From an outright ban on cryptocurrencies in 2016 to an upcoming Bill for regulations. Over the past few years the Government's stance on digital assets has changed. Currently, there is no regul...
Research Objectives: To find out the history and emergence of data privacy laws. To compare and analyze the data privacy laws in India and other countries. To research the need and effec...
In computing, phishing is a form of social engineering, characterized by attempts to fraudulently acquire sensitive information, such as passwords and credit card details, by masquerading as a ...
Today we are living in a digital world so we can't avoid the use of internet from our day today life especially in this covid pandemic situation. Earlier Internet was used for governmental purp...
When it comes to territorial conflicts, Indian-Chinese ties have traditionally made headlines. Chinese troops entered Indian territory unlawfully and attempted to seize the disputed area, which...
Before discussing on the given topic and expressing our views on it, we should be well versed with the terms 'Artificial Intelligence' and 'Legal Personhood'. The ability of a robot controll...
One may very easily get absorbed in the lives of others as one scrolls through a Facebook news feed, Instagram images, or even Snapchat tales, which are all readily available to see. With its o...
Assuming we fabricate a rundown of things that are forbidden in India, we'll track down a great deal of things, however the restriction on over digital media material would be an inquisitive ex...
A History Of Cyber CrimeWe have learnt to place a great deal of faith in computer systems since they have become a vital part of the everyday operations of corporations, organisations, governme...
In the 1960s, the development of the internet was a watershed moment. Although the internet was originally designed for military objectives, we had no idea that it would grow swiftly and become...