0. Realities of a Virtual World
0.1 Cyber Space and Cyber World
0.1.1 Cyber Space and Information Technology
0.1.2 Cyber Law versus Information Technology (IT) Law
0.2 Understanding Information Technology
0.2.1 The layman's way
Information
Technology
Information technology (IT)
IT and we
0.2.2 The Technical Way
Information
Technology
Information technology
0.3 The Language of IT
0.3.1 Some Cyber Words
0.4 IT and UNCITRAL
0.5 IT and India
0.5.1 The Draft Electronic Commerce Act. 1998
0.5.2 Information Technology Act, 2000
0.5.3 Information Technology Amendment Act. 2008
0.5.4 Salient Features of the IT Act, 2000 as Amended by ITAA, 2008
0.5.4.1 Electronic Governance
Electronic signature certificates
Duties of subscribers
Attribution of electronic records
Secure records and signatures
Intermediary
Intermediary not responsible
Protected systems
0.5.4.2 Control Mechanism
Examiner of electronic evidence
Certifying Authorities
The Cyber Appellate Tribunal
Procedure for appeal to the Tribunal
Adjudicating Officer
Indian Computer Emergency Response Team (CERT-In)
Agency to monitor traffic data etc.
Cyber Regulations Advisory Committee
0.5.4.3 Offences and Remedies
Compounding of penalties and offences
Compensations
0.5.4.4 Major Offences
Cyber terrorism
Invasion of privacy
Obscenity
Jeopardising the sovereignty and integrity of India
0.5.4.5 Miscellaneous Provisions
1. Faith in the Cyber World
1.1 The Problem of Identity in Cyber Space
1.1.1 Identity theft
Punishment for identity theft (s.66-C)
Cyber stalking and identity theft
1.1.2 Internet Protocol (IP) Address
Automatically assigned addresses
Registration of IP addresses
How does IP function?
1.2 Electronic Governance
1.2.1 UNCITRAL Resolution on ‘Legal Value of Computer Records’ (1985)
1.2.2 Electronic Governance and IT Act, 2000 (as amended in 2008)
1.2.2.1 Legal Recognition of electronic records, signature and contract
1.2.2.2 IT (Use of Electronic Records and Digital Signatures) Rules, 2004
Filing of documents (r.3) and grant of licence, etc. (r. 4)
Payment and receipt of fee or charges (r. 5)
1.2.3 Delivery of Services by Service Provider (s. 6A)
1.2.3.1 The Information Technology (Electronic Service Delivery) Rules, 2011
System of electronic service delivery (r. 3)
Notification of electronic service delivery (r. 4)
Repository of electronic records (r. 5)
Changes in a repository of electronic records (r.6)
Responsibility of service provider and authorised agents (r. 7)
Audit of system and accounts of service provider (r.8)
Use of special stationery in electronic service delivery (r. 9)
1.2.4 Relention of Electronic Records (Ss. 7-10)
Compensation for failure to protect data (s. 43A)
1.2.4.1 The IT (Reasonable Security Practices and Sensitive Personal Data) Rules. 2011
Sensitive personal data or information (r. 3)
Body corporate to provide policy for privacy and disclosure of information (r. 4)
Collection of information (r. 5)
Disclosure of information (r. 6)
Transfer of information (r.7)
Reasonable security practices and procedures (r. 8)
1.3 Of Signatures: Digital and Electronic
1.3.1 UNC1TRAL Model Law on Electronic Signatures (2001)
1.3.1.1 Salient features
(i) Conduct of the Signatory (article 8)
(ii) Conduct of the Certification Service Provider (article 9)
(iii) Conduct of the Relying Party (article 11)
(iv) Recognition of Foreign Certificates and Electronic Signatures
(article 12)
1.3.1.2 Digital Signature and Electronic Signature
1.4 Regulation of Certifying Authorities
1.4.1 Powers and Functions of Controller Licence to issue electronic signature certificates (s. 21)
Application for licence (s. 22)
Renewal of licence (s. 23)
Procedure for grant or rejection of licence (s. 24)
Suspension of licence (s. 25)
Notice of suspension or revocation of licence (s. 26)
Power to delegate (s. 27)
Power to investigate contraventions (s. 28)
Access to computers and data (s. 29)
1.4.2 Functions and Duties of Certifying Authority
1.5 Duties of Subscribers
Control of private key (s. 42)
1.6 Intermediaries not to be Liable in Certain Cases (s. 79)
1.6.1 The IT (Intermediaries Guidelines) Rules, 2011
1.6.1 (i) Due diligence to be observed by intermediary (r 3)
1.6.2 The IT (Guidelines for Cyber Cafe) Rules, 2011
1.6.2 (i) Agency for Registration of Cyber Cafe (r.3)
1.6.2 (ii) Identification of User (r. 4)
1.6.2 (iii) Log Register (r. 5)
1.6.2 (iv) Management of Physical Layout and Computer Resource (r. 6)
1.6.2 (v) Inspection of Cyber Cafe (r. 7)
1.7 Examiner of Electronic Evidence
2. Niceties of Communication
2.1 The Problem of Communication
2.2 Global Efforts on Electronic Communication
2.2.1 UN Convention on the Use of Electronic
Communications in International Contracts (2005)
(i) Sphere of Application (articles 1-3)
(ii) General Provisions (articles 4-7)
(iii) Use of Electronic Communications in International Contracts (articles 8-14)
(iv) Final Provisions (articles 15-25)
2.3 Attribution, Acknowledgment and Dispatch of Electronic Records
Attribution
Acknowledgement of Receipt
time and place of dispatch and receipt of electronic record
2.4 Security Concerns
2 4 1 Of Records and Signatures
2.4.1.1 Power of Controller to Make Regulations (s. 89)
2 4 1.2 The Information Technology (Security Procedure) Rules, 2004
Secure digital signature (r.4)
2 4.2 Of Certification and All That
2.4.2.1 Functions of Controller (s. 18)
Recognition of foreign Certifying Authorities (s. 19)
2.4.2.2 Controller’s Powers Regarding Licence to Certifying Authorities
The procedure for grant and renewal of licence
2.4.2.3 Duties of Certifying Authorities (ss. 30-34)
2.5 Certificates and Subscribers
2.5.1 Issue, Suspension and Revocation of Certificates
Digital signature certificate
2.5.2 Subscribers and their duties
Generating key pair (s.40)
Acceptance of Certificate (s. 41)
Control of Private Key (s. 42)
Duties in case of Electronic Signature Certificate (s. 40A)
2.6 Regulation of Electronic Communication
2.6.1 Power of Controller to give directions (s. 68)
2.6.2 Powers of Government
Powers to issue directions for interception, etc of information (s.69)
Power to issue directions for blocking for public access of information (s. 69A)
Power to monitor and collect traffic data for Cyber Security (s. 69B)
2.6.3 Order for Blocking of Websites
2.6.4 IT (Procedure for Interception, etc of Information) Rules, 2009
Direction for interception or monitoring or decryption of information (r.3)
Authorisation of agency of Government (r. 4)
Issue of decryption direction by competent authority (r.5)
Interception, etc of information by a state beyond its jurisdiction (s. 6)
Content of direction (r. 7)
Alternative means in acquiring information (r. 8)
Direction of interception, etc. of any specific information (r. 9)
Direction regarding disclosure of information (r. 10)
Period within which direction shall remain in force (r. 11)
Authorised agency to designate nodal officer (r. 12)
Intermediary to provide facilities, etc. (r. 13)
Intermediary to designate officers to receive and handle requisition (r. 14)
Acknowledgement of instruction (r. 15)
Maintenance of records by designated officer (r. 16)
Decryption key holder to disclose decryption key or provide decryption
assistance (r. 17)
Submission of list of interception, etc of information (r. 18)
Intermediary to ensure effective check in decryption of information (rr. 19-20)
Responsibility of intermediary (r. 21)
Review of directions of competent authority (r. 22)
Destruction of record of interception, etc of information (r. 23)
Prohibition of interception, etc of information without authorization (r. 24)
Prohibition of disclosure of intercepted information (r. 25)
2.6.5 The IT (Procedure and Safeguard for Blocking of Information) Rules, 2009
Designated Officer (r. 3)
Nodal officer of organization (r. 4)
Direction by Designated Officer (r. 5)
Forwarding of request by organization (r. 6)
Committee for examination of request (r. 7)
Examination of request (r. 8)
Blocking of information in cases of emergency (r. 9)
Process of order of court for blocking of information (r. 10)
Expeditious disposal of request (r. 11)
Action for non-compliance of direction by intermediary (r. 12)
Intermediary to designate one person to receive and handle directions (r. 13)
Meeting of Review Committee (r. 14)
Maintenance of record by Designated Officer (r. 15)
Requests and complaints to be confidential (r. 16)
The Form
2.6.6 The IT (Procedure and Safeguard for Monitoring Traffic Data) Rules, 2009
Direction for monitoring (r.3)
Authorised agency for monitoring and collection of traffic data
or information (r. 4)
Intermediary to ensure effective check in handling of traffic data
or Information (r.5)
Responsibility of intermediary (r.6)
Review of directions of competent authority (r. 7)
Destruction of records (r.8)
Prohibition of monitoring or collection of information without authorisation (r. 9)
Prohibition of disclosure of traffic data or information by authorised
agency (r. 10)
Maintenance of confidentiality (r. 11)
2.6.7 Monitoring Agencies
(i) Protected System (s. 70)
(ii) National Nodal Agency (s. 70A)
(iii) Indian Computer Emergency Response Team (s. 70B)
2.6.8 Indian Computer Emergency Response Team (CERT-In)
2.6.8.1 Activities and Operations
Tracking of Indian Website Defacements
Tracking of Open Proxy Servers and Botnets
2.6.82 Other Activities
2.6.8.3 International Collaboration
2.6.8.4 Service conditipns of the Director General of CERT-IN
(Qualifications (rule 3)
Terms and conditions of service (rule 4)
Provident Fund (rule 6)
Pension (rule 7)
Dearness Allowance (rule 8)
Leave Travel Concession, etc. (rule 9)
Visits abroad (rule 10)
Accommodation (rule 11)
Medical Facilities (rule 12)
Leave (rule 13)
Administrative and other residuary matters (rule 14)
3. Electronic Commerce
3.1. The Problem of Reliability
3.1.1 Internet Protocol (IP)
3.1.2 International Organization for Standardization (ISO)
3.1.2.1 Functions
3.1.2.2 Nature of the Organisation
3.1.2.3 Membership and Constitution
3.1.2.4 Financial Viability
3.1.2.5 Development of ISO Standards
3.1.2.6 ISO’s International and Regional Partners
3.1.2.7 ISO and Environment
3.1.2.8 ISO Committee on Developing Country Matters: DEVCO
(i) Objectives
(ii) Functioning
3.1.2.9 The ISO Action Plan for Developing Countries (2011-2015)
3.1.3 Domain Names
3.2 Domain Names and their Administration: ICANN
3.2.1 The Mechanism of ICANN
(i) Constituencies
(ii) Structure
3.2.2 Policies of ICANN
3.2.2.1 Challenge Policies
3.2.2.2 Domain Name Dispute Resolution Policies
3.2.2.3 Other Policies
3.2.3 Dispute Resolutions Service Providers
3.2.3.1 Procedure for Application and Grant of Approval
3.2.3.2 Uniform Domain Name Dispute Resolution Procedure
3.2.3.3 Mandatory Administrative Proceedings
3.2.3.4 More about Dispute Resolution
3.2.3.5 Transfer during a Dispute
3.2.4 Functional Support
3.2.4 1 Supporting Organisations
3.2.4.2 Supporting Committees
3.2.5 ICANN and IP Addresses
3.2.6 Process of Amendment
3.2.7 Accountability
3.3 Domain Name System (DNS)
3.3.1 The Two Components of a Domain Name
3.3.2 The New gTI.D Programme
Language Options
3.3.3 ICANN Draft Five Year Strategic Plan (FY16 - FY20)
3.3.4 The Generic Names Supporting Organization (GNSO)
3.3.5 .IN Internet Domain Name
3.4 Theory of Exchange of Rights
3.4.1 Contracts: Physical and Electronic
An Online contract is complete with acceptance
Parties to e-contract cannot ignore the arbitration clause
3.4.2 UN Convention on the Use of Electronic
Communications in International Contracts (2005)
3.4.2.1 Sphere of Application (articles 1-3)
3.4.2.2 General Provisions (articles 4-7)
3.4.3.3 Use of Electronic Communications in International Contracts
(articles 8-14)
3.4.3.4 Final Provisions (articles 15-25)
3.5 The Concept of Electronic Commerce
3.5.1 Electronic Commerce: Prerequisites
3.6 Global Efforts for Promotion of Electronic Commerce
3.6.1 UNCITRAL Model Law on Electronic Commerce (1996)
3.6.1.1 Salient Features
(i) Attribution of Data Message (article 13)
(ii) Acknowledgement of Receipt (article 14)
(iii) Time and Place of Dispatch of Receipt (article 15)
(iv) Actions Related to Contracts of Carriage of Goods (article 16)
(v) Transport Documents (article 17)
3.6.2 Promoting Confidence in Electronic Commerce
3.6.2.1 Background
3.6.2.2 The Publication
(i) Part One: Electronic Signatures and Authentication Methods
(ii) Part Two: Cross-Border Use of Electronic Signature and
Authentication Methods
3.6.3 WTO and Electronic Commerce
3.6.3.1 Further Developments
3.7 Indian Information Technology Act, 2000 and Electronic Commerce
3.7.1 About Electronic Cheques and Truncated Cheques (81 -A)
3.7.2 About Signatures
3.7.2.1 Digital Signature
3.7.2.2 Electronic Signature
3.7.3 Security of Records and Signatures
3.7.4 Signature Certificates (ss. 35-39)
3.7.5 Scrutiny of Evidences
3.7.6 Powers of Central and State Governments
3.7.7 IT (e-Service Delivery) Rules, 2011
System of Electronic Service Delivery (rule 3)
Notification of Electronic Service Delivery (rule 4)
Creation of repository of electronically signed electronic records by Government
Authorities (rule 5)
Procedure for making changes in a repository of electronically signed electronic
records (rule 6)
Responsibility of service provider and authorised agents (rule 7)
Audit of the Information System and Accounts of service provider and authorised
agents (rule 8)
Use of special stationery in electronic service delivery (rule 9)
4. Cyber Crimes and Punishments
4.1 Concept of Crime
4.1.1 Explanations to the Crime
4.1.2 Theories of Punishment
4.1.3 The Rarest of Rare Test
4.1.4 Defences and All That
4.2 Cyber Crimes
4.2.1 Computer Hacking
Types of hacking
4.2.1.1 Provisions under IT Act, 2000
4.2.1.2 Case Law on Computer Hacking
ATMs are not computers, but electronic devices
Hacking a cell phone is computer hacking
Computer hacking to see e-mails, e-chats unauthorized
4.2.2 Cyber Stalking
4.2.2.1 Position under the Information Technology Act, 2000
4.2.2.2 Case Law on Cyber stalking
Identity theft and cyber stalking
Cyber stalking to bring down reputation
Cyber Defamation
4.2.2.3 Financial Crimes: Nigeria 419
Online Bank Fraud Case
Phishing is an online fraud
4.2.3 Cyber Terrorism
4.2.3.1 Attack on the Red Fort (2000)
4.2.3.2 Attack on Parliament (2001)
4.2.3.3 Bombay Attacks (2008)
4.2.3.4 Cyber Terrorism and IT Act. 2000
(as amended in 2008)
4 2.4 Cyber Pornography
4.2.4.1 Cyber Pornography and IT Act. 2000
Punishment for violation of privacy (s. 66-F.)
Punishment for publishing or transmitting obscene material in electronic
form (s. 67)
Punishment for publishing or transmitting of material containing
sexually explicit act. etc. in electronic form (s. 67-A)
4.2.4.2 Case Law on Cyber Pornography
Publishing obscene pictures online
Sending offensive messages online
Pornography online
4.2.4.3 Child Pornography (s. 67-B)
Child pornography: virtual or real?
