Legal aspects of IT Security-at ISACA conference 2011


Published on

Legal aspects of IT Security,corporate responsibility towards IT Act,2000

Published in: Economy & Finance, Business
1 Like
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Legal aspects of IT Security-at ISACA conference 2011

  1. 1. Legal Aspects in IT Security Is Your Organisation Up-to-Date?? (Ref : IT Act, 2008 & IT Rules 2011) Adv. Prashant Mali [BSc(Phy),MSc(Comp. Sci.),CNA,LLB,ISO 27001 LA] President – Cyber Law Consulting (Advocates & Attorneys) Founder – Cyber Law Foundation
  2. 2. COMPENSATION FOR FAILURE TO PROTECT DATA <ul><li>S43-A: Where a body corporate, possessing, dealing or handling any sensitive personal data or information in a computer resource which it owns, controls or operates, is negligent in implementing and maintaining reasonable security practices and procedures and thereby causes wrongful loss or wrongful gain to any person, such body corporate shall be liable to pay damages by way of compensation (limit not defined) to the person so affected. </li></ul>
  3. 3. What is a Body Corporate ? Under Section 43-A of IT Act,2008 <ul><li>Explanation: For the purposes of this section </li></ul><ul><li>(i) &quot;body corporate&quot; means any company and includes a firm, sole proprietorship or other association of individuals engaged in commercial or professional activities .. </li></ul><ul><li>..Contd </li></ul><ul><li>Exception: Government Organisations </li></ul>
  4. 4. <ul><li>“ Personal Information” means any information that relates to a natural person, which, either directly or indirectly, in combination with other information available or likely to be available with a body corporate, is capable of identifying such person. </li></ul>Personal Information Under Section(2)(1)(i) of IT Rules 2011
  5. 5. <ul><li>Sensitive personal data or information of a person means such personal information which consists of information </li></ul><ul><li>relating to;― </li></ul><ul><li>(i) password; </li></ul><ul><li>(ii) financial information such as Bank account or credit card or debit card or other payment instrument details ; </li></ul><ul><li>(iii) physical, physiological and mental health condition; </li></ul><ul><li>sexual orientation; </li></ul><ul><li>medical records and history; </li></ul><ul><li>Biometric information; </li></ul><ul><li>Exception: Info available under The Right to Information Act </li></ul>Sensitive Personal Data or Information Under Section(3) of IT Rules 2011
  6. 6. Appointment of Grievance Officer Under Section(5)(9) of IT Rules 2011 <ul><li>Body corporate shall address any discrepancies and grievances of their provider of the information with respect to processing of information in a time bound manner. For this purpose, the body corporate shall designate a Grievance Officer and publish his name and contact details on its website. The Grievance Officer shall redress the grievances of provider of information expeditiously but within one month from the date of receipt of grievance. </li></ul>
  7. 7. WEBSITES SHOULD HAVE LEGAL NOTICES Under Section(3) of The IT Rules 2011 <ul><li>The intermediary shall observe following due diligence while discharging his duties, namely : </li></ul><ul><li>The intermediary shall publish the rules and regulations, privacy policy and user agreement for access or usage of the intermediary’s computer resource by any person. </li></ul>
  8. 8. <ul><li>Your Organisations Server gets infected by a worm implanted by Chinese hacker hired by an angry investor /Customer any Competitors </li></ul><ul><li>S(43)(c) introduces or causes to be introduced any computer contaminant or computer virus into any computer, computer system or computer network; </li></ul><ul><li>shall be liable to pay damages of ? (limit not defined) </li></ul><ul><li>CEO/CIO/CTO </li></ul><ul><li>S(66) he shall be punishable with imprisonment for a term which may extend to two three years or with fine which may extend to five lakh rupees or with both. </li></ul>Vicarious liability of an Organisation (If Resonable Security Practices are not followed)
  9. 9. INDIAN GOVERNMENT CAN PEEP IN YOUR DATA <ul><li>S(69-B) Power to authorize to monitor and collect traffic data or information through any computer resource for Cyber Security </li></ul><ul><li>(2) The Intermediary or any person in-charge of the Computer resource shall when called upon by the agency which has been authorized  under sub-section (1), provide technical assistance and extend all facilities to such agency to enable online access or to secure and provide online access to the computer resource generating , transmitting, receiving or storing such traffic data or information. </li></ul>
  10. 10. THANK YOU prashant . [email_address] Mobile : 09821763157