12 Things Future Lawyers Must Know Today
Money and technology are changing at an amazing speed. Don't be an outdated lawyer; become a future lawyer! 1. Artificial Intelligence and Future Law Artificial Intelligence AI is the ability…
Money and technology are changing at an amazing speed. Don't be an outdated lawyer; become a future lawyer! 1. Artificial Intelligence and Future Law Artificial Intelligence AI is the ability…
Fintech Law is the regulatory ecosystem and legal framework governing the multi-trillion-dollar financial technologies (fintech) sector. Fintech Law comprises 100+ laws and multiple regulators, tribunals, enforcement agencies, pooled investment schemes,…
Introduction 2020 has been one of the most unpredictable years in history. The coronavirus and economic lockdowns have changed every human life. What then has changed for cyberlaw careers? Who…
We always feel that in order to hack any computer, it is necessary that the hacker contact the computer some way. But this is not true. We do not run…
सोशल इंजीनियरिंग हमें हमेशा लगता है कि किसी भी कंप्यूटर तो हैक करने के लिए हैकर का उससे किसी तरह से संपर्क करना ज़रूरी है। लेकिन यह सच नहीं है।…
Most people, when asked what a trademark is, will turn around and call out the logos of various companies. The truth of the matter is that it is a mark…
Malaika G. Naidu Passwords. The basis of cyber safety. From entertainment to e-commerce, all our activity online is secured through combinations of letters, numbers and special characters that we put…
WIPO PROOF - Introduction Innovation and creation in today's highly digitised world are activities that are often global and team based. Each such process creates tonnes of data files that…
Cyber Grooming: The internet can be a fantastic place for children and youngsters to connect with their friends to learn new things and also educate themselves. However, online friends may…
फ़िशिंग - संक्षिप्त परिचय: फिशिंग साइबर अपराध का सबसे आसान रूप है जिसे एक अपराधी अंजाम दे सकता है। यह स्कैमर को वह सभी चीज़ें प्रदान कर सकता है, जिनके…
What is Cyber Law? What does it mean to be a cyber lawyer? What do you need to learn? Here's a 5-minute guide to a career in Cyber Law.
संक्षिप्त परिचय ऐप्पल आईडी हैकिंग क्या है? आपका ऐप्पल आईडी ऐप्पल की दुनिया में आपका पासपोर्ट है, जिसमें केवल एक पासवर्ड के साथ कई शानदार एप्लिकेशन और सेवाओं को अनलॉक…
The Securities and Exchange Board of India (Collective Investment Schemes) Regulations, 1999 was enacted in order to provide the procedures connected to matters of collective investment schemes. Brief History of…
The Securities and Exchange Board of India (Credit Rating Agencies) Regulations, 1999 were enacted to provide the procedure for credit rating agencies. Brief History of the Regulations The Securities and…
The Securities and Exchange of India (Debenture Trustees) Regulations, 1993 have been enacted to provide procedures and rules for debenture trustees. Brief History of the Regulations The Securities and Exchange…
The Securities and Exchange Board of India (Foreign Portfolio Investors) Regulations, 2019 have been enacted to provide the procedures and rules related to foreign portfolio investors. Brief History of the…
The Securities and Exchange Board of India (Intermediaries) Regulations, 2008 have been enacted to provide rules and procedures for intermediaries. Brief History of the RegulationsThe Securities and Exchange Board of…
The Securities and Exchange Board of India (International Financial Services Centres) Guidelines, 2015 has been enacted to provide regulations, procedures, and guidelines for international financial services centres and for other…
The Securities and Exchange Board of India (Custodian of Securities) Regulations, 1996 provide the procedure for custodian of securities and related matters. Brief History of the Regulations The Securities and…
The Securities and Exchange Board of India (Buy-Back of Securities) Regulations, 2018 regulates the buy-back of securities. History of the Regulations The Securities and Exchange Board of India (Buy- Back…
