Monthly Archives: March 2020

Empathy… an Essential requisite of a good DPO

The functions of a Data Protection Officer (DPO) under the emerging Personal Data Protection Act (PDPA), includes the DPO being the single point contact for grievance redressal between the Data Principal and the Data Fiduciary. In discharging this function, the … Continue reading

Posted in Cyber Law | Leave a comment

Crisis Management…An Essential Skill of a DPO

The Corona Crisis is opening the eyes of administrators on the problems that one faces in a situation of crisis.  “Damned if you do and damned if you do not”  is the kind of response the administrators get from the … Continue reading

Posted in Cyber Law | Leave a comment

To Be a Leader?… or To Be a Follower?

It is always a dilemma for every professional to decide what is more comfortable…chose to be a leader? or be happy to be a follower? Obviously if every one is a leader, there would be chaos. So nature has decided … Continue reading

Posted in Cyber Law | Leave a comment

Certified Data Protection Professional Course to be accelerated

The Course on Certified  Data Protection Professional (CDPP) being conducted with virtual classes from Naavi  was planned to be conducted over 6 weeks with one session each on Saturday’s and Sundays starting from April 4th. In view of the lock … Continue reading

Posted in Cyber Law | Leave a comment

Work From Home Undertaking

In continuation of the discussions on Work From Home requirements and keeping with the spirit of CLCC (Cyber Law Compliance Center), we are adding a draft Employee undertaking that is recommended to be taken for Work from home implementations. Suggestions … Continue reading

Posted in Cyber Law | Leave a comment

Security in a Work From Home situation

The current crisis created by the Corona virus and the lock down has forced most companies to permit their IT workers to work from home. This has simultaneously created issues in meeting the security requirements related to the operations and … Continue reading

Posted in Cyber Law | 2 Comments