Search Results for: Theory of data

DPCSI and the Intelligence theory

Today, I received a WhatsApp regarding four types of intelligence, namely, 1) Intelligence Quotient (IQ) 2) Emotional Quotient (EQ) 3) Social Quotient (SQ) 4) Adversity Quotient (AQ) The forward defined the different types of intelligence as follows: 1. Intelligence Quotient … Continue reading

Posted in Cyber Law | Leave a comment

Defining a Data Asset.. A Debate

[Discussions here are part of the Naavi’s Theory of Data] Data Governance in an organization requires identification of what is data, how data can be created or collected,  what is its value, who is the custodian, who is the owner, … Continue reading

Posted in Cyber Law | Leave a comment

Data as a class of property

On different occasions we have discussed the implication of “Data” as a property class. The early discussions on “Data” as a property in legal circles was around the property of “Domain Name”. It was one of the first “Pure Virtual … Continue reading

Posted in Cyber Law | Leave a comment

When Ransomware terrorists know the value of data why not Accountants?

Data was called “Oil” because it was recognized as having immense value to the business. There are organizations where data is a by product and there are also organizations where data is the finished product. Whenever a ransomware attacker demands … Continue reading

Posted in Cyber Law | Leave a comment

Naavi’s Data Valuation Model

We all use the term “Data is an Asset” and many companies have structured their business around data analytics. But very few companies have developed a method with which we can value the data and represent it in our disclosed … Continue reading

Posted in Cyber Law | Leave a comment

Air India Personal Data Breach.. The value for disinvestment might have increased !

Air India has made an announcement that it’s Passenger Service System was attacked and personal data of about 45 lakh data subjects have been compromised. The leaked data elements include Name, Data of Birth, Contact Information, Passport information, ticket information, … Continue reading

Posted in Cyber Law | Leave a comment