Internet Governance Blog

by admin last modified Apr 05, 2016 03:40 AM
FinFisher in India and the Myth of Harmless Metadata

FinFisher in India and the Myth of Harmless Metadata

by Maria Xynou — last modified Aug 13, 2013 11:30 AM

In this article, Maria Xynou argues that metadata is anything but harmless, especially since FinFisher — one of the world's most controversial types of spyware — uses metadata to target individuals.

FinFisher in India and the Myth of Harmless Metadata - Read More…

Ethical Issues in Open Data

by Kovey Coles — last modified Aug 07, 2013 09:19 AM

On August 1, 2013, I took part in a web meeting, organized and hosted by Tim Davies of the World Wide Web foundation. The meeting, titled “Ethical issues in Open Data,” had an agenda focused around privacy considerations in the context of the open data movement.

Ethical Issues in Open Data - Read More…

'Ethical Hacker' Saket Modi Calls for Stronger Cyber Security Discussions

by Kovey Coles — last modified Aug 05, 2013 01:11 PM

Twenty-two year old Saket Modi is the CEO and co-founder of Lucideus, a leading cyber security company in India which claims to have worked with 4 out of 5 top global e-commerce companies, 4 out of 10 top IT companies in the world, and 3 out of 5 top banks of the Asia Pacific.

'Ethical Hacker' Saket Modi Calls for Stronger Cyber Security Discussions - Read More…

Guidelines for the Protection of National Critical Information Infrastructure: How Much Regulation?

by Jonathan Diamond — last modified Aug 01, 2013 04:48 AM

July has been a busy month for cyber security in India. Beginning with the release of the country’s first National Cyber Security Policy on July 2 and followed just this past week by a set of guidelines for the protection of national critical information infrastructure (CII) developed under the direction of the National Technical Research Organization (NTRO), India has made respectable progress in its thinking on national cyber security.

Guidelines for the Protection of National Critical Information Infrastructure: How Much Regulation? - Read More…

More than a Hundred Global Groups Make a Principled Stand against Surveillance

by Elonnai Hickok — last modified Jul 31, 2013 02:26 PM
July 31, 2013

For some time now there has been a need to update understandings of existing human rights law to reflect modern surveillance technologies and techniques.

More than a Hundred Global Groups Make a Principled Stand against Surveillance - Read More…

India's National Cyber Security Policy in Review

by Jonathan Diamond — last modified Jul 31, 2013 10:40 AM

Earlier this month, the Department of Electronics and Information Technology released India’s first National Cyber Security Policy. Years in the making, the Policy sets high goals for cyber security in India and covers a wide range of topics, from institutional frameworks for emergency response to indigenous capacity building.

India's National Cyber Security Policy in Review - Read More…

The Audacious ‘Right to Be Forgotten’

by Kovey Coles — last modified Jul 31, 2013 10:08 AM
July 31, 2013

There has long been speculation over the permanency of our online presence. Posting about excessively-personal details, commenting in a way which is later embarrassing, being caught in unflattering public photos; to our chagrin, all of these unfortunate situations often persist on the web, and can continue to haunt us in future years.

The Audacious ‘Right to Be Forgotten’ - Read More…

Report on the 5th Privacy Round Table meeting

Report on the 5th Privacy Round Table meeting

by Maria Xynou — last modified Jul 26, 2013 08:24 AM
July 24, 2013

This report entails an overview of the discussions and recommendations of the fifth Privacy Round Table in Calcutta, on 13th July 2013.

Report on the 5th Privacy Round Table meeting - Read More…

You Have the Right to Remain Silent

by Nishant Shah — last modified Jul 22, 2013 06:59 AM

Reflecting upon the state of freedom of speech and expression in India, in the wake of the shut-down of the political satire website narendramodiplans.com.

You Have the Right to Remain Silent - Read More…

Parsing the Cyber Security Policy

Parsing the Cyber Security Policy

by Chinmayi Arun — last modified Jul 22, 2013 06:37 AM

An effective cyber-security policy must keep up with the rapid evolution of technology, and must never become obsolete. The standard-setting and review bodies will therefore need to be very nimble, says Chinmayi Arun.

Parsing the Cyber Security Policy - Read More…

Document Actions