Centre for Internet & Society

Out of the Bedroom

Out of the Bedroom

Posted by Nishant Shah at Aug 25, 2013 11:00 PM |

We have shared it with our friends. We have watched it with our lovers. We have discussed it with our children and talked about it with our partners. It is in our bedrooms, hidden in sock drawers. It is in our laptops, in a folder marked "Miscellaneous". It is in our cellphones and tablets, protected under passwords. It is the biggest reason why people have learned to clean their browsing history and cookies from their browsers.

Read More…

Freedom from Monitoring: India Inc Should Push For Privacy Laws

Freedom from Monitoring: India Inc Should Push For Privacy Laws

Posted by Sunil Abraham at Aug 21, 2013 07:04 AM |

More surveillance than absolutely necessary actually undermines the security objective.

Read More…

FinFisher in India and the Myth of Harmless Metadata

FinFisher in India and the Myth of Harmless Metadata

Posted by Maria Xynou at Aug 13, 2013 11:15 AM |

In this article, Maria Xynou argues that metadata is anything but harmless, especially since FinFisher — one of the world's most controversial types of spyware — uses metadata to target individuals.

Read More…

Ethical Issues in Open Data

Posted by Kovey Coles at Aug 07, 2013 09:10 AM |

On August 1, 2013, I took part in a web meeting, organized and hosted by Tim Davies of the World Wide Web foundation. The meeting, titled “Ethical issues in Open Data,” had an agenda focused around privacy considerations in the context of the open data movement.

Read More…

'Ethical Hacker' Saket Modi Calls for Stronger Cyber Security Discussions

Posted by Kovey Coles at Aug 05, 2013 01:10 PM |

Twenty-two year old Saket Modi is the CEO and co-founder of Lucideus, a leading cyber security company in India which claims to have worked with 4 out of 5 top global e-commerce companies, 4 out of 10 top IT companies in the world, and 3 out of 5 top banks of the Asia Pacific.

Read More…

Guidelines for the Protection of National Critical Information Infrastructure: How Much Regulation?

Posted by Jonathan Diamond at Jul 31, 2013 10:50 PM |

July has been a busy month for cyber security in India. Beginning with the release of the country’s first National Cyber Security Policy on July 2 and followed just this past week by a set of guidelines for the protection of national critical information infrastructure (CII) developed under the direction of the National Technical Research Organization (NTRO), India has made respectable progress in its thinking on national cyber security.

Read More…

More than a Hundred Global Groups Make a Principled Stand against Surveillance

Posted by Elonnai Hickok at Jul 31, 2013 02:26 PM |

For some time now there has been a need to update understandings of existing human rights law to reflect modern surveillance technologies and techniques.

Read More…

India's National Cyber Security Policy in Review

Posted by Jonathan Diamond at Jul 31, 2013 10:40 AM |

Earlier this month, the Department of Electronics and Information Technology released India’s first National Cyber Security Policy. Years in the making, the Policy sets high goals for cyber security in India and covers a wide range of topics, from institutional frameworks for emergency response to indigenous capacity building.

Read More…

The Audacious ‘Right to Be Forgotten’

Posted by Kovey Coles at Jul 31, 2013 10:08 AM |

There has long been speculation over the permanency of our online presence. Posting about excessively-personal details, commenting in a way which is later embarrassing, being caught in unflattering public photos; to our chagrin, all of these unfortunate situations often persist on the web, and can continue to haunt us in future years.

Read More…

Report on the 5th Privacy Round Table meeting

Report on the 5th Privacy Round Table meeting

Posted by Maria Xynou at Jul 24, 2013 08:45 AM |

This report entails an overview of the discussions and recommendations of the fifth Privacy Round Table in Calcutta, on 13th July 2013.

Read More…

You Have the Right to Remain Silent

Reflecting upon the state of freedom of speech and expression in India, in the wake of the shut-down of the political satire website narendramodiplans.com.

Read More…

Parsing the Cyber Security Policy

Parsing the Cyber Security Policy

Posted by Chinmayi Arun at Jul 22, 2013 06:37 AM |

An effective cyber-security policy must keep up with the rapid evolution of technology, and must never become obsolete. The standard-setting and review bodies will therefore need to be very nimble, says Chinmayi Arun.

Read More…

CII Conference on "ACT": Achieve Cyber Security Together"

Posted by Kovey Coles at Jul 22, 2013 06:15 AM |

The Confederation of Indian Industries (CII) organized a conference on facing cyber threats and challenges at Hotel Hilton in Chennai on July 13, 2013. Kovey Coles attended this conference and shares a summary of the event in this blog post.

Read More…

DSCI Best Practices Meet 2013

Posted by Kovey Coles at Jul 22, 2013 05:55 AM |

The DSCI Best Practices Meet 2013 was organized on July 12, 2013 at Hyatt Regency, Anna Salai in Chennai. Kovey Coles attended the meet and shares a summary of the happenings in this blog post.

Read More…

Interview with Mr. Reijo Aarnio - Finnish Data Protection Ombudsman

Interview with Mr. Reijo Aarnio - Finnish Data Protection Ombudsman

Posted by Maria Xynou at Jul 19, 2013 01:02 PM |

Maria Xynou recently interviewed Mr. Reijo Aarnio, the Finnish Data Protection Ombudsman, at the CIS' 5th Privacy Round Table. View this interview and gain an insight on recommendations for better data protection in India!

Read More…

Can India Trust Its Government on Privacy?

Can India Trust Its Government on Privacy?

In response to criticisms of the Centralized Monitoring System, India’s new surveillance program, the government could contend that merely having the capability to engage in mass surveillance won’t mean that it will. Officials will argue that they will still abide by the law and will ensure that each instance of interception will be authorized.

Read More…

How Surveillance Works in India

How Surveillance Works in India

Posted by Pranesh Prakash at Jul 15, 2013 10:20 AM |

When the Indian government announced it would start a Centralized Monitoring System in 2009 to monitor telecommunications in the country, the public seemed unconcerned. When the government announced that the system, also known as C.M.S., commenced in April, the news didn’t receive much attention.

Read More…

CIS Cybersecurity Series (Part 6) - Lhadon Tethong

CIS interviews Lhadon Tethong, Tibetan human rights activist, as part of the Cybersecurity Series

Read More…

Moving Towards a Surveillance State

Posted by Srinivas Atreya at Jul 15, 2013 05:57 AM |

The cyberspace is a modern construct of communication and today, a large part of human activity takes place in cyberspace. It has become the universal platform where business is executed, discourse is conducted and personal information is exchanged. However, the underbelly of the internet is also seen to host activities and persons who are motivated by nefarious intent.

Read More…

India:Privacy in Peril

India:Privacy in Peril

Posted by Bhairav Acharya at Jul 12, 2013 05:00 PM |

The danger of mass surveillance in India is for real. The absence of a regulating law is damning for Indians who want to protect their privacy against the juggernaut of state and private surveillance.

Read More…

Filed under: