documents before purchasing thumb drives. After all, Bin Laden was found using them in his Abbottabad home.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Read the original &lt;a class="external-link" href="http://www.deccanherald.com/content/165420/big-brother-watching-you.html"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/big-brother-watching-you'&gt;http://editors.cis-india.org/internet-governance/blog/big-brother-watching-you&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-03-21T09:32:28Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/events/bangalore-chapter-meet-of-dsci-september-26-2015">
    <title>Bangalore Chapter Meet of DSCI</title>
    <link>http://editors.cis-india.org/internet-governance/events/bangalore-chapter-meet-of-dsci-september-26-2015</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS) will host the Bangalore Chapter Meeting of Data Security Council of India (DSCI) on September 26, 2015 at its Bangalore office in Domlur. The event will be held from 2.30 p.m. to 5.30 p.m.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;After the Nasscom cyber security task force meeting held at Wipro in June, followed by DSCI Best Practices meet in July, we now have the next chapter meeting at CIS.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Speakers&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The first speaker will be &lt;b&gt;Melissa Hathaway, Commissioner, Global Commission for Internet Governance&lt;/b&gt;. She is an internationally distinguished cyber security expert and has worked as cyber security adviser in two US Presidential Administrations, and is the former acting Senior Director for cyberspace at the National Security Council in the US. The topic she will be speaking on is "&lt;a href="http://editors.cis-india.org/internet-governance/blog/connected-choices" class="external-link"&gt;Connected Choices&lt;/a&gt;".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second speaker will be &lt;b&gt;Sunil Abraham, Executive Director, CIS&lt;/b&gt; (Center for internet &amp;amp; Society). Sunil is a renowned thought leader when it comes to internet governance, cyber space &amp;amp; its interface with civil society and actively contributes to DSCI and other forums. He will  be presenting on "&lt;a href="http://editors.cis-india.org/internet-governance/blog/anonymity-in-cyberspace" class="external-link"&gt;Anonymity in Cyberspace&lt;/a&gt;" - the SIG that he led over last 8 months along with a diverse group of members from the industry in Bangalore.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Agenda&lt;/h3&gt;
&lt;table class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Time&lt;/th&gt;&lt;th&gt;Topic&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2.30 p.m. - 2.45 p.m.&lt;/td&gt;
&lt;td&gt;Recent Developments and Updates from DSCI&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2.45 p.m. - 4.00 p.m.&lt;/td&gt;
&lt;td&gt;Srinivas P. (Anchor): DSCI Bangalore Chapter&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4.00 p.m. - 5.00 p.m.&lt;/td&gt;
&lt;td&gt;Melissa Hathaway: Connected Choices&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5.00 p.m. - 5.30 p.m.&lt;/td&gt;
&lt;td&gt;Sunil Abraham: Anonymity in Cyberspace&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;This will be followed by High Tea &amp;amp; Networking.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For participation, please send your email confirmation to Rajesh of Infosys at &lt;a class="mail-link" href="mailto:Rajesh_K18@infosys.com"&gt;Rajesh_K18@infosys.com&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since seats are limited, the participation will be restricted to first 50 confirmations. We had to organize it on a Saturday, due to Melissa’s availability – I’m sure many of you who know about her as expert security speaker, will not see weekend as a constraint to attend. Look forward to meeting you at CIS.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/events/bangalore-chapter-meet-of-dsci-september-26-2015'&gt;http://editors.cis-india.org/internet-governance/events/bangalore-chapter-meet-of-dsci-september-26-2015&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-09-09T01:40:56Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/accessibility/blog/availability-and-accessibility-of-government-information-in-public-domain">
    <title>Availability and Accessibility of Government Information in Public Domain</title>
    <link>http://editors.cis-india.org/accessibility/blog/availability-and-accessibility-of-government-information-in-public-domain</link>
    <description>
        &lt;b&gt;The information provided on most Government websites such as Acts, notifications, rules, orders, minutes of meetings and consultations, etc. is usually in the form of electronic documents. However, these lack authenticity and  accessibility and cannot be (text) searched., This policy brief identifies the problem areas with the current work flow being used to publish documents and proposes suitable modifications  to make them easy to locate, authentic and accessible.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Prepared by Sunil Abraham, Nirmita Narasimhan, Beliappa, and Anandhi Viswanathan and with inputs from Dipendra Manocha, Saksham, and Deepak Maheshwari, Symantec. Download the text as&lt;b&gt; &lt;a href="http://editors.cis-india.org/accessibility/blog/policy-brief-availability-accessibility-govt-information-public-domain.pdf" class="external-link"&gt;PDF here&lt;/a&gt;&lt;/b&gt;. (96 Kb)&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Problem Statement&lt;/b&gt;: The information published on most  government websites exist in the form of document files [including but  not limited to the Acts, Rules and Regulations, Government Orders and  Notifications, Consultation Papers, Reports etc.] which, even when  published, more often than not lack authenticity and accessibility and  cannot be (text) searched.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Analysis: The current workflow towards publishing documents on government websites is broadly as follows:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;The document is born digital – that means it is created on a computer.&lt;/li&gt;
&lt;li&gt;The document is printed.&lt;/li&gt;
&lt;li&gt;The document is stamped with the official seal and signed in ink by the authorized person(s).&lt;/li&gt;
&lt;li&gt;The paper document is scanned.&lt;/li&gt;
&lt;li&gt;The scanned image is converted into a PDF file.&lt;/li&gt;
