Data Privacy and Protection

Digital Data Protection Bill 2023 – India

With the Passage of Digital Data Protection Bill 2023 in the lower house (Loksabha) of Indian Parliament, a lot of furor and rumbling has started. However, it is important to analyse the Bill and understand the outcome from technical perspective. Digital Personal Data Protection Bill- 2023 (“The Bill”) is introduced as a full fledged law …

Uber Hacks and Risk Management

The recent news about the live streaming of the unnerving passengers by an Uber/Lyft driver in the St. Louis area coupled with the Fraudulent “Extra Service” claims by the Uber Drivers in Miami area have certainly raised a concern on the Privacy and the Credit Card Frauds. Both the cases have not raised much support …

Experian Hack

It has been almost a month that Experian reported a breach in which 15 million T-mobile customer accounts were said to be compromised. The information included names, addresses, email ids, social security numbers and few more details of the T-mobile customers in USA. Though Experian was quick to react before the information could have been misused …

Indian National Encryption Policy

It is interesting to note that the Government of India’s Department of Engineering and Information Technology has issued National Encryption Policy for public comment.  And today the first addendum for the same has been issued for the people to refer to.  However, when it comes to the overall policy, it has been left out pretty …

Need to Secure Private Information – Requirement in India

Unique Identification Authority of India (UIDAI) data center in Bangalore is reported to have got a cover of 65 star guards from multi-skilled security agency, the Central Industrial Security Force (CISF) – Your identity is guarded by 65 armed men (article on times of India). It indeed is a commendable step by the authorities, but …

$45 Million Heist with Prepaid Card Duplication: Lessons Learned

In my previous post “$45 Million Heist with Prepaid Card Duplication“, I had highlighted the questions that creep up in our mind as general readers or followers of the news.  Those questions are basically something that need to be dealt with or answered for a meaningful conclusion of the investigation. However, from the Risk Management …

BYOD Program & Controls Requirement – II

As I wrote the previous Post – BYOD Program & Controls Requirement I received the comment on WFH, but I am certainly not covering that in this article, as that is a separate topic of discussion. What is more interesting that broke out as a discussion point with a colleague over a cup of coffee.  The discussion …