Search Results for: insurance

Zomato Data Breach.. What Next?

Zomato a leading Mobile App owner and a restaurant guide has suffered a major security breach in which 17 million data sets of customers including the name, email address and hashed password is reported to have been lost. Read Article … Continue reading

Posted in Cyber Law | Leave a comment

The WannaCry Ransomware attack: CISO s Action Required: Notify Management of the Risks.

A ransomware attack which crippled many hospitals in UK is now creating waves of alarm by spreading into other countries. According to one researcher, more than 45000 attacks have already been flagged in 74 countries of having been caused by … Continue reading

Posted in Cyber Law | Leave a comment

American Health Care Act 2017.. Will it benefit Indian IT Companies?

India has a high stake in the American Health Care industry since there is a huge IT spending by the Health care and Health Insurance industry in USA which also gets reflected in the outsourcing market. It is for this … Continue reading

Posted in Cyber Law | Leave a comment

Data Processors in India should avoid entering into unenforceable contracts which may be termed “Fraudulent”

Globalization of Indian IT business has created many challenges to the Indian economy as a whole and in particular to certain domain specific regulators. One such regulator who finds himself frequently under a bind is RBI while regulating the Foreign … Continue reading

Posted in Cyber Law | Leave a comment

Will PSD2 have an impact in India?

Recently, in the WhatsApp circles, there was news about RBI cautioning the public with “Multi Bank Balance Enquiry Apps”. This was actually an advisory issued earlier on 11th April 2015, in which RBI stated as follows. “It has come to the … Continue reading

Posted in Cyber Law | 1 Comment

Securing Prepaid Payment Instruments under the IT Act

ISMG India carried a report on the Prepaid Instruments recently which has been reproduced here. Refer for more details here: Naavi said in this context : While MeitY has prescribed guidelines, security practitioners have offered other ideas. “The current authentication methods are … Continue reading

Posted in Cyber Law | Leave a comment