Monthly Archives: February 2017

“Aggregator” defined in Motor Vehicles Act..ITA 2000/8 compliance mandated

The Motor Vehicles Amendment Bill 2016 which seeks to bring in many changes to the current Motor Vehicles Act has been approved by the Cabinet according to a report. (Refer here) The Bill is yet to be passed into an … Continue reading

Posted in Cyber Law | Leave a comment

“Theory of Secure Technology Adoption”… what it is..

[P.S: This post is meant for the Academicians and discusses certain theoretical concepts. Professionals in the Information Security domain may seriously dispute some of the concepts and it is considered perfectly logical and welcome.] Naavi is a techno legal professional … Continue reading

Posted in Cyber Law | Leave a comment

WhatsApp camera bug could lead to misleading digital evidence

WhatsApp has become a powerful communication app which is used by many to also take photographs which are immediately sent out to groups or contacts at minimum effort. No doubt this is a great feature and very useful for the … Continue reading

Posted in Cyber Law | Leave a comment

Principle of Secure Technology Adoption..creating a secure ecosystem for Cyber transactions

Ever since the demonetization, the pace of technology adoption  in India by common people particularly for financial transactions, is on the increase. The UPI system supported by the multi banking platform such as the BHIM has brought digital payments within … Continue reading

Posted in Cyber Law | Leave a comment

Security of Aahaar again comes for review

The recent news report that UIDAI has initiated investigation on three firms suspected to have violated the rules of aadhaar authentication by sending stored biometrics to UIDAI server for authentication. The firms involved are Axis Bank, Suvidha Infoserve and E … Continue reading

Posted in Cyber Law | Leave a comment

Why GDPR is a threat to Indian IT industry

GDPR (General Data Protection Regulation) introduced by EU in replacement of the Data Protection regime hither to in place has opened up a debate on whether it is an “Opportunity” or a “Threat”. IDC predicts (Refer article here) that a … Continue reading

Posted in Cyber Law | 2 Comments