You are here: Home
51 items matching your search terms.
Filter the results.
Item type



















New items since



Sort by relevance · date (newest first) · alphabetically
Blog Entry Report on the 3rd Privacy Round Table meeting
by Maria Xynou published May 21, 2013 last modified Jul 12, 2013 11:35 AM — filed under: , ,
This report entails an overview of the discussions and recommendations of the third Privacy Round Table meeting in Chennai, on 18th May 2013.
Located in Internet Governance / Blog
Blog Entry The Surveillance Industry in India: At Least 76 Companies Aiding Our Watchers!
by Maria Xynou published May 02, 2013 last modified Jul 12, 2013 11:59 AM — filed under: , ,
Maria Xynou is conducting research on surveillance technology companies operating in India. So far, 76 companies have been detected which are currently producing and selling different types of surveillance technology. This post entails primary data on the first ever investigation of the surveillance industry in India. Check it out!
Located in Internet Governance / Blog
Blog Entry Report on the 2nd Privacy Round Table meeting
by Maria Xynou published Apr 24, 2013 last modified Jul 12, 2013 11:54 AM — filed under: , ,
This post entails a report on the second Privacy Round Table meeting which took place on 20th April 2013.
Located in Internet Governance / Blog
Blog Entry Report on the 1st Privacy Round Table meeting
by Maria Xynou published Apr 22, 2013 last modified Jul 30, 2013 11:11 AM — filed under: , ,
This report entails an overview of the discussions and recommendations of the first Privacy Round Table meeting in New Delhi, on 13th April 2013.
Located in Internet Governance / Blog
Blog Entry Comments on the Information Technology (Electronic Service Delivery) Rules, 2011
by Bhairav Acharya published Mar 31, 2013 last modified Jul 12, 2013 12:12 PM — filed under: , ,
Bhairav Acharya on behalf of the Centre for Internet and Society prepared the following comments on the Information Technology (Electronic Services Delivery) Rules, 2011. These were submitted to the Committee on Subordinate Legislation of the 15th Lok Sabha. These were submitted to the Committee on Subordinate Legislation of the 15th Lok Sabha.
Located in Internet Governance / Blog
Blog Entry Comments on the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011
by Bhairav Acharya published Mar 31, 2013 last modified Jul 12, 2013 12:13 PM — filed under: , ,
Bhairav Acharya on behalf of the Centre for Internet and Society prepared the following comments on the Sensitive Personal Data Rules. These were submitted to the Committee on Subordinate Legislation of the 15th Lok Sabha.
Located in Internet Governance / Blog
Blog Entry Comments on the Information Technology (Guidelines for Cyber Cafe) Rules, 2011
by Bhairav Acharya published Mar 31, 2013 last modified Jul 12, 2013 12:15 PM — filed under: ,
Bhairav Acharya on behalf of the Centre for Internet and Society submitted the following comments on the Information Technology (Guidelines for Cyber Cafe Rules), 2011.
Located in Internet Governance / Blog
Blog Entry India's Biometric Identification Programs and Privacy Concerns
by Divij Joshi published Mar 31, 2013 last modified Jul 21, 2016 10:51 AM — filed under: , ,
The invasiveness of individual identification coupled with the fallibility of managing big data which biometric identification presents poses a huge risk to individual privacy in India.
Located in Internet Governance / Blog
Blog Entry Microsoft releases its first report on data requests by law enforcement agencies around the world
by Maria Xynou published Mar 27, 2013 last modified Jul 12, 2013 12:19 PM — filed under: ,
In this post, the Centre for Internet and Society presents Microsoft´s report on law enforcement requests, with a focus on data requested by Indian law enforcement agencies.
Located in Internet Governance / Blog
Blog Entry Driving in the Surveillance Society: Cameras, RFID tags and Black Boxes...
by Maria Xynou published Mar 26, 2013 last modified Jul 12, 2013 03:26 PM — filed under: , ,
In this post, Maria Xynou looks at red light cameras, RFID tags and black boxes used to monitor vehicles in India.
Located in Internet Governance / Blog