<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Blog &#8211; Cyber Awareness Organization</title>
	<atom:link href="https://cyberorgindia.com/category/blog/feed/" rel="self" type="application/rss+xml" />
	<link>https://cyberorgindia.com</link>
	<description></description>
	<lastBuildDate>Thu, 29 Jan 2026 05:24:03 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://cyberorgindia.com/wp-content/uploads/2016/01/cropped-logo-150x150.png</url>
	<title>Blog &#8211; Cyber Awareness Organization</title>
	<link>https://cyberorgindia.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Meet Adv. Dr. Mahendra Limaye who will uncover the Real World Cyber Threats</title>
		<link>https://cyberorgindia.com/meet-adv-dr-mahendra-limaye-who-will-uncover-the-real-world-cyber-threats/</link>
					<comments>https://cyberorgindia.com/meet-adv-dr-mahendra-limaye-who-will-uncover-the-real-world-cyber-threats/#respond</comments>
		
		<dc:creator><![CDATA[Mahendra Limaye]]></dc:creator>
		<pubDate>Thu, 29 Jan 2026 05:21:55 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<guid isPermaLink="false">https://cyberorgindia.com/?p=615</guid>

					<description><![CDATA[Meet Adv. Dr. Mahendra Limaye who will uncover the Real World Cyber Threats and he Legal Tools that Keep Digital World in Check]]></description>
										<content:encoded><![CDATA[<p>Meet Adv. Dr. Mahendra Limaye who will uncover the Real World Cyber Threats and he Legal Tools that Keep Digital World in Check<img decoding="async" src="https://cyberorgindia.com/wp-content/uploads/2026/01/1000577386-135x300.jpg" alt="" width="135" height="300" class="aligncenter size-medium wp-image-616" srcset="https://cyberorgindia.com/wp-content/uploads/2026/01/1000577386-135x300.jpg 135w, https://cyberorgindia.com/wp-content/uploads/2026/01/1000577386-461x1024.jpg 461w, https://cyberorgindia.com/wp-content/uploads/2026/01/1000577386-768x1707.jpg 768w, https://cyberorgindia.com/wp-content/uploads/2026/01/1000577386-691x1536.jpg 691w, https://cyberorgindia.com/wp-content/uploads/2026/01/1000577386-922x2048.jpg 922w, https://cyberorgindia.com/wp-content/uploads/2026/01/1000577386.jpg 1080w" sizes="(max-width: 135px) 100vw, 135px" /></p>
<p><img decoding="async" src="https://cyberorgindia.com/wp-content/uploads/2026/01/1000577389-135x300.jpg" alt="" width="135" height="300" class="aligncenter size-medium wp-image-617" srcset="https://cyberorgindia.com/wp-content/uploads/2026/01/1000577389-135x300.jpg 135w, https://cyberorgindia.com/wp-content/uploads/2026/01/1000577389-461x1024.jpg 461w, https://cyberorgindia.com/wp-content/uploads/2026/01/1000577389-768x1707.jpg 768w, https://cyberorgindia.com/wp-content/uploads/2026/01/1000577389-691x1536.jpg 691w, https://cyberorgindia.com/wp-content/uploads/2026/01/1000577389-922x2048.jpg 922w, https://cyberorgindia.com/wp-content/uploads/2026/01/1000577389.jpg 1080w" sizes="(max-width: 135px) 100vw, 135px" /></p>
<p><img decoding="async" src="https://cyberorgindia.com/wp-content/uploads/2026/01/1000577407-135x300.jpg" alt="" width="135" height="300" class="aligncenter size-medium wp-image-618" srcset="https://cyberorgindia.com/wp-content/uploads/2026/01/1000577407-135x300.jpg 135w, https://cyberorgindia.com/wp-content/uploads/2026/01/1000577407-461x1024.jpg 461w, https://cyberorgindia.com/wp-content/uploads/2026/01/1000577407-768x1707.jpg 768w, https://cyberorgindia.com/wp-content/uploads/2026/01/1000577407-691x1536.jpg 691w, https://cyberorgindia.com/wp-content/uploads/2026/01/1000577407-922x2048.jpg 922w, https://cyberorgindia.com/wp-content/uploads/2026/01/1000577407.jpg 1080w" sizes="(max-width: 135px) 100vw, 135px" /></p>
<p><img loading="lazy" decoding="async" src="https://cyberorgindia.com/wp-content/uploads/2026/01/1000577405-135x300.jpg" alt="" width="135" height="300" class="aligncenter size-medium wp-image-619" srcset="https://cyberorgindia.com/wp-content/uploads/2026/01/1000577405-135x300.jpg 135w, https://cyberorgindia.com/wp-content/uploads/2026/01/1000577405-461x1024.jpg 461w, https://cyberorgindia.com/wp-content/uploads/2026/01/1000577405-768x1707.jpg 768w, https://cyberorgindia.com/wp-content/uploads/2026/01/1000577405-691x1536.jpg 691w, https://cyberorgindia.com/wp-content/uploads/2026/01/1000577405-922x2048.jpg 922w, https://cyberorgindia.com/wp-content/uploads/2026/01/1000577405.jpg 1080w" sizes="auto, (max-width: 135px) 100vw, 135px" /></p>
<p><img loading="lazy" decoding="async" src="https://cyberorgindia.com/wp-content/uploads/2026/01/1000577400-135x300.jpg" alt="" width="135" height="300" class="aligncenter size-medium wp-image-620" srcset="https://cyberorgindia.com/wp-content/uploads/2026/01/1000577400-135x300.jpg 135w, https://cyberorgindia.com/wp-content/uploads/2026/01/1000577400-461x1024.jpg 461w, https://cyberorgindia.com/wp-content/uploads/2026/01/1000577400-768x1707.jpg 768w, https://cyberorgindia.com/wp-content/uploads/2026/01/1000577400-691x1536.jpg 691w, https://cyberorgindia.com/wp-content/uploads/2026/01/1000577400-922x2048.jpg 922w, https://cyberorgindia.com/wp-content/uploads/2026/01/1000577400.jpg 1080w" sizes="auto, (max-width: 135px) 100vw, 135px" /></p>
]]></content:encoded>
					
					<wfw:commentRss>https://cyberorgindia.com/meet-adv-dr-mahendra-limaye-who-will-uncover-the-real-world-cyber-threats/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Shiny Trap of Online Fashion Scams</title>
		<link>https://cyberorgindia.com/the-shiny-trap-of-online-fashion-scams/</link>
					<comments>https://cyberorgindia.com/the-shiny-trap-of-online-fashion-scams/#respond</comments>
		
		<dc:creator><![CDATA[Mahendra Limaye]]></dc:creator>
		<pubDate>Thu, 29 Jan 2026 04:42:12 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<guid isPermaLink="false">https://cyberorgindia.com/?p=611</guid>

