-
Chinese state media says U.S. should take some blame for cyber attack
-
by
Prasad Krishna
—
published
May 21, 2017
—
last modified
Jun 07, 2017 01:12 AM
—
filed under:
Internet Governance,
Privacy
"WannaCry is far and away the most severe malware attack so far in 2017, and the spread of this troubling ransomware is far from over". Since the global attack was launched on Friday, several thousand more computers were discovered to be infected, particularly in Asia as the work day began on Monday. "We've seen that the slowdown of the infection rate over Friday night, after a temporary fix around it, has now been overcome by a second variation the criminals have released".
Located in
Internet Governance
/
News & Media
-
Noida cyber cell gives tips on preventing WannaCry attack
-
by
Prasad Krishna
—
published
May 20, 2017
—
last modified
Jun 07, 2017 01:18 AM
—
filed under:
Internet Governance,
Privacy
The attackers targeted a weakness found in older versions of Microsoft Windows.
Located in
Internet Governance
/
News & Media
-
UIDAI asks Centre for Internet & Society to provide hacker details
-
by
Prasad Krishna
—
published
May 18, 2017
—
last modified
Jun 07, 2017 12:21 PM
—
filed under:
Aadhaar,
Internet Governance,
Privacy
The Unique Identification Authority of India (UIDAI), the regulatory authority for Aadhaar, has written to a Bengaluru-based research organisation, Centre for Internet & Society (CIS), seeking details about a suspected hack attack on government websites that led to the leak of information about 13 crore users.
Located in
Internet Governance
/
News & Media
-
New rules for govt agencies to ensure security of personal data
-
by
Prasad Krishna
—
published
Jun 07, 2017
—
filed under:
Aadhaar,
Internet Governance,
Privacy
The new rules put the onus on government departments and agencies to safeguard personal data or information held by them.
Located in
Internet Governance
/
News & Media
-
Privacy is culture specific, MNCs hit by Aadhaar, says TRAI chief
-
by
Prasad Krishna
—
published
Jun 07, 2017
—
filed under:
Aadhaar,
Internet Governance,
Privacy
A clutch of petitions filed by those opposing what they call the unchecked use of Aadhaar is currently in the Supreme Court.
Located in
Internet Governance
/
News & Media
-
Explore money apps but watch your data
-
by
Prasad Krishna
—
published
Jun 08, 2017
—
filed under:
Internet Governance,
Privacy
Financial apps may appear to be free but before you install them, read their privacy policies to know what you may be signing away.
Located in
Internet Governance
/
News & Media
-
Short-Term Consultant Required: Events Coordinator
-
by
Prasad Krishna
—
published
Mar 13, 2012
—
filed under:
Privacy
CIS wishes to commission the planning of 3 privacy meetings in total, scheduled during May and June. Meetings should be well-organized, planned and promoted effectively.
Located in
News & Media
-
DNA Database for Missing Persons and Unidentified Dead Bodies
-
by
Vipul Kharbanda
—
published
Oct 31, 2014
—
last modified
Nov 04, 2014 03:46 PM
—
filed under:
Internet Governance,
Privacy
This blog discusses the possible implications of the public interest litigation that has been placed before the Supreme Court petitioning for the establishment of a DNA database in respect to unidentified bodies.
Located in
Internet Governance
/
Blog
-
Health Data Management Policies - Differences Between the EU and India
-
by
Shweta Mohandas
—
published
Jul 10, 2023
—
filed under:
Health Management,
Privacy,
Internet Governance,
Covid19,
Digitisation
Through this issue brief we would like to highlight the differences in approaches to health data management taken by the EU and India, and look at possible recommendations for India, in creating a privacy preserving health data management policy.
Located in
Internet Governance
/
Blog
-
Deceptive Design in Voice Interfaces: Impact on Inclusivity, Accessibility, and Privacy
-
by
Saumyaa Naidu and Shweta Mohandas
—
published
Aug 08, 2023
—
filed under:
Internet Governance,
Privacy
This article was commissioned by the Pranava Institute, as part of their project titled Design Beyond Deception, supported by the University of Notre Dame - IBM's Tech Ethics Lab.” The article examines the design of voice interfaces (VI) to anticipate potential deceptive design patterns in VIs. It also presents design and regulatory recommendations to mitigate these practices.
Located in
Internet Governance
/
Blog