You are here: Home

Did you not find what you were looking for? Try the Advanced Search to refine your search.

Search results 114 items matching your search terms.

Subscribe to an always-updated feed of these search terms

Summary Report Internet Governance Forum 2015
Centre for Internet and Society (CIS), India participated in the Internet Governance Forum (IGF) held at Poeta Ronaldo Cunha Lima Conference Center, Joao ... by Jyoti Panday last modified Nov 30, 2015 10:47 AM — Filed under: , , , , , , , , , , , , ,
Call for Comments: Model Security Standards for the Indian Fintech Industry
by Pranav M B last modified Dec 16, 2019 01:16 PM — Filed under: , , , ,
Automated Facial Recognition Systems (AFRS): Responding to Related Privacy Concerns
Arindrajit Basu and Siddharth Sonkar have co-written this blog as the second of their three-part blog series on AI Policy Exchange under the parent title: Is ... by Arindrajit Basu, Siddharth Sonkar last modified Jan 02, 2020 02:09 PM — Filed under: , , ,
Automated Facial Recognition Systems and the Mosaic Theory of Privacy: The Way Forward
Arindrajit Basu and Siddharth Sonkar have co-written this blog as the third of their three-part blog series on AI Policy Exchange under the parent title: Is ... by Arindrajit Basu, Siddharth Sonkar last modified Jan 02, 2020 02:12 PM — Filed under: , , ,
Cryptocurrency Regulation in India – A brief history
In March 2020, the Supreme Court of India quashed the RBI order passed in 2018 that banned financial services firms from trading in virtual currency or ... by Vipul Kharbanda last modified Mar 05, 2020 06:36 PM — Filed under: , , , , ,
European Summer School on Internet Governance
The 13th European Summer School on Internet Governance was held at Meissen in Germany from 13 - 20 July 2019. Akriti Bopanna attended the school. The event was ... by Admin last modified Jul 23, 2019 12:30 AM — Filed under: , ,
India is falling down the facial recognition rabbit hole
Its use as an effective law enforcement tool is overstated, while the underlying technology is deeply flawed. by Prem Sylvester and Karan Saini last modified Jul 25, 2019 01:40 PM — Filed under: ,
CIS Cybersecurity Series (Part 20) – Saumil Shah
CIS interviews Saumil Shah, security expert, as part of the Cybersecurity Series. by Purba Sarkar last modified Sep 06, 2014 05:03 AM — Filed under: , , ,
Cyber Dialogue Conference 2014
The Cyber Dialogue conference, presented by the Canada Centre for Global Security Studies at the Munk School of Global Affairs, University of Toronto, will ... by Prasad Krishna last modified Apr 08, 2014 05:09 AM — Filed under: , , ,
Cyber-Security in the Age of Smart Manufacturing
Arindrajit Basu attended the event 'Cyber-security in the age of Smart Manufacturing.' The event 'BTS - CyberComm 2018' was organised by the Federation of ... by Admin last modified Oct 02, 2018 12:23 AM — Filed under: ,
Budapest Convention and the Information Technology Act
The Convention on Cybercrime adopted in Budapest (“Convention”) is the fist and one of the most important multilateral treaties addressing the issue of ... by Vipul Kharbanda last modified Nov 20, 2018 04:18 PM — Filed under: ,
Cyberspace and External Affairs:A Memorandum for India Summary
This memorandum seeks to summarise the state of the global debate in cyberspace; outline how India can craft it’s global strategic vision and finally, provides ... by Arindrajit Basu and Elonnai Hickok last modified Dec 01, 2018 04:10 AM — Filed under: , ,
A Critical Look at the Visual Representation of Cybersecurity
The Centre for Internet and Society and design collective Design Beku came together on the 15th of November for a workshop on Illustrations and Visual ... by Paromita Bathija, Padmini Ray Murray, and Saumyaa Naidu last modified Aug 21, 2019 08:00 AM — Filed under: ,
European E-Evidence Proposal and Indian Law
In April of 2018, the European Union issued the proposal for a new regime dealing with cross border sharing of data and information by issuing two draft ... by Vipul Kharbanda last modified Dec 23, 2018 04:45 PM — Filed under: ,
