Centre for Internet & Society

1028 items matching your search terms.
Filter the results.
Item type



















New items since



Sort by relevance · date (newest first) · alphabetically
Blog Entry Call for Researchers: Welfare, Gender, and Surveillance
by Ambika Tandon published Jan 10, 2020 last modified Feb 13, 2020 03:05 PM — filed under: , , , ,
We are inviting applications for two researchers. Each researcher is expected to write a narrative essay that interrogates the modes of surveillance that people of LGBTHIAQ+ and gender non-conforming identities and sexual orientations are put under as they seek sexual and reproductive health (SRH) services in India. The researchers are expected to undertake field research in the location they are based in, and reflect on lived experiences gathered through field research as well as their own experiences of doing field research. Please read the sections below for more details about the work involved, the timeline for the same, and the application process for this call.
Located in Jobs
IETF106
by Admin published Dec 15, 2019 — filed under: ,
Gurshabad Grover participated at IETF106, which was held in Singapore 16-22 November, 2019.
Located in Internet Governance / News & Media
Power over privacy: New Personal Data Protection Bill fails to really protect the citizen’s right to privacy
by Nikhil Pahwa published Dec 15, 2019 — filed under: ,
Nikhil Pahwa throws light on the new personal data protection bill.
Located in Internet Governance / News & Media
Outrage As Privileged IITians Use Tech To Spy On Sweepers
by Rachna Khaira published Dec 15, 2019 — filed under: ,
Some members of the housekeeping staff at IIT Ropar were put under round the clock surveillance during working hours for many days in February this year without their consent. IIT Ropar Director Prof S K Das has ordered a probe into the incident.
Located in Internet Governance / News & Media
WhatsApp spy attack and after
by Theres Sudeep published Dec 15, 2019 — filed under: ,
Bengaluru experts analyse the Pegasus snooping scandal, and provide advice on what you can do about the gaping holes in your mobile phone security.
Located in Internet Governance / News & Media
Blog Entry Making Voices Heard: Privacy, Inclusivity, and Accessibility of Voice Interfaces in India
by Shweta Mohandas published Dec 05, 2019 last modified Dec 18, 2019 12:10 PM — filed under: , , , , , , , ,
We believe that voice interfaces have the potential to democratise the use of internet by addressing barriers such as accessibility concerns, lack of abilities of reading and writing on digital text interfaces, and lack of options for people to interact with digital devices in their own languages. Through the Making Voice Heard Project supported by Mozilla Corporation, we will examine the current landscape of voice interfaces in India.
Located in RAW
Cyber law experts asks why CERT-In removed advisory warning about WhatsApp vulnerability
by Megha Mandavia published Nov 15, 2019 — filed under: ,
On the missing web page note, CERT-In had provided a detailed explanation of the vulnerability, which could be exploited by an attacker by making a decoy voice call to a target.
Located in Internet Governance / News & Media
India facial recognition: How effective will it be?
by Admin published Nov 15, 2019 — filed under: ,
India is trying to build what could be the world's largest facial recognition system.
Located in Internet Governance / News & Media
UN Special Rapporteur on the Right to Privacy Consultation on 'Privacy and Gender'
by Admin published Nov 02, 2019 — filed under: ,
Ambika Tandon was a speaker at the Consultation on Privacy and Gender organised by the UN Special Rapporteur on the right to privacy held at New York University, New York on October 30 - 31, 2019.
Located in Internet Governance / News & Media
Blog Entry Through the looking glass: Analysing transparency reports
by Torsha Sarkar, Suhan S and Gurshabad Grover published Oct 30, 2019 last modified Nov 02, 2019 05:48 AM — filed under: , ,
An analysis of companies' transparency reports for government requests for user data and content removal
Located in Internet Governance / Blog