You are here: Home
1026 items matching your search terms.
Filter the results.
Item type



















New items since



Sort by relevance · date (newest first) · alphabetically
Fake Narendra Modi apps aplenty, but it’s up to users to protect themselves
by Prasad Krishna published Dec 10, 2016 last modified Dec 10, 2016 04:24 AM — filed under: , , ,
The app, hosted on Google Play store, automatically gets excessive permission including full network access and ability to take pictures and videos once downloaded.
Located in Internet Governance / News & Media
Bumpy road ahead for RFID Tags in vehicles
by Prasad Krishna published Dec 10, 2016 — filed under: ,
The government plans to make digital tags in vehicles mandatory to ensure seamless passage at the toll booths, but the implementation of the proposed move may not be so smooth.
Located in Internet Governance / News & Media
Blog Entry Enlarging the Small Print: A Study on Designing Effective Privacy Notices for Mobile Applications
by Meera Manoj published Dec 14, 2016 last modified Dec 14, 2016 04:27 PM — filed under: ,
The Word’s biggest modern lie is often wholly considered to lie in the sentence “I haveread and agreed to the Terms and Conditions.” It is a well-known fact, backed by empirical research that consumers often skip reading cumbersome privacy notices. The reasons for these range from the lengthy nature, complicated legal jargon and inopportune moments when these notices are displayed. This paper seeks to compile and analyse the different simplified designs of privacy notices that have been proposed for mobile applications that encourage consumers to make informed privacy decisions.
Located in Internet Governance / Blog
Blog Entry Protection of Privacy in Mobile Phone Apps
by Hitabhilash Mohanty and Edited by Leilah Elmokadem published Dec 15, 2016 — filed under: ,
The term “Fintech” refers to technology-based businesses that compete against, enable and/or collaborate with financial institutions. The year 2015 was a critical year for the Indian fintech industry, which saw the rise of numerous fintech start-ups, incubators and investments from the public and private sector.
Located in Internet Governance / Blog
Blog Entry Deep Packet Inspection: How it Works and its Impact on Privacy
by Amber Sinha published Dec 16, 2016 — filed under: ,
In the last few years, there has been extensive debate and discussion around network neutrality in India. The online campaign in favor of Network Neutrality was led by Savetheinternet.in in India. The campaign was a spectacular success and facilitated sending over a million emails supporting the cause of network neutrality, eventually leading to ban on differential pricing. Following in the footsteps of the Shreya Singhal judgement, the fact that the issue of net neutrality has managed to attract wide public attention is an encouraging sign for a free and open Internet in India. Since the debate has been focused largely on zero rating, other kinds of network practices impacting network neutrality have yet to be comprehensively explored in the Indian context, nor their impact on other values. In this article, the author focuses on network management, in general, and deep packet inspection, in particular and how it impacts the privacy of users.
Located in Internet Governance / Blog
Multistakeholder Consultation on Encryption
by Prasad Krishna published Dec 17, 2016 — filed under: , ,
The Centre for Internet & Society (CIS) in collaboration with ORF and Takshashila Institution is organizing a Multi-Stakeholder Consultation on Encryption on December 17, 2016 at TERI in Bengaluru.
Located in Internet Governance / Events
How private companies are using Aadhaar to try to deliver better services (but there's a catch)
by Prasad Krishna published Dec 23, 2016 last modified Dec 23, 2016 02:04 AM — filed under: , ,
They are gathering more information on you.
Located in Internet Governance / News & Media
Blog Entry Incident Response Requirements in Indian Law
by Vipul Kharbanda published Dec 28, 2016 last modified Dec 28, 2016 01:19 AM — filed under: , ,
Cyber incidents have serious consequences for societies, nations, and those who are victimised by them. The theft, exploitation, exposure or otherwise damage of private, financial, or other sensitive personal or commercial data and cyber attacks that damage computer systems are capable of causing lasting harm.
Located in Internet Governance / Blog
Discussion on Ranking Digital Rights in India (Delhi, January 07)
by Amber Sinha published Dec 29, 2016 last modified Dec 29, 2016 07:07 AM — filed under: , , , ,
Towards developing an understanding of how Indian ICT companies are recognising and upholding digital rights of their users, and to raise public awareness about the same, the Center for Internet and Society (CIS), with the support of Privacy International, has studied 8 Indian ICT companies, using the same methodology as the 2015 Corporate Accountability Index, to gain greater insight into company practices and initiate public dialogues. Please join us on Saturday, January 07, at the India Islamic Cultural Centre, New Delhi, for a presentation of our findings followed by an open structured discussion on the methodology and implications of the study.
Located in Internet Governance / Events
Blog Entry Comments on the Report of the Committee on Digital Payments (December 2016)
by Sumandro Chattapadhyay and Amber Sinha published Jan 12, 2017 last modified Jan 12, 2017 12:32 PM — filed under: , , , , , , , , , , , , , , ,
The Committee on Digital Payments constituted by the Ministry of Finance and chaired by Ratan P. Watal, Principal Advisor, NITI Aayog, submitted its report on the "Medium Term Recommendations to Strengthen Digital Payments Ecosystem" on December 09, 2016. The report was made public on December 27, and comments were sought from the general public. Here are the comments submitted by the Centre for Internet and Society.
Located in Internet Governance / Blog