Internet Governance Main

by Ben Bas last modified Nov 21, 2011 10:39 AM

CIS Cybersecurity Series (Part 1) - Christopher Soghoian

Posted by Purba Sarkar at May 28, 2013 10:25 AM |

CIS interviews Christopher Soghoian, cybersecurity researcher and activist, as part of the Cybersecurity Series

Read More…

A Technological Solution to the Challenges of Online Defamation

Posted by Eduardo Bertoni at May 28, 2013 04:00 AM |

When people are insulted or humiliated on the Internet and decide to take legal action, their cases often follow a similar trajectory.

Read More…

Comparative Analysis of DNA Profiling Legislations from Across the World

Posted by Srinivas Atreya at May 23, 2013 04:25 AM |

With the growing importance of forensic data in law enforcement and research, many countries have recognized the need to regulate the collection and use of forensic data and maintain DNA databases. Across the world around 60 countries maintain DNA databases which are generally regulated by specific legislations. Srinivas Atreya provides a broad overview of the important provisions of four different legislations which can be compared and contrasted with the Indian draft bill.

Read More…

Report on the 3rd Privacy Round Table meeting

Report on the 3rd Privacy Round Table meeting

Posted by Maria Xynou at May 21, 2013 08:40 AM |

This report entails an overview of the discussions and recommendations of the third Privacy Round Table meeting in Chennai, on 18th May 2013.

Read More…

Google Policy Fellowship Programme: Call for Applications

The Centre for Internet & Society (CIS) is inviting applications for the Google Policy Fellowship programme. Google is providing a USD 7,500 stipend to the India Fellow, who will be selected by July 1, 2013.

Read More…

The Surveillance Industry in India: At Least 76 Companies Aiding Our Watchers!

The Surveillance Industry in India: At Least 76 Companies Aiding Our Watchers!

Posted by Maria Xynou at May 02, 2013 11:05 AM |

Maria Xynou is conducting research on surveillance technology companies operating in India. So far, 76 companies have been detected which are currently producing and selling different types of surveillance technology. This post entails primary data on the first ever investigation of the surveillance industry in India. Check it out!

Read More…

IT (Amendment) Act, 2008, 69B Rules: Draft and Final Version Comparison

Posted by Jadine Lannon at Apr 30, 2013 06:25 AM |

Jadine Lannon has performed a clause-by-clause comparison of the Draft 69B Rules and official 69B Rules under Section 69B in order to better understand how the two are similar and how they differ. Notes have been included on some changes we deemed to be important.

Read More…

IT (Amendment) Act, 2008, 69 Rules: Draft and Final Version Comparison

Posted by Jadine Lannon at Apr 30, 2013 04:35 AM |

Jadine Lannon has performed a clause-by-clause comparison of the Draft 69 Rules and official 69 Rules under Section 69B in order to better understand how the two are similar and how they differ. Very brief notes have been included on some changes we deemed to be important.

Read More…

Indian Telegraph Act, 1885, 419A Rules and IT (Amendment) Act, 2008, 69 Rules

Posted by Jadine Lannon at Apr 28, 2013 02:50 AM |
Filed under:

Jadine Lannon has performed a clause-by-clause comparison of the 419A Rules of the Indian Telegraph Act, 1885 and the 69 Rules under Section 69 of the Information Technology (Amendment) Act, 2008 in order to better understand how the two are similar and how they differ. Though they are from different Acts entirely, the Rules are very similar. Notes have been included on some changes we deemed to be important.

Read More…

IT (Amendment) Act, 2008, 69A Rules: Draft and Final Version Comparison

Posted by Jadine Lannon at Apr 26, 2013 10:55 PM |
Filed under: ,

Jadine Lannon has performed a clause-by-clause comparison of the 69A draft rules and 69A rules for Section 69A of the IT Act in order to better understand how the two differ. While there has been reshuffling of the clauses in the official rules, the content itself has not changed significantly. Notes have been included on some changes we deemed to be important.

Read More…

Report on the 2nd Privacy Round Table meeting

Report on the 2nd Privacy Round Table meeting

Posted by Maria Xynou at Apr 24, 2013 10:25 AM |

This post entails a report on the second Privacy Round Table meeting which took place on 20th April 2013.

Read More…

Report on the 1st Privacy Round Table meeting

Report on the 1st Privacy Round Table meeting

Posted by Maria Xynou at Apr 22, 2013 10:30 AM |

This report entails an overview of the discussions and recommendations of the first Privacy Round Table meeting in New Delhi, on 13th April 2013.

Read More…

India's 'Big Brother': The Central Monitoring System (CMS)

India's 'Big Brother': The Central Monitoring System (CMS)

Posted by Maria Xynou at Apr 08, 2013 07:05 AM |

In this post, Maria Xynou looks at India´s Central Monitoring System (CMS) project and examines whether it can target individuals´ communications data, regardless of whether they are involved in illegal activity.

Read More…

Off the Record

Off the Record

Posted by Nishant Shah at Apr 06, 2013 02:05 PM |
Filed under:

Social networks track our world but not relationships. We live in a world where things happen. And yet, with the presence of digital objects, the things that happen have increased in intensity and volume.

Read More…

Comments on the Information Technology (Electronic Service Delivery) Rules, 2011

Posted by Bhairav Acharya at Mar 31, 2013 02:50 PM |

Bhairav Acharya on behalf of the Centre for Internet and Society prepared the following comments on the Information Technology (Electronic Services Delivery) Rules, 2011. These were submitted to the Committee on Subordinate Legislation of the 15th Lok Sabha. These were submitted to the Committee on Subordinate Legislation of the 15th Lok Sabha.

Read More…

WGIG+8: Stock-Taking, Mapping, and Going Forward

Posted by Pranesh Prakash at Mar 31, 2013 02:50 PM |
Filed under:

On February 27, 2013, the Centre for Internet and Society conducted a workshop on the Working Group on Internet Governance report, titled "WGIG+8: Stock-Taking, Mapping, and Going Forward" at the World Summit on the Information Society (WSIS) + 10 meeting at Fontenoy Building, conference room # 7, UNESCO Headquarters, Paris from 9.30 a.m. to 11.00 a.m.

Read More…

Comments on the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011

Posted by Bhairav Acharya at Mar 31, 2013 02:45 PM |

Bhairav Acharya on behalf of the Centre for Internet and Society prepared the following comments on the Sensitive Personal Data Rules. These were submitted to the Committee on Subordinate Legislation of the 15th Lok Sabha.

Read More…

Comments on the Information Technology (Guidelines for Cyber Cafe) Rules, 2011

Posted by Bhairav Acharya at Mar 31, 2013 02:05 PM |

Bhairav Acharya on behalf of the Centre for Internet and Society submitted the following comments on the Information Technology (Guidelines for Cyber Cafe Rules), 2011.

Read More…

The Criminal Law Amendment Bill 2013 — Penalising 'Peeping Toms' and Other Privacy Issues

Posted by Divij Joshi at Mar 31, 2013 02:00 PM |

The pending amendments to the Indian Penal Code, if passed in their current format, would be a huge boost for individual physical privacy by criminalising stalking and sexually-tinted voyeurism and removing the ambiguities in Indian law which threaten the privacy and dignity of individuals.

Read More…

India's Biometric Identification Programs and Privacy Concerns

Posted by Divij Joshi at Mar 31, 2013 08:40 AM |

The invasiveness of individual identification coupled with the fallibility of managing big data which biometric identification presents poses a huge risk to individual privacy in India.

Read More…

Document Actions