Internet Governance Blog

by kaeru — last modified Oct 18, 2011 06:40 AM

Cyber Crime & Privacy

Posted by Merlin Oommen at Aug 22, 2011 08:30 AM |

India is a growing area in the field of active Internet usage with 71 million Internet users.

Read More…

Financial Inclusion and the UID

Posted by elonnai hickok at Aug 22, 2011 07:50 AM |

Since 2009, when Nandan Nilekani began to envision and implement the Unique Identification Project, the UID authority has promoted the UID/Aadhaar scheme as a tool of development for India - arguing that an identity will assist in bringing benefits to the poor, promote financial inclusion in India, and allow for economic and social development. In this blog entry I will focus on the challenges and possibilities of the UID number providing the residents of India a viable method of access to financial services across the country.

Read More…

CCTV in Universities

Posted by Merlin Oommen at Aug 10, 2011 06:10 AM |

Basic Closed Circuit Television (CCTV) Infrastructure is used to observe movements from a central room, and consists of one or more video cameras that transmit video and audio images to a set of monitors or video recorders.

Read More…

Re-thinking Key Escrow

Posted by Natasha Vaz at Aug 09, 2011 05:40 AM |

Would you make duplicates of your house keys and hand them over to the local police authority? And if so, would you feel safe? Naturally, one would protest this invasion of privacy. Similarly, would it be justified for the government to have a copy of the private key to intercept and decrypt communications? This is the idea behind key escrow; it enables government ‘wiretapping’.

Read More…

UID: Nothing to Hide, Nothing to Fear?

Posted by Shilpa Narani at Jul 25, 2011 06:45 AM |

Isn’t it interesting that authorities ask you about your identity and you end up showing your proof of existence! Isn’t this breaching into one’s personal life? Why so much transparency only from the public side? Why can’t the government be equally transparent to the public?, asks Shilpa Narani.

Read More…

An Overview of DNA Labs in India

Posted by Shilpa Narani at Jul 24, 2011 08:15 AM |

DNA fingerprinting has become the most precise and technologically advanced method for identifying crimes such as murder, kidnapping, robbery and rape. Police and judicial authorities and in some cases even private parties retain this in their records, writes Shilpa in this blog post.

Read More…

Consumer Privacy in e-Commerce

Posted by Sahana Sarkar at Jul 23, 2011 09:35 AM |

Looking at the larger picture of national security versus consumer privacy, Sahana Sarkar says that though consumer privacy is important in the world of digital technology, individuals must put aside some of their civil liberties when it comes to the question of national security, as it is necessary to prevent societal damage.

Read More…

Video Surveillance and Its Impact on the Right to Privacy

Posted by Vaishnavi Chillakuru at Jul 23, 2011 08:15 AM |

The need for video surveillance has grown in this technologically driven era as a mode of law enforcement. Video Surveillance is very useful to governments and law enforcement to maintain social control, recognize and monitor threats, and prevent/investigate criminal activity. In this regard it is pertinent to highlight that not only are governments using this system, but residential communities in certain areas are also using this system to create a safer environment.

Read More…

Privacy Matters, Guwahati — Event Report

Posted by Prasad Krishna at Jul 21, 2011 08:00 AM |

On June 23, a public seminar on “Privacy Matters” was held at the Don Bosco Institute in Karhulli, Guwahati. It was organised by IDRC, Society in Action Group, IDEA Chirang, an NGO initiative working with grassroots initiatives in Assam, Privacy India and CIS and was attended by RTI activists and grass roots NGO representatives from across the North Eastern region: Manipur, Arunachal Pradesh, Tripura, Nagaland, Assam and Sikkim. The event focused on the challenges and concerns of privacy in India.

Read More…

Right to Privacy Bill 2010 — A Few Comments

Posted by Elonnai Hickok at Jul 20, 2011 07:00 AM |

Earlier this year, in February 2011, Rajeev Chandrasekhar introduced the Right to Privacy Bill, 2010 in the Rajya Sabha. The Bill is meant to “provide protection to the privacy of persons including those who are in public life”. Though the Bill states that its objective is to protect individuals’ fundamental right to privacy, the focus of the Bill is on the protection against the use of electronic/digital recording devices in public spaces without consent and for the purpose of blackmail or commercial use.

