Centre for Internet & Society

2987 items matching your search terms.
Filter the results.
Item type



















New items since



Sort by relevance · date (newest first) · alphabetically
Blog Entry Protection of Privacy in Mobile Phone Apps
by Hitabhilash Mohanty and Edited by Leilah Elmokadem published Dec 15, 2016 — filed under: ,
The term “Fintech” refers to technology-based businesses that compete against, enable and/or collaborate with financial institutions. The year 2015 was a critical year for the Indian fintech industry, which saw the rise of numerous fintech start-ups, incubators and investments from the public and private sector.
Located in Internet Governance / Blog
Blog Entry ISIS and Recruitment using Social Media – Roundtable Report
by Vidushi Marda, Aditya Tejus, Megha Nambiar and Japreet Grewal published Dec 15, 2016 last modified Dec 16, 2016 02:19 AM — filed under: , , , , , ,
The Centre for Internet and Society in collaboration with the Takshashila Institution held a roundtable discussion on “ISIS and Recruitment using Social Media” on 1 September 2016 from 5.00 p.m. to 7.30 p.m. at TERI in Bengaluru.
Located in Internet Governance / Blog
Blog Entry Deep Packet Inspection: How it Works and its Impact on Privacy
by Amber Sinha published Dec 16, 2016 — filed under: ,
In the last few years, there has been extensive debate and discussion around network neutrality in India. The online campaign in favor of Network Neutrality was led by Savetheinternet.in in India. The campaign was a spectacular success and facilitated sending over a million emails supporting the cause of network neutrality, eventually leading to ban on differential pricing. Following in the footsteps of the Shreya Singhal judgement, the fact that the issue of net neutrality has managed to attract wide public attention is an encouraging sign for a free and open Internet in India. Since the debate has been focused largely on zero rating, other kinds of network practices impacting network neutrality have yet to be comprehensively explored in the Indian context, nor their impact on other values. In this article, the author focuses on network management, in general, and deep packet inspection, in particular and how it impacts the privacy of users.
Located in Internet Governance / Blog
Blog Entry Inputs to the Working Group on Enhanced Cooperation on Public Policy Issues Pertaining to the Internet (WGEC)
by Sunil Abraham and Vidushi Marda, with inputs from Pranesh Prakash published Dec 17, 2016 last modified Dec 17, 2016 12:20 AM — filed under:
The Centre for Internet & Society (CIS) submitted inputs to the Working Group on Enhanced Cooperation on Public Policy Issues Pertaining to the Internet (WGEC) on 15 December 2016. The WGEC sought inputs on two questions that will guide the next meeting of the Working Group which is scheduled to take place on the 26-27 January 2017.
Located in Internet Governance / Blog
Multistakeholder Consultation on Encryption
by Prasad Krishna published Dec 17, 2016 — filed under: , ,
The Centre for Internet & Society (CIS) in collaboration with ORF and Takshashila Institution is organizing a Multi-Stakeholder Consultation on Encryption on December 17, 2016 at TERI in Bengaluru.
Located in Internet Governance / Events
How private companies are using Aadhaar to try to deliver better services (but there's a catch)
by Prasad Krishna published Dec 23, 2016 last modified Dec 23, 2016 02:04 AM — filed under: , ,
They are gathering more information on you.
Located in Internet Governance / News & Media
Workshop on Center for IT and Society
by Prasad Krishna published Dec 23, 2016 — filed under:
This workshop was held at IIT, Delhi on December 20, 2016. Amber Sinha attended the workshop. The meeting focused on the curriculum and the way forward, especially with respect to the industry requirements.
Located in Internet Governance / News & Media
Blog Entry Incident Response Requirements in Indian Law
by Vipul Kharbanda published Dec 28, 2016 last modified Dec 28, 2016 01:19 AM — filed under: , ,
Cyber incidents have serious consequences for societies, nations, and those who are victimised by them. The theft, exploitation, exposure or otherwise damage of private, financial, or other sensitive personal or commercial data and cyber attacks that damage computer systems are capable of causing lasting harm.
Located in Internet Governance / Blog
Discussion on Ranking Digital Rights in India (Delhi, January 07)
by Amber Sinha published Dec 29, 2016 last modified Dec 29, 2016 07:07 AM — filed under: , , , ,
Towards developing an understanding of how Indian ICT companies are recognising and upholding digital rights of their users, and to raise public awareness about the same, the Center for Internet and Society (CIS), with the support of Privacy International, has studied 8 Indian ICT companies, using the same methodology as the 2015 Corporate Accountability Index, to gain greater insight into company practices and initiate public dialogues. Please join us on Saturday, January 07, at the India Islamic Cultural Centre, New Delhi, for a presentation of our findings followed by an open structured discussion on the methodology and implications of the study.
Located in Internet Governance / Events
Blog Entry Mapping of Sections in India’s MLAT Agreements
by Leilah Elmokadem and Saumyaa Naidu published Dec 31, 2016 — filed under: , , , , ,
This set of infographics by Leilah Elmokadem and Saumyaa Naidu maps out and compares the various sections that exist in the 39 MLATs (mutual legal assistance treaty) between India and other countries. An MLAT is an agreement between two or more countries, drafted for the purpose of gathering and exchanging information in an effort to enforce public or criminal laws.
Located in Internet Governance / Blog