Search Results for: "Theory of Data"

Additive Value hypothesis of ownership of data

Out of the three hypotheses which we took up for discussion in constituting the Naavi’s Theory of Data, we have so far discussed the “Definition hypothesis” and “Reversible life cycle hypothesis”. We shall now take up the third hypothesis through … Continue reading

Posted in Cyber Law | 1 Comment

New Data Theory of Naavi built on three hypotheses

In searching a proper expression and articulation of the Theory of Data, Naavi has decided to adopt a set of three hypotheses which are the pillars of this New Theory of Data. The three hypotheses are a) A hypothesis that … Continue reading

Posted in Cyber Law | Leave a comment

Data Is Always Evolving

One of the myths that is being perpetuated by Data Protection Regulations is that there is some thing called “Personal Data” and some thing called “Sensitive personal data” which companies collect and which needs to be protected. The regulators however … Continue reading

Posted in Cyber Law | Leave a comment

Data Science Has to Evolve From Technical Perspective…

Data Science is an important area of study in the present days when “Data” is considered as an important economic asset which can be harnessed like “Oil” or “Mined” like Gold. According to Wikipedia, “Data science is a multi-disciplinary field … Continue reading

Posted in Cyber Law | Leave a comment

What is the life cycle of Data?

“Life Cycle” starts from birth and ends with death. In the case of humans, life form comes from the environment (in the form of the Pancha bhootas)  and goes back to the environment. Human life has two components namely the … Continue reading

Posted in Cyber Law | Leave a comment

Data Governance Framework as it exists in India now

With the formation of an expert committee titled “Data Governance Framework Committee” Data Professionals in India are now wondering what is in store. Some of the questions that are in the minds of the Data Regulation Observers are Will this … Continue reading

Posted in Cyber Law | Leave a comment