Search Results for: theory of data

A compendium of Privacy and Data Protection Articles in the last few months

The last few moths have seen a flurry of activity on Naavi.org related to Privacy and Data Protection. In order to bring all the articles published during this period into one list for easy reference, containing 39 articles. It would … Continue reading

Posted in Cyber Law | Leave a comment

Anonymization and Avatars of Data

“Anonymization” takes personal data out of the purview of most data protection regulations. Hence it is one of the objectives of data protection compliance managers to mitigate the data protection risks by pushing part of the “Protected Data” out of … Continue reading

Posted in Cyber Law | 3 Comments

Additive Value hypothesis of ownership of data

Out of the three hypotheses which we took up for discussion in constituting the Naavi’s Theory of Data, we have so far discussed the “Definition hypothesis” and “Reversible life cycle hypothesis”. We shall now take up the third hypothesis through … Continue reading

Posted in Cyber Law | 1 Comment

Data Is Always Evolving

One of the myths that is being perpetuated by Data Protection Regulations is that there is some thing called “Personal Data” and some thing called “Sensitive personal data” which companies collect and which needs to be protected. The regulators however … Continue reading

Posted in Cyber Law | Leave a comment

Data Science Has to Evolve From Technical Perspective…

Data Science is an important area of study in the present days when “Data” is considered as an important economic asset which can be harnessed like “Oil” or “Mined” like Gold. According to Wikipedia, “Data science is a multi-disciplinary field … Continue reading

Posted in Cyber Law | Leave a comment

What is the life cycle of Data?

“Life Cycle” starts from birth and ends with death. In the case of humans, life form comes from the environment (in the form of the Pancha bhootas)  and goes back to the environment. Human life has two components namely the … Continue reading

Posted in Cyber Law | Leave a comment