-
Limits to Privacy
-
by
Prasad Krishna
—
published
Apr 11, 2011
—
last modified
Dec 14, 2012 10:28 AM
—
filed under:
Internet Governance,
Privacy
In this chapter we attempt to build a catalogue of these various
justifications, without attempting to be exhaustive, with the objective of arriving at a
rough taxonomy of such frequently invoked terms. In addition we also examine some the
more important justifications such as “public interest” and “security of the state” that
have been invoked in statutes and upheld by courts to deprive persons of their privacy.
Located in
Internet Governance
/
Publications
-
Privacy and the Information Technology Act — Do we have the Safeguards for Electronic Privacy?
-
by
Prashant Iyengar
—
published
Apr 07, 2011
—
last modified
Dec 14, 2012 10:29 AM
—
filed under:
Internet Governance,
Privacy
How do the provisions of the Information Technology Act measure up to the challenges of privacy infringement? Does it provide an adequate and useful safeguard for our electronic privacy? Prashant Iyengar gives a comprehensive analysis on whether and how the Act fulfils the challenges and needs through a series of FAQs while drawing upon real life examples.
Located in
Internet Governance
/
Blog
/
Privacy
-
Is Data Protection Enough?
-
by
Elonnai Hickok
—
published
Apr 05, 2011
—
last modified
Mar 22, 2012 05:28 AM
—
filed under:
Internet Governance,
Privacy
The following note looks briefly at different sides of the privacy debate, and asks the question whether a Data Protection law is enough privacy protection for India.
Located in
Internet Governance
/
Blog
/
Privacy
-
Surveillance Technologies
-
by
Elonnai Hickok
—
published
Apr 05, 2011
—
last modified
Mar 22, 2012 05:40 AM
—
filed under:
Internet Governance,
Privacy
The following post briefly looks at different surveillance technologies, and the growing use of the them in India.
Located in
Internet Governance
/
Blog
/
Privacy
-
'Privacy Matters', Ahmedabad: Conference Report
-
by
Prasad Krishna
—
published
Mar 31, 2011
—
last modified
Apr 04, 2011 04:45 AM
—
filed under:
Featured,
Privacy
On 26 March 2011, civil society, lawyers, judges, students and NGO’s, gathered together at the Ahmedabad Management Association to take part in 'Privacy Matters' – a public conference organised by Privacy India in partnership with IDRC and Research Foundation for Governance in India (RFGI) — to discuss the challenges of privacy in India, with an emphasis on national security and privacy. The conference was opened by Prashant Iyengar, head researcher at Privacy India and Kanan Drhu, director of RFGI. Mr. Iyengar explained Privacy India’s mandate to raise awareness of privacy, spark civil action, and promote democratic dialogue around privacy challenges and violations in India. RFGI is a think tank established in 2009 which aims to research, promote, and implement various reforms to improve the legal and political process in Gujarat and across India. ‘Privacy Matters – Ahmedabad’ is the third conference out of the eight that Privacy India will be hosting across India. The next conference will take place in Hyderabad on 9 April 2011. It will focus on human rights and privacy.
Located in
Internet Governance
/
Blog
/
Privacy
-
Privacy and Governmental Databases
-
by
Elonnai Hickok
—
published
Mar 23, 2011
—
last modified
Mar 22, 2012 05:41 AM
—
filed under:
Internet Governance,
Privacy
In our research we have found that most government databases are incrementally designed in response to developments and improvements that need to be incorporated from time to time. This method of architecting a system leads to a poorly designed database with many privacy risks such as: inaccurate data, incomplete data, inappropriate disclosure of data, inappropriate access to data, and inappropriate security over data. To address these privacy concerns it is important to analyze the problem that is being addressed from the perspective of potential and planned interoperability with other government databases. Below is a list of problems and recommendations concerning privacy, concerning government databases.
Located in
Internet Governance
/
Blog
/
Privacy
-
Open Letter to the Finance Committee: UID and Transactions
-
by
Prasad Krishna
—
published
Feb 17, 2011
—
last modified
Feb 24, 2011 01:35 PM
—
filed under:
Privacy
Since official documentation from the UIDAI is very limited, we assume that data pertaining to transactions would comprise of the Aadhaar number, identifier of the authenticating device, date-time stamp, and approval/rejection/error code. Recording and maintaining of data pertaining to transactions is very important because it increases transparency and accountability through an audit trail. However, storage of such sensitive data creates many privacy risks, because more often than not metadata gives you as much intelligence as raw data.
Located in
Internet Governance
/
Blog
/
Privacy
-
Open Letter to the Finance Committee: Operational Design
-
by
Prasad Krishna
—
published
Feb 16, 2011
—
last modified
Feb 17, 2011 10:02 AM
—
filed under:
Privacy
The objective of the UID project is to provide identity infrastructure that is not susceptible to fraud or error. This note highlights parts of the operational design of the project, which are flawed. We plead that each point be taken into consideration and that the design be suitably revised.
Located in
Internet Governance
/
Blog
/
Privacy
-
Open Letter to the Finance Committee: UID Budget
-
by
Prasad Krishna
—
published
Feb 16, 2011
—
last modified
Feb 17, 2011 11:18 AM
—
filed under:
Privacy
This note presents the aspects of the UID project, which have not been considered or incorporated into the UID’s budget. The costs include re-enrollment, loss in human time, and the cost of the audit function.
Located in
Internet Governance
/
Blog
/
Privacy
-
Open Letter to the Finance Committe: Biometrics
-
by
Prasad Krishna
—
published
Feb 16, 2011
—
last modified
Feb 17, 2011 01:12 PM
—
filed under:
Privacy
This note points out the weaknesses inherent in biometrics and the pitfalls in using them. It recommends procedural safeguards that should be adopted by the UID in order to make the use of biometrics more secure and inclusive.
Located in
Internet Governance
/
Blog
/
Privacy