Technology Law / Cyber Law
-
Understanding China’s Data Security Law
The Data Security Law was passed by the 29th session of the standing company of the People's Republic of China.…
Read More » -
Understanding Proof of Stake
Proof of Stakе (PoS) is an alternative to Proof of Work (PoW) as it is more energy-efficient. Although the objective…
Read More » -
Submarine Optical Fiber Cables and the Submerged Threats to Data Security in India
Prime Minister Narendra Modi inaugurated the much anticipated Rs.1,224-crore Chennai-Andaman & Nicobar (A&N) Undersea Internet Cable Network connected via Submarine…
Read More » -
Cybersecurity in India: From attacks on Infrastructure to Pant’s Rules
India is currently drafting its new Cybersecurity Rules under Lt. General (Dr) Rajesh Pant. The urge to fast-track Cyber Security…
Read More » -
Privacy-friendliness of Audio-only applications
Pandemic has seen the launch of several applications, including the one known as ‘Clubhouse’. The application is an audio discussion…
Read More » -
The Indian Legal Landscape: A Safe Haven For FemTech Applications To Exploit User Data and Breach Privacy
Popular FemTech applications are rapidly gaining traction among urban women in India and this should worry the regulatory authority, but…
Read More » -
Challenges in the Implementation of Facial Recognition Technology
With the coming of Facial Recognition Technology, which uses your face as your biometric identifier, the machine-human interaction, questions of…
Read More » -
The Legality of China’s Great Firewall: How Does the International Law Fare
The Internet became commercially available in China in 1995. Prior to 1995, the Communist party had planned not to legalise…
Read More »