Author Archives: 98410spice

Forged and Scanned document under Section 65B

An interesting hypothetical case was referred to me today on the acceptability of the Section 65B certificate and its impact when a person forges a document, scans it and presents a section 65B certified print copy of the scanned document … Continue reading

Posted in Cyber Law | Leave a comment

CBI Enquiry is required for finding the truth behind TransUnion taking over CIBIL

I have earlier discussed in these columns matters related to my following RTI application in which I had queried both the RBI and the Ministry of Finance that Trans Union International Inc, an US based Company increased its share holding … Continue reading

Posted in Cyber Law | Leave a comment

Supreme Court should mandate addition of the Verified and Unverified status to Social media accounts

There is a debate presently going on in the Supreme Court of India about the responsibilities of the Social Media Companies such as FaceBook and Twitter in preventing “Fake Accounts” and “Fake News”. It is beyond question that Fake news … Continue reading

Posted in Cyber Law | Leave a comment

New Version of Course on PDPA

Cyber Law College, a division of Ujvala Consultants Pvt Ltd has introduced a new version of a Course on PDPA (Personal Data Protection Act). This version would include additional modules on Data Governance Framework as well as a discussion on the … Continue reading

Posted in Cyber Law | Leave a comment

Sweden’s First Fine under GDPR is bizarre and tragic

Some people are gloating over the “First Fine under GDPR in Sweden” where a school has been fined 200,000 euros for testing Face recognition technology for attendance monitoring. This move deserves unequivocal condemnation and probably is an example of how … Continue reading

Posted in Cyber Law | Leave a comment

Anonymization and Avatars of Data

“Anonymization” takes personal data out of the purview of most data protection regulations. Hence it is one of the objectives of data protection compliance managers to mitigate the data protection risks by pushing part of the “Protected Data” out of … Continue reading

Posted in Cyber Law | 3 Comments