&lt;li&gt;The document is uploaded on the website and thereby published in the public domain.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;In fact, at times, even gazette notifications and other printed documents are also scanned as images.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This approach has numerous problems, including the following:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;First and foremost, such a practice is against the letter and spirit of Section 4 (1) (a) of the Right to Information Act, 2005.&lt;a href="#fn1" name="fr1"&gt;[1] &lt;/a&gt;that inter alia, mandates every public authority to “maintain all its records duly catalogued and indexed in a manner and form which facilitates the right to information under this Act and ensure that all records that are appropriate to be computerised are, within a reasonable time and subject to availability of resources, computerised and connected through a network all over the country on different systems so that access to such records is facilitated”.&lt;/li&gt;
&lt;li&gt;This does not realize the enabling provision of the Information Technology Act, 2000&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt; which gives legal sanctity to digital signatures. The digital image of a physical signature is not a digital signature in the eye of the law, though at times it is mistakenly believed to be so.&lt;/li&gt;
&lt;li&gt;This does not address the problem of repudiation. That means a government official can say “I didn't sign that document” and there is no way to tell whether what he or she is saying is true. One of the key features of digital signatures is non-repudiability.&lt;/li&gt;
&lt;li&gt;Scanned images of printed text cannot be searched for specific text (character, word or phrase) even by people without disabilities but for people with disabilities, the documents become totally inaccessible since the accessibility software cannot parse such scanned images – against the underlying tenets and objectives of the National Universal Electronic Accessibility Policy 2013.&lt;a href="#fn3" name="fr3"&gt;[3] &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;As an extension, content of such documents cannot be indexed by search engines (such as Google, Bing and Raftaar, etc.) and hence, unlikely to be located even if technically the same are in the public domain.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Proposed Solution&lt;/b&gt;: The following work flow is proposed for publishing documents electronically on government websites:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;The document is born digital by preparing it in or through a computer system. Documents in Indian languages should be produced using Unicode based fonts.&lt;/li&gt;
&lt;li&gt;The government official authorized to sign the same, must sign it digitally.&lt;/li&gt;
&lt;li&gt;The document is uploaded in an open standard based format such as EPUB using a content management system and made available on the website such that it is available, accessible, indexable and searchable.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;This will ensure democratization of information in its truest sense – making available information to the public at large and ensuring that it can be easily located and remains accessible to one and all.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The process of formatting should be standardized in such a way that semantics (such as heading styles, lists and tables) can be added to the text of the document. The Web Style Guide provides information on good practices for creating well-structured documents:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Standardizing the formatting process by creating different templates for different types of documents will ensure uniform accessibility of the documents as well as provide a standard look and feel across government documents.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India became a global pioneer by making the legal provision for computerised, indexed and duly catalogued public records. It is high time that India takes the lead by living up to the legislative intent under the Right to Information Act, Information Technology Act and the National University of Educational Planning and Administration, and thereby establishes a global best practice.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Admittedly, legacy documents should also be converted electronically to accessible formats though before such a rendering, due editorial oversight may be necessary along with use of technologies such as Optical Character Recognition (OCR).&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. Government of India. The Right to Information Act, 2005. No. 22 of 2005. Retrieved on November 30, 2014 from &lt;a class="external-link" href="http://rti.gov.in/webactrti.htm"&gt;http://rti.gov.in/webactrti.htm&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. Government of India. The Information Technology Act, 2000. No. 21 of 2000. Retrieved on November 30, 2014 from &lt;a class="external-link" href="http://deity.gov.in/sites/upload_files/dit/files/downloads/itact2000/itbill2000.pdf"&gt;http://deity.gov.in/sites/upload_files/dit/files/downloads/itact2000/itbill2000.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. Government of India. National Policy on Universal Electronic Accessibility. 2013. Retrieved on November 30, 2014 from &lt;a class="external-link" href="http://deity.gov.in/sites/upload_files/dit/files/National Policy on Universal Electronics(1).pdf"&gt;http://deity.gov.in/sites/upload_files/dit/files/National Policy on Universal Electronics(1).pdf&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/accessibility/blog/availability-and-accessibility-of-government-information-in-public-domain'&gt;http://editors.cis-india.org/accessibility/blog/availability-and-accessibility-of-government-information-in-public-domain&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Government Information</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Digitisation</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2014-12-30T01:25:12Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/artificial-intelligence-a-full-spectrum-regulatory-challenge-working-draft">
    <title>Artificial Intelligence: a Full-Spectrum Regulatory Challenge [Working Draft]</title>
