You are here: Home
2975 items matching your search terms.
Filter the results.
Item type



















New items since



Sort by relevance · date (newest first) · alphabetically
Blog Entry GSMA Research Outputs
by Elonnai Hickok published Apr 04, 2015 last modified Apr 06, 2015 02:18 PM — filed under: , ,
This is a collection of research under our GSMA project that we have undertaken in collaboration with Privacy International. The research has sought to understand different legal and regulatory aspects of security and surveillance in India and consists of blog entries and reports. Any feedback or comment is welcome.
Located in Internet Governance / Blog
Blog Entry Guidelines for the Protection of National Critical Information Infrastructure: How Much Regulation?
by Jonathan Diamond published Jul 31, 2013 last modified Aug 01, 2013 04:48 AM — filed under: , ,
July has been a busy month for cyber security in India. Beginning with the release of the country’s first National Cyber Security Policy on July 2 and followed just this past week by a set of guidelines for the protection of national critical information infrastructure (CII) developed under the direction of the National Technical Research Organization (NTRO), India has made respectable progress in its thinking on national cyber security.
Located in Internet Governance / Blog
Guilty until Proven Innocent: Pirates, Pornographers, Terrorists and the IT Act in India
by Prasad Krishna published Jul 28, 2013 last modified Aug 28, 2013 10:19 AM — filed under: ,
The Research Center of Media and Communication at the University of Hamburg organized the Summer School 2013 at Hamburg, Germany from July 29 to August 2, 2013. Dr. Nishant Shah was a panelist in the session on "Guilty until Proven Innocent: Pirates, Pornographers, Terrorists and the IT Act in India".
Located in News & Media
Blog Entry Habeas Data in India
by Vipul Kharbanda and edited by Elonnai Hickok published Dec 10, 2016 last modified Dec 10, 2016 04:01 AM — filed under: , , ,
Habeas Data is a latin word which can be loosely translated to mean “have the data”. The right has been primarily conceptualized, designed, ratified, and implemented by various nation-states in the background of a shared common history of decades of torture, terror, and other repressive practices under military juntas and other fascist regimes.
Located in Internet Governance / Blog
Hack exposes Zomato's weak protection of customer data, say Cyber experts
by Prasad Krishna published May 19, 2017 — filed under: , ,
Online restaurant aggregator says it will beef up security after 17 million user details were stolen.
Located in Internet Governance / News & Media
Blog Entry Hack Night in CIS ― A Meeting of Java Script Hackers
by Tom Dane published Oct 10, 2011 last modified Oct 27, 2011 11:36 AM — filed under:
CIS hosted a hack night in conjunction with the tech-event organizers HasGeek at its office on 24 September 2011. The event brought together local java script hackers on a common platform. Tom Dane and Kiran Jonnalagadda participated in the event.
Located in Internet Governance
Hacker steals 17 million Zomato users’ data, briefly puts it on dark web
by Prasad Krishna published May 20, 2017 — filed under: , , ,
Records of 17 million users were stolen from online restaurant search platform Zomato, the company said in a blog post on Thursday.
Located in Internet Governance / News & Media
Hackers Take Protest to Indian Streets and Cyberspace
by Prasad Krishna published Jun 18, 2012 — filed under: , ,
First there was self-styled Gandhian activist Anna Hazare who took to the streets to protest corruption. Now a group agitating against censorship on the Internet has arrived in India.
Located in News & Media
Hacking of SIM card by spy agencies raises fears of sensitive documents being leaked
by Prasad Krishna published Feb 25, 2015 last modified Mar 09, 2015 01:31 AM — filed under:
The hacking of SIM-card and digital security services provider Gemalto by American and British spy agencies has raised fears that sensitive communications, by the Indian government and hundreds of domestic companies, may have been at the risk of being spied on.
Located in Internet Governance / News & Media
Blog Entry Hacking without borders: The future of artificial intelligence and surveillance
by Maria Xynou published Mar 15, 2013 last modified Jul 12, 2013 03:30 PM — filed under: , ,
In this post, Maria Xynou looks at some of DARPA´s artificial intelligence surveillance technologies in regards to the right to privacy and their potential future use in India.
Located in Internet Governance / Blog