Search Results for: twitter

The petition for Data Sovereignty

Mr Vinit Goenka, of the Center of Knowledge sovereignty has floated a petition on Data Sovereignty at change.org. The link to sign the petition can be found here: For immediate reference some of the salient features of the petition are … Continue reading

Posted in Cyber Law | 1 Comment

Unfinished Agenda of Modi 1.0

There is a big relief for people like us that Mr Modi is back. The relief is more because the alternative was a sure recipe for disaster. But we the people of India are not content with the relief. We … Continue reading

Posted in Cyber Law | Leave a comment

Deepfake further erodes credibility of the Internet

We have been discussing the problem of “Fake News” in India particularly in the context of the forthcoming Indian elections. The political party in opposition has made it it’s policy to try and win the election only by brazen lies … Continue reading

Posted in Cyber Law | 1 Comment

Meity Needs to take assistance of techno legal experts on Section 79

It has become a fashion for some advocates to raise an alarm on anything that the Government does to curb Cyber Anarchy. These people who consider that the Supreme Court is their backyard, keep lodging PILs opposing every action of … Continue reading

Posted in Cyber Law | Tagged , , | Leave a comment

Shreya Singhal back again!

The last time Ms Sherya Singhal approached the honourable Supreme Court with a PIL to squash Section 66A of ITA 2000/8, she was successful. The Supreme Court obliged her petition and scrapped Section 66A of the Act. In the process, … Continue reading

Posted in Cyber Law | 1 Comment

New Intermediary Guidelines… Legitimate and Well within the rights of the Government

[This is in continuation of the Previous Article] Some times “Experts” also go wrong. Particularly when they look at every Government notification with the colored glasses borrowed from the Political opponents. Today’s Economic Times highlights  “Plan to tweak IT rules … Continue reading

Posted in Cyber Law | Tagged , | 2 Comments