    <link>http://editors.cis-india.org/internet-governance/artificial-intelligence-a-full-spectrum-regulatory-challenge-working-draft</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
&lt;p&gt;Today, there are certain misconceptions regarding the regulation of AI. Some corporations would like us to believe that AI is being developed and used in a regulatory vacuum. Others in civil society organisations believe that AI is a regulatory circumvention strategy deployed by corporations. As a result, these organisations call for onerous regulations targeting corporations. However, some uses of AI by corporations can be completely benign and some uses AI by the state can result in the most egregious human rights violations. Therefore policy makers need to throw every regulatory tool from their arsenal to unlock the benefits of AI and mitigate its harms.&lt;/p&gt;
&lt;p&gt;This policy brief proposes a granular, full spectrum approach to the regulation of AI depending on who is using AI, who is impacted by that use and what human rights are impacted. Everything from deregulation, to forbearance, to updated regulations, to absolute and blanket prohibitions needs to be considered depending on the specifics. This approach stands in contrast to approaches of ethics, omnibus law, homogeneous principles, and human rights, which will result in inappropriate under-regulation or over-regulation of the sector.&lt;/p&gt;
&lt;p&gt;Find a copy of the working draft &lt;a href="http://editors.cis-india.org/internet-governance/artificial-intelligence-a-full-spectrum-regulatory-challenge-working-draft-pdf" class="internal-link" title="Artificial Intelligence: A Full-Spectrum Regulatory Challenge (Working Draft) PDF"&gt;here&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/artificial-intelligence-a-full-spectrum-regulatory-challenge-working-draft'&gt;http://editors.cis-india.org/internet-governance/artificial-intelligence-a-full-spectrum-regulatory-challenge-working-draft&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Regulatory Practices Lab</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Artificial Intelligence</dc:subject>
    

   <dc:date>2020-08-04T06:10:13Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/about/newsletters/april-2016-newsletter">
    <title>April 2016 Newsletter</title>
    <link>http://editors.cis-india.org/about/newsletters/april-2016-newsletter</link>
    <description>
        &lt;b&gt;Welcome to the CIS newsletter for April 2016. The key issues we worked on this month included the Aadhaar Act 2016, Standard Essential Patents, cyber security of smart grids, and involvement of international agencies in the smart cities project in India.&lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;Early last year, thanks to the fund raising efforts of a friend of CIS - Suhail Kazi, we received Rs. 1.9 lakhs as donations from 19 individuals. In January this year, we set up an online giving feature on our website which would ease the donation process, but we haven’t got a single donation so far! This could be because many of you may be under a false impression that CIS is very wealthy and does not need more support. Unfortunately, this is no longer true. Today, we are unable to find a single donor who is interested in our Accessibility, Telecom, or RAW programmes. In other words, we need your support. Would you to consider making a small donation to CIS? &lt;strong&gt;Click &lt;a href="http://imojo.in/CISDonations"&gt;here&lt;/a&gt; to donate.&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Previous issues of the newsletters can be accessed here: &lt;a href="http://cis-india.org/about/newsletters"&gt;http://cis-india.org/about/newsletters&lt;/a&gt;.&lt;/p&gt;
&lt;hr style="text-align: justify;" /&gt;
&lt;table style="text-align: justify;" class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Highlights&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;CIS prepared an &lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/aadhaar-project-and-bill-faq"&gt;FAQ on the Aadhaar / UIDAI project&lt;/a&gt; and the Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Bill, 2016. Further, two infographics were produced to highlight on the questions of "&lt;a href="http://cis-india.org/internet-governance/blog/can-the-aadhaar-act-2016-be-classified-as-a-money-bill"&gt;Can the Aadhaar Act 2016 be Classified as a Money Bill?&lt;/a&gt;" and "&lt;a href="http://cis-india.org/internet-governance/blog/can-matters-dealt-with-in-aadhaar-act-be-objects-of-money-bill"&gt;Can the Matters Dealt with in the Aadhaar Act be the Objects of a Money Bill?&lt;/a&gt;".&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;NVDA team &lt;a class="external-link" href="http://cis-india.org/accessibility/blog/april-2016-report/view"&gt;prepared a report&lt;/a&gt; on the progress of the project for the month of&amp;nbsp;April 2016.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;CIS submitted its &lt;a class="external-link" href="http://cis-india.org/a2k/blogs/comments-on-department-of-industrial-policy-and-promotion-discussion-paper-on-standard-essential-patents-and-their-availability-on-frand-terms"&gt;comments to the Department of Industrial Policy and Promotion's Discussion Paper&lt;/a&gt; on Standard Essential Patents and their Availability on FRAND Terms. CIS has offered its assistance on other matters aimed at developing a suitable policy framework for SEPs and FRAND in India, and, working towards the sustained innovation, manufacture and availability of mobile technologies in India. A summary of the comments can be &lt;a class="external-link" href="http://cis-india.org/a2k/blogs/summary-of-cis-comments-to-dipp2019s-discussion-paper-on-seps-and-their-availability-on-frand-terms"&gt;accessed here&lt;/a&gt;. Responses to the Discussion Paper is &lt;a class="external-link" href="http://cis-india.org/a2k/blogs/responses-to-the-dipps-discussion-paper-on-seps-and-their-availability-on-frand-terms"&gt;available here&lt;/a&gt;.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Rohini Lakshané's paper titled &lt;a class="external-link" href="http://cis-india.org/a2k/blogs/patents-and-mobile-devices-in-india-an-empirical-survey"&gt;Patents and Mobile Devices in India: An Empirical Survey&lt;/a&gt; has been accepted for publication by the Vanderbilt Journal of Transnational Law.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Kiran A.B. in a &lt;a class="external-link" href="http://cis-india.org/openness/monitoring-sustainable-development-goals-in-india-availability-and-openness-02"&gt;blog post has documented the availability and openness of data sets in India&lt;/a&gt; that are relevant for monitoring the targets under the SDGs.