					<description><![CDATA[Attractive ads, huge discounts, and trendy outfits on social media—but the reality is often very different. Many fake online fashion pages use stolen images, false promises, and misleading offers to cheat customers. Before buying, always verify the seller, check reviews, and avoid deals that seem too good to be true. Stay alert. Shop smart. Protect [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Attractive ads, huge discounts, and trendy outfits on social media—but the reality is often very different.<br />
Many fake online fashion pages use stolen images, false promises, and misleading offers to cheat customers.<br />
Before buying, always verify the seller, check reviews, and avoid deals that seem too good to be true.</p>
<p> Stay alert. Shop smart. Protect yourself from online fraud.</p>
<p>Think before you click. Verify before you pay.<br />
🚫 Don’t fall for the illusion.</p>
<p>ग्राहक फसवणुकीचा नवा ट्रेंड: ऑनलाइन फॅशन स्कॅम</p>
<p>अनेक ऑनलाइन विक्रेते बनावट फोटो, चुकीची माहिती आणि खोट्या ऑफर्सद्वारे ग्राहकांची दिशाभूल करत आहेत.<br />
ग्राहकांनी तक्रार नोंदवणे, पुरावे जपणे आणि कायदेशीर मार्ग अवलंबणे गरजेचे आहे.</p>
<p><img loading="lazy" decoding="async" src="https://cyberorgindia.com/wp-content/uploads/2026/01/1000576631-135x300.jpg" alt="" width="135" height="300" class="aligncenter size-medium wp-image-612" srcset="https://cyberorgindia.com/wp-content/uploads/2026/01/1000576631-135x300.jpg 135w, https://cyberorgindia.com/wp-content/uploads/2026/01/1000576631-461x1024.jpg 461w, https://cyberorgindia.com/wp-content/uploads/2026/01/1000576631-768x1707.jpg 768w, https://cyberorgindia.com/wp-content/uploads/2026/01/1000576631-691x1536.jpg 691w, https://cyberorgindia.com/wp-content/uploads/2026/01/1000576631-922x2048.jpg 922w, https://cyberorgindia.com/wp-content/uploads/2026/01/1000576631.jpg 1080w" sizes="auto, (max-width: 135px) 100vw, 135px" /><br />
📢 ग्राहक जागरूकता हीच खरी सुरक्षा.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cyberorgindia.com/the-shiny-trap-of-online-fashion-scams/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Accountability Matters: College Told to Refund Fees with Interest</title>
		<link>https://cyberorgindia.com/acaccountability-matters-college-told-to-refund-fees-with-interest/</link>
					<comments>https://cyberorgindia.com/acaccountability-matters-college-told-to-refund-fees-with-interest/#respond</comments>
		
		<dc:creator><![CDATA[Mahendra Limaye]]></dc:creator>
		<pubDate>Thu, 29 Jan 2026 04:34:13 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<guid isPermaLink="false">https://cyberorgindia.com/?p=607</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" src="https://cyberorgindia.com/wp-content/uploads/2026/01/Screenshot-2026-01-28-at-15-11-03-Lokmat-ePaper-Marathi-News-Paper-Online-English-Hindi-Marathi-Paper-Daily-News-ePaper-Todays-News-Papers-लोकमत-वृत्तपत्रे-256x300.png" alt="" width="256" height="300" class="aligncenter size-medium wp-image-608" srcset="https://cyberorgindia.com/wp-content/uploads/2026/01/Screenshot-2026-01-28-at-15-11-03-Lokmat-ePaper-Marathi-News-Paper-Online-English-Hindi-Marathi-Paper-Daily-News-ePaper-Todays-News-Papers-लोकमत-वृत्तपत्रे-256x300.png 256w, https://cyberorgindia.com/wp-content/uploads/2026/01/Screenshot-2026-01-28-at-15-11-03-Lokmat-ePaper-Marathi-News-Paper-Online-English-Hindi-Marathi-Paper-Daily-News-ePaper-Todays-News-Papers-लोकमत-वृत्तपत्रे-873x1024.png 873w, https://cyberorgindia.com/wp-content/uploads/2026/01/Screenshot-2026-01-28-at-15-11-03-Lokmat-ePaper-Marathi-News-Paper-Online-English-Hindi-Marathi-Paper-Daily-News-ePaper-Todays-News-Papers-लोकमत-वृत्तपत्रे-768x901.png 768w, https://cyberorgindia.com/wp-content/uploads/2026/01/Screenshot-2026-01-28-at-15-11-03-Lokmat-ePaper-Marathi-News-Paper-Online-English-Hindi-Marathi-Paper-Daily-News-ePaper-Todays-News-Papers-लोकमत-वृत्तपत्रे.png 957w" sizes="auto, (max-width: 256px) 100vw, 256px" /></p>
]]></content:encoded>
					
					<wfw:commentRss>https://cyberorgindia.com/acaccountability-matters-college-told-to-refund-fees-with-interest/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>OPEN LETTER TO CJI IN DIGITAL ARREST MATTERS BY NAVI</title>
		<link>https://cyberorgindia.com/open-letter-to-cji-in-digital-arrest-matters-by-navi/</link>
					<comments>https://cyberorgindia.com/open-letter-to-cji-in-digital-arrest-matters-by-navi/#respond</comments>
		
		<dc:creator><![CDATA[Mahendra Limaye]]></dc:creator>
		<pubDate>Wed, 31 Dec 2025 09:36:46 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<guid isPermaLink="false">https://cyberorgindia.com/?p=604</guid>

