Monthly Archives: April 2018

Bitcoin Theft… A challenge to Law Enforcement…Case should be transferred to CBI

We all know that Bitcoin is the popular currency of the criminals. The fact that some honest persons are gullible enough to believe that it is a “Currency” does not create a case for sympathizing with people who might have … Continue reading

Posted in Cyber Law | Tagged , , , , , , | Leave a comment

A Trap is laid for Gullible Bitcoin Investors

Just lat week, RBI declared: “ it has been decided that, with immediate effect, entities regulated by RBI shall not deal with or provide services to any individual or business entities dealing with or settling VCs. Regulated entities which already provide … Continue reading

Posted in Cyber Law | Tagged , , | Leave a comment

State Bank of India ready for a major scam

I have been informed by some customers of State Bank of India, particularly in the Srinagar Branch of Bangalore that the Bank is asking for e-mail ID from its customers who want to file 15G certificate. It is said that … Continue reading

Posted in Cyber Law | Tagged , , | Leave a comment

Bitcoin gets the Boot

Naavi.org has been consistently voicing its demand that Bitcoins should be banned in India and instead RBI should consider floating a crypto currency regulated by RBI. At last RBI seems to have taken one decisive step which has been interpreted … Continue reading

Posted in Cyber Law | Tagged , | Leave a comment

Supreme Court cannot ignore the Virtual ID development regarding Aadhaar

Supreme Court has now come to the end of hearing the PIL on the Aadhaar. Whatever be the actual petition it is clear that the opposition to Aadhaar stems mainly from the Black Money holders and Benami property holders who … Continue reading

Posted in Cyber Law | Tagged , | 1 Comment

Data Portability under GDPR… Is it Your Data to be ported or My Data?

Data Portability is one of the contentious issues of the GDPR from the compliance angle. We had discussed the “Theory of Dynamic Personal Data” in one of our previous articles. That concept would be relevant to address the issue of … Continue reading

Posted in Cyber Law | Tagged , | Leave a comment