Posts
International Principles on the Application of Human Rights to Communications Surveillance
- July 31, 2013
Report on the 5th Privacy Round Table meeting
- July 24, 2013
This report entails an overview of the discussions and recommendations of the fifth Privacy Round Table in Calcutta, on 13th July 2013.
Read more →CIS Cybersecurity Series (Part 8) - Jeff Moss
- July 23, 2013
CIS interviews Jeff Moss, Chief Security Officer for ICANN, as part of the Cybersecurity Series.
Read more →You Have the Right to Remain Silent
- July 22, 2013
Reflecting upon the state of freedom of speech and expression in India, in the wake of the shut-down of the political satire website narendramodiplans.com.
Read more →Parsing the Cyber Security Policy
- July 22, 2013
An effective cyber-security policy must keep up with the rapid evolution of technology, and must never become obsolete. The standard-setting and review bodies will therefore need to be very nimble, says Chinmayi Arun.
Read more →CII Conference on "ACT": Achieve Cyber Security Together"
- July 22, 2013
The Confederation of Indian Industries (CII) organized a conference on facing cyber threats and challenges at Hotel Hilton in Chennai on July 13, 2013. Kovey Coles attended this conference and shares a summary of the event in this blog post.
Read more →Interview with Mr. Reijo Aarnio - Finnish Data Protection Ombudsman
- July 19, 2013
Maria Xynou recently interviewed Mr. Reijo Aarnio, the Finnish Data Protection Ombudsman, at the CIS' 5th Privacy Round Table. View this interview and gain an insight on recommendations for better data protection in India!
Read more →DSCI Best Practices Meet 2013
- July 19, 2013
The DSCI Best Practices Meet 2013 was organized on July 12, 2013 at Hyatt Regency, Anna Salai in Chennai. Kovey Coles attended the meet and shares a summary of the happenings in this blog post.
Read more →CIS Cybersecurity Series (Part 7) - Jochem de Groot
- July 18, 2013
CIS interviews Jochem de Groot, former policy advisor to the Netherlands government, as part of the Cybersecurity Series
Read more →