-
UID: Nothing to Hide, Nothing to Fear?
-
by
Shilpa Narani
—
published
Jul 25, 2011
—
last modified
Sep 28, 2011 11:44 AM
—
filed under:
Internet Governance,
Privacy
Isn’t it interesting that authorities ask you about your identity and you end up showing your proof of existence! Isn’t this breaching into one’s personal life? Why so much transparency only from the public side? Why can’t the government be equally transparent to the public?, asks Shilpa Narani.
Located in
Internet Governance
/
Blog
/
Privacy
-
An Interview with Activist Shubha Chacko: Privacy and Sex Workers
-
by
Elonnai Hickok
—
published
Apr 25, 2011
—
last modified
Mar 28, 2012 06:26 AM
—
filed under:
Internet Governance,
Privacy
On February 20th I had the opportunity to speak with Shubha Chacko on privacy and sex workers. Ms. Chacko is an activist who works for Aneka, an NGO based in Bangalore, which fights for the human rights of sexual minorities. In my interview with Ms. Chacko I tried to understand how privacy impacts the lives of sex workers in India. The below is an account of our conversation.
Located in
Internet Governance
/
Blog
/
Privacy
-
Limits to Privacy
-
by
Prashant Iyengar
—
published
May 06, 2011
—
last modified
Dec 14, 2012 10:28 AM
—
filed under:
Internet Governance,
Privacy
In his research article, Prashant Iyengar examines the limits to privacy for individuals in light of the provisions of the Constitution of India, public interest, security of state and maintenance of law and order. The article attempts to build a catalogue of all these justifications and arrive at a classification of all such frequently used terms invoked in statutes and upheld by courts to deprive persons of their privacy.
Located in
Internet Governance
/
Blog
/
Privacy
-
Video Surveillance and Its Impact on the Right to Privacy
-
by
Vaishnavi Chillakuru
—
published
Jul 23, 2011
—
last modified
Sep 29, 2011 05:35 AM
—
filed under:
Internet Governance,
Privacy
The need for video surveillance has grown in this technologically driven era as a mode of law enforcement. Video Surveillance is very useful to governments and law enforcement to maintain social control, recognize and monitor threats, and prevent/investigate criminal activity. In this regard it is pertinent to highlight that not only are governments using this system, but residential communities in certain areas are also using this system to create a safer environment.
Located in
Internet Governance
/
Blog
/
Privacy
-
When Data Means Privacy, What Traces Are You Leaving Behind?
-
by
Noopur Raval
—
published
Jul 18, 2011
—
last modified
Nov 24, 2011 09:24 AM
—
filed under:
Internet Governance,
Privacy
How do you know yourself to be different from others? What defines the daily life that you live and the knowledge you produce in the span of this life? Is all that information yours or are you a mere stakeholder on behalf of the State whose subject you are? What does privacy really mean? In a society that is increasingly relying on information to identify people, collecting and archiving ‘personal’ details of your lives, your name, age, passport details, ration card number, call records etc, how private is your tweet, status update, text message or simply, your restaurant bill?
Located in
Internet Governance
/
Blog
/
Privacy
-
Privacy & Media Law
-
by
Sonal Makhija
—
published
Jul 19, 2011
—
last modified
Dec 14, 2012 10:26 AM
—
filed under:
Internet Governance,
Privacy
In her research, Sonal Makhija, a Bangalore-based lawyer, tries to delineate the emerging privacy concerns in India and the existing media norms and guidelines on the right to privacy. The research examines the existing media norms (governed by Press Council of India, the Cable Television Networks (Regulation) Act, 1995 and the Code of Ethics drafted by the News Broadcasting Standard Authority), the constitutional protection guaranteed to an individual’s right to privacy upheld by the courts, and the reasons the State employs to justify the invasion of privacy. The paper further records, both domestic and international, inclusions and exceptions with respect to the infringement of privacy.
Located in
Internet Governance
/
Blog
/
Privacy
-
Right to Privacy Bill 2010 — A Few Comments
-
by
Elonnai Hickok
—
published
Jul 20, 2011
—
last modified
Mar 22, 2012 06:26 AM
—
filed under:
Internet Governance,
Privacy
Earlier this year, in February 2011, Rajeev Chandrasekhar introduced the Right to Privacy Bill, 2010 in the Rajya Sabha. The Bill is meant to “provide protection to the privacy of persons including those who are in public life”. Though the Bill states that its objective is to protect individuals’ fundamental right to privacy, the focus of the Bill is on the protection against the use of electronic/digital recording devices in public spaces without consent and for the purpose of blackmail or commercial use.
Located in
Internet Governance
/
Blog
/
Privacy
-
Open Letter to the Finance Committee: Operational Design
-
by
Prasad Krishna
—
published
Feb 16, 2011
—
last modified
Feb 17, 2011 10:02 AM
—
filed under:
Privacy
The objective of the UID project is to provide identity infrastructure that is not susceptible to fraud or error. This note highlights parts of the operational design of the project, which are flawed. We plead that each point be taken into consideration and that the design be suitably revised.
Located in
Internet Governance
/
Blog
/
Privacy
-
Open Letter to the Finance Committee: UID Budget
-
by
Prasad Krishna
—
published
Feb 16, 2011
—
last modified
Feb 17, 2011 11:18 AM
—
filed under:
Privacy
This note presents the aspects of the UID project, which have not been considered or incorporated into the UID’s budget. The costs include re-enrollment, loss in human time, and the cost of the audit function.
Located in
Internet Governance
/
Blog
/
Privacy
-
Open Letter to the Finance Committe: Biometrics
-
by
Prasad Krishna
—
published
Feb 16, 2011
—
last modified
Feb 17, 2011 01:12 PM
—
filed under:
Privacy
This note points out the weaknesses inherent in biometrics and the pitfalls in using them. It recommends procedural safeguards that should be adopted by the UID in order to make the use of biometrics more secure and inclusive.
Located in
Internet Governance
/
Blog
/
Privacy