					<description><![CDATA[To The Chief Justice of India Honourable Supreme Court New Delhi As a person following Cyber Laws in India since 1998, I am happy that the Supreme Court of India has taken Suo-Moto Cognizance of the “Digital Arrest Scam” and is trying to develop some guidelines to mitigate the hardship of the victims. This is [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>To</p>
<p>The Chief Justice of India<br />
Honourable Supreme Court<br />
New Delhi</p>
<p>As a person following Cyber Laws in India since 1998, I am happy that the Supreme Court of India has taken Suo-Moto Cognizance of the “Digital Arrest Scam” and is trying to develop some guidelines to mitigate the hardship of the victims. This is a great opportunity to improve the digital eco system in India and we need to make full use of this opportunity.</p>
<p>In this context, I would like to place before you the following suggestions  for consideration and request you to provide suitable directives to  the relevant parties.</p>
<p>1. We need to identify and apply corrections to the root cause.<br />
2. Consider introduction of a new Law for Neuro Rights Protection<br />
3. Bring changes to our Banking practices by directing RBI and the Bankers avoiding collateral damage of innocent persons.<br />
4. Bring Technical improvements to the Telecom and Mobile service providers</p>
<p>I will try to elaborate each of these suggestions.</p>
<p>1. Root Cause and it’s Rectification</p>
<p>The first thought that occurs to every one of us is how is that educated and otherwise mature persons fall into the trap of the Digital Arrest scam to the extent they take out crores of rupees of their savings and hand it over to the fraudster. This is continuing even after the Prime Minister himself addressed the awareness requirement in one of his “Man Ki Baat” episodes. While “Awareness” continues to be necessary, it is obviously not sufficient.</p>
<p>The modus operandi indicates two reasons why people are falling into a trap which is apparently irrational. The modus operandi is to make a fake phone call, threaten action by law enforcement agencies and suggestion that certain amount may be deposited temporarily in a Government account pending enquiry.</p>
<p>The irrational action of the victim in this context is induced by</p>
<p>a) Fear that even if they are innocent, law enforcement agencies may harass them<br />
b) A False sense of security that the Government agencies where the money is sought to be parked can be trusted to return it since they are any way innocent.</p>
<p>Thus the fraudsters cleverly exploit both the “Fear” and the “Trust” and mesmerizing the victims through their talking. We may recall that some times back, the “Blue Whale” game was prevalent where fraudsters drove innocent children to harm themselves through suggestions.</p>
<p>The psychological analysis of this situation is that the victims got into a “Hypnotic State” where they lost their rational decision making process and blindly followed the suggestions of the fraudster. This is a sophisticated “Cyber Hypnosis” strategy.</p>
<p>We can observe such behaviour also in situations where people “Freeze” at the sight of a real or toy gun for the fear of harm that may occur. The so called “Stockholm syndrome” is also a manifestation of a defence mechanism that follows the initial state of obedience through fear.</p>
<p>Law recognizes that actions taken under threat, coercion, mistaken impression and when a person is not under control of his mental faculties as “Void” under law. Hence the act of “Handing over of money voluntarily” which is used as a defence by Banks to avoid their responsibility is not legally sustainable.</p>
<p>Therefore, the liability for the digital arrest scam, cannot be held against the victim even if it looks foolish for the victim to act in the manner in which he did.</p>
<p>The solution to prevention of this “Fear” and “Blind trust” together placing the victim in a terrorized state of mind and blind compliance is to increase public knowledge on institutions like CBI, ED and RBI on what they do and what they do not do.</p>
<p>Also a single point PR contact should be available at all these institutions to provide clarifications when required. A direction to this effect must be issued.</p>
<p>Academic institutions should work on creating “Cyber De-addiction Websites” which try to remove the misconceptions about social media that whatever comes on the Internet is true and reliable. People should be made aware that after the AI based synthetic content spreading across the Internet, no information is reliable unless it is cross verified from a reliable source. Availability of public contact points with law enforcement agencies is the first step in this direction.</p>
<p>Government agencies such as Meity should be directed to invest in measures to publicize the lack of reliability of information on the Internet and the dangers of synthetic content. Such investments should be mandated as a security measure along with investments for technology promotion.</p>
<p>2. New Neuro Rights Law</p>
<p>If we recognize that these frauds are occurring because the mind of the victim is manipulated, we should recognize that this is an offence. This is part of “Dark Patterns” under the Consumer Protection Act. It was also a part of the earlier versions of the Data Protection Bill which was omitted in the latest version of DPDPA 2023.</p>
<p>“Manipulation of Human Mind” with either devices or communication should be considered as a violation of “Neuro Rights” and should be protected either as an extension of the “Right to Privacy” or “Right to Free Choice” or through a separate law.</p>
<p>3. Changes in Banking Policies</p>
<p>It is noted that in a few instances where vigilant Bankers have identified the problem and prevented the customer from going through the payment. This indicates that in other cases, Bankers have been negligent.</p>
<p>In all the successful digital arrest fraud instance, the Bankers both at the end of the victim and at the end of the beneficiary along with the Mobile Service Provider who issued a SIM to the fraudster should be considered as co-conspirators to the fraud and must be jointly and severally liable.</p>
<p>The KYC norms and the RBI instructions on adaptive authentication make it mandatory that an account is monitored and any “Unusual” transactions are flagged for elevated authentication checks. Unfortunately Banks donot follow this norm. The beneficiary Banks donot check the known sources of income of their customers with the unusually large amounts that are credited. This is a blatant omission of the RBI norms.</p>
<p>In the TDSAT judgement on S Umashankar Vs ICICI Bank, the Tribunal considered that not following reasonable security practices by the Banker was a violation of Section 43(g) of ITA 2000 and makes them liable directly along with criminal consequences of Section 66.</p>
<p>This needs to be put into a direction by the Supreme Court.</p>
<p>At the same time, the Banks and the Police often mis interpret the RBI guidelines and when some stray funds are found in the account of innocent account holders proceed to freeze the entire account. Law is very clear that if there is any disputed credit in the account there can be a lien only on that amount and not the entire account. However many Police personnel issue directives to freeze entire accounts and Bankers oblige them. De-freezing of such account will be delayed unless pals are greased. This obnoxious practice must be stopped.</p>
<p>We request Supreme Court to give a clear direction to all Banks that unless a Court has indicated an amount on which a garnishee order is issued, no amount in excess should be frozen. Also the Garnishee order should apply to money due and payable as on the date of the receipt of the garnishee order and not future receipts. Hence the practice of Banks freezing the account is completely illegal and Banks should be suitably penalized for following such practices. Police issuing notices without indicating the amount under dispute also needs to be stopped. RBI itself should modify its “Freezing” provision and adhere to the known principle of a “Garnishee Order” and not create new provisions of law expanding their powers.</p>
<p>Further, the Court should direct that in all instances where the Bank cannot establish a conspiracy between the victim and the beneficiary, it should be presumed that the liability for the digital arrest payment lies entirely on the Beneficiary’s Bank or jointly by the Beneficiary’s Bank and the Victim’s Bank.</p>
<p>Further it is noticed that when the victim reports to his bankers about any fraud the Banker does not act immediately to stop payment in transit. This is contravening the established Banking practice of “Stop Payment”. Even in the case of Credit card transactions, RBI has taken an untenable stand under which Banks prioritize payments to the acquiring Bank instead of the Credit card owner and refuse charge back requests.</p>
<p>Supreme Court may kindly direct the Banks to honour “Digital Sop Payment” and initiate immediate action to inform the destination Bank whenever a victim reports a fraud or the Bank observes an “Unusual Transaction” so that the destination Bank “Exercised Caution”. These established practices which were prevalent before the advent of Digital Banking have been given up in the new digital banking era and must be restored.</p>
<p>4. Technical Improvements</p>
<p>Since “Collection of Electronic Evidence” is an important requirement for any legal defence, the Telecom operators should be advised to</p>
<p>a) Follow the suggestion of TRAI to display the caller ID linked to the KYC in respect of all calls so that impersonation can be identified<br />
b) Introduce a “Hot button” on the mobile where at the click of a button the screen recording can be silently activated and deposited with a repository at the end of the call so that it is available for evidence. Currently “CEAC drop box” is a service that is available for voluntary deposit of electronic documents for evidentiary purpose. A similar service can be managed either by the law enforcement/MeitY or by a consortium of approved service providers. The user may subscribe to any of the free or paid services so that the evidence can be collected without a problem.</p>
<p>This has no “Privacy” bar since a “Conversation” is a data that belongs jointly to the caller and the called and hence each should be considered to have the right to record particularly when it has to be presented in legal defence of one of the parties. DPDPA 2023 also exempts collection of data for self legal defence.</p>
<p>These technical measures can also be directed to be introduced by the Mobile Service Providers along with a strict directive to ensure KYC for SIM card issue.</p>
<p>Yours sincerely</p>
<p>Na.Vijayashankar</p>
<p>Naavi<br />
(Na.Vijayashankar)</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cyberorgindia.com/open-letter-to-cji-in-digital-arrest-matters-by-navi/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>DIGITAL ARREST SCAM</title>
		<link>https://cyberorgindia.com/digital-arrest-scam/</link>
					<comments>https://cyberorgindia.com/digital-arrest-scam/#respond</comments>
		
