Centre for Internet & Society

2987 items matching your search terms.
Filter the results.
Item type



















New items since



Sort by relevance · date (newest first) · alphabetically
Section 43 of the Information Technology Act
by Pranesh Prakash published Jun 07, 2013 last modified Jun 07, 2013 10:37 AM — filed under: ,
Given below is the text of section 43 of the IT Act:
Located in Internet Governance / Resources
Computer Related Offences
by Pranesh Prakash published Jun 07, 2013 — filed under: ,
If any person, dishonestly or fraudulently, does any act referred to in section 43, he shall be punishable with imprisonment for a term which may extend to three years or with fine which may extend to five lakh rupees or with both.
Located in Internet Governance / Resources
John Doe order in Viacom 18 Motion Pictures v. Jyoti Cable Network and Ors.(movie Bloody Money)
by Jai Anand published May 26, 2012 — filed under:
This is the case filed by Viacom 18 Motion Pictures, producer of movie 'Blood Money' against Jyoti Cable Network and other unknown cable operators restraining them from infringing their copyrights and the Court granted an interim injunction called 'john doe' order under Order 39 Rule 1 and Rule 3 of CPC, 1908.
Located in Internet Governance / Resources
Inventions that will make a difference
by Prasad Krishna published Jan 02, 2014 last modified Feb 12, 2014 11:07 AM — filed under: ,
In an increasingly tech-driven world, what does 2014 have to offer? Geeta Padmanabhan turns the spotlight on some life-changing gadgets.
Located in News & Media
Blog Entry The Internet Way
by Nishant Shah published Feb 14, 2014 — filed under:
Dr. Nishant Shah's review of the book “The Everything Store: Jeff Bezos and the Age of Amazon” by Bantam Press/Random House Group, London was published in Biblio Vol. 19 No.8 (1&2), January – February 2014.
Located in Internet Governance / Blog
Counter Surveillance Panel: DiscoTech & Hackathon
by Prasad Krishna published Feb 24, 2014 last modified Feb 28, 2014 05:36 AM — filed under: , , ,
We invite you to a Counter Surveillance DiscoTech and Hackathon at the Centre for Internet and Society in Bangalore on Saturday, March 1, 2014 (9.00 a.m. to 5.00 p.m.). The event is being co-organized by the Centre for Internet and Society in tandem with the MIT Centre for Civic Media Co-Design Lab, with support from members of Tactical Technology Collective, Hackteria.org and Srishti School of Art Design and Technology. Registrations begin at 9.00 a.m. The event shall close with a featured talk by renown information activist and maker lab innovator Smari McCarthy, titled "Privacy for Humanity" at 5.00 p.m.
Located in Events
Blog Entry Calcutta High Court Strengthens Whistle Blower Protection
by Divij Joshi published Feb 24, 2014 — filed under: ,
Calcutta High Court has ordered for protection of whistle blower's privacy in its November 20, 2013 order. The court has directed the government to accept RTI applications without the applicant's personal details.
Located in Internet Governance / Blog
File Spreadsheet data on sample of 50 security companies
by Maria Xynou published Feb 28, 2014 — filed under: ,
Located in Internet Governance / Blog
Blog Entry An Urgent Need for the Right to Privacy
by Sumandro Chattapadhyay published Mar 16, 2016 last modified Mar 17, 2016 07:40 AM — filed under: , , , , , ,
Along with a group of individuals and organisations from academia and civil society, we have drafted and are signatories to an open letter addressed to the Union government and urging the same to "urgently take steps to uphold the constitutional basis to the right to privacy and fulfil it’s constitutional and international obligations." Here we publish the text of the open letter. Please follow the link below to support it by joining the signatories.
Located in Internet Governance / Blog
Blog Entry Press Release, March 15, 2016: The New Bill Makes Aadhaar Compulsory!
by Amber Sinha published Mar 16, 2016 — filed under: , , , , , ,
We published and circulated the following press release on March 15, 2016, to highlight the fact that the Section 7 of the Aadhaar Bill, 2016 states that authentication of the person using her/his Aadhaar number can be made mandatory for the purpose of disbursement of government subsidies, benefits, and services; and in case the person does not have an Aadhaar number, s/he will have to apply for Aadhaar enrolment.
Located in Internet Governance / Blog