Search results
Results from the WOW.Com Content Network
The Information Technology (Intermediary Guidelines and Digital Media Ethics Code) Rules, 2021 is secondary or subordinate legislation that suppresses India's Intermediary Guidelines Rules 2011. [ a ] [ 1 ] [ 2 ] The 2021 rules have stemmed from section 87 of the Information Technology Act, 2000 and are a combination of the draft Intermediaries ...
The Information Technology Act, 2000 (also known as ITA-2000, or the IT Act) is an Act of the Indian Parliament (No 21 of 2000) notified on 17 October 2000. It is the primary law in India dealing with cybercrime and electronic commerce .
The Digital Personal Data Protection Act, 2023 (also known as DPDP Act or DPDPA-2023) is an act of the Parliament of India to provide for the processing of digital personal data in a manner that recognises both the right of individuals to protect their personal data and the need to process such personal data for lawful purposes and for matters connected therewith or incidental thereto. [1]
Information technology law (IT law), also known as information, communication and technology law (ICT law) or cyberlaw, concerns the juridical regulation of information technology, its possibilities and the consequences of its use, including computing, software coding, artificial intelligence, the internet and virtual worlds.
For premium support please call: 800-290-4726
The bill's data localization requirements, which mandate storing user data within India, raise concerns about potential misuse and surveillance by the government or third parties. [ 11 ] Provisions for interception and decryption of communications further add to worries about the protection of personal information and online privacy.
Get AOL Mail for FREE! Manage your email like never before with travel, photo & document views. Personalize your inbox with themes & tabs. You've Got Mail!
National Cyber Security Policy is a policy framework by Department of Electronics and Information Technology (DeitY) [1] It aims at protecting the public and private infrastructure from cyber attacks. [2] The policy also intends to safeguard "information, such as personal information (of web users), financial and banking information and ...