		<dc:creator><![CDATA[Mahendra Limaye]]></dc:creator>
		<pubDate>Wed, 16 Apr 2025 08:08:21 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<guid isPermaLink="false">https://cyberorgindia.com/?p=572</guid>

					<description><![CDATA[Digital arrest Scam is growing and hard earned money of Citizen being looted by scamsters. Every Agency is doing its best to stop such scams but who is taking care of DIGITAL ARREST SCAM victims by initiating some OUT OF BOX legal measure? These people who have lost crores of rupees are reputed members of [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" src="https://cyberorgindia.com/wp-content/uploads/2025/04/image4-178x300.png" alt="" width="178" height="300" class="aligncenter size-medium wp-image-573" srcset="https://cyberorgindia.com/wp-content/uploads/2025/04/image4-178x300.png 178w, https://cyberorgindia.com/wp-content/uploads/2025/04/image4.png 352w" sizes="auto, (max-width: 178px) 100vw, 178px" /></p>
<p>Digital arrest Scam is growing and hard earned money of Citizen being looted by scamsters. Every Agency is doing its best to stop such scams but who is taking care of DIGITAL ARREST SCAM victims by initiating some OUT OF BOX legal measure? These people who have lost crores of rupees are reputed members of our society and having reasonable intellectual level. If they can be scammed then is something wrong in our banking system, which was/is used to siphon this crores of rupees, even outside India?<br />
Dr Mahendra Limaye is representing before various forums for such Cyber-space affected Victims including Digital arrest victims.<br />
Its great beginning where Highest Consumer Commission i.e. NCDRC has admitted such matters and issued notices to BANKS.</p>
<p>There are many such DIGITAL ARREST SCAM victims, who are clueless about this remedy. They can join the battle. I quote famous SHER Majrooh Sultanpuri<br />
MAI AKELA HI CHALA THA JAANIB-E-MANZIL, LOG SAATH ATE GAYE AUR KARWAN BANTA GAYA.</p>
<p>Collectively we can make the change in present mindset of Judicial system in context of CYBER FRAUDS</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cyberorgindia.com/digital-arrest-scam/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>“NCDRC ISSUE’S NOTICES TO BANKS, WHOSE ACCOUNTS WERE USED FOR SIPHONING MONEY IN DIGITAL ARREST SCAMS”</title>
		<link>https://cyberorgindia.com/ncdrc-issues-notices-to-banks-whose-accounts-were-used-for-siphoning-money-in-digital-arrest-scams/</link>
					<comments>https://cyberorgindia.com/ncdrc-issues-notices-to-banks-whose-accounts-were-used-for-siphoning-money-in-digital-arrest-scams/#respond</comments>
		
		<dc:creator><![CDATA[Mahendra Limaye]]></dc:creator>
		<pubDate>Sun, 30 Mar 2025 10:36:12 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<guid isPermaLink="false">https://cyberorgindia.com/?p=570</guid>

					<description><![CDATA[The digital arrest scam is a latest but most draconian scam happening with the Indian citizens. It is reported that victims from India might have collectively lost more than 1500 Cr in last Six months in these scams. The aftermath of Digital arrest scam is very shocking and it takes victims normally more than a [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>The digital arrest scam is a latest but most draconian scam happening with the Indian citizens. It is reported that victims from India might have collectively lost more than 1500 Cr in last Six months in these scams.<br />
 The aftermath of Digital arrest scam is very shocking and it takes victims normally more than a week to come to his/her senses .</p>
<p>IS POLICE COMPLAINT IS END OF THE ROAD OF RECOVERY OF HARD-EARNED MONEY LOST BY THE DIGITAL ARREST SCAM VICTIMS?<br />
Dr Mahendra Limaye has recently filed two complaints before NCDRC. The highest consumer Commission in India, scrutinized these issues wherein victims are seeking relief against the banks, whose accounts were used to siphon the money and these banks have been charged with not-complying with various RBI guidelines. The victims lost Rs 10.30 Crore and 5.85 Crore respectively. It is contended by the complainants that Victims have been met with Digital Accident known as Digital arrest and were not at all negligent while parting with their hard-earned money. It was also contended that various mandatory guidelines of Reserve Bank of India were flouted by these banks and which aggravated the passage for siphoning off the money from victim’s account.</p>
<p>The Hon NCDRC Bench consisting of President Retd. Justice. Shri A. P. Sahi and member Mr. Bharatkumar Pandya considered whether such complaints would fall Within the definition of a consumer complaint and what would be the pecuniary jurisdiction to be determined for entertaining such complaints. And after much deliberations issued notices to the banks calling upon them to answer both the complaints.</p>
<p>Assessing the gravity and seriousness of the Digital arrest scams, the Hon NCDRC has also made its intention of seeking assistance of agencies like the Financial Intelligence Unit of India, the Indian Cyber Crime Coordination Centre and such other agencies which may be needed in course of further hearing.</p>
<p>This Admission of complaints filed by Digital arrest Scam victims is certainly encouraging event for the victims as they had no other remedy available to seek the financial relief.</p>
<p>“There are various banking guidelines issued by RBI, for protection of bank account holders and when banks own Duty of Care towards its customers, non-compliance of these guidelines must result in penalizing the banks and providing compensation to the bank consumers. If other such victims of Digital Arrest scam come forward and take up their matters before appropriate foras, courts will also realize the quantum and perhaps some government intervention is also possible for compensating the victims” feels Adv Dr Mahendra Limaye who is representing the two victims in above cases a/w Adv Alok Sharma.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cyberorgindia.com/ncdrc-issues-notices-to-banks-whose-accounts-were-used-for-siphoning-money-in-digital-arrest-scams/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Who Cares for Civil Litigation prescribed in Information Technology Act?????</title>
		<link>https://cyberorgindia.com/who-cares-for-civil-litigation-prescribed-in-information-technology-act/</link>
					<comments>https://cyberorgindia.com/who-cares-for-civil-litigation-prescribed-in-information-technology-act/#respond</comments>
		
		<dc:creator><![CDATA[Mahendra Limaye]]></dc:creator>
		<pubDate>Tue, 02 Jan 2024 09:55:37 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<guid isPermaLink="false">https://cyberorgindia.com/?p=567</guid>

