Internet Governance Blog

by admin last modified Apr 05, 2016 03:40 AM

The DNA Bill has a sequence of problems that need to be resolved

by Shweta Mohandas and Elonnai Hickok — last modified Jan 15, 2019 02:36 AM

In its current form, it’s far from comprehensive and fails to adequately address privacy and security concerns.

The DNA Bill has a sequence of problems that need to be resolved - Read More…

How to make EVMs hack-proof, and elections more trustworthy

by Pranesh Prakash — last modified Jan 14, 2019 03:34 PM
January 14, 2019

Free and fair elections are the expression of democratic emancipation. India has always led by example: the Nehru Committee sought universal adult franchise in 1928, at a time when France didn’t let women vote, and laws in the USA allowed disqualification of poor, illiterate, and African-American voters. But how reliable are our voting systems, particularly in terms of security?

How to make EVMs hack-proof, and elections more trustworthy - Read More…

Registering for Aadhaar in 2019

by Sunil Abraham — last modified Jan 03, 2019 02:59 PM
January 03, 2019

It is a lot less scary registering for Aadhaar in 2019 than it was in 2010, given how the authentication modalities have since evolved.

Registering for Aadhaar in 2019 - Read More…

Economics of Cybersecurity: Literature Review Compendium

by Natalia Khaniejo — last modified Dec 31, 2018 01:57 AM
December 31, 2018

The twenty first century has witnessed an unprecedented conflation of everyday experiences and technosocial practices. The emergence of technologies like the Internet of Things, Cloud Computing, Digital Payment infrastructures are all emblematic of this conflation of technology with economic, social and political modes of existence.

Economics of Cybersecurity: Literature Review Compendium - Read More…

Is the new ‘interception’ order old wine in a new bottle?

Is the new ‘interception’ order old wine in a new bottle?

by Elonnai Hickok, Vipul Kharbanda, Shweta Mohandas and Pranav M. Bidare — last modified Dec 29, 2018 04:02 PM

The government could always authorise intelligence agencies to intercept and monitor communications, but the lack of clarity is problematic.

Is the new ‘interception’ order old wine in a new bottle? - Read More…

Private-public partnership for cyber security

Private-public partnership for cyber security

by Arindrajit Basu — last modified Dec 26, 2018 03:02 PM
December 26, 2018

Given the decentralised nature of cyberspace, the private sector will have to play a vital role in enforcing rules for security.

Private-public partnership for cyber security - Read More…

Mapping cybersecurity in India: An infographic

by Arindrajit Basu, Karan Saini, Aayush Rathi and Swaraj Barooah — last modified Dec 23, 2018 04:57 PM
December 23, 2018

This infographic maps the key stakeholder, areas of focus and threat vectors that impact cybersecurity policy in India. Broadly, policy-makers should concentrate on establishing a framework where individuals feel secure and trust the growing digital ecosystem. The infographic therefore serves as a ready reference point for the research that we have done and hope to continue through our cybersecurity work at CIS.

Mapping cybersecurity in India: An infographic - Read More…

European E-Evidence Proposal and Indian Law

by Vipul Kharbanda — last modified Dec 23, 2018 04:45 PM
December 23, 2018

In April of 2018, the European Union issued the proposal for a new regime dealing with cross border sharing of data and information by issuing two draft instruments, an E-evidence Regulation (“Regulation”) and an E-evidence Directive (“Directive”), (together the “E-evidence Proposal”). The Regulation is a direction to states to put in place the proper legislative and regulatory machinery for the implementation of this regime while the Directive requires the states to enact laws governing service providers so that they would comply with the proposed regime.

European E-Evidence Proposal and Indian Law - Read More…

Feminist Methodology in Technology Research: A Literature Review

by Ambika Tandon — last modified Dec 25, 2018 03:18 PM
December 23, 2018

This literature review has been authored by Ambika Tandon, with contributions from Mukta Joshi. Research assistance was provided by Kumarjeet Ray and Navya Sharma. The publication has been designed by Saumyaa Naidu.

Feminist Methodology in Technology Research: A Literature Review - Read More…

Event Report on Intermediary Liability and Gender Based Violence

by Akriti Bopanna — last modified Dec 21, 2018 07:16 AM
December 20, 2018

This report is a summary of the proceedings of the Roundtable Conference organized by the Centre for Internet and Society (CIS) at the Digital Citizen Summit, an annual summit organized by the Digital Empowerment Foundation. It was conducted at the India International Centre in New Delhi on November 1, 2018 from 11.30 a.m. to 12.30 p.m.

Event Report on Intermediary Liability and Gender Based Violence - Read More…

Document Actions