Author Archives: 98410spice

Is Data Governance a subset of Data Protection or is it the Vice Versa?

So far discussions on Data Governance was restricted to the Big Data players. The Data Security professionals were more focussed on “Data Security” and everything else took a secondary place. In organizations pursuing GDPR compliance, the DPOs became key senior … Continue reading

Posted in Cyber Law | Leave a comment

Additive Value hypothesis of ownership of data

Out of the three hypotheses which we took up for discussion in constituting the Naavi’s Theory of Data, we have so far discussed the “Definition hypothesis” and “Reversible life cycle hypothesis”. We shall now take up the third hypothesis through … Continue reading

Posted in Cyber Law | 1 Comment

Reversible Life Cycle hypothesis of the Theory of Data

This is in continuation of our discussion on the Theory of Data to explain “What Data is” for different communities like the technologists, lawyers and business manager. In this direction we have stated that there are three hypotheses that we … Continue reading

Posted in Cyber Law | Leave a comment

Theory of Data and Definition Hypothesis

Out of the three  main Challenges that we are trying to address in this Theory of Data, the first and most fundamental challenge is a proper definition of a “Data”, which is acceptable to the Technology persons, the Legal Persons … Continue reading

Posted in Cyber Law | Leave a comment

New Data Theory of Naavi built on three hypotheses

In searching a proper expression and articulation of the Theory of Data, Naavi has decided to adopt a set of three hypotheses which are the pillars of this New Theory of Data. The three hypotheses are a) A hypothesis that … Continue reading

Posted in Cyber Law | Leave a comment

Six amendments proposed to California Consumer Privacy Act

The California Consumer Privacy Act (CCPA) which is applicable to the collection and processing of the personal data of Californian residents is set to become effective from 1st January 2020. CCPA has already distinguished itself by its honest approach to … Continue reading

Posted in Cyber Law | Leave a comment