4.3 Cyber Offences Control Mechanism under I T Act, 2000
4.3.1 Offences, Penalties, Powers and Monitoring Agencies
4.3.1.1 Offences
Act to apply for offences committed outside India (s. 75)
Compounding of offences (s.77-A)
Cognizable and bailable offences (s. 77B)
Courts can grant preventive relief: the case of Kolaveri Di
Confiscation of objects used in an offence (s. 76)
Compensation, etc under the Act does not bar other punishment (s. 77)
Power to investigate offences (s. 78)
No detention in violation of the Code
4.3.1.2 Penalties
Damage to computer, computer system, etc (s. 43)
Compensation for failure to protect data (s. 43A)
Failure to furnish information, return, etc. (s. 44)
Residuary Penalty (s. 45)
Recovery of penalty or compensation (s. 64)
Punishment for dishonestly receiving stolen computer resource,
etc. (s. 66B)
Punishment for intermediaries found in default (s.67C)
Penalty for misrepresentation (s. 71)
Penalty for breach of confidentiality and privacy (s. 72)
Punishment for disclosure of information in breach of lawful contract
(s. 72A)
Penalty for publishing false electronic signature certificate (s. 73)
Publication for fraudulent purpose (s. 74)
Punishment for abetment of offences (s. 84B)
Punishment of attempt to commit offences (s. 84C)
Offences by Companies (s. 85)
4.3.2 Administration of Justice
4.3.2.1 Bar on Jurisdiction (s. 61): The Court of First Instance
4.3.2.2 Adjudicating Officer (ss. 46-47)
Factors to be noted by the Adjudicating Officer
4.3.2.3 The Cyber Appellate Tribunal (CAT)
Constitution (s. 48)
Composition (s. 49)
Qualifications for appointment as Chairperson and Members (s. 50)
Service conditions of Chairperson and Members (s. 51)
Salary, allowances, etc. of Chairperson and Members (s. 52)
Powers and functions
Filling up of vacancies (s. 53)
Resignation and removal (s. 54)
Saving clause (s.55)
Staff (s. 56)
Officers and staff working under the Act are public servants (s.82)
Power to give directions (s. 83)
Protection of action taken in good faith (s. 84)
Appeal to the Tribunal (s. 57)
Procedures and powers (s. 58)
4.3.2.4 Appeals from the Tribunal to High Courts
4.3.2.5 The CAT (Procedure for Investigation of Misbehaviour, etc) Rules, 2009 Committee for investigation of complaints (r. 3)
Judge to conduct inquiry (r.4)
Application of the Departmental Inquiries Act, 1972 (r.5)
Powers of Judge (r. 6)
Suspension of Chairperson or Member (r.7)
Subsistence allowance (r.8)
Inquiry Report (r.9)
4.3.2.6 CAT (Salary, Allowances, etc) Rules. 2009
Forms
CAT Non-Functional for 3 Years
5. The Side Effects of IT Law
5.1 The Dynamics of Law
5.2 Impact of IT on law
5.3 IT- induced Changes in Other Laws
5.3.1 Amendments to IPC
5.3.1.1 The Latest Scenario
Extension of Code to extra-territorial offences (s. 4)
Electronic record (s. 29A)
Offence (s. 40)
Concealment of design to commit offence is punishable (s. 118)
Concealment by a public servant to commit offence in breach of duty
(s. 119)
Falsification of accounts (s. 477A)
Public servant framing an incorrect document . to cause injury (s. 167)
Absconding to avoid sen/ice of summons or other proceeding (s. 172)
Preventing service of summons or other proceeding, or publication
thereof (s. 173)
Omission to produce document to public servant by person legally
bound (s. 175)
Fabricating false evidence (s. 192)
Destruction of document or electronic record to prevent its production
(s. 204)
Forgery (s. 463)
Making a false document (s. 464)
Punishment for forgery (s. 465)
Forgery of record of court or of public register, etc (s. 466)
Forgery for purpose of cheating (s. 468)
Forgery for purpose of harming reputation (s. 469)
Forged document or electronic record (s. 470)
Using as genuine a forged document or electronic record (s. 471)
Having possession of document knowing it to be forged and intending to
use it as genuine (s. 474)
Counterfeiting device or mark used for authenticating documents other
than those described in section 467, or possessing counterfeit marked
material (s. 476)
5.3.2 Areas of Non-Application of IT Act, 2000 (as amended in 2008)
5.3.3 Changes in the Law of Evidence
5.3.3.1 The Present Position
(i) Meaning of the term ‘evidence’
(ii) Certain definitions of IT Act to apply
(iii) Admission defined
(iv) About relevancy
(v) Opinion of Examiner of Electronic Evidence
Opinion as to electronic signature where relevant
(vi) About Proof
Proof as to verification of digital signature (s. 7 3 A)
(vii) About Presumptions
Production of electronic records which another person, having
possession, could refuse to produce (s. 131)