					<description><![CDATA[The title is painful but harsh reality of Digital India. UPI transactions volume in Dec-23 was Rs 7,030.51 million. As per RBI statistics RTGS/NEFT total Volume (in actual) was 362258139 transactions’ Valued at Rs. 803344 Lakhs with 79838949 active customers using internet banking. On the flip side of this digitalised India, we are also witnessing [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>The title is painful but harsh reality of Digital India. UPI transactions volume in Dec-23 was Rs 7,030.51 million. As per RBI statistics RTGS/NEFT total Volume (in actual) was 362258139 transactions’ Valued at Rs. 803344 Lakhs with 79838949 active customers using internet banking. On the flip side of this digitalised India, we are also witnessing the sharp and exponential growth in cyber-crimes. As per NCRB, December 22 published statistics, the cybercrimes grew by 24.4% YTY. Though the NCRB report says only 65,893 cyber-crimes were registered in India in the year 2022, the people at large are knowledgeable enough to read between the lines.<br />
The RBI is coming up with various awareness campaigns, spending huge money from its exchequer, with tagline, “Jaankar Bano” is also one of the indicators of growing cybercrimes across the country.<br />
The way government had devised 1930 mechanism for reporting cyber frauds or www.cybercrime.gov.in portal for online registration of complaints related to cybercrime’s, is another evidence of the growth of cyber-crimes in geometrical progression. And now with more thrust on AI, there is possibility of emergence of cybercrimes, which are never heard of.<br />
The headlines related to cybercrimes available on 2/1/2024 at 10.35 am at https://cybercrime.gov.in/Webform/dailyDigest.aspx is also very scaring.<br />
1) India to ban URLs of 9 crypto exchanges, including Binance, for non-compliance with anti-money laundering law &#8211; India Today<br />
2) Female lawyer &#038; accomplice arrested for duping woman of ₹55.35 lakh in YouTube task scam &#8211;<br />
Free Press Journal<br />
3) Man loses Rs 2.3cr to online fraud, gets back Rs 1.2 cr 6 days after lodging complaint -Times of India<br />
4) J&#038;K cyber wing arrested one cyber-criminal from Tamil Nadu in connection with its ongoing investigation into an alleged multi-crore investment scam. &#8211; Kashmir Observer<br />
5) 19-year-old man from Rajasthan arrested in sextortion case -Hindustan Times<br />
6) Hyderabad Cyber Crime Police arrested a person from for cheating a woman for committing job fraud &#8211;<br />
Indian Express<br />
7) Researcher loses Rs 2.1 crore to cyber fraud- Indian Express<br />
8) A 27-year-old employee of a finance company was duped by cyber crooks of Rs 18.25 lakh for completing online tasks -Times of India<br />
9) Bharatpur&#8217;s Deeg Emerges As New Cybercrime Hub; Training Centers In Village Teach Scams &#038; Frauds-<br />
Free Press journal<br />
10) 8 held In Nawada for luring men online in paying hefty money for &#8216;impregnating women &#8211; Free Press journal<br />
A bare perusal of these news suggests that on an average almost 5 Crore is reported to be lost to cyber criminals out of which 1.2 Cr could be retrieved immediately. So, it would not be wrong if we presume that on an average an amount lost to cyber criminals could be Rs 1 to 1.5 Cr per day, making 30 Cr per month and about 360 Cr per Anum.<br />
What happens to this huge amount? Is filing FIR and awaiting police investigation and filing chargesheet etc. is the only option? Is there any civil remedy, alternatively, available to such cyber crime’s victim for recovery of their hard-earned money?<br />
According to Information Technology Act 2000, civil remedies are prescribed in Section 43 and 43A (now repealed after passing of DPDPA 23). As per section 46, Adjudicating Officer is designated to look after such civil cases or complaints filed under section 43. It is prescribed in The Information Technology (Qualification and Experience of Adjudicating Officers and Manner of Holding Inquiry) Rules, 2003, 4K, states that these Adjudicating Officers will adjudicate the complaints reported to them as far as possible within SIX MONTHS from date of complaint.<br />
In layman’s understanding the provisions under 4K are reasonable as Adjudicating Officers, being the Information Technology Secretaries of each state, are expected to be highly techno-savvy and capable of conducting online hearing by prescribing their own procedures following principal of natural justice. They are not strictly required to go by provisions of CPC or Evidence Act etc. So, it was expected from these Adjudicating Officers to deliver judgements speedily and as far as possible within Six Months.<br />
But the reality is terrifying.<br />
The author represented before various Adjudicating Officers across India and plight of civil litigation across India in I T Litigation, is same. The Adjudicating Officers are not practicing what is expected of them. It was expected that complaints filed under section 43/43A would be disposed off within six months but the reality is that many of the complaints filed in year 2015 onward are not yet even heard once.<br />
The Adjudicating Officers being IAS officers are not easily accessible to the litigants nor they are practicing judicial practices and procedures like publication of cause list or fixing timely hearing of the complaints registered before them. Nor they have any procedure set up by themselves for disposal of the complaints and on top of it they are not monitored by any arm of Judiciary, neither the High Court nor the Supreme Court. In simple understanding, these Adjudicating Officers are answerable to none.<br />
Now readers can understand that what could be the plight of litigants availing Civil remedy prescribed under Information Technology Act. On one hand India is eying to be 5 trillion economies in near future and with much use of emerging digital technologies, it is certainly a possibility. It is obvious and it is predicted that there would be a huge surge in cyber-crimes.<br />
There are only two remedies available for victims, Civil and Criminal. Outcome of Criminal remedy revolves around various factors and hence time consuming. The only ray of hope for victim is early relief through Civil remedy. But with the snail’s speed of Adjudicating Officers, this hope of early justice is also shattered.<br />
It is expected that this publication will reach to either Judges of Hon High Court or Hon Supreme Court and as guardians of justice and duty-bound to supervise lower judiciary, they will initiate some prompt action to cleanse the Civil Litigation prescribed in Information Technology Act 2000.</p>
<p>Adv Dr Mahendra Limaye<br />
Cyber Legal and Data Privacy Consultant<br />
9422109619/8830139056 </p>
]]></content:encoded>
					
					<wfw:commentRss>https://cyberorgindia.com/who-cares-for-civil-litigation-prescribed-in-information-technology-act/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Why deny Adequacy Status to India?</title>
		<link>https://cyberorgindia.com/why-deny-adequacy-status-to-india/</link>
					<comments>https://cyberorgindia.com/why-deny-adequacy-status-to-india/#respond</comments>
		
		<dc:creator><![CDATA[Mahendra Limaye]]></dc:creator>
		<pubDate>Tue, 05 Dec 2023 11:26:59 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<guid isPermaLink="false">https://cyberorgindia.com/?p=565</guid>

