{"id":523,"date":"2023-10-25T07:23:30","date_gmt":"2023-10-25T01:53:30","guid":{"rendered":"http:\/\/www.cyberlawcollege.com\/wp\/?p=523"},"modified":"2023-10-25T07:23:33","modified_gmt":"2023-10-25T01:53:33","slug":"new-training-programs-from-cyber-law-college","status":"publish","type":"post","link":"http:\/\/www.cyberlawcollege.com\/wp\/?p=523","title":{"rendered":"New Training Programs from Cyber Law College"},"content":{"rendered":"<div class=\"pf-content\">\n<p class=\"has-text-align-justify\">Consequent to the passing of DPDPA 2023 and also the emergence of the BIS standard of Data Governance, Cyber Law College has upgraded its programs and presented a new set of programs available on the LMS platform <strong><a href=\"http:\/\/www.cyberlawcollege.in\" class=\"ek-link\">http:\/\/www.cyberlawcollege.in<\/a><\/strong><\/p>\n<div style=\"padding-bottom:20px; padding-top:10px;\" class=\"hupso-share-buttons\"><!-- Hupso Share Buttons - https:\/\/www.hupso.com\/share\/ --><a class=\"hupso_toolbar\" href=\"https:\/\/www.hupso.com\/share\/\"><img src=\"http:\/\/static.hupso.com\/share\/buttons\/share-medium.png\" style=\"border:0px; padding-top:5px; float:left;\" alt=\"Share Button\"\/><\/a><script type=\"text\/javascript\">var hupso_services_t=new Array(\"Twitter\",\"Facebook\",\"Google Plus\",\"Pinterest\",\"Linkedin\");var hupso_background_t=\"#EAF4FF\";var hupso_border_t=\"#66CCFF\";var hupso_toolbar_size_t=\"medium\";var hupso_twitter_via = \"naavi\";var hupso_image_folder_url = \"\";var hupso_twitter_via=\"naavi\";var hupso_url_t=\"\";var hupso_title_t=\"New Training Programs from Cyber Law College\";<\/script><script type=\"text\/javascript\" src=\"http:\/\/static.hupso.com\/share\/js\/share_toolbar.js\"><\/script><!-- Hupso Share Buttons --><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Consequent to the passing of DPDPA 2023 and also the emergence of the BIS standard of Data Governance, Cyber Law College has upgraded its programs and presented a new set of programs available on the LMS platform http:\/\/www.cyberlawcollege.in<\/p>\n<div style=\"padding-bottom:20px; padding-top:10px;\" class=\"hupso-share-buttons\"><!-- Hupso Share Buttons - https:\/\/www.hupso.com\/share\/ --><a class=\"hupso_toolbar\" href=\"https:\/\/www.hupso.com\/share\/\"><img src=\"http:\/\/static.hupso.com\/share\/buttons\/share-medium.png\" style=\"border:0px; padding-top:5px; float:left;\" alt=\"Share Button\"\/><\/a><script type=\"text\/javascript\">var hupso_services_t=new Array(\"Twitter\",\"Facebook\",\"Google Plus\",\"Pinterest\",\"Linkedin\");var hupso_background_t=\"#EAF4FF\";var hupso_border_t=\"#66CCFF\";var hupso_toolbar_size_t=\"medium\";var hupso_twitter_via = \"naavi\";var hupso_image_folder_url = \"\";var hupso_twitter_via=\"naavi\";var hupso_url_t=\"\";var hupso_title_t=\"New Training Programs from Cyber Law College\";<\/script><script type=\"text\/javascript\" src=\"http:\/\/static.hupso.com\/share\/js\/share_toolbar.js\"><\/script><!-- Hupso Share Buttons --><\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_editorskit_title_hidden":false,"_editorskit_reading_time":0,"_editorskit_is_block_options_detached":false,"_editorskit_block_options_position":"{}","_themeisle_gutenberg_block_has_review":false,"spay_email":"","jetpack_publicize_message":""},"categories":[1],"tags":[],"jetpack_featured_media_url":"","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p3NjGu-8r","_links":{"self":[{"href":"http:\/\/www.cyberlawcollege.com\/wp\/index.php?rest_route=\/wp\/v2\/posts\/523"}],"collection":[{"href":"http:\/\/www.cyberlawcollege.com\/wp\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.cyberlawcollege.com\/wp\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.cyberlawcollege.com\/wp\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.cyberlawcollege.com\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=523"}],"version-history":[{"count":1,"href":"http:\/\/www.cyberlawcollege.com\/wp\/index.php?rest_route=\/wp\/v2\/posts\/523\/revisions"}],"predecessor-version":[{"id":534,"href":"http:\/\/www.cyberlawcollege.com\/wp\/index.php?rest_route=\/wp\/v2\/posts\/523\/revisions\/534"}],"wp:attachment":[{"href":"http:\/\/www.cyberlawcollege.com\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=523"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.cyberlawcollege.com\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=523"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.cyberlawcollege.com\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=523"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}