You are here: Home
1026 items matching your search terms.
Filter the results.
Item type



















New items since



Sort by relevance · date (newest first) · alphabetically
Ahead of data protection law roll out, experts caution that it shouldn't limit collection and use of data
by Admin published Oct 12, 2017 last modified Jan 02, 2018 03:20 PM — filed under: ,
With India planning to roll out a new data protection regime following the landmark Supreme Court judgment upholding right to privacy as fundamental right, experts have cautioned that the new law should not limit collection and use of data.
Located in Internet Governance / News & Media
Blog Entry Fixing Aadhaar: Security developers' task is to trim chances of data breach
by Sunil Abraham published Jan 10, 2018 last modified Jan 10, 2018 04:47 PM — filed under: , ,
The task before a security developer is not only to reduce the probability of identity breach but to eliminate certain occurrences.
Located in Internet Governance / Blog
Is your personal information under lock and key?
by Admin published Jan 16, 2018 — filed under: , ,
Customers, be more careful about how you log in and log off!
Located in Internet Governance / News & Media
Bengaluru gives data safety tips to panel
by Admin published Jan 16, 2018 — filed under: , ,
A crucial consultation ahead of the framing of the country's data protection laws witnessed animated discussions here on Saturday.
Located in Internet Governance / News & Media
UIDAI's Virtual ID, limited KYC does little to protect Aadhaar data already collected, say critics
by Admin published Jan 16, 2018 — filed under: , ,
Aadhaar-issuing body, Unique Identification Authority of India (UIDAI), had barely started patting itself on the back for introducing the Virtual ID concept, what CEO Ajay Bhushan Pandey called "one of biggest recent innovations in this field", when detractors came crawling out of the woodwork, all guns blazing.
Located in Internet Governance / News & Media
Token security or tokenized security?
by Admin published Jan 17, 2018 — filed under: , ,
Implementing a system of tokenization for Aadhaar verification will address the security loopholes highlighted in recent reports.
Located in Internet Governance / News & Media
Aadhaar-privacy debate: How the 12-digit number went from personal identifier to all pervasive transaction tool
by Admin published Jan 18, 2018 last modified Jan 18, 2018 03:01 PM — filed under: , ,
Depending on who you ask, the Aadhaar is either a convenience or a curse.
Located in Internet Governance / News & Media
Blog Entry Data Protection: We can innovate, leapfrog
by Sunil Abraham published Jan 22, 2018 — filed under: , ,
About 27% of India's population is still illiterate or barely literate. Most privacy policies and terms of services for web and mobile applications are in English and therefore it is only 10% of us who can actually read them before we provide our consent.
Located in Internet Governance / Blog
Aadhaar's new security measures are good, it is still work in progress
by Admin published Jan 26, 2018 — filed under: , ,
Here's a rundown of the three new features that the UIDAI will introduce to make Aadhaar seemingly more secure.
Located in Internet Governance / News & Media
Blog Entry The Criminal Law Amendment Bill 2013 — Penalising 'Peeping Toms' and Other Privacy Issues
by Divij Joshi published Mar 31, 2013 last modified Jul 12, 2013 12:17 PM — filed under: ,
The pending amendments to the Indian Penal Code, if passed in their current format, would be a huge boost for individual physical privacy by criminalising stalking and sexually-tinted voyeurism and removing the ambiguities in Indian law which threaten the privacy and dignity of individuals.
Located in Internet Governance / Blog