Internet Governance Main

by Ben Bas last modified Nov 21, 2011 10:39 AM

Report on CIS' Workshop at the IGF:'An Evidence Based Framework for Intermediary Liability'

An evidence based framework for intermediary liability' was organised to present evidence and discuss ongoing research on the changing definition, function and responsibilities of intermediaries across jurisdictions.

Read More…

Biometrics: An ‘Angootha Chaap’ nation?

Posted by Mukta Batra at Sep 19, 2014 05:05 AM |

This blog post throws light on the inconsistencies in biometric collection under the UID and NPR Schemes.

Read More…

UID and NPR: Towards Common Ground

Posted by Mukta Batra at Sep 19, 2014 04:40 AM |

The UID (Unique Identification) and NPR (National Population Register) are both government identity schemes that aggregate personal data, including biometric data for the provision of an identification factor, and aim to link them with the delivery of public utility services.

Read More…

Roundtable on Indian Privacy Law and Policy

Posted by Bhairav Acharya at Sep 14, 2014 04:00 PM |

This event was hosted by the Centre for Law and Development of the National University of Advanced Legal Studies (NUALS) in Kochi. It was attended by members of the faculty of NUALS, some students from the 2nd year, 3rd year, 4th year, and 5th year.

Read More…

UID: A Data Subject's Registration Tale

Posted by Mukta Batra at Sep 11, 2014 08:55 AM |

A person who registered for UIDAI shares their experience of registering for the UID Number, on the condition of anonymity.

Read More…

CIS@IGF 2014

Posted by Geetha Hariharan at Sep 06, 2014 12:00 PM |

The ninth Internet Governance Forum (“IGF2014”) was hosted by Turkey in Istanbul from September 2 to 5, 2014.

Read More…

The Aadhaar Case

Posted by Vipul Kharbanda at Sep 05, 2014 08:55 AM |

In 2012 a writ petition was filed by Justice K.S. Puttaswamy in the Supreme Court of India challenging the policy of the government in making an Aadhaar card for every person in India and its later plans to link various government benefit schemes to the same.

Read More…

Zero Draft of Content Removal Best Practices White Paper

Posted by Jyoti Panday at Aug 31, 2014 08:05 PM |

EFF and CIS Intermediary Liability Project is aimed towards the creation of a set of principles for intermediary liability in consultation with groups of Internet-focused NGOs and the academic community.

Read More…

CIS Cybersecurity Series (Part 21) – Gyanak Tsering

Posted by Purba Sarkar at Aug 31, 2014 03:05 PM |

CIS interviews Gyanak Tsering, Tibetan monk in exile, as part of the Cybersecurity Series.

Read More…

CIS Cybersecurity Series (Part 20) – Saumil Shah

Posted by Purba Sarkar at Aug 30, 2014 05:05 AM |

CIS interviews Saumil Shah, security expert, as part of the Cybersecurity Series.

Read More…

Privacy in Healthcare: Policy Guide

Posted by Tanvi Mani at Aug 26, 2014 08:40 AM |

The Health Policy Guide seeks to understand what are the legal regulations governing data flow in the health sector — particularly hospitals, and how are these regulations implemented. Towards this objective, the research reviews data practices in a variety of public and private hospitals and diagnostics labs. The research is based on legislation, case law, publicly available documents, and anonymous interviews.

Read More…

Learning to Forget the ECJ's Decision on the Right to be Forgotten and its Implications

Posted by Divij Joshi at Aug 14, 2014 06:00 AM |

“The internet never forgets” is a proposition which is equally threatening and promising.

Read More…

Second Privacy and Surveillance Roundtable

Posted by Anandini K Rathore at Aug 06, 2014 08:05 AM |

On July 4, 2014, the Centre for Internet and Society in association with the Cellular Operators Association of India organized a privacy roundtable at the India International Centre. The primary aim was to gain inputs on what would constitute an ideal surveillance regime in India.

Read More…

Surat’s Massive Surveillance Network Should Cause Concern, Not Celebration

Posted by Joe Sheehan at Aug 03, 2014 03:00 PM |

The blog post examines the surveillance network of Surat, a city in Gujarat state in India.

Read More…

CIS Cybersecurity Series (Part 17) – Nishant Shah

Posted by Purba Sarkar at Jul 31, 2014 05:48 AM |

CIS interviews Nishant Shah, researcher and academic, as part of the Cybersecurity Series.

Read More…

CIS Cybersecurity Series (Part 19) – Lobsang Sangay

Posted by Purba Sarkar at Jul 31, 2014 05:40 AM |

CIS interviews Lobsang Sangay, Prime Minister of the Central Tibetan Administration, as part of the Cybersecurity Series.

Read More…

CIS Cybersecurity Series (Part 18) – Lobsang Gyatso Sither

Posted by Purba Sarkar at Jul 31, 2014 05:34 AM |

CIS interviews Lobsang Gyatso Sither, Tibetan field coordinator and activist, as part of the Cybersecurity Series.

Read More…

UK’s Interception of Communications Commissioner — A Model of Accountability

Posted by Joe Sheehan at Jul 24, 2014 06:08 AM |

The United Kingdom maintains sophisticated electronic surveillance operations through a number of government agencies, ranging from military intelligence organizations to police departments to tax collection agencies. However, all of this surveillance is governed by one set of national laws outlining specifically what surveillance agencies can and cannot do.

Read More…

Private Censorship and the Right to Hear

Private Censorship and the Right to Hear

Posted by Chinmayi Arun at Jul 18, 2014 06:40 AM |

Very little recourse is available against publishers or intermediaries if these private parties censor an author’s content unreasonably.

Read More…

First Privacy and Surveillance Roundtable

Posted by Anandini K Rathore at Jul 18, 2014 06:05 AM |

The Privacy and Surveillance Roundtables are a CIS initiative, in partnership with the Cellular Operators Association of India (COAI), as well as local partners. From June 2014 – November 2014, CIS and COAI will host seven Privacy and Surveillance Roundtable discussions across multiple cities in India. The Roundtables will be closed-door deliberations involving multiple stakeholders.

Read More…

Document Actions