You are here: Home
2900 items matching your search terms.
Filter the results.
Item type



















New items since



Sort by relevance · date (newest first) · alphabetically
Blog Entry UID & Privacy - A Call for Papers
by Elonnai Hickok published Dec 15, 2010 last modified Mar 21, 2012 10:03 AM — filed under: ,
Privacy India is inviting individuals to author short papers focused on Unique Identity (UID) and Privacy. Selected candidates will have their papers published on the CIS website, and their transportation and accommodation provided for the “Privacy Matters” conference being held in Kolkata on 22 January 2010.
Located in Internet Governance / Blog / Privacy
Blog Entry The Privacy Rights of Whistleblowers
by Elonnai Hickok published Dec 20, 2010 last modified Mar 22, 2012 05:47 AM — filed under: ,
The recent disclosures from Wikileaks have shown that the right to information, whistle-blowing, and privacy are interconnected. This note looks at the different ways in which the three are related, as well as looking at the benefits and drawbacks to Wikileaks in terms of privacy.
Located in Internet Governance / Blog / Privacy
Privacy By Design — Conference Report
by Prasad Krishna published May 02, 2011 last modified Aug 22, 2011 12:03 PM — filed under: ,
How do we imagine privacy? How is privacy being built into technological systems? On April 16th,The Center for Internet and Society hosted Privacy by Design, an Open Space meant to answer these questions and more around the topic of privacy. Below is a summary of the conversations and dialogs from the event.
Located in Internet Governance / Blog / Privacy
Blog Entry Bloggers' Rights Subordinated to Rights of Expression: Cyber Law Expert
by Elonnai Hickok published Jun 03, 2011 last modified Mar 21, 2012 09:35 AM — filed under: ,
Vijayashankar, an eminent cyber law expert answers Elonnai Hickok’s questions on bloggers' rights, freedom of expression and privacy in this e-mail interview conducted on May 19, 2011.
Located in Internet Governance / Blog / Privacy
Blog Entry A Street View of Private and the Public
by Prashant Iyengar published Jun 04, 2011 last modified Mar 21, 2012 09:34 AM — filed under: ,
Prashant Iyengar on how in the eyes of the law, the internet giant is like the homeless in India. This article was published by Tehelka on June 4, 2011.
Located in Internet Governance / Blog / Privacy
Privacy Matters, Guwahati — Event Report
by Prasad Krishna published Jul 21, 2011 last modified Aug 26, 2011 10:31 AM — filed under: ,
On June 23, a public seminar on “Privacy Matters” was held at the Don Bosco Institute in Karhulli, Guwahati. It was organised by IDRC, Society in Action Group, IDEA Chirang, an NGO initiative working with grassroots initiatives in Assam, Privacy India and CIS and was attended by RTI activists and grass roots NGO representatives from across the North Eastern region: Manipur, Arunachal Pradesh, Tripura, Nagaland, Assam and Sikkim. The event focused on the challenges and concerns of privacy in India.
Located in Internet Governance / Blog / Privacy
Blog Entry An Overview of DNA Labs in India
by Shilpa Narani published Jul 24, 2011 last modified Feb 02, 2016 01:11 PM — filed under: ,
DNA fingerprinting has become the most precise and technologically advanced method for identifying crimes such as murder, kidnapping, robbery and rape. Police and judicial authorities and in some cases even private parties retain this in their records, writes Shilpa in this blog post.
Located in Internet Governance / Blog / Privacy
Blog Entry My Experiment with Scam Baiting
by Sahana Sarkar published Jul 15, 2011 last modified Mar 13, 2012 10:43 AM — filed under: ,
Today, as I am sure many of you have experienced, Internet scams are widespread and very deceptive. As part of my research into privacy and the Internet, I decided to follow a scam and attempt to fully understand how Internet scams work, and what privacy implications they have for Internet users. Though there are many different types of scams that take place over the Internet —identity scams, housing scams, banking scams— just to name a few. I decided to look in depth at the lottery scam.
Located in Internet Governance / Blog / Privacy
Blog Entry UID: Nothing to Hide, Nothing to Fear?
by Shilpa Narani published Jul 25, 2011 last modified Sep 28, 2011 11:44 AM — filed under: ,
Isn’t it interesting that authorities ask you about your identity and you end up showing your proof of existence! Isn’t this breaching into one’s personal life? Why so much transparency only from the public side? Why can’t the government be equally transparent to the public?, asks Shilpa Narani.
Located in Internet Governance / Blog / Privacy
Blog Entry An Interview with Activist Shubha Chacko: Privacy and Sex Workers
by Elonnai Hickok published Apr 25, 2011 last modified Mar 28, 2012 06:26 AM — filed under: ,
On February 20th I had the opportunity to speak with Shubha Chacko on privacy and sex workers. Ms. Chacko is an activist who works for Aneka, an NGO based in Bangalore, which fights for the human rights of sexual minorities. In my interview with Ms. Chacko I tried to understand how privacy impacts the lives of sex workers in India. The below is an account of our conversation.
Located in Internet Governance / Blog / Privacy