You are here: Home
1026 items matching your search terms.
Filter the results.
Item type



















New items since



Sort by relevance · date (newest first) · alphabetically
Chinese state media says U.S. should take some blame for cyber attack
by Prasad Krishna published May 21, 2017 last modified Jun 07, 2017 01:12 AM — filed under: ,
"WannaCry is far and away the most severe malware attack so far in 2017, and the spread of this troubling ransomware is far from over". Since the global attack was launched on Friday, several thousand more computers were discovered to be infected, particularly in Asia as the work day began on Monday. "We've seen that the slowdown of the infection rate over Friday night, after a temporary fix around it, has now been overcome by a second variation the criminals have released".
Located in Internet Governance / News & Media
Noida cyber cell gives tips on preventing WannaCry attack
by Prasad Krishna published May 20, 2017 last modified Jun 07, 2017 01:18 AM — filed under: ,
The attackers targeted a weakness found in older versions of Microsoft Windows.
Located in Internet Governance / News & Media
UIDAI asks Centre for Internet & Society to provide hacker details
by Prasad Krishna published May 18, 2017 last modified Jun 07, 2017 12:21 PM — filed under: , ,
The Unique Identification Authority of India (UIDAI), the regulatory authority for Aadhaar, has written to a Bengaluru-based research organisation, Centre for Internet & Society (CIS), seeking details about a suspected hack attack on government websites that led to the leak of information about 13 crore users.
Located in Internet Governance / News & Media
New rules for govt agencies to ensure security of personal data
by Prasad Krishna published Jun 07, 2017 — filed under: , ,
The new rules put the onus on government departments and agencies to safeguard personal data or information held by them.
Located in Internet Governance / News & Media
Privacy is culture specific, MNCs hit by Aadhaar, says TRAI chief
by Prasad Krishna published Jun 07, 2017 — filed under: , ,
A clutch of petitions filed by those opposing what they call the unchecked use of Aadhaar is currently in the Supreme Court.
Located in Internet Governance / News & Media
Explore money apps but watch your data
by Prasad Krishna published Jun 08, 2017 — filed under: ,
Financial apps may appear to be free but before you install them, read their privacy policies to know what you may be signing away.
Located in Internet Governance / News & Media
Short-Term Consultant Required: Events Coordinator
by Prasad Krishna published Mar 13, 2012 — filed under:
CIS wishes to commission the planning of 3 privacy meetings in total, scheduled during May and June. Meetings should be well-organized, planned and promoted effectively.
Located in News & Media
Blog Entry DNA Database for Missing Persons and Unidentified Dead Bodies
by Vipul Kharbanda published Oct 31, 2014 last modified Nov 04, 2014 03:46 PM — filed under: ,
This blog discusses the possible implications of the public interest litigation that has been placed before the Supreme Court petitioning for the establishment of a DNA database in respect to unidentified bodies.
Located in Internet Governance / Blog
Blog Entry Health Data Management Policies - Differences Between the EU and India
by Shweta Mohandas published Jul 10, 2023 — filed under: , , , ,
Through this issue brief we would like to highlight the differences in approaches to health data management taken by the EU and India, and look at possible recommendations for India, in creating a privacy preserving health data management policy.
Located in Internet Governance / Blog
Blog Entry Deceptive Design in Voice Interfaces: Impact on Inclusivity, Accessibility, and Privacy
by Saumyaa Naidu and Shweta Mohandas published Aug 08, 2023 — filed under: ,
This article was commissioned by the Pranava Institute, as part of their project titled Design Beyond Deception, supported by the University of Notre Dame - IBM's Tech Ethics Lab.” The article examines the design of voice interfaces (VI) to anticipate potential deceptive design patterns in VIs. It also presents design and regulatory recommendations to mitigate these practices.
Located in Internet Governance / Blog