Search Results for: privacy

The Second Awakening… What is there in Rules of Oct 27, 2009 on Section 69?

[This is in continuation of the previous article on the subject] (P.S: These discussions are called the “Second Awakening” because though ITA 2000 came into existence on 17th October 2000, the stake holders and more particularly the IT industry never … Continue reading

Posted in Cyber Law | Tagged , , | 1 Comment

The Second Awakening… What is Section 69?

[This is a continuation of the earlier articles on the subject] Section 69 along with 69A and 69B was introduced in ITA 2000 with the amendments passed in December 2008 by the then UPA Government. Though the passage was without … Continue reading

Posted in Cyber Law | Tagged , , , | 1 Comment

Snooping and Section 69 of ITA 2000: Beyond Politics, Distrust and Passion..The second awakening

[This is a continuation of the previous article] Yesterday was a day when ignorance and politics took over the debate on the new MHA guidelines under Section 69 of ITA 2000. As expected, the Congress politicians opened the debate in … Continue reading

Posted in Cyber Law | Tagged , | 1 Comment

Agencies empowered under Sec 69. No Need to raise a false alarm

 The uninformed media is at work since morning commenting on the MHA Order notifying additional agencies empowering use of powers under Section 69 of ITA 2000/8. Refer notification here: According to the notification, 10 agencies such as the IB, ED, … Continue reading

Posted in Cyber Law | Tagged , , | 1 Comment

The 18 year Journey Since the Digital Society was born in India

Information Technology Act 2000 (ITA 2000) was notified on 17th October 2000 and today is the 18th year after India legally recognized the Electronic Document as equivalent to Paper Document and Digital Signature as equivalent to physical signature leading to … Continue reading

Posted in Cyber Law | 1 Comment

Let Data Protection Law of India define the Instrument creating a Data Fiduciary

The Draft of Personal Data Protection Act 2018 (PDPA 2018) which is being discussed in the Parliament has one extremely important hurdle to be crossed. The hurdle is how to establish a relationship between the Data Principal and the Data … Continue reading

Posted in Cyber Law | Tagged , , | 1 Comment