tag:blogger.com,1999:blog-313091002023-11-15T23:35:30.571-08:00The E-Identity RealmKEEPING UP WITH DIGITAL IDENTITY, INDIA AND MEUnknownnoreply@blogger.comBlogger51125tag:blogger.com,1999:blog-31309100.post-65570707377624807452011-02-03T09:42:00.001-08:002011-02-03T09:52:57.013-08:00REVISITING THE LEGAL REGULATION OF DIGITAL IDENTITY IN THE LIGHT OF GLOBAL IMPLEMENTATION AND LOCAL DIFFERENCE<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5lV-BMHjwjI7ihMARM4wr9sYEwRra320lWjxRIaKW5o5IJprrQEkFpeq3ESzf17OytzlLVBrSKtuj5okCGba1owVrpOJNMotH2El9olFfsaPwInZpqdgWxQe8XuJb3CrY4gI91A/s1600/rr.bmp"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 231px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5lV-BMHjwjI7ihMARM4wr9sYEwRra320lWjxRIaKW5o5IJprrQEkFpeq3ESzf17OytzlLVBrSKtuj5okCGba1owVrpOJNMotH2El9olFfsaPwInZpqdgWxQe8XuJb3CrY4gI91A/s320/rr.bmp" border="0" alt=""id="BLOGGER_PHOTO_ID_5569522520347878370" /></a>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-31309100.post-1910184365781217562010-04-07T09:20:00.000-07:002010-04-07T09:25:16.143-07:00Biometrisizing a Billion Odd<a href="http://timesofindia.indiatimes.com/india/Counting-a-billion-India-begins-new-census-/articleshow/5749740.cms">Work on the next Indian Census is reported to begin tomorrow</a>. The difference is that this census will facilitate the launch of the new Unique Id Scheme in India.Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-31309100.post-70618297430633917052010-02-19T20:00:00.000-08:002010-03-24T04:09:19.746-07:00THE REGULATORY FUTURE OF DIGITAL IDENTITY - WORKSHOP REPORT<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjhrDD7rXV-WDpqZo9QHfvT3Q9RDEQnF-ufcUemk6sI_GACPxVISczk6IQO_7VytqAn6goeB-xDt4dDJJcXFBYmenmk8Hw-b4VtDwUNklziq-v9qvjJwRRxEYKqsM5XploaicZ67A/s1600/workshop+pic.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 240px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjhrDD7rXV-WDpqZo9QHfvT3Q9RDEQnF-ufcUemk6sI_GACPxVISczk6IQO_7VytqAn6goeB-xDt4dDJJcXFBYmenmk8Hw-b4VtDwUNklziq-v9qvjJwRRxEYKqsM5XploaicZ67A/s320/workshop+pic.jpg" border="0" alt=""id="BLOGGER_PHOTO_ID_5452155759966916930" /></a><br /><br />The workshop opened with an Introduction by Rowena Rodrigues. The aims of the workshop were elaborated: first, to facilitate and broaden the understanding of the complexities and issues prevalent in the interplay between digital identity, its technologies, law and policy and second, to explore the regulatory future of digital identity with experts from the legal, technical and policy domains. Introductions followed. <br /><br />Session 1 (0945 -1050) was led by Mr Burkhard Schafer (Senior Lecturer in Computational Legal Theory School of Law, University of Edinburgh). The title of his talk was, “Deceptively Simple – Deception, Identity and Culture.” Schafer talked about the complex interactions between deception and identity, which are two sides of the same coin. That deception and identity have a strong connection with culture, is another point Schafer made. What is permissible in one culture in relation to identity and deception is not permissible in another. Schafer used British and Indian legendary examples to make his point – like that of Uther Pendragon, the father of King Arthur and the Blue Jackal respectively, both of which illustrate how identity and deception are used in interpersonal and social relationships, and the consequences of the use of identity and deception. The fact of deception largely depends on the observer’s perspective. The creative aspects of deception are evident in evolution and the natural world. In specific relation to digital identity, Schafer spoke about the law of agency and electronic agents and deceptive practices connected therewith. How and should deception be employed in electronic agency, should agents be taught how to lie, should there be a right to know the true identity of an entity (whether an entity is an agent or a robot) were some of the questions Schafer raised. <br /><br />In Session 2 (1100 -1145), Professor Lilian Edwards (Professor of Internet Law at Sheffield University), spoke about “Who am I, Avatar? Protecting Digital Identities Online and Offline.” This session was interspersed with identity examples from popular culture, mainly the media of cinema and television like Jake Scully and his avatar from the movie Avatar, and Dr Who. Edwards explained that there was a straddling of online and offline digital identities, and the merging of the essentialist and non-essentialist selves. Digital identity was more and more coming to be about digital presence. In addition to simultaneous digital identities, Edwards explained that there can be non-simultanoeus digital identities like that of Jake Scully and his Avatar in the movie ‘Avatar’ – such identities