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Low-cost Aakash tablet and its previous iterations in India have gone through several phases of technological changes and ideological experiments wrote Sumandro Chattapadhyay and Jahnavi Phalkey &lt;a class="external-link" href="http://cis-india.org/raw/buying-into-the-aakash-dream"&gt;in an article published in the Economic and Political Weekly&lt;/a&gt;.&lt;/li&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;-----------------------------------&amp;nbsp;&lt;/strong&gt;&lt;br /&gt;&lt;a href="http://cis-india.org/news"&gt;CIS in the News&lt;/a&gt;&lt;br /&gt;&lt;strong&gt;-----------------------------------&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;CIS gave inputs to the following media coverage:&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/daily-mail-april-4-2016-afp-india-biometric-database-crosses-billion-member-mark"&gt;India's biometric database crosses billion-member mark&lt;/a&gt;&amp;nbsp;(AFP and Daily Mail, UK; April 4, 2016).&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/big-news-network-april-6-2016-claire-lauterbach-panama-papers-and-question-of-privacy"&gt;The Panama Papers and the question of privacy&lt;/a&gt;&amp;nbsp;(Big News Network; April 6, 2016). This was originally published by Privacyinternational.org.&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/economic-times-april-8-2016-neha-alawadhi-daunting-task-ahead-for-investigative-agencies-with-whatsapp-end-to-end-encryption"&gt;Daunting task ahead for investigative agencies with WhatsApp's end-to-end encryption&lt;/a&gt;&amp;nbsp;(Neha Alawadhi; Economic Times; April 8, 2016).&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/the-hindu-april-10-2016-somesh-jha-pmo-no-to-smart-cards-insists-aadhaar"&gt;PMO’s no to smart cards, insists on Aadhaar&lt;/a&gt;&amp;nbsp;(Somesh Jha; Hindu; April 10, 2016).&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/the-telegraph-april-10-2016-2014-showed-the-power-of-twitter"&gt;2014 showed the power of Twitter, now every Indian politician wants a handle&lt;/a&gt;&amp;nbsp;(T.V. Jayan, Smitha Verma,Sonia Sarkar and V. Kumara Swamy; Telegraph; April 10, 2016).&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/business-standard-alnoor-peermohamed-april-13-2016-why-is-uidai-cracking-down-on-individuals-that-hoard-aadhaar-data"&gt;Why is the UIDAI cracking down on individuals that hoard Aadhaar data?&lt;/a&gt;&amp;nbsp;(Alnoor Peermohamed; Business Standard; April 13, 2016).&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/governance-now-april-19-2016-you-will-need-a-license-to-create-whatsapp-group-in-kashmir"&gt;You will need a license to create a WhatsApp group in Kashmir&lt;/a&gt;&amp;nbsp;(Governance Now; April 19, 2016).&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/governance-now-april-23-2016-taru-bhatia-will-facebook-twitter-relocate-servers-to-india"&gt;Will Facebook, Twitter relocate servers to India?&lt;/a&gt;&amp;nbsp;(Taru Bhatia; Governance Now; April 23, 2016).&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/dna-amrita-madhukalya-april-23-2016-government-keeps-experts-out-of-cyber-security-discussions"&gt;Government keeps experts out of cyber security discussions&lt;/a&gt;&amp;nbsp;(Amrita Madhukalya; DNA; April 23, 2016).&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/the-times-of-india-raj-shekhar-arun-dev-v-narayan-a-selvaraj-cctv-plays-sherlock"&gt;CCTV plays Sherlock&lt;/a&gt;&amp;nbsp;(Raj Shekhar, Arun Dev, V Narayan &amp;amp; A Selvaraj with inputs from Sindhu Kannan and Somreet Bhattacharya; The Times of India; April 24, 2016).&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;p&gt;CIS members wrote the following pieces:&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;&lt;li style="text-align: justify;"&gt;Sunil Abraham wrote an&amp;nbsp;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/frontline-april-15-2016-sunil-abraham-surveillance-project"&gt;article in the July 15 edition of Frontline&lt;/a&gt;&amp;nbsp;arguing that the Aadhaar project’s technological design and architecture is an unmitigated disaster and no amount of legal fixes in the Act will make it any better.&amp;nbsp;&lt;/li&gt;&lt;li style="text-align: justify;"&gt;Amber Sinha wrote an article in The Wire arguing that&amp;nbsp;&lt;a href="http://cis-india.org/internet-governance/blog/the-aadhaar-act-is-not-a-money-bill"&gt;the Aaddhaar Act is not a money bill&lt;/a&gt;, and the Supreme Court may very well question the decision by the Lok Sabha speaker to classify it as such.&amp;nbsp;&lt;/li&gt;&lt;li style="text-align: justify;"&gt;Sumandro Chattapadhyay also wrote on The Wire arguing that "&lt;a href="http://cis-india.org/internet-governance/blog/the-last-chance-for-a-welfare-state-doesnt-rest-in-the-aadhaar-system"&gt;the last chance for a welfare state doesn’t rest in the Aadhaar system&lt;/a&gt;."&lt;/li&gt;&lt;li style="text-align: justify;"&gt;Subhashish Panigrahi's article on the&amp;nbsp;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/global-voices-april-27-2016-subhashish-panigrahi-eight-challenges-indian-language-wikipedias-need-to-overcome"&gt;8 challenges that Indian language Wikipedias have to overcome was published by Global Voices&lt;/a&gt;. The article had&amp;nbsp;earlier been&amp;nbsp;published in the Wire.&lt;/li&gt;&lt;li style="text-align: justify;"&gt;Elonnai Hickok and Vanya Rakesh co-authored an article on&amp;nbsp;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/dataquest-april-25-2016-vanya-rakesh-and-elonnai-hickok-cyber-security-of-smart-grids-in-india"&gt;Cyber Security of Smart Grids in India&lt;/a&gt;&amp;nbsp;that was published by Dataquest.&lt;/li&gt;&lt;li style="text-align: justify;"&gt;Shyam Ponappa&amp;nbsp;&lt;a class="external-link" href="http://cis-india.org/telecom/blog/business-standard-april-6-2016-shyam-ponappa-breakthroughs-needed-for-digital-india"&gt;in his monthly column&lt;/a&gt;&amp;nbsp;published in the Business Standard tell us that it's time the government accepts that current policies are not enough to bring about Digital India.