Back

Saksham

Legal Advisor! • 1y

Hi Aaditya, since you are still in the development stages, I'd request you to work on the revenue system by keeping the following points in mind: 1. You'd require to specifically disclose what data are you storing and why are you storing before taking consent from the users for their data. 2. Any user can request you for deletion of their data and you'd need to strictly comply with the same. 3. Only the necessary data can be stored on the servers. 4. Highest level of cybersecurity procedures. Each data breach can lead to fines of up to Rs 250 Crores. If you have any doubts or anything, I'm happy to help.

1 Reply
Replies (1)

More like this

Recommendations from Medial

Image Description

Farhan Quais

Hello • 10m

I would like to request team medial to add feature such as message deletion, unsending and edits as soon as possible

2 Replies
2
6

Devak K

Hey I am on Medial • 9m

Types of Data Breaches in Cyber Security | Digitdefence Understanding the types of data breaches in cyber security is crucial to protecting your business. Knowing these breach methods helps you implement stronger defenses and safeguard sensitive inf

See More
Reply
1

Vishnu Teja

Vedh's India Pvt Ltd • 4m

When I'm trying to make payment or register for a website or address field the details are automatically filled That means my data is leaked. I believe Cred leaked my personal data as the Cred UPI shows there. Please share your thoughts for account

See More
Reply
3

Sudarshan Pal

Data Engineer @Quant... • 1y

Many argue that Data Engineering is a part of data science and analytics. It's different from data science, but they work together closely. Data Engineers come first in the process. They gather and organize data. This data is then used by Data Scien

See More
Reply
2
4

Vasvi Seth

Cyber Security Stude... • 1y

🚨Data Breach Alert: Ticketmaster Hack Potentially Affects 560 Million Users🚨 Ticketmaster's parent company, Live Nation Entertainment, has confirmed an "unauthorized activity" in a database containing the US ticket sales company's data. This breac

See More
Reply
3

Gigaversity

Gigaversity.in • 6m

What is an API? Have you ever ordered food at a restaurant? The internet works in a similar way! An API (Application Programming Interface) is like a waiter - it takes your request, delivers it to the kitchen (backend), and brings back the response.

See More
Reply
7
Image Description

Business Digital Twenty Four

Innovation | Insight... • 7m

TikTok Fined €600 Million for Data Breaches: What It Means for EU Users and Global Tech. European Regulators Crack Down on TikTok Over Data Transfers to China and GDPR Transparency Failures https://bdigit24.com/tiktok-fined-600-million-euros-for-ill

See More
1 Reply
1
17

Prince Yadav

Co -founder at Trade... • 1y

Prefix data structure, often referred to as a trie, is a tree-like data structure used for storing and retrieving a dynamic set of strings efficiently, particularly when dealing with prefix-based operations. #Datastructure #codingjourney Prefix Expr

See More
Reply
6

Yashab alam

Founder ZehraSec • 6m

“AI is smart enough to detect the breach… but not smart enough to fix my spaghetti code

Reply
2

Download the medial app to read full posts, comements and news.