Internet Governance Blog

by kaeru — last modified Oct 18, 2011 06:40 AM

Comments on the Draft Second Protocol to the Convention on Cybercrime (Budapest Convention)

Posted by Vipul Kharbanda at Feb 25, 2019 04:48 PM |

Following consultations with data protection, civil society, industry and others, during the Cybercrime Convention Committee (T-CY) meeting from 29 November 2018 onwards, the Cybercrime Convention Committee has sought additional contributions regarding the provisional draft text for a Second Additional Protocol to the Budapest Convention on Cybercrime (“Budapest Convention”).

Read More…

Resurrecting the marketplace of ideas

There is no ‘silver bullet’ for regulating content on the web. It requires a mix of legal and empirical analysis.

Read More…

CIS Submission to the UN Special Rapporteur on Freedom of Speech and Expression: Surveillance Industry and Human Rights

Posted by Elonnai Hickok, Arindrajit Basu, Gurshabad Grover, Akriti Bopanna, Shweta Mohandas, Martyna Kalvaityte at Feb 20, 2019 09:45 AM |

CIS responded to the call for submissions from the UN Special Rapporteur on Freedom of Speech and Expression. The submission was on the Surveillance Industry and Human Rights.

Read More…

Unbox Festival 2019: CIS organizes two Workshops

Posted by Saumyaa Naidu at Feb 17, 2019 07:00 PM |

Centre for Internet & Society organized two workshops at the Unbox Festival 2019, in Bangalore, on 15 and 17 February 2019.

Read More…

Data Infrastructures and Inequities: Why Does Reproductive Health Surveillance in India Need Our Urgent Attention?

Posted by Aayush Rathi and Ambika Tandon at Feb 14, 2019 03:02 AM |

In order to bring out certain conceptual and procedural problems with health monitoring in the Indian context, this article posits health monitoring as surveillance and not merely as a “data problem.”

Read More…

Intermediary liability law needs updating

Posted by Sunil Abraham at Feb 13, 2019 12:05 AM |

The time has come for India to exert its foreign policy muscle. There is a less charitable name for intermediary liability regimes like Sec 79 of the IT Act — private censorship regimes.

Read More…

CIS Comment on ICANN's Draft FY20 Operating Plan and Budget

Posted by Akriti Bopanna at Feb 12, 2019 11:44 PM |
Filed under: ,

At the Centre for Internet and Society, we are grateful for the opportunity to provide our comments on the proposed draft of ICANN’s FY20 Operating Plan and Budget along with their Five-Year Operating Plan Update. As part of the public comment process, ICANN provided a list of documents which can be found here that included their highlights of the budget, the total draft budget for FY20, an operating plan segregated by portfolios, amongst others.

Read More…

The Future of Work in the Automotive Sector in India

Posted by Harsh Bajpai, Ambika Tandon, and Amber Sinha at Feb 08, 2019 02:40 PM |

Working draft of a case study studying the future of work in the automotive sector, authored by Harsh Bajpai, Ambika Tandon, and Amber Sinha. Edited by Rakhi Sehgal.

Read More…

Response to the Draft of The Information Technology [Intermediary Guidelines (Amendment) Rules] 2018

Posted by Gurshabad Grover, Elonnai Hickok, Arindrajit Basu, Akriti at Feb 07, 2019 07:35 AM |

In this response, we aim to examine whether the draft rules meet tests of constitutionality and whether they are consistent with the parent Act. We also examine potential harms that may arise from the Rules as they are currently framed and make recommendations to the draft rules that we hope will help the Government meet its objectives while remaining situated within the constitutional ambit.

Read More…

CIS Submission to UN High Level Panel on Digital Cooperation

Posted by Aayush Rathi, Ambika Tandon, Arindrajit Basu and Elonnai Hickok at Feb 07, 2019 07:25 AM |

The UN high-level panel on Digital Cooperation issued a call for inputs that called for responses to various questions. CIS responded to the call for inputs.

Read More…

CIS Submission to UN High Level Panel on Digital Co-operation

Posted by Aayush Rathi, Ambika Tandon, Arindrajit Basu and Elonnai Hickok at Jan 30, 2019 08:05 PM |

The High-level Panel on Digital Cooperation was convened by the UN Secretary-General to advance proposals to strengthen cooperation in the digital space among Governments, the private sector, civil society, international organizations, academia, the technical community and other relevant stakeholders. The Panel issued a call for input that called for responses to various questions. CIS responded to the call for inputs.

Read More…

India should reconsider its proposed regulation of online content

Posted by Gurshabad Grover at Jan 24, 2019 04:55 PM |

The lack of technical considerations in the proposal is also apparent since implementing the proposal is infeasible for certain intermediaries. End-to-end encrypted messaging services cannot “identify” unlawful content since they cannot decrypt it. Presumably, the government’s intention is not to disallow end-to-end encryption so that intermediaries can monitor content.

Read More…

Leveraging the Coordinated Vulnerability Disclosure Process to Improve the State of Information Security in India

Posted by Pranesh Prakash, Karan Saini and Elonnai Hickok at Jan 23, 2019 04:48 PM |

This policy brief recommends several changes pertaining to current legislation, policy and practice to the Government of India regarding coordinated vulnerability disclosure (“CVD”) for improving the overarching information and cyber security posture of the country.

Read More…

Response to GCSC on Request for Consultation: Norm Package Singapore

Posted by Arindrajit Basu, Gurshabad Grover and Elonnai Hickok at Jan 22, 2019 10:00 PM |

The GCSC opened a public comment procedure to solicit comments and obtain additional feedback. CIS responded to the public call-offering comments on all six norms and proposing two further norms.

Read More…

The DNA Bill has a sequence of problems that need to be resolved

Posted by Shweta Mohandas and Elonnai Hickok at Jan 15, 2019 02:36 AM |

In its current form, it’s far from comprehensive and fails to adequately address privacy and security concerns.

Read More…

How to make EVMs hack-proof, and elections more trustworthy

Posted by Pranesh Prakash at Jan 14, 2019 03:34 PM |
Filed under:

Free and fair elections are the expression of democratic emancipation. India has always led by example: the Nehru Committee sought universal adult franchise in 1928, at a time when France didn’t let women vote, and laws in the USA allowed disqualification of poor, illiterate, and African-American voters. But how reliable are our voting systems, particularly in terms of security?

Read More…

Registering for Aadhaar in 2019

Posted by Sunil Abraham at Jan 03, 2019 02:55 PM |

It is a lot less scary registering for Aadhaar in 2019 than it was in 2010, given how the authentication modalities have since evolved.

Read More…

Economics of Cybersecurity: Literature Review Compendium

Posted by Natalia Khaniejo at Dec 31, 2018 01:57 AM |

The twenty first century has witnessed an unprecedented conflation of everyday experiences and technosocial practices. The emergence of technologies like the Internet of Things, Cloud Computing, Digital Payment infrastructures are all emblematic of this conflation of technology with economic, social and political modes of existence.

Read More…

Is the new ‘interception’ order old wine in a new bottle?

Is the new ‘interception’ order old wine in a new bottle?

Posted by Elonnai Hickok, Vipul Kharbanda, Shweta Mohandas and Pranav M. Bidare at Dec 29, 2018 04:02 PM |

The government could always authorise intelligence agencies to intercept and monitor communications, but the lack of clarity is problematic.

Read More…

Private-public partnership for cyber security

Private-public partnership for cyber security

Posted by Arindrajit Basu at Dec 26, 2018 02:50 PM |

Given the decentralised nature of cyberspace, the private sector will have to play a vital role in enforcing rules for security.

Read More…

Document Actions

Filed under: