SlideShare a Scribd company logo
1 of 14
ASSIGNMENT
SUBMISSION
GAJENDRA SINGH THAKUR,
-SUBMISSION BY.
page 2
page 3
“One Single Vulnerability is
all an Attacker Need”.
Window Snyder,
Chief Security Officer,Fastly
NEWI.T.
RULES2021
LETS UNDERSTAND NEW IT RULES 2021.
• The Government of India had framed
the Information Technology (Guidelines for
Intermediaries and Digital Media Ethics Code)
Rules, 2021, in February this year.These rules
require the social media intermediaries/ platforms
to adhere to a vastly tighter set of rules within
three months, which ended on May 25.
• Till now almost all major social media
intermediaries have not adhered to all the
requirements.
• But non-compliance can only make things worse,
especially in a situation in which the relationship
between some platforms such asTwitter and the
Government seems to have broken down.
• While there are positive aspects about the said
guidelines, there are, equally, glaring ambiguities
and susceptibilities that appear to be in conflict
with the basic tenets of democracy and
constitutional values.
INTRODUCTION
A brief intro of New IT rules 2021..
page 5
POSITIVESIDEOF
THENEWI.T.
RULES
The Rules must be credited for they mandate
duties such as:
• Removal of non-consensual intimate
pictures within 24 hours,
• Publication of compliance reports to
increase transparency,
• Setting up a dispute resolution mechanism
for content removal,
• Adding a label to information for users to
know whether content is advertised,
owned, sponsored or exclusively
controlled.
page 6
ASSOCIATEDISSUESWITH
THERULES
page 7
a) Rules Ultra-vires to the IT Act: It is of
significant concern that the purview of the IT Act,
2000, has been expanded to bring digital news
media under its regulatory ambit without
legislative action.
• There has been criticism about bringing in a
plethora of new rules that ought to be
normally triggered only via legislative action.
b) Depriving of Fair Recourse:An intermediary
is now supposed to take down content within
36 hours upon receiving orders from the
Government.
• This deprives the intermediary of a fair
recourse in the event that it disagrees with
the Government’s order due to a strict
timeline.
ASSOCIATEDISSUESWITH
THERULES
page 8
c) Undermining Free Speech:The rules place
fetters upon free speech by fixing the
Government as the ultimate adjudicator of
objectionable speech online.
d)Traceability Issue:Till now social media
platforms have the immunity that users received
from end-to-end encryption was that
intermediaries did not have access to the
contents of their messages.
• Imposing this mandatory requirement of
traceability will break this immunity, thereby
weakening the security of the privacy of these
conversations.
• The threat here is not only one of privacy but
to the extent of invasion and deprivation from
a safe space.
Continued.
ASSOCIATEDISSUESWITH
THERULES
page 9
e) Counterproductive in Absence of Data
Privacy Law: It could prove counterproductive in
a country where the citizens still do not have a
data privacy law to guard themselves against
excesses committed by any party.
f) Compliance Burden:The Rules create futile
additional operational costs for intermediaries by
requiring them to have Indian resident nodal
officers, compliance officers and grievance
officers.
• This may not be in favour of many small digital
entities and may open the floodgates for all
kinds of interventions.
Continued.
WAYFORWARD
page 10
Uniform Application of Law: Regulation has an
important place in the scheme of things, and no
one advocates giving a free pass to digital
platforms.
• Further, the laws to combat unlawful content
are already in place.What is required is their
uniform application.
Deliberating with Stakeholders:There are
indeed many problems with the new rules, but
the major issue was that these were introduced
without much public consultation.
• The solution to ongoing criticism about these
rules is to start afresh with the publication of a
white paper.
WAYFORWARD
page 11
Statutory Backing: After that, if regulation is still
deemed to be necessary, then it must be
implemented through legislation that is debated
in Parliament instead of relying upon executive
rule-making powers.
Expediting Data Protection Law: Making
platforms share more information could prove
counterproductive in a country where the citizens
still do not have a data privacy law to guard
themselves against excesses committed by any
party.
• In this context, there is a need to expedite the
passing of the personal data protection bill,
2019.
Continued.
CONCLUSION
• The Supreme Court, in the case of Life Insurance
Corporation.Of India vs Prof. Manubhai D. Shah
(1992) had elevated ‘the freedom to circulate
one’s views as the lifeline of any democratic
institution’.
• In this context, five industry bodies, including
the CII, FICCI and the U.S.-India Business Council
have sought an extension of 6-12 months for
compliance.This is an opportunity for the
Government to hear out the industry, and also
shed its high-handed way of rule-making.
REFERENCESUSED
Some referred website links are mentioned here:-
• https://www.drishtiias.com/daily-updates/daily-
news-editorials/information-technology-rules-
2021-1
• https://thewire.in/tech/explainer-how-the-new-it-
rules-take-away-our-digital-rights
• https://inc42.com/buzz/as-india-it-rules-go-into-
effect-are-facebook-twitter-and-co-compliant/
page 13
THANK
YOU
GAJENDRA SINGHTHAKUR
+919893565656
randomuser@gmail.com
www.gajendrasingh.tech

