Quick guide to Digital Evidence
Interesting cases Data collected from a smartwatch worn by a 57-year old Australian murder victim led to the arrest of her daughter-in-law. (Details)Data recorded in Apple’s Health App led to…
Interesting cases Data collected from a smartwatch worn by a 57-year old Australian murder victim led to the arrest of her daughter-in-law. (Details)Data recorded in Apple’s Health App led to…
In common language, the term Act is synonymous with the terms legislation, statute, and law. The Constitution of India specifies issues for which only the Central Government can make laws…
Follow these 5 steps to create a super-strong password in 30 seconds: Choose a book. Any book will do.Open any page.Pick the first 4 or 5 words on the page.Simply…
If you are an Intellectual Property Lawyer / Professional, you will find these websites very useful. These websites are divided into 3 categories - International IP Services, International Databases, and Others.
Follow these 8 quick tips for securing your home WiFi: Use WPA2 security encryption.Change your router password every week.Change your WiFi password every week.Change your SSID to something weird and…
Follow these 11 tips for safe social media usage: Remember that everything you post on a social networking site may be permanent and available to the world FOREVER - photos,…
Follow these 6 quick tips for keeping your passwords safe: Your passwords should be complex and difficult to guess. Ideally, they should be at least 10 characters long and should…
Follow these 12 quick tips for securing your smartphone: Use a strong password instead of a 4 or 6 digit PIN.Ensure that the device automatically locks itself if unused for…
Use the same ATM machine for your transactions. You should become familiar with the machine so that you can recognize changes to the machine.Use ATM machines located inside banks rather…
Follow these 12 quick tips for securing your computer Keep your operating system, browsers, and all installed software up-to-date (especially software from Microsoft, Adobe, Oracle and Java).Do NOT use pirated…
Do you use eBanking? If yes then keep these 13 quick tips in mind: 1. Connect to your bank website using a device (laptop, smartphone, tablet, etc.) that has the…
You can love Facebook or you can hate it. But you can't ignore it. And nothing proves it better than these crazy Facebook crimes. Dylan Osborn was sentenced to 10…
On 23 May 2016 we organized the Future Money Conference (India). Sponsored by IBM and Contact Singapore, this was India’s first conference on Virtual Currencies, Blockchain and Fin-Tech. Delegates were…
While the proponents of "Net Neutrality" bring out their expensive champagne and caviar, yesterday's Telecom Regulatory Authority of India (TRAI) regulations actually make it very easy and cheap for service…
The year 2014 saw some of the world's largest institutions fall prey to cyber crime - JP Morgan Chase, Sony, AT&T, eBay, Google, Apple, Dairy Queen International, Domino's Pizza and…
Section 66A of the Information Technology Act (IT Act) was much debated (and hated) primarily because it was seen as being against “freedom of speech” and also because it used…
On 1st August 2011, Asian School of Cyber Laws submitted its recommendations to the Director, Department of Information Technology, Ministry of Communication & Information Technology, Government of India. Vishal Kumar…
The Information Technology (Amendment) Act, 2008 has come into force on 27th October 2009. Nine years after the birth of cyber laws in India, the new improved cyber law regime…
Asian School of Cyber Laws (ASCL) has been associated with and is assisting the Department of Information Technology, Ministry of Communications and Information Technology, Government of India in framing draft…
The ECommerce & Development Report 2003 recently published by the United Nations Conference on Trade and Development has quoted the findings of the Computer Crime and Abuse Report (2001-02) published…
The Indian Information Technology Act, 2000 (hereinafter referred to as "the Act") is one of the most important pieces of legislation in the recent past. This statute reaffirms India’s commitment…
Adjudicating Officers, who will be deciding the fate of multi-crore rupees cyber crime cases, have finally been appointed for all Indian States. Although, the Indian Cyber Law i.e. the Information…