You are here: Home
2977 items matching your search terms.
Filter the results.
Item type



















New items since



Sort by relevance · date (newest first) · alphabetically
Blog Entry Privacy and the Information Technology Act — Do we have the Safeguards for Electronic Privacy?
by Prashant Iyengar published Apr 07, 2011 last modified Dec 14, 2012 10:29 AM — filed under: ,
How do the provisions of the Information Technology Act measure up to the challenges of privacy infringement? Does it provide an adequate and useful safeguard for our electronic privacy? Prashant Iyengar gives a comprehensive analysis on whether and how the Act fulfils the challenges and needs through a series of FAQs while drawing upon real life examples.
Located in Internet Governance / Blog / Privacy
Blog Entry Consumer Privacy in e-Commerce
by Sahana Sarkar published Jul 23, 2011 last modified Mar 28, 2012 04:53 AM — filed under: ,
Looking at the larger picture of national security versus consumer privacy, Sahana Sarkar says that though consumer privacy is important in the world of digital technology, individuals must put aside some of their civil liberties when it comes to the question of national security, as it is necessary to prevent societal damage.
Located in Internet Governance / Blog / Privacy
Blog Entry Copyright Enforcement and Privacy in India
by Prashant Iyengar published Jun 14, 2011 last modified Dec 14, 2012 10:27 AM — filed under: ,
Copyright can function contradictorily, as both the vehicle for the preservation of privacy as well as its abuse, writes Prashant Iyengar. The research examines the various ways in which privacy has been implicated in the shifting terrain of copyright enforcement in India and concludes by examining the notion of the private that emerges from a tapestry view of the relevant sections of Copyright Act.
Located in Internet Governance / Blog / Privacy
Re-thinking Key Escrow
by Natasha Vaz published Aug 09, 2011 last modified Aug 22, 2011 11:44 AM — filed under: ,
Would you make duplicates of your house keys and hand them over to the local police authority? And if so, would you feel safe? Naturally, one would protest this invasion of privacy. Similarly, would it be justified for the government to have a copy of the private key to intercept and decrypt communications? This is the idea behind key escrow; it enables government ‘wiretapping’.
Located in Internet Governance / Blog / Privacy
CCTV in Universities
by Merlin Oommen published Aug 10, 2011 last modified Sep 01, 2011 09:50 AM — filed under: ,
Basic Closed Circuit Television (CCTV) Infrastructure is used to observe movements from a central room, and consists of one or more video cameras that transmit video and audio images to a set of monitors or video recorders.
Located in Internet Governance / Blog / Privacy
Managing Spectrum
by Radha Rao published Nov 05, 2009 last modified Aug 18, 2011 04:54 AM — filed under:
The Empowered Group of Ministers' goal should be nothing short of a broadband revolution - Shyam Ponappa / New Delhi, November 5, 2009 (Business Standard)
Located in Telecom / Blog
Blog Entry India’s ‘Self-Goal’ in Telecom
by Shyam Ponappa published Apr 09, 2020 — filed under: , ,
Located in Internet Governance
Workshop on Cyber-Ethics: Values-driven Innovative Solutions
by Admin published Jun 28, 2019 last modified Jul 06, 2019 12:51 AM — filed under: ,
Arindrajit Basu moderated a discussion on Cyber-Ethics at Swiss Nex (Consulate General of Switzerland, Bangalore on 28 June 2019. The event was organized by the Embassy of Switzerland.
Located in Internet Governance / News & Media
ICANN 65
by Admin published Jun 27, 2019 last modified Jul 06, 2019 01:08 AM — filed under: , ,
Akriti Bopanna attended ICANN 65 in Marrakech, Morocco from 24 - 27 June 2019.
Located in Internet Governance / News & Media
Interpreting the Outer Space Treaty's Non-Appropriation Principle: Customary International Law from 1967 to Today
by Admin published Jun 06, 2019 last modified Jul 06, 2019 03:17 AM — filed under:
Arindrajit Basu's research was quoted in the journal article authored by Abigail D. Pershing and published by Yale Journal of International Law.
Located in Internet Governance / News & Media