You are here: Home
2976 items matching your search terms.
Filter the results.
Item type



















New items since



Sort by relevance · date (newest first) · alphabetically
Blog Entry RTI and Third Party Information: What Constitutes the Private and Public?
by Noopur Raval published Jul 12, 2011 last modified Nov 24, 2011 09:21 AM — filed under:
The passing of the Right to Information Act, 2005 was seen as giving an empowering tool in the hands of the citizens of India, six years post its implementation, loopholes have surfaced with misuse of the many fundamental concepts, which have yet not been defined to allow for a consistent pattern of decisions. Among many problems that emerge with the Act, a major problem is defining the extent to which an individual has access to other people’s information. While most of us tend to think that asking for other people’s phone numbers, personal details like passport number or IT returns are private and would be kept so, under the RTI Act and as seen in the Central Information Commission (CIC) decisions, all of these details can be availed of by someone who doesn’t know you at all!
Located in Internet Governance / Blog
Information and livelihoods
by Radha Rao published Nov 18, 2009 last modified Aug 02, 2011 07:18 AM — filed under:
An article by Prof. Subbiah Arunachalam (Distinguished Fellow, CIS) in GISW 2009 (Global Information Society Watch, 2009)
Located in Internet Governance / Blog
Blog Entry When Whistle Blowers Unite
by Sunil Abraham published Jan 14, 2010 last modified Mar 21, 2012 10:17 AM — filed under: ,
Leaking corporate or government information in public interest through popular Web service providers is risky but Wikileaks.org is one option that you could try out.
Located in Internet Governance / Blog
Blog Entry Sense and censorship
by Sunil Abraham published Mar 30, 2010 last modified Mar 21, 2012 10:15 AM — filed under:
Sunil Abraham examines Google's crusade against censorship in China in wake of the attacks on its servers in this article published in the Indian Express.
Located in Internet Governance / Blog
Blog Entry Report on the Fourth Internet Governance Forum for Commonwealth IGF
by Pranesh Prakash published Feb 05, 2010 last modified Feb 29, 2012 05:42 AM — filed under: ,
This report by Pranesh Prakash reflects on the question of how useful the IGF is in the light of meetings on the themes of intellectual property, freedom of speech and privacy.
Located in Internet Governance / Blog
Does the Safe-Harbor Program Adequately Address Third Parties Online?
by Rebecca Schild published Apr 16, 2010 last modified Aug 02, 2011 07:19 AM — filed under: , , , ,
While many citizens outside of the US and EU benefit from the data privacy provisions the Safe Harbor Program, it remains unclear how successfully the program can govern privacy practices when third-parties continue to gain more rights over personal data. Using Facebook as a site of analysis, I will attempt to shed light on the deficiencies of the framework for addressing the complexity of data flows in the online ecosystem.
Located in Internet Governance / Blog
Blog Entry Feedback to the NIA Bill
by Elonnai Hickok published Jul 30, 2010 last modified Mar 21, 2012 10:14 AM — filed under: ,
Malavika Jayaram and Elonnai Hickok introduce the formal submission of CIS to the proposed National Identification Authority of India (NIA) Bill, 2010, which would give every resident a unique identity. The submissions contain the detailed comments on the draft bill and the high level summary of concerns with the NIA Bill submitted to the UIDAI on 13 July, 2010.
Located in Internet Governance / Blog
Blog Entry Civil Liberties and the amended Information Technology Act, 2000
by Malavika Jayaram published Aug 05, 2010 last modified Mar 21, 2012 10:13 AM — filed under: ,
This post examines certain limitations of the Information Technology Act, 2000 (as amended in 2008). Malavika Jayaram points out the fact that when most countries of the world are adopting plain English instead of the conventional legal terminology for better understanding, India seems to be stuck in the old-fashioned method thereby, struggling to maintain a balance between clarity and flexibility in drafting its laws. The present Act, she says, is although an improvement over the old Act and seeks to address and improve on certain areas in the right direction but still comes up short in making necessary changes when it comes to fundamental rights and personal liberties. The new Act retains elements from the previous one making it an abnormal document and this could have been averted if there had been some attention to detail.
Located in Internet Governance / Blog
Blog Entry UID Project in India - Some Possible Ramifications
by Liliyan published Aug 11, 2010 last modified Mar 21, 2012 10:13 AM — filed under:
Having a standard for decentralized ID verification rather than a centralized database that would more often than not be misused by various authorities will solve ID problems, writes Liliyan in this blog entry. These blog posts to be published in a series will voice the expert opinions of researchers and critics on the UID project and present its unique shortcomings to the reader.
Located in Internet Governance / Blog
Blog Entry Does the Government want to enter our homes?
by Sunil Abraham published Aug 13, 2010 last modified Mar 21, 2012 10:12 AM — filed under:
When rogue politicians and bureaucrats are granted unrestricted access to information then the very future of democracy and free media will be in jeopardy. In an article published in the Pune Mirror on 10 August, 2010, Sunil Abraham examines this in light of the BlackBerry-to-BlackBerry messenger service that the Government of India plans to block if its makers do not allow the monitoring of messages. He says that civil society should rather resist and insist on suitable checks and balances like governmental transparency and a fair judicial oversight instead of allowing the government to intrude into the privacy and civil liberties of its citizens.
Located in Internet Governance / Blog