Search Results for: 66A

“Do Not Disturb” not for websites?

In a significant ruling, the US Federal Communications Commission (FCC)has rejected to force websites a petition by the Consumer Watchdog to enforce the “Donot Track” requests from individuals. The petition had requested  that the Commission “initiate a rule making proceeding requiring … Continue reading

Posted in Cyber Law | Leave a comment

VSIG

Virtual Special Interest Group on Amendments to ITA 2008 This has reference to the detailed note “Special Interest Group in Amendment to ITA 2008”. It is proposed that a Virtual Special Interest Group of Cyber Law specialists is formed through … Continue reading

Comments Off on VSIG

Special Interest Group on ITA 2000/8 Amendment

Naavi has been pointing out that the increasing use of IT in E Governance and E Commerce and the embracing of the Digital India policy which includes the Internet of Things and Big Data, there is a need for a … Continue reading

Posted in Cyber Law | Leave a comment

NJAC verdict to be Questioned.. Wish there is a National Referendum

The scrapping of NJAC Bill by Supreme Court and upholding the system of the Collegium has been debated with muted voice for the last few days in the legal circles. After Congress announced its politically expedient decision not to back … Continue reading

Posted in Cyber Law | Leave a comment

Modi introduces the concept of “Personal Sector” beyond the Public and Private Sectors

The Digital India vision of Mr Modi has been making rounds in the tech circles in San Jose. During his interactions with the techies, it was notable to observe that Modi did mention about Privacy Protection, Cyber Security and Intellectual … Continue reading

Posted in Cyber Law | Leave a comment

Encryption is the Key to Information Security

The recent faux pas committed by the Department of IT, Government of India in publishing a half-baked policy as the “Draft National Encryption Policy” created a needless controversy on the topic of “Encryption Policy” itself and whether it was required or … Continue reading

Posted in Cyber Law | Leave a comment