-
Ask Vishy, the personal AI-assistant of Naavi for all your information on Naavi.org
Naavi

IICA Qualified Independent Director

-

-
DGPIN: 4PJ-7T8-FK8P: 12.94018310,77.55421020
-
Plus Code : WHR3+3P
Bing_site_search
Google_site_search
-
Recent Posts
Archives
Archives by Date
-
-
Author Archives: Vijayashankar Na
Starting the journey to the Neuro Rights Law and Technology
India entered the era of Cyber Laws in 2000 with ITA 2000 and made a soft entry to data protection law in 2009 with the notification of ITA 2008 and likely to enter the field of Data Protection law in … Continue reading
Posted in Cyber Law
Leave a comment
The Age of Neuro Rights Dawns in India
India entered the domain of Cyber Laws on 17th October 2000 with the notification of the Information Technology act 2000 (ITA 2000). Several amendments were passed on this act in 2008 effective from 27th October 2009. These amendments gave a … Continue reading
Posted in Cyber Law
Leave a comment
Shadow DPAI required for CERT-IN
The JPC for PDPB decided to include parts of Non Personal Data regulation within the provisions of the DPA 2021. In the process a situation of overlapping jurisdiction was created between the ITA 2000 and DPA 2021. Earlier with Section … Continue reading
Posted in Cyber Law
Leave a comment
DPA 2021-compliance View
Madras Management Association and FDPPI successfully conducted a one day symposium on DPA 2021-Compliance View, at Chennai, on 23rd April 2021 at the MMA auditorium. A large contingent of participants from ISACA and CySi who partnered the event made the … Continue reading
Posted in Cyber Law
Leave a comment
CERT-In Re-issues its order of 4th January 2017
On 4th January 2017, CERT IN had issued an order regarding reporting of incidents to CERT IN. The order has now been re-issued along with detailed instructions on other security measures which will be applicable to all service providers, intermediaries, … Continue reading
Posted in Cyber Law
Leave a comment
Content Disarming and Reconstruction (CDR) technology for Security
It is well recognized that behind many of the successful ransomware attacks in an organization, there is a simple security failure of an employee clicking an e-mail attachment containing a malicious code. Prevention of E Mail based attacks is therefore … Continue reading
Posted in Cyber Law
Leave a comment



