-
RTI and Third Party Information: What Constitutes the Private and Public?
-
by
Noopur Raval
—
published
Jul 12, 2011
—
last modified
Nov 24, 2011 09:21 AM
—
filed under:
Internet Governance
The passing of the Right to Information Act, 2005 was seen as giving an empowering tool in the hands of the citizens of India, six years post its implementation, loopholes have surfaced with misuse of the many fundamental concepts, which have yet not been defined to allow for a consistent pattern of decisions. Among many problems that emerge with the Act, a major problem is defining the extent to which an individual has access to other people’s information. While most of us tend to think that asking for other people’s phone numbers, personal details like passport number or IT returns are private and would be kept so, under the RTI Act and as seen in the Central Information Commission (CIC) decisions, all of these details can be availed of by someone who doesn’t know you at all!
Located in
Internet Governance
/
Blog
-
Information and livelihoods
-
by
Radha Rao
—
published
Nov 18, 2009
—
last modified
Aug 02, 2011 07:18 AM
—
filed under:
Internet Governance
An article by Prof. Subbiah Arunachalam (Distinguished Fellow, CIS) in GISW 2009 (Global Information Society Watch, 2009)
Located in
Internet Governance
/
Blog
-
When Whistle Blowers Unite
-
by
Sunil Abraham
—
published
Jan 14, 2010
—
last modified
Mar 21, 2012 10:17 AM
—
filed under:
Digital Activism,
Internet Governance
Leaking corporate or government information in public interest through popular Web service providers is risky but Wikileaks.org is one option that you could try out.
Located in
Internet Governance
/
Blog
-
Sense and censorship
-
by
Sunil Abraham
—
published
Mar 30, 2010
—
last modified
Mar 21, 2012 10:15 AM
—
filed under:
Internet Governance
Sunil Abraham examines Google's crusade against censorship in China in wake of the attacks on its servers in this article published in the Indian Express.
Located in
Internet Governance
/
Blog
-
Report on the Fourth Internet Governance Forum for Commonwealth IGF
-
by
Pranesh Prakash
—
published
Feb 05, 2010
—
last modified
Feb 29, 2012 05:42 AM
—
filed under:
Internet Governance Forum,
Internet Governance
This report by Pranesh Prakash reflects on the question of how useful the IGF is in the light of meetings on the themes of intellectual property, freedom of speech and privacy.
Located in
Internet Governance
/
Blog
-
Does the Safe-Harbor Program Adequately Address Third Parties Online?
-
by
Rebecca Schild
—
published
Apr 16, 2010
—
last modified
Aug 02, 2011 07:19 AM
—
filed under:
Privacy,
Internet Governance,
Facebook,
Data Protection,
Social Networking
While many citizens outside of the US and EU benefit from the data privacy provisions the Safe Harbor Program, it remains unclear how successfully the program can govern privacy practices when third-parties continue to gain more rights over personal data. Using Facebook as a site of analysis, I will attempt to shed light on the deficiencies of the framework for addressing the complexity of data flows in the online ecosystem.
Located in
Internet Governance
/
Blog
-
Feedback to the NIA Bill
-
by
Elonnai Hickok
—
published
Jul 30, 2010
—
last modified
Mar 21, 2012 10:14 AM
—
filed under:
Submissions,
Internet Governance
Malavika Jayaram and Elonnai Hickok introduce the formal submission of CIS to the proposed National Identification Authority of India (NIA) Bill, 2010, which would give every resident a unique identity. The submissions contain the detailed comments on the draft bill and the high level summary of concerns with the NIA Bill submitted to the UIDAI on 13 July, 2010.
Located in
Internet Governance
/
Blog
-
Civil Liberties and the amended Information Technology Act, 2000
-
by
Malavika Jayaram
—
published
Aug 05, 2010
—
last modified
Mar 21, 2012 10:13 AM
—
filed under:
IT Act,
Internet Governance
This post examines certain limitations of the Information Technology Act, 2000 (as amended in 2008). Malavika Jayaram points out the fact that when most countries of the world are adopting plain English instead of the conventional legal terminology for better understanding, India seems to be stuck in the old-fashioned method thereby, struggling to maintain a balance between clarity and flexibility in drafting its laws. The present Act, she says, is although an improvement over the old Act and seeks to address and improve on certain areas in the right direction but still comes up short in making necessary changes when it comes to fundamental rights and personal liberties. The new Act retains elements from the previous one making it an abnormal document and this could have been averted if there had been some attention to detail.
Located in
Internet Governance
/
Blog
-
UID Project in India - Some Possible Ramifications
-
by
Liliyan
—
published
Aug 11, 2010
—
last modified
Mar 21, 2012 10:13 AM
—
filed under:
Internet Governance
Having a standard for decentralized ID verification rather than a centralized database that would more often than not be misused by various authorities will solve ID problems, writes Liliyan in this blog entry. These blog posts to be published in a series will voice the expert opinions of researchers and critics on the UID project and present its unique shortcomings to the reader.
Located in
Internet Governance
/
Blog
-
Does the Government want to enter our homes?
-
by
Sunil Abraham
—
published
Aug 13, 2010
—
last modified
Mar 21, 2012 10:12 AM
—
filed under:
Internet Governance
When rogue politicians and bureaucrats are granted unrestricted access to information then the very future of democracy and free media will be in jeopardy. In an article published in the Pune Mirror on 10 August, 2010, Sunil Abraham examines this in light of the BlackBerry-to-BlackBerry messenger service that the Government of India plans to block if its makers do not allow the monitoring of messages. He says that civil society should rather resist and insist on suitable checks and balances like governmental transparency and a fair judicial oversight instead of allowing the government to intrude into the privacy and civil liberties of its citizens.
Located in
Internet Governance
/
Blog