
One would believe that, in a day of increasing technological improvements in business techniques, the security of those resources is mostly based on technical controls and programming algorithms. While the technical aspect of security is vital, there is one weakness that cannot be addressed through technology. That vulnerability is specific to a particular element that is unavoidably important in any company's day-to-day operations. This vital component is the human employee, who is vulnerab...
Read More
The term "social media" refers to a set of platforms for sharing and debating information that are based on the internet and mobile phones. It is a platform that combines technology, telecommunications, and social contact to allow people to communicate using words, photographs, videos, and music. Web-based and mobile technologies are employed in social media to convert communication into an interactive discussion. Social Media can be broadly divided into following ca...
Read More
The Information Technology (Intermediary Guidelines and Digital Media Ethics Code) Rules, 2021 (the "Intermediary Rules") will fundamentally alter how Indians use the internet. While Part I of the Intermediary Rules primarily defines terms, Parts II and III of the Intermediary Rules contain the actual compliances and requirements. The regulation of intermediaries, including social media intermediaries, is the subject of Part II. Messaging-related intermediaries, such as WhatsApp, Signa...
Read More
Data sharing between Facebook and WhatsApp Users have been wondering and concerned about the amount of data that will pass between the two platforms since Facebook purchased WhatsApp in 2014. As part of the privacy policy refresh, WhatsApp also removed a section about opting out of sharing certain data with Facebook, which stated that if you are an existing user, you can choose not to have your WhatsApp account information shared with Facebook to improve your Facebook ads and product ex...
Read More
WhatsApp’s New Privacy Policy WhatsApp, a Facebook subsidiary, has recently updated its privacy policies. The company reiterated that messages sent in the normal course are not retained. Only if the message is not delivered immediately or if it is a forwarded message will the company's servers keep it. End-to-end encryption is provided by the company to protect messages from third-party access. If someone uses the company's recently introduced payment services, the company ha...
Read More
Types of crimes happening through Whatsapp WhatsApp being a social media platform, a lot of cyber-crimes happen through it. According to the National Investigation Agency, every sixth cybercrime in India is committed through social media. The following are the most common cybercrimes that happens through WhatsApp – Pornography - One of the most used platform to publish and transmit obscene materials is WhatsApp. Section 67 criminalises publishing or transmitting of obsc...
Read MoreAbout Us
We speak the language of Technology & Internet. We understand how the law interacts with Technology & Internet. Cyber Crime Chambers is a boutique firm specializing in internet laws and digital forensic evidence.

Karthikeyan.N
B.A., B.L., (Hons) IPDP., (London)
Pgd IPR., Pgd Cyber Law., Msc., (IT)
CCI., CFA., IPCL.,
Advocate, Madras High Court
Karthikeyan, is a renowned cyber law expert, who is also the Managing Partner of Law Office of Karthikeyan, a reputed law firm based in Chennai.
More About UsPopular Posts
- Jun 30,2022Legality of Rummy in Indian States
- Jun 30,2022Block Chain and Crypto Currency
- Jun 30,2022Legality of Cryptocurrency