Internet Governance Blog

by admin last modified Apr 05, 2016 03:40 AM

UID: Questions without Answers – A Talk by Usha Ramanathan

by Natasha Vaz — last modified Nov 24, 2011 04:41 AM
September 26, 2011

UID enrolment is in full swing, providing an official identification to millions of Indians, yet there are numerous unanswered questions. A public talk on UID was held at the Institute of Science, Bangalore on September 6, 2011. Usha Ramanathan, an independent law researcher on jurisprudence, poverty and rights, discussed the questions that plague the UID project and the veil of silence enveloping the answers.

UID: Questions without Answers – A Talk by Usha Ramanathan - Read More…

Understanding the Right to Information

by Elonnai Hickok — last modified Jun 12, 2013 11:39 AM
September 28, 2011

Elonnai Hickok summarises the Right to Information Act, 2005, how it works, how to file an RTI request, the information that an individual can request under the Act, the possible responses and the challenges to the citizen and the government. She concludes by saying that there are many structural changes that both citizens and governmental officers can make to improve the system.

Understanding the Right to Information - Read More…

Bye Bye email?

Bye Bye email?

by Nishant Shah — last modified Aug 23, 2011 07:31 AM
August 23, 2011

Email might be the default method of communication for most of us, but could it be going the telegram way.

Bye Bye email? - Read More…

Whole Body Imaging and Privacy Concerns that Follow

by Srishti Goyal — last modified Sep 29, 2011 05:38 AM
August 22, 2011

Law student at the National University of Juridical Sciences, and intern for Privacy India, Srishti Goyal compares, contrasts, and critiques the Whole Body Imaging practices found in the US, the UK, and Australia, and makes recommendations for an Indian regime.

Whole Body Imaging and Privacy Concerns that Follow - Read More…

IP Addresses and Expeditious Disclosure of Identity in India

by Prashant Iyengar — last modified Dec 14, 2012 10:20 AM
August 22, 2011

In this research, Prashant Iyengar reviews the statutory mechanism regulating the retention and disclosure of IP addresses by Internet companies in India. Prashant provides a compilation of anecdotes on how law enforcement authorities in India have used IP address information to trace individuals responsible for particular crimes.

IP Addresses and Expeditious Disclosure of Identity in India - Read More…

Cyber Crime & Privacy

by Merlin Oommen — last modified Sep 01, 2011 09:36 AM
August 22, 2011

India is a growing area in the field of active Internet usage with 71 million Internet users.

Cyber Crime & Privacy - Read More…

Financial Inclusion and the UID

by elonnai hickok — last modified Aug 23, 2011 10:36 AM
August 22, 2011

Since 2009, when Nandan Nilekani began to envision and implement the Unique Identification Project, the UID authority has promoted the UID/Aadhaar scheme as a tool of development for India - arguing that an identity will assist in bringing benefits to the poor, promote financial inclusion in India, and allow for economic and social development. In this blog entry I will focus on the challenges and possibilities of the UID number providing the residents of India a viable method of access to financial services across the country.

Financial Inclusion and the UID - Read More…

CCTV in Universities

by Merlin Oommen — last modified Sep 01, 2011 09:50 AM
August 10, 2011

Basic Closed Circuit Television (CCTV) Infrastructure is used to observe movements from a central room, and consists of one or more video cameras that transmit video and audio images to a set of monitors or video recorders.

CCTV in Universities - Read More…

Re-thinking Key Escrow

by Natasha Vaz — last modified Aug 22, 2011 11:44 AM
August 09, 2011

Would you make duplicates of your house keys and hand them over to the local police authority? And if so, would you feel safe? Naturally, one would protest this invasion of privacy. Similarly, would it be justified for the government to have a copy of the private key to intercept and decrypt communications? This is the idea behind key escrow; it enables government ‘wiretapping’.

Re-thinking Key Escrow - Read More…

UID: Nothing to Hide, Nothing to Fear?

by Shilpa Narani — last modified Sep 28, 2011 11:44 AM
July 25, 2011

Isn’t it interesting that authorities ask you about your identity and you end up showing your proof of existence! Isn’t this breaching into one’s personal life? Why so much transparency only from the public side? Why can’t the government be equally transparent to the public?, asks Shilpa Narani.

UID: Nothing to Hide, Nothing to Fear? - Read More…

Document Actions