Computer Usage Policy What is a Computer Usage Policy? A Computer Usage Policy is a clearly defined and documented policy that effectively establishes an organization’s rules of engagement on the appropriate usage of the internet and company technology for employees. A Computer Usage Policy creates…

We deal with Arbitration matters pertaining to Cyber Laws, Cyber Security and Data Protection Laws

In a cybercrime, a computer can either be used as tool or a target. A computer can be a source of evidence (see digital forensics).

Computer forensics is also called Forensic computing or Cyber Forensics, the youngest branch of forensic science, thoroughly peer reviewed techniques/procedures, well tested tools deals with the preservation, identification, extraction, interpretation, and documentation of computer evidence.

Cyber security in the banking sector is of utmost relevance today. During this pandemic
social engineering attacks such as phishing, vishing, etc. have increased rapidly due to the
sudden shift of all payments to remote online devices.

A cryptocurrency is a digital or virtual currency designed to work as a medium of exchange. It uses cryptography to secure and verify transactions as well as to control the creation of new units of a particular cryptocurrency.

Cyber Law is significant because it touches almost every aspect of business, transactions and activities involving Internet, World Wide Web and Cyber Space

Data Privacy Policy & Terms of Use. Reasonable Security Practices & Procedures, Data Protection and Privacy. EU General Data Protection Regulation Compliance (GDPR) and Training to Body Corporates.

In today’s digital world IPR is the most valuable asset for an individual or an organisation

Under the Indian legal system the criminal liability for an act or omission arises out of a statute proscribing an act or omission. A breach of the statutorily proscribed act or the prescribed duty by a person is to be visited with punishment as sanctioned by the law.