Monthly Archives: October 2019

The Roadmap of PDPA

Personal Data Protection Act of India (PDPAI) by whatever name it will be finally called is expected to be tabled in the winter session of Parliament. (See Report here). Though the Government is under an obligation to the Supreme Court … Continue reading

Posted in Cyber Law | Leave a comment

Is Data Governance a subset of Data Protection or is it the Vice Versa?

So far discussions on Data Governance was restricted to the Big Data players. The Data Security professionals were more focussed on “Data Security” and everything else took a secondary place. In organizations pursuing GDPR compliance, the DPOs became key senior … Continue reading

Posted in Cyber Law | Leave a comment

Additive Value hypothesis of ownership of data

Out of the three hypotheses which we took up for discussion in constituting the Naavi’s Theory of Data, we have so far discussed the “Definition hypothesis” and “Reversible life cycle hypothesis”. We shall now take up the third hypothesis through … Continue reading

Posted in Cyber Law | 1 Comment

Reversible Life Cycle hypothesis of the Theory of Data

This is in continuation of our discussion on the Theory of Data to explain “What Data is” for different communities like the technologists, lawyers and business manager. In this direction we have stated that there are three hypotheses that we … Continue reading

Posted in Cyber Law | Leave a comment

Theory of Data and Definition Hypothesis

Out of the three  main Challenges that we are trying to address in this Theory of Data, the first and most fundamental challenge is a proper definition of a “Data”, which is acceptable to the Technology persons, the Legal Persons … Continue reading

Posted in Cyber Law | Leave a comment

New Data Theory of Naavi built on three hypotheses

In searching a proper expression and articulation of the Theory of Data, Naavi has decided to adopt a set of three hypotheses which are the pillars of this New Theory of Data. The three hypotheses are a) A hypothesis that … Continue reading

Posted in Cyber Law | Leave a comment