Analysis of JPC report on Data Protection Bill 2019: Data Localisation

Analysis of JPC report on Data Protection Bill 2019: Data Localisation Data Localisation can be […]

[pods][pod_sub_template seq="0" pod="post" id="2874" field="pdf_file" index="{_index}"]DQoJDQogICA8b2JqZWN0IGRhdGE9IntAcGRmX2ZpbGUuX3NyY30iIA0KICAgICAgICAgICAgICAgIHdpZHRoPSIxMDAlIiANCiAgICAgICAgICAgICAgICBoZWlnaHQ9IjYwMCI+IA0KICAgICAgICA8L29iamVjdD4NCgkNCgk8YnI+DQoJDQoJ[/pod_sub_template][/pods]
Read more

Dissolved Encryption Standards: Impact on Trade and Businesses

Dissolved Encryption Standards: Impact on Trade and Businesses (This blog post is fourth in series […]

[pods][pod_sub_template seq="0" pod="post" id="2863" field="pdf_file" index="{_index}"]DQoJDQogICA8b2JqZWN0IGRhdGE9IntAcGRmX2ZpbGUuX3NyY30iIA0KICAgICAgICAgICAgICAgIHdpZHRoPSIxMDAlIiANCiAgICAgICAgICAgICAgICBoZWlnaHQ9IjYwMCI+IA0KICAgICAgICA8L29iamVjdD4NCgkNCgk8YnI+DQoJDQoJ[/pod_sub_template][/pods]
Read more

S. 69 of the Information Technology Act and the Decryption Rules : Absence of adequate procedural safeguards

S. 69 of the Information Technology Act and the Decryption Rules : Absence of adequate […]

[pods][pod_sub_template seq="0" pod="post" id="2861" field="pdf_file" index="{_index}"]DQoJDQogICA8b2JqZWN0IGRhdGE9IntAcGRmX2ZpbGUuX3NyY30iIA0KICAgICAgICAgICAgICAgIHdpZHRoPSIxMDAlIiANCiAgICAgICAgICAgICAgICBoZWlnaHQ9IjYwMCI+IA0KICAgICAgICA8L29iamVjdD4NCgkNCgk8YnI+DQoJDQoJ[/pod_sub_template][/pods]
Read more

Encryption: Political Mythology and Technical Reality – Decrypting the Encryption debate in India.

Encryption: Political Mythology and Technical Reality – Decrypting the Encryption debate in India Embedded in […]

[pods][pod_sub_template seq="0" pod="post" id="2847" field="pdf_file" index="{_index}"]DQoJDQogICA8b2JqZWN0IGRhdGE9IntAcGRmX2ZpbGUuX3NyY30iIA0KICAgICAgICAgICAgICAgIHdpZHRoPSIxMDAlIiANCiAgICAgICAgICAgICAgICBoZWlnaHQ9IjYwMCI+IA0KICAgICAgICA8L29iamVjdD4NCgkNCgk8YnI+DQoJDQoJ[/pod_sub_template][/pods]
Read more

What – Why – How Encryption?

What – Why – How Encryption? Table of content – What is Encryption? Why should we […]

[pods][pod_sub_template seq="0" pod="post" id="2845" field="pdf_file" index="{_index}"]DQoJDQogICA8b2JqZWN0IGRhdGE9IntAcGRmX2ZpbGUuX3NyY30iIA0KICAgICAgICAgICAgICAgIHdpZHRoPSIxMDAlIiANCiAgICAgICAgICAgICAgICBoZWlnaHQ9IjYwMCI+IA0KICAgICAgICA8L29iamVjdD4NCgkNCgk8YnI+DQoJDQoJ[/pod_sub_template][/pods]
Read more

Right to Encrypt : Subset of Right to Privacy?

Right to Encrypt : Subset of Right to Privacy? (This blog post is third in […]

[pods][pod_sub_template seq="0" pod="post" id="2837" field="pdf_file" index="{_index}"]DQoJDQogICA8b2JqZWN0IGRhdGE9IntAcGRmX2ZpbGUuX3NyY30iIA0KICAgICAgICAgICAgICAgIHdpZHRoPSIxMDAlIiANCiAgICAgICAgICAgICAgICBoZWlnaHQ9IjYwMCI+IA0KICAgICAgICA8L29iamVjdD4NCgkNCgk8YnI+DQoJDQoJ[/pod_sub_template][/pods]
Read more

Weakened encryption and its impact on federated FOSS and SaaS services vis-a-vis right to trade and profession

Weakened encryption and its impact on federated FOSS and SaaS services vis-a-vis right to trade […]

[pods][pod_sub_template seq="0" pod="post" id="2835" field="pdf_file" index="{_index}"]DQoJDQogICA8b2JqZWN0IGRhdGE9IntAcGRmX2ZpbGUuX3NyY30iIA0KICAgICAgICAgICAgICAgIHdpZHRoPSIxMDAlIiANCiAgICAgICAgICAgICAgICBoZWlnaHQ9IjYwMCI+IA0KICAgICAgICA8L29iamVjdD4NCgkNCgk8YnI+DQoJDQoJ[/pod_sub_template][/pods]
Read more

Encryption: Political Mythology and Technical Reality – Decrypting the Encryption debate in India.

Encryption: Political Mythology and Technical Reality – Decrypting the Encryption debate in India.   Embedded […]

[pods][pod_sub_template seq="0" pod="post" id="2832" field="pdf_file" index="{_index}"]DQoJDQogICA8b2JqZWN0IGRhdGE9IntAcGRmX2ZpbGUuX3NyY30iIA0KICAgICAgICAgICAgICAgIHdpZHRoPSIxMDAlIiANCiAgICAgICAgICAgICAgICBoZWlnaHQ9IjYwMCI+IA0KICAgICAgICA8L29iamVjdD4NCgkNCgk8YnI+DQoJDQoJ[/pod_sub_template][/pods]
Read more

Impact of the traceability provision on the privacy of Indian citizens

Impact of the traceability provision on the privacy of Indian citizens This blog post is […]

[pods][pod_sub_template seq="0" pod="post" id="2804" field="pdf_file" index="{_index}"]DQoJDQogICA8b2JqZWN0IGRhdGE9IntAcGRmX2ZpbGUuX3NyY30iIA0KICAgICAgICAgICAgICAgIHdpZHRoPSIxMDAlIiANCiAgICAgICAgICAgICAgICBoZWlnaHQ9IjYwMCI+IA0KICAgICAgICA8L29iamVjdD4NCgkNCgk8YnI+DQoJDQoJ[/pod_sub_template][/pods]
Read more

Roundtable on Encryption, September 3rd, 5:00 PM-6:30 PM

Roundtable on Encryption, September 3rd, 5:00 PM-6:30 PM On September 3rd, 2020, Software Freedom Law […]

[pods][pod_sub_template seq="0" pod="post" id="2593" field="pdf_file" index="{_index}"]DQoJDQogICA8b2JqZWN0IGRhdGE9IntAcGRmX2ZpbGUuX3NyY30iIA0KICAgICAgICAgICAgICAgIHdpZHRoPSIxMDAlIiANCiAgICAgICAgICAgICAgICBoZWlnaHQ9IjYwMCI+IA0KICAgICAgICA8L29iamVjdD4NCgkNCgk8YnI+DQoJDQoJ[/pod_sub_template][/pods]
Read more