Posts
Freedom of Expression in a Digital Age
— by Geetha Hariharan and Jyoti Panday — last modified Jul 15, 2015 02:42 PMThe Centre for Internet & Society, the Observer Research Foundation, the Internet Policy Observatory, the Centre for Global Communication Studies and the Annenberg School for Communication, University of Pennsylvania organized this conference on April 21, 2015 in New Delhi.
CIS Cybersecurity Series (Part 22) - Anonymous
— by Purba Sarkar — last modified Jul 13, 2015 01:40 PMCIS interviews a Tibetan security researcher and information activist, as part of the Cybersecurity Series. He prefers to remain anonymous.
Regulatory Perspectives on Net Neutrality
— by Pranesh Prakash — last modified Jul 18, 2015 02:46 AMIn this paper Pranesh Prakash gives an overview on why India needs to put in place net neutrality regulations, and the form that those regulations must take to avoid being over-regulation.
Anti-Spam Laws in Different Jurisdictions: A Comparative Analysis
— by Rakshanda Deka — last modified Jul 02, 2015 04:21 PMThis paper is divided into three sections. The first section puts forth a comparative table of the spam laws of five different countries - the United States of America, Australia, Canada, Singapore and the United Kingdom - based on eight distinct parameters- jurisdiction of the legislation, definition of ‘spam’, understanding of consent, labelling requirements, types of senders covered, entities empowered to sue, exceptions made and penalties prescribed. The second section is a brief background of the problem of spam and it attempts to establish the context in which the paper is written. The third section is a critical analysis of the laws covered in the first section. In an effort to spot the various loopholes in these laws and suggest effective alternatives, this section points out the distinctions between the various legislations and discusses briefly their respective advantages and disadvantages.
The generation of e-Emergency
— by Sunil Abraham — last modified Jun 29, 2015 04:40 PMThe next generation of censorship technology is expected to be ‘real-time content manipulation’ through ISPs and Internet companies.
IANA Transition Stewardship & ICANN Accountability (I)
— by Jyoti Panday — last modified Jul 31, 2015 02:56 PMThis paper is the first in a multi-part series, in which we provide a background to the IANA transition and updates on the ensuing processes. An attempt to familiarise people with the issues at stake, this paper will be followed by a second piece that provides an overview of submitted proposals and areas of concern that will need attention moving forward. The series is a work in progress and will be updated as the processes move forward. It is up for public comments and we welcome your feedback.
IANA Transition Stewardship & ICANN Accountability (II)
— by Jyoti Panday — last modified Jul 31, 2015 03:47 PMThis paper is the second in a multi-part series, in which we provide an overview of submitted proposals and highlight areas of concern that will need attention moving forward. The series is a work in progress and will be updated as the processes move forward. It is up for public comments and we welcome your feedback.
DesiSec: Cybersecurity and Civil Society in India
— by Laird Brown — last modified Jun 29, 2015 04:25 PMAs part of its project on mapping cyber security actors in South Asia and South East Asia, the Centre for Internet & Society conducted a series of interviews with cyber security actors. The interviews were compiled and edited into one documentary. The film produced by Purba Sarkar, edited by Aaron Joseph, and directed by Oxblood Ruffin features Malavika Jayaram, Nitin Pai, Namita Malhotra, Saikat Datta, Nishant Shah, Lawrence Liang, Anja Kovacs, Sikyong Lobsang Sangay and, Ravi Sharada Prasad.
Paper-thin Safeguards and Mass Surveillance in India File
— by Prasad Krishna — last modified Jun 20, 2015 10:12 AMPaper-thin Safeguards and Mass Surveillance in India
— by Chinmayi Arun — last modified Jun 20, 2015 10:17 AMThe Indian government's new mass surveillance systems present new threats to the right to privacy. Mass interception of communication, keyword searches and easy access to particular users' data suggest that state is moving towards unfettered large-scale monitoring of communication. This is particularly ominous given that our privacy safeguards remain inadequate even for targeted surveillance and its more familiar pitfalls.
Document Actions

