You are here: Home
14 items matching your search terms.
Filter the results.
Item type



















New items since



Sort by relevance · date (newest first) · alphabetically
Blog Entry A Review of the Functioning of the Cyber Appellate Tribunal and Adjudicatory Officers under the IT Act
by Divij Joshi published Jun 16, 2014 last modified Jul 03, 2014 05:43 AM — filed under: , ,
Tribunals and quasi-judicial bodies are a regular feature of the Indian judicial system, as they provide for easier and less onerous methods for dispute resolution, especially disputes which relate to technical areas and often require technical knowledge and familiarity with specialised factual scenarios.
Located in Internet Governance / Blog
Blog Entry Calcutta High Court Strengthens Whistle Blower Protection
by Divij Joshi published Feb 24, 2014 — filed under: ,
Calcutta High Court has ordered for protection of whistle blower's privacy in its November 20, 2013 order. The court has directed the government to accept RTI applications without the applicant's personal details.
Located in Internet Governance / Blog
Blog Entry European Union Draft Report Admonishes Mass Surveillance, Calls for Stricter Data Protection and Privacy Laws
by Divij Joshi published Mar 20, 2014 last modified Sep 30, 2014 08:52 AM — filed under: ,
Ever since the release of the “Snowden files”, the secret documents evidencing the massive scale of surveillance undertaken by America’s National Security Agency and publically released by whistle-blower Edward Snowden, surveillance in the digital age has come to the fore of the global debate on internet governance and privacy.
Located in Internet Governance / Blog
Blog Entry February 11: The Day We Fight Back Against Mass Surveillance
by Divij Joshi published Feb 14, 2014 — filed under: ,
The expansive surveillance being perpetuated by governments and corporations is the single biggest threat to individual liberties in the digital age.
Located in Internet Governance / Blog
Blog Entry India's Biometric Identification Programs and Privacy Concerns
by Divij Joshi published Mar 31, 2013 last modified Jul 21, 2016 10:51 AM — filed under: , ,
The invasiveness of individual identification coupled with the fallibility of managing big data which biometric identification presents poses a huge risk to individual privacy in India.
Located in Internet Governance / Blog
Blog Entry Indian Intermediary Liability Regime: Compliance with the Manila Principles on Intermediary Liability
by Divij Joshi published May 20, 2018 last modified May 20, 2018 03:14 PM — filed under: , ,
This report assesses the compliance of the Indian intermediary liability framework with the Manila Principles on Intermediary Liability, and recommends substantive legislative changes to bring the legal framework in line with the Manila Principles.
Located in Internet Governance / Blog
Blog Entry Learning to Forget the ECJ's Decision on the Right to be Forgotten and its Implications
by Divij Joshi published Aug 14, 2014 last modified Aug 19, 2014 05:24 AM — filed under: ,
“The internet never forgets” is a proposition which is equally threatening and promising.
Located in Internet Governance / Blog
Blog Entry Net Neutrality and Privacy
by Divij Joshi published Mar 20, 2014 — filed under: ,
The highly contentious and polarising debate on net-neutrality will have a large impact on shaping the future of the internet and ultimately on the users of the internet. One important issue which needs to be prioritized while debating the necessity or desirability of a legal regime which advocates net-neutrality is its implication on privacy.
Located in Internet Governance / Blog
Blog Entry New Standard Operating Procedures for Lawful Interception and Monitoring
by Divij Joshi published Mar 13, 2014 last modified Mar 20, 2014 05:13 AM — filed under: ,
Government issues new guidelines to TSP’s to assist Lawful Interception and Monitoring.
Located in Internet Governance / Blog
Blog Entry Search and Seizure and the Right to Privacy in the Digital Age: A Comparison of US and India
by Divij Joshi published May 31, 2014 last modified Jun 02, 2014 06:45 AM — filed under: ,
The development of information technology has transformed the way in which individuals make everyday transactions and communicate with the world around us. These interactions and transactions are recorded and stored – constantly available for access by the individual and the company through which the service was used.
Located in Internet Governance / Blog