Search Results for: 65B

Supreme Court should mandate addition of the Verified and Unverified status to Social media accounts

There is a debate presently going on in the Supreme Court of India about the responsibilities of the Social Media Companies such as FaceBook and Twitter in preventing “Fake Accounts” and “Fake News”. It is beyond question that Fake news … Continue reading

Posted in Cyber Law | Leave a comment

Theory of Data and Definition Hypothesis

Out of the three  main Challenges that we are trying to address in this Theory of Data, the first and most fundamental challenge is a proper definition of a “Data”, which is acceptable to the Technology persons, the Legal Persons … Continue reading

Posted in Cyber Law | Leave a comment

Theory of Data

Naavi has been working around the concept of “Data” from a Techno-legal, Behavioural and Managerial perspectives for some time. The objective is to bring better clarity on the nature of “Data” and in particular “Personal Data” so that regulations are … Continue reading

Posted in Cyber Law | Leave a comment

Fission and Fusion of Data Elements..1

Evolution of the Term “Data” Before the advent of ITA 2000, the normal understanding of the term Data was information in raw form.  Data organized in a form in which it carried better use to the community was termed “Information”. … Continue reading

Posted in Cyber Law | Leave a comment

New Cyber Crime Act in the anvil?

Recently, Mr Amit Shah, the honourable Home Minister of India collected information from across the country on the amendments that are required to the law to effectively counter Cyber crimes. Information coming out of the ministry seems to suggest that … Continue reading

Posted in Cyber Law | Leave a comment

Shafi Mohammad order referred to larger bench

When the media cried out “Courts can rely on electronic records without certificate: SC”., based on the order of a two member bench of the Supreme Court, Naavi.org clearly stated that the order was incorrect and required to be corrected. ( … Continue reading

Posted in Cyber Law | Leave a comment