The Securities and Exchange Board of India (SEBI) has issued the Master Circular for Debenture Trustees in order to compile all the existing and applicable circulars on the topic for…
The SEBI (Alternative Investment Funds) Regulations, 2012 has been enacted to provide the various procedures and compliances that are associated with alternative investment funds in India. Brief History of the…
This Circular was issued by the Securities and Exchange Board of India (SEBI) to clarify the procedure in relation to Know Your Client (KYC) processes, procedures and uses of technology…
The Companies (Share Capital and Debentures) Rules, 2014 has been enacted to provide procedures for share capital and debentures. These rules apply on the following- All unlisted public companies.All private…
The Companies (Prospectus and Allotment of Securities) Rules, 2014 provides procedures, rules, and regulations for prospectus and allotment of securities. Brief History of the Rules The Companies (Prospectus and Allotment…
The Companies (Issue of Global Depository Receipts) Rules, 2014 prescribes the procedure and conditions for the issue of global depository receipts. Brief History of the Rules The Companies (Issue of…
The Depositories Act, 1996 regulates the depositories in securities in India. Brief history The Depositories Act, 1996 was first introduced before the Lok Sabha on 11/07/1996 as the Depositories Bill,…
From the privacy of your personal data stored with Aadhar to your online movie booking. From your child’s Instagram posts to your demat share trading account. From the legality of…
The Securities Appellate Tribunal (Procedure) Rules, 2000 govern the functioning of the Securities Appellate Tribunal of India. Brief History of the Rules The Securities Appellate Tribunal (Procedure) Rules, 2000 were…
The Securities Contracts (Regulation) Rules, 1957 prescribe various provisions for stock exchanges in India. These Rules prescribe various provisions for stock exchanges in India including; recognition fees for application for…
The Securities and Exchange Board of India Act, 1992 setup SEBI to promote & regulate the securities market and to protect the interests of investors. The Securities and Exchange Board…
This short comic is designed to help youngsters navigate some of the dangers in cyberspace. The comic is available in 4 languages - English, Hindi, Marathi, and Spanish. Trouble on…
A 15-year-old girl courts a 16-year-old boy through a popular social network. The boy runs away from home to Mumbai only to find out that the girl was, in fact,…
Interesting cases Data collected from a smartwatch worn by a 57-year old Australian murder victim led to the arrest of her daughter-in-law. (Details)Data recorded in Apple’s Health App led to…
The Securities Contracts (Regulations) Act, 1956 (SCRA) aims "to prevent undesirable transactions in securities by regulating the business of dealing therein". The SCRA defines critical terms including derivatives, securities, specific,…
This is the guide to the Cyberlaws of Antigua and Barbuda, Australia, Bahamas, Canada, Commonwealth, Council of Europe, GCC countries, Jamaica, Japan, Malaysia, Mauritius, Nigeria, Singapore, Trinidad & Tobago, UK,…
In common language, the term Act is synonymous with the terms legislation, statute, and law. The Constitution of India specifies issues for which only the Central Government can make laws…
The Fugitive Economic Offenders Act, 2018 prohibits "fugitive economic offenders" from avoiding the legal process before Indian courts by absconding and staying in foreign nations. Download: Fugitive Economic Offenders Act,…
Before debating whether artificial intelligence is a threat or just a tool, we need to understand what artificial intelligence is. Is it something of the future or does it already…
Follow these 5 steps to create a super-strong password in 30 seconds: Choose a book. Any book will do.Open any page.Pick the first 4 or 5 words on the page.Simply…
If you are an Intellectual Property Lawyer / Professional, you will find these websites very useful. These websites are divided into 3 categories - International IP Services, International Databases, and Others.
