Search results
Results from the WOW.Com Content Network
Rule 4(2) covers the "identification of the first originator of the information". The extent of the first originator is limited to India— "Provided further that where the first originator of any information on the computer resource of an intermediary is located outside the territory of India, the first originator of that information within the territory of India shall be deemed to be the ...
The then Minister for Communications and Information Technology, Mr Kapil Sibal, defended the existing law, saying that similar laws existed in the US and the UK. He also said that a similar provision existed under the Indian Post Office Act, 1898. However, P Rajeev said that the UK law dealt only with communication from person to person. [31]
The decision of the Supreme Court of India in "Eastern Book Company & Ors vs D.B. Modak & Anr" on 12 December, 2007 interpreted this section of the Act as making the material public domain. This work is also in the public domain in the U.S.A. because it is an edict of a government , local or foreign.
The Digital Personal Data Protection Act, 2023 (also known as DPDP Act or DPDPA-2023) is an act of the Parliament of India to provide for the processing of digital personal data in a manner that recognises both the right of individuals to protect their personal data and the need to process such personal data for lawful purposes and for matters connected therewith or incidental thereto. [1]
In India, compliance regulation takes place across three strata: Central, State, and Local regulation. India veers towards central regulation, especially of financial organizations and foreign funds. Compliance regulations vary based on the industry segment in addition to the geographical mix.
A cybersecurity regulation comprises directives that safeguard information technology and computer systems with the purpose of forcing companies and organizations to protect their systems and information from cyberattacks like viruses, worms, Trojan horses, phishing, denial of service (DOS) attacks, unauthorized access (stealing intellectual property or confidential information) and control ...
English: These Regulations are made to give effect to the agreements and arrangements reached between the Government of the United Kingdom and other jurisdictions to improve international tax compliance. The agreements and arrangements are-
Information technology law (IT law), also known as information, communication and technology law (ICT law) or cyberlaw, concerns the juridical regulation of information technology, its possibilities and the consequences of its use, including computing, software coding, artificial intelligence, the internet and virtual worlds. The ICT field of ...