You are here: Home
1026 items matching your search terms.
Filter the results.
Item type



















New items since



Sort by relevance · date (newest first) · alphabetically
Open Letter to the Finance Committee: Finance and Security
by Prasad Krishna published Feb 10, 2011 last modified Feb 17, 2011 11:57 AM — filed under:
This note explores the three connections between finance and security and demonstrates the cost implications of operating a centrally designed identity management system as proposed by the UID. In doing so, it shows how the monitoring, storing, and securing of transactional data in a centralized database fall short of meeting the project's objectives of authentication, and thus is an additional cost. Further, it is argued that the blanket monitoring of the transaction database is not an effective method of detecting fraud, and is an expensive component of the project.
Located in Internet Governance / Blog / Privacy
Privacy Matters — Conference Report
by Prasad Krishna published Jan 24, 2011 last modified Jan 27, 2011 10:22 AM — filed under: ,
A one-day conference on Privacy Matters was held on Sunday, 23 January 2011 at the National University of Juridical Sciences (NUJS) Law School in Kolkata. This was the first of a series of eleven conferences on ‘privacy’ that Privacy India is scheduled to host in different Indian cities from January to June this year. Members of Parliament, Sri Manoj Bhattacharya from the Revolutionary Socialist Party (RSP) and Sri Nilotpal Basu from the Communist Party of India (Marxist) CPI (M) spoke in the conference. Students, the civil society and lawyers also participated in it.
Located in Internet Governance / Blog / Privacy
Blog Entry 4 Popular Myths about UID
by Prashant Iyengar published Jan 22, 2011 last modified Jun 20, 2012 04:37 AM — filed under: ,
By now, there is already a lot of material in the public domain that is critical about the UID/Aadhar project, writes Prashant Iyengar in this blog entry published in Privacy India on January 22, 2011.
Located in Internet Governance
Blog Entry An Open Letter to the Finance Committee: SCOSTA Standards
by Elonnai Hickok published Jan 06, 2011 last modified Dec 20, 2013 03:58 AM — filed under:
The UID Bill has been placed to the Finance Committee for review and approval. Through a series of open letters to the Finance Committee, civil society is asking the committee to take into consideration and change certain aspects of the Bill and the project. The below note compares the SCOSTA standard with the Aadhaar biometric standard, and explains why we believe the SCOSTA standard should replace the Aadhaar biometric standard for the authentication process in the UID scheme.
Located in Internet Governance / Blog / Privacy
Blog Entry The Privacy Rights of Whistleblowers
by Elonnai Hickok published Dec 20, 2010 last modified Mar 22, 2012 05:47 AM — filed under: ,
The recent disclosures from Wikileaks have shown that the right to information, whistle-blowing, and privacy are interconnected. This note looks at the different ways in which the three are related, as well as looking at the benefits and drawbacks to Wikileaks in terms of privacy.
Located in Internet Governance / Blog / Privacy
Blog Entry UID & Privacy - A Call for Papers
by Elonnai Hickok published Dec 15, 2010 last modified Mar 21, 2012 10:03 AM — filed under: ,
Privacy India is inviting individuals to author short papers focused on Unique Identity (UID) and Privacy. Selected candidates will have their papers published on the CIS website, and their transportation and accommodation provided for the “Privacy Matters” conference being held in Kolkata on 22 January 2010.
Located in Internet Governance / Blog / Privacy
UID Meeting in Bangalore – A Report
by Prasad Krishna published Dec 07, 2010 last modified Jan 04, 2011 08:14 AM — filed under:
On 23 November 2010 a public meeting was held for the UID in Bangalore. The speakers included B.K Chandrashekar, former Chairman of the Karnataka Legislature Council, Mr. Vidyashankar, Principal Secretary to Government of e-commerce, Sunil Abraham, Executive Director of Centre for Internet and Society, Jude D’Souza, Technology Specialist and Mathew Thomas, Retired Army Officer.
Located in Internet Governance / Blog / Privacy
Blog Entry Public Statement to Final Draft of UID Bill
by Elonnai Hickok published Dec 07, 2010 last modified Mar 22, 2012 05:48 AM — filed under: ,
The final draft of the UID Bill that will be submitted to the Lok Sabha was made public on 8 November 2010. If the Bill is approved by Parliament, it will become a legal legislation in India. The following note contains Civil Society's response to the final draft of the Bill.
Located in Internet Governance / Blog / Privacy
Blog Entry Consumer Privacy - How to Enforce an Effective Protective Regime?
by Elonnai Hickok published Nov 22, 2010 last modified Mar 21, 2012 10:06 AM — filed under:
In a typical sense, when people think of themselves as consumers, they just think about what they purchase, how they purchase and how they use their purchase. But while doing this exercise we are always exchanging personally identifiable information, and thus our privacy is always at risk. In this blog post, Elonnai Hickok and Prashant Iyengar through a series of questions look through the whole concept of consumer privacy at the national and international levels. By placing a special emphasis on Indian context, this post details the potential avenues of consumer privacy in India and states the important elements that should be kept in mind when trying to find at an effective protective regime for consumer privacy.
Located in Internet Governance / Blog / Privacy
Blog Entry American Bar Association Online Privacy Conference: A Report
by Elonnai Hickok published Nov 22, 2010 last modified Mar 21, 2012 10:08 AM — filed under:
On 10 November 2010, I attended an American Bar Association online conference on 'Regulating Privacy Across Borders in the Digital Age: An Emerging Global Consensus or Vive la Difference'. The panalists addressed many important global privacy challenges and spoke about the changes the EU directive is looking to take.
Located in Internet Governance / Blog / Privacy