Professional Documents
Culture Documents
Contents
4 Cyber
News 16 Cyber
Literature
10 Watch to Know
More: YouTube
Videos 17 Legal Updates from
the International
Sphere
11 Quiz
Column 19 We
Speak
13 Did You
Know? 22 Centre for Cyber
Laws Team
14 Safety
Tips
Cyber News
Religion in the metaverse: The Vatican is launching an
NFT gallery
The Vatican is planning to launch an NFT gallery meant to democratize
art, hence bringing the headquarters of the Roman Catholic Church
closer to the metaverse. Home to around 800 art pieces by famous artists,
which include works of Michelangelo, Raphael, Marc Chagall, Salvador
Dalí, Vincent van Gogh, and Pablo Picasso, the Vatican’s museum
attracts millions of visitors every year. Founded in the 16th century, it
is considered one of the most culturally significant sites of Vatican City.
The project will kick off in partnership with a metaverse developer,
Sensorium, and the Humanity 2.0 Foundation – a Vatican-led non-
profit organization. It will be chaired by Father Philip Larrey, Dean of
Philosophy at the Pope’s University in Vatican City. “The public-private
partnership aims to extend the availability of the Vatican’s heritage –
manuscripts, masterpieces, and academic initiatives – to people, who
otherwise won’t be able to experience it,” Sensorium’s press release reads.
The gallery should become available over the course of this year. It will
be accessible via desktop and VR glasses for full immersion.
Sources:
https://techstory.in/vatican-to-start-an-nft-gallery/
https://finbold.com/the-vatican-to-officially-launch-nft-gallery-to-
democratize-art/
https://cybernews.com/news/religion-in-the-metaverse-the-vatican-
is-launching-an-nft-gallery/
4 WEBZINE ON CYBER LAWS
Biggest European economy tightens its grip on another proceeding against Meta for linking Meta
Meta Quest’s (formerly Oculus) offer of VR headsets/products
with Facebook.
Germany’s cartel office, the Bundeskartellamt, imposed
stricter rules on Meta after determining its “paramount
significance for competition across markets.” A new
provision gives Germany’s regulator more control
over the practices of large digital companies. “If
the Bundeskartellamt formally determines that an
undertaking is of paramount significance for competition
across markets, it can prohibit it from engaging in anti-
competitive practices,” it said. Meta owns Facebook,
Instagram, and WhatsApp, operates features such
as Stories and Reels, offers like Shops or Watch, and
continuously expands its range of services. It also owns
a manufacturer of VR technology, Oculus, and aims to
build a metaverse. “The digital ecosystem created by Meta
has a very large user base and makes the company the key
player in social media. Our investigations have shown that
Meta is of paramount significance across markets, also
within the meaning of competition law,” Andreas Mundt,
President of the Bundeskartellamt, said. “Following a
proceeding which was contested for some time, we have
now formally proven the company’s relevant position.
Based on this, we are able to intervene against potential
competition infringements more efficiently than with the
toolkit available to us so far. Meta has waived the right to
appeal our decision. Meta’s services are used by more than
3.5 billion people worldwide. In early 2019, Germany’s Sources:
cartel office prohibited Meta from combining user data https://www.reuters.com/article/us-markets-stocks-
from different sources due to competition concerns. tech-idUSKBN25T1NN
Since 2020, the Bundeskartellamt has been conducting https://cybernews.com/news/biggest-european-
economy-tightens-its-grip-on-meta/
https://www.euractiv.com/section/digital/news/
german-antitrust-body-to-adopt-stricter-measure-
against-meta/
Australia’s oil and gas infrastructure at risk from cyber attacks | ABC News |
https://www.youtube.com/watch?v=BSElsHFNT2s
Truecaller, Cyber Peace Launch Nationwide Campaign To Tackle Cyber Fraud | NDTV |
https://www.youtube.com/watch?v=hr2f J1ZCMq8
5. ____________ means a person who has been granted a licence to issue a electronic signature certificate.
A. Certifying Authority
B. Certifying Private Key Authority
C. Certifying system controller
D. Appropriate Authority
8. The Altering of data so that it is not usable unless the changes are undone is
A. Biometrics
B. Encryption
C. Ergonomics
D. Compression
9. Authentication is _________
A. To assure identity of user on a remote system
B. Insertion
C. Modification
D. Integration
10. The following cannot be exploited by assigning or by licensing the rights of others
A. Patent
B. Design
C. Trademark
Create backup
Creating a backup of the private keys is very helpful for
cryptocurrency security. Even if the private keys are lost,
you can recover them quickly when there is a backup.
