-
Press Release, March 11, 2016: The Law cannot Fix what Technology has Broken!
-
by
Japreet Grewal and Sunil Abraham
—
published
Mar 16, 2016
—
last modified
Mar 16, 2016 10:10 AM
—
filed under:
UID,
Big Data,
Privacy,
Internet Governance,
Digital India,
Aadhaar,
Biometrics
We published and circulated the following press release on March 11, 2016, as the Lok Sabha passed the Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Bill, 2016. This Bill was proposed by finance minister, Mr. Arun Jaitley to give legislative backing to Aadhaar, being implemented by the Unique Identification Authority of India (UIDAI).
Located in
Internet Governance
/
Blog
-
List of Recommendations on the Aadhaar Bill, 2016 - Letter Submitted to the Members of Parliament
-
by
Amber Sinha, Sumandro Chattapadhyay, Sunil Abraham, and Vanya Rakesh
—
published
Mar 16, 2016
—
last modified
Mar 21, 2016 08:50 AM
—
filed under:
UID,
Big Data,
Privacy,
Internet Governance,
Featured,
Digital India,
Aadhaar,
Biometrics,
Homepage
On Friday, March 11, the Lok Sabha passed the Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Bill, 2016. The Bill was introduced as a money bill and there was no public consultation to evaluate the provisions therein even though there are very serious ramifications for the Right to Privacy and the Right to Association and
Assembly. Based on these concerns, and numerous others, we submitted an initial list of recommendations to the Members of Parliaments to highlight the aspects of the Bill that require immediate attention.
Located in
Internet Governance
/
Blog
-
A scheme in India to help the poor raises privacy concerns
-
by
Prasad Krishna
—
published
Mar 17, 2016
—
filed under:
Aadhaar,
Internet Governance,
Privacy
India’s legislators are on Wednesday debating a law that would allow the government to collect biometric and demographic information from people in return for distributing to them government benefits and subsidies.
Located in
Internet Governance
/
News & Media
-
Vulnerabilities in the UIDAI Implementation Not Addressed by the Aadhaar Bill, 2016
-
by
Pooja Saxena and Amber Sinha
—
published
Mar 21, 2016
—
last modified
Mar 21, 2016 08:33 AM
—
filed under:
UID,
Big Data,
Privacy,
Internet Governance,
Infographic,
Digital India,
Aadhaar,
Biometrics
In this infographic, we document the various issues in the Aadhaar enrolment process implemented by the UIDAI, and highlight the vulnerabilities that the Aadhaar Bill, 2016 does not address. The infographic is based on Vidushi Marda’s article 'Data Flow in the Unique Identification Scheme of India,' and is designed by Pooja Saxena, with inputs from Amber Sinha.
Located in
Internet Governance
/
Blog
-
Aadhaar: Govt will not compromise on national security
-
by
Prasad Krishna
—
published
Mar 22, 2016
—
filed under:
Aadhaar,
Internet Governance,
Privacy
The government is confident that the Aadhaar Bill will be passed.
Located in
Internet Governance
/
News & Media
-
India Still Trying To Turn Optional Aadhaar Identification Number Into A Mandatory National Identity System
-
by
Prasad Krishna
—
published
Mar 22, 2016
—
last modified
Mar 24, 2016 06:34 AM
—
filed under:
Aadhaar,
Internet Governance,
Privacy
from the sliding-down-the-slippery-slope-to-disaster dept
Located in
Internet Governance
/
News & Media
-
Encryption policy would have affected emails, operating systems, WiFi
-
by
Prasad Krishna
—
published
Sep 25, 2015
—
filed under:
IT Act,
Internet Governance
Our email data would have to be stored. If we connect to a WiFi, that data would have to be stored, and that's plain ridiculous. There is a problem when the government tries to target citizens to ensure national security, said Pranesh Prakash, policy director at the Bangalore-based Centre for Internet and Society.
Located in
Internet Governance
/
News & Media
-
Open sesame
-
by
Prasad Krishna
—
published
Sep 25, 2015
—
filed under:
Internet Governance
The government’s email is shockingly vulnerable.
Located in
Internet Governance
/
News & Media
-
Govt presses 'undo' button on draft encryption policy
-
by
Prasad Krishna
—
published
Sep 25, 2015
—
filed under:
Internet Governance
The decision came a day before PM embarked on a visit to the US, where he is expected to meet leaders of firms such as Apple, Facebook, Google and Tesla.
Located in
Internet Governance
/
News & Media
-
Hits and Misses With the Draft Encryption Policy
-
by
Sunil Abraham
—
published
Sep 26, 2015
—
filed under:
Open Standards,
Internet Governance,
Surveillance,
FOSS,
B2B
Most encryption standards are open standards. They are developed by open participation in a publicly scrutable process by industry, academia and governments in standard setting organisations (SSOs) using the principles of “rough consensus” – sometimes established by the number of participants humming in unison – and “running code” – a working implementation of the standard. The open model of standards development is based on the Free and Open Source Software (FOSS) philosophy that “many eyes make all bugs shallow”.
Located in
Internet Governance
/
Blog