Centre for Internet & Society

2984 items matching your search terms.
Filter the results.
Item type



















New items since



Sort by relevance · date (newest first) · alphabetically
Blog Entry Limits to Privacy
by Prashant Iyengar published May 06, 2011 last modified Dec 14, 2012 10:28 AM — filed under: ,
In his research article, Prashant Iyengar examines the limits to privacy for individuals in light of the provisions of the Constitution of India, public interest, security of state and maintenance of law and order. The article attempts to build a catalogue of all these justifications and arrive at a classification of all such frequently used terms invoked in statutes and upheld by courts to deprive persons of their privacy.
Located in Internet Governance / Blog / Privacy
Blog Entry Video Surveillance and Its Impact on the Right to Privacy
by Vaishnavi Chillakuru published Jul 23, 2011 last modified Sep 29, 2011 05:35 AM — filed under: ,
The need for video surveillance has grown in this technologically driven era as a mode of law enforcement. Video Surveillance is very useful to governments and law enforcement to maintain social control, recognize and monitor threats, and prevent/investigate criminal activity. In this regard it is pertinent to highlight that not only are governments using this system, but residential communities in certain areas are also using this system to create a safer environment.
Located in Internet Governance / Blog / Privacy
Blog Entry When Data Means Privacy, What Traces Are You Leaving Behind?
by Noopur Raval published Jul 18, 2011 last modified Nov 24, 2011 09:24 AM — filed under: ,
How do you know yourself to be different from others? What defines the daily life that you live and the knowledge you produce in the span of this life? Is all that information yours or are you a mere stakeholder on behalf of the State whose subject you are? What does privacy really mean? In a society that is increasingly relying on information to identify people, collecting and archiving ‘personal’ details of your lives, your name, age, passport details, ration card number, call records etc, how private is your tweet, status update, text message or simply, your restaurant bill?
Located in Internet Governance / Blog / Privacy
Blog Entry Privacy & Media Law
by Sonal Makhija published Jul 19, 2011 last modified Dec 14, 2012 10:26 AM — filed under: ,
In her research, Sonal Makhija, a Bangalore-based lawyer, tries to delineate the emerging privacy concerns in India and the existing media norms and guidelines on the right to privacy. The research examines the existing media norms (governed by Press Council of India, the Cable Television Networks (Regulation) Act, 1995 and the Code of Ethics drafted by the News Broadcasting Standard Authority), the constitutional protection guaranteed to an individual’s right to privacy upheld by the courts, and the reasons the State employs to justify the invasion of privacy. The paper further records, both domestic and international, inclusions and exceptions with respect to the infringement of privacy.
Located in Internet Governance / Blog / Privacy
Blog Entry Right to Privacy Bill 2010 — A Few Comments
by Elonnai Hickok published Jul 20, 2011 last modified Mar 22, 2012 06:26 AM — filed under: ,
Earlier this year, in February 2011, Rajeev Chandrasekhar introduced the Right to Privacy Bill, 2010 in the Rajya Sabha. The Bill is meant to “provide protection to the privacy of persons including those who are in public life”. Though the Bill states that its objective is to protect individuals’ fundamental right to privacy, the focus of the Bill is on the protection against the use of electronic/digital recording devices in public spaces without consent and for the purpose of blackmail or commercial use.
Located in Internet Governance / Blog / Privacy
Blog Entry Privacy and the Information Technology Act — Do we have the Safeguards for Electronic Privacy?
by Prashant Iyengar published Apr 07, 2011 last modified Dec 14, 2012 10:29 AM — filed under: ,
How do the provisions of the Information Technology Act measure up to the challenges of privacy infringement? Does it provide an adequate and useful safeguard for our electronic privacy? Prashant Iyengar gives a comprehensive analysis on whether and how the Act fulfils the challenges and needs through a series of FAQs while drawing upon real life examples.
Located in Internet Governance / Blog / Privacy
Blog Entry Consumer Privacy in e-Commerce
by Sahana Sarkar published Jul 23, 2011 last modified Mar 28, 2012 04:53 AM — filed under: ,
Looking at the larger picture of national security versus consumer privacy, Sahana Sarkar says that though consumer privacy is important in the world of digital technology, individuals must put aside some of their civil liberties when it comes to the question of national security, as it is necessary to prevent societal damage.
Located in Internet Governance / Blog / Privacy
Blog Entry Copyright Enforcement and Privacy in India
by Prashant Iyengar published Jun 14, 2011 last modified Dec 14, 2012 10:27 AM — filed under: ,
Copyright can function contradictorily, as both the vehicle for the preservation of privacy as well as its abuse, writes Prashant Iyengar. The research examines the various ways in which privacy has been implicated in the shifting terrain of copyright enforcement in India and concludes by examining the notion of the private that emerges from a tapestry view of the relevant sections of Copyright Act.
Located in Internet Governance / Blog / Privacy
Re-thinking Key Escrow
by Natasha Vaz published Aug 09, 2011 last modified Aug 22, 2011 11:44 AM — filed under: ,
Would you make duplicates of your house keys and hand them over to the local police authority? And if so, would you feel safe? Naturally, one would protest this invasion of privacy. Similarly, would it be justified for the government to have a copy of the private key to intercept and decrypt communications? This is the idea behind key escrow; it enables government ‘wiretapping’.
Located in Internet Governance / Blog / Privacy
CCTV in Universities
by Merlin Oommen published Aug 10, 2011 last modified Sep 01, 2011 09:50 AM — filed under: ,
Basic Closed Circuit Television (CCTV) Infrastructure is used to observe movements from a central room, and consists of one or more video cameras that transmit video and audio images to a set of monitors or video recorders.
Located in Internet Governance / Blog / Privacy