Daily Archives: October 5, 2018

Aadhaar Judgement-8: Limited use

This is a continuation of the previous article on this topic The second question which was answered by the three judges was “Whether the Aadhaar Act violates the right to privacy and is unconstitutional on this ground? The judges proceeded … Continue reading

Posted in Cyber Law | 3 Comments

Aadhaar Judgement-7… Can the Private Sector use Aadhaar for Authentication?

This is a continuation of the earlier articles on the topic Continuing our discussion on the Judgement of the three Judges, Dipak Mishra, A K Sikri and A W Khanwilkar, responding to the first issue answered by them namely, (1) … Continue reading

Posted in Cyber Law | 2 Comments

Aadhaar Judgement-6.. Joint Secretary is too junior?

This is a continuation of the earlier articles on the topic Continuing our discussion on the Judgement of the three Judges, Dipak Mishra, A K Sikri and A W Khanwilkar, responding to the first issue answered by them namely, (1) … Continue reading

Posted in Cyber Law | 2 Comments

Aadhaar Judgement-5…Collection of Metadata

This is a continuation of the earlier articles on the topic Continuing our discussion on the Judgement of the three Judges, Dipak Mishra, A K Sikri and A W Khanwilkar, responding to the first issue answered by them namely, (1) … Continue reading

Posted in Cyber Law | 1 Comment

Aadhaar Judgement…4… Making the life of law enforcement difficult…

This is a continuation of the earlier articles on this topic Continuing our discussion on the Judgement of the three Judges, Dipak Mishra, A K Sikri and A W Khanwilkar, responding to the first issue answered by them namely, (1) … Continue reading

Posted in Cyber Law | 2 Comments

Aadhaar Judgement..3.. Data retention limit of 6 months..

This is in continuation of the earlier articles on this topic The First Issue answered by the first part of the majority judgement(signed by the three judges Dipak Mishra, A.K.Sikri and A W Khanwilkar here after referred to as the … Continue reading

Posted in Cyber Law | 2 Comments