Search Results for: deceased

Applicability of the NDPAI-Shape of things to come-20

(Continued from the previous article) P.S: This series of articles is an attempt to place some issues before the Government of India which promises to bring a new Data Protection Law that is futuristic, comprehensive and Perfect. The honourable Minister … Continue reading

Posted in Cyber Law | Leave a comment

JPC recommendation on Children Data

In designing the Data Protection regulations, problem areas have been a) Deceased data principals b) Legacy holdings of personal data c) Personal data of minor children. Having adopted “Consent” as a basic form of establishing lawfulness of processing, it is … Continue reading

Posted in Cyber Law | Leave a comment

Anonymisation is like Encryption with a destroyed decryption key

If we follow the discussions around the DPA 2021, it appears that there is a confusion regarding the term “Anonymization” and its effect on Personal Data. It is strange that after so much of discussions on the GDPR and the … Continue reading

Posted in Cyber Law | Leave a comment

PDPA 2021: The nature of Data as an Asset and nomination facility

India enacted ITA 2000 (Information Technology Act 2000) with effect from 17th October 2000 and amended it in 2008 with effect from 27th October 2009. The provisions of ITA 2000/8 included legal recognition for a binary expression which we refer … Continue reading

Posted in Cyber Law | Leave a comment

Data Protection Law in China

China has announced a law called “Personal Information Protection Law” (PIPL) on 20th August 2021, coming into effect on 1st November 2021. The PIPL is having 74 articles divided into 8 chapters as follows: General Provisions; Personal Information Processing Rules; … Continue reading

Posted in Cyber Law | Leave a comment

Data Protection Journal of India ..Latest issue is now available

  Data has a value as everybody understands. But we need to go further in our discussion on what is the value of data, how it can be computed and how it can be brought into the balance sheet etc. … Continue reading

Posted in Cyber Law | Leave a comment