You are here: Home

Did you not find what you were looking for? Try the Advanced Search to refine your search.

Search results 1026 items matching your search terms.

Subscribe to an always-updated feed of these search terms

UID: Nothing to Hide, Nothing to Fear?
Isn’t it interesting that authorities ask you about your identity and you end up showing your proof of existence! Isn’t this breaching into one’s personal ... by Shilpa Narani last modified Sep 28, 2011 11:44 AM — Filed under: ,
An Interview with Activist Shubha Chacko: Privacy and Sex Workers
On February 20th I had the opportunity to speak with Shubha Chacko on privacy and sex workers. Ms. Chacko is an activist who works for Aneka, an NGO based in ... by Elonnai Hickok last modified Mar 28, 2012 06:26 AM — Filed under: ,
Limits to Privacy
In his research article, Prashant Iyengar examines the limits to privacy for individuals in light of the provisions of the Constitution of India, public ... by Prashant Iyengar last modified Dec 14, 2012 10:28 AM — Filed under: ,
Video Surveillance and Its Impact on the Right to Privacy
The need for video surveillance has grown in this technologically driven era as a mode of law enforcement. Video Surveillance is very useful to governments and ... by Vaishnavi Chillakuru last modified Sep 29, 2011 05:35 AM — Filed under: ,
When Data Means Privacy, What Traces Are You Leaving Behind?
How do you know yourself to be different from others? What defines the daily life that you live and the knowledge you produce in the span of this life? Is all ... by Noopur Raval last modified Nov 24, 2011 09:24 AM — Filed under: ,
Privacy & Media Law
In her research, Sonal Makhija, a Bangalore-based lawyer, tries to delineate the emerging privacy concerns in India and the existing media norms and guidelines ... by Sonal Makhija last modified Dec 14, 2012 10:26 AM — Filed under: ,
Right to Privacy Bill 2010 — A Few Comments
Earlier this year, in February 2011, Rajeev Chandrasekhar introduced the Right to Privacy Bill, 2010 in the Rajya Sabha. The Bill is meant to “provide ... by Elonnai Hickok last modified Mar 22, 2012 06:26 AM — Filed under: ,
Open Letter to the Finance Committee: Operational Design
The objective of the UID project is to provide identity infrastructure that is not susceptible to fraud or error. This note highlights parts of the operational ... by Prasad Krishna last modified Feb 17, 2011 10:02 AM — Filed under:
Open Letter to the Finance Committee: UID Budget
This note presents the aspects of the UID project, which have not been considered or incorporated into the UID’s budget. The costs include re-enrollment, loss ... by Prasad Krishna last modified Feb 17, 2011 11:18 AM — Filed under:
Open Letter to the Finance Committe: Biometrics
This note points out the weaknesses inherent in biometrics and the pitfalls in using them. It recommends procedural safeguards that should be adopted by the ... by Prasad Krishna last modified Feb 17, 2011 01:12 PM — Filed under:
Open Letter to the Finance Committee: Finance and Security
This note explores the three connections between finance and security and demonstrates the cost implications of operating a centrally designed identity ... by Prasad Krishna last modified Feb 17, 2011 11:57 AM — Filed under:
Open Letter to the Finance Committee: UID and Transactions
Since official documentation from the UIDAI is very limited, we assume that data pertaining to transactions would comprise of the Aadhaar number, identifier of ... by Prasad Krishna last modified Feb 24, 2011 01:35 PM — Filed under:
'Privacy Matters', Ahmedabad: Conference Report
On 26 March 2011, civil society, lawyers, judges, students and NGO’s, gathered together at the Ahmedabad Management Association to take part in 'Privacy ... by Prasad Krishna last modified Apr 04, 2011 04:45 AM — Filed under: ,
Privacy and the Information Technology Act — Do we have the Safeguards for Electronic Privacy?
