-
February 11: The Day We Fight Back Against Mass Surveillance
-
by
Divij Joshi
—
published
Feb 14, 2014
—
filed under:
Internet Governance,
Privacy
The expansive surveillance being perpetuated by governments and corporations is the single biggest threat to individual liberties in the digital age.
Located in
Internet Governance
/
Blog
-
Fifth Meeting of the two Sub-Groups on Privacy Issues under the Chairmanship of Justice AP Shah
-
by
Prasad Krishna
—
published
Jul 19, 2012
—
last modified
Aug 07, 2012 10:11 AM
—
filed under:
Meeting,
Internet Governance,
Privacy
The fifth meeting of the two sub-groups on privacy issues will be held on July 22, 2012 under the chairmanship of Justice AP Shah, former chief justice of Delhi High Court.
Located in
News & Media
-
FIGI Symposium 2017
-
by
Admin
—
published
Nov 29, 2017
—
last modified
Jan 01, 2018 04:29 PM
—
filed under:
Internet Governance,
Privacy
Innovative Approaches to Digital Financial Inclusion Challenges.
Located in
Internet Governance
/
News & Media
-
Filtering content on the internet
-
by
Chinmayi Arun
—
published
May 06, 2014
—
last modified
May 06, 2014 09:33 AM
—
filed under:
Internet Governance,
Privacy
Located in
Internet Governance
/
Blog
-
Financial Inclusion and the UID
-
by
elonnai hickok
—
published
Aug 22, 2011
—
last modified
Aug 23, 2011 10:36 AM
—
filed under:
Internet Governance,
Privacy
Since 2009, when Nandan Nilekani began to envision and implement the Unique Identification Project,
the UID authority has promoted the UID/Aadhaar scheme as a tool of development for India - arguing that an identity will assist in bringing benefits to the poor, promote financial inclusion in India, and allow for economic and social development. In this blog entry I will focus on the challenges and possibilities of the UID number providing the residents of India a viable method of access to financial services across the country.
Located in
Internet Governance
-
FinFisher in India and the Myth of Harmless Metadata
-
by
Maria Xynou
—
published
Aug 13, 2013
—
last modified
Aug 13, 2013 11:30 AM
—
filed under:
Featured,
Internet Governance,
Privacy
In this article, Maria Xynou argues that metadata is anything but harmless, especially since FinFisher — one of the world's most controversial types of spyware — uses metadata to target individuals.
Located in
Internet Governance
/
Blog
-
FinTech in India: A Study of Privacy and Security Commitments
-
by
Aayush Rathi and Shweta Mohandas
—
published
Apr 30, 2019
—
last modified
May 02, 2019 11:20 AM
—
filed under:
Featured,
Homepage,
Internet Governance,
Privacy
The unprecedented growth of the fintech space in India has concomitantly come with regulatory challenges around inter alia privacy and security concerns. This report studies the privacy policies of 48 fintech companies operating in India to better understand some of these concerns.
Located in
Internet Governance
/
Blog
-
Firms find wealth in your data
-
by
Admin
—
published
Jul 25, 2018
—
filed under:
Internet Governance,
Privacy
Data collection and theft is quite prevalent and there is little an individual can do right now.
Located in
Internet Governance
/
News & Media
-
First Privacy and Surveillance Roundtable
-
by
Anandini K Rathore
—
published
Jul 18, 2014
—
last modified
Aug 09, 2014 04:13 AM
—
filed under:
Internet Governance,
Privacy
The Privacy and Surveillance Roundtables are a CIS initiative, in partnership with the Cellular Operators Association of India (COAI), as well as local partners. From June 2014 – November 2014, CIS and COAI will host seven Privacy and Surveillance Roundtable discussions across multiple cities in India. The Roundtables will be closed-door deliberations involving multiple stakeholders.
Located in
Internet Governance
/
Blog
-
Fixing Aadhaar: Security developers' task is to trim chances of data breach
-
by
Sunil Abraham
—
published
Jan 10, 2018
—
last modified
Jan 10, 2018 04:47 PM
—
filed under:
Aadhaar,
Internet Governance,
Privacy
The task before a security developer is not only to reduce the probability of identity breach but to eliminate certain occurrences.
Located in
Internet Governance
/
Blog