You are here: Home
1026 items matching your search terms.
Filter the results.
Item type

New items since

Sort by relevance · date (newest first) · alphabetically
Blog Entry Analysis of Key Provisions of the Aadhaar Act Regulations
by Amber Sinha published Mar 31, 2017 last modified Apr 03, 2017 02:05 PM — filed under: , , , , ,
In exercise of their powers under of the powers conferred by Aadhaar (Targeted Delivery of Financial and other Subsidies, Benefits and Services) Act, 2016, (Aadhaar Act) the UIDAI has come out with a set of five regulations in late 2016 last year. In this policy brief, we look at the five regulations, their key provisions and highlight point out the unresolved, issues, unaddressed, and created issues as result of these regulations.
Located in Internet Governance / Blog
Blog Entry Analysis of the Report of the Group of Experts on Developments in the Field of Information and Telecommunications in the Context of International Security and Implications for India
by Elonnai Hickok and Vipul Kharbanda published Jul 30, 2016 last modified Aug 11, 2016 09:58 AM — filed under: , , ,
This paper analyses the report of the Group of Experts and and India’s compliance with its recommendations based on existing laws and policies. Given the global nature of these challenges and the need for nations to holistically address such challenges from a human rights and security perspective, CIS believes that the Group of Experts and similar international forums are useful and important forums for India to actively engage with.
Located in Internet Governance / Blog
Analysis: Data Protection in India - Getting It Right
by Prasad Krishna published Apr 28, 2017 — filed under: ,
Indian Government Plans Ambitious Data Protection Legislation Rollout by October
Located in Internet Governance / News & Media
Analyzing the Draft Human DNA Profiling Bill 2012
by Prasad Krishna published Feb 25, 2013 last modified Feb 25, 2013 09:56 AM — filed under: , ,
The Centre for Internet & Society invites you to a workshop on analyzing the Draft Human DNA Profiling Bill on March 1, 2013 in its Bangalore office, from 2.00 p.m. to 5.00 p.m.
Located in Internet Governance / Events
And now, Aadhaar-enabled smartphones for easy verification and money transfer
by Prasad Krishna published Aug 12, 2016 — filed under: , ,
As reported earlier, the Indian government has planned to make Aadhaar-enabled smartphones , with which users would be able to self-authenticate and let businesses and banks verify the identity of their clients. This would also help in the government's aim of a cashless society.
Located in Internet Governance / News & Media
Blog Entry Announcing Selected Researchers: Welfare, Gender, and Surveillance
by Sumandro Chattapadhyay published Feb 13, 2020 last modified Feb 13, 2020 03:04 PM — filed under: , , , , ,
We published a Call for Researchers on January 10, 2020, to invite applications from researchers interested in writing a narrative essay that interrogates the modes of surveillance that people of LGBTHIAQ+ and gender non-conforming identities and sexual orientations are put under as they seek sexual and reproductive health (SRH) services in India. We received 29 applications from over 10 locations in India in response to the call, and are truly overwhelmed by and grateful for this interest and support. We eventually selected applications by 3 researchers that we felt aligned best with the specific objectives of the project. Please find below brief profile notes of the selected researchers.
Located in RAW
Blog Entry Another Step towards Privacy Law
by Elonnai Hickok published Jan 18, 2018 — filed under: ,
A comparison between the 2012 experts’ report and the 2017 white paper on data protection.
Located in Internet Governance / Blog
Blog Entry Anti-Spam Laws in Different Jurisdictions: A Comparative Analysis
by Rakshanda Deka published Jul 02, 2015 — filed under: ,
This paper is divided into three sections. The first section puts forth a comparative table of the spam laws of five different countries - the United States of America, Australia, Canada, Singapore and the United Kingdom - based on eight distinct parameters- jurisdiction of the legislation, definition of ‘spam’, understanding of consent, labelling requirements, types of senders covered, entities empowered to sue, exceptions made and penalties prescribed. The second section is a brief background of the problem of spam and it attempts to establish the context in which the paper is written. The third section is a critical analysis of the laws covered in the first section. In an effort to spot the various loopholes in these laws and suggest effective alternatives, this section points out the distinctions between the various legislations and discusses briefly their respective advantages and disadvantages.
Located in Internet Governance / Blog
Blog Entry Anvar v. Basheer and the New (Old) Law of Electronic Evidence
by Bhairav Acharya published Sep 30, 2014 last modified Dec 04, 2014 03:53 PM — filed under: , ,
The Supreme Court of India revised the law on electronic evidence. The judgment will have an impact on the manner in which wiretap tapes are brought before a court.
Located in Internet Governance / Blog
Are biometrics hack-proof?
by Prasad Krishna published Jun 12, 2017 — filed under: , ,
There are growing concerns over biometric security in India. We ask the experts if biometrics can really be hacked.
Located in Internet Governance / News & Media