Search Results for: privacy

Personal Data Protection and Data Localization-2

[This is a continuation of the earlier article] Having debated the need to “Restrict” the operation of the word “Indirectly identify” in the definition of “Personal Data”, we can now look at Section 40 once again. We know that PDPA … Continue reading

Posted in Cyber Law | Tagged | 2 Comments

Srikrishna Panel report and Aadhaar

Throughout the one year when the Justice Srikrishna Committee was deliberating on the Privacy Legislation in India, Aadhaar was the focus of the privacy activists. There was one group of people who were completely against Aadhaar and have been trying … Continue reading

Posted in Cyber Law | Tagged , , , | 1 Comment

Personal Data Protection Act…2.. RTI Act amended

The much awaited Data Protection Act of India has finally come to the open with a copy of the draft now being available. This appears as a text of the Bill and needs to be passed by the Parliament, approved … Continue reading

Posted in Cyber Law | Tagged , | Leave a comment

Personal Data Protection Act 2018…1….Section 43A goes

The much awaited Data Protection Act of India has finally come to the open with a copy of the draft now being available. This appears as a text of the Bill and needs to be passed by the Parliament, approved … Continue reading

Posted in Cyber Law | Tagged , | 1 Comment

An Unprecedented Technical Revolution in Health Sector is in the offing in India…

The Ayushman Bharat scheme also referred to as the Modi Care program is an ambitious welfare scheme which Mr Modi is implementing. Under this scheme it is expected that 1.5 lakh health and wellness centers offering  preventive and primary care … Continue reading

Posted in Cyber Law | Tagged , , | Leave a comment

Offline verification of Aadhaar data.. Is it feasible?

According to the Caravan report about the proposed new Data Protection Act /Privacy Protection Act which the Srikrishna Panel has tabled, a suggestion has been made for amendment of the Aadhaar Act to introduce what is called “Offline Authentication”. A … Continue reading

Posted in Cyber Law | 2 Comments