You are here: Home
2975 items matching your search terms.
Filter the results.
Item type



















New items since



Sort by relevance · date (newest first) · alphabetically
Why is the UIDAI cracking down on individuals that hoard Aadhaar data?
by Prasad Krishna published Apr 17, 2016 — filed under: , ,
Private firms' offer to print Aadhaar details on plastic card a breach of law.
Located in Internet Governance / News & Media
Blog Entry Online Censorship on the Rise: Why I Prefer to Save Things Offline
by Nishant Shah published Apr 17, 2016 last modified Jun 05, 2016 03:26 AM — filed under: ,
As governments use their power to erase what they do not approve of from the web, cloud storage will not be enough.
Located in Internet Governance / Blog
Blog Entry Aadhaar Act and its Non-compliance with Data Protection Law in India
by Vanya Rakesh published Apr 14, 2016 last modified Apr 18, 2016 11:43 AM — filed under: , , , , ,
This post compares the provisions of the Aadhaar Act, 2016, with India's data protection regime as articulated in the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011.
Located in Internet Governance / Blog
Blog Entry FAQ on the Aadhaar Project and the Bill
by Elonnai Hickok, Vanya Rakesh, and Vipul Kharbanda published Apr 13, 2016 last modified Apr 13, 2016 02:06 PM — filed under: , , , , , , ,
This FAQ attempts to address the key questions regarding the Aadhaar/UIDAI project and the Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Bill, 2016 (henceforth, Bill). This is neither a comprehensive list of questions, nor does it contain fully developed answers. We will continue to add questions to this list, and edit/expand the answers, based on our ongoing research. We will be grateful to receive your comments, criticisms, evidences, edits, suggestions for new answers, and any other responses. These can either be shared as comments in the document hosted on Google Drive, or via tweets sent to the information policy team at @CIS_InfoPolicy.
Located in Internet Governance / Blog
Daunting task ahead for investigative agencies with WhatsApp's end-to-end encryption
by Prasad Krishna published Apr 09, 2016 — filed under: ,
Messaging service WhatsApp's decision to roll out end-to-end encryption for over 1 billion subscribers has been hailed as a positive step by users across the world, although things are set to get tougher for law enforcement and investigative agencies in India seeking to track terrorists.
Located in Internet Governance / News & Media
India's biometric database crosses billion-member mark
by Prasad Krishna published Apr 07, 2016 — filed under: , ,
India's biometric database notched up one billion members on Monday, as the government sought to allay concerns about privacy breaches in the world's biggest such scheme.
Located in Internet Governance / News & Media
The Panama Papers and the question of privacy
by Prasad Krishna published Apr 06, 2016 last modified Apr 24, 2016 02:03 PM — filed under: ,
This statement was originally published on privacyinternational.org on 4 April 2016.
Located in Internet Governance / News & Media
Blog Entry Surveillance Project
by Sunil Abraham published Apr 05, 2016 — filed under: , ,
The Aadhaar project’s technological design and architecture is an unmitigated disaster and no amount of legal fixes in the Act will make it any better.
Located in Internet Governance / Blog
Blog Entry A Large Byte of Your Life
by Nishant Shah published Apr 03, 2016 last modified Jun 05, 2016 03:35 AM — filed under:
With the digital, memory becomes equated with storage. We commit to storage to free ourselves from remembering.
Located in Internet Governance / Blog
Blog Entry Mapping MAG: A study in Institutional Isomorphism
by Jyoti Panday published Apr 03, 2016 last modified Mar 03, 2017 12:59 AM — filed under:
The paper is an update to a shorter piece of MAG analysis that had been conducted in July 2015. At that time our analysis was limited by the MAG membership data that was made available by the Secretariat. Subsequently we wrote to the Secretariat and this paper is based on the data shared by them including for the years for which membership details were previously not available.
Located in Internet Governance / Blog