Centre for Internet & Society

590 items matching your search terms.
Filter the results.
Item type



















New items since



Sort by relevance · date (newest first) · alphabetically
Factcheck: No, phones of users who provided only Aadhaar as proof of identity won’t be disconnected
by Admin published Oct 28, 2018 — filed under:
Ever since the Supreme Court’s judgment on Aadhaar, which prohibited the use of the 12-digit biometrics-linked unique identity number by private entities as well as its linking with phone numbers and bank accounts, telecom companies and their customers in particular are wondering what this means for them.
Located in Internet Governance / News & Media
Blog Entry FAQ on the Aadhaar Project and the Bill
by Elonnai Hickok, Vanya Rakesh, and Vipul Kharbanda published Apr 13, 2016 last modified Apr 13, 2016 02:06 PM — filed under: , , , , , , ,
This FAQ attempts to address the key questions regarding the Aadhaar/UIDAI project and the Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Bill, 2016 (henceforth, Bill). This is neither a comprehensive list of questions, nor does it contain fully developed answers. We will continue to add questions to this list, and edit/expand the answers, based on our ongoing research. We will be grateful to receive your comments, criticisms, evidences, edits, suggestions for new answers, and any other responses. These can either be shared as comments in the document hosted on Google Drive, or via tweets sent to the information policy team at @CIS_InfoPolicy.
Located in Internet Governance / Blog
FB & Google have already monopolised Indian cyberspace
by Prasad Krishna published Jul 07, 2016 last modified Jul 08, 2016 03:59 PM — filed under: , , ,
In an interview with Catch, Sunil Abraham, executive director of Center for Internet & Society, puts the recent US-India cyber relationship framework into perspective. Abraham also talks about how Indian surveillance policies are outdated and why the country has failed to check the hegemonic tendencies of companies like Facebook and Google.
Located in Internet Governance / News & Media
February 2015 Bulletin
by Prasad Krishna published Mar 30, 2015
Located in About Us / Newsletters
February 2017 Newsletter
by Prasad Krishna published May 20, 2017 — filed under:
Welcome to the February 2017 newsletter of the Centre for Internet & Society (CIS).
Located in About Us / Newsletters
February 2018 Newsletter
by Prasad Krishna published Mar 17, 2018
February 2018 Newsletter
Located in About Us / Newsletters
Blog Entry Feedback to the NIA Bill
by Elonnai Hickok published Jul 30, 2010 last modified Mar 21, 2012 10:14 AM — filed under: ,
Malavika Jayaram and Elonnai Hickok introduce the formal submission of CIS to the proposed National Identification Authority of India (NIA) Bill, 2010, which would give every resident a unique identity. The submissions contain the detailed comments on the draft bill and the high level summary of concerns with the NIA Bill submitted to the UIDAI on 13 July, 2010.
Located in Internet Governance / Blog
File Feminist Information Infrastructure
by Ambika Tandon published May 09, 2019 last modified Jul 09, 2019 03:34 PM
Located in Internet Governance / Files
Financial Inclusion and the UID
by elonnai hickok published Aug 22, 2011 last modified Aug 23, 2011 10:36 AM — filed under: ,
Since 2009, when Nandan Nilekani began to envision and implement the Unique Identification Project, the UID authority has promoted the UID/Aadhaar scheme as a tool of development for India - arguing that an identity will assist in bringing benefits to the poor, promote financial inclusion in India, and allow for economic and social development. In this blog entry I will focus on the challenges and possibilities of the UID number providing the residents of India a viable method of access to financial services across the country.
Located in Internet Governance
Blog Entry Fixing Aadhaar: Security developers' task is to trim chances of data breach
by Sunil Abraham published Jan 10, 2018 last modified Jan 10, 2018 04:47 PM — filed under: , ,
The task before a security developer is not only to reduce the probability of identity breach but to eliminate certain occurrences.
Located in Internet Governance / Blog