Search Results for: UIDAI

The e-sign conundrum

(P.S:  This post tries to explain the “e-sign” system of authentication of an electronic document as per the provisions of Information Technology Act 2000 as amended in 2008 -ITA 2000/8, for the benefit of students and teachers of Cyber Law.  … Continue reading

Posted in Cyber Law | 1 Comment

Inconsistencies in the CCA guidelines need to be clarified

I recall my earlier article titled “Is it a WhatsApp Moment or Napster Moment for Indian Financial System?”  in which I had pointed out certain doubts about the legality of the new Electronic Signature system that was notified by the … Continue reading

Posted in Cyber Law | Leave a comment

Is it a WhatsApp Moment or Napster Moment for Indian Financial System?

I refer to the earlier post on “WhatsApp moment in Indian Financial Services”  in which the views of Mr Nandan Nilekani on how the financial services market in India is transforming. One of the changes that the new mobile payment … Continue reading

Posted in Cyber Law | Leave a comment

Privacy in Doldrums-Adapting to the Information Age

The International Association of Privacy Professionals (IAPP) and the Indian Bar Association (IBA) organized a conference in Bangalore on 23rd September 2015 and discussed several aspects related to Privacy in the emerging Digital India. Eminent speakers from the industry participated … Continue reading

Posted in Cyber Law | Leave a comment

Digital India and Bugle Call for Activating the Cyber Law Eco System

In 1996, when E Commerce was in its nascent stage, UNCITRAL recognized the need for providing a legal backing to E Commerce and drafted the model law on E Commerce to provide assurance to international business transactions. To accomplish this, … Continue reading

Posted in Cyber Law, ITA 2008 | Leave a comment

Digi Locker Beta Release

Government has opened the beta version of the Digital Locker operated by CDAC and UIDAI which provides 10MB free storage space for every Aadhar number holder. It envisages that members can upload their ID documents and share it with other Government … Continue reading

Posted in Cyber Crime, Cyber Law, ITA 2008 | 1 Comment