You are here: Home
2975 items matching your search terms.
Filter the results.
Item type



















New items since



Sort by relevance · date (newest first) · alphabetically
How does the government track all its legal cases?
by Prasad Krishna published Sep 14, 2016 — filed under: ,
The Legal Information Management and Briefing System , an integral part of the digital India initiative, aims to be a database of all the ongoing cases with the government.
Located in Internet Governance / News & Media
Blog Entry How Facebook is Blatantly Abusing our Trust
by Nishant Shah published Jun 28, 2012 — filed under: ,
‘Don’t fix it, if it ain’t broken’ is not an adage Facebook seems to subscribe to. Nishant Shah's column on privacy and Facebook was published in First Post on June 27, 2012.
Located in Internet Governance
Blog Entry How Function Of State May Limit Informed Consent: Examining Clause 12 Of The Data Protection Bill
by Amber Sinha published Mar 01, 2022 — filed under: , , ,
The collective implication of leaving out ‘proportionality’ from Clause 12 is to provide very wide discretionary powers to the state.
Located in Internet Governance / Blog
Blog Entry How India Makes E-books Easier to Ban than Books (And How We Can Change That)
by Pranesh Prakash published Jan 24, 2012 last modified Feb 21, 2012 11:50 AM — filed under: , , , , ,
Without getting into questions of what should and should not be unlawful speech, Pranesh Prakash chooses to take a look at how Indian law promotes arbitrary removal and blocking of websites, website content, and online services, and how it makes it much easier than getting offline printed speech removed.
Located in Internet Governance / Blog
Blog Entry How India Regulates Encryption
by Pranesh Prakash & Japreet Grewal published Oct 30, 2015 last modified Jul 23, 2016 01:24 PM — filed under: ,
Located in Internet Governance / Blog
How ISPs block websites and why it doesn’t help
by Prasad Krishna published Aug 25, 2012 — filed under: , , ,
Banning websites is ineffective against malicious users as workarounds are easy and well known.
Located in News & Media
Blog Entry How Long Have Banks Known About The Debit Card Fraud?
by tiwari published Oct 22, 2016 — filed under: , ,
The recent security breach in an Indian payment switch provider, confirmed earlier this week by the National Payments Corporation of India Ltd (NPCIL), has forced domestic banks into damage control mode over the past few days.
Located in Internet Governance / Blog
Blog Entry How Media beat the Shutdown in Darjeeling
by Manish Adhikary published Dec 19, 2017 — filed under: ,
Strap:Journalists did what the state was expected to do: fight rumours.
Located in Internet Governance / Blog
How Next-Gen Smartphone Users are Being Bought and Sold
by Prasad Krishna published Aug 19, 2013 last modified Sep 05, 2013 10:48 AM — filed under: ,
After facebook and google, Twitter became the latest to buy millions of Indian smartphone users in July.
Located in News & Media
Blog Entry How privacy fares in the 2019 election manifestos | Opinion
by Aayush Rathi and Ambika Tandon published May 02, 2019 — filed under: ,
We now have a rights-based language around privacy in the mainstream political discourse but that’s where it ends.
Located in Internet Governance / Blog