You are here: Home
1026 items matching your search terms.
Filter the results.
Item type



















New items since



Sort by relevance · date (newest first) · alphabetically
File Limits to Privacy
by Prasad Krishna published Apr 11, 2011 last modified Dec 14, 2012 10:28 AM — filed under: ,
In this chapter we attempt to build a catalogue of these various justifications, without attempting to be exhaustive, with the objective of arriving at a rough taxonomy of such frequently invoked terms. In addition we also examine some the more important justifications such as “public interest” and “security of the state” that have been invoked in statutes and upheld by courts to deprive persons of their privacy.
Located in Internet Governance / Publications
Blog Entry Privacy and the Information Technology Act — Do we have the Safeguards for Electronic Privacy?
by Prashant Iyengar published Apr 07, 2011 last modified Dec 14, 2012 10:29 AM — filed under: ,
How do the provisions of the Information Technology Act measure up to the challenges of privacy infringement? Does it provide an adequate and useful safeguard for our electronic privacy? Prashant Iyengar gives a comprehensive analysis on whether and how the Act fulfils the challenges and needs through a series of FAQs while drawing upon real life examples.
Located in Internet Governance / Blog / Privacy
Blog Entry Is Data Protection Enough?
by Elonnai Hickok published Apr 05, 2011 last modified Mar 22, 2012 05:28 AM — filed under: ,
The following note looks briefly at different sides of the privacy debate, and asks the question whether a Data Protection law is enough privacy protection for India.
Located in Internet Governance / Blog / Privacy
Blog Entry Surveillance Technologies
by Elonnai Hickok published Apr 05, 2011 last modified Mar 22, 2012 05:40 AM — filed under: ,
The following post briefly looks at different surveillance technologies, and the growing use of the them in India.
Located in Internet Governance / Blog / Privacy
'Privacy Matters', Ahmedabad: Conference Report
by Prasad Krishna published Mar 31, 2011 last modified Apr 04, 2011 04:45 AM — filed under: ,
On 26 March 2011, civil society, lawyers, judges, students and NGO’s, gathered together at the Ahmedabad Management Association to take part in 'Privacy Matters' – a public conference organised by Privacy India in partnership with IDRC and Research Foundation for Governance in India (RFGI) — to discuss the challenges of privacy in India, with an emphasis on national security and privacy. The conference was opened by Prashant Iyengar, head researcher at Privacy India and Kanan Drhu, director of RFGI. Mr. Iyengar explained Privacy India’s mandate to raise awareness of privacy, spark civil action, and promote democratic dialogue around privacy challenges and violations in India. RFGI is a think tank established in 2009 which aims to research, promote, and implement various reforms to improve the legal and political process in Gujarat and across India. ‘Privacy Matters – Ahmedabad’ is the third conference out of the eight that Privacy India will be hosting across India. The next conference will take place in Hyderabad on 9 April 2011. It will focus on human rights and privacy.
Located in Internet Governance / Blog / Privacy
Blog Entry Privacy and Governmental Databases
by Elonnai Hickok published Mar 23, 2011 last modified Mar 22, 2012 05:41 AM — filed under: ,
In our research we have found that most government databases are incrementally designed in response to developments and improvements that need to be incorporated from time to time. This method of architecting a system leads to a poorly designed database with many privacy risks such as: inaccurate data, incomplete data, inappropriate disclosure of data, inappropriate access to data, and inappropriate security over data. To address these privacy concerns it is important to analyze the problem that is being addressed from the perspective of potential and planned interoperability with other government databases. Below is a list of problems and recommendations concerning privacy, concerning government databases.
Located in Internet Governance / Blog / Privacy
Open Letter to the Finance Committee: UID and Transactions
by Prasad Krishna published Feb 17, 2011 last modified Feb 24, 2011 01:35 PM — filed under:
Since official documentation from the UIDAI is very limited, we assume that data pertaining to transactions would comprise of the Aadhaar number, identifier of the authenticating device, date-time stamp, and approval/rejection/error code. Recording and maintaining of data pertaining to transactions is very important because it increases transparency and accountability through an audit trail. However, storage of such sensitive data creates many privacy risks, because more often than not metadata gives you as much intelligence as raw data.
Located in Internet Governance / Blog / Privacy
Open Letter to the Finance Committee: Operational Design
by Prasad Krishna published Feb 16, 2011 last modified Feb 17, 2011 10:02 AM — filed under:
The objective of the UID project is to provide identity infrastructure that is not susceptible to fraud or error. This note highlights parts of the operational design of the project, which are flawed. We plead that each point be taken into consideration and that the design be suitably revised.
Located in Internet Governance / Blog / Privacy
Open Letter to the Finance Committee: UID Budget
by Prasad Krishna published Feb 16, 2011 last modified Feb 17, 2011 11:18 AM — filed under:
This note presents the aspects of the UID project, which have not been considered or incorporated into the UID’s budget. The costs include re-enrollment, loss in human time, and the cost of the audit function.
Located in Internet Governance / Blog / Privacy
Open Letter to the Finance Committe: Biometrics
by Prasad Krishna published Feb 16, 2011 last modified Feb 17, 2011 01:12 PM — filed under:
This note points out the weaknesses inherent in biometrics and the pitfalls in using them. It recommends procedural safeguards that should be adopted by the UID in order to make the use of biometrics more secure and inclusive.
Located in Internet Governance / Blog / Privacy