You are here: Home
2974 items matching your search terms.
Filter the results.
Item type



















New items since



Sort by relevance · date (newest first) · alphabetically
Fighting battles online
by Prasad Krishna published Sep 16, 2014 — filed under:
Internet policy maverick Sunil Abraham feels that accessibility is key to democratising the Internet space.
Located in Internet Governance / News & Media
Blog Entry UID and NPR: Towards Common Ground
by Mukta Batra published Sep 19, 2014 last modified Oct 15, 2014 01:06 PM — filed under: , , ,
The UID (Unique Identification) and NPR (National Population Register) are both government identity schemes that aggregate personal data, including biometric data for the provision of an identification factor, and aim to link them with the delivery of public utility services.
Located in Internet Governance / Blog
They know where you are
by Admin published Jan 18, 2019 last modified Jan 18, 2019 02:14 AM — filed under: ,
With hotel-booking app routinely sharing real-time guest data with police and government, lives of those fleeing persecution is in danger, privacy advocates fear.
Located in Internet Governance / News & Media
Webinar on the draft Intermediary Guidelines Amendment Rules
by Admin published Jan 18, 2019 — filed under: , ,
CCAOI and the ISOC Delhi Chapter organised a webinar on January 10 to discuss the draft "The Information Technology [Intermediary Guidelines (Amendment) Rules] 2018". Gurshabad Grover was a discussant in the panel.
Located in Internet Governance / News & Media
Cyber Policy Centres Meeting in Sri Lanka
by Admin published Jan 20, 2019 last modified Jan 21, 2019 11:50 PM — filed under: ,
Elonnai Hickok, Sunil Abraham and Ambika Tandon participated in this event organized by IDRC in Sri Lanka on January 11 - 14, 2019.
Located in Internet Governance / News & Media
Blog Entry India should reconsider its proposed regulation of online content
by Gurshabad Grover published Jan 24, 2019 last modified Jan 24, 2019 04:59 PM — filed under: ,
The lack of technical considerations in the proposal is also apparent since implementing the proposal is infeasible for certain intermediaries. End-to-end encrypted messaging services cannot “identify” unlawful content since they cannot decrypt it. Presumably, the government’s intention is not to disallow end-to-end encryption so that intermediaries can monitor content.
Located in Internet Governance / Blog
Creeped out by Netflix's 'You'? Here's how you can avoid online stalkers, data thieves
by Admin published Jan 12, 2019 — filed under:
Several social media users have no idea of how much of their information is stored on the Internet and what kind of information they are allowing the applications to access.
Located in Internet Governance / News & Media
Blog Entry How to make EVMs hack-proof, and elections more trustworthy
by Pranesh Prakash published Jan 14, 2019 — filed under:
Free and fair elections are the expression of democratic emancipation. India has always led by example: the Nehru Committee sought universal adult franchise in 1928, at a time when France didn’t let women vote, and laws in the USA allowed disqualification of poor, illiterate, and African-American voters. But how reliable are our voting systems, particularly in terms of security?
Located in Internet Governance / Blog
Blog Entry The DNA Bill has a sequence of problems that need to be resolved
by Shweta Mohandas and Elonnai Hickok published Jan 15, 2019 — filed under: , ,
In its current form, it’s far from comprehensive and fails to adequately address privacy and security concerns.
Located in Internet Governance / Blog
Blog Entry Unpacking Data Protection Law: A Visual Representation
by Amber Sinha published Feb 15, 2018 last modified Feb 15, 2018 01:22 PM — filed under: , , ,
This visual explainer unpacking data protection law was developed by Amber Sinha (research) and Pooja Saxena (design), and published as part of the Data Privacy Week celebrations on the Privacy International blog. Join the conversation on Twitter using #dataprivacyweek.
Located in Internet Governance / Blog