Internet Governance Blog
CIS Para-wise Comments on Cyber Café Rules, 2011
— by Prashant Iyengar — last modified Dec 14, 2012 10:32 AMOn February 7th 2011, the Department of Information Technology, MCIT published draft rules on its website (The Information Technology (Guidelines for Cyber Cafe) Rules, 2011) in exercise of the powers conferred by Section 87(2) (zg), read with Section 79(2) of the Information Technology Act, 2000. Comments were invited from the public before February 25th 2011. Accordingly, Privacy India and Centre for Internet and Society, Bangalore have prepared the following para wise comments for the Ministry’s consideration.
CIS Para-wise Comments on Draft Reasonable Security Practices Rules, 2011
— by Prashant Iyengar — last modified Dec 14, 2012 10:32 AMOn February 7th 2011, the Department of Information Technology, MCIT published draft rules on its website (The Information Technology (Reasonable security practices and procedures and sensitive personal information) Rules, 2011) in exercise of the powers conferred by Section 87(2)(ob), read with Section 43A of the Information Technology Act, 2000. Comments were invited from the public before February 25th 2011. Accordingly, Privacy India and Centre for Internet and Society, Bangalore have prepared the following para-wise comments for the Ministry’s consideration.
Google Policy Fellowship Program: Asia Chapter
— by Prasad Krishna — last modified Aug 02, 2011 07:34 AMFor the ardent followers of free and open Internet and for those who love to debate on technology, media law and Internet-related policy issues, there is some good news. The Centre for Internet and Society, India is conducting a Google Policy Fellowship program this summer!
4 Popular Myths about UID
— by Prashant Iyengar — last modified Jun 20, 2012 04:37 AMBy now, there is already a lot of material in the public domain that is critical about the UID/Aadhar project, writes Prashant Iyengar in this blog entry published in Privacy India on January 22, 2011.
Does the UID Reflect India?
— by Elonnai Hickok — last modified Mar 22, 2012 05:45 AMOn December 17th the Campaign for No UID held a press conference and public meeting in Bangalore. Below is a summary and analysis of the events.
The Privacy Rights of Whistleblowers
— by Elonnai Hickok — last modified Mar 22, 2012 05:47 AMThe recent disclosures from Wikileaks have shown that the right to information, whistle-blowing, and privacy are interconnected. This note looks at the different ways in which the three are related, as well as looking at the benefits and drawbacks to Wikileaks in terms of privacy.
UID & Privacy - A Call for Papers
— by Elonnai Hickok — last modified Mar 21, 2012 10:03 AMPrivacy India is inviting individuals to author short papers focused on Unique Identity (UID) and Privacy. Selected candidates will have their papers published on the CIS website, and their transportation and accommodation provided for the “Privacy Matters” conference being held in Kolkata on 22 January 2010.
DSCI Information Security Summit 2010 – A Report
— by Elonnai Hickok — last modified Mar 21, 2012 10:04 AMOn 2 and 3 December 2010, the DSCI Information Security Summit 2010 took place in the Trident Hotel, Chennai. The two day summit included a broad spectrum of speakers/panels and topics, ranging from Securing Data & Systems to how to leverage the Cloud. The key speakers were Mr. Gulshan Rai, Director General, CERT-In, DIT, Mr. Rajeev Kapoor, Joint Secretary, DoPT, Govt. of India, Mr. Vakul Sharma, Advocate, Supreme Court of India and Dr. Kamlesh Bajaj, CEO, DSCI. Elonnai Hickok attended the summit.
Public Statement to Final Draft of UID Bill
— by Elonnai Hickok — last modified Mar 22, 2012 05:48 AMThe final draft of the UID Bill that will be submitted to the Lok Sabha was made public on 8 November 2010. If the Bill is approved by Parliament, it will become a legal legislation in India. The following note contains Civil Society's response to the final draft of the Bill.
Privacy, Free/Open Source, and the Cloud
— by Elonnai Hickok — last modified Mar 22, 2012 05:50 AMA look into the questions that arise in concern to privacy and cloud computing, and how open source plays into the picture.
Document Actions