Legal aspects of IT security

662 views
600 views

Published on

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
662
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
29
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Legal aspects of IT security

  1. 1. Legal Aspects in IT Security Is Your Organisation Up-to-Date?? (Ref : IT Act, 2008 & IT Rules 2011) Adv Prashant Mali [BSc(Phy),MSc(Comp. Sci.),CNA, 27001 LA,LLB] President – Cyber Law Consulting (Advocates & Attorneys) Founder – Cyber Law Foundation www.cyberlawconsulting.com
  2. 2. COMPENSATION FOR FAILURE TO PROTECT DATA <ul><li>S43-A: Where a body corporate, possessing, dealing or handling any sensitive personal data or information in a computer resource which it owns, controls or operates, is negligent in implementing and maintaining reasonable security practices and procedures and thereby causes wrongful loss or wrongful gain to any person, such body corporate shall be liable to pay damages by way of compensation (limit not defined) to the person so affected. </li></ul>
  3. 3. What is a Body Corporate ? Under Section 43-A of IT Act,2008 <ul><li>Explanation: For the purposes of this section </li></ul><ul><li>(i) &quot;body corporate&quot; means any company and includes a firm, sole proprietorship or other association of individuals engaged in commercial or professional activities .. </li></ul><ul><li>..Contd </li></ul><ul><li>Exception: Government Organisations </li></ul>
  4. 4. <ul><li>(ii) “Personal Information” means any information that relates to a natural person, which, either directly or indirectly, in combination with other information available or likely to be available with a body corporate, is capable of identifying such person. </li></ul>Personal Information Under Section(2)(1)(i) of IT Rules 2011
  5. 5. Sensitive personal data or information of a person means such personal information which consists of information relating to;― (i) password; (ii) financial information such as Bank account or credit card or debit card or other payment instrument details ; (iii) physical, physiological and mental health condition; (iv) sexual orientation; (v) medical records and history; (vi) Biometric information; Exception: Info available under The Right to Information Act Sensitive Personal Data or Information Under Section(3) of IT Rules 2011 www.cyberlawconsulting.com
  6. 6. Appointment of Grievance Officer Under Section(5)(9) of IT Rules 2011 <ul><li>Body corporate shall address any discrepancies and grievances of their provider of the information with respect to processing of information in a time bound manner. For this purpose, the body corporate shall designate a Grievance Officer and publish his name and contact details on its website. The Grievance Officer shall redress the grievances of provider of information expeditiously but within one month from the date of receipt of grievance. </li></ul>
  7. 7. Websites Should Have Legal Notices Under Section(3) of The IT Rules, 2011 <ul><li>The intermediary shall observe following due diligence while discharging his duties, namely : </li></ul><ul><li>The intermediary shall publish the rules and regulations, privacy policy and user agreement for access or usage of the intermediary’s computer resource by any person. </li></ul>
  8. 8. <ul><li>Your Organisations Server gets infected by a worm implanted by Chinese hacker hired by an angry investor /Customer any Competitors </li></ul><ul><li>S(43)(c) introduces or causes to be introduced any computer contaminant or computer virus into any computer, computer system or computer network; </li></ul><ul><li>shall be liable to pay damages of ? (limit not defined) </li></ul><ul><li>CEO/CIO/CTO </li></ul><ul><li>S(66) he shall be punishable with imprisonment for a term which may extend to two three years or with fine which may extend to five lakh rupees or with both. </li></ul>Vicarious liability of an Organisation (If Reasonable Security Practices are not followed)
  9. 9. GOVERNMENT CAN PEEP IN YOUR DATA <ul><li>S(69-B) Power to authorize to monitor and collect traffic data or information through any computer resource for Cyber Security </li></ul><ul><li>(2) The Intermediary or any person in-charge of the Computer resource shall when called upon by the agency which has been authorized  under sub-section (1), provide technical assistance and extend all facilities to such agency to enable online access or to secure and provide online access to the computer resource generating , transmitting, receiving or storing such traffic data or information. </li></ul>
  10. 10. Government’s power to intercept Under Section(69) of The IT Act, 2008 <ul><ul><li>Punishment for refusing to hand over passwords to an authorized official of the Central or State Government </li></ul></ul><ul><ul><li>Penalty – Imprisonment up to 7 years and fine </li></ul></ul>
  11. 11. Investigation Powers Under Section(78) of The IT Act, 2008 <ul><ul><li>As per the IT Act, 2008 Cyber crime cases can be investigated by the  “Inspector” rank police officers. </li></ul></ul><ul><ul><li>Means </li></ul></ul><ul><ul><li>IT executives, can be called to police station, in the pretext of inquiry </li></ul></ul>
  12. 12. THANK YOU prashant . [email_address] Mobile : 09821763157 www.cyberlawconsulting.com

×