You are here: Home
114 items matching your search terms.
Filter the results.
Item type



















New items since



Sort by relevance · date (newest first) · alphabetically
Blog Entry CIS Cybersecurity Series (Part 21) – Gyanak Tsering
by Purba Sarkar published Aug 31, 2014 last modified Sep 06, 2014 05:08 AM — filed under: , , ,
CIS interviews Gyanak Tsering, Tibetan monk in exile, as part of the Cybersecurity Series.
Located in Internet Governance / Blog
Blog Entry CIS Cybersecurity Series (Part 22) - Anonymous
by Purba Sarkar published Jul 13, 2015 — filed under: , , , , ,
CIS interviews a Tibetan security researcher and information activist, as part of the Cybersecurity Series. He prefers to remain anonymous.
Located in Internet Governance / Blog
Blog Entry CIS Cybersecurity Series (Part 23) – Justin Searle
by Purba Sarkar published Jul 15, 2015 — filed under: , , , , ,
CIS interviews Justin Searle, security expert, as part of the Cybersecurity Series.
Located in Internet Governance
Blog Entry CIS Cybersecurity Series (Part 24) – Shantanu Ghosh
by Purba Sarkar published Jul 15, 2015 — filed under: , , , , ,
CIS interviews Shantanu Ghosh, Managing Director, Symantec Product Operations, India, as part of the Cybersecurity Series.
Located in Internet Governance / Blog
Blog Entry Comments on the Draft Second Protocol to the Convention on Cybercrime (Budapest Convention)
by Vipul Kharbanda published Feb 25, 2019 — filed under: ,
Following consultations with data protection, civil society, industry and others, during the Cybercrime Convention Committee (T-CY) meeting from 29 November 2018 onwards, the Cybercrime Convention Committee has sought additional contributions regarding the provisional draft text for a Second Additional Protocol to the Budapest Convention on Cybercrime (“Budapest Convention”).
Located in Internet Governance / Blog
Blog Entry Conceptualizing an International Security Regime for Cyberspace
by Elonnai Hickok and Arindrajit Basu published Oct 26, 2018 last modified Oct 26, 2018 03:09 PM — filed under: ,
This paper was published as part of the Briefings from the Research and Advisory Group (RAG) of the Global Commission on the Stability of Cyberspace (GCSC) for the Full Commission Meeting held at Bratislava in 2018.
Located in Internet Governance / Blog
Consultation to Frame Rules under the Whistle Blowers Protection Act, 2011
by Prasad Krishna published Jul 02, 2014 — filed under: , ,
The National Campaign for People's Right to Information (NCPRI) and Centre for Communication Governance at National Law University, Delhi (CCG at NLUD) invite you to a consultation to draft rules under the Whistle Blowers Protection Act, 2011.
Located in News & Media
Blog Entry Cryptocurrency Regulation in India – A brief history
by Vipul Kharbanda published Mar 05, 2020 last modified Mar 05, 2020 06:36 PM — filed under: , , , , ,
In March 2020, the Supreme Court of India quashed the RBI order passed in 2018 that banned financial services firms from trading in virtual currency or cryptocurrency. Keeping this policy window in mind, the Centre for Internet & Society will be releasing a series of blog posts and policy briefs on cryptocurrency regulation in India
Located in Internet Governance / Blog
File Cultivating India’s Cyber Defense Strategy
by Admin published Nov 13, 2019 — filed under: ,
Located in Internet Governance / Files
Cyber 360
by Prasad Krishna published Sep 30, 2015 last modified Oct 14, 2015 02:22 AM — filed under: ,
Synergy Foundation organized the Cyber 360 conference in Bangalore on September 29 and 30, 2015. Sunil Abraham participated in the event.
Located in Internet Governance / News & Media