Image
  • Home
  • Blog
  • Case Summaries
  • Services
    • Workshops
  • About
    • About Us
    • Objectives
    • Our Achievements
    • My Cyber Crime Story
    • Team

Technology. Law. Policy. You

For all things cyber

India’s evolving data privacy jurisprudence – It’s 2019 and we’re missing the point!

Nitish ChandanDecember 27, 2018Cyber Security, Law

India's evolving data privacy jurisprudence - It's 2019 and we're missing the point!

Much has been said already about the recent order of the MHA under Section 69 of the IT Act notifying ten agencies to “intercept, monitor or decrypt” “information generated, transmitted, received or stored” in any computer resource. While it is … Read More

How to protect yourself from ransomware data loss?

Nitish ChandanMay 22, 2017Cyber Security

No, anti-ransomware is not going to protect you. Neither is a high end firewall, nor a sophisticated software. I know of cases of theft of data where victims have been across all possible domains. Defense personnel, Techies, Lawyers and Security … Read More

Data Classification: The Remedy to Data Breaches

Arpan SinhaJune 12, 2016Cyber Security

data classifiation, data breaches, theft, cybersafety,

Millions are spent upon setting up security tools like sandboxes and endpoint tools, but what many companies neglect is a proper classification of how the data stored within company’s databases is managed, and who has the rights to access these … Read More

  • Page 2 of 2
  • ←
  • 1
  • 2

Our recent posts

  • Obscene or Offensive? The Perils of Vague Content Rules in India
  • The Online Storm over Mohak Mangal v. ANI
  • Rule 14: The Digital Iron Curtain on Cross-Border Data Transfers
  • AI and the Grey Areas of Indian Copyright Law
  • When what appears to be Cyber Squatting is not exactly Cyber Squatting

Reach out to us for assistance!

Email: contact@cyberblogindia.in
WhatsApp: +91 9340337396

In case of an offence against a woman/girl, for the sake of comfort, the victim/survivor may put forth a special request to get in touch with a female team member to assist her.

Guest Post Guidelines are available here. 

  • Home
  • Blog
  • Case Summaries
  • Services
    • Workshops
  • About
    • About Us
    • Objectives
    • Our Achievements
    • My Cyber Crime Story
    • Team