Software Supply Chain Security Regulations
This article is written by Neeraj Jain, Siksha O Anusandhan National Institute of Law Understanding the Nature of Supply Chain Attacks An attack on the supply chain happens when a

Exploration of IT Rules 2021 on intermediary liability for harmful content under Section 79
This article is written by Neeraj Jain, Siksha O Anusandhan National Institute of Law. The Legal Foundation: IT Act and Safe Harbour The Information Technology Act, 2000 is the backbone

Implementing the DPDP Rules, 2025: Challenges for Indian Startups
This Article is written by Tamanna, KCC Institute of Legal Studies and Management, Gr Noida. This article examines the operational, financial, and technical challenges posed by the DPDP Rules, 2025,

Aadhaar Data Breaches and the Right to Privacy
This article is written by Pragati Trivedi, NIMS University Rajasthan, Jaipur. This paper is a critical analysis of Aadhaar breaches of data on the constitutional jurisprudence, statutory mechanism, proportionality doctrine,

Kamla Nehru Memorial Trust v. U.P. State Industrial Development Corporation Ltd
This article is written by Neeraj Jain, Siksha O Anusandhan National Institute of Law, Bhubaneswar Supreme Court Upholds Cancellation of Industrial Land Allotment in Kamla Nehru Memorial Trust v. U.P.

Deepfake Technology and Criminal Liability under the IT Act, 2000
This article is written by Shreyansh Tripathi, B.B.A L.L.B., Symbiosis Law School, Noida. The recent explosive development of Artificial Intelligence (AI) has spawned the so-called deepfake technology, digitally manipulated audio,