Centre for Internet & Society

1026 items matching your search terms.
Filter the results.
Item type



















New items since



Sort by relevance · date (newest first) · alphabetically
Blog Entry Anvar v. Basheer and the New (Old) Law of Electronic Evidence
by Bhairav Acharya published Sep 30, 2014 last modified Dec 04, 2014 03:53 PM — filed under: , ,
The Supreme Court of India revised the law on electronic evidence. The judgment will have an impact on the manner in which wiretap tapes are brought before a court.
Located in Internet Governance / Blog
Blog Entry Centre for Internet and Society joins the Dynamic Coalition for Platform Responsibility
by Jyoti Panday published Sep 23, 2014 last modified Oct 07, 2014 10:54 AM — filed under: , , , , , , ,
The Centre for Internet and Society (CIS) has joined the multistakeholder cooperative engagement amidst stakeholders towards creating Due Diligence Recommendations for online platforms and Model Contractual Provisions to be enshrined in ToS. This blog provides a brief background of the role of dynamic coalitions within the IGF structure, establishes the need for the coalition and provides an update on the action plan and next steps for interested stakeholders.
Located in Internet Governance / Blog
Blog Entry Report on CIS' Workshop at the IGF:'An Evidence Based Framework for Intermediary Liability'
by Jyoti Panday published Sep 22, 2014 last modified Sep 24, 2014 10:47 AM — filed under: , , , ,
An evidence based framework for intermediary liability' was organised to present evidence and discuss ongoing research on the changing definition, function and responsibilities of intermediaries across jurisdictions.
Located in Internet Governance
Blog Entry Biometrics: An ‘Angootha Chaap’ nation?
by Mukta Batra published Sep 19, 2014 last modified Sep 19, 2014 06:12 AM — filed under: , , ,
This blog post throws light on the inconsistencies in biometric collection under the UID and NPR Schemes.
Located in Internet Governance / Blog
Blog Entry UID and NPR: Towards Common Ground
by Mukta Batra published Sep 19, 2014 last modified Oct 15, 2014 01:06 PM — filed under: , , ,
The UID (Unique Identification) and NPR (National Population Register) are both government identity schemes that aggregate personal data, including biometric data for the provision of an identification factor, and aim to link them with the delivery of public utility services.
Located in Internet Governance / Blog
Blog Entry Roundtable on Indian Privacy Law and Policy
by Bhairav Acharya published Sep 14, 2014 last modified Dec 27, 2014 02:18 PM — filed under: ,
This event was hosted by the Centre for Law and Development of the National University of Advanced Legal Studies (NUALS) in Kochi. It was attended by members of the faculty of NUALS, some students from the 2nd year, 3rd year, 4th year, and 5th year.
Located in Internet Governance / Blog
Blog Entry UID: A Data Subject's Registration Tale
by Mukta Batra published Sep 11, 2014 last modified Sep 11, 2014 09:05 AM — filed under: , ,
A person who registered for UIDAI shares their experience of registering for the UID Number, on the condition of anonymity.
Located in Internet Governance / Blog
Blog Entry The Aadhaar Case
by Vipul Kharbanda published Sep 05, 2014 last modified Sep 05, 2014 09:12 AM — filed under: , ,
In 2012 a writ petition was filed by Justice K.S. Puttaswamy in the Supreme Court of India challenging the policy of the government in making an Aadhaar card for every person in India and its later plans to link various government benefit schemes to the same.
Located in Internet Governance / Blog
Implications of post-Snowden Internet Localization Proposals
by Prasad Krishna published Sep 02, 2014 last modified Oct 05, 2014 08:59 AM — filed under: ,
Sunil Abraham was a speaker in this workshop organized by Center for Democracy and Technology on September 2, 2014.
Located in Internet Governance / News & Media
Blog Entry CIS Cybersecurity Series (Part 21) – Gyanak Tsering
by Purba Sarkar published Aug 31, 2014 last modified Sep 06, 2014 05:08 AM — filed under: , , ,
CIS interviews Gyanak Tsering, Tibetan monk in exile, as part of the Cybersecurity Series.
Located in Internet Governance / Blog