More Related Content

What's hot

Data Protection and Journalism: The Changing Landscape
Data Protection and Journalism: The Changing LandscapeData Protection and Journalism: The Changing Landscape
Data Protection and Journalism: The Changing LandscapeDavid Erdos
 
European Data Protection and Social Networking
European Data Protection and Social NetworkingEuropean Data Protection and Social Networking
European Data Protection and Social NetworkingDavid Erdos
 
2013 5-30 co e presentation matthijs van bergen net neutrality in the netherl...
2013 5-30 co e presentation matthijs van bergen net neutrality in the netherl...2013 5-30 co e presentation matthijs van bergen net neutrality in the netherl...
2013 5-30 co e presentation matthijs van bergen net neutrality in the netherl...Matthijs Van Bergen
 
Sookman primetime presentation
Sookman primetime presentationSookman primetime presentation
Sookman primetime presentationbsookman
 
Online Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in PakistanOnline Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in PakistanShahid Jamal Tubrazy
 
Anti social networking v 2
Anti social networking v 2Anti social networking v 2
Anti social networking v 2lilianedwards
 
Data Protection and "Intermediary" Responsibility: An Historical Perspective
Data Protection and "Intermediary" Responsibility:  An Historical PerspectiveData Protection and "Intermediary" Responsibility:  An Historical Perspective
Data Protection and "Intermediary" Responsibility: An Historical PerspectiveDavid Erdos
 
Nov 2013 Whos who International article
Nov 2013 Whos who International articleNov 2013 Whos who International article
Nov 2013 Whos who International articleCarl Frank
 
Offdata: a prosumer law agency to govern big data in the public interest
Offdata:  a prosumer law agency to govern big data in the public interestOffdata:  a prosumer law agency to govern big data in the public interest
Offdata: a prosumer law agency to govern big data in the public interestChris Marsden
 
Cyber crime laws in Pakistan
Cyber crime laws in PakistanCyber crime laws in Pakistan
Cyber crime laws in PakistanAyesha Majid
 
Rage against the Censorship Machine (aka copyright directive)
Rage against the Censorship Machine (aka copyright directive)Rage against the Censorship Machine (aka copyright directive)
Rage against the Censorship Machine (aka copyright directive)Kirsten Fiedler
 
Cyber Laws in Pakistan
Cyber Laws in PakistanCyber Laws in Pakistan
Cyber Laws in PakistanAyesha Majid
 

What's hot (20)

Data Protection and Journalism: The Changing Landscape
Data Protection and Journalism: The Changing LandscapeData Protection and Journalism: The Changing Landscape
Data Protection and Journalism: The Changing Landscape
 
Internet governance
Internet governanceInternet governance
Internet governance
 
Internet Freedom 2.1
Internet Freedom 2.1Internet Freedom 2.1
Internet Freedom 2.1
 
European Data Protection and Social Networking
European Data Protection and Social NetworkingEuropean Data Protection and Social Networking
European Data Protection and Social Networking
 
NIST article I wrote
NIST article I wroteNIST article I wrote
NIST article I wrote
 
CTO Cybersecurity Forum 2013 Alexander Seger Budapest Convention on Cybercrime
CTO Cybersecurity Forum 2013 Alexander Seger Budapest Convention on CybercrimeCTO Cybersecurity Forum 2013 Alexander Seger Budapest Convention on Cybercrime
CTO Cybersecurity Forum 2013 Alexander Seger Budapest Convention on Cybercrime
 
2013 5-30 co e presentation matthijs van bergen net neutrality in the netherl...
2013 5-30 co e presentation matthijs van bergen net neutrality in the netherl...2013 5-30 co e presentation matthijs van bergen net neutrality in the netherl...
2013 5-30 co e presentation matthijs van bergen net neutrality in the netherl...
 
