Centre for Internet & Society

2958 items matching your search terms.
Filter the results.
Item type



















New items since



Sort by relevance · date (newest first) · alphabetically
Blog Entry Press Release, March 11, 2016: The Law cannot Fix what Technology has Broken!
by Japreet Grewal and Sunil Abraham published Mar 16, 2016 last modified Mar 16, 2016 10:10 AM — filed under: , , , , , ,
We published and circulated the following press release on March 11, 2016, as the Lok Sabha passed the Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Bill, 2016. This Bill was proposed by finance minister, Mr. Arun Jaitley to give legislative backing to Aadhaar, being implemented by the Unique Identification Authority of India (UIDAI).
Located in Internet Governance / Blog
Blog Entry List of Recommendations on the Aadhaar Bill, 2016 - Letter Submitted to the Members of Parliament
by Amber Sinha, Sumandro Chattapadhyay, Sunil Abraham, and Vanya Rakesh published Mar 16, 2016 last modified Mar 21, 2016 08:50 AM — filed under: , , , , , , , ,
On Friday, March 11, the Lok Sabha passed the Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Bill, 2016. The Bill was introduced as a money bill and there was no public consultation to evaluate the provisions therein even though there are very serious ramifications for the Right to Privacy and the Right to Association and Assembly. Based on these concerns, and numerous others, we submitted an initial list of recommendations to the Members of Parliaments to highlight the aspects of the Bill that require immediate attention.
Located in Internet Governance / Blog
A scheme in India to help the poor raises privacy concerns
by Prasad Krishna published Mar 17, 2016 — filed under: , ,
India’s legislators are on Wednesday debating a law that would allow the government to collect biometric and demographic information from people in return for distributing to them government benefits and subsidies.
Located in Internet Governance / News & Media
Blog Entry Vulnerabilities in the UIDAI Implementation Not Addressed by the Aadhaar Bill, 2016
by Pooja Saxena and Amber Sinha published Mar 21, 2016 last modified Mar 21, 2016 08:33 AM — filed under: , , , , , , ,
In this infographic, we document the various issues in the Aadhaar enrolment process implemented by the UIDAI, and highlight the vulnerabilities that the Aadhaar Bill, 2016 does not address. The infographic is based on Vidushi Marda’s article 'Data Flow in the Unique Identification Scheme of India,' and is designed by Pooja Saxena, with inputs from Amber Sinha.
Located in Internet Governance / Blog
Aadhaar: Govt will not compromise on national security
by Prasad Krishna published Mar 22, 2016 — filed under: , ,
The government is confident that the Aadhaar Bill will be passed.
Located in Internet Governance / News & Media
India Still Trying To Turn Optional Aadhaar Identification Number Into A Mandatory National Identity System
by Prasad Krishna published Mar 22, 2016 last modified Mar 24, 2016 06:34 AM — filed under: , ,
from the sliding-down-the-slippery-slope-to-disaster dept
Located in Internet Governance / News & Media
Encryption policy would have affected emails, operating systems, WiFi
by Prasad Krishna published Sep 25, 2015 — filed under: ,
Our email data would have to be stored. If we connect to a WiFi, that data would have to be stored, and that's plain ridiculous. There is a problem when the government tries to target citizens to ensure national security, said Pranesh Prakash, policy director at the Bangalore-based Centre for Internet and Society.
Located in Internet Governance / News & Media
Open sesame
by Prasad Krishna published Sep 25, 2015 — filed under:
The government’s email is shockingly vulnerable.
Located in Internet Governance / News & Media
Govt presses 'undo' button on draft encryption policy
by Prasad Krishna published Sep 25, 2015 — filed under:
The decision came a day before PM embarked on a visit to the US, where he is expected to meet leaders of firms such as Apple, Facebook, Google and Tesla.
Located in Internet Governance / News & Media
Blog Entry Hits and Misses With the Draft Encryption Policy
by Sunil Abraham published Sep 26, 2015 — filed under: , , , ,
Most encryption standards are open standards. They are developed by open participation in a publicly scrutable process by industry, academia and governments in standard setting organisations (SSOs) using the principles of “rough consensus” – sometimes established by the number of participants humming in unison – and “running code” – a working implementation of the standard. The open model of standards development is based on the Free and Open Source Software (FOSS) philosophy that “many eyes make all bugs shallow”.
Located in Internet Governance / Blog