Read More…

Privacy & Media Law

Posted by Sonal Makhija at Jul 19, 2011 12:05 PM |

In her research, Sonal Makhija, a Bangalore-based lawyer, tries to delineate the emerging privacy concerns in India and the existing media norms and guidelines on the right to privacy. The research examines the existing media norms (governed by Press Council of India, the Cable Television Networks (Regulation) Act, 1995 and the Code of Ethics drafted by the News Broadcasting Standard Authority), the constitutional protection guaranteed to an individual’s right to privacy upheld by the courts, and the reasons the State employs to justify the invasion of privacy. The paper further records, both domestic and international, inclusions and exceptions with respect to the infringement of privacy.

Read More…

When Data Means Privacy, What Traces Are You Leaving Behind?

Posted by Noopur Raval at Jul 18, 2011 06:00 AM |

How do you know yourself to be different from others? What defines the daily life that you live and the knowledge you produce in the span of this life? Is all that information yours or are you a mere stakeholder on behalf of the State whose subject you are? What does privacy really mean? In a society that is increasingly relying on information to identify people, collecting and archiving ‘personal’ details of your lives, your name, age, passport details, ration card number, call records etc, how private is your tweet, status update, text message or simply, your restaurant bill?

Read More…

My Experiment with Scam Baiting

Posted by Sahana Sarkar at Jul 15, 2011 01:45 PM |

Today, as I am sure many of you have experienced, Internet scams are widespread and very deceptive. As part of my research into privacy and the Internet, I decided to follow a scam and attempt to fully understand how Internet scams work, and what privacy implications they have for Internet users. Though there are many different types of scams that take place over the Internet —identity scams, housing scams, banking scams— just to name a few. I decided to look in depth at the lottery scam.

Read More…

RTI and Third Party Information: What Constitutes the Private and Public?

Posted by Noopur Raval at Jul 12, 2011 01:25 PM |
Filed under:

The passing of the Right to Information Act, 2005 was seen as giving an empowering tool in the hands of the citizens of India, six years post its implementation, loopholes have surfaced with misuse of the many fundamental concepts, which have yet not been defined to allow for a consistent pattern of decisions. Among many problems that emerge with the Act, a major problem is defining the extent to which an individual has access to other people’s information. While most of us tend to think that asking for other people’s phone numbers, personal details like passport number or IT returns are private and would be kept so, under the RTI Act and as seen in the Central Information Commission (CIC) decisions, all of these details can be availed of by someone who doesn’t know you at all!

Read More…

Privacy and Security Can Co-exist

Posted by Sunil Abraham at Jun 22, 2011 03:55 AM |

The blanket surveillance the Centre seeks is not going to make India more secure, writes Sunil Abraham in this article published in Mail Today on June 21, 2011.

Read More…

Copyright Enforcement and Privacy in India

Posted by Prashant Iyengar at Jun 14, 2011 12:10 PM |

Copyright can function contradictorily, as both the vehicle for the preservation of privacy as well as its abuse, writes Prashant Iyengar. The research examines the various ways in which privacy has been implicated in the shifting terrain of copyright enforcement in India and concludes by examining the notion of the private that emerges from a tapestry view of the relevant sections of Copyright Act.

Read More…

Snooping Can Lead to Data Abuse

Snooping Can Lead to Data Abuse

Posted by Sunil Abraham at Jun 09, 2011 12:15 PM |
Filed under:

THE NATGRID, aiming to link databases of 21 departments and ministries for better counter-terror measures, adopts blunt policy approach, subjecting every citizen to the same level of blanket surveillance, instead of a targeted approach that intelligently focuses on geographic or demographic areas that are currently important, writes Sunil Abraham in this article published by Mail Today on June 9, 2011.

Read More…

The New Right to Privacy Bill 2011 — A Blind Man's View of the Elephunt

Posted by Prashant Iyengar at Jun 09, 2011 11:25 AM |

Over the past few days various newspapers have reported the imminent introduction in Parliament, during the upcoming Monsoon session, of a Right to Privacy Bill. Since the text of this bill has not yet been made accessible to the public, this post attempts to grope its way – through guesswork – towards a picture of what the Bill might look like from a combined reading of all the newspaper accounts, writes Prashant Iyengar in this blog post which was posted on the Privacy India website on June 8, 2011.

Read More…

Do You Want to be Watched?

Posted by Sunil Abraham at Jun 09, 2011 10:20 AM |
Filed under:

The new rules under the IT Act are an assault on our freedom, says Sunil Abraham in this article published in Pragati on June 8, 2011.

Read More…

The Digital is Political

Posted by Nishant Shah at Jun 08, 2011 12:25 PM |
Filed under:

Technologies are not just agents of politics, there is politics in their design, writes Nishant Shah in this article published in Down to Earth in the Issue of June 15, 2011.

Read More…

Document Actions

Filed under: