Search Results for: bug bounty

Do we Need a “Sandbox Law”?

It is a common adage to say that “Law is always behind the Technology” ..and also to add, “like the traditional Hindu wife”. But all of us know that the “Tradition” has changed. Modern wife drives the bike while the … Continue reading

Posted in Cyber Law | Leave a comment

MOVEit vulnerability exploited.. Where was DPIA?

A Russian ransomware gang CLOp has reportedly been exploiting a zero day vulnerability in a secure file transfer software called MOVEit and has reportedly affected hundreds of businesses in UK and USA. Moveit is a managed file transfer software product … Continue reading

Posted in Cyber Law | Leave a comment

Documents Available

Cyber Law Compliance Center Promoted by www.naavi.org Contact: naavi@fdppi.in Naavi’s Cyber Law Compliance Center in its pursuitĀ  to promote Cyber Law aware and compliant society in India provides certain policy documents as model for adoption by intending individuals or organizations. … Continue reading

Comments Off on Documents Available

UK DPA strikes at Uber: Delivers a lesson in Password construction

Uber has been fined by the UK DPA for UK sterling 385000/- (Approx Rs 3.5 crores) for failing to protect its customer’s data during a breach. Refer report here The breach occurred in November 2016 when GDPR notification was in … Continue reading

Posted in Cyber Law | Leave a comment

We need to build a “Bridge of Trust” between UIDAI and Security specialists

In the on-going petition in Supreme Court, Aadhaar faces a tough battle against multiple opponents. The background under which the Aadhaar case has come up for hearing itself suggests that there are some undercurrents of opposition to Aadhaar even within … Continue reading

Posted in Cyber Law | Tagged , , | 1 Comment

Aadhaar Adds another security layer to frustrate “Benami” s.

It appears that UIDAI is in race with the Supreme Court to ensure that the Court does not take any decision to question the use of Aadhaar as it is presently planned. Aadhar has evoked a mixed response from the … Continue reading

Posted in Cyber Law | Leave a comment