You are here: Home
1026 items matching your search terms.
Filter the results.
Item type



















New items since



Sort by relevance · date (newest first) · alphabetically
Hammered government offers Virtual ID firewall to protect your Aadhaar
by Admin published Jan 16, 2018 last modified Jan 16, 2018 11:34 PM — filed under: , ,
Days after reports surfaced claiming security breaches, the Unique Identification Authority of India (UIDAI) on Wednesday announced the implementation of a new security protocol that would remove the need to divulge Aadhaar numbers during authentication processes and limit third-party access to KYC details.
Located in Internet Governance / News & Media
Blog Entry Health Data Management Policies - Differences Between the EU and India
by Shweta Mohandas published Jul 10, 2023 — filed under: , , , ,
Through this issue brief we would like to highlight the differences in approaches to health data management taken by the EU and India, and look at possible recommendations for India, in creating a privacy preserving health data management policy.
Located in Internet Governance / Blog
Blog Entry Here’s why we need a lot more discussion on India’s new DNA Profiling Bill
by Elonnai Hickok published Aug 21, 2017 — filed under: ,
The DNA Profiling Bill 2017 is still missing a number of safeguards that would enable individual rights. The implications of creating regional and national level DNA databanks need to be fully understood and publicly debated.
Located in Internet Governance / Blog
Blog Entry High Level Comparison and Analysis of the Use and Regulation of DNA Based Technology Bill 2017
by Elonnai Hickok published Aug 04, 2017 last modified Aug 11, 2017 02:16 AM — filed under: , , ,
This blog post seeks to provide a high level comparison of the 2017 and 2015 DNA Profiling Bill - calling out positive changes, remaining issues, and missing provisions.
Located in Internet Governance / Blog
HillHacks 2019
by Admin published Jun 05, 2019 — filed under: ,
Karan Saini was a speaker at HillHacks 2019 organized by HillHacks in Bir, Himachal Pradesh from May 24 to May 26, 2019.
Located in Internet Governance / News & Media
Blog Entry Holding ID Issuers Accountable, What Works?
by Shruti Trikanad and Amber Sinha published Aug 08, 2019 last modified Aug 08, 2019 10:23 AM — filed under: , , , ,
Located in Internet Governance / Blog
Blog Entry How Aadhaar compromises privacy? And how to fix it?
by Sunil Abraham published Mar 31, 2017 last modified Apr 01, 2017 07:00 AM — filed under: , , ,
Aadhaar is mass surveillance technology. Unlike targeted surveillance which is a good thing, and essential for national security and public order – mass surveillance undermines security. And while biometrics is appropriate for targeted surveillance by the state – it is wholly inappropriate for everyday transactions between the state and law abiding citizens.
Located in Internet Governance / Blog
How data privacy and governance issues have battered Facebook ahead of 2019 polls
by Admin published Dec 25, 2018 last modified Dec 25, 2018 01:43 AM — filed under: ,
Rohit S, an airline pilot, had enough of Facebook. With over 1,000 friends and part of at least a dozen groups on subjects ranging from planes to politics, the 34-year-old found himself constantly checking his phone for updates and plunging headlong into increasingly noisy debates, where he had little personal connect.
Located in Internet Governance / News & Media
Blog Entry How Facebook is Blatantly Abusing our Trust
by Nishant Shah published Jun 28, 2012 — filed under: ,
‘Don’t fix it, if it ain’t broken’ is not an adage Facebook seems to subscribe to. Nishant Shah's column on privacy and Facebook was published in First Post on June 27, 2012.
Located in Internet Governance
Blog Entry How Function Of State May Limit Informed Consent: Examining Clause 12 Of The Data Protection Bill
by Amber Sinha published Mar 01, 2022 — filed under: , , ,
The collective implication of leaving out ‘proportionality’ from Clause 12 is to provide very wide discretionary powers to the state.
Located in Internet Governance / Blog