Centre for Internet & Society

2986 items matching your search terms.
Filter the results.
Item type



















New items since



Sort by relevance · date (newest first) · alphabetically
Issue of duplication of identities of users under control: Nilekani
by Prasad Krishna published Jun 29, 2013 last modified Jul 02, 2013 10:13 AM — filed under: ,
Nandan Nilekani says UIDAI system almost completely accurate, duplication of identities virtually negligible.
Located in News & Media
Blog Entry IT (Amendment) Act, 2008, 69 Rules: Draft and Final Version Comparison
by Jadine Lannon published Apr 30, 2013 last modified Apr 30, 2013 09:56 AM — filed under: , ,
Jadine Lannon has performed a clause-by-clause comparison of the Draft 69 Rules and official 69 Rules under Section 69B in order to better understand how the two are similar and how they differ. Very brief notes have been included on some changes we deemed to be important.
Located in Internet Governance / Blog
Blog Entry IT (Amendment) Act, 2008, 69A Rules: Draft and Final Version Comparison
by Jadine Lannon published Apr 26, 2013 last modified Apr 30, 2013 10:10 AM — filed under: ,
Jadine Lannon has performed a clause-by-clause comparison of the 69A draft rules and 69A rules for Section 69A of the IT Act in order to better understand how the two differ. While there has been reshuffling of the clauses in the official rules, the content itself has not changed significantly. Notes have been included on some changes we deemed to be important.
Located in Internet Governance / Blog
Blog Entry IT (Amendment) Act, 2008, 69B Rules: Draft and Final Version Comparison
by Jadine Lannon published Apr 30, 2013 last modified Apr 30, 2013 09:47 AM — filed under: ,
Jadine Lannon has performed a clause-by-clause comparison of the Draft 69B Rules and official 69B Rules under Section 69B in order to better understand how the two are similar and how they differ. Notes have been included on some changes we deemed to be important.
Located in Internet Governance / Blog
IT companies in Bengaluru on high alert over WannaCry ransomware
by Prasad Krishna published May 19, 2017 last modified May 19, 2017 09:05 AM — filed under: , ,
In the wake of the ransomware attack triggered by WannaCry virus, IT firms in Bengaluru are racing against time to updating their security systems. At some firms, employees have been asked to stay away from work for a few hours, while many other companies have declared holiday for a day or two for their employees.
Located in Internet Governance / News & Media
It feeds on you!
by Admin published Apr 10, 2018 — filed under:
A robust data protection law can prevent Facebook from manipulating users
Located in Internet Governance / News & Media
Blog Entry It Hurts Them Too
by Mir Farhat published Dec 19, 2017 — filed under: ,
Strap: Internet shutdown robs security forces' social media lifeline in J&K.
Located in Internet Governance / Blog
IT Leaders, Lawyers Welcome SC Ruling on 66A of the IT Act
by Prasad Krishna published Mar 26, 2015 last modified Mar 26, 2015 03:58 PM — filed under: , , , ,
The Supreme Court of India has delivered a landmark judgment in scrapping section 66A of the Information Technology Act, which prescribed 'punishment for sending offensive messages through communication service, etc.' and had been branded as grossly 'unconstitutional' by various lawyers and legal advisors.
Located in Internet Governance / News & Media
It Took Just 355 Indians to Mine the Data of 5.6 Lakh Facebook Users. Here's How
by Admin published Apr 07, 2018 — filed under: , ,
Data privacy in India is still a nascent subject. Experts say cheap data has led to unprecedented Facebook penetration. Often, it is seen that those who open an account are not aware of the privacy concerns.
Located in Internet Governance / News & Media
It's That Eavesdrop Endemic
by Prasad Krishna published Jul 30, 2016 — filed under: , ,
Whatsapp Says It’s Snoop-Proof Now, But There’s Always A Way In
Located in Internet Governance / News & Media