					<description><![CDATA[It’s surprising that India has not been granted adequacy status under GDPR since long and our entire Industry is satisfied that it is due to India not having strong Data Protection Laws in place. An adequacy decision is crucial from business perspective because adequacy status permits cross-border data transfer outside the EU, or onward transfer [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>It’s surprising that India has not been granted adequacy status under GDPR since long and our entire Industry is satisfied that it is due to India not having strong Data Protection Laws in place.<br />
An adequacy decision is crucial from business perspective because adequacy status permits cross-border data transfer outside the EU, or onward transfer from or to a party outside the EU without further authorisation from a national supervisory authority and in turn boosts the economy and could provide advantage to Indian companies dealing with EU. The Adequacy status will boost Indian economy further and will make dream of Hon Prime Minister regarding India becoming 5 trillion economies in coming future, a reality.<br />
I strongly believe that India’s case for Adequacy was not properly argued on merits and Industry left it to the mercy of EU authorities for granting such status rather than commanding the same.<br />
 Let us first check relevant provisions of GDPR for adequacy.<br />
Art. 45 GDPR speaks about Transfers on the basis of an adequacy decision<br />
    1A &#8211; transfer of personal data to a third country or an international organisation may take place where the Commission has decided that the third country, a territory or one or more specified sectors within that third country, or the international organisation in question ensures an adequate level of protection.<br />
India is having Information Technology Act in place since 2000 and section 43A was introduced after amendment in 2008. Section 43A was more than sufficient of fulfilling this requirement of adequate level of personal data protection.<br />
Section 43A &#8211; Compensation for failure to protect data. –<br />
Where a body corporate, possessing, dealing or handling any sensitive personal data or information in a computer resource which it owns, controls or operates, is negligent in implementing and maintaining reasonable security practices and procedures and thereby causes wrongful loss or wrongful gain to any person, such body corporate shall be liable to pay damages by way of compensation to the person so affected.<br />
 &#8220;Reasonable security practices and procedures&#8221; were defined as security practices and procedures designed to protect such information from unauthorised access, damage, use, modification, disclosure or impairment, as may be specified in an agreement between the parties or as may be specified in any law for the time being in force and in the absence of such agreement or any law, such reasonable security practices and procedures, as may be prescribed by the Central Government in consultation with such professional bodies or associations as it may deem fit.<br />
(iii) &#8220;Sensitive personal data or information&#8221; means such personal information as may be prescribed by the Central Government in consultation with such professional bodies or associations as it may deem fit.<br />
So careful reading of section 43A reveals that requirement of GDPR regarding adequate level of protection was already catered. The organisations were mandated to follow the reasonable security practices either framed by Government of India or Best practises in the industry. Also, by defining Sensitive Personal Data there was no ambiguity in understanding what was the focus of the provision. The focus was to provide adequate protection to sensitive personal data by organisations who were involved in handling/procession or storing of that data. Additionally, the Indian Law has made provision for monetary compensation in case any organisation failed to protect the data and hence the provisions for data protection were properly and adequately addressed.<br />
It was also clarified by GDPR that when assessing the adequacy of the level of protection, the Commission shall take account of the following elements:<br />
        1) The rule of law 2) Respect for human rights and fundamental freedoms 3) Relevant legislation, both general and sectoral, including concerning public security, defence, national security and criminal law 4) The access of public authorities to personal data, as well as the implementation of such legislation 5) Data protection rules 6) Professional rules 7) Security measures, including rules for the onward transfer of personal data to another third country or international organisation which are complied with in that country or international organisation 8) Case-law, as well as effective and enforceable data subject rights and effective administrative and judicial redress for the data subjects whose personal data are being transferred.<br />
If these additional 8 principles are also analysed, in my views India does not fall short in complying with all these requirements. Being largest democracy in world and its track record for last 75 years shows that Rule of Law in supreme in India. India is also a signatory to the Universal Declaration of Human Rights. The Indian constitution is greatly influenced by the Universal Declaration of Human Rights, 1948.<br />
As regards availability of sectoral and general regulations, The Information Technology Act was in place since 2000 and Section 43A, which specifically addressed Data Protection was present since 2008. Section 69,69A and 69B dealt with interception of messages, decryption of messages for Public Safety and National Security.<br />
Section 43A was adequate to provide Data Protection framework. The Information technology (Reasonable security practices and procedures and sensitive personal data of Information) Rules, 2011 added more provisions for Data protection and hence the IT Act became more stronger as regards to Data Protection.<br />
The Adjudicating Officers as well as appellate authorities in form of TDSAT were well placed and hence judicial framework was also in place.<br />
So, it can be well argued that as regards to Adequacy Status, India has fair or comparatively higher chances to attain the same.<br />
As regards to the existence and effective functioning of one or more independent supervisory authorities in the third country or to which an international organisation is subject, with responsibility for ensuring and enforcing compliance with the data protection rules, including adequate enforcement powers, for assisting and advising the data subjects in exercising their rights and for cooperation with the supervisory authorities of the Member States, I see no reason why this procedural requirement could not be complied for?<br />
Had India offered the EU Commission for Adequacy assessment, I am sure that India would have and can still attain the same. And even after its assessment, there could be some suggestions regarding the adequacy level of protection which could have been easily implemented.<br />
So, it’s my humble submission that Indian I T Industry has not made out a strong case for Adequacy Status, for reasons best known to them only.</p>
<p>The comments/ debates are welcome for better understanding of one and all.</p>
<p>Dr Mahendra Limaye<br />
The author is having Doctorate in Law and practices in specialised domain of Cyber Litigation and is FDPPI certified Daat Privacy Professional.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cyberorgindia.com/why-deny-adequacy-status-to-india/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>VIEWS ON DPDPB 22 BY ADV. DR. MAHENDRA LIMAYE</title>
		<link>https://cyberorgindia.com/views-on-dpdpb-22-by-adv-dr-mahendra-limaye/</link>
					<comments>https://cyberorgindia.com/views-on-dpdpb-22-by-adv-dr-mahendra-limaye/#comments</comments>
		
		<dc:creator><![CDATA[Mahendra Limaye]]></dc:creator>
		<pubDate>Tue, 22 Nov 2022 15:42:07 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<guid isPermaLink="false">https://cyberorgindia.com/?p=506</guid>

