Search Results for: UIDAI

Open Door Policy of State Bank of India!

If we want to enter a branch of SBI, we may have to encounter a guard, half closed gate. In secure rooms, there may be even an access controlled doors. But it is a surprise to know that the server … Continue reading

Posted in Cyber Law | Tagged , , | Leave a comment

Allahabad High Court admits PIL against Section 69 notice …2

[This is in continuation of the earlier article] The Allahabad High Court accepting the petition challenging the MHA notification on Section 69 is typical of the cases that display an attitude of some petitioners to move the top courts on … Continue reading

Posted in Cyber Law | Tagged , | Leave a comment

Cyber Patrolling is the need of the hour

In the midst of the debate on Privacy as a fundamental Right, the Aadhaar usage by Private Sector etc., the MHA order on Section 69 of ITA 2000/8 designating 10 agencies as accredited agencies which the Competent authority may use … Continue reading

Posted in Cyber Law | Tagged , , | Leave a comment

Intermediary Guidelines.. Who is and who is not an intermediary?

The following are the comments from Naavi.org on the proposed modified rules under Section 79 of ITA 2000/8 released for public comments on 24th December 2018. After the passage of amendments to ITA 2000 in December 2008, which was notified … Continue reading

Posted in Cyber Law | Tagged , | 3 Comments

Aadhaar Judgement-9: Definition of Personal Information revised?

This is in continuation of our earlier Article in this topic The judgement of the three judges made a significant observation which may leave a significant impact on the PDPA 2018. While answering the question “Whether the Aadhaar Act violates … Continue reading

Posted in Cyber Law | 2 Comments

Aadhaar Judgement-7… Can the Private Sector use Aadhaar for Authentication?

This is a continuation of the earlier articles on the topic Continuing our discussion on the Judgement of the three Judges, Dipak Mishra, A K Sikri and A W Khanwilkar, responding to the first issue answered by them namely, (1) … Continue reading

Posted in Cyber Law | 2 Comments