You are here: Home
1026 items matching your search terms.
Filter the results.
Item type



















New items since



Sort by relevance · date (newest first) · alphabetically
Blog Entry Report of the Group of Experts on Privacy vs. The Leaked 2014 Privacy Bill
by Elonnai Hickok published Apr 14, 2014 — filed under: , ,
Following our previous post comparing the leaked 2014 Privacy Bill with the leaked 2011 Privacy Bill, this post will compare the recommendations provided in the Report of the Group of Experts on Privacy by the Justice AP Shah Committee to the text of the leaked 2014 Privacy Bill. Below is an analysis of recommendations from the Report that are incorporated in the text of the Bill, and recommendations in the Report that are not incorporated in the text of the Bill.
Located in Internet Governance / Blog
Blog Entry Report on CIS' Workshop at the IGF:'An Evidence Based Framework for Intermediary Liability'
by Jyoti Panday published Sep 22, 2014 last modified Sep 24, 2014 10:47 AM — filed under: , , , ,
An evidence based framework for intermediary liability' was organised to present evidence and discuss ongoing research on the changing definition, function and responsibilities of intermediaries across jurisdictions.
Located in Internet Governance
Blog Entry Report on the 1st Privacy Round Table meeting
by Maria Xynou published Apr 22, 2013 last modified Jul 30, 2013 11:11 AM — filed under: , ,
This report entails an overview of the discussions and recommendations of the first Privacy Round Table meeting in New Delhi, on 13th April 2013.
Located in Internet Governance / Blog
Blog Entry Report on the 2nd Privacy Round Table meeting
by Maria Xynou published Apr 24, 2013 last modified Jul 12, 2013 11:54 AM — filed under: , ,
This post entails a report on the second Privacy Round Table meeting which took place on 20th April 2013.
Located in Internet Governance / Blog
Blog Entry Report on the 3rd Privacy Round Table meeting
by Maria Xynou published May 21, 2013 last modified Jul 12, 2013 11:35 AM — filed under: , ,
This report entails an overview of the discussions and recommendations of the third Privacy Round Table meeting in Chennai, on 18th May 2013.
Located in Internet Governance / Blog
Blog Entry Report on the 4th Privacy Round Table meeting
by Maria Xynou published Jun 25, 2013 last modified Jul 12, 2013 11:04 AM — filed under: , ,
This report entails an overview of the discussions and recommendations of the fourth Privacy Round Table in Mumbai, on 15th June 2013.
Located in Internet Governance / Blog
Blog Entry Report on the 5th Privacy Round Table meeting
by Maria Xynou published Jul 24, 2013 last modified Jul 26, 2013 08:24 AM — filed under: ,
This report entails an overview of the discussions and recommendations of the fifth Privacy Round Table in Calcutta, on 13th July 2013.
Located in Internet Governance / Blog
Blog Entry Report on the Sixth Privacy Roundtable Meeting, New Delhi
by Prachi Arya published Aug 30, 2013 last modified Aug 30, 2013 03:04 PM — filed under: , ,
In 2013 the Centre for Internet and Society (CIS) drafted the Privacy Protection Bill as a citizens' version of a privacy legislation for India. Since April 2013, CIS has been holding Privacy Roundtables in collaboration with Federation of Indian Chambers of Commerce and Industry (FICCI) and DSCI, with the objective of gaining public feedback to the Privacy Protection Bill and other possible frameworks for privacy in India. The following is a report on the Sixth Privacy Roundtable held in New Delhi on August 24, 2013.
Located in Internet Governance / Blog
Blog Entry Report on Understanding Aadhaar and its New Challenges
by Japreet Grewal, Vanya Rakesh, Sumandro Chattapadhyay, and Elonnai Hickock published Aug 31, 2016 last modified Mar 16, 2019 04:42 AM — filed under: , , , , , , , , ,
The Trans-disciplinary Research Cluster on Sustainability Studies at Jawaharlal Nehru University collaborated with the Centre for Internet and Society, and other individuals and organisations to organise a two day workshop on “Understanding Aadhaar and its New Challenges” at the Centre for Studies in Science Policy, JNU on May 26 and 27, 2016. The objective of the workshop was to bring together experts from various fields, who have been rigorously following the developments in the Unique Identification (UID) Project and align their perspectives and develop a shared understanding of the status of the UID Project and its impact. Through this exercise, it was also sought to develop a plan of action to address the welfare exclusion issues that have arisen due to implementation of the UID Project.
Located in Internet Governance / Blog
Report: From Oppression to Liberation: Reclaiming the Right to Privacy
by Admin published Dec 05, 2018 — filed under: ,
Eva Blum-Dumontet, Research Officer at Privacy International, published her report on gender and privacy on November 28, 2018. The report, titled 'From Oppression to Liberation: Reclaiming the Right to Privacy', traces the history of privacy as a tool of oppressing women across different spheres, eventually calling for a feminist reclamation of privacy. Ambika Tandon was quoted.
Located in Internet Governance / News & Media