Search Results for: quantum

Reversible Life Cycle hypothesis of the Theory of Data

This is in continuation of our discussion on the Theory of Data to explain “What Data is” for different communities like the technologists, lawyers and business manager. In this direction we have stated that there are three hypotheses that we … Continue reading

Posted in Cyber Law | Leave a comment

What is the life cycle of Data?

“Life Cycle” starts from birth and ends with death. In the case of humans, life form comes from the environment (in the form of the Pancha bhootas)  and goes back to the environment. Human life has two components namely the … Continue reading

Posted in Cyber Law | Leave a comment

Theory of Data

Naavi has been working around the concept of “Data” from a Techno-legal, Behavioural and Managerial perspectives for some time. The objective is to bring better clarity on the nature of “Data” and in particular “Personal Data” so that regulations are … Continue reading

Posted in Cyber Law | Leave a comment

Fission and Fusion of Data Elements..1

Evolution of the Term “Data” Before the advent of ITA 2000, the normal understanding of the term Data was information in raw form.  Data organized in a form in which it carried better use to the community was termed “Information”. … Continue reading

Posted in Cyber Law | Leave a comment

Data Forensics is the new Approach to Cyber Forensics

Forensics is the art and science of discovering, collection, preservation and presentation of evidence to meet a legal requirement. We normally use the term “Cyber Forensics” to describe forensic activities related to information technology devices such as computers. Initially we … Continue reading

Posted in Cyber Law | Leave a comment

The 18 year Journey Since the Digital Society was born in India

Information Technology Act 2000 (ITA 2000) was notified on 17th October 2000 and today is the 18th year after India legally recognized the Electronic Document as equivalent to Paper Document and Digital Signature as equivalent to physical signature leading to … Continue reading

Posted in Cyber Law | 1 Comment