{"id":441,"date":"2020-11-18T23:07:10","date_gmt":"2020-11-18T17:37:10","guid":{"rendered":"http:\/\/www.cyberlawcollege.com\/wp\/?p=441"},"modified":"2020-11-18T23:07:10","modified_gmt":"2020-11-18T17:37:10","slug":"indian-data-protection-summit-2020-day-1","status":"publish","type":"post","link":"http:\/\/www.cyberlawcollege.com\/wp\/?p=441","title":{"rendered":"Indian Data Protection Summit 2020-Day 1"},"content":{"rendered":"<div class=\"pf-content\"><p><a href=\"https:\/\/www.naavi.org\/wp\/indian-data-protection-summit-2020-day-1-of-3\/idp_19th_program_link\/\" rel=\"attachment wp-att-11276\"><img loading=\"lazy\" class=\"size-full wp-image-11276 aligncenter\" src=\"https:\/\/www.naavi.org\/wp\/wp-content\/uploads\/2020\/11\/idp_19th_program_link.jpg\" alt=\"\" width=\"417\" height=\"466\" \/><\/a><\/p>\n<p style=\"text-align: justify;\">Participation is free. Join on the above meeting room on Zoom platform or watch on You Tube channel.<\/p>\n<p>The complete program is as follows:<\/p>\n<p style=\"text-align: right;\"><a href=\"https:\/\/www.naavi.org\/wp\/indian-data-protection-summit-2020-day-1-of-3\/idps_program_2\/\" rel=\"attachment wp-att-11277\"><img loading=\"lazy\" class=\"size-large wp-image-11277 aligncenter\" src=\"https:\/\/www.naavi.org\/wp\/wp-content\/uploads\/2020\/11\/idps_program_2.jpg\" alt=\"\" width=\"640\" height=\"363\" \/><\/a><\/p>\n<p>The speakers conducting panel discussions are as follows:<\/p>\n<p><a href=\"https:\/\/www.naavi.org\/wp\/indian-data-protection-summit-2020-day-1-of-3\/panelists\/\" rel=\"attachment wp-att-11278\"><img loading=\"lazy\" class=\"size-full wp-image-11278 aligncenter\" src=\"https:\/\/www.naavi.org\/wp\/wp-content\/uploads\/2020\/11\/panelists.jpg\" alt=\"\" width=\"580\" height=\"667\" \/><\/a><\/p>\n<p style=\"text-align: right;\"><a href=\"https:\/\/www.naavi.org\/wp\/indian-data-protection-summit-2020-day-1-of-3\/idps_program_2\/\" rel=\"attachment wp-att-11277\">Naavi<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<div style=\"padding-bottom:20px; padding-top:10px;\" class=\"hupso-share-buttons\"><!-- Hupso Share Buttons - https:\/\/www.hupso.com\/share\/ --><a class=\"hupso_toolbar\" href=\"https:\/\/www.hupso.com\/share\/\"><img src=\"http:\/\/static.hupso.com\/share\/buttons\/share-medium.png\" style=\"border:0px; padding-top:5px; float:left;\" alt=\"Share Button\"\/><\/a><script type=\"text\/javascript\">var hupso_services_t=new Array(\"Twitter\",\"Facebook\",\"Google Plus\",\"Pinterest\",\"Linkedin\");var hupso_background_t=\"#EAF4FF\";var hupso_border_t=\"#66CCFF\";var hupso_toolbar_size_t=\"medium\";var hupso_twitter_via = \"naavi\";var hupso_image_folder_url = \"\";var hupso_twitter_via=\"naavi\";var hupso_url_t=\"\";var hupso_title_t=\"Indian Data Protection Summit 2020-Day 1\";<\/script><script type=\"text\/javascript\" src=\"http:\/\/static.hupso.com\/share\/js\/share_toolbar.js\"><\/script><!-- Hupso Share Buttons --><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Participation is free. Join on the above meeting room on Zoom platform or watch on You Tube channel. The complete program is as follows: The speakers conducting panel discussions are as follows: Naavi &nbsp; &nbsp;<\/p>\n<div style=\"padding-bottom:20px; padding-top:10px;\" class=\"hupso-share-buttons\"><!-- Hupso Share Buttons - https:\/\/www.hupso.com\/share\/ --><a class=\"hupso_toolbar\" href=\"https:\/\/www.hupso.com\/share\/\"><img src=\"http:\/\/static.hupso.com\/share\/buttons\/share-medium.png\" style=\"border:0px; padding-top:5px; float:left;\" alt=\"Share Button\"\/><\/a><script type=\"text\/javascript\">var hupso_services_t=new Array(\"Twitter\",\"Facebook\",\"Google Plus\",\"Pinterest\",\"Linkedin\");var hupso_background_t=\"#EAF4FF\";var hupso_border_t=\"#66CCFF\";var hupso_toolbar_size_t=\"medium\";var hupso_twitter_via = \"naavi\";var hupso_image_folder_url = \"\";var hupso_twitter_via=\"naavi\";var hupso_url_t=\"\";var hupso_title_t=\"Indian Data Protection Summit 2020-Day 1\";<\/script><script type=\"text\/javascript\" src=\"http:\/\/static.hupso.com\/share\/js\/share_toolbar.js\"><\/script><!-- Hupso Share Buttons --><\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_editorskit_title_hidden":false,"_editorskit_reading_time":0,"_editorskit_is_block_options_detached":false,"_editorskit_block_options_position":"{}","_themeisle_gutenberg_block_has_review":false,"spay_email":"","jetpack_publicize_message":""},"categories":[1],"tags":[],"jetpack_featured_media_url":"","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p3NjGu-77","_links":{"self":[{"href":"http:\/\/www.cyberlawcollege.com\/wp\/index.php?rest_route=\/wp\/v2\/posts\/441"}],"collection":[{"href":"http:\/\/www.cyberlawcollege.com\/wp\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.cyberlawcollege.com\/wp\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.cyberlawcollege.com\/wp\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.cyberlawcollege.com\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=441"}],"version-history":[{"count":1,"href":"http:\/\/www.cyberlawcollege.com\/wp\/index.php?rest_route=\/wp\/v2\/posts\/441\/revisions"}],"predecessor-version":[{"id":442,"href":"http:\/\/www.cyberlawcollege.com\/wp\/index.php?rest_route=\/wp\/v2\/posts\/441\/revisions\/442"}],"wp:attachment":[{"href":"http:\/\/www.cyberlawcollege.com\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=441"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.cyberlawcollege.com\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=441"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.cyberlawcollege.com\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=441"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}