You are here: Home
1026 items matching your search terms.
Filter the results.
Item type



















New items since



Sort by relevance · date (newest first) · alphabetically
Blog Entry Are we Losing the Right to Privacy and Freedom of Speech on Indian Internet?
by Amber Sinha published Mar 10, 2016 last modified Mar 16, 2016 02:44 PM — filed under: , , ,
The article was published in DNA on March 10, 2016.
Located in Internet Governance / Blog
Blog Entry Aadhaar Bill fails to incorporate suggestions by the Standing Committee
by Amber Sinha published Mar 10, 2016 last modified Mar 10, 2016 03:58 PM — filed under: , , ,
In 2011, a standing committee report led by Yashwant Sinha had been scathing in its indictments of the Aadhaar BIll introduced by the UPA government. Five years later, the NDA government has introduced a new bill which is a rehash of the same. I look at the concerns raised by the committee report, none of which have been addressed by the new bill.
Located in Internet Governance / Blog
Blog Entry Aadhaar Bill 2016 & NIAI Bill 2010 - Comparing the Texts
by Sumandro Chattapadhyay published Mar 09, 2016 last modified Mar 09, 2016 11:25 AM — filed under: , , ,
This is a quick comparison of the texts of the Aadhaar Bill 2016 and the National Identification Authority of India Bill 2010. The new sections in the former are highlighed, and the deleted sections (that were part of the latter) are struck out.
Located in Internet Governance / Blog
Blog Entry Aadhaar: Still Too Many Problems
by Pranesh Prakash published Mar 07, 2016 last modified Apr 06, 2016 03:31 PM — filed under: , ,
While one wishes to welcome govt’s attempt to bring Aadhaar within a legislative framework, the fact is there are too many problems that still remain unaddressed for one to be optimistic.
Located in Internet Governance / Blog
Blog Entry Flaws in the UIDAI Process
by Hans Varghese Mathews published Mar 06, 2016 last modified Mar 06, 2016 10:40 AM — filed under: , , , , ,
The accuracy of biometric identification depends on the chance of a false positive: the probability that the identifiers of two persons will match. Individuals whose identifiers match might be termed duplicands. When very many people are to be identified success can be measured by the (low) proportion of duplicands. The Government of India is engaged upon biometrically identifying the entire population of India. An experiment performed at an early stage of the programme has allowed us to estimate the chance of a false positive: and from that to estimate the proportion of duplicands. For the current population of 1.2 billion the expected proportion of duplicands is 1/121, a ratio which is far too high.
Located in Internet Governance / Blog
Blog Entry Sean McDonald - Ebola: A Big Data Disaster
by Sumandro Chattapadhyay published Mar 01, 2016 last modified Apr 21, 2016 09:57 AM — filed under: , , , , , ,
We are proud to initiate the CIS Papers series with a fascinating exploration of humanitarian use of big data and its discontents by Sean McDonald, FrontlineSMS, in the context of utilisation of Call Detail Records for public health response during the Ebola crisis in Liberia. The paper highlights the absence of a dialogue around the significant legal risks posed by the collection, use, and international transfer of personally identifiable data and humanitarian information, and the grey areas around assumptions of public good. The paper calls for a critical discussion around the experimental nature of data modeling in emergency response due to mismanagement of information has been largely emphasized to protect the contours of human rights.
Located in Papers
Blog Entry Comments by the Centre for Internet and Society on the Report of the Committee on Medium Term Path on Financial Inclusion
by Vipul Kharbanda published Feb 27, 2016 last modified Mar 01, 2016 01:53 PM — filed under: , , , , ,
Apart from item-specific suggestions, CIS would like to make one broad comment with regard to the suggestions dealing with linking of Aadhaar numbers with bank accounts. Aadhaar is increasingly being used by the government in various departments as a means to prevent fraud, however there is a serious dearth of evidence to suggest that Aadhaar linkage actually prevents leakages in government schemes. The same argument would be applicable when Aadhaar numbers are sought to be utilized to prevent leakages in the banking sector.
Located in Internet Governance / Blog
Netizen Report: The EU Wrestles With Facebook Over Privacy
by Prasad Krishna published Feb 27, 2016 — filed under: ,
Global Voices Advocacy's Netizen Report offers an international snapshot of challenges, victories, and emerging trends in Internet rights around the world.
Located in Internet Governance / News & Media
Blog Entry A Case for Greater Privacy Paternalism?
by Amber Sinha published Feb 14, 2016 last modified Feb 20, 2016 07:28 AM — filed under: ,
This is the second part of a series of three articles exploring the issues with the privacy self management framework and potential alternatives.
Located in Internet Governance / Blog
Blog Entry Open Data Hackathons are Great, but Address Privacy and License Concerns
by Sumandro Chattapadhyay published Feb 05, 2016 last modified Feb 05, 2016 08:37 PM — filed under: , , , , ,
This is to cross-publish a blog post from DataMeet website regarding a letter shared with the organisers of Urban Hack 2015, Bangalore, in response to a set of privacy and license concerns identified and voiced during the hackathon by DataMeet members. Sumandro Chattapadhyay co-authored and co-signed the letter. The blog post is written by Nisha Thompson.
Located in Openness