-
Ask Vishy, the personal AI-assistant of Naavi for all your information on Naavi.org
-
Naavi
IICA Qualified Independent Director
-
DGPIN: 4PJ-7T8-FK8P: 12.94018310,77.55421020
-
Plus Code : WHR3+3P
Bing_site_search
Google_site_search
-
Recent Posts
Archives
Archives by Date
Search Results for: intermediary guidelines
The Nature of Business Requirement Document released by Meity for Consent Management
Medianama, a well known website has commented on the Business Requirement Document (BRD) released by MeitY with the following caption. “MeitY Explains How an Ideal Consent Management System Should Work Under DPDPA” The perception has been that MeitY has actually … Continue reading
Posted in Cyber Law
Leave a comment
Regulatory Structure under DPDPA Vs GDPR
India is awaiting the notification of the DPDPA Rules after taking into consideration the public comments. According to some indications the Government may release the notification some time in the beginning of April 2025. Many companies are waiting for the … Continue reading
Posted in Cyber Law
Leave a comment
Rameshwaram Cafe Blast.. Responsibility of the Telecom Company
Naavi
Posted in Cyber Law
Leave a comment
Why Not … DGPSI
After DPDPA 2023 has become a reality, there is a scramble to find a framework of compliance which can assist organizations in implementing a Data Governance and Protection Management System (DGPMS) which can provide “Compliance by Default and Design”. The … Continue reading
Posted in Cyber Law
Leave a comment
There is no need to restrict the role of “Consent Manager” to the pre-DPDPA vision.
In many of my recent discussions with experts on the role of “Consent manager” under DPDPA 2023, I have encountered a view that the role of a consent manager under DPDPA is similar to what is envisaged under the Data … Continue reading
Posted in Cyber Law
Leave a comment
The New Criminal on the Internet: Tox Service
Since 1971 when the first concept of a “Malware” surfaced we have been fighting the menace of Virus, Trojan, worm etc which are all “Malicious” programs that automatically spread into the user’s computer. The initial purpose of the viruses was … Continue reading
Posted in Cyber Law
Leave a comment