Posts

by Sumandro Chattapadhyay last modified Mar 30, 2016 11:09 AM

Peering behind the veil of ICANN's DIDP (II)

by Padmini Baruah — last modified Oct 15, 2015 03:14 AM
October 15, 2015

In a previous blog post, I had introduced the concept of ICANN’s Documentary Information Disclosure Policy (“DIDP”) and their extremely vast grounds for non-disclosure. In this short post, I have made an analysis of every DIDP request that ICANN has ever responded to, to point out the flaws in their policy that need to be urgently remedied.

Peering behind the veil of ICANN's DIDP (II) - Read More…

Contestations of Data, ECJ Safe Harbor Ruling and Lessons for India

by Jyoti Panday — last modified Oct 14, 2015 02:40 PM

The European Court of Justice has invalidated a European Commission decision, which had previously concluded that the 'Safe Harbour Privacy Principles' provide adequate protections for European citizens’ privacy rights for the transfer of personal data between European Union and United States. The inadequacies of the framework is not news for the European Commission and action by ECJ has been a long time coming. The ruling raises important questions about how the claims of citizenship are being negotiated in the context of the internet, and how increasingly the contestations of personal data are being employed in the discourse.

Contestations of Data, ECJ Safe Harbor Ruling and Lessons for India - Read More…

Agenda of I&J Meeting in Berlin

by Prasad Krishna — last modified Oct 14, 2015 02:52 AM
October 14, 2015

Agenda of I&J Meeting in Berlin - Read More…

GSMA Conference Invite

by Prasad Krishna — last modified Oct 14, 2015 01:49 AM
October 14, 2015

GSMA Conference Invite - Read More…

The Legal Validity of Internet Bans: Part II

by Geetha Hariharan and Padmini Baruah — last modified Oct 08, 2015 11:17 AM

In recent months, there has been a spree of bans on access to Internet services in Indian states, for different reasons. The State governments have relied on Section 144, Code of Criminal Procedure 1973 to institute such bans. Despite a legal challenge, the Gujarat High Court found no infirmity in this exercise of power in a recent order. We argue that it is Section 69A of the Information Technology Act 2000, and the Website Blocking Rules, which set out the legal provision and procedure empowering the State to block access to the Internet (if at all it is necessary), and not Section 144, CrPC.

The Legal Validity of Internet Bans: Part II - Read More…

The Legal Validity of Internet Bans: Part I

by Geetha Hariharan and Padmini Baruah — last modified Oct 08, 2015 11:18 AM

In recent months, there has been a spree of bans on access to Internet services in Indian states, for different reasons. The State governments have relied on Section 144, Code of Criminal Procedure 1973 to institute such bans. Despite a legal challenge, the Gujarat High Court found no infirmity in this exercise of power in a recent order. We argue that it is Section 69A of the Information Technology Act 2000, and the Website Blocking Rules, which set out the legal provision and procedure empowering the State to block access to the Internet (if at all it is necessary), and not Section 144, CrPC.

The Legal Validity of Internet Bans: Part I - Read More…

Open Governance and Privacy in a Post-Snowden World : Webinar

by Vanya Rakesh — last modified Oct 04, 2015 11:09 AM
October 04, 2015

On 10th September 2015, the OGP Support Unit, the Open Government Guide, and the World Bank held a webinar on “Open Governance and Privacy in a Post-Snowden World” presented by Carly Nyst, Independent consultant and former Legal Director of Privacy International and Javier Ruiz, Policy Director of Open Rights Group. This is a summary of the key issues that were discussed by the speakers and the participants.

Open Governance and Privacy in a Post-Snowden World : Webinar - Read More…

Cyber 360 Agenda

by Prasad Krishna — last modified Oct 02, 2015 03:41 PM
October 02, 2015

Cyber 360 Agenda - Read More…

Hits and Misses With the Draft Encryption Policy

by Sunil Abraham — last modified Sep 26, 2015 04:46 PM

Most encryption standards are open standards. They are developed by open participation in a publicly scrutable process by industry, academia and governments in standard setting organisations (SSOs) using the principles of “rough consensus” – sometimes established by the number of participants humming in unison – and “running code” – a working implementation of the standard. The open model of standards development is based on the Free and Open Source Software (FOSS) philosophy that “many eyes make all bugs shallow”.

Hits and Misses With the Draft Encryption Policy - Read More…

Document Actions