You are here: Home
115 items matching your search terms.
Filter the results.
Item type



















New items since



Sort by relevance · date (newest first) · alphabetically
Encryption policy would have affected emails, operating systems, WiFi
by Prasad Krishna published Sep 25, 2015 — filed under: ,
Our email data would have to be stored. If we connect to a WiFi, that data would have to be stored, and that's plain ridiculous. There is a problem when the government tries to target citizens to ensure national security, said Pranesh Prakash, policy director at the Bangalore-based Centre for Internet and Society.
Located in Internet Governance / News & Media
Blog Entry Internet Rights and Wrongs
by Pranesh Prakash published Sep 22, 2016 — filed under: , , ,
With a rise in PIL's for unwarranted censorship, do we need to step back and inspect if it's about time unreasonable trends are checked?
Located in Internet Governance / Blog
Blog Entry Privacy after Big Data: Compilation of Early Research
by Saumyaa Naidu published Nov 12, 2016 last modified Nov 12, 2016 01:37 AM — filed under: , , , , , , , ,
Evolving data science, technologies, techniques, and practices, including big data, are enabling shifts in how the public and private sectors carry out their functions and responsibilities, deliver services, and facilitate innovative production and service models to emerge. In this compilation we have put together a series of articles that we have developed as we explore the impacts – positive and negative – of big data. This is a growing body of research that we are exploring and is relevant to multiple areas of our work including privacy and surveillance. Feedback and comments on the compilation are welcome and appreciated.
Located in Internet Governance / Blog
Blog Entry Is India’s website-blocking law constitutional? – I. Law & procedure
by Geetha Hariharan published Dec 11, 2014 last modified Dec 11, 2014 11:02 AM — filed under: , ,
Section 69A of the Information Technology Act, 2000, along with its corresponding Rules, set out the procedure for blocking of websites in India. Over two posts, Geetha Hariharan examines the constitutional validity of Section 69A and the Blocking Rules.
Located in Internet Governance / Blog
Blog Entry Overview of the Constitutional Challenges to the IT Act
by Pranesh Prakash published Dec 15, 2014 last modified Dec 19, 2014 09:01 AM — filed under: , , , , , , , ,
There are currently ten cases before the Supreme Court challenging various provisions of the Information Technology Act, the rules made under that, and other laws, that are being heard jointly. Advocate Gopal Sankaranarayanan who's arguing Anoop M.K. v. Union of India has put together this chart that helps you track what's being challenged in each case.
Located in Internet Governance / Blog
Guilty until Proven Innocent: Pirates, Pornographers, Terrorists and the IT Act in India
by Prasad Krishna published Jul 28, 2013 last modified Aug 28, 2013 10:19 AM — filed under: ,
The Research Center of Media and Communication at the University of Hamburg organized the Summer School 2013 at Hamburg, Germany from July 29 to August 2, 2013. Dr. Nishant Shah was a panelist in the session on "Guilty until Proven Innocent: Pirates, Pornographers, Terrorists and the IT Act in India".
Located in News & Media
Details emerge on government blockade of websites
by Prasad Krishna published Aug 28, 2012 — filed under: , , , , ,
Facebook pages, Twitter handles among 300 unique web addresses blocked by ISPs.
Located in News & Media
Government to hold talks with stakeholders on Internet censorship
by Prasad Krishna published Sep 04, 2012 — filed under: , , , , ,
In an unprecedented move, the government, through the Department of Telecommunications and the Department of Electronics and Information Technology, has agreed to initiate dialogue on Internet censorship with mega Internet companies, social media giants such as Google and Facebook, members of civil society, technical community, media, ISPs and legal experts.
Located in News & Media
Section 43 of the Information Technology Act
by Pranesh Prakash published Jun 07, 2013 last modified Jun 07, 2013 10:37 AM — filed under: ,
Given below is the text of section 43 of the IT Act:
Located in Internet Governance / Resources
Computer Related Offences
by Pranesh Prakash published Jun 07, 2013 — filed under: ,
If any person, dishonestly or fraudulently, does any act referred to in section 43, he shall be punishable with imprisonment for a term which may extend to three years or with fine which may extend to five lakh rupees or with both.
Located in Internet Governance / Resources