This blog takes us on the journey of Aadhaar, a flagship programme of the Government of India. Starting from the day of its introduction in the public domain, in the year 2010, the Aadhaar scheme
Animals are an important part of the environment, and the right granted is almost insignificant. Cruelty and animal abuse are considered acts of violence and attacks on animals. Animal cruelty obligates us to fulfil our responsibility to provide for them. Animal protection is incorporated as a
A trademark is a symbol that can be used to separate the products or services of one company from those
Marriage is the legal name given to the relationship between a wedded couple. Marriage is a social
Al, the most dangerous thing humans have ever invented. There was a time when we used to fantasize about technology that would do things at just our command/gesture. With the invention of AI in the mid 20 century, that fantasy slowly & gradually starts taking the shape of reality. AI has
International law, as per the United Nations Website, “defines the legal responsibilities of States in their conduct with each other, and their treatment of individuals within State boundaries.
Groundwater has always been a matter of concern and also plays a vital role in our day-to-day life but stays a hot topic only in summer such as any other season of the year the concern shall be
“Out of the six million crimes that police in India recorded between 1 January and 31 December last year, 428,278 cases involved crimes against women and a majority of the cases were of kidnappings and abduction, rapes, domestic violence, dowry deaths, and assaults.” One of the most frequent
The rise of personal data as an asset for tech giants raises both competitive and data protection concerns. Since data is becoming more important in the digital economy, there are connections
Would you like your data to be stolen? Companies like Google, Facebook and Amazon do steal your data to create an algorithm that interests you and shows you things you like and advertisements you are most likely to click on. But what if the data being stolen is something more personal and the