Monthly Archives: April 2017

Data Processors in India should avoid entering into unenforceable contracts which may be termed “Fraudulent”

Globalization of Indian IT business has created many challenges to the Indian economy as a whole and in particular to certain domain specific regulators. One such regulator who finds himself frequently under a bind is RBI while regulating the Foreign … Continue reading

Posted in Cyber Law | Leave a comment

Petrol Bunk Chip Scam is a Cyber Crime

Police in Lucknow have raided several Petrol Bunks in Lucknow who were using a Chip inside the dispensing unit to dispense less petrol for every litre dispensed and systematically siphon off about 50 ml for every litre of petrol. This … Continue reading

Posted in Cyber Law | Leave a comment

Police, Prosecutors and Judiciary: Please Don’t Create Fake Laws out of your misinterpretation

When a Palghar girl posted a message on her Facebook raising a query …Why there should be Mumbai Bundh if Mr Bal Thakrey has died? and another Palghar girl clicked on “Like” button against the message, Police in Palghar moved in … Continue reading

Posted in Cyber Law | Leave a comment

Will PSD2 have an impact in India?

Recently, in the WhatsApp circles, there was news about RBI cautioning the public with “Multi Bank Balance Enquiry Apps”. This was actually an advisory issued earlier on 11th April 2015, in which RBI stated as follows. “It has come to the … Continue reading

Posted in Cyber Law | Leave a comment

More Clarification on Section 65B Certification… For Forensic Labs

Section 65B Certification of electronic evidence produced in a Court proceeding in India has been a matter of intense discussion in the circle of Forensic experts, Law Enforcement and of course the Legal fraternity. Historically, the undersigned was the first … Continue reading

Posted in Cyber Law | Leave a comment

Securing Prepaid Payment Instruments under the IT Act

ISMG India carried a report on the Prepaid Instruments recently which has been reproduced here. Refer for more details here: Naavi said in this context : While MeitY has prescribed guidelines, security practitioners have offered other ideas. “The current authentication methods are … Continue reading

Posted in Cyber Law | Leave a comment