Video games have captured the imagination of the masses since before the beginning of the 21st century. Many children, teens, and even adults have become enthralled by the world of gaming. While, earlier it was seen as a new pastime and a source of little entertainment, newer games, improved graphics and the advent of the internet age, the world of video games has engulfed people of all age groups into its grasp. While, not all researchers (and even some parents) agree that video games...

Read More

How to identify fake accounts in Facebook  There are a number of techniques to spot a fake Facebook account, but none of them are conclusive evidence that the account is false.  1. Profile Picture – The profile picture often explains a lot about an account. A single profile picture could help us distinguish between an active user or not. If the account has a single profile picture, then it shall raise a question. Further, most of the fake accounts have either no profile pic...

Read More

One would believe that, in a day of increasing technological improvements in business techniques, the security of those resources is mostly based on technical controls and programming algorithms. While the technical aspect of security is vital, there is one weakness that cannot be addressed through technology. That vulnerability is specific to a particular element that is unavoidably important in any company's day-to-day operations. This vital component is the human employee, who is vulnerab...

Read More

  The term "social media" refers to a set of platforms for sharing and debating information that are based on the internet and mobile phones. It is a platform that combines technology, telecommunications, and social contact to allow people to communicate using words, photographs, videos, and music. Web-based and mobile technologies are employed in social media to convert communication into an interactive discussion.  Social Media can be broadly divided into following ca...

Read More

The Information Technology (Intermediary Guidelines and Digital Media Ethics Code) Rules, 2021 (the "Intermediary Rules") will fundamentally alter how Indians use the internet. While Part I of the Intermediary Rules primarily defines terms, Parts II and III of the Intermediary Rules contain the actual compliances and requirements. The regulation of intermediaries, including social media intermediaries, is the subject of Part II. Messaging-related intermediaries, such as WhatsApp, Signa...

Read More

Data sharing between Facebook and WhatsApp  Users have been wondering and concerned about the amount of data that will pass between the two platforms since Facebook purchased WhatsApp in 2014. As part of the privacy policy refresh, WhatsApp also removed a section about opting out of sharing certain data with Facebook, which stated that if you are an existing user, you can choose not to have your WhatsApp account information shared with Facebook to improve your Facebook ads and product ex...

Read More
Viewing 1 - 6 of 169 Articles

About Us

We speak the language of Technology & Internet. We understand how the law interacts with Technology & Internet. Cyber Crime Chambers is a boutique firm specializing in internet laws and digital forensic evidence.


B.A., B.L., (Hons) IPDP., (London)
Pgd IPR., Pgd Cyber Law., Msc., (IT)
Advocate, Madras High Court

Karthikeyan, is a renowned cyber law expert, who is also the Managing Partner of Law Office of Karthikeyan, a reputed law firm based in Chennai.

More About Us

Report an Incident

Send us information about your case, we will respond to you promptly