Search Results for: theory of data

Data as a class of property

On different occasions we have discussed the implication of “Data” as a property class. The early discussions on “Data” as a property in legal circles was around the property of “Domain Name”. It was one of the first “Pure Virtual … Continue reading

Posted in Cyber Law | Leave a comment

When Ransomware terrorists know the value of data why not Accountants?

Data was called “Oil” because it was recognized as having immense value to the business. There are organizations where data is a by product and there are also organizations where data is the finished product. Whenever a ransomware attacker demands … Continue reading

Posted in Cyber Law | Leave a comment

Naavi’s Data Valuation Model

We all use the term “Data is an Asset” and many companies have structured their business around data analytics. But very few companies have developed a method with which we can value the data and represent it in our disclosed … Continue reading

Posted in Cyber Law | Leave a comment

Air India Personal Data Breach.. The value for disinvestment might have increased !

Air India has made an announcement that it’s Passenger Service System was attacked and personal data of about 45 lakh data subjects have been compromised. The leaked data elements include Name, Data of Birth, Contact Information, Passport information, ticket information, … Continue reading

Posted in Cyber Law | Leave a comment

Fascinating Data Pasture at the other end of the PDPAI Warp

It is a common cliché to say “Data is Oil”. For those who look at Data from the eyes of Facebook or Google, it is easy to understand why Data is a mouth watering business asset with huge profit prospects. … Continue reading

Posted in Cyber Law | 1 Comment

Anonymisation is the boundary between Personal Data and Non Personal Data

P.S: This is a long post and addresses multiple objectives. Firstly it responds to a report which appeared in Medianama.com on what transpired at the JPC deposition to correct some misconceptions. Secondly it tries to explain the difference between de-identification … Continue reading

Posted in Cyber Law | 1 Comment