Mapping cybersecurity in India: An infographic
This infographic maps the key stakeholder, areas of focus and threat vectors that impact cybersecurity policy in India. Broadly, policy-makers should ... by Arindrajit Basu, Karan Saini, Aayush Rathi and Swaraj Barooah last modified Dec 23, 2018 04:57 PM — Filed under: ,
Private-public partnership for cyber security
Given the decentralised nature of cyberspace, the private sector will have to play a vital role in enforcing rules for security. by Arindrajit Basu last modified Dec 26, 2018 03:02 PM — Filed under: ,
India-China Tech Forum 2018
Arindrajit Basu spoke at the India-China Tech Forum 2018 organised by ORF and Peking University at the Ji Xianlin Centre for India-China Studies, Mumbai on ... by Admin last modified Dec 26, 2018 03:32 PM — Filed under: ,
Is the new ‘interception’ order old wine in a new bottle?
The government could always authorise intelligence agencies to intercept and monitor communications, but the lack of clarity is problematic. by Elonnai Hickok, Vipul Kharbanda, Shweta Mohandas and Pranav M. Bidare last modified Dec 29, 2018 04:02 PM — Filed under: , , , ,
Economics of Cybersecurity: Literature Review Compendium
The twenty first century has witnessed an unprecedented conflation of everyday experiences and technosocial practices. The emergence of technologies like the ... by Natalia Khaniejo last modified Dec 31, 2018 01:57 AM — Filed under: ,
CIS Cybersecurity Series (Part 6) - Lhadon Tethong
CIS interviews Lhadon Tethong, Tibetan human rights activist, as part of the Cybersecurity Series by Purba Sarkar last modified Aug 01, 2013 09:54 AM — Filed under: , , , ,
The National Cyber Security Policy: Not a Real Policy
Cyber security in India is still a nascent field without an organised law and policy framework. Several actors participate in and are affected by India's still ... by Bhairav Acharya last modified Sep 25, 2013 09:49 AM — Filed under: ,
CIS Cybersecurity Series (Part 11) - Anja Kovacs
CIS interviews Anja Kovacs, researcher and activist, and director of the Internet Democracy, Project as part of the Cybersecurity Series. by Purba Sarkar last modified Oct 15, 2013 03:25 PM — Filed under: , , , ,
National Seminar on Cyber Security & Cyber Laws - Issues and Concerns
Sharath Chandra Ram was a panelist at this seminar organized by the Advanced Centre for Research, Development & Training in Cyber Laws & Forensics on December ... by Prasad Krishna last modified Dec 31, 2014 02:04 AM — Filed under: ,
Bali meet to discuss Internet governance issues
Four-day event hosted by Internet Governance Forum to also discuss Internet access and diversity, privacy, security. by Prasad Krishna last modified Oct 23, 2013 08:29 AM — Filed under: , ,
CIS Cybersecurity Series (Part 12) - Namita Malhotra
CIS interviews Namita Malhotra, researcher and lawyer at Alternative Law Forum, Bangalore, as part of the Cybersecurity Series. by Purba Sarkar last modified Nov 18, 2013 10:03 AM — Filed under: , , , ,
First Look: CIS Cybersecurity documentary film
CIS presents the trailer of its documentary film DesiSec: Cybersecurity & Civil Society in India by Purba Sarkar last modified Dec 17, 2013 08:16 AM — Filed under: , , , , ,
India needs better cyber police
On Wednesday, one of the largest online shopping and auction portals, eBay, revealed that earlier this year, cybercriminals accessed details of 145 million of ... by Prasad Krishna last modified Jun 04, 2014 07:56 AM — Filed under: ,
IEEE-SA InDITA Conference 2018
Gurshabad Grover participated in the IEEE-SA InDITA Conference 2018 organized by IEEE Standards Association held IIIT-Bangalore on July 10 and 11, 2018. by Admin last modified Aug 01, 2018 11:04 PM — Filed under: ,
Symposium on India’s Cyber Strategy
CIS organised a Symposium on India’s Cyber Strategy. by Admin last modified Oct 02, 2018 06:02 AM — Filed under: , ,
CyFy 2018
Swaraj Paul Barooah and Arindrajit Basu participated in CyFy 2018 organized by Observer Research Foundation at Hotel Taj Mahal, New Delhi from October 3 - 5, ... by Admin last modified Oct 08, 2018 03:36 PM — Filed under: ,