Welcome to My Blog

Chintan Pathak is a popular cyberlawyer and operates from Surat in India. He is specializing in cyberlaws and Intellectual property laws.
Chintan Pathak is a popular cyberlawyer and operates from Surat in India. He is specializing in cyberlaws and Intellectual property laws.

Smiley face

Tuesday, 20 January 2015

Child Online Protection in India: Need of the Hour/Second

No comments:
 Child Online Protection in India: Need of the Hour Second A new media was given birth to the technological advert called as Cyber Media commonly known as Cyber Space. Cyber Space is a complex environment consisting of...
Continue Reading...

Friday, 30 May 2014

Data Security

No comments:
Data means information which is being processed by means of equipment operating automatically in response to instructions given for that purpose, recorded with the intention that it should be processed by means of such equipment, recorded as part of a relevant filing system or with the intention that it should form part...
Continue Reading...

Data Protection

No comments:
Data protection is the relationship between collection and dissemination of data, technology, the public expectation of privacy, and the legal and political issues surrounding them. The challenge in data privacy is to share data while protecting personally identifiable information. Laws for protection of data...
Continue Reading...

Secure Delete

No comments:
Secure Delete is a way to make sure that when you delete a file it cannot be recovered. Understanding it is important to protect sensitive data properly. Deleting a file in Windows doesn't actually delete the data. When you delete a file in Windows explorer, the file is just moved to recycle bin instead of permanent...
Continue Reading...

Hard Disk Recovery

No comments:
Data recovery is the process of salvaging data from damaged, failed, corrupted, or inaccessible secondary storage media when it cannot be accessed normally. Many a times the data are being salvaged from storage media such as internal or external hard disk drives, solid-state drives (SSD), USB flash drive, storage tapes,...
Continue Reading...

Computer Security

No comments:
Computer security is information security as applied to computers and networks. These cover all the processes and mechanisms by which computer-based equipment, information and services are protected from unintended or unauthorized access, change or destruction, unplanned events and natural disasters. You must run...
Continue Reading...

Encryption

No comments:
Encryption is the process of encoding messages in an unreadable form or difficult to understand form so that no one can have unauthorized details of the message. In an encryption scheme, the message or information is turned into an unreadable cipher text using an encryption algorithm. Usually in this process the...
Continue Reading...