Category Archives: Cyber Law

The “Consent Conundrum” in DPDPA Rules..DGPSI 4

As the industry expects the “Draft Rules for DPDPA” to be released within the next fortnight, the draft of the draft rules released some time back selectively by MeitY to organizations like Meta and Google for their views provide us … Continue reading

Posted in Cyber Law | Leave a comment

DGPSI is the TINA option for DPDPA Compliance….3

Strategy war rooms of companies have been discussing the impact of AI on their business and how they need to leverage the new technologies. In the past they have also discussed how to leverage certification of ISO 27001/27701 in the … Continue reading

Posted in Cyber Law | Leave a comment

The Battle of Cognizant Vs Infosys

In 2016, we saw a case being filed on TCS in USA (Tata America International Corp) when EPIC Systems filed a suit to recover uS$940 million. The US Supreme Court upheld the claim of Epic to the extent of $140million. … Continue reading

Posted in Cyber Law | Leave a comment

AI Enabled Data Analytics and DPDPA Risk.. DGPSI..3

One of the hallmarks of DGPSI (Digital Governance and Protection Standard of India) is that it recommends a “Process Based Approach” to compliance and an aggregation to arrive at the “Enterprise Level Compliance”. In other words, the DGPMS (Digital Governance … Continue reading

Posted in Cyber Law | Leave a comment

Overlapping Signatures in Government Documents

Today I came across an interesting observation related to Government Gazette Notifications issued in electronic form. The notifications are signed by different officials of a department authorized to issue a direction. The PDF files issued as Gazette Notifications are however … Continue reading

Posted in Cyber Law | Leave a comment

Towards DPDPA Compliance…What is DGPSI?..2

DGPSI stands for Digital Governance and Protection Standard of India. It is designed as a framework for compliance for setting up DGPMS or Digital Governance and Protection Standard of India. Just as we refer to ISMS in the context of … Continue reading

Posted in Cyber Law | Leave a comment