&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;-------------------------------------&lt;br /&gt;&lt;a href="http://cis-india.org/accessibility"&gt;Accessibility &amp;amp; Inclusion&lt;/a&gt; &lt;br /&gt; ------------------------------------- 	&lt;br /&gt; India has an estimated 70 million persons with disabilities who don't have access to read printed materials due to some form of physical, sensory, 	cognitive or other disability. As part of our endeavour to make available accessible content for persons with disabilities, we are developing a text-to-speech software in 15 languages with support from the Hans Foundation. The progress made so far in the project can be accessed	&lt;a href="http://cis-india.org/accessibility/resources/nvda-text-to-speech-synthesizer"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;►NVDA and eSpeak&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/accessibility/blog/march-2016-report.pdf/view"&gt;March 2016 Report&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://editors.cis-india.org/accessibility/blog/april-2016-report" class="internal-link"&gt;April 2016 Report&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;----------------------------------- 	&lt;/strong&gt;&lt;br /&gt;&lt;a href="http://cis-india.org/a2k"&gt;Access to Knowledge&lt;/a&gt; &lt;br /&gt;&lt;strong&gt; ----------------------------------- 	&lt;/strong&gt;&lt;br /&gt;Our Access to Knowledge programme currently consists of two projects. The Pervasive Technologies project, conducted under a grant from the International Development Research Centre (IDRC), aims to conduct research on the complex interplay between low-cost pervasive technologies and intellectual property, in order to encourage the proliferation and development of such technologies as a social good. The Wikipedia project, which is under a 	grant from the Wikimedia Foundation, is for the growth of Indic language communities and projects by designing community collaborations and partnerships 	that recruit and cultivate new editors and explore innovative approaches to building projects.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;►Pervasive Technologies&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Comments&lt;/strong&gt;&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/comments-on-department-of-industrial-policy-and-promotion-discussion-paper-on-standard-essential-patents-and-their-availability-on-frand-terms"&gt;Comments on Department of Industrial Policy and Promotion Discussion Paper on Standard Essential Patents and their Availability on Frand Terms&lt;/a&gt; (Anubha Sinha, Nehaa Chaudhari and Rohini Lakshané; April 23, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/responses-to-the-dipps-discussion-paper-on-seps-and-their-availability-on-frand-terms"&gt;Responses to the DIPP's Discussion Paper on SEPs and their Availability on FRAND Terms&lt;/a&gt; (Anubha Sinha, Nehaa Chaudhari and Rohini Lakshané; April 23, 2016).&lt;/li&gt;
&lt;li&gt;
&lt;div id="_mcePaste"&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/summary-of-cis-comments-to-dipp2019s-discussion-paper-on-seps-and-their-availability-on-frand-terms"&gt;Summary of CIS Comments to DIPP’s Discussion Paper on SEPs and their availability on FRAND terms&lt;/a&gt; (Anubha Sinha; April 26, 2016).&lt;/div&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Blog Entries&lt;/strong&gt;&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/global-congress-2015"&gt;Global Congress 2015 - A Collection of Resources&lt;/a&gt; (Pervasive Technologies Team; April 1, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/compilation-of-mobile-phone-patent-litigation-cases-in-india"&gt;Compilation of Mobile Phone Patent Litigation Cases in India&lt;/a&gt; (Rohini Lakshané; updated on April 15, 2016). &lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/joining-the-dots-in-indias-big-ticket-mobile-phone-patent-litigation"&gt;Joining the Dots in India's Big-Ticket Mobile Phone Patent Litigation&lt;/a&gt; (Rohini Lakshané; updated on April 29, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/mhrd-ipr-chair-series-information-received-from-tezpur-university"&gt;MHRD IPR Chair Series: Information Received from Tezpur University&lt;/a&gt; (Karan Tripathi; April 26, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/sectoral-innovation-councils-on-intellectual-property-rights-2013-rti-requests-dipp-responses"&gt;National IPR Policy Series : Sectoral Innovation Councils on Intellectual Property Rights – RTI Requests + DIPP Responses&lt;/a&gt; (Nehaa Chaudhari and Saahil Dama; April 30, 2016). Nisha S. Kumar assisted in compilation of the document.&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Participation in Events&lt;/strong&gt;&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/news/fifth-annual-ip-teaching-workshop"&gt;Fifth Annual IP Teaching Workshop&lt;/a&gt; (Organised by the Centre for Innovation, Intellectual Property and Competition at National Law University Delhi in association with National Academy of Law Teaching, NLU-D; Delhi; March 31 and April 1, 2016). Nehaa Chaudhari was a speaker.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/news/first-round-table-on-innovation-ip-and-competition"&gt;First Round-table on Innovation, IP and Competition&lt;/a&gt; (Organized by the Centre for Innovation, Intellectual Property &amp;amp; Competition (CIIPC) at the National Law University, Delhi; India Habitat Centre; New Delhi; April 1-2, 2016). Nehaa Chaudhari and Anubha Sinha attended the round-table.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/news/brainstorming-workshop-on-pg-programme-on-media-studies-for-ugc-e-pathshala-programme"&gt;Brainstorming Workshop on PG Programme on Media Studies for UGC E-Pathshala Programme&lt;/a&gt; (Organized by Jamia Milla Islamia; New Delhi; April 5, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/news/sensitization-seminar-on-ipr-for-electronics-ict-sectors"&gt;Sensitization Seminar on IPR for Electronics &amp;amp; ICT Sectors&lt;/a&gt; (Organized by&amp;nbsp;Andhra Pradesh Technology Development &amp;amp; Promotion Centre (APTDC) of Confederation of Indian Industry (CII), in association with Department of Electronics and Information Technology (DeitY); Vishakhapatnam; April 21, 2016).&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;►Wikipedia&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;As part of the &lt;a href="http://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;project grant from the Wikimedia Foundation&lt;/a&gt; we have reached out to 	more than 3500 people across India by organizing more than 100 outreach events and catalysed the release of encyclopaedic and other content under the 	Creative Commons (CC-BY-3.0) license in four Indian languages (21 books in Telugu, 13 in Odia, 4 volumes of encyclopaedia in Konkani and 6 volumes in Kannada, and 1 book on Odia language history in English).