-
Why your Facebook Stalker is Not the Real Problem
-
by
Nishant Shah
—
published
Mar 21, 2012
—
filed under:
Internet Governance,
Privacy
We live in networked conditions. This is a statement that can now be taken at face-value, and immediately explains our highly connected, inter-meshed environments finds Nishant Shah in this article published in FirstPost on March 20, 2012.
Located in
Internet Governance
-
ଓଡ଼ିଆ ଉଇକିପାଠାଗାର
-
by
Subhashish Panigrahi
—
published
Dec 30, 2015
—
last modified
Jan 05, 2016 06:30 AM
—
filed under:
Open Standards,
CIS-A2K,
Access to Knowledge,
Odia Wikisource,
Odia Wikipedia
Odia newspaper Sambad carried this featured column of mine yesterday in their Sunday supplement "Sambada Rabibara" on December 6, 2015.
Located in
Access to Knowledge
/
Blogs
-
India’s vanishing fingerprints put UID in question
-
by
Prasad Krishna
—
published
Oct 26, 2011
—
last modified
Oct 26, 2011 10:05 AM
—
filed under:
Internet Governance
A curious situation has come to light at the UID (unique identity) enrolment centres. Call it the phenomenon of vanishing fingerprints. You see, our unique fingerprints don’t necessarily last a lifetime and they can be damaged or destroyed and, in some cases, even non-existent. And that is not the best scenario for the first-of-its-kind project that endeavours to create a unique identity for India’s billion-plus population based on fingerprints and iris scans (or biometric data).
Located in
News & Media
-
Development Informatics
-
by
Aayush Rathi and Ambika Tandon
—
published
Sep 27, 2019
Located in
Internet Governance
/
Files
-
Data Flow in the Unique Identification Scheme of India
-
by
Vidushi Marda
—
published
Sep 03, 2015
—
filed under:
Internet Governance,
Privacy
This note analyses the data flow within the UID scheme and aims at highlighting vulnerabilities at each stage. The data flow within the UID Scheme can be best understood by first delineating the organizations involved in enrolling residents for Aadhaar. The UIDAI partners with various Registrars usually a department of the central or state Government, and some private sector agencies like LIC etc– through a Memorandum of Understanding for assisting with the enrollment process of the UID project.
Located in
Internet Governance
/
Blog
-
Navigating the 'Reconsideration' Quagmire (A Personal Journey of Acute Confusion)
-
by
Padmini Baruah and Geetha Hariharan
—
published
Nov 30, 2016
—
filed under:
ICANN,
Internet Governance
An earlier analysis of ICANN’s Documentary Information Disclosure Policy already brought to light our concerns about the lack of transparency in ICANN’s internal mechanisms. Carrying my research forward, I sought to arrive at an understanding of the mechanisms used to appeal a denial of DIDP requests. In this post, I aim to provide a brief account of my experiences with the Reconsideration Request process that ICANN provides for as a tool for appeal.
Located in
Internet Governance
/
Blog
-
Only 8.5pc of Wikipedia Editors are Women. How do we fix the Gender Gap on the Internet?
-
by
Ting-Yi Chang
—
published
Feb 09, 2017
—
filed under:
CIS-A2K,
Access to Knowledge,
Gender,
Wikipedia,
Wikimedia
Women-related articles are generally shorter, more prone to deletion, and more likely to be peripheral pieces under male-centric articles.
Located in
Access to Knowledge
/
Blogs
-
Zero Draft of Content Removal Best Practices White Paper
-
by
Jyoti Panday
—
published
Aug 31, 2014
—
last modified
Sep 10, 2014 07:11 AM
—
filed under:
Internet Governance,
Intermediary Liability
EFF and CIS Intermediary Liability Project is aimed towards the creation of a set of principles for intermediary liability in consultation with groups of Internet-focused NGOs and the academic community.
Located in
Internet Governance
/
Blog
-
Report of the Group of Experts on Privacy vs. The Leaked 2014 Privacy Bill
-
by
Elonnai Hickok
—
published
Apr 14, 2014
—
filed under:
Featured,
Internet Governance,
Privacy
Following our previous post comparing the leaked 2014 Privacy Bill with the leaked 2011 Privacy Bill, this post will compare the recommendations provided in the Report of the Group of Experts on Privacy by the Justice AP Shah Committee to the text of the leaked 2014 Privacy Bill. Below is an analysis of recommendations from the Report that are incorporated in the text of the Bill, and recommendations in the Report that are not incorporated in the text of the Bill.
Located in
Internet Governance
/
Blog
-
Leading Up To The GCIP: A Chat With Shamnad Basheer
-
by
Job Michael Mathew
—
published
Dec 13, 2015
—
last modified
Jan 31, 2016 08:57 AM
—
filed under:
Intellectual Property Rights,
Access to Knowledge
The next discussion in our pre-GCIP discussion series is with Prof. Shamnad Basheer.
Located in
Access to Knowledge
/
Blogs