technology
-
Geopolitics of Technology: Blood Gadgets
rare earth elements are special minerals and are a crucial ingredient in many of our electronic products. They contain unique…
Read More » -
Understanding China’s Data Security Law
The Data Security Law was passed by the 29th session of the standing company of the People's Republic of China.…
Read More » -
Understanding Proof of Stake
Proof of Stakе (PoS) is an alternative to Proof of Work (PoW) as it is more energy-efficient. Although the objective…
Read More » -
Cybersecurity in India: From attacks on Infrastructure to Pant’s Rules
India is currently drafting its new Cybersecurity Rules under Lt. General (Dr) Rajesh Pant. The urge to fast-track Cyber Security…
Read More » -
The Indian Legal Landscape: A Safe Haven For FemTech Applications To Exploit User Data and Breach Privacy
Popular FemTech applications are rapidly gaining traction among urban women in India and this should worry the regulatory authority, but…
Read More » -
Settling the Debate Around the Unmonitored Exchange of Health Data: A Case Study from Around the World
The following article shall explore the various merits and demerits of unmonitored exchange of health data with reference to different…
Read More » -
Metacept Lecture Series [Lecture 2]
The second lecture of the Metacept Lecture Series will be conducted on the topic- Information, Technology, and Law for dummies.
Read More » -
Reflecting upon the legal framework for renewable energy in India
In India, the development of grid-interactive renewable power took flight with the inception of the Electricity Act, 2003 (EA). While…
Read More » -
Assessing Complexities in Intellectual Property Creation by Artificial Intelligence
Artificial Intelligence is evolving and has come to stay. The granting of rights to the machines or for that matter…
Read More »