• 🖧Post 5: Let’s talk about cookies!

    Greetings,  Dear Readers!  “Your Legal-Tech Brew!” is a blog as clichĂ© as any other blog
. It is an honest attempt towards compiling recent news in cyber-legal space, for the readers to understand right from the basic terminologies to analyzing existing legal framework across dimensions of cyberspace through various brief posts.  (The content of the blog →

  • Post 4: How do cyber-criminals target you? A peek into social engineering.

    Greetings,  Dear Readers!  “Your Legal-Tech Brew!” is a blog as clichĂ© as any other blog
. It is an honest attempt towards compiling recent news in cyber-legal space, for the readers to understand right from the basic terminologies to analyzing existing legal framework across dimensions of cyberspace through various brief posts.  (The content of the blog →

  • Post 3: (Part II) The ‘Fate’ of your personal data: Threats and Actors in the play.

    Greetings, Dear Readers! “Your Legal-Tech Brew!” is a blog as cliché as any other blog
.  It is an honest attempt towards compiling recent news in legal-cyber world, making the readers understand the basic terminologies and analyzing existing legal framework across dimensions of cyberspace through various brief posts.    (The content of the blog is original work of the author, due credits →

  • Post 2: (Part I) What is this ‘Personal Data’ and why is it debated all over?

    Greetings, Dear Readers! “Your Legal-Tech Brew!” (by Annanya Deshpande) is a blog as clichĂ© as any other blog
.  It is an honest attempt dedicated towards compiling recent developments in the cyber-legal domain and providing readers with a comprehensive understanding of fundamental terminologies in cyberspace.    (The content of the blog is original work of the author, →

  • Post 1: “Understanding the existing Legal framework of Cyberspace in India.”

    Greetings, Dear Readers! “Your Legal-Tech Brew!” (by Annanya Deshpande) is a blog as clichĂ© as any other blog
.  It is an honest attempt dedicated towards compiling recent developments in the cyber-legal domain and providing readers with a comprehensive understanding of fundamental terminologies in cyberspace.    (The content of the blog is original work of the author, →