Monthly Archives: May 2015

Impersonation of “Naavi” sighted

P.S: Since the publication of this post and an email sent to the founders of Naavi.co., a response as quoted below ┬áhas been received from Mr Bates, promoter of Naavi.co. Naavi has been the promoter of www.lookalikes.in which promotes the … Continue reading

Posted in Cyber Law | Leave a comment

Cyber Security Task Force-NASSCOM-DSCI initiative,Will it have a holistic view?

It is reported that NASSCOM and DSCI has set up a Cyber Security Task Force with representatives from industry and academia to identify key priorities and build a detailed action plan. The task force is expected to study the Indian … Continue reading

Posted in Cyber Law | Leave a comment

Banks Prepare an assault on customers through Court actions

Naavi.org has been highlighting the fact that banks are conducting “Unsafe Banking” in pursuance of “Profit before Customer Service” and pushing Customers into greater and greater risks. RBI has through the 2001 guidelines on Internet Banking and again through the … Continue reading

Posted in Cyber Law | Leave a comment

Banks Brushing Data Security Issues under the carpet

“The general culture in our bank is to brush data security breach and loopholes under the carpet” says one of the senior executives of a leading Bank, according to this article in Midday. Mumbaikars beware! Your bank details are being … Continue reading

Posted in Cyber Law | 1 Comment

New Mobile App launched for Cyber Law Awareness for Everyone

The undersigned has been undertaking several measures from time to time towards spreading awareness of Cyber Laws in the country. In a bid to further the mission of “Cyber Law Awareness For Everyone”, Naavi has launched a mobile App called … Continue reading

Posted in Cyber Law | Leave a comment

Has RBI really woken up from its slumber?

Mr Raghuram Rajan, Governor of RBI sprang a surprise during the press interaction on 14th May following the Board meeting at Goa, by hinting at setting up of a subsidiary to meet the Cyber Security requirements of the sector. This … Continue reading

Posted in Cyber Law | Leave a comment