Search Results for: net4india

Is Net4India closing its operations?

For some time now I have been trying to reach out to Net4India for some of my services and I am finding that the Company seems to have gone silent on customer interactions. I have observed technical glitches because of … Continue reading

Posted in Cyber Law | 41 Comments

IRCTC Innovation Curbed out of ignorance and media Pressure

IRCTC has many customer complaints and even the undersigned has pointed out several deficiencies in their services some times on this website itself. However this does not mean that we need to oppose whatever IRCTC does. We therefore need to … Continue reading

Posted in Cyber Law | Leave a comment

IRCTC Should not become another scam like CIBIL

(Continued from the previous article) The initial reactions from the market on the IRCTC tender document which spoke of appointing a consultant to study and implement a “Data Monetization” policy was to suggest as if IRCTC is about to loot … Continue reading

Posted in Cyber Law | Leave a comment

Telecom Regulations-Public Comments

The Government of India has released a press note as follows: Inviting comments on the Consultation Paper on ‘Need for a new legal framework governing Telecommunication in India’ Legal framework for telecommunication in India is governed by Laws which were … Continue reading

Posted in Cyber Law | Leave a comment

Is PayU in serious non compliance of ITA 2000? What is CERT-In or RBI doing?

PayU is a significant player in the online payment settlement system in India. It was one of the earliest payment gateways and took over significant market share from CCAVENUE. However, of late some thing has happened to this Company.  It … Continue reading

Posted in Cyber Law | Leave a comment

When Ransomware terrorists know the value of data why not Accountants?

Data was called “Oil” because it was recognized as having immense value to the business. There are organizations where data is a by product and there are also organizations where data is the finished product. Whenever a ransomware attacker demands … Continue reading

Posted in Cyber Law | Leave a comment