Internet Governance Blog
India's 'Big Brother': The Central Monitoring System (CMS)
— by Maria Xynou — last modified Dec 06, 2013 09:39 AMIn this post, Maria Xynou looks at India´s Central Monitoring System (CMS) project and examines whether it can target individuals´ communications data, regardless of whether they are involved in illegal activity.
Off the Record
— by Nishant Shah — last modified Apr 26, 2013 05:58 AMSocial networks track our world but not relationships. We live in a world where things happen. And yet, with the presence of digital objects, the things that happen have increased in intensity and volume.
Comments on the Information Technology (Electronic Service Delivery) Rules, 2011
— by Bhairav Acharya — last modified Jul 12, 2013 12:12 PMBhairav Acharya on behalf of the Centre for Internet and Society prepared the following comments on the Information Technology (Electronic Services Delivery) Rules, 2011. These were submitted to the Committee on Subordinate Legislation of the 15th Lok Sabha. These were submitted to the Committee on Subordinate Legislation of the 15th Lok Sabha.
WGIG+8: Stock-Taking, Mapping, and Going Forward
— by Pranesh Prakash — last modified Apr 04, 2013 06:49 AMOn February 27, 2013, the Centre for Internet and Society conducted a workshop on the Working Group on Internet Governance report, titled "WGIG+8: Stock-Taking, Mapping, and Going Forward" at the World Summit on the Information Society (WSIS) + 10 meeting at Fontenoy Building, conference room # 7, UNESCO Headquarters, Paris from 9.30 a.m. to 11.00 a.m.
Comments on the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011
— by Bhairav Acharya — last modified Jul 12, 2013 12:13 PMBhairav Acharya on behalf of the Centre for Internet and Society prepared the following comments on the Sensitive Personal Data Rules. These were submitted to the Committee on Subordinate Legislation of the 15th Lok Sabha.
Comments on the Information Technology (Guidelines for Cyber Cafe) Rules, 2011
— by Bhairav Acharya — last modified Jul 12, 2013 12:15 PMBhairav Acharya on behalf of the Centre for Internet and Society submitted the following comments on the Information Technology (Guidelines for Cyber Cafe Rules), 2011.
The Criminal Law Amendment Bill 2013 — Penalising 'Peeping Toms' and Other Privacy Issues
— by Divij Joshi — last modified Jul 12, 2013 12:17 PMThe pending amendments to the Indian Penal Code, if passed in their current format, would be a huge boost for individual physical privacy by criminalising stalking and sexually-tinted voyeurism and removing the ambiguities in Indian law which threaten the privacy and dignity of individuals.
India's Biometric Identification Programs and Privacy Concerns
— by Divij Joshi — last modified Jul 21, 2016 10:51 AMThe invasiveness of individual identification coupled with the fallibility of managing big data which biometric identification presents poses a huge risk to individual privacy in India.
What’s In a Name? — DNS Singularity of ICANN and The Gold Rush
— by Sharath Chandra Ram — last modified Mar 31, 2013 05:35 AMMarch 2013 being the 28th birthday of the first ever registered Internet domain as well as the exigent launch of the Trademark Clearing House disguised as a milestone in rights protection by the Internet Corporation for Assigned Names and Numbers (ICANN) for it’s new gTLD program, Sharath Chandra Ram, dissects the transitory role of ICANN from being a technical outfit to the Boardroom Big Brother of Internet Governance.
Microsoft releases its first report on data requests by law enforcement agencies around the world
— by Maria Xynou — last modified Jul 12, 2013 12:19 PMIn this post, the Centre for Internet and Society presents Microsoft´s report on law enforcement requests, with a focus on data requested by Indian law enforcement agencies.
Document Actions