Rohit Ranjan Praveer
-
Can’t we just hack back China, if they hack us? Here’s what the law says.
This article goes on to discuss the cybersecurity issues and the ways India could hack back China if they hack…
Read More » -
MHA Warns Against Zoom: should you continue to use it?
The article categorically discusses on the growing use of 'Zoom' application for video conferencing and meetings and the safety tis…
Read More » -
Voice Samples (Part II) : Is the Supreme Court Too Late to the Party?
The following is the second article pertaining to voice samples which discusses the technique of voice identification and its application…
Read More » -
Voice Samples: Acting on the Legislative Inaction
The following article discusses the technique of voice identification and its application which recently came to picture in the case…
Read More » -
Merger, Scenes a Faire and Public Domain : Tests of Source Code Comparison
This Article is third in the series on Source Code Comparison. The first article can be accessed here and the…
Read More » -
The Substantial Similarity Test : Tests of Source Code Comparison
This article is second in the series on Source Code Comparison. The first article can be accessed here and read…
Read More » -
From General to the Specific: Source Code Comparison
From its beginning, the law of copyright has developed in response to significant changes in technology.” [Sony Corp. v. Universal…
Read More »