Search results
Results from the WOW.Com Content Network
Provide strategic leadership and coherence across Government to respond to cyber security threats against the identified critical information infrastructure. Coordinate, share, monitor, collect, analyze and forecast, national-level threats to CII for policy guidance, expertise sharing and situational awareness for early warning or alerts.
The court said that Section 66A of IT Act 2000 "arbitrarily, excessively and disproportionately invades the right of free speech" provided under Article 19(1) of the Constitution of India. But the Court turned down a plea to strike down sections 69A and 79 of the Act, which deal with the procedure and safeguards for blocking certain websites.
India had no Cyber security policy before 2013. In 2013, The Hindu newspaper, citing documents leaked by NSA whistle-blower Edward Snowden, has alleged that much of the NSA surveillance was focused on India's domestic politics and its strategic and commercial interests. [5]
The Digital Personal Data Protection Act, 2023 (also known as DPDP Act or DPDPA-2023) is an act of the Parliament of India to provide for the processing of digital personal data in a manner that recognises both the right of individuals to protect their personal data and the need to process such personal data for lawful purposes and for matters connected therewith or incidental thereto. [1]
A cybersecurity regulation comprises directives that safeguard information technology and computer systems with the purpose of forcing companies and organizations to protect their systems and information from cyberattacks like viruses, worms, Trojan horses, phishing, denial of service (DOS) attacks, unauthorized access (stealing intellectual property or confidential information) and control ...
However, India has formulated the National Cyber Security Policy 2013 which is not yet implemented. [4] The National Cyber Coordination Centre's purpose would be to help the country deal with malicious cyber-activities by acting as an Internet traffic monitoring entity that can fend off domestic or international attacks. [5] [6]
Rule 4(2) covers the "identification of the first originator of the information". The extent of the first originator is limited to India— "Provided further that where the first originator of any information on the computer resource of an intermediary is located outside the territory of India, the first originator of that information within the territory of India shall be deemed to be the ...
Due to security concerns, the recommendation along with such other matters were not made public when the GOM report was published. The organisation does hi-tech surveillance jobs, including satellite monitoring, terrestrial monitoring, internet monitoring , considered vital for the national security apparatus.