You are here: Home
37 items matching your search terms.
Filter the results.
Item type



















New items since



Sort by relevance · date (newest first) · alphabetically
Blog Entry RBI Ban on Cryptocurrencies not backed by any data or statistics
by Vipul Kharbanda published Mar 05, 2020 last modified Mar 05, 2020 06:35 PM — filed under: , , , , ,
In March 2020, the Supreme Court of India quashed the RBI order passed in 2018 that banned financial services firms from trading in virtual currency or cryptocurrency. Keeping this policy window in mind, the Centre for Internet & Society will be releasing a series of blog posts and policy briefs on cryptocurrency regulation in India
Located in Internet Governance / Blog
Blog Entry Cryptocurrency Regulation in India – A brief history
by Vipul Kharbanda published Mar 05, 2020 last modified Mar 05, 2020 06:36 PM — filed under: , , , , ,
In March 2020, the Supreme Court of India quashed the RBI order passed in 2018 that banned financial services firms from trading in virtual currency or cryptocurrency. Keeping this policy window in mind, the Centre for Internet & Society will be releasing a series of blog posts and policy briefs on cryptocurrency regulation in India
Located in Internet Governance / Blog
Blog Entry Automated Facial Recognition Systems and the Mosaic Theory of Privacy: The Way Forward
by Arindrajit Basu, Siddharth Sonkar published Jan 02, 2020 — filed under: , , ,
Arindrajit Basu and Siddharth Sonkar have co-written this blog as the third of their three-part blog series on AI Policy Exchange under the parent title: Is there a Reasonable Expectation of Privacy from Data Aggregation by Automated Facial Recognition Systems?
Located in Internet Governance
Blog Entry Automated Facial Recognition Systems (AFRS): Responding to Related Privacy Concerns
by Arindrajit Basu, Siddharth Sonkar published Jan 02, 2020 — filed under: , , ,
Arindrajit Basu and Siddharth Sonkar have co-written this blog as the second of their three-part blog series on AI Policy Exchange under the parent title: Is there a Reasonable Expectation of Privacy from Data Aggregation by Automated Facial Recognition Systems?
Located in Internet Governance
Blog Entry Decrypting Automated Facial Recognition Systems (AFRS) and Delineating Related Privacy Concerns
by Arindrajit Basu, Siddharth Sonkar published Jan 02, 2020 last modified Jan 02, 2020 02:01 PM — filed under: , , ,
Arindrajit Basu and Siddharth Sonkar have co-written this blog as the first of their three-part blog series on AI Policy Exchange under the parent title: Is there a Reasonable Expectation of Privacy from Data Aggregation by Automated Facial Recognition Systems?
Located in Internet Governance
Blog Entry Extra-Territorial Surveillance and the Incapacitation of Human Rights
by Arindrajit Basu published Dec 31, 2019 last modified Jan 02, 2020 11:02 AM — filed under: , ,
This paper was published in Volume 12 (2) of the NUJS Law Review.
Located in Internet Governance
Blog Entry Call for Comments: Model Security Standards for the Indian Fintech Industry
by Pranav M B published Dec 16, 2019 last modified Dec 16, 2019 01:16 PM — filed under: , , , ,
Located in Internet Governance
Cybersecurity Visuals Media Handbook: Launch Event
by Saumyaa Naidu published Nov 28, 2019 last modified Dec 06, 2019 09:27 AM — filed under: , , ,
6th December | 6 pm | Centre for Internet and Society, Bangalore
Located in Internet Governance / Blog
Blog Entry Introducing the Cybersecurity Visuals Media Handbook
by Saumyaa Naidu and Arindrajit Basu published Nov 15, 2019 last modified Dec 06, 2019 09:29 AM — filed under: , ,
The need for intervention in the cybersecurity imagery in media publications was realised during a brainstorming workshop that was conducted by CIS with illustrators, designers, and cybersecurity researchers.
Located in Internet Governance / Blog
Blog Entry Guest post: Before cyber norms, let’s talk about disanalogy and disintermediation
by Pukhraj Singh published Nov 15, 2019 last modified Nov 18, 2019 10:14 AM — filed under: ,
In a guest post in relation to CIS’s recently held roundtable onIndia’s cyber defense strategy, Pukhraj Singh looks at the critical fissures – at the technical and policy levels – in global normative efforts to secure cyberspace. By charting out the key vectors and power asymmetries among key stakeholders – both leading state actors and private actors like Microsoft – Singh posits that there is much to be done before we circumscribe cyber operations within legal strictures.
Located in Internet Governance / Blog