-
Factcheck: No, phones of users who provided only Aadhaar as proof of identity won’t be disconnected
-
by
Admin
—
published
Oct 28, 2018
—
filed under:
Internet Governance
Ever since the Supreme Court’s judgment on Aadhaar, which prohibited the use of the 12-digit biometrics-linked unique identity number by private entities as well as its linking with phone numbers and bank accounts, telecom companies and their customers in particular are wondering what this means for them.
Located in
Internet Governance
/
News & Media
-
FAQ on the Aadhaar Project and the Bill
-
by
Elonnai Hickok, Vanya Rakesh, and Vipul Kharbanda
—
published
Apr 13, 2016
—
last modified
Apr 13, 2016 02:06 PM
—
filed under:
UID,
Privacy,
Internet Governance,
Featured,
Digital India,
Aadhaar,
Biometrics,
Homepage
This FAQ attempts to address the key questions regarding the Aadhaar/UIDAI project and the Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Bill, 2016 (henceforth, Bill). This is neither a comprehensive list of questions, nor does it contain fully developed answers. We will continue to add questions to this list, and edit/expand the answers, based on our ongoing research. We will be grateful to receive your comments, criticisms, evidences, edits, suggestions for new answers, and any other responses. These can either be shared as comments in the document hosted on Google Drive, or via tweets sent to the information policy team at @CIS_InfoPolicy.
Located in
Internet Governance
/
Blog
-
FB & Google have already monopolised Indian cyberspace
-
by
Prasad Krishna
—
published
Jul 07, 2016
—
last modified
Jul 08, 2016 03:59 PM
—
filed under:
Social Media,
Google,
Facebook,
Internet Governance
In an interview with Catch, Sunil Abraham, executive director of Center for Internet & Society, puts the recent US-India cyber relationship framework into perspective. Abraham also talks about how Indian surveillance policies are outdated and why the country has failed to check the hegemonic tendencies of companies like Facebook and Google.
Located in
Internet Governance
/
News & Media
-
February 2015 Bulletin
-
by
Prasad Krishna
—
published
Mar 30, 2015
Located in
About Us
/
Newsletters
-
February 2017 Newsletter
-
by
Prasad Krishna
—
published
May 20, 2017
—
filed under:
Accessibility
Welcome to the February 2017 newsletter of the Centre for Internet & Society (CIS).
Located in
About Us
/
Newsletters
-
February 2018 Newsletter
-
by
Prasad Krishna
—
published
Mar 17, 2018
February 2018 Newsletter
Located in
About Us
/
Newsletters
-
Feedback to the NIA Bill
-
by
Elonnai Hickok
—
published
Jul 30, 2010
—
last modified
Mar 21, 2012 10:14 AM
—
filed under:
Submissions,
Internet Governance
Malavika Jayaram and Elonnai Hickok introduce the formal submission of CIS to the proposed National Identification Authority of India (NIA) Bill, 2010, which would give every resident a unique identity. The submissions contain the detailed comments on the draft bill and the high level summary of concerns with the NIA Bill submitted to the UIDAI on 13 July, 2010.
Located in
Internet Governance
/
Blog
-
Feminist Information Infrastructure
-
by
Ambika Tandon
—
published
May 09, 2019
—
last modified
Jul 09, 2019 03:34 PM
Located in
Internet Governance
/
Files
-
Financial Inclusion and the UID
-
by
elonnai hickok
—
published
Aug 22, 2011
—
last modified
Aug 23, 2011 10:36 AM
—
filed under:
Internet Governance,
Privacy
Since 2009, when Nandan Nilekani began to envision and implement the Unique Identification Project,
the UID authority has promoted the UID/Aadhaar scheme as a tool of development for India - arguing that an identity will assist in bringing benefits to the poor, promote financial inclusion in India, and allow for economic and social development. In this blog entry I will focus on the challenges and possibilities of the UID number providing the residents of India a viable method of access to financial services across the country.
Located in
Internet Governance
-
Fixing Aadhaar: Security developers' task is to trim chances of data breach
-
by
Sunil Abraham
—
published
Jan 10, 2018
—
last modified
Jan 10, 2018 04:47 PM
—
filed under:
Aadhaar,
Internet Governance,
Privacy
The task before a security developer is not only to reduce the probability of identity breach but to eliminate certain occurrences.
Located in
Internet Governance
/
Blog