-
Making Aadhaar Mandatory: Gamechanger For Governance?
-
by
Prasad Krishna
—
published
Mar 24, 2016
—
filed under:
Aadhaar,
Internet Governance,
Privacy
Why a programme that both the Congress and the BJP have hailed as transformational has divided Parliament this week? The Aadhaar Bill which was passed this week aims at facilitating government benefits and subsidies to citizens said Finance Minister Arun Jaitley.
Located in
Internet Governance
/
News & Media
-
Blockchain: A primer for India
-
by
Anusha Madhusudhan
—
published
Nov 18, 2019
—
last modified
Mar 30, 2020 01:32 PM
—
filed under:
Blockchain,
Internet Governance,
Cryptocurrencies
This report is presently being updated.
Located in
Internet Governance
/
Blog
-
Cybersecurity Visuals Media Handbook: Launch Event
-
by
Saumyaa Naidu
—
published
Nov 28, 2019
—
last modified
Dec 06, 2019 09:27 AM
—
filed under:
Cybersecurity,
Cyber Security,
Event,
Internet Governance
6th December | 6 pm | Centre for Internet and Society, Bangalore
Located in
Internet Governance
/
Blog
-
Cyber security tips for small businesses
-
by
Theres Sudeep
—
published
Dec 05, 2019
—
filed under:
Internet Governance
It is important to have good cyber security practices, experts recommend.
Located in
Internet Governance
/
News & Media
-
In Twitter India’s Arbitrary Suspensions, a Question of What Constitutes a Public Space
-
by
Torsha Sarkar
—
published
Dec 12, 2019
—
filed under:
Freedom of Speech and Expression,
Internet Governance
A discussion is underway about the way social media platforms may have to operate within the tenets of constitutional protections of free speech.
Located in
Internet Governance
/
Blog
-
WhatsApp spy attack and after
-
by
Theres Sudeep
—
published
Dec 15, 2019
—
filed under:
Internet Governance,
Privacy
Bengaluru experts analyse the Pegasus snooping scandal, and provide advice on what you can do about the gaping holes in your mobile phone security.
Located in
Internet Governance
/
News & Media
-
Power over privacy: New Personal Data Protection Bill fails to really protect the citizen’s right to privacy
-
by
Nikhil Pahwa
—
published
Dec 15, 2019
—
filed under:
Internet Governance,
Privacy
Nikhil Pahwa throws light on the new personal data protection bill.
Located in
Internet Governance
/
News & Media
-
ICANN takes one step forward in its human rights and accountability commitments
-
by
Akriti Bopanna and Ephraim Percy Kenyanito
—
published
Dec 17, 2019
—
last modified
Dec 19, 2019 11:35 AM
—
filed under:
Freedom of Speech and Expression,
ICANN,
IANA,
Internet Governance
Akriti Bopanna and Ephraim Percy Kenyanito take a look at ICANN's Implementation Assessment Report for the Workstream 2 recommendations and break down the key human rights considerations in it. Akriti chairs the Cross Community Working Party on Human Rights at ICANN and Ephraim works on Human Rights and Business for Article 19, leading their ICANN engagement.
Located in
Internet Governance
/
Blog
-
Data Infrastructures and Inequities: Why Does Reproductive Health Surveillance in India Need Our Urgent Attention?
-
by
Aayush Rathi and Ambika Tandon
—
published
Feb 14, 2019
—
last modified
Dec 30, 2019 04:44 PM
—
filed under:
Big Data,
Data Systems,
Privacy,
Researchers at Work,
Internet Governance,
Research,
BD4D,
Healthcare,
Surveillance,
Big Data for Development
In order to bring out certain conceptual and procedural problems with health monitoring in the Indian context, this article by Aayush Rathi and Ambika Tandon posits health monitoring as surveillance and not merely as a “data problem.” Casting a critical feminist lens, the historicity of surveillance practices unveils the gendered power differentials wedded into taken-for-granted “benign” monitoring processes. The unpacking of the Mother and Child Tracking System and the National Health Stack reveals the neo-liberal aspirations of the Indian state.
Located in
Internet Governance
/
Blog
-
Extra-Territorial Surveillance and the Incapacitation of Human Rights
-
by
Arindrajit Basu
—
published
Dec 31, 2019
—
last modified
Jan 02, 2020 11:02 AM
—
filed under:
Cybersecurity,
Cyber Security,
Internet Governance
This paper was published in Volume 12 (2) of the NUJS Law Review.
Located in
Internet Governance