The public consultation phase for the Sandbox Express will conclude on 13 December 2018.
Issue follows court order to block more illegal streaming websites.
This article discusses the exciting possibilities that blockchain technology creates both the "traditional" financial services industry and the so-called "disruptors".
Court expected to rule if number of trades in April last year were wrongfully reversed.
Published: 19 Nov 2018
New company harnesses AI-driven technology to deliver legal services digitally.
A spokesman for Facebook said it had a responsibility to handle any government request to restrict alleged misinformation "carefully and thoughtfully".
Details of attack were lost due to use of different platforms like WhatsApp, e-mail.
These practices seek to enhance the security of FIs’ systems and networks and mitigate the risk of unauthorised use of system accounts with extensive access privileges.
The Act also provides for the regulation of providers of licensable cybersecurity services.
The aim of these Guidelines is to establish a common baseline protection offered by responsible FIs from losses arising from unauthorised or erroneous transactions.
This paper will examine the applicability of traditional bases of jurisdiction to cyberspace, focusing particularly on the territorial principle, and will recommend a refinement in order to alleviate the jurisdictional problems posed by the unique nature of cyberspace.
This article will discuss the nature and characterisation of tokens issued, and the potential application of existing laws to tax assessment of ICO proceeds and GST on issuing entities.
We suggest the creation of a Blockchain Dispute Resolution Authority to administer distributed ledger technology and programmable contracts related disputes..
This article provides an overview of the broad categories of cryptocurrencies, namely Virtual Currencies, Security Tokens, Utility Tokens and Asset Backed Tokens.
There does not appear that there are horizontal legal issues that cannot be solved by carefully planning for and incorporating data protection by design considerations early in the system architecture and design stage.