Monthly Archives: May 2013

Competitive Compliance is the need of the hour.. Naavi

Speaking at the workshop on Safe E Banking, Naavi highlighted the regulatory aspects of Information Security in E Banking and the need for compliance. Speaking on the Risk mitigation guidelines released by RBI on February 28, 2013 and the fast … Continue reading

Posted in Bank, Information Assurance, RBI | Leave a comment

Security Protocol for Bankers

E Mudhra consumer Services, a company associated with the certifying authority, E Mudhra, has announced launch of what it calls as an online banking security protocol. The product named “TRUSTFACTOR” is a combination of an authentication server solution, digital signature certificates, … Continue reading

Posted in Cyber Law | Leave a comment

Cyber Warriors under production-

In recent days the media has highlighted some statements from the Central Government about the need of 5 lakh Cyber Security professionals in India. In order to address the skill gaps in Cyber Security professionals  that India may require in the … Continue reading

Posted in Cyber Law | Leave a comment

National Law School to launch Cyber Law and Cyber Security Course

National Law School University of India (NLSUI), Bangalore the premier law education center in the country  is launching a distance learning course on Cyber Law and Cyber Security from the next quarter. Admissions are now open. However the admissions may … Continue reading

Posted in Cyber Crime, Cyber Law | 15 Comments

Aadhar Nightmare continues

Ever since the Aadhar scheme was introduced, security specialists have been warning about the large scale problems that may be caused by loss of identity of individuals. The UIDAI authroities have been going ahead with spending of public money and … Continue reading

Posted in Cyber Law | Leave a comment

mouthshut.com challenges ITA 2008 rules

The Intermediary rules under Section 79 of ITA 2008 has been repeatedly used by parties to get adverse content on internet removed without appropriate procedures. The problem has been the interpretation that an Intermediary is bound to take down content … Continue reading

Posted in Cyber Law, ITA 2008 | Leave a comment