You are here: Home
111 items matching your search terms.
Filter the results.
Item type



















New items since



Sort by relevance · date (newest first) · alphabetically
Bangalore Chapter Meet of DSCI
by Sunil Abraham published Sep 09, 2015 — filed under: , ,
The Centre for Internet & Society (CIS) will host the Bangalore Chapter Meeting of Data Security Council of India (DSCI) on September 26, 2015 at its Bangalore office in Domlur. The event will be held from 2.30 p.m. to 5.30 p.m.
Located in Internet Governance / Events
Anonymity in Cyberspace
by Sunil Abraham published Sep 09, 2015 last modified Sep 09, 2015 01:31 AM
Located in Internet Governance / Blog
Blog Entry Security: Privacy, Transparency and Technology
by Sunil Abraham published Aug 19, 2015 last modified Sep 15, 2015 10:53 AM — filed under: , , , ,
The Centre for Internet and Society (CIS) has been involved in privacy and data protection research for the last five years. It has participated as a member of the Justice A.P. Shah Committee, which has influenced the draft Privacy Bill being authored by the Department of Personnel and Training. It has organised 11 multistakeholder roundtables across India over the last two years to discuss a shadow Privacy Bill drafted by CIS with the participation of privacy commissioners and data protection authorities from Europe and Canada.
Located in Internet Governance / Blog
Blog Entry The generation of e-Emergency
by Sunil Abraham published Jun 22, 2015 last modified Jun 29, 2015 04:40 PM — filed under: , ,
The next generation of censorship technology is expected to be ‘real-time content manipulation’ through ISPs and Internet companies.
Located in Internet Governance / Blog
Blog Entry Shreya Singhal and 66A
by Sunil Abraham published Apr 11, 2015 last modified Apr 19, 2015 08:09 AM — filed under: , , , ,
Most software code has dependencies. Simple and reproducible methods exist for mapping and understanding the impact of these dependencies. Legal code also has dependencies --across court orders and within a single court order. And since court orders are not produced using a structured mark-up language, experts are required to understand the precedential value of a court order.
Located in Internet Governance / Blog
Blog Entry Fear, Uncertainty and Doubt
by Sunil Abraham published Mar 26, 2015 last modified Apr 17, 2015 01:44 AM — filed under: , , , ,
Much confusion has resulted from the Section 66A verdict. Some people are convinced that online speech is now without any reasonable restrictions under Article 19 (2) of the Constitution. This is completely false.
Located in Internet Governance / Blog
Blog Entry Multiple Aspects Need to be Addressed as the Clamour Grows for Network Neutrality
by Sunil Abraham published Apr 16, 2015 — filed under: ,
In the global debate there are four violations of Network Neutrality that are considered particularly egregious.
Located in Internet Governance / Blog
Blog Entry Big win for freedom of speech. Really?
by Sunil Abraham published Mar 29, 2015 last modified Mar 29, 2015 01:20 AM
The 66A ruling was historic, but what about the provisions regulating speech online and offline that still exist within the ITA, the IPC and other laws.
Located in Internet Governance / Blog
Blog Entry Internet censorship will continue in opaque fashion
by Sunil Abraham published Mar 26, 2015 — filed under: , , , ,
A division bench of the Supreme Court has ruled on three sections of the Information Technology Act 2000 - Section 66A, Section 79 and Section 69A. The draconian Section 66A was originally meant to tackle spam and cyber-stalking but was used by the powerful elite to crack down on online dissent and criticism.
Located in Internet Governance / Blog
Blog Entry Availability and Accessibility of Government Information in Public Domain
by Sunil Abraham published Dec 09, 2014 last modified Dec 30, 2014 01:25 AM — filed under: , , , ,
The information provided on most Government websites such as Acts, notifications, rules, orders, minutes of meetings and consultations, etc. is usually in the form of electronic documents. However, these lack authenticity and accessibility and cannot be (text) searched., This policy brief identifies the problem areas with the current work flow being used to publish documents and proposes suitable modifications to make them easy to locate, authentic and accessible.
Located in Accessibility / Blog