You are here: Home
1026 items matching your search terms.
Filter the results.
Item type



















New items since



Sort by relevance · date (newest first) · alphabetically
Blog Entry UID: Nothing to Hide, Nothing to Fear?
by Shilpa Narani published Jul 25, 2011 last modified Sep 28, 2011 11:44 AM — filed under: ,
Isn’t it interesting that authorities ask you about your identity and you end up showing your proof of existence! Isn’t this breaching into one’s personal life? Why so much transparency only from the public side? Why can’t the government be equally transparent to the public?, asks Shilpa Narani.
Located in Internet Governance / Blog / Privacy
Blog Entry An Interview with Activist Shubha Chacko: Privacy and Sex Workers
by Elonnai Hickok published Apr 25, 2011 last modified Mar 28, 2012 06:26 AM — filed under: ,
On February 20th I had the opportunity to speak with Shubha Chacko on privacy and sex workers. Ms. Chacko is an activist who works for Aneka, an NGO based in Bangalore, which fights for the human rights of sexual minorities. In my interview with Ms. Chacko I tried to understand how privacy impacts the lives of sex workers in India. The below is an account of our conversation.
Located in Internet Governance / Blog / Privacy
Blog Entry Limits to Privacy
by Prashant Iyengar published May 06, 2011 last modified Dec 14, 2012 10:28 AM — filed under: ,
In his research article, Prashant Iyengar examines the limits to privacy for individuals in light of the provisions of the Constitution of India, public interest, security of state and maintenance of law and order. The article attempts to build a catalogue of all these justifications and arrive at a classification of all such frequently used terms invoked in statutes and upheld by courts to deprive persons of their privacy.
Located in Internet Governance / Blog / Privacy
Blog Entry Video Surveillance and Its Impact on the Right to Privacy
by Vaishnavi Chillakuru published Jul 23, 2011 last modified Sep 29, 2011 05:35 AM — filed under: ,
The need for video surveillance has grown in this technologically driven era as a mode of law enforcement. Video Surveillance is very useful to governments and law enforcement to maintain social control, recognize and monitor threats, and prevent/investigate criminal activity. In this regard it is pertinent to highlight that not only are governments using this system, but residential communities in certain areas are also using this system to create a safer environment.
Located in Internet Governance / Blog / Privacy
Blog Entry When Data Means Privacy, What Traces Are You Leaving Behind?
by Noopur Raval published Jul 18, 2011 last modified Nov 24, 2011 09:24 AM — filed under: ,
How do you know yourself to be different from others? What defines the daily life that you live and the knowledge you produce in the span of this life? Is all that information yours or are you a mere stakeholder on behalf of the State whose subject you are? What does privacy really mean? In a society that is increasingly relying on information to identify people, collecting and archiving ‘personal’ details of your lives, your name, age, passport details, ration card number, call records etc, how private is your tweet, status update, text message or simply, your restaurant bill?
Located in Internet Governance / Blog / Privacy
Blog Entry Privacy & Media Law
by Sonal Makhija published Jul 19, 2011 last modified Dec 14, 2012 10:26 AM — filed under: ,
In her research, Sonal Makhija, a Bangalore-based lawyer, tries to delineate the emerging privacy concerns in India and the existing media norms and guidelines on the right to privacy. The research examines the existing media norms (governed by Press Council of India, the Cable Television Networks (Regulation) Act, 1995 and the Code of Ethics drafted by the News Broadcasting Standard Authority), the constitutional protection guaranteed to an individual’s right to privacy upheld by the courts, and the reasons the State employs to justify the invasion of privacy. The paper further records, both domestic and international, inclusions and exceptions with respect to the infringement of privacy.
Located in Internet Governance / Blog / Privacy
Blog Entry Right to Privacy Bill 2010 — A Few Comments
by Elonnai Hickok published Jul 20, 2011 last modified Mar 22, 2012 06:26 AM — filed under: ,
Earlier this year, in February 2011, Rajeev Chandrasekhar introduced the Right to Privacy Bill, 2010 in the Rajya Sabha. The Bill is meant to “provide protection to the privacy of persons including those who are in public life”. Though the Bill states that its objective is to protect individuals’ fundamental right to privacy, the focus of the Bill is on the protection against the use of electronic/digital recording devices in public spaces without consent and for the purpose of blackmail or commercial use.
Located in Internet Governance / Blog / Privacy
Open Letter to the Finance Committee: Operational Design
by Prasad Krishna published Feb 16, 2011 last modified Feb 17, 2011 10:02 AM — filed under:
The objective of the UID project is to provide identity infrastructure that is not susceptible to fraud or error. This note highlights parts of the operational design of the project, which are flawed. We plead that each point be taken into consideration and that the design be suitably revised.
Located in Internet Governance / Blog / Privacy
Open Letter to the Finance Committee: UID Budget
by Prasad Krishna published Feb 16, 2011 last modified Feb 17, 2011 11:18 AM — filed under:
This note presents the aspects of the UID project, which have not been considered or incorporated into the UID’s budget. The costs include re-enrollment, loss in human time, and the cost of the audit function.
Located in Internet Governance / Blog / Privacy
Open Letter to the Finance Committe: Biometrics
by Prasad Krishna published Feb 16, 2011 last modified Feb 17, 2011 01:12 PM — filed under:
This note points out the weaknesses inherent in biometrics and the pitfalls in using them. It recommends procedural safeguards that should be adopted by the UID in order to make the use of biometrics more secure and inclusive.
Located in Internet Governance / Blog / Privacy