enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Information Technology Act, 2000 - Wikipedia

    en.wikipedia.org/wiki/Information_Technology_Act...

    The law applies to the whole of India. If a crime involves a computer or network located in India, persons of other nationalities can also be indicted under the law. [2] The Act provides a legal framework for electronic governance by giving recognition to electronic records and digital signatures. It also defines cyber crimes and prescribes ...

  3. National Critical Information Infrastructure Protection Centre

    en.wikipedia.org/wiki/National_Critical...

    Provide strategic leadership and coherence across Government to respond to cyber security threats against the identified critical information infrastructure. Coordinate, share, monitor, collect, analyze and forecast, national-level threats to CII for policy guidance, expertise sharing and situational awareness for early warning or alerts.

  4. File:Acts of the Parliament of India 2005.pdf - Wikipedia

    en.wikipedia.org/wiki/File:Acts_of_the...

    The decision of the Supreme Court of India in "Eastern Book Company & Ors vs D.B. Modak & Anr" on 12 December, 2007 interpreted this section of the Act as making the material public domain. This work is also in the public domain in the U.S.A. because it is an edict of a government , local or foreign.

  5. File:Acts of the Parliament of India 2017.pdf - Wikipedia

    en.wikipedia.org/wiki/File:Acts_of_the...

    The decision of the Supreme Court of India in "Eastern Book Company & Ors vs D.B. Modak & Anr" on 12 December, 2007 interpreted this section of the Act as making the material public domain. This work is also in the public domain in the U.S.A. because it is an edict of a government , local or foreign.

  6. Cyber-security regulation - Wikipedia

    en.wikipedia.org/wiki/Cyber-security_regulation

    A cybersecurity regulation comprises directives that safeguard information technology and computer systems with the purpose of forcing companies and organizations to protect their systems and information from cyberattacks like viruses, worms, Trojan horses, phishing, denial of service (DOS) attacks, unauthorized access (stealing intellectual property or confidential information) and control ...

  7. Why Apple risks facing India’s scrutiny after ‘hacking ...

    www.aol.com/why-apple-risks-facing-india...

    India’s Supreme Court later said the government had refused to cooperate in a probe into the use of Pegasus spyware after the court appointed an independent committee to probe the allegations.

  8. India probing iPhone hacking complaints by opposition ... - AOL

    www.aol.com/news/india-probing-iphone-hacking...

    India's cyber security agency is investigating complaints of mobile phone hacking by senior opposition politicians who reported receiving warning messages from Apple, Information Technology ...

  9. Data breaches in India - Wikipedia

    en.wikipedia.org/wiki/Data_breaches_in_India

    Data breach incidences in India were the second highest globally in 2018, according to a report by digital security firm Gemalto. [ 1 ] [ 2 ] With over 690 million internet subscribers [ 3 ] and growing, India has increasingly seen a rise in data breaches both in the private and public sector.