Internet Governance Blog
Indian Telegraph Act, 1885, 419A Rules and IT (Amendment) Act, 2008, 69 Rules
— by Jadine Lannon — last modified Apr 30, 2013 10:04 AMJadine Lannon has performed a clause-by-clause comparison of the 419A Rules of the Indian Telegraph Act, 1885 and the 69 Rules under Section 69 of the Information Technology (Amendment) Act, 2008 in order to better understand how the two are similar and how they differ. Though they are from different Acts entirely, the Rules are very similar. Notes have been included on some changes we deemed to be important.
IT (Amendment) Act, 2008, 69A Rules: Draft and Final Version Comparison
— by Jadine Lannon — last modified Apr 30, 2013 10:10 AMJadine Lannon has performed a clause-by-clause comparison of the 69A draft rules and 69A rules for Section 69A of the IT Act in order to better understand how the two differ. While there has been reshuffling of the clauses in the official rules, the content itself has not changed significantly. Notes have been included on some changes we deemed to be important.
Report on the 2nd Privacy Round Table meeting
— by Maria Xynou — last modified Jul 12, 2013 11:54 AMThis post entails a report on the second Privacy Round Table meeting which took place on 20th April 2013.
Report on the 1st Privacy Round Table meeting
— by Maria Xynou — last modified Jul 30, 2013 11:11 AMThis report entails an overview of the discussions and recommendations of the first Privacy Round Table meeting in New Delhi, on 13th April 2013.
India's 'Big Brother': The Central Monitoring System (CMS)
— by Maria Xynou — last modified Dec 06, 2013 09:39 AMIn this post, Maria Xynou looks at India´s Central Monitoring System (CMS) project and examines whether it can target individuals´ communications data, regardless of whether they are involved in illegal activity.
Off the Record
— by Nishant Shah — last modified Apr 26, 2013 05:58 AMSocial networks track our world but not relationships. We live in a world where things happen. And yet, with the presence of digital objects, the things that happen have increased in intensity and volume.
Comments on the Information Technology (Electronic Service Delivery) Rules, 2011
— by Bhairav Acharya — last modified Jul 12, 2013 12:12 PMBhairav Acharya on behalf of the Centre for Internet and Society prepared the following comments on the Information Technology (Electronic Services Delivery) Rules, 2011. These were submitted to the Committee on Subordinate Legislation of the 15th Lok Sabha. These were submitted to the Committee on Subordinate Legislation of the 15th Lok Sabha.
WGIG+8: Stock-Taking, Mapping, and Going Forward
— by Pranesh Prakash — last modified Apr 04, 2013 06:49 AMOn February 27, 2013, the Centre for Internet and Society conducted a workshop on the Working Group on Internet Governance report, titled "WGIG+8: Stock-Taking, Mapping, and Going Forward" at the World Summit on the Information Society (WSIS) + 10 meeting at Fontenoy Building, conference room # 7, UNESCO Headquarters, Paris from 9.30 a.m. to 11.00 a.m.
Comments on the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011
— by Bhairav Acharya — last modified Jul 12, 2013 12:13 PMBhairav Acharya on behalf of the Centre for Internet and Society prepared the following comments on the Sensitive Personal Data Rules. These were submitted to the Committee on Subordinate Legislation of the 15th Lok Sabha.
Comments on the Information Technology (Guidelines for Cyber Cafe) Rules, 2011
— by Bhairav Acharya — last modified Jul 12, 2013 12:15 PMBhairav Acharya on behalf of the Centre for Internet and Society submitted the following comments on the Information Technology (Guidelines for Cyber Cafe Rules), 2011.
Document Actions

