Data securityTechGig.com Courtesy: TechGig.com
20 July 2022

India’s Data Security Challenges

India’s technology industry grew 15.5% during the pandemic, and so have the cyber-attacks on critical infrastructure and stealing of intellectual property (IP). While an exhaustive data protection bill introduced by MeitY is under consideration, India must study and can benefit from Japan’s existing data protection law to protect consumer privacy and implement cybersecurity measures.

a model for global data regulation Courtesy: Shutterstock
31 March 2021

A model for global data regulation

Individuals now generate copious amounts of personal data everyday – both online and offline. Devices and infrastructure extract data, which can be shared instantly across borders with diverse entities - without consent. It is imperative that countries come together to create regulations to protect individuals who are unable to control how their data is shared and processed. A model already exists in the Paris Climate Agreement.

shutterstock_1540336541 Courtesy: Shutterstock
9 April 2020

Cybersecurity and privacy in the COVID-19 era

COVID-19 and remote working have resulted in a surge in demand for digital intermediaries, such as Zoom. Most of these are U.S.-based, with some having servers in China, which has aggravated privacy concerns. IT companies have responded quickly by fortifying themselves internally through a range of measures, but it is now time for India’s highly accomplished tech industry to devise secure, scalable platforms with India-based servers

Jorhat :Polling officer checking electronic voting machine (EVM) and documents after collecting from the respective center  on the eve of the 1st phase of Assam State Assembly election 2016 at Jorhat in Assam on Sunday. PTI Photo(PTI4_3_2016_000067A) Courtesy: PTI
18 April 2019

The cyber security imperative for India’s elections

The growing use of technology in the election process has made cyber security a crucial issue. Instances of the spread of fake news, manipulation of voter behaviour and hacking show how digital technology can be misused. These issues need to be addressed in the long term