You are here: Home
37 items matching your search terms.
Filter the results.
Item type



















New items since



Sort by relevance · date (newest first) · alphabetically
Blog Entry Cryptocurrency Regulation in India – A brief history
by Vipul Kharbanda published Mar 05, 2020 last modified Mar 05, 2020 06:36 PM — filed under: , , , , ,
In March 2020, the Supreme Court of India quashed the RBI order passed in 2018 that banned financial services firms from trading in virtual currency or cryptocurrency. Keeping this policy window in mind, the Centre for Internet & Society will be releasing a series of blog posts and policy briefs on cryptocurrency regulation in India
Located in Internet Governance / Blog
Cybersecurity Visuals Media Handbook: Launch Event
by Saumyaa Naidu published Nov 28, 2019 last modified Dec 06, 2019 09:27 AM — filed under: , , ,
6th December | 6 pm | Centre for Internet and Society, Bangalore
Located in Internet Governance / Blog
Blog Entry Decrypting Automated Facial Recognition Systems (AFRS) and Delineating Related Privacy Concerns
by Arindrajit Basu, Siddharth Sonkar published Jan 02, 2020 last modified Jan 02, 2020 02:01 PM — filed under: , , ,
Arindrajit Basu and Siddharth Sonkar have co-written this blog as the first of their three-part blog series on AI Policy Exchange under the parent title: Is there a Reasonable Expectation of Privacy from Data Aggregation by Automated Facial Recognition Systems?
Located in Internet Governance
DesiSec: Episode 1 - Film Release and Screening
by Purba Sarkar published Nov 28, 2013 last modified Dec 17, 2013 08:13 AM — filed under: , , , , , , ,
The Centre for Internet and Society is pleased to to announce the release of the first documentary film on cybersecurity in India - DesiSec. We hope you can join us for a special screening of the first episode of DesiSec, on 11th December, at CIS!
Located in Internet Governance
Blog Entry Electoral Databases – Privacy and Security Concerns
by Snehashish Ghosh published Jan 16, 2014 last modified Jan 16, 2014 11:07 AM — filed under: , , , , , , , , , , ,
In this blogpost, Snehashish Ghosh analyzes privacy and security concerns which have surfaced with the digitization, centralization and standardization of the electoral database and argues that even though the law provides the scope for protection of electoral databases, the State has not taken any steps to ensure its safety.
Located in Internet Governance / Blog
Blog Entry Extra-Territorial Surveillance and the Incapacitation of Human Rights
by Arindrajit Basu published Dec 31, 2019 last modified Jan 02, 2020 11:02 AM — filed under: , ,
This paper was published in Volume 12 (2) of the NUJS Law Review.
Located in Internet Governance
Blog Entry First Look: CIS Cybersecurity documentary film
by Purba Sarkar published Nov 18, 2013 last modified Dec 17, 2013 08:16 AM — filed under: , , , , ,
CIS presents the trailer of its documentary film DesiSec: Cybersecurity & Civil Society in India
Located in Internet Governance / Blog
Blog Entry Good Intentions, Recalcitrant Text - I: Why India’s Proposal at the ITU is Troubling for Internet Freedoms
by Geetha Hariharan published Oct 28, 2014 last modified Nov 02, 2014 03:13 PM — filed under: , , , , , , , ,
The UN's International Telecommunications Union (ITU) is hosting its Plenipotentiary Conference (PP-14) this year in South Korea. At PP-14, India introduced a new draft resolution on ITU's Role in Realising Secure Information Society. The Draft Resolution has grave implications for human rights and Internet governance. Geetha Hariharan explores.
Located in Internet Governance / Blog
Blog Entry Guest post: Before cyber norms, let’s talk about disanalogy and disintermediation
by Pukhraj Singh published Nov 15, 2019 last modified Nov 18, 2019 10:14 AM — filed under: ,
In a guest post in relation to CIS’s recently held roundtable onIndia’s cyber defense strategy, Pukhraj Singh looks at the critical fissures – at the technical and policy levels – in global normative efforts to secure cyberspace. By charting out the key vectors and power asymmetries among key stakeholders – both leading state actors and private actors like Microsoft – Singh posits that there is much to be done before we circumscribe cyber operations within legal strictures.
Located in Internet Governance / Blog
Blog Entry Introducing the Cybersecurity Visuals Media Handbook
by Saumyaa Naidu and Arindrajit Basu published Nov 15, 2019 last modified Dec 06, 2019 09:29 AM — filed under: , ,
The need for intervention in the cybersecurity imagery in media publications was realised during a brainstorming workshop that was conducted by CIS with illustrators, designers, and cybersecurity researchers.
Located in Internet Governance / Blog