Search results
Results from the WOW.Com Content Network
The law applies to the whole of India. If a crime involves a computer or network located in India, persons of other nationalities can also be indicted under the law. [2] The Act provides a legal framework for electronic governance by giving recognition to electronic records and digital signatures. It also defines cyber crimes and prescribes ...
Provide strategic leadership and coherence across Government to respond to cyber security threats against the identified critical information infrastructure. Coordinate, share, monitor, collect, analyze and forecast, national-level threats to CII for policy guidance, expertise sharing and situational awareness for early warning or alerts.
A cybersecurity regulation comprises directives that safeguard information technology and computer systems with the purpose of forcing companies and organizations to protect their systems and information from cyberattacks like viruses, worms, Trojan horses, phishing, denial of service (DOS) attacks, unauthorized access (stealing intellectual property or confidential information) and control ...
However, India has formulated the National Cyber Security Policy 2013 which is not yet implemented. [4] The National Cyber Coordination Centre's purpose would be to help the country deal with malicious cyber-activities by acting as an Internet traffic monitoring entity that can fend off domestic or international attacks.
Rule 4(2) covers the "identification of the first originator of the information". The extent of the first originator is limited to India— "Provided further that where the first originator of any information on the computer resource of an intermediary is located outside the territory of India, the first originator of that information within the territory of India shall be deemed to be the ...
Information technology law (IT law), also known as information, communication and technology law (ICT law) or cyberlaw, concerns the juridical regulation of information technology, its possibilities and the consequences of its use, including computing, software coding, artificial intelligence, the internet and virtual worlds.
To make this 20-minute vegan curry even faster, buy precut veggies from the salad bar at the grocery store. To make it a full, satisfying dinner, serve over cooked brown rice.
In 2015, the Office of National Cyber Security Coordinator was created to advice the Prime Minister on strategic cyber security issues. In the case of nodal entity, India's Computer Emergency Response Team (CERT-in) is playing a crucial role under the Ministry of Electronics and Information Technology(MEITY).