Who Needs Consent Anyway? The JPC’s Suggestions Worryingly Expand the Scope of Processing Non-Consensual...
With the Parliamentary Committee's draft Data Protection Bill (DPB), not only can individuals' data be used without their consent (non-consensual), but data that the...
To What Extent Does India’s Surveillance Regime Affect Citizen’s Privacy?
Attacks like 9/11 and 26/11 shock the conscience of our societies and states—it is in the background of such attacks, that governments tend to...
#Dialogues: Mapping Cyber Security in India with Pukhraj Singh
Interviewed by Bharath Pottekkat
Edited by Malavika VN
If the recent revelation that China is collecting huge amounts of data on Indian individuals is anything to...
Time For A Change: Does India Need Another Time Zone?
Does it make sense for India to adopt two time zones? How much would this affect the lives of citizens, especially in Northeast India?
Virtual Battlegrounds: Where “Digital Athletes” are Making a Strong Case for Themselves
Written by Kartik Sundar
When ESPN first broadcasted “The International” in 2014, they were met with waves of criticism from their base audience. For the...
Is the National Digital Health Mission an Effective Treatment for India’s Health System?
This article is the first of a two-part series on the National Digital Health Mission, and the best practices required to scale digital health...
Customers Are Central to the Gig Economy. Will We Use Our Voice to Fight...
It is all-too-convenient to ignore the fact that the little brightly-coloured delivery executive icon riding through the map on our mobile screens is actually a human being who deserves respectable working conditions, at the very least.
Protecting Our Children on Social Media: The Personal Data Protection Bill Needs to Reconsider...
India’s legal approach to protecting children’s data online could have impact children’s privacy and security, and progressive data legislation as well.
Tracing Traceability: Why Weakening Encryption Threatens Privacy and Free Speech
Weakening encryption technology has serious implications on privacy and security. What are the workarounds to breaking end-to-end encryption?
#JustTech: Let’s Co-Create Technology to Build Legal Solutions For Vulnerable Communities
How can collaborative legal technology building improve solutions for vulnerable communities?