How do the provisions of the Information Technology Act measure up to the challenges of privacy infringement? Does it provide an adequate and useful safeguard ... by Prashant Iyengar last modified Dec 14, 2012 10:29 AM — Filed under: ,
Consumer Privacy in e-Commerce
Looking at the larger picture of national security versus consumer privacy, Sahana Sarkar says that though consumer privacy is important in the world of ... by Sahana Sarkar last modified Mar 28, 2012 04:53 AM — Filed under: ,
Copyright Enforcement and Privacy in India
Copyright can function contradictorily, as both the vehicle for the preservation of privacy as well as its abuse, writes Prashant Iyengar. The research ... by Prashant Iyengar last modified Dec 14, 2012 10:27 AM — Filed under: ,
Re-thinking Key Escrow
Would you make duplicates of your house keys and hand them over to the local police authority? And if so, would you feel safe? Naturally, one would protest ... by Natasha Vaz last modified Aug 22, 2011 11:44 AM — Filed under: ,
CCTV in Universities
Basic Closed Circuit Television (CCTV) Infrastructure is used to observe movements from a central room, and consists of one or more video cameras that transmit ... by Merlin Oommen last modified Sep 01, 2011 09:50 AM — Filed under: ,
The Digital Identification Parade
NCRB’s proposed Automated Facial Recognition System impinges on right to privacy, is likely to target certain groups. by Aayush Rathi and Ambika Tandon last modified Jul 30, 2019 12:19 AM — Filed under: ,
Roundtable with the WhatsApp leadership
Will Cathcart, WhatsApp's new global head, visited India and invited Sunil Abraham for a discussion on 26 July 2019 at the Mountbatten, The Oberoi, New Delhi. ... by Admin last modified Jul 30, 2019 12:33 AM — Filed under: ,
Facebook Data for Good in New Delhi
When data is shared responsibly with the communities that need it, it can improve well being and save lives. Anubha Sinha participated in a session organized ... by Admin last modified Jul 31, 2019 02:10 AM — Filed under: ,
Facebook Data for Good in Bangalore
When data is shared responsibly with the communities that need it, it can improve well being and save lives. Shweta Mohandas participated in a session ... by Admin last modified Jul 31, 2019 02:14 AM — Filed under: ,
Comments to the ID4D Practitioners’ Guide
by Yesha Tshering Paul, Prakriti Singh, and Amber Sinha last modified Aug 08, 2019 10:25 AM — Filed under: , , , ,
The Appropriate Use of Digital Identity
by Amber Sinha last modified Aug 08, 2019 10:24 AM — Filed under: , , , ,
Holding ID Issuers Accountable, What Works?
by Shruti Trikanad and Amber Sinha last modified Aug 08, 2019 10:23 AM — Filed under: , , , ,
Design and Uses of Digital Identities - Research Plan
In our research project about uses and design of digital identity systems, we ask two core questions: a) What are appropriate uses of ID?, and b) How should we ... by Amber Sinha and Pooja Saxena last modified Aug 17, 2019 07:58 AM — Filed under: , , , ,
Privacy Matters — Analyzing the "Right to Privacy Bill"
Privacy India in partnership with International Development Research Centre, Canada, Indian Institute of Technology, Bombay, the Godrej Culture Lab, Tata ... by Natasha Vaz last modified Apr 28, 2012 04:10 AM — Filed under: , , ,
Proposed Intermediary Liability Rules threat to privacy and free speech, global coalition tells MeitY
“We respectfully call on you to withdraw the draft amendments proposed to the Information Technology (Intermediary Guidelines) Rules in December. As published, ... by Zaheer Merchant last modified Mar 20, 2019 03:56 PM — Filed under: , ,
IETF 104 Prague
Karan Saini and Gurshabad Grover participated in IETF 104 organized by IETF in Prague from 23rd March to 29th March 2019. by Admin last modified Apr 12, 2019 01:04 AM — Filed under: ,
Programme Officer - Privacy
The Centre for Internet and Society (CIS) is seeking applications for the position of Programme Officer, to undertake public policy research on privacy and ... by Amber Sinha last modified Apr 15, 2019 06:53 AM — Filed under: , ,