Centre for Internet & Society

2982 items matching your search terms.
Filter the results.
Item type



















New items since



Sort by relevance · date (newest first) · alphabetically
IISc students boycott UID, don’t want Big Brother to keep watch
by Prasad Krishna published Aug 23, 2011 — filed under: ,
The programme doesn’t have statutory backing. It is still in parliament
Located in News & Media
In the Right Circle
by Prasad Krishna published Aug 23, 2011 — filed under: ,
I’ve been on Google Plus for a few weeks now. In the beginning, it felt like showing up early at a much-talked-up party. There was a small scatter of people, poking around, examining the place, making preliminary conversation with the few others they knew. Most of the talk was, unsurprisingly, about Google Plus.
Located in News & Media
Bye Bye email?
by Nishant Shah published Aug 23, 2011 — filed under:
Email might be the default method of communication for most of us, but could it be going the telegram way.
Located in Internet Governance
Blog Entry Whole Body Imaging and Privacy Concerns that Follow
by Srishti Goyal published Aug 22, 2011 last modified Sep 29, 2011 05:38 AM — filed under: ,
Law student at the National University of Juridical Sciences, and intern for Privacy India, Srishti Goyal compares, contrasts, and critiques the Whole Body Imaging practices found in the US, the UK, and Australia, and makes recommendations for an Indian regime.
Located in Internet Governance / Blog
Blog Entry IP Addresses and Expeditious Disclosure of Identity in India
by Prashant Iyengar published Aug 22, 2011 last modified Dec 14, 2012 10:20 AM — filed under: ,
In this research, Prashant Iyengar reviews the statutory mechanism regulating the retention and disclosure of IP addresses by Internet companies in India. Prashant provides a compilation of anecdotes on how law enforcement authorities in India have used IP address information to trace individuals responsible for particular crimes.
Located in Internet Governance
Cyber Crime & Privacy
by Merlin Oommen published Aug 22, 2011 last modified Sep 01, 2011 09:36 AM — filed under: ,
India is a growing area in the field of active Internet usage with 71 million Internet users.
Located in Internet Governance
Financial Inclusion and the UID
by elonnai hickok published Aug 22, 2011 last modified Aug 23, 2011 10:36 AM — filed under: ,
Since 2009, when Nandan Nilekani began to envision and implement the Unique Identification Project, the UID authority has promoted the UID/Aadhaar scheme as a tool of development for India - arguing that an identity will assist in bringing benefits to the poor, promote financial inclusion in India, and allow for economic and social development. In this blog entry I will focus on the challenges and possibilities of the UID number providing the residents of India a viable method of access to financial services across the country.
Located in Internet Governance
CCTV in Universities
by Merlin Oommen published Aug 10, 2011 last modified Sep 01, 2011 09:50 AM — filed under: ,
Basic Closed Circuit Television (CCTV) Infrastructure is used to observe movements from a central room, and consists of one or more video cameras that transmit video and audio images to a set of monitors or video recorders.
Located in Internet Governance / Blog / Privacy
Govt wants to monitor Facebook, Twitter
by Prasad Krishna published Aug 09, 2011 — filed under:
The Union home ministry has written to the department of telecom asking it to "ensure effective monitoring of Twitter and Facebook".
Located in News & Media
Re-thinking Key Escrow
by Natasha Vaz published Aug 09, 2011 last modified Aug 22, 2011 11:44 AM — filed under: ,
Would you make duplicates of your house keys and hand them over to the local police authority? And if so, would you feel safe? Naturally, one would protest this invasion of privacy. Similarly, would it be justified for the government to have a copy of the private key to intercept and decrypt communications? This is the idea behind key escrow; it enables government ‘wiretapping’.
Located in Internet Governance / Blog / Privacy