Centre for Internet & Society

Search results for surveillance

RSS Subscribe to an always-updated RSS feed.

1080 items matching your search terms.
Filter the results.
Item type



















New items since



Sort by relevance · date (newest first) · alphabetically
Blog Entry IP Addresses and Expeditious Disclosure of Identity in India
by Prashant Iyengar published Aug 22, 2011 last modified Dec 14, 2012 10:20 AM — filed under: ,
In this research, Prashant Iyengar reviews the statutory mechanism regulating the retention and disclosure of IP addresses by Internet companies in India. Prashant provides a compilation of anecdotes on how law enforcement authorities in India have used IP address information to trace individuals responsible for particular crimes.
Located in Internet Governance
CCTV in Universities
by Merlin Oommen published Aug 10, 2011 last modified Sep 01, 2011 09:50 AM — filed under: ,
Basic Closed Circuit Television (CCTV) Infrastructure is used to observe movements from a central room, and consists of one or more video cameras that transmit video and audio images to a set of monitors or video recorders.
Located in Internet Governance / Blog / Privacy
Govt wants to monitor Facebook, Twitter
by Prasad Krishna published Aug 09, 2011 — filed under:
The Union home ministry has written to the department of telecom asking it to "ensure effective monitoring of Twitter and Facebook".
Located in News & Media
Nothing unique about this identity
by Prasad Krishna published Aug 09, 2011 — filed under:
Relying on the government to protect your privacy is like asking peeping tom to install your window blinds, opined, not long ago, the American poet and novelist John Perry Barlow once. The statement attains significance in the context of Unique Identification (UID) project which is being touted as a milepost in inclusive politics. Liberalisation evangelists see UID project as the most virtuous thing that can ever happen to the Indian people who find themselves excluded from the system.
Located in News & Media
Re-thinking Key Escrow
by Natasha Vaz published Aug 09, 2011 last modified Aug 22, 2011 11:44 AM — filed under: ,
Would you make duplicates of your house keys and hand them over to the local police authority? And if so, would you feel safe? Naturally, one would protest this invasion of privacy. Similarly, would it be justified for the government to have a copy of the private key to intercept and decrypt communications? This is the idea behind key escrow; it enables government ‘wiretapping’.
Located in Internet Governance / Blog / Privacy
Better Understanding of the Idea of Privacy Sought
by Prasad Krishna published Aug 07, 2011 last modified Aug 08, 2011 07:40 AM — filed under:
Understanding the ways in which an individual's privacy is violated will help provide a better definition of privacy in India. At a public conference called ‘Privacy Matters' held at the Madras Institute of Development Studies (MIDS) here on Saturday, speakers underscored the need for discussions surrounding the privacy bill.
Located in News & Media
July 2011 Bulletin
by Prasad Krishna published Jul 28, 2011 last modified Jul 30, 2012 07:00 AM — filed under: , , , , , ,
Greetings from the Centre for Internet and Society! In this issue we are pleased to present you the latest updates about our research, upcoming events, and news and media coverage:
Located in About Us / Newsletters
Facebook, my boyfriend is lousy
by Prasad Krishna published Jul 24, 2011 last modified Jul 25, 2011 10:07 AM — filed under:
While a sizeable chunk of users do not mind living their life in public, oversharing can have nasty repercussions in real life. This article by Sahana Saran was published in the Bangalore Mirror on 24 July 2011.
Located in News & Media
Blog Entry Video Surveillance and Its Impact on the Right to Privacy
by Vaishnavi Chillakuru published Jul 23, 2011 last modified Sep 29, 2011 05:35 AM — filed under: ,
The need for video surveillance has grown in this technologically driven era as a mode of law enforcement. Video Surveillance is very useful to governments and law enforcement to maintain social control, recognize and monitor threats, and prevent/investigate criminal activity. In this regard it is pertinent to highlight that not only are governments using this system, but residential communities in certain areas are also using this system to create a safer environment.
Located in Internet Governance / Blog / Privacy
UID: The World’s Largest Biometric Database
by Prasad Krishna published Jul 23, 2011 — filed under:
At the start of his presentation, Sunil Abraham pointed to two aerial drawings of cybercafes: one where each computer was part of a private booth, and one where the computers were in the open so the screens would be visible to any one. Which layout would be more friendly to women, and why, Abraham wanted to know. Some participants selected the first option, liking the idea of the privacy, while others liked the second option so that the cybercafe owner would be able to monitor users’ activities.
Located in News & Media