Internet Governance Blog

Bye Bye email?
— by Nishant Shah — last modified Aug 23, 2011 07:31 AMEmail might be the default method of communication for most of us, but could it be going the telegram way.
Whole Body Imaging and Privacy Concerns that Follow
— by Srishti Goyal — last modified Sep 29, 2011 05:38 AMLaw student at the National University of Juridical Sciences, and intern for Privacy India, Srishti Goyal compares, contrasts, and critiques the Whole Body Imaging practices found in the US, the UK, and Australia, and makes recommendations for an Indian regime.
IP Addresses and Expeditious Disclosure of Identity in India
— by Prashant Iyengar — last modified Dec 14, 2012 10:20 AMIn this research, Prashant Iyengar reviews the statutory mechanism regulating the retention and disclosure of IP addresses by Internet companies in India. Prashant provides a compilation of anecdotes on how law enforcement authorities in India have used IP address information to trace individuals responsible for particular crimes.
Cyber Crime & Privacy
— by Merlin Oommen — last modified Sep 01, 2011 09:36 AMIndia is a growing area in the field of active Internet usage with 71 million Internet users.
Financial Inclusion and the UID
— by elonnai hickok — last modified Aug 23, 2011 10:36 AMSince 2009, when Nandan Nilekani began to envision and implement the Unique Identification Project, the UID authority has promoted the UID/Aadhaar scheme as a tool of development for India - arguing that an identity will assist in bringing benefits to the poor, promote financial inclusion in India, and allow for economic and social development. In this blog entry I will focus on the challenges and possibilities of the UID number providing the residents of India a viable method of access to financial services across the country.
CCTV in Universities
— by Merlin Oommen — last modified Sep 01, 2011 09:50 AMBasic Closed Circuit Television (CCTV) Infrastructure is used to observe movements from a central room, and consists of one or more video cameras that transmit video and audio images to a set of monitors or video recorders.
Re-thinking Key Escrow
— by Natasha Vaz — last modified Aug 22, 2011 11:44 AMWould you make duplicates of your house keys and hand them over to the local police authority? And if so, would you feel safe? Naturally, one would protest this invasion of privacy. Similarly, would it be justified for the government to have a copy of the private key to intercept and decrypt communications? This is the idea behind key escrow; it enables government ‘wiretapping’.
UID: Nothing to Hide, Nothing to Fear?
— by Shilpa Narani — last modified Sep 28, 2011 11:44 AMIsn’t it interesting that authorities ask you about your identity and you end up showing your proof of existence! Isn’t this breaching into one’s personal life? Why so much transparency only from the public side? Why can’t the government be equally transparent to the public?, asks Shilpa Narani.
An Overview of DNA Labs in India
— by Shilpa Narani — last modified Feb 02, 2016 01:11 PMDNA fingerprinting has become the most precise and technologically advanced method for identifying crimes such as murder, kidnapping, robbery and rape. Police and judicial authorities and in some cases even private parties retain this in their records, writes Shilpa in this blog post.
Consumer Privacy in e-Commerce
— by Sahana Sarkar — last modified Mar 28, 2012 04:53 AMLooking at the larger picture of national security versus consumer privacy, Sahana Sarkar says that though consumer privacy is important in the world of digital technology, individuals must put aside some of their civil liberties when it comes to the question of national security, as it is necessary to prevent societal damage.
Document Actions