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Work Plan&lt;/strong&gt;&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/blogs/cis-a2k-work-plan-july-2016-june-2017"&gt;CIS - A2K Work Plan: July 2016 - June 2017&lt;/a&gt; (CIS-A2K Team; April 2, 2016): We have revised the work plan template taking into account the changed proposal plan sent out by WMF and in light of the feedback that we have received from FDC assessment during last proposal application. The FDC feedback is taken into account at the level of design, RoI and ensuring quality for all our activities.&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Article&lt;/strong&gt;&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/blogs/global-voices-april-27-2016-subhashish-panigrahi-eight-challenges-indian-language-wikipedias-need-to-overcome"&gt;Eight Challenges Indian-Language Wikipedias Need to Overcome&lt;/a&gt; (Subhashish Panigrahi; Global Voices; April 21, 2016). &lt;strong&gt; &lt;/strong&gt;&lt;strong&gt;&lt;a href="http://thewire.in/2016/03/17/eight-challenges-that-indian-language-wikipedias-need-to-overcome-25062/" target="_blank"&gt;&lt;strong&gt;A version of this post&lt;/strong&gt;&lt;/a&gt;&lt;/strong&gt;&lt;strong&gt; was previously published on &lt;/strong&gt;&lt;strong&gt;&lt;a href="http://thewire.in/" target="_blank"&gt;&lt;strong&gt;The Wire&lt;/strong&gt;&lt;/a&gt;&lt;/strong&gt;&lt;strong&gt;.&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Media Coverage&lt;/strong&gt;&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/news/the-telegraph-april-7-2016-anwesha-ambaly-odia-gets-more-space-in-e-world"&gt;Odia gets more space in e-world&lt;/a&gt; (Anwesha Ambaly; The Telegraph; April 7, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/news/exercise-to-correct-articles-in-tulu-wikipedia-begins"&gt;Exercise to Correct articles in Tulu Wikipedia begins&lt;/a&gt; (Raviprasad Kamila; The Hindu; April 28, 2016).&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Event Organized&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/events/tulu-wikipedia-editathon-to-improve-quality-of-articles-in-tulu-wikipedia"&gt;Tulu Wikipedia Editathon to Improve Quality of Articles in Tulu Wikipedia&lt;/a&gt; (Shri Ramakrishna PU College; Mangaluru; April 26 - 30, 2016).&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;span style="text-align: justify;"&gt;&lt;strong&gt;-----------------------------------&lt;/strong&gt;&lt;br /&gt;&lt;/span&gt;&lt;a style="text-align: justify;" href="http://cis-india.org/openness"&gt;Openness&lt;br /&gt;&lt;/a&gt;&lt;span style="text-align: justify;"&gt;&lt;strong&gt;-----------------------------------&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;
&lt;div style="text-align: justify;"&gt;Our work in the Openness programme focuses on open data, especially open government data, open access, open education resources, open knowledge in Indic languages, open media, and open technologies and standards - hardware and software. We approach openness as a cross-cutting principle for knowledge production and distribution, and not as a thing-in-itself.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/openness/monitoring-sustainable-development-goals-in-india-availability-and-openness-02"&gt;Monitoring Sustainable Development Goals in India: Availability and Openness of Data&lt;/a&gt; (Part II) (Kiran A.B.; April 12, 2016).&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;&lt;strong&gt;----------------------------------- 	&lt;/strong&gt;&lt;br /&gt; &lt;a href="http://cis-india.org/internet-governance"&gt;Internet Governance&lt;/a&gt; &lt;br /&gt;&lt;strong&gt; -----------------------------------&lt;/strong&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;As part of its research on privacy and free speech, CIS is engaged with two different projects. The first one (under a grant from Privacy International and IDRC) is on surveillance and freedom of expression (SAFEGUARDS). The second one (under a grant from MacArthur Foundation) is on restrictions that the Indian government has placed on freedom of expression online.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;p style="text-align: justify;"&gt;►Cyber Security&lt;/p&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/dataquest-april-25-2016-vanya-rakesh-and-elonnai-hickok-cyber-security-of-smart-grids-in-india"&gt;Cyber Security of Smart Grids in India&lt;/a&gt; (Elonnai Hickok and Vanya Rakesh; April 25, 2016).&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;p style="text-align: justify;"&gt;►Big Data&lt;/p&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;Blog Entry&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/rti-on-smart-cities-mission-in-india"&gt;RTI regarding Smart Cities Mission in India&lt;/a&gt; (Paul Thottan; April 21, 2016).&lt;/li&gt;&lt;/ul&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;p style="text-align: justify;"&gt;►Privacy&lt;/p&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div&gt;&lt;strong&gt;Blog Entries&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/aadhaar-project-and-bill-faq"&gt;FAQ on the Aadhaar Project and the Bill&lt;/a&gt; (Elonnai Hickok, Vanya Rakesh, and Vipul Kharbanda; April 13, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/aadhaar-act-and-its-non-compliance-with-data-protection-law-in-india"&gt;Aadhaar Act and its Non-compliance with Data Protection Law in India&lt;/a&gt; (Vanya Rakesh; April 14, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/can-matters-dealt-with-in-aadhaar-act-be-objects-of-money-bill"&gt;Can the Matters Dealt with in the Aadhaar Act be the Objects of a Money Bill?&lt;/a&gt; (Pooja Saxena; April 24, 2016).&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;div style="text-align: justify;"&gt;&lt;strong&gt;Articles&lt;/strong&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/the-quint-march-31-2016-nehaa-chaudhari-will-aadhaar-act-address-indias-dire-need-for-a-privacy-law"&gt;Will Aadhaar Act Address India’s Dire Need For a Privacy Law?&lt;/a&gt; (Nehaa Chaudhari; Quint; March 31, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/the-last-chance-for-a-welfare-state-doesnt-rest-in-the-aadhaar-system"&gt;The Last Chance for a Welfare State Doesn’t Rest in the Aadhaar System&lt;/a&gt; (Sumandro Chattapadhyay; April 19, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/the-aadhaar-act-is-not-a-money-bill"&gt;The Aadhaar Act is Not a Money Bill&lt;/a&gt; (Amber Sinha; April 25, 2016).&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;p&gt;&lt;strong&gt;Participation in Events&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/rightscon-silicon-valley-2016"&gt;RightsCon Silicon Valley 2016&lt;/a&gt; (Organized by RightsCon; March 31 and April 1, 2016). Elonnai Hickok attended the event.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/panel-discussion-on-uid-aadhar-act-2016-and-its-impact-on-social-security"&gt;Panel Discussion on UID/ Aadhar act 2016 and its impact on Social, Security&lt;/a&gt; (Organized by Students Christian Movement of India at SCM House; Bangalore; April 25, 2016). Sunil Abraham was a panelist.&lt;/li&gt;
