Search Results for: Theory of data

Investors in Zomato and Paytm IPOs will eventually blame Narendra Modi

The Zomato public issue of shares to raise Rs 9735 crores of public money to a company which has been consistently making losses and has declared that it will continue to make losses even in the future is a dangerous … Continue reading

Posted in Cyber Law | Leave a comment

SBI takes one Step forward but falls short…in calling for a DPO application.

State bank of India became one of the first Bankers to call for applications for the appointment of a “Data Protection Officer”. It has recently released an advertisement calling for applications. It is good to know that the Bank has … Continue reading

Posted in Cyber Law | Leave a comment

Preparing for Security disruption through Quantum Computing

Some times back, I have tried to place before the readers of this blog who are mainly followers of Cyber Law, Information Security and Data Protection some thoughts on the impact of Quantum Computing on Cyber Laws through a series … Continue reading

Posted in Cyber Law | Leave a comment

Quantum Computing takes a step further

We have earlier discussed certain concepts of “Quantum Computing” at this site and its impact on Cyber Laws of Evidence, Encryption security and Data Protection. I give below the links to those articles for a quick review: Quantum computing and … Continue reading

Posted in Cyber Law | 1 Comment

PDPSI Vs ISO 27701 Vs BS 10012

PIMS (Personal Information Management System) is the next buzzword in the Information Security domain that will be discussed by the Data Protection professionals. Presently, two international frameworks namely the BS 10012 and ISO27701 are available for us to follow. The … Continue reading

Posted in Cyber Law | 1 Comment

Drawing Borders for the Borderless Cyber Space

“Internet was born free but is found everywhere in Chains” was a statement made by Naavi in 2002. Several articles   were showcased discussing the developments at that time which may make interesting reading even today. I hope for students of the … Continue reading

Posted in Cyber Law | 1 Comment