At least 23 Delhi Police officials can now order social media content removals under the IT Act. What does this mean for ...
From IP addresses to netflow data, how much data do telecom companies collect about users and what can the Indian govt do ...
The newly released draft Digital Personal Data Protection (DPDP) Rules, 2025 say that online platforms must check the age and identity of the individual identifying as a parent when obtaining ...
Hospitality chain OYO has launched a new check-in policy to allow partner hotels to deny rooms to unmarried couples, starting from Meerut, Uttar Pradesh, reported Economic Times. There is no ...
The newly released Rules for the Digital Personal Data Protection Act (DPDPA), 2023 make it harder for foreign governments to access the data of Indian citizens through Data Fiduciaries.
On January 3, the Ministry of Electronics and Information Technology (MeitY) released the draft rules for the Digital Personal Data Protection Act, under which Data Fiduciaries must provide clear ...
The Digital Personal Data Protection (DPDP) Act, 2023 and the Draft Digital Personal Data Protection Rules, 2025 outline specific provisions regarding Consent Managers to allow users to give ...
Sixteen months after the Government finalised the Digital Personal Data Protection Act (DPDP, 2023), it released a draft of data protection rules for public consultation. While the rules fill up a ...
The draft Digital Personal Data Protection (DPDP) Rules, 2025, explain how Data Principals (individuals whose data is being processed) can exercise their rights through identifiers provided by ...
The Data Privacy Board (DPB) was notified under the Digital Personal Data Protection Act, 2023 as the India’s privacy enforcement authority. It is to be constituted ...
The recently published draft Digital Personal Data Protection (DPDP) Rules, 2025, exempt the processing of personal data for statistical, archival, or research purposes from the DPDP Act’s ...
Companies have to implement appropriate data security measures such as encryption, obfuscation, and mapping personal data to virtual tokens, to protect against personal data breaches under the ...