While the HTTPS version of the website remains unblocked, it is currently not known why the blocking order was passed.
The other parties in the fray include Amazon and Netflix, but talks are in very early stages, said an anonymous source familiar with the matter.
The Registrar General has directed all states and Union Territories to ensure compliance by the registration authorities concerned and send a confirmation on or before September 1.
The committee, headed by former Supreme Court judge B N Srikrishna, will also suggest a draft data protection bill.
The best approach to solve the turf war is to have mandatory consultation between the regulators, which can be achieved by revisiting the legal framework.
While the FCC and TRAI chairmen may share similar goals, India’s telecom regulator should pick and choose what it wants to take away from the US debate.
Not only do difficult questions need to be answered and competing interests be weighed, but consequent policy also needs to be made to ensure a balanced state of affairs.
The Pradhan Mantri Gramin Digital Saksharta Abhiyan, the 20-hour ‘free’ Aadhar-linked digital literacy certification course, has strict identification monitoring but fails on course delivery.
What are the possible ways in which privacy in a setup like Aadhar may be breached?
Finance Minister Arun Jaitley said that these two reforms combined will “certainly lead to greater compliance, greater digitisation,” adding that “expansion of the tax base of direct and indirect taxes is already visible.”
The companies include Bharti Airtel, Vodafone India, Idea Cellular, Reliance Communications and Aircel.
There are approximately 50 crore feature phone users in India. According to analysts, Reliance could snap up anywhere between 10% to 20% of this market.
Reliance Industries launched on Friday a “zero-cost” phone with 4G-enabled features in a move aimed at further disrupting the country’s highly competitive telecoms sector.
If the nine-judge bench decides that privacy is a fundamental right, the issue will be thrown back to the five-judge bench who will decide the contours of this right and consequently rule on the validity of Aadhaar.
The attack comes at a time of heightened focus on cyber security after global businesses were recently hit by two infections containing ransomware requests.
Reliance Jio has so far denied all media reports and user accounts of a data leak.
The local police official, who asked not to be named, said a man named Imran Chhimpa had been detained early Tuesday evening in connection with the investigation
Industry observers say that the big winner could be Reliance Jio, which is looking to accumulate and directly control a large chunk of spectrum.
A cyber partnership can be critical for India to meet its immediate goals in securing its cyber infrastructure and expanding opportunities for the country’s tech sector.
On Sunday evening, a website called “magicapk.com” surfaced that reportedly contained the personal data of millions of Reliance Jio users.
From 1970 to 2017, decisions by the government’s mapping agency have resulted in it not only missing the geospatial bus, but also the tonga and bullock cart.
While it may have boosted certain modes of digital transactions, these are still just a drop in the bucket when compared to ground realities and the larger sea of retail payments.
Existing bank account holders have been asked to furnish the Aadhaar number issued by UIDAI by December 31, 2017, failing which the account will cease to be operational.
Even though the provisions on information security and privacy in India’s 2011 IT rules are rudimentary, they are, more often than not, callously ignored.
Two hundred and twenty Indian languages have died in the last 50 years. With minimal and ineffective government efforts, what can we do to save our languages?
According to a report in Recode, Uber executive Eric Alexander took the records back to the US, where CEO Travis Kalanick and other officials doubted the veracity of the incident.
The company has two deals in the pipeline which are projected to reduce its debt by 60%.
While the Odia Wikipedia community has made great strides, translating it to a digital language of knowledge will require solving technical challenges and enlisting a more diverse set of contributors and editors.
The father of the bride. The religious objector. The overseas citizen. The laadlis. The third gender. The bride and groom. Six profiles of people who have fallen through the cracks of the great Aadhaar net.
India has drastically changed its stance on post-fixation rights in the ongoing negotiations for the international Broadcasters Treaty.
It’s time to acknowledge that technology by itself is not empowering; it must be inter-linked with broader policy interventions across social sectors.
While Nandan Nilekani praised Sharma for his apology, others thought it was far from enough after he had abused those raising serious concerns about Aadhaar.
The India Exclusion Report 2016 provides a bleak picture of the government’s schemes and programmes that are meant to make basic amenities and rights available to everyone.
Though the devastating WannaCry ransomware attack was a failure on the NSA’s part, current UN cyber norms are far too weak to hold any international actor – let alone the US – responsible.
Internet Freedom Foundation’s Kiran Jonnalagadda has alleged that ISPIRT and its co-founder Sharad Sharma set up fake Twitter profiles to harass, intimidate Aadhaar critics.
Company says that no payment or credit card data has been stolen or leaked.
Only 60% of India’s top 500 websites support HTTPs in some form or another, which means that Indian website operators provide a lesser level of online security than those from the US.
The underground market for software vulnerabilities has been growing steadily since the 1990s, so the latest WannaCry could be a sign of things to come.
The story of Aadhaar is one of coercion, rampant illegality and outrageous contempt of court orders through which the project has built its database.
Some code in an earlier version of the WannaCry software had also appeared in programmes used by the Lazarus Group, which researchers from many companies have identified as a North Korea-run hacking operation.