So, it is one of the essential factors that you can use to
ensure safety whenever you are using bitcoin or any
other cryptocurrency. Also, with the backup, the actual
numbers of cryptocurrencies can be evaluated so that
you can see if anything has happened to your storage.
Use 2FA
Some of the cryptocurrency wallets provide you with the
service of two indication factors. First, it provides you
with the second authentication password, which is new
every time you access your coins. It is the safest method
of securing your cryptocurrencies, and therefore, you
must use it for safety.
• Arindrajit Basu, “The retreat of the data localization brigade: India, Indonesia and
Vietnam”, The Diplomat, 2020.
Available here: http://www.viet-studies.net/kinhte/DataLocalizatinRetreat_Diplomat.
pdf
• Anupam Chander and Uyên P. Lê, “Data nationalism”, Emory Law Journal, 2014.
Available here: https://heinonline.org/HOL/Page?handle=hein.journals/emlj64&div=
32&g_sent=1&casa_token=F8Gcbs5ZOBAAAAAA:8vnR8tXAQoGv_41vw5hL3K72
lMwM1ZT3LB5-M6dQe6Wfaf9qkPKotMQkYyI_CjCdjPhsuDY&collection=journals
• Aynne Kokas, “Grindr and Data Trafficking: Theorizing consent in data localization”, In
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022.
Available here: https://scholarspace.manoa.hawaii.edu/bitstream/10125/79681/027
6.pdf
• Neha Mishra, “Data localization laws in a digital world: Data protection or data
protectionism?”, NUS Centre for International Law Research, The Public Sphere 2016.
Available here: https://deliverypdf.ssrn.com/delivery.php?ID=1851190050710100121
060960741160250740170470060410590021181040691060841020260251031120250
161001181100610320011210071271040910720160800110500641080810250670831
2209109
16 WEBZINE ON CYBER LAWS
Legal Updates from the
International Sphere
US Government launches Bureau of Cyberspace and Digital Policy
to enhance cyber security across nation (5th April 2022)
The US Department of State has announced that the bureau of cyberspace
and digital policy will address the national security challenges, economic
opportunities, and implication for US values associated with cyberspace,
digital technologies and digital policy. The bureau comprises of three policy
units: International Cyberspace Security, International Information and
Communications Policy and Digital Freedom. Their main mission is to lead and
coordinate the Department of State’s work on cyberspace and digital diplomacy
to encourage responsible state behavior in cyberspace and advance policies that
protect the integrity and security of the infrastructure of the Internet, serve US
interests, promote competitiveness and uphold democratic values.
India redrafts bill for government’s access to Source: International Association of Privacy
Professionals (https://iapp.org/news/a/elon-musk-
data (21st April, 2022)
twitter-purchase-prompts-privacy-concerns/ )
Indian Union Minister of State for Electronics and
Information technology said a bill has been drafted
to address concerns around government’s access
and monetization of personal data. The proposed
National Data Governance Framework and Policy will
set standards for data collection, use and storage by
government agencies, concepts that have been omitted
from India’s Data Protection Bill proposals.
Source: International Association of Privacy
Professionals (https://iapp.org/news/a/india-re-drafts-
bill-for-governments-access-to-data/ )
Operational Technology security aims to
bolster cyber security (25th April 2022)
The US based industrial control system security i.e.
OT Technology Security has been set up to build
close relationships and bolster the resilience of critical
infrastructure components. The group will promote
security intelligence sharing among manufacturers. This
has been hampered in the past by custom technologies
18 WEBZINE ON CYBER LAWS
We Speak
Reporting Cyber Attacks
In what seems to be new cyber security regulations in the offing, the
Ministry of Electronics and Information Technology has decided to
come up with regulations requiring the organizations to report cyber-
attacks and data leaks within their organization within 72 hours of
becoming aware of such breach. This is in sync with the European
Union’s General Data Protection Regime which also requires
organizations to report data breach incidents.
Security Breaches
Clause 25 of the Data Protection Bill 2021 puts an obligation on data
fiduciaries to report breaches of any personal or non-personal data
within their organizations. The objective of such a regulation is to curb
instances of cyber-crime and improve the cyber environment of the
country. Ballpark figures provided by Cyber Crime Magazine estimate
the extent of damages caused by cyber-crimes to the tune of $6 trillion
globally in the year 2021- ranking just behind economic powerhouses
U.S. and China.
1. D
2. D
3. A
4. B
5. A
6. D
7. B
8. B
9. A
10. C
Student Team: