You are here: Home
2975 items matching your search terms.
Filter the results.
Item type



















New items since



Sort by relevance · date (newest first) · alphabetically
Blog Entry ISIS and Recruitment using Social Media – Roundtable Report
by Vidushi Marda, Aditya Tejus, Megha Nambiar and Japreet Grewal published Dec 15, 2016 last modified Dec 16, 2016 02:19 AM — filed under: , , , , , ,
The Centre for Internet and Society in collaboration with the Takshashila Institution held a roundtable discussion on “ISIS and Recruitment using Social Media” on 1 September 2016 from 5.00 p.m. to 7.30 p.m. at TERI in Bengaluru.
Located in Internet Governance / Blog
Blog Entry Protection of Privacy in Mobile Phone Apps
by Hitabhilash Mohanty and Edited by Leilah Elmokadem published Dec 15, 2016 — filed under: ,
The term “Fintech” refers to technology-based businesses that compete against, enable and/or collaborate with financial institutions. The year 2015 was a critical year for the Indian fintech industry, which saw the rise of numerous fintech start-ups, incubators and investments from the public and private sector.
Located in Internet Governance / Blog
Blog Entry Workshop Report - UIDAI and Welfare Services: Exclusion and Countermeasures
by Vanya Rakesh published Dec 14, 2016 last modified Mar 16, 2019 04:34 AM — filed under: , , , , , , , , , ,
This report presents summarised notes from a workshop organised by the Centre for Internet and Society (CIS) on Saturday, August 27, 2016, to discuss, raise awareness of, and devise countermeasures to exclusion due to implementation of UID-based verification for and distribution of welfare services.
Located in Internet Governance / Blog
Blog Entry Enlarging the Small Print: A Study on Designing Effective Privacy Notices for Mobile Applications
by Meera Manoj published Dec 14, 2016 last modified Dec 14, 2016 04:27 PM — filed under: ,
The Word’s biggest modern lie is often wholly considered to lie in the sentence “I haveread and agreed to the Terms and Conditions.” It is a well-known fact, backed by empirical research that consumers often skip reading cumbersome privacy notices. The reasons for these range from the lengthy nature, complicated legal jargon and inopportune moments when these notices are displayed. This paper seeks to compile and analyse the different simplified designs of privacy notices that have been proposed for mobile applications that encourage consumers to make informed privacy decisions.
Located in Internet Governance / Blog
Blog Entry CIS Submission to TRAI Consultation Note on Model for Nation-wide Interoperable and Scalable Public Wi-Fi Networks
by Japreet Grewal, Pranesh Prakash, Sharath Chandra, Sumandro Chattapadhyay, Sunil Abraham, and Udbhav Tiwari, with expert comments from Amelia Andersdotter published Dec 12, 2016 last modified Dec 12, 2016 01:59 PM — filed under: , , , , , , , ,
​This submission presents responses by the CIS on the ​Consultation Note on Model for Nation-wide Interoperable and Scalable Public Wi-Fi Networks published by the TRAI on November 15, 2016. Our analysis of the solution proposed in the Note, in brief, is that there is no need of a solution for non-existing interoperability problem for authentication and payment services for accessing public Wi-Fi networks. The proposed solution in this Note only adds to over-regulation in this sector, and does not incentivise new investment in the sector, but only establishes UIDAI and NPCI as the monopoly service providers for authentication and payment services.
Located in Telecom / Blog
Blog Entry Comments on the Draft National Policy on Software Products
by Anubha Sinha, Rohini Lakshané, and Udbhav Tiwari published Dec 11, 2016 last modified Dec 12, 2016 02:45 PM — filed under: , , , , ,
The Centre for Internet & Society submitted public comments to the Department of Electronics & Information Technology (DeitY), Ministry of Information & Communications Technology, Govt. of India on the National Policy of Software Products on December 9, 2016.
Located in Internet Governance / Blog
Vijay Mallya cries foul after his Twitter and email accounts are hacked
by Prasad Krishna published Dec 10, 2016 — filed under: ,
The attackers said they were able to access over a gigabyte of data from Mallya's email.
Located in Internet Governance
Bumpy road ahead for RFID Tags in vehicles
by Prasad Krishna published Dec 10, 2016 — filed under: ,
The government plans to make digital tags in vehicles mandatory to ensure seamless passage at the toll booths, but the implementation of the proposed move may not be so smooth.
Located in Internet Governance / News & Media
Fake Narendra Modi apps aplenty, but it’s up to users to protect themselves
by Prasad Krishna published Dec 10, 2016 last modified Dec 10, 2016 04:24 AM — filed under: , , ,
The app, hosted on Google Play store, automatically gets excessive permission including full network access and ability to take pictures and videos once downloaded.
Located in Internet Governance / News & Media
Blog Entry Habeas Data in India
by Vipul Kharbanda and edited by Elonnai Hickok published Dec 10, 2016 last modified Dec 10, 2016 04:01 AM — filed under: , , ,
Habeas Data is a latin word which can be loosely translated to mean “have the data”. The right has been primarily conceptualized, designed, ratified, and implemented by various nation-states in the background of a shared common history of decades of torture, terror, and other repressive practices under military juntas and other fascist regimes.
Located in Internet Governance / Blog