Can users claim compensation for a data breach?
Section 43A of the IT Act is viewed as the holy grail provision under which users can claim compensation for a data breach. A
Read MoreSection 43A of the IT Act is viewed as the holy grail provision under which users can claim compensation for a data breach. A
Read MoreICYMI, What’s Phishing? Cybercriminals have a number of tools in their arsenal to gather any information of value. A phishing
Read MoreCyber crime and misuse of data have been on the rise for the past two decades. While our dependence on technology
Read MoreThe growth of internet and our dependency on it during this pandemic has brought about some unexpected changes. There is
Read MoreOne could not agree any more with John F. Kennedy when he said, “Children are the world’s most valuable resource
Read MoreThe European Union has issued sanctions against hackers; six individuals and three organisations in Russia, China and North Korea. The
Read MoreComputer codes are inherently insecure. They can be the tools, but also the target of a cyber-attack. Not just one,
Read More