-
siteadmin
Virtual DPO (Data Privacy Officer)
Virtual DPO (Data Privacy Officer) Outsource DPO services and benefits from our data protection experience. We offer a full review of your current policies and processes including an in-depth audit and regular compliance reporting. It also includes data breach management and onsite staff training. Our team ensures that your organization is fully compliant with Articles…
-
siteadmin
The Competition Act, 2002
Chapter I â Preliminary EXTRAORDINARY PART II â Section 1 PUBLISHED BY AUTHORITY NO. 12 NEW DELHI, TUESDAY, JANUARY 14, 2003 / PAUSA 24, 1924 Separate paging is given to this Part in order that it may be filed as a separate compilation. MINISTRY OF LAW AND JUSTICE (Legislative Department) New Delhi, the 14th January,…
-
siteadmin
The Indian Evidence Act, 1872
Part I â RELEVANCY OF FACTS Chapter I â Preliminary 1. SHORT TITLE, EXTENT, COMMENCEMENT. â This Act may be called theIndian Evidence Act, 1872. It extends to the whole of India1[except the State of Jammu and Kashmir] and applies to all judicial proceedings in or before any Court, including Courts-martial,2[other than Courts-martial convened under…
-
siteadmin
The Press and Registration of Books Act, 1867
Section 1. Interpretation-clause 1[(1)] In this Act, unless there shall be something repugnant in the subject or context, â âBookâ includes every volume, part or division of a volume, and pamphlet, in any language, and every sheet of music, map, chart or plan separately printed2[* * *] 3[* * *] 4[âEditorâ means the person who…
Category
- Articles (27)
- Bare Acts (16)
- Blog (1)
- Case Laws (15)
- Cyber Laws (50)
- Cybersecurity (6)
- Data Privacy (2)
- Data Recovery (3)
- Digital Forensics (6)
- eDiscovery (1)
- Incident Response (2)
- Indian Arms Act 1959 (1)
- Information Technology Act (1)
- Information Technology Act 2000 (1)
- Intellectual Property (4)
- Legal terms (2)
- Malware & Virus (3)
- News (5)
- Vulnerability Management (1)
- WordPress Security (2)
Recent Post
- Avoiding Common Mistakes in Cyber Incident Response Planningby siteadmin
- Protect Your Accounts in Minutes: The Power of Multi-Factor Authenticationby siteadmin
- Recovering Email from Computers and Drivesby siteadmin
- Recovering Email from Mobile Phonesby siteadmin
- Hunting Down an ASP.Net XSS Filter Bypassby siteadmin