Posts
Seventh Open Letter to the Finance Committee: A Note on the Deduplication of Unique Identifiers
— by Prasad Krishna — last modified Nov 22, 2011 07:28 AMSahana Sarkar on behalf of the Centre for Internet and Society (CIS) had sent in a Right to Information application on 30 June 2011 to Ashish Kumar, Central Public Information Officer, UIDAI. The UIDAI sent in its reply. Through the seventh open letter, Hans attempts to characterize in an abstract way the replies that CIS managed to elicit and makes some elementary observations.
My Experiment with Scam Baiting
— by http://trailofpapercuts.wordpress.com/ — last modified Mar 13, 2012 10:43 AMShahana, your experiments with spam baiting made for an intriguing read. I have always been tempted to 'investigate' the nexus between legitimate manufacturing / service [...]
UID: Questions without Answers – A Talk by Usha Ramanathan
— by Natasha Vaz — last modified Nov 24, 2011 04:41 AMUID enrolment is in full swing, providing an official identification to millions of Indians, yet there are numerous unanswered questions. A public talk on UID was held at the Institute of Science, Bangalore on September 6, 2011. Usha Ramanathan, an independent law researcher on jurisprudence, poverty and rights, discussed the questions that plague the UID project and the veil of silence enveloping the answers.
Whole Body Imaging and Privacy Concerns that Follow
— by Srishti Goyal — last modified Sep 29, 2011 05:38 AMLaw student at the National University of Juridical Sciences, and intern for Privacy India, Srishti Goyal compares, contrasts, and critiques the Whole Body Imaging practices found in the US, the UK, and Australia, and makes recommendations for an Indian regime.
CCTV in Universities
— by Merlin Oommen — last modified Sep 01, 2011 09:50 AMBasic Closed Circuit Television (CCTV) Infrastructure is used to observe movements from a central room, and consists of one or more video cameras that transmit video and audio images to a set of monitors or video recorders.
Re-thinking Key Escrow
— by Natasha Vaz — last modified Aug 22, 2011 11:44 AMWould you make duplicates of your house keys and hand them over to the local police authority? And if so, would you feel safe? Naturally, one would protest this invasion of privacy. Similarly, would it be justified for the government to have a copy of the private key to intercept and decrypt communications? This is the idea behind key escrow; it enables government ‘wiretapping’.
Privacy Blog
— by kaeru — last modified Aug 08, 2011 07:41 AMAn analysis of privacy in the context of India
Document Actions