					<description><![CDATA[The right to privacy is a fundamental right as pronounced by Supreme Court of India in Puttaswamy Case, way back in year 2017 and urgent need was there to protect personal data as an essential facet of informational privacy and hence Personal data Protection Bill was introduced in parliament in 2018 and its modified version [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>The right to privacy is a fundamental right as pronounced by Supreme Court of India in Puttaswamy Case, way back in year 2017 and urgent need was there to protect personal data as an essential facet of informational privacy and hence Personal data Protection Bill was introduced in parliament in 2018 and its modified version in year 2018.However, in 2022, i.e., after 4 years of its introduction in parliament, the government announced to withdraw the said bill and as of now the growth of the digital economy had expanded leap and bounds and the use of data is seen as a critical means of communication between persons. There is urgent need to protect this Data and more particularly personal data and hence Indian Government has again introduced Digital Personal Data Protection Bill 2022 and which is presently available for suggestions and comments for its final introduction in Parliament.<br />
	As a student of cyberspace and follower of Data Privacy bill and staunch supporter of My Data My Right campaign, I wish to make public my observations as regards to comparisons of old version and new version of Data Privacy bill and hence this analysis.<br />
	Unlike the PDPB 2019 which comprised of 98 Chapters and hence dealt in depth with all the relevant provisions, the present DPDPB seems to be COMPRESSED version and prepared hurriedly having only 30 chapters in it and leaving large vacuum for interpretations either by Data Privacy Board or Courts and this compression in turn will take long time to define many such blank spaces and there will be large uncertainty regarding finality of the disputes. This I foresee as a major hurdle for Rights of Data Principal.<br />
	The purpose and focus of this DPDPB Act is, to provide for the processing of digital personal data for lawful purpose whereas PDPB19 aimed to provide for protection of the Fundamental right to privacy of individuals relating to their personal data and protection of the rights of individuals whose personal data was to be processed. The intentions of both the Acts, according to me are different. Any law, for its jurisprudential understanding, is studied through its objective. I find a large U-turn in the objectives of both the bills. As explained above, PDPB2019 was more focused towards protection of Fundamental Right whereas DPDPB22 is more data processing centric and hence more concerned about how data can be utilised by data processors in lawful manner. With complete understanding that India is country of Digital Illiterates and still compelling these digital illiterates to be more vigilant about their digital rights is too much an ask and it should have been worded the other way. The Data Processors should have been saddled with more responsibility and mandated to follow reasonable security practises for Personal data protection. This basic approach shift is visible while comparing the various provisions and hence in my view the present version needs few changes.<br />
	The draft needs to be applauded for its good work also. The very first definition as regards to &#8220;automated “has expanded its scope from earlier version covering any equipment to expand it to any digital process capable of operating and hence will cover vide range of activities now.<br />
	Another interesting difference is in defining Data Fiduciary. Earlier &#8220;data fiduciary&#8221; meant any person, including the State, a company, any juristic entity or any individual who alone or in conjunction with others determines the purpose and means of processing of personal data whereas in new definition “Data Fiduciary” means any person who alone or in conjunction with other persons determines the purpose and means of processing of personal data. Now person in legal sense means any individual, corporation, limited liability company, partnership, joint venture, association, joint-stock company, trust, unincorporated organization or government or any agency or political subdivision thereof. So, the applicability of law remains same but clever use of word may make it difficult to understand non-legal persons, whether Government is covered under definition of Data Fiduciary and this should be avoided.<br />
	Definition of Harm is also diluted. Previously Harm covered loss of reputation or humiliation; any discriminatory treatment; any subjection to blackmail or extortion; any denial or withdrawal of a service, benefit or good resulting from an evaluative decision about the data principal; any restriction placed or suffered directly or indirectly on speech, movement or any other action arising out of a fear of being observed or surveilled or any observation or surveillance that is not reasonably expected by the data principal. But present definition of harm has left a vacuum by not specifically including these words while defining what consists of harm and hence a lot depends upon wisdom of authorities from whom compensation for harm can be claimed.<br />
	While defining important definition of “personal data”, the DPDPB defined it as any data about an individual who is identifiable by or in relation to such data. This definition is too short as compared to PDPB 19 definition which read as “personal data&#8221; means data about or relating to a natural person who is directly or indirectly identifiable, having regard to any characteristic, trait, attribute or any other feature of the identity of such natural person, whether online or offline, or any combination of such features with any other information, and shall include any inference drawn from such data for the purpose of profiling;<br />
Identifiability of person by indirect means is missing in present bill and this will again give upper hand for Data fiduciaries and Data processors who by indirectly identifiable means like profiling etc. based on various information/characteristics available with them, can identify a person to near perfection.<br />
	Another major suggestion in the DPDPB is that this act will be applicable only where (a) such personal data is collected from Data Principals online; and (b) such personal data collected offline, is digitized. So, when personal Data is collected offline and the defence would be we have not digitalised the same or not processed the same through automated means but deployed physical modes/methods for its processing or profiling and then DPDPB will not be applicable and the data collector will escape for the clutches of the act. This will set very unhealthy trend and there could be gross misuse of the data collected through physical mode or rather everyone will simultaneously and hence this provision needs a relook.<br />
	As regards rights of Data Principal, one very significant and welcome move the DPDPB has introduced is regarding Right to nominate. According to this, A Data Principal shall have the right to nominate, in such manner as may be prescribed, any other individual, who shall, in the event of death or incapacity of the Data Principal, exercise the rights of the Data Principal in accordance with the provisions of this Act. This may be compared to will of a person to decide who will hold his Data related rights after his death.<br />
	The new DPDPB makes passing references about Data Protection Officer, Data Auditor and Data Protection Impact Assessment and regarding their roles, responsibilities, procedures etc. mentions that as may be prescribed. It is observed that this as may be prescribed in never prescribed unless courts give some directions and thereafter such prescriptions follow. It would have been better if DPDPB have elaborated in depth regarding these three Important authorities to be constituted under new regime as was elaborated in depth in PDPB 19.<br />
	The DPDPB has offered total new concept of Data Protection Board of India whereas in previous versions it was Data Protection Authority which would be Apex Authority as far as Data Protection regime in India is concerned. Again, the constitution and other details are not elaborated in proposed bill and as may be prescribed plays the important role.<br />
	Provisions of Alternate Dispute Resolution can be considered as a welcome move but considering the overall impact of ADR in domains of judiciary and scarcity of Resources who understands the Harm and are able to carry out Data Breach Impact Assessment, only time will tell its utility.<br />
	The Voluntary Undertaking provisions can be seen as Absolute Power available with the Board to compromise certain selective matters and there could be questions raised in future when these powers would be used by the board. There has to be standard code of practice while availing these powers and the present bill has to specify the same.<br />
	Non-inclusion of provisions for offences and defining offences may be a welcome move for significant Data fiduciaries but it takes away the desired deterrent impact and makes these provisions, softer. Unless law has deterrent impact, people will not be having fear about the same and the era where Data is compared with Oil, many of us feel that only monetary penalties will not create the desired impact.<br />
	By removing appellate tribunal and making High Court as court of appeals, I feel the procedure of litigation will be unnecessarily prolonged and Justice will be delayed. Taking a clue from failure of functioning of Adjudication Mechanism across India, available in Information Technology Act, I think some corrections like Functioning of Board shall be in Digital Design etc are most welcome. It would have been more appropriate if some timeline would have provided for the entire compliance framework functioning.</p>
<p>Adv Dr Mahendra Limaye is Cyber Legal and Data Privacy Consultant </p>
]]></content:encoded>
					
					<wfw:commentRss>https://cyberorgindia.com/views-on-dpdpb-22-by-adv-dr-mahendra-limaye/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>HAS INDIAN TWITTER USER DONATED TO AMERICA RELIEF FUND?</title>
		<link>https://cyberorgindia.com/has-indian-twitter-user-donated-to-america-relief-fund/</link>
					<comments>https://cyberorgindia.com/has-indian-twitter-user-donated-to-america-relief-fund/#respond</comments>
		
