You are here: Home
1004 items matching your search terms.
Filter the results.
Item type



















New items since



Sort by relevance · date (newest first) · alphabetically
Facebook, Google deny spying access
by Prasad Krishna published Jun 09, 2013 last modified Jul 02, 2013 10:18 AM — filed under: , , , ,
The CEOs of Facebook and Google on Saturday categorically denied that the US National Security Agency had "direct access" to their company servers for snooping on Gmail and Facebook users. But both acknowledged that the companies complied with the 'lawful' requests made by the US government and shared user data with sleuths.
Located in News & Media
Cyber experts suggest using open source software to protect privacy
by Prasad Krishna published Jun 22, 2013 last modified Jul 03, 2013 04:32 AM — filed under: ,
Big Brother is watching. With the Central Monitoring System (CMS) at home and PRISM from the US, millions of users worldwide have become vulnerable to online surveillance by state agencies without even realizing it. No surprise, several cyber security experts feel that building one's own personal firewall is a good way of fortifying online privacy.
Located in News & Media
In India, Prism-like Surveillance Slips Under the Radar
by Prasad Krishna published Jun 30, 2013 last modified Jul 03, 2013 09:31 AM — filed under: , ,
Prism, the contentious U.S. data-collection surveillance program, has captured the world’s attention ever since whistle-blower Edward Snowden leaked details of global spying to the Guardian and Washington Post.
Located in News & Media
Blog Entry Report on CIS' Workshop at the IGF:'An Evidence Based Framework for Intermediary Liability'
by Jyoti Panday published Sep 22, 2014 last modified Sep 24, 2014 10:47 AM — filed under: , , , ,
An evidence based framework for intermediary liability' was organised to present evidence and discuss ongoing research on the changing definition, function and responsibilities of intermediaries across jurisdictions.
Located in Internet Governance
Blog Entry CIS contributes to ABLI Compendium on Regulation of Cross-Border Transfers of Personal Data in Asia
by Amber Sinha and Elonnai Hickok published May 31, 2018 last modified Jun 03, 2018 03:10 PM — filed under: ,
The Asian Business Law Institute, based in Singapore published a compendium on “Regulation of cross-border transfer of personal data in Asia”. This was part of an exercise to explore legal convergence around issues such as data protection, enforcement of foreign judgments and principle of restructuring in Asia.
Located in Internet Governance / Blog
Blog Entry Why NPCI and Facebook need urgent regulatory attention
by Sunil Abraham published Jun 12, 2018 — filed under: , ,
The world’s oldest networked infrastructure, money, is increasingly dematerialising and fusing with the world’s latest networked infrastructure, the Internet.
Located in Internet Governance / Blog
Blog Entry The AI Task Force Report - The first steps towards India’s AI framework
by Elonnai Hickok, Shweta Mohandas and Swaraj Paul Barooah published Jun 27, 2018 last modified Jun 27, 2018 02:32 PM — filed under: , ,
The Task Force on Artificial Intelligence was established by the Ministry of Commerce and Industry to leverage AI for economic benefits, and provide policy recommendations on the deployment of AI for India.
Located in Internet Governance / Blog
Blog Entry Comment by CIS at ACE on Presentation on French Charter on the Fight against Cyber-Counterfeiting
by Pranesh Prakash published Dec 01, 2011 last modified Dec 01, 2011 11:59 AM — filed under: , , , , , , ,
The seventh session of the World Intellectual Property Organization's Advisory Committee on Enforcement is being held in Geneva on November 30 and December 1, 2011. Pranesh Prakash responded to a presentation by Prof. Pierre Sirinelli of the École de droit de la Sorbonne, Université Paris 1 on 'The French Charter on the Fight against Cyber-Counterfeiting of December 16, 2009' with this comment.
Located in Access to Knowledge / Blogs
Blog Entry Aadhaar marks a fundamental shift in citizen-state relations: From ‘We the People’ to ‘We the Government’
by Pranesh Prakash published Apr 04, 2017 — filed under: , , ,
Your fingerprints, iris scans, details of where you shop. Compulsory Aadhaar means all this data is out there. And it’s still not clear who can view or use it.
Located in Internet Governance / Blog
Bengaluru cops' twitter handle in ethical storm
by Prasad Krishna published Apr 07, 2017 — filed under: , ,
The city's privacy activists are among the most strident in trying to prevent the Union government from gaining unprecedented access to citizens' personal information through Aadhaar. But in their own backyard, Bengaluru police have been publishing on Twitter the phone numbers of thousands of citizens reporting various crimes such as gambling on the streets, random quarrels and harassment of women.
Located in Internet Governance / News & Media