&lt;li&gt;The Centre for the Study of Law and Governance (CSLG), Jawaharlal Nehru University (JNU), organised a &lt;a href="http://cis-india.org/internet-governance/news/will-the-magic-number-deliver-aadhaar-cslg-26042016"&gt;roundtable discussion on Tuesday, April 26&lt;/a&gt;, to discuss the Aadhaar project and Act. Along with Prasanna S, Apar Gupta, and Dr. Chirashree Dasgupta, Sumandro Chattapadhyay was one of the discussants.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/aadhaar-by-numbers"&gt;Aadhaar by Numbers&lt;/a&gt; (Organized by National Institute of Public Finance and Policy; New Delhi; April 29, 2016). Sunil Abraham was a speaker.&lt;/li&gt;&lt;/ul&gt;
&lt;div style="text-align: justify;"&gt;&lt;strong&gt;----------------------------------- 	&lt;br /&gt;&lt;/strong&gt;&lt;a href="http://cis-india.org/telecom"&gt;Telecom&lt;/a&gt; &lt;br /&gt;&lt;strong&gt; ----------------------------------- &lt;/strong&gt;&lt;br /&gt; CIS is involved in promoting access and accessibility to telecommunications services and resources, and has provided inputs to ongoing policy discussions 	and consultation papers published by TRAI. It has prepared reports on unlicensed spectrum and accessibility of mobile phones for persons with disabilities 	and also works with the USOF to include funding projects for persons with disabilities in its mandate:&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;Article&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/telecom/blog/business-standard-april-6-2016-shyam-ponappa-breakthroughs-needed-for-digital-india"&gt;Breakthroughs Needed For Digital India&lt;/a&gt; (Shyam Ponappa; Business Standard; April 6, 2016 and Organizing India BlogSpot; April 7, 2016).&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;&lt;strong&gt;----------------------------------- 	&lt;br /&gt;&lt;/strong&gt;&lt;a href="http://cis-india.org/raw"&gt;Researchers at Work&lt;/a&gt; &lt;br /&gt;&lt;strong&gt; ----------------------------------- &lt;/strong&gt;&lt;br /&gt; The Researchers at Work (RAW) programme is an interdisciplinary research initiative driven by an emerging need to understand the reconfigurations of 	social practices and structures through the Internet and digital media technologies, and vice versa. It aims to produce local and contextual 	accounts of interactions, negotiations, and resolutions between the Internet, and socio-material and geo-political processes:&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Article&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/raw/buying-into-the-aakash-dream"&gt;Buying into the Aakash Dream - A Tablet’s Tale of Mass Education&lt;/a&gt; (Sumandro Chattapadhyay and Jahnavi Phalkey; Economic &amp;amp; Political Weekly; April 23, 2016). &lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;p&gt;Announcement&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/jobs/call-for-proposal-big-data-for-development-field-studies"&gt;Call for Proposal: Big Data for Development – Initial Field Studies&lt;/a&gt; (Sumandro Chattapadhyay; April 29, 2016).&lt;/li&gt;&lt;/ul&gt;
&lt;div style="text-align: justify;"&gt;
&lt;ul&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;p&gt;&lt;strong&gt;----------------------------------- 	&lt;/strong&gt;&lt;br /&gt;&lt;a href="http://cis-india.org/"&gt;About CIS&lt;/a&gt; &lt;br /&gt;&lt;strong&gt; ----------------------------------- &lt;/strong&gt;&lt;br /&gt; The Centre for Internet and Society (CIS) is a non-profit organisation that undertakes interdisciplinary research on internet and digital technologies from 	policy and academic perspectives. The areas of focus include digital accessibility for persons with diverse abilities, access to knowledge, intellectual 	property rights, openness (including open data, free and open source software, open standards, open access, open educational resources, and open video), 	internet governance, telecommunication reform, digital privacy, and cyber-security. The academic research at CIS seeks to understand the reconfigurations 	of social and cultural processes and structures as mediated through the internet and digital media technologies.&lt;/p&gt;
&lt;/div&gt;
&lt;p style="text-align: justify;"&gt;► Follow us elsewhere&lt;/p&gt;
&lt;div&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt; Twitter:&lt;a href="http://twitter.com/cis_india"&gt; http://twitter.com/cis_india&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Twitter - Access to Knowledge: &lt;a href="https://twitter.com/CISA2K"&gt;https://twitter.com/CISA2K&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Twitter - Information Policy: &lt;a href="https://twitter.com/CIS_InfoPolicy"&gt;https://twitter.com/CIS_InfoPolicy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt; Facebook - Access to Knowledge:&lt;a href="https://www.facebook.com/cisa2k"&gt; https://www.facebook.com/cisa2k&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; E-Mail - Access to Knowledge: &lt;a&gt;a2k@cis-india.org&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; E-Mail - Researchers at Work: &lt;a&gt;raw@cis-india.org&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; List - Researchers at Work: &lt;a href="https://lists.ghserv.net/mailman/listinfo/researchers"&gt;https://lists.ghserv.net/mailman/listinfo/researchers&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;div style="text-align: justify;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;p style="text-align: justify;"&gt;► Support Us&lt;/p&gt;
&lt;div&gt;
&lt;div style="text-align: justify;"&gt;Please help us defend consumer and citizen rights on the Internet! Write a cheque in favour of 'The Centre for Internet and Society' and mail it to us at No. 	194, 2nd 'C' Cross, Domlur, 2nd Stage, Bengaluru - 5600 71.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;p style="text-align: justify;"&gt;► Request for Collaboration&lt;/p&gt;
