![](https://static.wixstatic.com/media/e616dc_e48c870306664c9a94e20ad02390f044~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/e616dc_e48c870306664c9a94e20ad02390f044~mv2.jpg)
![Sniffing the “Admissibilty” of Sniffer Dogs: A Comparative Analysis](https://static.wixstatic.com/media/e616dc_e48c870306664c9a94e20ad02390f044~mv2.jpg/v1/fill/w_304,h_228,fp_0.50_0.50,q_90,enc_auto/e616dc_e48c870306664c9a94e20ad02390f044~mv2.jpg)
Digvijay Sahni
- Apr 30, 2022
Sniffing the “Admissibilty” of Sniffer Dogs: A Comparative Analysis
Introduction A common procedure and technique which is often resorted to by the investigation authorities are to deploy sniffer dogs/...
![](https://static.wixstatic.com/media/e616dc_f542942ccf2a41d78ba846fece65ba35~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/e616dc_f542942ccf2a41d78ba846fece65ba35~mv2.jpg)
![Encryptions and Privacy: Two Faces of the Same Coin](https://static.wixstatic.com/media/e616dc_f542942ccf2a41d78ba846fece65ba35~mv2.jpg/v1/fill/w_304,h_228,fp_0.50_0.50,q_90,enc_auto/e616dc_f542942ccf2a41d78ba846fece65ba35~mv2.jpg)
Kabir Singh
- Apr 23, 2022
Encryptions and Privacy: Two Faces of the Same Coin
Introduction From the Snowden leaks in 2013 to the more contemporary revelations of the use of Pegasus Spyware by nation-states globally,...
![](https://static.wixstatic.com/media/e616dc_b5a918a90d884cd4b7a570d16c0ae47e~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/e616dc_b5a918a90d884cd4b7a570d16c0ae47e~mv2.jpg)
![CCTVs in Public Spaces and the Data Protection Bill, 2021](https://static.wixstatic.com/media/e616dc_b5a918a90d884cd4b7a570d16c0ae47e~mv2.jpg/v1/fill/w_304,h_228,fp_0.50_0.50,q_90,enc_auto/e616dc_b5a918a90d884cd4b7a570d16c0ae47e~mv2.jpg)
Anamika Kundu & Digvijay S. Chaudhary
- Apr 20, 2022
CCTVs in Public Spaces and the Data Protection Bill, 2021
Introduction In recent times, Indian cities have seen an expansion of state deployed CCTV cameras. According to a recent report, in terms...
![](https://static.wixstatic.com/media/e616dc_b1e6ccdb35a54f14b47a486d6dfd8f89~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/e616dc_b1e6ccdb35a54f14b47a486d6dfd8f89~mv2.jpg)
![Rethinking Acquisition of Digital Devices by Law Enforcement Agencies](https://static.wixstatic.com/media/e616dc_b1e6ccdb35a54f14b47a486d6dfd8f89~mv2.jpg/v1/fill/w_304,h_228,fp_0.50_0.50,q_90,enc_auto/e616dc_b1e6ccdb35a54f14b47a486d6dfd8f89~mv2.jpg)
Harikartik Ramesh
- Apr 16, 2022
Rethinking Acquisition of Digital Devices by Law Enforcement Agencies
Introduction New challenges confront the Indian criminal investigation framework, particularly in the context of law enforcement agencies...
![](https://static.wixstatic.com/media/e616dc_a257949db5d9425b855450cc344b62ac~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/e616dc_a257949db5d9425b855450cc344b62ac~mv2.jpg)
![Data in Healthcare: Non-Rivalrous, All-Encompassing Realities](https://static.wixstatic.com/media/e616dc_a257949db5d9425b855450cc344b62ac~mv2.jpg/v1/fill/w_304,h_228,fp_0.50_0.50,q_90,enc_auto/e616dc_a257949db5d9425b855450cc344b62ac~mv2.jpg)
Yusra Khan
- Apr 9, 2022
Data in Healthcare: Non-Rivalrous, All-Encompassing Realities
Introduction How does data flow across networks – how do we protect it from falling into the wrong hands, where it gets reused and...
![](https://static.wixstatic.com/media/e616dc_5d2edcb968aa46c18e35511486bc253a~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/e616dc_5d2edcb968aa46c18e35511486bc253a~mv2.jpg)
![Recent JPC Report Introduces Further Challenges to Data Privacy in India](https://static.wixstatic.com/media/e616dc_5d2edcb968aa46c18e35511486bc253a~mv2.jpg/v1/fill/w_304,h_228,fp_0.50_0.50,q_90,enc_auto/e616dc_5d2edcb968aa46c18e35511486bc253a~mv2.jpg)
Anubhuti Awasthi
- Apr 8, 2022
Recent JPC Report Introduces Further Challenges to Data Privacy in India
Introduction It is not surprising to know that there are 4.88 billion users of the internet today which makes it nearly 60 percent of the...