Monthly Archives: May 2022

Now the real impact of Data Localization has come out for open discussion

For a long time, there has been a set of vested interests in India who have been opposing the “Data Localization” concept. They succeeded in diluting PDPB 2018 to PDPB 2019/DPA2021 and removed the need for a copy of non … Continue reading

Posted in Cyber Law | Leave a comment

“Not possible” is now possible….WhatsApp message tracking

For a long time, WhatsApp and its supporters argued that technically it is not possible to track the origination of messages. When the Government introduced the provision as a notification under ITA 2000, technology experts in India endorsed the claim … Continue reading

Posted in Cyber Law | Leave a comment

When Elon Musk and Zuckerberg are there…Neuro Technology should be important

Mark Zuckerberg and Elon Musk are both individuals who are targeting the future for their  business expansion. If they are present it is clear that they have identified some big potential. Neuro Technology is one area where both are now … Continue reading

Posted in Cyber Law | Leave a comment

Binaural beats and Neuro Rights

For a long time many are arguing that there is a power behind chanting of Mantras. Though the mention  of  “Mantras” immediately invokes a religious feeling and triggers a “Flight Response” in some individuals, everybody will agree if we say … Continue reading

Posted in Cyber Law | Leave a comment

Is “Profiling-per-se” and “Misuse of Profile” be distinguished in Privacy law?

All privacy laws from GDPR to DPA 2021 define “Personal Information” (PI) and a need to “Protect Personal Information”. In defining PI, the popular definition is that any information “about” a living human constitutes PI and should be subject to … Continue reading

Posted in Cyber Law | Leave a comment

TRAI thinks ahead of RBI and DPAI

In a highly laudable move, the TRAI has mooted an idea that Caller IDs as linked to KYC information should be displayed when a person receives the calls on a phone device. In effect this would substitute the True Caller … Continue reading

Posted in Cyber Law | 1 Comment