		<dc:creator><![CDATA[Mahendra Limaye]]></dc:creator>
		<pubDate>Fri, 07 Oct 2022 09:38:24 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<guid isPermaLink="false">https://cyberorgindia.com/?p=492</guid>

					<description><![CDATA[HAS INDIAN TWITTER USER DONATED TO AMERICA RELIEF FUND? SURPRISED!!!!!! Read the entire article to know the answer. As per notification issued dated 25 May 2022, Twitter agreed with Department of Justice and Federal Trade Commission to Pay $150 Million Civil Penalty and to Implement Comprehensive Compliance Program to Resolve Alleged Data Privacy Violations. The [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>  HAS INDIAN TWITTER USER DONATED TO AMERICA RELIEF FUND?</p>
<p>  SURPRISED!!!!!!   Read the entire article to know the answer.</p>
<p>As per notification issued dated 25 May 2022, Twitter agreed with Department of Justice and Federal Trade Commission to Pay $150 Million Civil Penalty and to Implement Comprehensive Compliance Program to Resolve Alleged Data Privacy Violations. The settlement will resolve allegations that Twitter violated the FTC Act of USA and an administrative order issued by the FTC in March 2011 that Twitter misrepresented about how it uses non-public contact information of its users and coincidently March 2011 order was also a compromise settlement.</p>
<p>The US government, in fresh complaint, filed in 2019 had alleged that Twitter violated the FTC Act and the 2011 order by deceiving users about the extent to which Twitter maintained and protected the security and privacy of users’ non-public contact information. The US Government specifically, pointed that, from May 2013 to September 2019, Twitter told its users that it was collecting their telephone numbers and email addresses for account’s security purposes, but failed to disclose that it also would use this personal information to help companies send targeted advertisements to consumers. Twitter also falsely claimed to comply with the European Union-U.S. and Swiss-U.S. Privacy Shield Frameworks, which prohibit companies from processing user information in ways that are not compatible with the purposes authorized by the users.</p>
<p>Twitter was charged with engaging in deceptive acts or practices in violation of Section 5(a) of the FTC Act, for its failures to provide reasonable security measures to prevent unauthorized access to non-public user information and to honour the privacy choices exercised by Twitter users.</p>
<p>The violations of the FTC act as described above was upheld on two counts. In First Count, Twitter has represented, expressly or by implication, that it uses reasonable and appropriate security measures to prevent unauthorized access to non-public user information. But in truth and in fact, Twitter did not use reasonable and appropriate security measures to prevent unauthorized access to non-public user information. And hence commission observed that the representation of respondent Twitter was, and is, false or misleading. In Second Count, respondent Twitter has represented, expressly or by implication, that it uses reasonable and appropriate security measures to honour the privacy choices exercised by users. But In truth and in fact, it was found that Twitter did not use reasonable and appropriate security measures to honour the privacy choices exercised by users.</p>
<p>The FTC concluded that acts and practices of Twitter constitute deceptive acts or practices, in or affecting commerce, in violation of Section 5(a) of the Federal Trade Commission Act.</p>
<p>So, in a nutshell Twitter or for that matter No social media should be trusted regarding the privacy of the contents/information provided/uploaded through them.</p>
<p>FTC observed that Twitter had engaged in deceptive acts or practices by misrepresenting that user of protected account could control who had access to their tweets or could send private “direct messages” that could only be viewed by the recipient only when, in fact, Twitter lacked reasonable safeguards to ensure those choices were honoured. In other words Twitter is making fool of the users who believed that messages will remain Private or Protected.</p>
<p>It is open secret that Commercial entities regularly use Twitter to promote offers or advertise to consumers, and many tweets contain links to other websites, including websites that users may use to purchase commercial products or services. Twitter’s core business model monetizes user information by using it for advertising. It is reported that of the $3.4 billion in revenue that Twitter earned in 2019, $2.99 billion(@90%) flowed from advertising.</p>
<p>Twitter primarily allows companies to advertise on its service through “Promoted Products,” which can take one of three forms: (1) Promoted Tweets, which appear within a user’s timeline, search results, or profile pages, similar to an ordinary tweet; (2) Promoted Accounts, which typically appear in the same format and place as other recommended accounts; and (3) Promoted Trends, which appear at the top of the list of trending topics for an entire day.</p>
<p>Twitter also offers various services that advertisers can use to reach their existing marketing lists on Twitter, including “Tailored Audiences” and “Partner Audiences.” Tailored Audiences allows advertisers to target specific groups of Twitter users by matching the telephone numbers and email addresses whereas Partner Audiences allows advertisers to import marketing lists from data brokers and match against the telephone numbers and email addresses collected by Twitter.</p>
<p>Twitter has prompted users to provide a telephone number or email address for the express purpose of securing or authenticating their Twitter accounts. However, Twitter used this information to serve targeted advertising and further its own business interests through its Tailored Audiences and Partner Audiences services without mandatory disclosures.</p>
<p>The facts revealed that Twitter obtained data from users on the pretext of harnessing it for security purposes but then ended up using the data to target users with ads and this practice affected more than 140 million Twitter users, out of which 23.6 million were Indian users and also boosted Twitter’s primary source of revenue.</p>
<p>Consumers who share their private information have a right to know if that information is being used to help advertisers target customers under US Laws. It is no secret that all social media companies share such private information and can be held accountable.</p>
<p>It is highlighted through Footnote that A consent agreement is for settlement purposes only and does not constitute an admission by the respondent that the law has been violated.</p>
<p>India has more than 23.6 million users on Twitter as of January 2022. If Twitter has agreed to pay @150 million dollars as a compromise settlement, then how much contribution every Indian Twitter user has made to this America Relief Fund? Yes about 6.5 $ or say Rs 500.</p>
<p>Just think seriously about the trap named social media laid for all, whose main intention is to gather the information. The social media companies on pretext of various security features and authentication/verification purposes go on collecting updated data from the users and by selling that data, are minting money. Just think, as a true national if you donate some amount proportionate to your data valuation to your own country, CAN YOU CHANGE FUTURE YOUR COUNTRY????</p>
<p>The present Twitter incident may be another eye-opener after 5 billion compromise settlement of Facebook with FTC in 2019. Who is getting benefitted by this money? This entire money is going into US treasury and at whose cost? Are 23.6 million Indian social media users are supposed to contribute in America relief Fund?</p>
<p>Its we, who have to collectively find out the answer for the same.</p>
<p>BECOME A PART OF CHANGE BY UNDERSTANDING THE DARKER SIDES OF THESE SOCIAL MEDIA PLATFORMS!!!!!</p>
<p>STOP SHARING INFORMATION THROUGH SUCH SOCIAL MEDIA PLATFORMS!!!</p>
<p>Adv. Dr. Mahendra Limaye</p>
<p>Cyber Legal and Data privacy Consultant</p>
<p>09422109619</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cyberorgindia.com/has-indian-twitter-user-donated-to-america-relief-fund/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
