-
International Cooperation in Cybercrime: The Budapest Convention
-
by
Vipul Kharbanda
—
published
Apr 29, 2019
—
filed under:
International Cooperation,
Budapest Convention,
Internet Governance,
MLAT,
Cyber Security,
Cyber Crime
In today’s increasingly digitized world where an increasing volume of information is being stored in the digital format, access to data generated by digital technologies and on digital platforms is important in solving crimes online and offline.
Located in
Internet Governance
/
Blog
-
Improving the Processes for Disclosing Security Vulnerabilities to Government Entities in India
-
by
Karan Saini, Pranesh Prakash and Elonnai Hickok
—
published
Mar 20, 2019
—
last modified
Apr 01, 2019 12:02 PM
—
filed under:
Cyber Security,
Vulnerability Disclosure
The aim of this policy brief is to recommend changes pertaining to current legislation, policy and practice to the Government of India regarding external vulnerability reporting and disclosure. The changes we recommend within this brief aim to strengthen the processes around voluntary vulnerability and bug disclosure by third parties.
Located in
Internet Governance
/
Blog
-
Comments on the Draft Second Protocol to the Convention on Cybercrime (Budapest Convention)
-
by
Vipul Kharbanda
—
published
Feb 25, 2019
—
filed under:
Cyber Security,
Internet Governance
Following consultations with data protection, civil society, industry and others, during the Cybercrime Convention Committee (T-CY) meeting from 29 November 2018 onwards, the Cybercrime Convention Committee has sought additional contributions regarding the provisional draft text for a Second Additional Protocol to the Budapest Convention on Cybercrime (“Budapest Convention”).
Located in
Internet Governance
/
Blog
-
Response to GCSC on Request for Consultation: Norm Package Singapore
-
by
Arindrajit Basu, Gurshabad Grover and Elonnai Hickok
—
published
Jan 22, 2019
—
last modified
Jan 27, 2019 03:43 PM
—
filed under:
Cyber Security,
International Relations,
Internet Governance
The GCSC opened a public comment procedure to solicit comments and obtain additional feedback. CIS responded to the public call-offering comments on all six norms and proposing two further norms.
Located in
Internet Governance
/
Blog
-
Economics of Cybersecurity: Literature Review Compendium
-
by
Natallia Khaniejo
—
published
Dec 31, 2018
—
last modified
May 01, 2021 06:09 AM
—
filed under:
Cyber Security,
Internet Governance
The twenty first century has witnessed an unprecedented conflation of everyday experiences and technosocial practices. The emergence of technologies like the Internet of Things, Cloud Computing, Digital Payment infrastructures are all emblematic of this conflation of technology with economic, social and political modes of existence.
Located in
Internet Governance
/
Blog
-
Is the new ‘interception’ order old wine in a new bottle?
-
by
Elonnai Hickok, Vipul Kharbanda, Shweta Mohandas and Pranav M. Bidare
—
published
Dec 29, 2018
—
filed under:
IT Act,
Privacy,
Internet Governance,
Cyber Security,
Information Technology
The government could always authorise intelligence agencies to intercept and monitor communications, but the lack of clarity is problematic.
Located in
Internet Governance
/
Blog
-
India-China Tech Forum 2018
-
by
Admin
—
published
Dec 26, 2018
—
filed under:
Cyber Security,
Internet Governance
Arindrajit Basu spoke at the India-China Tech Forum 2018 organised by ORF and Peking University at the Ji Xianlin Centre for India-China Studies, Mumbai on December 11 - 12, 2018. The event functioned as a bi-annual dialogue that fosters co-operation in this space between the two countries.
Located in
Internet Governance
/
News & Media
-
Private-public partnership for cyber security
-
by
Arindrajit Basu
—
published
Dec 26, 2018
—
last modified
Dec 26, 2018 03:02 PM
—
filed under:
Cyber Security,
Internet Governance
Given the decentralised nature of cyberspace, the private sector will have to play a vital role in enforcing rules for security.
Located in
Internet Governance
/
Blog
-
Mapping cybersecurity in India: An infographic
-
by
Arindrajit Basu, Karan Saini, Aayush Rathi and Swaraj Barooah
—
published
Dec 23, 2018
—
filed under:
Cyber Security,
Internet Governance
This infographic maps the key stakeholder, areas of focus and threat vectors that impact cybersecurity policy in India. Broadly, policy-makers should concentrate on establishing a framework where individuals feel secure and trust the growing digital ecosystem. The infographic therefore serves as a ready reference point for the research that we have done and hope to continue through our cybersecurity work at CIS.
Located in
Internet Governance
/
Blog
-
European E-Evidence Proposal and Indian Law
-
by
Vipul Kharbanda
—
published
Dec 23, 2018
—
filed under:
Cyber Security,
Internet Governance
In April of 2018, the European Union issued the proposal for a new regime dealing with cross border sharing of data and information by issuing two draft instruments, an E-evidence Regulation (“Regulation”) and an E-evidence Directive (“Directive”), (together the “E-evidence Proposal”). The Regulation is a direction to states to put in place the proper legislative and regulatory machinery for the implementation of this regime while the Directive requires the states to enact laws governing service providers so that they would comply with the proposed regime.
Located in
Internet Governance
/
Blog