Employer Obligations on Employee Data Under Indian Law
UPDATE: The Personal Data Protection Bill 2019 has been withdrawn by the Indian government after over three years of discussion. The Bill had attracted major criticisms from industry stakeholders, NGOs, privacy activists and tech platforms as it proposed strict rules for international data transfers and giving the Indian government the ... Read More
Employer Obligations on Employee Data Under Indian Law
UPDATE: The Personal Data Protection Bill 2019 has been withdrawn by the Indian government after over three years of discussion. The Bill had attracted major criticisms from industry stakeholders, NGOs, privacy activists and tech platforms as it proposed strict rules for international data transfers and giving the Indian government the ... Read More

What is RoPA? Records of Processing Activities Explained
Privacy laws and regulations are enacted to bring transparency and accountability to an organization’s behavior when it comes to collecting and processing users’ personal data. Before the introduction of the GDPR article 30, accountability and transparency associated with the processing of users’ personal data were difficult. In fact, the lack ... Read More

What is RoPA? Records of Processing Activities Explained
Privacy laws and regulations are enacted to bring transparency and accountability to an organization’s behavior when it comes to collecting and processing users’ personal data. Before the introduction of the GDPR article 30, accountability and transparency associated with the processing of users’ personal data were difficult. In fact, the lack ... Read More
ITAR vs. EAR Compliance – What’s the Difference
Technology, information, or innovation knows no bounds. They are accessible and, in most cases, freely available, such as data. However, ensuring that no wrong hands should access that data or technology is a paramount concern for any country. The United States is one such nation that has enacted laws governing ... Read More
ITAR and Encryption | What You Need to Know
Protecting user data, especially sensitive data, is the primary objective of data regulations. In a world where cybersecurity incidents are rampant, losing sensitive data to threat actors can put a user in significant danger. However, imagine a set of sensitive data, which is linked to defense-related goods like long-range missiles ... Read More
Behind the Headlines: Understanding The FTC’s Microsoft Case
The Xbox network, more popularly known and branded as Xbox Live, has been one of Microsoft's most successful and popular ventures of the past two decades. Available in 42 countries, Xbox Live has been Microsoft's answer to Sony's PlayStation Network, and thanks to its consistent revenues of more than $1 ... Read More
Behind the Headlines: Understanding The FTC’s Microsoft Case
The Xbox network, more popularly known and branded as Xbox Live, has been one of Microsoft's most successful and popular ventures of the past two decades. Available in 42 countries, Xbox Live has been Microsoft's answer to Sony's PlayStation Network, and thanks to its consistent revenues of more than $1 ... Read More

Opt In vs Opt Out Consent: What’s the Difference?
The global hunger for data collection is increasing exponentially. With businesses starting to collect more and more personal data, a rapid emergence in data privacy laws and regulations can be observed worldwide. The opt in consent model requires a user to perform an affirmative action before they can be sent ... Read More

Opt In vs Opt Out Consent: What’s the Difference?
The global hunger for data collection is increasing exponentially. With businesses starting to collect more and more personal data, a rapid emergence in data privacy laws and regulations can be observed worldwide. The opt in consent model requires a user to perform an affirmative action before they can be sent ... Read More