Monthly Archives: March 2015

Digi-locker Project may consciously flout Information Technology Act

The digilocker beta project launched by the Government of India seems to be set to introduce a precedent which is ultra-vires the Information Technology Act 2000/8. According to the information available the Digi Locker can be used to store important … Continue reading

Posted in Cyber Law, ITA 2008 | Leave a comment

Bitcoin in new form?

Bitcoin has been in discussion for some time. In India the response for Bitcoin has been mixed. While initially it attracted the attention of entrepreneurs setting up echange services, the RBI frowned upon the system and ED moved in to … Continue reading

Posted in bitcoin | 2 Comments

Digital India and Bugle Call for Activating the Cyber Law Eco System

In 1996, when E Commerce was in its nascent stage, UNCITRAL recognized the need for providing a legal backing to E Commerce and drafted the model law on E Commerce to provide assurance to international business transactions. To accomplish this, … Continue reading

Posted in Cyber Law, ITA 2008 | Leave a comment

Make in India to create IPR wealth

Speaking at the National Conference on Cyber Space Security at Bangalore today, Dr K.D.Nayak, DS & DG, DRDO highlighted the importance of “Make in India” concept from the point of view of the need to protect IPR. He recalled that the manufacturing … Continue reading

Posted in Cyber Law | Leave a comment

Tech Mahindra starts use of Digital Signatures for job offers

It was heartening to note that Tech Mahindra has reportedly started using digital signatures for sending out its job offers to counter the phishing mails sent in their name. (See Report Here). This has been a continuing demand of the … Continue reading

Posted in ITA 2008 | Leave a comment

Digi Locker Beta Release

Government has opened the beta version of the Digital Locker operated by CDAC and UIDAI which provides 10MB free storage space for every Aadhar number holder. It envisages that members can upload their ID documents and share it with other Government … Continue reading

Posted in Cyber Crime, Cyber Law, ITA 2008 | 1 Comment