Articles
CYBER LAW
- Not just apps, Chinese phones, cams and other devices too can steal Indians’ data: Pavan Duggal
- Cyber law In India: The Information Technology Act 2000 – Some Perspectives
- Section 66A OF IT Act – your friend or foe?
- Social Media and Indian Cyber law
- Has the BPO industry hit a speed-breaker?
- Hidden camera and law
- TATA WINS DOMAIN NAME “TATA.ORG
- A direct impact on free speech in cyber space
- Cyber law And Data Security
- THE LEGAL view on Data Centres
- Legislate Privacy, At Least
- Telecommunications Convergence Law in India – A Critique
- Indian Legal Response to Cyber Security
- Does the UID project infringe on privacy?
- Think again before you post
- Cyber Law – Global Trends in 2014
- If all goes well, Indian IT Act may enter 21st century
- How online privacy is linked to your pocket
- India to issue advisory against child pornography
- Don’t let technology become your master: Justice Grover to students
- Legislative language must ensure balance between curbing rights and protecting them: Pavan Duggal
- India lacks laws to protect customers of digital transactions: Experts
- ‘Why were stricter laws not invoked against café owners?
- No laws in India to protect customers if they lose money during digital transactions
- Bringing cyber security to the fore
- No laws in India to protect customers if they lose money during digital transactions
- Indian Android smartphone are at data theft risk: Experts
- Dev 360: To go cashless, win people’s trust first
- Go Digital Drive Brought Cyber Security To The Fore In India
- Delhi cops to get ‘one touch’ internet monitoring system
- Indian Android smartphone users too at data theft risk: Experts
- Digital economy needs stricter cyber laws
- No laws in India to protect customers if they lose money during digital transactions
- Apple and Google to encrypt smartphones in India with Aadhaar
- Why virtual reality will redefine porn
- Next up for DigiLocker integration: PAN card and private service providers
- Why we need a digital heir after death (Tech Trend)
- Who leaked Udta Punjab online?
- PORN: Reliance Jio, Airtel, RCom, Vodafone, Telenor mull parental firewall for parents
- Australia’s new data breach disclosure laws have a rather floppy definition of ‘breach’
- How Europe Can Fight Cyber Attacks (And Win)
- Clinton vs Trump: Here’s How Symantec Simulated a Cyberattack on US Presidential Election
- New FBI release on Clinton email probe refers to ‘Shadow Government’
- Internet providers claim cyber attack, to meet senior cop
- The CIA is Preparing for a Major Cyberattack Against Russia
- Laws to tighten privacy after data breach
- TalkTalk hit with record fine for cyber attack
- SEC May Use Yahoo Case to Set Data Breach Disclosure Rules
- Yahoo, LinkedIn, Apple iCloud: 10 Big Data Breaches
- “Hacked” e-mail account of White House worker exposed in 2013 password breach
- Couple’s bank account drained by thieves using recent Wendy’s data breach
- Michelle Obama data breach: purported scan of first lady’s passport appears online
- Bank informs RBI of security breach: Axis suffers cyber attack, hires EY to probe damage
- Cyber crime cell for ransomware cases soon
- European ATM cyber-attacks up 28%, those using dynamite up 30%
- Smart home devices used in cyberattack on tech writer’s site
- Teenager appears in court over TalkTalk cyber-attack
- German politicians faced cyberattack: report
- N-power plant disrupted by cyber attack, says IAEA
- UK finance groups face surge in cyber attacks
- Air Force general: F-16s may be vulnerable to cyber attack
- Two Teenagers Arrested for Massive Cyber Attack that Targeted Illinois Businesses
- Hackers Hijack ‘Smart Devices’ for Huge Cyberattack
- Hacked by your fridge: the Internet of Things could spark a new wave of cyber attacks
- BAE Systems: A cyber attack could cost your business £1 million
- Singapore sees spike in number of cyberattack-for-ransom cases
- German military carried out first foreign cyber-attack in Afghan hostage op – report
- The dark web marketplace where you can buy 200 million Yahoo accounts is under cyberattack