were those one transferred from and into and occupied, one at a time. She also laid stress on the immersive effects of digital identities. She also talked about how digital identities could be sequential in nature (using the example of in Dr Who of how the tenth doctor transforms into the eleventh doctor). This session also explored how law regulates digital identity through intellectual property law like trademarks, copyright and personality rights. Edwards felt these were largely ineffective in protecting a digital identity subject as they often did not give the identity subject many rights to their identity, rather mainly enabled intellectual property owners to protect their rights in their intellectual property. Edwards then ventured into privacy and reputation based protection of identity (libel), particularly in the light of the Firsht case [Applause Store Productions Ltd & Firsht v Raphael. Case Reference [2008] EWHC 1781 (QB)]. In regards the regulatory future of digital identity, Edwards queried whether future trends would show increasing support for single essentialist identities or multiple distributed identities.<br /><br />A refreshments break followed (1145 – 1200). <br /><br />Session 3 (1215 -1300) focussed on “Whether human rights law in the digital age needs an extra right to identity or would the privacy right do?” Professor Paul de Hert (Professor of Law at the Faculty of Law and Criminology of Vrije Universiteit Brussel), talked about the right to identity – a right he had proposed to deal with “the Internet of things.” De Hert favoured the creation of a new human right to identity, incorporating ipse and idem elements of identity, which he felt was a good instrument to stress governmental duties in relation to protecting individual identities. A new right to identity can complement the existing human rights apparatus and help balance the different stakeholder interests at stake. De Hert strongly opined that even though the conceptualisation of such a right was fraught with difficulties, identity was a high quality tool of making democracy work. <br /><br />Lunch ensued. <br /><br />Session 4 (1415-1530) was taken up by Mr Caspar Bowden (Chief Privacy Adviser for Microsoft in Europe, Middle-East and Africa). Bowden talked about “Privacy Engineering meets Law: The Case of U-Prove Minimum Disclosure Tokens, Data Protection and the ECHR.” Bowden talked about the technical aspects of identity - identity management. He introduced some traditional identity management technologies like public key infrastructure (PKI) before introducing the concept of anonymous credentials or minimum disclosure tokens, Caspar talked about Microsoft’s implementation of minimum disclosure tokens - U-Prove technology. Caspar opined that there is sufficient basis for the use of privacy enhancing technologies (PETS) like U-Prove in the European Convention of Human Rights. More vitally, he proposed a way forward in terms of the regulatory future of digital identity in terms of three specific measures – regulating data mining, regulating specific legal conditions under which persons can be recognised digitally without their consent and finally, building systems around subject access.<br /><br />Session 5 (1530-1630) was led by Professor Charles Raab (Professor Emeritus in the department of Politics and International Relations and Honorary Professorial Fellow School of Social and Political Science, University of Edinburgh). Raab’s talk, titled, “Privacy Principles for Identity Management: A Regulatory Solution,” delved into Scotland recently proposed policy solution to digital identity management in the public sector – the Privacy and Identity Management Principles. These principles, recently opened for consultation (now closed) are aimed at PSO’s (public sector organisations) in Scotland to guide them in privacy and identity management. These principles, Raab outlined would help do away with the problems of “tunnel vision of data security,” bring about greater data transparency, promote good data practices and help data grievance redressal. <br /><br />All sessions were interactive sessions with every session averaging 15 minutes of discussion time. Rowena Rodrigues summarised the day in the plenary session and called for future collaboration in terms of future activities and dissemination. The day ended with networking teas and coffees.Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-31309100.post-17612060044067319912010-01-15T08:45:00.000-08:002010-01-15T08:49:57.480-08:00THE REGULATORY FUTURE OF DIGITAL IDENTITYFriday, 19th February 2010, 9 am – 5 pm<br /><br />Venue: The University of Edinburgh, Dugald Stewart Building, Room G.07<br /><br />This is a one day workshop aimed at exploring the regulatory future of digital identity in the light of global differences in identity culture and law with experts from the legal, technical and policy domains.