-
Deep Packet Inspection: How it Works and its Impact on Privacy
-
by
Amber Sinha
—
published
Dec 16, 2016
—
filed under:
Internet Governance,
Privacy
In the last few years, there has been extensive debate and discussion around network neutrality in India. The online campaign in favor of Network Neutrality was led by Savetheinternet.in in India. The campaign was a spectacular success and facilitated sending over a million emails supporting the cause of network neutrality, eventually leading to ban on differential pricing. Following in the footsteps of the Shreya Singhal judgement, the fact that the issue of net neutrality has managed to attract wide public attention is an encouraging sign for a free and open Internet in India. Since the debate has been focused largely on zero rating, other kinds of network practices impacting network neutrality have yet to be comprehensively explored in the Indian context, nor their impact on other values. In this article, the author focuses on network management, in general, and deep packet inspection, in particular and how it impacts the privacy of users.
Located in
Internet Governance
/
Blog
-
Demonetisation Survey Limits the Range of Feedback that can be Provided by the User
-
by
tiwari
—
published
Nov 24, 2016
—
last modified
Nov 24, 2016 02:50 PM
—
filed under:
Demonetisation,
Internet Governance,
Privacy
The government has faced increasingly targeted attacks by the Opposition and the public on the merits of the demonetisation move carried out a fortnight ago. In an attempt to placate this ire and to create a feedback loop that directly engages with the public, the government has decided to conduct a mass survey to gauge public perception. The survey is hosted on the Narendra Modi mobile application that can be found on the Android and iOS app stores. This article will attempt to analyse the mobile application by looking at the design principles followed in the survey and the scope given to survey takers to express their true opinion of the demonetisation move.
Located in
Internet Governance
/
Blog
-
Demystifying Data Breaches in India
-
by
Pawan Singh
—
published
Oct 17, 2022
—
filed under:
Privacy,
Internet Governance,
Data Governance,
Data Protection,
Data Management
Despite the rate at which data breaches occur and are reported in the media, there seems to be little information about how and when they are resolved. This post examines the discourse on data breaches in India with respect to their historical forms, with a focus on how the specific terminology to describe data security incidents has evolved in mainstream news media reportage.
Located in
Internet Governance
/
Blog
-
Deployment of Digital Health Policies and Technologies: During Covid-19
-
by
Pallavi Bedi
—
published
Jul 21, 2022
—
filed under:
Privacy,
Digitalisation,
Digital Health,
Digital Knowledge,
Internet Governance,
Digital Media,
Digital Technologies,
Digitisation
In the last twenty years or so, the Indian government has adopted several digital mechanisms to deliver services to its citizens.
Located in
Internet Governance
/
Blog
-
Design and Uses of Digital Identities - Research Plan
-
by
Amber Sinha and Pooja Saxena
—
published
Aug 08, 2019
—
last modified
Aug 17, 2019 07:58 AM
—
filed under:
Digital ID,
Privacy,
Internet Governance,
Appropriate Use of Digital ID,
Digital Identity
In our research project about uses and design of digital identity systems, we ask two core questions: a) What are appropriate uses of ID?, and b) How should we think about the technological design of ID? Towards the first research question, we have worked on first principles and will further develop definitions, legal tests and applications of these principles. Towards the second research question, we have first identified a set of existing and planned digital identity systems that represent a paradigm of how such a system can be envisioned and implemented, and will look to identify key design choices which are causing divergence in paradigm.
Located in
Internet Governance
/
Blog
-
Design Concerns in Creating Privacy Notices
-
by
Saumyaa Naidu
—
published
May 29, 2018
—
last modified
Jun 06, 2018 01:45 PM
—
filed under:
Internet Governance,
Privacy
The purpose of privacy notices and choice mechanisms is to notify users of the data practices of a system, so they can make informed privacy decisions.
Located in
Internet Governance
/
Blog
-
DesiSec: Cybersecurity and Civil Society in India
-
by
Laird Brown
—
published
Jun 20, 2015
—
last modified
Jun 29, 2015 04:25 PM
—
filed under:
Censorship,
Privacy,
Freedom of Speech and Expression,
Internet Governance,
Cyber Security Film,
Featured,
Chilling Effect,
Cyber Security,
Homepage,
Cyber Security Interview
As part of its project on mapping cyber security actors in South Asia and South East Asia, the Centre for Internet & Society conducted a series of interviews with cyber security actors. The interviews were compiled and edited into one documentary. The film produced by Purba Sarkar, edited by Aaron Joseph, and directed by Oxblood Ruffin features Malavika Jayaram, Nitin Pai, Namita Malhotra, Saikat Datta, Nishant Shah, Lawrence Liang, Anja Kovacs, Sikyong Lobsang Sangay and, Ravi Sharada Prasad.
Located in
Internet Governance
/
Blog
-
DesiSec: Episode 1 - Film Release and Screening
-
by
Purba Sarkar
—
published
Nov 28, 2013
—
last modified
Dec 17, 2013 08:13 AM
—
filed under:
Cyberspace,
Privacy,
Cybersecurity,
Internet Governance,
Surveillance,
Cyber Security Film,
Cyber Security,
Event
The Centre for Internet and Society is pleased to to announce the release of the first documentary film on cybersecurity in India - DesiSec.
We hope you can join us for a special screening of the first episode of DesiSec, on 11th December, at CIS!
Located in
Internet Governance
-
Despite apex court order, IOC proceeds with Aadhaar-linked DBT
-
by
Prasad Krishna
—
published
Jan 06, 2014
—
last modified
Jan 31, 2014 06:50 AM
—
filed under:
UID,
Internet Governance,
Privacy
Once DBT starts, there is no other method to avail of subsidy: IOC official.
Located in
News & Media
-
Details of 135 million Aadhaar card holders may have leaked, claims CIS report
-
by
Prasad Krishna
—
published
May 02, 2017
—
last modified
May 20, 2017 08:42 AM
—
filed under:
Aadhaar,
Internet Governance,
Privacy
The disclosure came as part of a CIS report titled ‘Information Security Practices of Aadhaar (or lack thereof): A Documentation of Public Availability of Aadhaar Numbers with Sensitive Personal Financial Information’.
Located in
Internet Governance
/
News & Media