- Medical Devices Are Vulnerable to Cyberattack
- Energy sector sees increase in cyber-attacks
- Virtual Safety: Cyber security in AR/VR games
- FBI probes hacks targeting phones of Democratic Party officials: sources
- Australian Bureau of Meteorology hacked by foreign spies, cybersecurity report reveals
CYBER CRIME
- Cyber crime Cyber crime Everywhere- no place to hide
- Our cyber cells are not equipped to deal with cyber crime
- Tackling Cyber Crimes – Need for Stringent Laws
- Theft of ATM password attracts IPC and cyber law
- India: Terrorism And Cyber crime
- Your cyber crime-friendly legislation
- A warning against the Internet’s dangers
- India: Terrorism And Cyber crime
- Indian Blackout – Some legal perspectives
- Trump Organization’s ‘problematic’ cybersecurity risks email hack — report
- Canada’s cybersecurity strategy is anemic: expert
- Cybersecurity Stocks’ Q3 Results: What to Look For
- Smart Grids Aren’t Secure, Survey Says
- Cloud Security Replacing Cybersecurity Industry, Says Analyst
- Slovak Finance Ministry drafts country’s first cyber–security law
- Workers in London’s financial centre are being bombarded with ransomware
- These free ransomware decryption tools have rescued data from 2,500 locked devices
- European ransomware initiative gains 13 new member countries
- Ransomware scam being spread through fake bill
- Kaspersky Cybersecurity: Strengthening govt initiatives, enterprise and cyber insurance
- Chief Economic Advisor’s twitter account hacked
- New draft of cyber response plan nearly ready for release
- US and Russia headed for new cold war
- The Cyber-War on Wikileaks
- China’s Cyber And Trade War: Its Threat To National Security
- Cybercrime and Fraud Cost UK £10.9 Billion in a Year
- Cybercrime as a Service: Europol Hints at Militants Using Darknet
- Cyber crime in South Africa – top of the agenda for CFOsG7 Nations Plan To Team Up To Tackle Financial Cybercrime
- Cybercrimes rule high, but no chief at tribunal for 5 years
- Business rivals commit most cyber crimes
- Southern states most net-savvy but Maharashtra tops in online fraud
- Security concerns on transactions increase as residents go cashless
- Jamia organises seminar on cyber crime
- IRCTC hacking: Railways claims no leakage of ‘sensitive’ data
- ‘Go digital’ drive brought cyber security to the fore in India
- Cyber security is a major concern in transactions
- Cyber Security: How Rahul, Congress Twitter accounts may have been hacked
CYBER TERRORISM
TECHNOLOGY
SOCIAL MEDIA
- Facebook, Speech & Indian Cyber law
- Think again before you post
- Social Media and Indian Cyber law
- Covering act Social Media & Section 66A of Indian Cyber Law
FINANCIAL CHRONICLES
- Indian cyber law miles behind the realities of social media
- Internet has no alternative
- Legal challenges in cyber world
- Hidden camera and law
BRIEF CASES @THE ECONOMIC TIMES
- Indian pop stars attract cyber squatters too
- The strain of setting online music store
- Data theft on BPOs
- Selling clean Flicks could be a dirty business
- Digital signature is not catching on
- How valid are e-records of board meetings?
- Due Diligence will help limit any liabilities
INTERMEDIARIES
INFORMATION TECHNOLOGY
- The Information Technology Act, 2000 – Some Perspectives.
- Cyberlaw-2001: Two dramatic developments
- The Information Technology Act
- INDIA’S INFORMATION TECHNOLOGY ACT, 2000
- IT Act assigns undue powers to the police
- We are not keeping up pace
CYBER SPACE
- Cyber law trends of 2010
- Cyber deterrence
- Theft of ATM password attracts IPC and cyberlaw
- India does not need ‘web-cops’
- Internet ruling opens Pandora’s box for online publishing industry
- Protecting the Virtual Cob-Web
TELECOM
BPOs
- Wake up call to Indian BPOs
- Legal issues related to outsourcing in India
PRIVACY
AADHAAR
TECHNOLOGY
ON 66A
- Year 2012 and Section 66A of Indian Cyberlaw, The Economic Times January 9, 2013
- Pavan Duggal via Live Web Chat on the essence of Sec 66A of the Information Technology Act.
- 66A- “Friend or Foe?”
- A Great Service To The Cause Of Free Speech
- IT Leaders, Lawyers Welcome SC Ruling on 66A of the IT Act