Search Results for: privacy
Can the Data Protection Obligation of the Government be simplified?..Shape of Things to come-22
(Continued from the previous article) P.S: This series of articles is an attempt to place some issues before the Government of India which promises to bring a new Data Protection Law that is futuristic, comprehensive and Perfect. If we look … Continue reading
Applicability of the NDPAI-Shape of things to come-21
(Continued from the previous article) P.S: This series of articles is an attempt to place some issues before the Government of India which promises to bring a new Data Protection Law that is futuristic, comprehensive and Perfect. Applicability of any … Continue reading
Applicability of the NDPAI-Shape of things to come-20
(Continued from the previous article) P.S: This series of articles is an attempt to place some issues before the Government of India which promises to bring a new Data Protection Law that is futuristic, comprehensive and Perfect. The honourable Minister … Continue reading
Need for Neuro Rights Protection just got bigger… Shape of Things to come–19
(Continued from the previous article) P.S: This series of articles is an attempt to place some issues before the Government of India which promises to bring a new Data Protection Law that is futuristic, comprehensive and Perfect. We have been … Continue reading
IDPS 2022 is an event in which you can participate as a speaker
FDPPI is an organization of the data protection professionals and by the data protection professionals. The organization is supported by the aggregation of activities of its members. For practical reasons some members are designated as “Supporting Members” so that they … Continue reading
Is this the future of Secure E Mail system?… Creating own E Mail ecosystem in an enterprise
Functionality and Security are two dimensions of any software that needs to be balanced through regulation. Internet and E Mails were created with a purpose of effective communication and hence functionality was the prime concern in the design of protocols such … Continue reading