Malaika Naidu Internet of Things, or IoT, refers to a whole network of physical devices around the world that are connected over the internet, capable of collecting and sharing data.…
Malaika G. Naidu Fake News. Sensationalism. Misreporting. In the last couple of years, the digital world has witnessed a growing trend in the amount of false information that is published.…
Follow these 8 quick tips for securing your home WiFi: Use WPA2 security encryption.Change your router password every week.Change your WiFi password every week.Change your SSID to something weird and…
Follow these 11 tips for safe social media usage: Remember that everything you post on a social networking site may be permanent and available to the world FOREVER - photos,…
Follow these 6 quick tips for keeping your passwords safe: Your passwords should be complex and difficult to guess. Ideally, they should be at least 10 characters long and should…
Follow these 12 quick tips for securing your smartphone: Use a strong password instead of a 4 or 6 digit PIN.Ensure that the device automatically locks itself if unused for…
There is no doubt that cybercrime is an ongoing and very real threat. The first thing that comes to mind when most people read cybercrime is financial fraud and data…
Use the same ATM machine for your transactions. You should become familiar with the machine so that you can recognize changes to the machine.Use ATM machines located inside banks rather…
Follow these 12 quick tips for securing your computer Keep your operating system, browsers, and all installed software up-to-date (especially software from Microsoft, Adobe, Oracle and Java).Do NOT use pirated…
Do you use eBanking? If yes then keep these 13 quick tips in mind: 1. Connect to your bank website using a device (laptop, smartphone, tablet, etc.) that has the…
You can love Facebook or you can hate it. But you can't ignore it. And nothing proves it better than these crazy Facebook crimes. Dylan Osborn was sentenced to 10…
Malaika Naidu Torrenting is one of the most popular methods of procuring movies, music, books, games, etc. from the internet. Every day, millions of gigabytes of data are downloaded through…
Malaika Naidu A major hype word and internet trend today is data privacy. Add to this the vulnerability brought in by excess use of social media and the integration of…
Malaika Naidu The most valuable resource today is not oil, water or fresh air – it’s data! An article in The Economist recently outlined just how valuable this resource is…
The relationship between law and technology forms a strong basis for discussion and debate. Both are intertwined, and any discussion would be incomplete without acknowledging the other. Any conversation…
Antony Clement Rubin and Janani Krishnamurthy were until recently unknown names in the field of law. Then they went to town questioning our very understanding of privacy. They filed…
We all know that cybercrime is a reality and it only growing with every passing day. With the deep penetration of smartphones into major markets across the world, we’re…
In 2017, 2 billion data records were compromised, followed by more than 4.5 billion records in just the first half of 2018. With every passing year, and at an…
1. End-point security Endpoint security requires that each computing device on the network comply with certain standards before network access is granted. Endpoints include laptops, desktops computers, smartphones, and other…
On 23 May 2016 we organized the Future Money Conference (India). Sponsored by IBM and Contact Singapore, this was India’s first conference on Virtual Currencies, Blockchain and Fin-Tech. Delegates were…
While the proponents of "Net Neutrality" bring out their expensive champagne and caviar, yesterday's Telecom Regulatory Authority of India (TRAI) regulations actually make it very easy and cheap for service…
The year 2014 saw some of the world's largest institutions fall prey to cyber crime - JP Morgan Chase, Sony, AT&T, eBay, Google, Apple, Dairy Queen International, Domino's Pizza and…
Section 66A of the Information Technology Act (IT Act) was much debated (and hated) primarily because it was seen as being against “freedom of speech” and also because it used…
On 1st August 2011, Asian School of Cyber Laws submitted its recommendations to the Director, Department of Information Technology, Ministry of Communication & Information Technology, Government of India. Vishal Kumar…
The Information Technology (Amendment) Act, 2008 has come into force on 27th October 2009. Nine years after the birth of cyber laws in India, the new improved cyber law regime…
Asian School of Cyber Laws (ASCL) has been associated with and is assisting the Department of Information Technology, Ministry of Communications and Information Technology, Government of India in framing draft…
The ECommerce & Development Report 2003 recently published by the United Nations Conference on Trade and Development has quoted the findings of the Computer Crime and Abuse Report (2001-02) published…
The Indian Information Technology Act, 2000 (hereinafter referred to as "the Act") is one of the most important pieces of legislation in the recent past. This statute reaffirms India’s commitment…
Adjudicating Officers, who will be deciding the fate of multi-crore rupees cyber crime cases, have finally been appointed for all Indian States. Although, the Indian Cyber Law i.e. the Information…