Search Results for: "Theory of Data"

Naavi’s Data Valuation Model

We all use the term “Data is an Asset” and many companies have structured their business around data analytics. But very few companies have developed a method with which we can value the data and represent it in our disclosed … Continue reading

Posted in Cyber Law | Leave a comment

Australian Content Law is disturbing

The war that has erupted between FaceBook and the Australian Government has opened up a can of worms as regards the future of Internet. The proposed law envisages that news producers get rewarded for the news to be picked up … Continue reading

Posted in Cyber Law | Leave a comment

Fascinating Data Pasture at the other end of the PDPAI Warp

It is a common cliché to say “Data is Oil”. For those who look at Data from the eyes of Facebook or Google, it is easy to understand why Data is a mouth watering business asset with huge profit prospects. … Continue reading

Posted in Cyber Law | 1 Comment

Anonymisation is the boundary between Personal Data and Non Personal Data

P.S: This is a long post and addresses multiple objectives. Firstly it responds to a report which appeared in Medianama.com on what transpired at the JPC deposition to correct some misconceptions. Secondly it tries to explain the difference between de-identification … Continue reading

Posted in Cyber Law | 1 Comment

Regulation of Non Personal Data.. Recommendations of the Kris Gopalakrishna Committee-4

(This is a continuation of the previous article) Ownership of Data KGC has articulated a legal basis for establishing rights over “Data”. Apart from recognizing the “Data Sovereignty” concept where the State has a primary right of ownership of assets … Continue reading

Posted in Cyber Law | Leave a comment

Regulation of Non Personal Data.. Recommendations of the Kris Gopalakrishna Committee-1

The Kris Gopalakrishna Committee (KGC) has released its report on “Data Governance” which is available for public comments till August 13. The report is a rich collection of thoughts that need some churning before recommendations can be formulated. There are … Continue reading

Posted in Cyber Law | 1 Comment