<br /><br />Digital identity (broadly referring to the digital representation of an entity) has attained great significance in the light of its social, economic and legal ramifications. The digital identity realm encompasses a wide range of problems (like identity fraud, deception), challenges (e.g. pervasiveness, invisibility or seamlessness of digital identity technologies) and issues (for instance, liberty, privacy, control of digital identities, trust).<br /><br />The regulation of digital identity is a complex phenomenon, given the contextual and ever changing nature of digital identity and the plurality of stakeholder interests. And an in-depth exploration of the field brings into focus how individualism centric the digital identity regulatory discourse is, evidenced by leading developments in the digital identity management and regulatory sectors, particularly in Europe and Canada. But digital identity is both an international and local creature that makes its play in different jurisdictions with different social and legal cultures. For instance, India is a phenomenal digital identity market in the process of implementing law that particularly impacts digital identity. But India does not have a social or legal culture of digital identity protection equivalent to the digitally advanced countries like for instance, the United Kingdom. <br /><br />In such cases, and to help other countries, in the same position as India, with different socio-legal orientations, the workshop will explore some possible regulatory solutions with the intent of determining the best way forward for the regulatory future of digital identity.<br /><br />Sponsored by: The University of Edinburgh Development Trust Small Projects Grants and SCRIPT.<br /><br />Please pre-register your attendance with Simone-Louise Hull:simone.hull@ed.ac.uk<br />For further details, contact Rowena Rodrigues:R.E.Rodrigues@sms.ed.ac.ukUnknownnoreply@blogger.com0tag:blogger.com,1999:blog-31309100.post-8650992889102074782009-10-31T07:57:00.000-07:002009-10-31T08:01:30.745-07:00Developments in Indian IT law<a href="http://www.mit.gov.in/default.ASPX?id=316">The Indian Information Technology( Certifying Authorities) Amendment Rules, 2009 009 are here.</a>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-31309100.post-27189641254353668932009-03-25T10:05:00.000-07:002009-03-25T10:15:44.107-07:00Snap, another database!Track, monitor and log <br />Social network and blog<br />All the world’s problems <br />Can be solved with a database <br /><br /> <br />Is a monitored society <br />A haven of propriety?<br />Perhaps, all the world’s problems <br />Can be solved with a database <br /><br /><br />So they log who one talks to <br />And they log what one may do <br />Because, all the world’s problems <br />Can be solved with a database <br /> <br /><br />So maybe the digital world<br />Is more virtual prison, less world <br />But then, all the world’s problems <br />Will be solved with a database<br /><br />(Or so they blissfully think)!<br /><br /><br />Read the <a href="http://www.jrrt.org.uk/uploads/database-state.pdf">Joseph Rowntree Report on the Database State (2009)</a> which delves into Britain's Database State and concludes that, "the public are neither served nor protected by the increasingly complex and intrusive holdings of personal information invading every aspect of our lives."Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-31309100.post-33455816112293501152009-03-23T13:55:00.000-07:002009-03-23T14:18:41.036-07:00Here's the dosh on the Indian IT Amendment Act 2008 Its been a long time coming. And when it did come we took such a long time to find it. But its here and a lot is being said about it.<br /><br />What we like:<br /><br />* insertion of provision on identity theft ( though I would have preferred the use of the word fraud)- S 66C<br /><br />* the pornography provision in S 67B <br /><br />And what is causing the pain: <br /><br />* <a href="http://www.expressbuzz.com/edition/story.aspx?Title=IT+Amendment+Act-2008+draws+flak&artid=F0QskTbUZew=">Reduction in the "quantum of punishment"</a> <br /><br />* the limited conceptualisation of privacy in S 66E relating to punishment for the violation of privacy <br /><br />* increase in computer user liability<br /><br />But, what intrigues me the most is S 67 C which relates to the preservation and retention of information by intermediaries. More on this soon.Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-31309100.post-7802180945848923882008-12-04T04:29:00.000-08:002008-12-04T04:49:11.979-08:00Article 8 ECHR comes good againThe verdict is out on the <a href="action=html&documentId=813409&portal=hbkm&source=externalbydocnumber&table=F69A27FD8FB86142BF01C1166DEA398649">Marper case</a>. The Marper case revolved around Articles 8 & 14 of the ECHR and the European Court of Human Rights was called upon to decide whether the retention of the applicants' DNA material was in breach of the right to respect for private life, and aggravated by the fact that the information was actively used in criminal investigations despite charges having been dropped and being acquitted post arrest.<br /><br />The European Court of Human Rights has criticised the "...blanket and indiscriminate nature of the power of retention in England and Wales" and found it to be "disproportionate interference with the applicants' right to respect for private life and could not be regarded as necessary in a democratic society.<br /><br />See <a href="http://news.bbc.co.uk/1/hi/uk/7764069.stm">BBC News Report</a><br /><br />What happens next is going to keep me on the edge of my seat. <a href="http://blogs.telegraph.co.uk/philip_johnston/blog/2008/12/04/will_the_government_now_take_dna_from_us_all">P Johnston tackles some probable results in the Telegraph.</a>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-31309100.post-58699653881598776162008-09-28T07:39:00.001-07:002008-09-28T07:41:04.072-07:00Sample some Indian kanoon!Great portal for Indian law, articles and else.<br /><br />Indian Kanoon - http://www.indiankanoon.com/Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-31309100.post-36489910919930635392008-08-08T08:29:00.000-07:002008-08-08T08:34:15.917-07:00One ingenious way of encouraging the use of identification.The <a href="http://timesofindia.indiatimes.com/Chennai/Indian_tourists_being_charged_dollars/articleshow/3330935.cms">Times of India reports about how Indian tourists visiting Indian monuments are being asked to pay the overseas entry rates </a>if they don't look the part. Or carry an identity card proving they are Indian citizens.<br /><br />Woe is us. I wonder whether I will get past!Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-31309100.post-16271093421986300362008-05-30T09:02:00.000-07:002008-05-30T09:05:13.927-07:00I am what I am. But am I free to be?So I am what I am.<br />And I am what I chose to be <br />But I am not that at all times.<br />or in all places.<br />Or for all people,<br />I am different, yet I am same.<br />There is growth and simultanoeus constancy.<br />But it's good as long as I am FREE to be.<br />But am I truly free?<br /><br />30 May 08. Musings.Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-31309100.post-42581355873128102232008-05-30T03:15:00.000-07:002008-06-05T03:20:19.563-07:00Cops, digital clues and cultural bias<a href="http://www.ibnlive.com/news/cops-look-for-clues-in-arushis-orkut-profile/66313-3.html">A news report by CNN-IBN raises the issue of whether the police force in India are actually competent enough to evaluate electronic evidence and its significance to a crime.</a> <br /><br />The report speculates that policing does not take into account new cultural tastes and behaviour (influenced by the global technological age) and goes so far as to make an allegation that the police may be weighing the evidence according to their personal moral values (read traditionally acquired). <br /><br />Take for instance, traditionally, Indian unmarried women (and even married women) did not and still do not (openly) maintain "relationships" with men they are not normally associated with in the course of their personal lives. What happens in the case where a girl has ten male friends seeking friendship or partners in her 'Friends List' in her social networking profile? Or has emails from random male members of the social networking community in her Inbox?<br /><br />Or what happens when the police discover in their course of their investigations that a suspect belong to a homosexual community? (Same sex relations are legally still a crime and punishable as an unnatural offence under Section 377 of the Indian Penal Code with imprisonment and a fine (<a href="http://timesofindia.indiatimes.com/India/Delhi_HC_to_take_up_PIL_on_gay_rights/articleshow/3054907.cms">though attempts are being made to get section 377 to be “read down” to exclude adult consensual sex from within its purview and though the Law Commission in 2001 recommended its repeal, backed by the Union ministry of family and child welfare in 2006</a>).<br /><br />It is a matter of “wait and watch,” to see how this will pan out.Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-31309100.post-88772809021705532452008-05-15T05:04:00.000-07:002008-05-15T05:07:15.633-07:00Why ID cards aren't the new "cool"Two reports show why simply having identity cards isn't the new "in".