You are here: Home
2974 items matching your search terms.
Filter the results.
Item type



















New items since



Sort by relevance · date (newest first) · alphabetically
Blog Entry When Whistle Blowers Unite
by Sunil Abraham published Jan 14, 2010 last modified Mar 21, 2012 10:17 AM — filed under: ,
Leaking corporate or government information in public interest through popular Web service providers is risky but Wikileaks.org is one option that you could try out.
Located in Internet Governance / Blog
Blog Entry Sense and censorship
by Sunil Abraham published Mar 30, 2010 last modified Mar 21, 2012 10:15 AM — filed under:
Sunil Abraham examines Google's crusade against censorship in China in wake of the attacks on its servers in this article published in the Indian Express.
Located in Internet Governance / Blog
Blog Entry Report on the Fourth Internet Governance Forum for Commonwealth IGF
by Pranesh Prakash published Feb 05, 2010 last modified Feb 29, 2012 05:42 AM — filed under: ,
This report by Pranesh Prakash reflects on the question of how useful the IGF is in the light of meetings on the themes of intellectual property, freedom of speech and privacy.
Located in Internet Governance / Blog
Does the Safe-Harbor Program Adequately Address Third Parties Online?
by Rebecca Schild published Apr 16, 2010 last modified Aug 02, 2011 07:19 AM — filed under: , , , ,
While many citizens outside of the US and EU benefit from the data privacy provisions the Safe Harbor Program, it remains unclear how successfully the program can govern privacy practices when third-parties continue to gain more rights over personal data. Using Facebook as a site of analysis, I will attempt to shed light on the deficiencies of the framework for addressing the complexity of data flows in the online ecosystem.
Located in Internet Governance / Blog
Blog Entry Feedback to the NIA Bill
by Elonnai Hickok published Jul 30, 2010 last modified Mar 21, 2012 10:14 AM — filed under: ,
Malavika Jayaram and Elonnai Hickok introduce the formal submission of CIS to the proposed National Identification Authority of India (NIA) Bill, 2010, which would give every resident a unique identity. The submissions contain the detailed comments on the draft bill and the high level summary of concerns with the NIA Bill submitted to the UIDAI on 13 July, 2010.
Located in Internet Governance / Blog
Blog Entry Civil Liberties and the amended Information Technology Act, 2000
by Malavika Jayaram published Aug 05, 2010 last modified Mar 21, 2012 10:13 AM — filed under: ,
This post examines certain limitations of the Information Technology Act, 2000 (as amended in 2008). Malavika Jayaram points out the fact that when most countries of the world are adopting plain English instead of the conventional legal terminology for better understanding, India seems to be stuck in the old-fashioned method thereby, struggling to maintain a balance between clarity and flexibility in drafting its laws. The present Act, she says, is although an improvement over the old Act and seeks to address and improve on certain areas in the right direction but still comes up short in making necessary changes when it comes to fundamental rights and personal liberties. The new Act retains elements from the previous one making it an abnormal document and this could have been averted if there had been some attention to detail.
Located in Internet Governance / Blog
Blog Entry UID Project in India - Some Possible Ramifications
by Liliyan published Aug 11, 2010 last modified Mar 21, 2012 10:13 AM — filed under:
Having a standard for decentralized ID verification rather than a centralized database that would more often than not be misused by various authorities will solve ID problems, writes Liliyan in this blog entry. These blog posts to be published in a series will voice the expert opinions of researchers and critics on the UID project and present its unique shortcomings to the reader.
Located in Internet Governance / Blog
Blog Entry Does the Government want to enter our homes?
by Sunil Abraham published Aug 13, 2010 last modified Mar 21, 2012 10:12 AM — filed under:
When rogue politicians and bureaucrats are granted unrestricted access to information then the very future of democracy and free media will be in jeopardy. In an article published in the Pune Mirror on 10 August, 2010, Sunil Abraham examines this in light of the BlackBerry-to-BlackBerry messenger service that the Government of India plans to block if its makers do not allow the monitoring of messages. He says that civil society should rather resist and insist on suitable checks and balances like governmental transparency and a fair judicial oversight instead of allowing the government to intrude into the privacy and civil liberties of its citizens.
Located in Internet Governance / Blog
Control Shift?
by Pranesh Prakash published Oct 08, 2009 last modified Aug 02, 2011 07:22 AM — filed under: ,
The USA has ceded control of the Internet over to Icann, but only partially. (This post appeared as an article in Down to Earth, in the issue dated November 15, 2009.)
Located in Internet Governance / Blog
Blog Entry CDT Provides Answers to Questions on Internet Neutrality
by Pranesh Prakash published Apr 26, 2011 last modified Jun 04, 2012 05:56 AM — filed under: ,
Pranesh Prakash of CIS asked David Sohn of CDT a few pointed questions on the emerging hot topic of 'Internet neutrality', and received very useful responses. Those questions and Mr. Sohn's responses are documented in this blog post.
Located in Internet Governance / Blog