5.4 Other Side Effects
5.4.1 Intellectual Property Law
A domain name may be protected under Trade Marks law, 1999
5.4.2 Law of Contract
5.4.3 Traditional Knowledge Digital Library (TKDL)
6. Flying in the Net: How Safe are ‘Birds’?
6.1 Concept of Rights
6.1.1 Definition of Legal Rights
Jural Correlatives of Right
6.1.2 Kinds of Legal Rights
6.1.3 Legal Duties and Breach Thereof
6.2 Net Legal Rights
6.2.1 Right to Privacy
6.2.1.1 Privacy in Cyber Space
6.2.1.2 Indian Scenario
6.2.1.3 Right to Privacy and the IT Act. 2000
(as amended in 2008)
Generating key pair
Control of private key
Power of police officer and other officers to enter, search, etc.
Punishment for disclosure of information in breach of lawful contract
(s. 72A)
Rule making powers of Central Government
Act in the aid of right to privacy
The provisions of the Act that raise alarm
6.2.2 Right to Freedom of Expression in Cyber Space
6.2.2.1 Indian Scenario
6.2.2.2 Provisions of Information Technology Act, 2000 (as amended in 2008)
(A) The Cyber Regulations Advisory Committee (CRAC)
(B) Controller to Make Regulations
Intermediaries not to be liable in certain cases
An Intermediary may also be held liable
The good and not so good provisions of the Act
6.2.3 Intellectual Property Rights
6.2.3.1 The IPR-induced Duality in the Notion of Ownership
6.2.3.2 IPR in the Cyber Space
Copyright and fair use
The importance of registration
Cyber Squatting is like passing off. and. punishable likewise
It’s wrong to exploit the business reputation of others for self gain
6.2.3.3 Position in India
6.3 Freedom in Cyber Space: Fact or Fiction?
6.3.1 The Position under IT Act, 2000 (amended in 2008)
6.3.2 Net Rights and IT Rules
6.4 UN Moves for Internet Governance
6.4.1 International Telecommunication Union (ITU)
6.4.1.1 The Broadband Commission for Digital Development
Looking Ahead
6.4.2 World Summit on the Information Society (WSIS)
6.4.2.1 First WSIS+10 Review Event
6.4.3 United Nations Group on Information Society (UNGIS)
6.4.3.1 Post-2015 Development Agenda
Joint Statement
6.4.4 Tunis Agenda
6.4.4.1 Internet Governance
6.4.4.2 Internet Governance Forum
6.4.4.2.1 Internet Governance Forum (IGF)-An Introduction
6.4.4.2.2 IGF Meetings
6.4.4.3 Implementation and Follow-Up
6.5 How Safe are We: Is Wiki-leaks Harbinger of Things to Come?
6.5.1 Responses by China and India
6.5.1.1 The Chinese Response
6.5.1.2 The Indian Response
A ‘bomb shell' from social networking websites
6.6 Global Trends to Bell the Cat @ Net
6.6.1 Indian Initiative
6.6.2 The Latest Developments
7. Cyber Law Administration in India
7.1 Introduction
7.2 Cyber Policies of the Government of India
7.2.1 The E-mail Policy
7.2.1.1 Email Account Management and Best
Practices for Effective Email Usage
7.2.1.2 Email Services and Usage Policies
7.2.1.3 NIC Policy on Format of E-mail Address
E-mail Address Policy
Policy for Address Resolution
Mapping of Email Addresses and Conventions to be followed
Codes to be used
7.2.1.4 Password Policy
7.2.1.5 Security Policy for User
Acceptable Use of Client Systems
7.2.1.6 Service Level Agreement
7.2.2 The Policy on IN Internet Domain Name
7.2.2.1 Adopting New Policy Framework
Essential Criteria