&lt;div&gt;
&lt;div style="text-align: justify;"&gt;We invite researchers, practitioners, artists, and theoreticians, both organisationally and as individuals, to engage with us on topics related internet 	and society, and improve our collective understanding of this field. To discuss such possibilities, please write to Sunil Abraham, Executive Director, at 	sunil@cis-india.org (for policy research), or Sumandro Chattapadhyay, Research Director, at sumandro@cis-india.org (for academic research), with an 	indication of the form and the content of the collaboration you might be interested in. To discuss collaborations on Indic language Wikipedia projects, 	write to Tanveer Hasan, Programme Officer, at &lt;a&gt;tanveer@cis-india.org&lt;/a&gt;.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;&lt;em&gt;CIS is grateful to its primary donor the Kusuma Trust founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin for its core funding and 	support for most of its projects. CIS is also grateful to its other donors, Wikimedia Foundation, Ford Foundation, Privacy International, UK, Hans 	Foundation, MacArthur Foundation, and IDRC for funding its various projects&lt;/em&gt;.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/about/newsletters/april-2016-newsletter'&gt;http://editors.cis-india.org/about/newsletters/april-2016-newsletter&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2016-05-10T06:26:09Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/anonymity-in-cyberspace">
    <title>Anonymity in Cyberspace</title>
    <link>http://editors.cis-india.org/internet-governance/blog/anonymity-in-cyberspace</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;While security threats require one to be identified in the Cyberspace,  on the other hand, the need for privacy and freedom of speech without  being targeted, calls for providing means for  anonymous browsing and  ability to express without being identified. Where do we draw the line ,  and how do we balance it? The group will dwell on need for anonymity in  various sectors such as government, commercial, employers etc. Apart  from security &amp;amp; privacy, the presentation will also cover social and technological perspectives.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/anonymity-in-cyberspace'&gt;http://editors.cis-india.org/internet-governance/blog/anonymity-in-cyberspace&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2015-09-09T01:31:03Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/about/substantive-areas/new-pedagogies/anonymity-and-privacy">
    <title>Anonymity and Privacy</title>
    <link>http://editors.cis-india.org/about/substantive-areas/new-pedagogies/anonymity-and-privacy</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
&lt;h3&gt;Context&lt;/h3&gt;
&lt;p align="justify"&gt;The
first two waves of cyberculture celebrated the anonymous conditions
within which the different actors in interaction were introjected in
different practices online. There was a significant attention given
to the nature of presence, absence, being, and the schism between the
corporeal and the digital bodies and reality.&lt;/p&gt;
&lt;p align="justify"&gt;However,
with an increased amount of State regulation, governance and
attention to the nature of life on the screen, the condition of
anonymity has quickly been replaced by a condition of pseudonymity.
The pseudonymous structures within cyberspace offer a world of
role-playing, fantasising and narrativisation that, while still
effective, are no longer merely in the domains of the aesthetic or
the performative but enter serious domains of legislation,
regulation, control, and politics.&lt;/p&gt;
&lt;p align="justify"&gt;New
modes of sanitising the behaviour of users online and the
construction of the ethical techno-social subject have led on one hand to some
very disturbing behaviour on the part of powerful agencies, and to strong political mobilisation and the advent of the public
sphere on the other. As the market, the State and the public all
inflect users to reiterate their physical boundaries and
geo-political status, it becomes interesting to see what role
anonymity still has to play online and what is the political
investment in being pseudonymous online.&lt;/p&gt;
&lt;h3&gt;Research Agenda&lt;/h3&gt;
&lt;ol&gt;&lt;li&gt;
&lt;p align="justify"&gt;With
	the increasing regulation of cyberspaces, are anonymous spaces being
	lost, and with them, the voices and the people that belonged to these
	spaces?&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;How
	do we sustain the paradox of safety in recognition on one hand and
	the safety in being invisible on the other?&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;Is
	the question of anonymity universal across different kinds of
	cyberspaces? With occurrences like the ‘Orkut Deaths’ and the
	‘National Emblems Defamation’ cases on the one hand and the
	construction of cyber-terrorism on the other, do we need to delve deeper into what it means to be anonymous online and the negotiations
	that one enters into when role-playing online?&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;The
	debates around anonymity often create an artificial distinction
	between the physical and the digital worlds, treating one as more
	authentic than the other. This aesthetic paradigm further enters
	debates around piracy, copying and the digital media. How do
	questions of authenticity and the construction of an ethical subject
	intersect with the debates around anonymity?&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;How
	does anonymity enable the demonisation of various cyberspatial
	practices? What are the kind of public education systems which
	should be in place so that we can find safety and freedom (often
	antithetical to each other) in cyberspaces without excessive control
	and regulation?&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;If
	anonymity is an inescapable condition of being online, how does it
	affect new forms of behaviour and community formations that we see
	in the contemporary urban?&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/about/substantive-areas/new-pedagogies/anonymity-and-privacy'&gt;http://editors.cis-india.org/about/substantive-areas/new-pedagogies/anonymity-and-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2009-01-26T09:42:08Z</dc:date>
   <dc:type>Page</dc:type>
   </item>




</rdf:RDF>
