top of page
Blog
Sometimes we take a break from building cutting edge cryptography and data protection to stretch our academic muscles and write about privacy and stories.


Story: “What happened at Stella Università”
(“Stella Università” is a fictional Italian university, but the story is grounded on real-events in Italy.) Background Stella Università is a mid-sized public university in Italy, with ~20,000 students, dozens of departments, and a growing set of online services (student portals, research data, administrative files). Professors routinely share lecture materials, student records, research drafts, and collaboration documents among staff, students and external partners. The inci
Milind Deore
Dec 20, 20253 min read


Protecting Candidate Data in HR: Ensuring Confidentiality and Compliance
Introduction In today's digital landscape, organizations must prioritize data protection, especially when handling sensitive candidate information in Human Resources (HR). From offer letters to background verification (BGV) documents, safeguarding this data is crucial to maintain confidentiality, prevent misuse, and comply with regulations. This article explores key scenarios where candidate data must be protected and how organizations can implement best practices to mitigate
Milind Deore
Dec 20, 20253 min read


Transforming POS Terminals with Privacy-First Compliance
Problem Statement Brick-and-mortar retailers are under constant scrutiny for collecting and misusing customer personal information.¹ POS systems today often require phone numbers, emails, or loyalty IDs just to deliver invoices.² This practice exposes sensitive data, creating compliance risks under GDPR³, India DPDP Act⁴, CCPA⁵, and PCI DSS.⁶ Customers are increasingly reluctant to share this information due to privacy concerns and targeted marketing abuses.⁷ Retailers today
Milind Deore
Dec 20, 20254 min read
bottom of page