-
Ask Vishy, the personal AI-assistant of Naavi for all your information on Naavi.org
-
Naavi
IICA Qualified Independent Director
-
DGPIN: 4PJ-7T8-FK8P: 12.94018310,77.55421020
-
Plus Code : WHR3+3P
Bing_site_search
Google_site_search
-
Recent Posts
Archives
Archives by Date
Author Archives: Vijayashankar Na
Mis-perceptions about Section 66A
Section 66A of ITA 2008 has been one of the most abused sections of the Act in recent days. There is also a discussion about the constitutional validity of this section on whether this section infringes on the constitutional “Right … Continue reading
Posted in Cyber Law, Netizen's Forum
Leave a comment
Silicon India interview
Naavi was recently interviewed by Silicon India. The interview is available in the community page of Silicon India. A link is available here. The interview is presented in the physical society identity of Naavi. The theme of the interview is basically … Continue reading
Posted in Uncategorized
Leave a comment
RBI’s responsibility in preventing Aadhar Misuse for Bank Frauds
I refer to the news report in Midday indicating a new modus operandi in the commission of a Bank fraud in India. This fraud has been committed as a combination of “Phishing”, “Security lapses at the victim’s Bank”, “Compromise of KYC by … Continue reading
Posted in Bank, Cyber Crime
Leave a comment
Donot link Aadhar to your Bank account
I observed during the Aadhar registration process in Bangalore that by default the registrar was encouraging registrants to link their Bank accounts to the Aadhar application. Risk associated with such process has been highlighted by the fraud reported in Midday … Continue reading
Posted in Bank, Cyber Crime, Cyber Law, Uncategorized
Leave a comment
Cloud Computing and ITA 2008
Though “Cloud Computing” has been on discussion for the last 4 to 5 years, the rate of adoption is considered slower than expected. One of the main reasons is that during this period while there are new developments in the … Continue reading
Posted in Information Assurance, Privacy, Uncategorized
Tagged cloud computing, information assurance, ITA 2008
Leave a comment
Risk Assessment, the ISO maze
Extensive promotion has made ISO 27001 the key recall when we think of “Risk Assessment”. No doubt ISO 27001 is the most popular ISMS framework. The fact that it lends itself to certification makes it attractive to organizations which want … Continue reading
Posted in Information Assurance, Uncategorized
Leave a comment