Search results — 5 items matching your search terms.
Subscribe to an always-updated feed of these search terms
- Electoral Databases – Privacy and Security Concerns
- In this blogpost, Snehashish Ghosh analyzes privacy and security concerns which have surfaced with the digitization, centralization and standardization of the ... by Snehashish Ghosh — last modified Jan 16, 2014 11:07 AM — Filed under: Digital Governance, Privacy, Cybersecurity, Data Protection, Internet Governance, Safety, Information Technology, Cyber Security, Security, e-Governance, Transparency, Politics, E-Governance
- State of Digital Rights in India (Delhi, March 24)
- The Centre for Communication Governance at National Law University, Delhi and the Internet Freedom Foundation, in association with Access Now, are hosting a ... by Japreet Grewal and Sumandro Chattapadhyay — last modified Mar 27, 2017 01:21 PM — Filed under: Privacy, Internet Governance, Civil Society, Security, Digital Rights
- Developer team fixed vulnerabilities in Honorable PM's app and API
- The official app of Narendra Modi, the Indian Prime Minister, was found to contain a security flaw in 2015 that exposed millions of people's personal data. A ... by Pranesh Prakash — last modified Dec 04, 2016 07:08 PM — Filed under: Privacy, Security, Internet Governance, Data Protection, Cyber Security, Hacking, Mobile Apps, Data Management
- The Constitutionality of Indian Surveillance Law: Public Emergency as a Condition Precedent for Intercepting Communications
- Bedavyasa Mohanty analyses the nuances of interception of communications under the Indian Telegraph Act and the Indian Post Office Act. In this post he ... by Bedavyasa Mohanty — last modified Aug 04, 2014 04:52 AM — Filed under: Privacy, Internet Governance, Surveillance, surveillance technologies, Security, Article 19(1)(a)
- IT Act and Commerce
- This is a guest post by Rahul Matthan, partner in the law firm Trilegal, and widely regarded as one of the leading experts on information technology law in ... by Pranesh Prakash — last modified Aug 02, 2011 07:41 AM — Filed under: IT Act, Digital Governance, Data Protection, Authentication, Security