-
Hacking of SIM card by spy agencies raises fears of sensitive documents being leaked
-
by
Prasad Krishna
—
published
Feb 25, 2015
—
last modified
Mar 09, 2015 01:31 AM
—
filed under:
Internet Governance
The hacking of SIM-card and digital security services provider Gemalto by American and British spy agencies has raised fears that sensitive communications, by the Indian government and hundreds of domestic companies, may have been at the risk of being spied on.
Located in
Internet Governance
/
News & Media
-
Hacking without borders: The future of artificial intelligence and surveillance
-
by
Maria Xynou
—
published
Mar 15, 2013
—
last modified
Jul 12, 2013 03:30 PM
—
filed under:
SAFEGUARDS,
Internet Governance,
Privacy
In this post, Maria Xynou looks at some of DARPA´s artificial intelligence surveillance technologies in regards to the right to privacy and their potential future use in India.
Located in
Internet Governance
/
Blog
-
Health Data Management Policies - Differences Between the EU and India
-
by
Shweta Mohandas
—
published
Jul 10, 2023
—
filed under:
Health Management,
Privacy,
Internet Governance,
Covid19,
Digitisation
Through this issue brief we would like to highlight the differences in approaches to health data management taken by the EU and India, and look at possible recommendations for India, in creating a privacy preserving health data management policy.
Located in
Internet Governance
/
Blog
-
Hits and Misses With the Draft Encryption Policy
-
by
Sunil Abraham
—
published
Sep 26, 2015
—
filed under:
Open Standards,
Internet Governance,
Surveillance,
FOSS,
B2B
Most encryption standards are open standards. They are developed by open participation in a publicly scrutable process by industry, academia and governments in standard setting organisations (SSOs) using the principles of “rough consensus” – sometimes established by the number of participants humming in unison – and “running code” – a working implementation of the standard. The open model of standards development is based on the Free and Open Source Software (FOSS) philosophy that “many eyes make all bugs shallow”.
Located in
Internet Governance
/
Blog
-
How Aadhaar compromises privacy? And how to fix it?
-
by
Sunil Abraham
—
published
Mar 31, 2017
—
last modified
Apr 01, 2017 07:00 AM
—
filed under:
Surveillance,
Aadhaar,
Internet Governance,
Privacy
Aadhaar is mass surveillance technology. Unlike targeted surveillance which is a good thing, and essential for national security and public order – mass surveillance undermines security. And while biometrics is appropriate for targeted surveillance by the state – it is wholly inappropriate for everyday transactions between the state and law abiding citizens.
Located in
Internet Governance
/
Blog
-
How data privacy and governance issues have battered Facebook ahead of 2019 polls
-
by
Admin
—
published
Dec 25, 2018
—
last modified
Dec 25, 2018 01:43 AM
—
filed under:
Internet Governance,
Privacy
Rohit S, an airline pilot, had enough of Facebook. With over 1,000 friends and part of at least a dozen groups on subjects ranging from planes to politics, the 34-year-old found himself constantly checking his phone for updates and plunging headlong into increasingly noisy debates, where he had little personal connect.
Located in
Internet Governance
/
News & Media
-
How ISPs block websites and why it doesn’t help
-
by
Prasad Krishna
—
published
Aug 25, 2012
—
filed under:
Freedom of Speech and Expression,
Public Accountability,
Internet Governance,
Censorship
Banning websites is ineffective against malicious users as workarounds are easy and well known.
Located in
News & Media
-
How privacy fares in the 2019 election manifestos | Opinion
-
by
Aayush Rathi and Ambika Tandon
—
published
May 02, 2019
—
filed under:
Internet Governance,
Privacy
We now have a rights-based language around privacy in the mainstream political discourse but that’s where it ends.
Located in
Internet Governance
/
Blog
-
How private companies are using Aadhaar to try to deliver better services (but there's a catch)
-
by
Prasad Krishna
—
published
Dec 23, 2016
—
last modified
Dec 23, 2016 02:04 AM
—
filed under:
Aadhaar,
Internet Governance,
Privacy
They are gathering more information on you.
Located in
Internet Governance
/
News & Media
-
How Surveillance Works in India
-
by
Pranesh Prakash
—
published
Jul 15, 2013
—
filed under:
SAFEGUARDS,
Internet Governance,
Privacy
When the Indian government announced it would start a Centralized Monitoring System in 2009 to monitor telecommunications in the country, the public seemed unconcerned. When the government announced that the system, also known as C.M.S., commenced in April, the news didn’t receive much attention.
Located in
Internet Governance
/
Blog