You are here: Home
14 items matching your search terms.
Filter the results.
Item type



















New items since



Sort by relevance · date (newest first) · alphabetically
Blog Entry Announcement of a Three-Region Research Alliance on the Appropriate Use of Digital Identity
by Amber Sinha published May 13, 2019 last modified May 13, 2019 09:06 AM — filed under: , , , , ,
Omidyar Network has recently announced its decision to invest in establishment of a three-region research alliance — to be co-led by the Institute for Technology & Society (ITS), Brazil, the Centre for Intellectual Property and Information Technology Law (CIPIT) , Kenya, and the CIS, India — on the Appropriate Use of Digital Identity. As part of this Alliance, we at the CIS will look at the policy objectives of digital identity projects, how technological policy choices can be thought through to meet the objectives, and how legitimate uses of a digital identity framework may be evaluated.
Located in Internet Governance / Blog
Blog Entry Comments to the ID4D Practitioners’ Guide
by Yesha Tshering Paul, Prakriti Singh, and Amber Sinha published Aug 08, 2019 last modified Aug 08, 2019 10:25 AM — filed under: , , , ,
Located in Internet Governance / Blog
Blog Entry Core Concepts and Processes
by Shruti Trikanand and Amber Sinha published Sep 13, 2019 last modified Oct 17, 2019 04:06 PM — filed under: , ,
When we embarked on this research project, we began with the primary questions of what constitutes a digital identity system. In the last few years, with the rise in national digital identity projects, there has been significant academic and media attention to the idea, benefits and risks of a digital identity system.
Located in Internet Governance / Digital IDs
Blog Entry Design and Uses of Digital Identities - Research Plan
by Amber Sinha and Pooja Saxena published Aug 08, 2019 last modified Aug 17, 2019 07:58 AM — filed under: , , , ,
In our research project about uses and design of digital identity systems, we ask two core questions: a) What are appropriate uses of ID?, and b) How should we think about the technological design of ID? Towards the first research question, we have worked on first principles and will further develop definitions, legal tests and applications of these principles. Towards the second research question, we have first identified a set of existing and planned digital identity systems that represent a paradigm of how such a system can be envisioned and implemented, and will look to identify key design choices which are causing divergence in paradigm.
Located in Internet Governance / Blog
Digital ID Forum 2019
by Admin published Jul 03, 2019 last modified Aug 07, 2019 02:09 PM — filed under: , , , ,
Sunil Abraham was one of the panelists at this event at Chulalongkorn University on July 3, 2019.
Located in Internet Governance / News & Media
Blog Entry Governing ID: 
Use of Digital ID for Verification
by Shruti Trikanad published Mar 02, 2020 last modified Mar 02, 2020 11:16 AM — filed under: , , ,
Located in Internet Governance / Blog
Blog Entry Governing ID: A Framework for Evaluation of Digital Identity
by Vrinda Bhandari, Shruti Trikanad, and Amber Sinha published Mar 02, 2020 last modified Mar 02, 2020 01:22 PM — filed under: , , ,
Located in Internet Governance / Blog
Blog Entry Governing ID: India’s Unique Identity Programme
by Vrinda Bhandari published Mar 02, 2020 — filed under: , , ,
Located in Internet Governance
Blog Entry Governing ID: Introducing our Evaluation Framework
by Shruti Trikanad published Mar 02, 2020 last modified Mar 02, 2020 08:03 AM — filed under: , , ,
Located in Internet Governance / Blog
Blog Entry Governing ID: Kenya’s Huduma Namba Programme
by Amber Sinha published Mar 02, 2020 — filed under: , , ,
Located in Internet Governance / Blog