You are here: Home
114 items matching your search terms.
Filter the results.
Item type



















New items since



Sort by relevance · date (newest first) · alphabetically
Blog Entry Improving the Processes for Disclosing Security Vulnerabilities to Government Entities in India
by Karan Saini, Pranesh Prakash and Elonnai Hickok published Mar 20, 2019 last modified Apr 01, 2019 12:02 PM — filed under: ,
The aim of this policy brief is to recommend changes pertaining to current legislation, policy and practice to the Government of India regarding external vulnerability reporting and disclosure. The changes we recommend within this brief aim to strengthen the processes around voluntary vulnerability and bug disclosure by third parties.
Located in Internet Governance / Blog
Blog Entry Comments on the Draft Second Protocol to the Convention on Cybercrime (Budapest Convention)
by Vipul Kharbanda published Feb 25, 2019 — filed under: ,
Following consultations with data protection, civil society, industry and others, during the Cybercrime Convention Committee (T-CY) meeting from 29 November 2018 onwards, the Cybercrime Convention Committee has sought additional contributions regarding the provisional draft text for a Second Additional Protocol to the Budapest Convention on Cybercrime (“Budapest Convention”).
Located in Internet Governance / Blog
Blog Entry Response to GCSC on Request for Consultation: Norm Package Singapore
by Arindrajit Basu, Gurshabad Grover and Elonnai Hickok published Jan 22, 2019 last modified Jan 27, 2019 03:43 PM — filed under: , ,
The GCSC opened a public comment procedure to solicit comments and obtain additional feedback. CIS responded to the public call-offering comments on all six norms and proposing two further norms.
Located in Internet Governance / Blog
Blog Entry Economics of Cybersecurity: Literature Review Compendium
by Natalia Khaniejo published Dec 31, 2018 — filed under: ,
The twenty first century has witnessed an unprecedented conflation of everyday experiences and technosocial practices. The emergence of technologies like the Internet of Things, Cloud Computing, Digital Payment infrastructures are all emblematic of this conflation of technology with economic, social and political modes of existence.
Located in Internet Governance / Blog
Blog Entry Is the new ‘interception’ order old wine in a new bottle?
by Elonnai Hickok, Vipul Kharbanda, Shweta Mohandas and Pranav M. Bidare published Dec 29, 2018 — filed under: , , , ,
The government could always authorise intelligence agencies to intercept and monitor communications, but the lack of clarity is problematic.
Located in Internet Governance / Blog
India-China Tech Forum 2018
by Admin published Dec 26, 2018 — filed under: ,
Arindrajit Basu spoke at the India-China Tech Forum 2018 organised by ORF and Peking University at the Ji Xianlin Centre for India-China Studies, Mumbai on December 11 - 12, 2018. The event functioned as a bi-annual dialogue that fosters co-operation in this space between the two countries.
Located in Internet Governance / News & Media
Blog Entry Private-public partnership for cyber security
by Arindrajit Basu published Dec 26, 2018 last modified Dec 26, 2018 03:02 PM — filed under: ,
Given the decentralised nature of cyberspace, the private sector will have to play a vital role in enforcing rules for security.
Located in Internet Governance / Blog
Blog Entry Mapping cybersecurity in India: An infographic
by Arindrajit Basu, Karan Saini, Aayush Rathi and Swaraj Barooah published Dec 23, 2018 — filed under: ,
This infographic maps the key stakeholder, areas of focus and threat vectors that impact cybersecurity policy in India. Broadly, policy-makers should concentrate on establishing a framework where individuals feel secure and trust the growing digital ecosystem. The infographic therefore serves as a ready reference point for the research that we have done and hope to continue through our cybersecurity work at CIS.
Located in Internet Governance / Blog
Blog Entry European E-Evidence Proposal and Indian Law
by Vipul Kharbanda published Dec 23, 2018 — filed under: ,
In April of 2018, the European Union issued the proposal for a new regime dealing with cross border sharing of data and information by issuing two draft instruments, an E-evidence Regulation (“Regulation”) and an E-evidence Directive (“Directive”), (together the “E-evidence Proposal”). The Regulation is a direction to states to put in place the proper legislative and regulatory machinery for the implementation of this regime while the Directive requires the states to enact laws governing service providers so that they would comply with the proposed regime.
Located in Internet Governance / Blog
Blog Entry A Critical Look at the Visual Representation of Cybersecurity
by Paromita Bathija, Padmini Ray Murray, and Saumyaa Naidu published Dec 11, 2018 last modified Aug 21, 2019 08:00 AM — filed under: ,
The Centre for Internet and Society and design collective Design Beku came together on the 15th of November for a workshop on Illustrations and Visual Representations of Cybersecurity. Images in the public sphere such as visuals in the media, Wikipedia commons, and stock images - play a vital role in the public’s perception of cybercrime and cybersecurity.
Located in Internet Governance / Blog