-
Section 43 of the Information Technology Act
-
by
Pranesh Prakash
—
published
Jun 07, 2013
—
last modified
Jun 07, 2013 10:37 AM
—
filed under:
IT Act,
Internet Governance
Given below is the text of section 43 of the IT Act:
Located in
Internet Governance
/
Resources
-
Computer Related Offences
-
by
Pranesh Prakash
—
published
Jun 07, 2013
—
filed under:
IT Act,
Internet Governance
If any person, dishonestly or fraudulently, does any act referred to in section 43, he shall be punishable with imprisonment for a term which may extend to three years or with fine which may extend to five lakh rupees or with both.
Located in
Internet Governance
/
Resources
-
John Doe order in Viacom 18 Motion Pictures v. Jyoti Cable Network and Ors.(movie Bloody Money)
-
by
Jai Anand
—
published
May 26, 2012
—
filed under:
Internet Governance
This is the case filed by Viacom 18 Motion Pictures, producer of movie 'Blood Money' against Jyoti Cable Network and other unknown cable operators restraining them from infringing their copyrights and the Court granted an interim injunction called 'john doe' order under Order 39 Rule 1 and Rule 3 of CPC, 1908.
Located in
Internet Governance
/
Resources
-
Inventions that will make a difference
-
by
Prasad Krishna
—
published
Jan 02, 2014
—
last modified
Feb 12, 2014 11:07 AM
—
filed under:
Internet Governance,
Privacy
In an increasingly tech-driven world, what does 2014 have to offer? Geeta Padmanabhan turns the spotlight on some life-changing gadgets.
Located in
News & Media
-
The Internet Way
-
by
Nishant Shah
—
published
Feb 14, 2014
—
filed under:
Internet Governance
Dr. Nishant Shah's review of the book “The Everything Store: Jeff Bezos and the Age of Amazon” by Bantam Press/Random House Group, London was published in Biblio Vol. 19 No.8 (1&2), January – February 2014.
Located in
Internet Governance
/
Blog
-
Counter Surveillance Panel: DiscoTech & Hackathon
-
by
Prasad Krishna
—
published
Feb 24, 2014
—
last modified
Feb 28, 2014 05:36 AM
—
filed under:
Surveillance,
Event,
Internet Governance,
Privacy
We invite you to a Counter Surveillance DiscoTech and Hackathon at the Centre for Internet and Society in Bangalore on Saturday, March 1, 2014 (9.00 a.m. to 5.00 p.m.). The event is being co-organized by the Centre for Internet and Society in tandem with the MIT Centre for Civic Media Co-Design Lab, with support from members of Tactical Technology Collective, Hackteria.org and Srishti School of Art Design and Technology. Registrations begin at 9.00 a.m. The event shall close with a featured talk by renown information activist and maker lab innovator Smari McCarthy, titled "Privacy for Humanity" at 5.00 p.m.
Located in
Events
-
Calcutta High Court Strengthens Whistle Blower Protection
-
by
Divij Joshi
—
published
Feb 24, 2014
—
filed under:
Internet Governance,
Privacy
Calcutta High Court has ordered for protection of whistle blower's privacy in its November 20, 2013 order. The court has directed the government to accept RTI applications without the applicant's personal details.
Located in
Internet Governance
/
Blog
-
Spreadsheet data on sample of 50 security companies
-
by
Maria Xynou
—
published
Feb 28, 2014
—
filed under:
Internet Governance,
Surveillance
Located in
Internet Governance
/
Blog
-
An Urgent Need for the Right to Privacy
-
by
Sumandro Chattapadhyay
—
published
Mar 16, 2016
—
last modified
Mar 17, 2016 07:40 AM
—
filed under:
UID,
Big Data,
Privacy,
Internet Governance,
Digital India,
Aadhaar,
Biometrics
Along with a group of individuals and organisations from academia and civil society, we have drafted and are signatories to an open letter addressed to the Union government and urging the same to "urgently take steps to uphold the constitutional basis to the right to privacy and fulfil it’s constitutional and international obligations." Here we publish the text of the open letter. Please follow the link below to support it by joining the signatories.
Located in
Internet Governance
/
Blog
-
Press Release, March 15, 2016: The New Bill Makes Aadhaar Compulsory!
-
by
Amber Sinha
—
published
Mar 16, 2016
—
filed under:
UID,
Big Data,
Privacy,
Internet Governance,
Digital India,
Aadhaar,
Biometrics
We published and circulated the following press release on March 15, 2016, to highlight the fact that the Section 7 of the Aadhaar Bill, 2016 states that authentication of the person using her/his Aadhaar number can be made mandatory for the
purpose of disbursement of government subsidies, benefits, and services; and in case the person does not have an Aadhaar number, s/he will have to apply for Aadhaar enrolment.
Located in
Internet Governance
/
Blog