<br /><br />In the first, <a href="http://www.merinews.com/catFull.jsp?articleID=133934">identity cards were taken away (read appropriated) by goons ahead of Gram Panchayat Elections. </a><br /><br />In the second, <a href="http://www.greaterkashmir.com/full_story.asp?Date=15_5_2008&ItemID=55&cat=1">it led to pro-India activists being shot.</a><br /><br />There's loads more like this. <br /><br />But will the implementors listen?Unknownnoreply@blogger.com1tag:blogger.com,1999:blog-31309100.post-30961433395817885752008-05-08T04:20:00.000-07:002008-05-08T04:36:11.570-07:00So, what's it with us and databases ? Maybe the InfoCom needs to pre-vet databases.It is so disappointing that society has got to a point where every problem can be sorted with DATA in a DATABASE. Seems like if you have a problem, what you need is a database - whatever's happened to intelligence ?<br /><br />Ok. I'm peeved with <a href="http://news.bbc.co.uk/1/hi/magazine/7389547.stm">recent news that employers will share a database of workers which will be used for vetting prospective employees and companies like Harrods, Selfridges, Reed Managed Services and Mothercare are alleged to have signed up to the scheme. </a><br /><br />I won't even go into the nitty gritty.<br /><br />Of course, the "private" database will propose to comply with DP laws and practice. <br /><br />Who makes these stupid decisions about setting up databases? <br /><br />Perhaps the Information Commissioner can set up some procedure for PRE-VETTING prospective databases. Anyone who wants to sent up a database should apply to the InfoCommr and while I understand this would be a daunting task in terms of resources and convenience, it would serve to deter those bureaucrats that put our lives at risk of being compromised.Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-31309100.post-25621726703843743792008-04-14T06:39:00.000-07:002008-04-14T06:43:56.748-07:00Making the TURING point<a href="http://www.longbets.org/1">A very interesting link</a> via <a href="http://blog.onghome.com/">Random Thoughts on Digital Identity.</a><br /><br />It's game on Kurzweil v Kapor. And of course, we will all know for sure in 2029.Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-31309100.post-20300937625325052402008-04-10T08:59:00.000-07:002008-04-10T09:07:37.041-07:00Googling out the bad 'uns in BrazilThe <a href="http://ap.google.com/article/ALeqM5g4lwfrxzJ_mwXzrCxbPgO2weuExQD8VUM3PG0">Associated Press </a>reports that Google will take steps to "stop chid pornography and hate crimes" on Orkut. <br /><br />It is estimated that <a href="http://searchengineland.com/080410-094446.php">approx 90% of paedophilia complaints are prompted by material on Orkut</a> and a Brazilian <a href="http://afp.google.com/article/ALeqM5gU98JC3pwFFdUMNRnqQ_CNA7u25g">Senate Panel has ordered Google to permit it access to nearly 3000 profiles containing suspect material.</a>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-31309100.post-72250416570965245412008-03-14T05:21:00.000-07:002008-03-14T05:33:34.468-07:00Loss of ID cardsLosses of military cards to talk about now. <a href="http://www.channel4.com/news/articles/uk/mod+reveals+loss+of+11000+id+cards/1766147?intcmp=rss_news_itnnews">MOD figures in a Commons written answer reveal that 4,433 ID cards disappeared in 2006 and a further 6,812 went missing in 2007. </a>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-31309100.post-78933631231810801162008-03-06T03:31:00.000-08:002008-03-06T10:05:01.485-08:00Scientia est PotentiaScientia est potentia. Knowledge is power. We have made it so.<br /><br />We want to know. It is good to know, it is good to learn, and it is good if it helps us grow.<br /><br />Turn that around and read as Information is power. It is good for the state to know (all). It is good for the state to learn(all). And it is good if it helps the state to use it for the greater good.<br /><br />Its time for some constitutional re-thinking. And more thoughts on who will bell the cate if the need arises.<br /><br />Postscript: Just saw Kim's post on the Need-to Know Internet. <a href="http://www.identityblog.com/?p=934#more-934">More at his blog.</a>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-31309100.post-91339723516629315232008-02-15T04:40:00.000-08:002008-02-15T04:53:15.725-08:00Tell me all that you are, and there will be no sex offenders on SNS. Identity stakes go up another notch in NY<a href="http://www.out-law.com/page-8870">Outlaw reports that "sex offenders will be banned from using social networking sites under a law proposed in the US state of New York."