-
Ask Vishy, the personal AI-assistant of Naavi for all your information on Naavi.org
Naavi

IICA Qualified Independent Director

- Schedule Meeting with Naavi
-
DGPIN: 4PJ-7T8-FK8P: 12.94018310,77.55421020
-
Plus Code : WHR3+3P
Bing_site_search
Google_site_search
-
Recent Posts
Archives
Archives by Date
November 2025 M T W T F S S 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 -
Author Archives: Vijayashankar Na
The Modified CIA and Value Preservation
Yesterday we started a new round of discussion advocating the need to modify the well known CIA triad approach to Information Security to add “Preservation of Value of Data”. While all data has a value, the proposed concept of V … Continue reading
Posted in Cyber Law
Leave a comment
CIA now becomes Mod (CIA)V&V
CIA is a well known security concept which defines the Information Security Frameworks such as ISO 27001 and many others. In the context of ISMS objectives requiring to be modified for Personal Data security based on the Data Protection laws, … Continue reading
Posted in Cyber Law
Leave a comment
Elon Musk Petition on section 79 of ITA 2000
I started writing this blog based on the news reports that appeared mainly on TV channels and the digital copies of the preint media. The reports suggested that “X” (formerly Twitter) had filed a petition in Karnataka High Court against … Continue reading
Posted in Cyber Law
Leave a comment
Trump Disrupts US-EU Data Protection Regime
After Mr Trump took over as President of USA, we have been anticipating some changes in the Data Protection regime specially related to HIPAA/HITECH Act and the EU-US Data transfer. The DOGE activity will sooner or later catch up with … Continue reading
Posted in Cyber Law
Leave a comment
States of a Human Being in Cyber Context
The discussions in Chennai on why Cyber Crimes are increasing in the current days with individuals transforming themselves into a different mental state when on Internet has given thought to a comparison of the “Mental States of Cyber Individuals” with … Continue reading
Posted in Cyber Law
Leave a comment