7.2.3 IN Domain Name Policy Framework and Implementation
7.2.3.1 Major Policy Elements
7.2.3.2 Institutional Framework
7.2.3.3 Implementation Mechanism
7.2.4 National Cyber Security Policy-2013
7.2.4.1 Vision, Mission and Objectives
7.2.4.2 Strategies
A. Creating a Secure Cyber Ecosystem
B. Creating an Assurance Framework
C. Encouraging Open Standards
D. Strengthening the Regulatory framework
E. Creating Mechanisms for Security Threat Early Warning,
Vulnerability Management and Response to Security Threats
F. Securing E-Governance Services
G. Protection and Resilience of Critical Information Infrastructure
H. Promotion of Research & Development in cyber security
I. Reducing Supply Chain Risks
J. Human Resource Development
K. Creating Cyber Security Awareness
L. Developing effective Public Private Partnerships
M. Information sharing and cooperation
N. Prioritized approach for implementation
O. Operationalisation of the Policy
7.2.5 National Policy on Information Technology, 2012 (NPIT 2012)
7.2.6 National Policy on Universal Electronic Accessibility
7.3 National e-Governance Plan (NeGP)
7.3.1 State Data Centres
7.3.2 State Wide Area Networks
7.3.3 Common Services Centres
7.3.4 Guidelines for e-Governance under NeGP
7.3.5 E-Pramaan
7.4 Cyber Law Administration in India: The Latest Scenario
7.4.1 Organizations
7.4.1.1 Controller of Certifying Authorities (CCA)
7.4.1.2 Cyber Appellate Tribunal (CAT)
7.4.1.3 Indian Computer Emergency Response Team (CERT-In)
7.4.1.4 in Registry
7.4.2 Attached Offices
7.4.2.1 Standardisation, Testing and Quality Certification (STQC)
7.4.2.2 Directorate and National Informatics Centre (NIC)
7.4.3 Section 25 Companies
7.4.3.1 Media Lab Asia
7.4.3.2 National Informatics Centre Services Inc (NICSI)
7.4.3.3 National Internet Exchange of India (NIXI)
7.4.4 Autonomous Societies
7.4.4.1 Education and Research in Computer Networking (ERNET)
7.4.4.2 Centre for Development of Advanced Computing (C-DAC)
(i) Activities of C-DAC
High Performance Computing (HPC) and Grid Computing
Multilingual and Heritage Computing
Software Technologies and Foss
Professional Electronics, VLSI and Embedded Systems
Cyber Security and Cyber Forensics
Health Informatics
Education and Training
7.4.4.3 Centre for Materials for Electronics Technology (C-MET)
7.4.4.4 National Institute of Electronics and Information Technology (NIELIT)
7.4.4.5 Society for Applied Microwave Electronics Engineering and Research
(SAMEER)
7.4.4.6 Software Technology Parks of India (STPI)
7.4.4.7 Electronics and Computer Software Export Promotion Council (ESC)
7.5 National Knowledge Network (NKN)
7.5.1 Objective
7.5.2 Application Areas
7.5.3 Current Status
Appendices
I. Tunis Agenda for the Information Society
II. Tunis Commitment
III. Plan of Action
IV. Declaration of Principles
V. Resolution adopted by the General Assembly On World Summit on the Information
Society 2002
VI. Resolution adopted by the General Assembly On World Summit on the Information
Society 2003
VII. Resolution adopted by the General Assembly On World Summit on the Information
Society 2005
VIII. Resolution adopted by the General Assembly On World Summit on the Information
Society 2006 |