</a> The law would, if enacted permit the release of offenders details to SNS operators in order to restrict them from using these sites. In this regard, the "offenders" would have to register all of their online identities, internet acounts and email id's with with the police as conditions of their probation or parole. The New York Senate passed the proposed law this week, and it remains to be debated by the Assembly.<br /><br />A step forward, but a bit over ambitious I think for the following reason: how would you register a uncreated identity? How will they deal with new identities? How will they prevent these people from stealing other people's identities or using them to their own benefit ? The identity stakes have gone up another notch in New YorkUnknownnoreply@blogger.com0tag:blogger.com,1999:blog-31309100.post-36296395520220094202008-02-13T07:20:00.000-08:002008-02-13T07:41:01.779-08:00Is a single digital identity good for me?Thought for the day:<br /><br />You have one key that opens all the (many) doors you need to access.<br /><br />This is very convenient for you, saves time and makes life so much more hassle free and easy to manage. It saves you the trouble of carrying aorund many keys or remembering where you put them all.<br /><br />This one key thus becomes a very valuable asset. But surely, this must be ok. Of course, it is. Provided you dilligently look after the key, and keep it safe. Or insure it.<br /><br />But, what if someone stole that key, and gained access to all your rooms, lockers and hideaways. Yes, you could change the locks and get another similar key.<br /><br />Then again, what if your key was compromised without your knowledge? And you were targetted on the basis of someone knowing something about you? Perhaps you may never wisen up to this, if you are not overly affected or then again something nasty might happen to you and your personal effects.Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-31309100.post-91061675476098529372008-02-11T04:17:00.000-08:002008-03-14T04:30:04.411-07:00Defining digital identityHere is something I have come up with in my quest for the definition of digital identity. This is only a working definition and all comments and suggestions are welcome.<br /><br />"Digital identity refers to any digital representation (whole or partial)<br /> of an entity,<br /> in tangible or abstract form,<br /> either self-created,<br /> externally assigned<br /> or consequentially generated."<br /><br />Watch this space.<br /><br />Links to this definition: http://citizenl.hors-sujet.com/?p=12Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-31309100.post-5754247228793908582008-02-08T02:39:00.000-08:002008-02-08T02:47:22.793-08:00My quest to find the perfect ( or rather holistic) "digital identity" definition is on.<br /><br />The question is is this possible? Or even advisable?<br /><br />I'm also very, very upset by the whale killing pictures I've seen. And I'm no vegetarian.Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-31309100.post-89635540007353027232008-02-06T03:51:00.001-08:002008-02-06T03:52:38.411-08:00The right to DI life and privacyCan the right to digital identity be read into the right to life and privacy? or need it be made a separate right altogether? I going to think long and hard about this one. So should you.Unknownnoreply@blogger.com1tag:blogger.com,1999:blog-31309100.post-12558189790330508252008-02-04T03:46:00.000-08:002008-02-04T05:00:23.000-08:00Catching up with newsA lot happened while I was busy in the real world. <a href="http://www.itnews.it/news/2008/0129140401300/google-ntt-and-the-us-gsa-deploy-saml-2-0-for-digital-identity-management.html">Google, NTT and the US GSA deployed SAML 2.0</a>. <a href="http://www.techshout.com/internet/2008/18/yahoo-rolls-out-openid-20-digital-identity-framework-service/">Yahoo rolled out OpenID 2.0 framework</a>. <a href="http://jurist.law.pitt.edu/paperchase/2008/01/eu-court-rules-identity-of-file-sharers.php">The ECJ ruled that the identity of file sharers was to be protected in civil suits.</a> Press reports like <a href="http://www.pressconnects.com/apps/pbcs.dll/article?AID=/20080203/NEWS02/802030357/1008/NEWS01">this</a> show how golden the biometric goose is. And in India, <a href="http://timesofindia.indiatimes.com/India/Not_citizens_its_the_state_that_needs_an_ID_card/articleshow/2688124.cms">the MNIC came under fire once again</a>.Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-31309100.post-18201762027299443792007-11-23T07:18:00.000-08:002007-11-26T07:43:39.377-08:00Helping men pursue women: another lesson learnt in e-governance<a href="http://news.bbc.co.uk/1/hi/world/south_asia/7103585.stm">BBC News reports </a>that a text messaging service launched in Madhya Pradesh was withdrawn after complaints that it was being used to gain contact details of women and harrass them !Unknownnoreply@blogger.com0