Sookman primetime presentation
Sookman primetime presentationSookman primetime presentation
Sookman primetime presentation
 
Online Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in PakistanOnline Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in Pakistan
 
Anti social networking v 2
Anti social networking v 2Anti social networking v 2
Anti social networking v 2
 
Germany's New Social Media Law
Germany's New Social Media LawGermany's New Social Media Law
Germany's New Social Media Law
 
Data Protection and "Intermediary" Responsibility: An Historical Perspective
Data Protection and "Intermediary" Responsibility:  An Historical PerspectiveData Protection and "Intermediary" Responsibility:  An Historical Perspective
Data Protection and "Intermediary" Responsibility: An Historical Perspective
 
Net Neutrality
Net Neutrality Net Neutrality
Net Neutrality
 
Nov 2013 Whos who International article
Nov 2013 Whos who International articleNov 2013 Whos who International article
Nov 2013 Whos who International article
 
Savannah Smith
Savannah Smith Savannah Smith
Savannah Smith
 
Offdata: a prosumer law agency to govern big data in the public interest
Offdata:  a prosumer law agency to govern big data in the public interestOffdata:  a prosumer law agency to govern big data in the public interest
Offdata: a prosumer law agency to govern big data in the public interest
 
Polinter07
Polinter07Polinter07
Polinter07
 
Cyber crime laws in Pakistan
Cyber crime laws in PakistanCyber crime laws in Pakistan
Cyber crime laws in Pakistan
 
Rage against the Censorship Machine (aka copyright directive)
Rage against the Censorship Machine (aka copyright directive)Rage against the Censorship Machine (aka copyright directive)
Rage against the Censorship Machine (aka copyright directive)
 
Cyber Laws in Pakistan
Cyber Laws in PakistanCyber Laws in Pakistan
Cyber Laws in Pakistan
 

Similar to New IT Rules 2021 Analysis

Net Neutrality in Education
Net Neutrality in EducationNet Neutrality in Education
Net Neutrality in EducationCraig Geffre
 
online-disinformation-human-rights
online-disinformation-human-rightsonline-disinformation-human-rights
online-disinformation-human-rightsarchiejones4
 
Research on Digital Security Act 2018
Research on Digital Security Act 2018Research on Digital Security Act 2018
Research on Digital Security Act 2018Nilima Tariq
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismCharles Mok
 
Privacy issues in data analytics
Privacy issues in data analyticsPrivacy issues in data analytics
Privacy issues in data analyticsshekharkanodia
 
Information technology (intermediary guidelines and digital media ethics code...
Information technology (intermediary guidelines and digital media ethics code...Information technology (intermediary guidelines and digital media ethics code...
Information technology (intermediary guidelines and digital media ethics code...ZahidManiyar
 
Chandrayaan 3’s Lunar Journey and India’s Digital Personal Data Protection Bi...
Chandrayaan 3’s Lunar Journey and India’s Digital Personal Data Protection Bi...Chandrayaan 3’s Lunar Journey and India’s Digital Personal Data Protection Bi...
Chandrayaan 3’s Lunar Journey and India’s Digital Personal Data Protection Bi...WilliamParker382986
 
Project 2020 Scenarios for the Future of.docx
Project 2020 Scenarios for the Future of.docxProject 2020 Scenarios for the Future of.docx
Project 2020 Scenarios for the Future of.docxbriancrawford30935
 
Special Committee review of the Personal Information Protection Act (PIPA): ...
Special Committee review of the Personal Information Protection Act (PIPA):  ...Special Committee review of the Personal Information Protection Act (PIPA):  ...
Special Committee review of the Personal Information Protection Act (PIPA): ...BC Tech Association
 
Forecast cybersecurity regulation v3
Forecast cybersecurity regulation v3Forecast cybersecurity regulation v3
Forecast cybersecurity regulation v3Joe Orlando
 
Presentation Yun Li
Presentation Yun LiPresentation Yun Li
Presentation Yun LiYunLi
 
Presentation Y U N L I
Presentation  Y U N  L IPresentation  Y U N  L I
Presentation Y U N L IYunLi
 
Presentation Yun Li
Presentation Yun LiPresentation Yun Li
Presentation Yun LiYunLi
 
Presentation Yun Li
Presentation Yun LiPresentation Yun Li
Presentation Yun LiYunLi
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxadampcarr67227
 
The Cybersecurity Executive Order
The Cybersecurity Executive OrderThe Cybersecurity Executive Order
The Cybersecurity Executive OrderBooz Allen Hamilton
 
Social Media and Law Enforcement - Presentation by Central Bureau of Investi...
Social Media and Law Enforcement  - Presentation by Central Bureau of Investi...Social Media and Law Enforcement  - Presentation by Central Bureau of Investi...
Social Media and Law Enforcement - Presentation by Central Bureau of Investi...Nagarajan M
 
Marsden #Regulatingcode MIT
Marsden #Regulatingcode MITMarsden #Regulatingcode MIT
Marsden #Regulatingcode MITChris Marsden
 
Magazine Feature
Magazine FeatureMagazine Feature
Magazine Featuredchin25
 

Similar to New IT Rules 2021 Analysis (20)

Net Neutrality in Education
Net Neutrality in EducationNet Neutrality in Education
Net Neutrality in Education
 
online-disinformation-human-rights
online-disinformation-human-rightsonline-disinformation-human-rights
online-disinformation-human-rights
 
Research on Digital Security Act 2018
Research on Digital Security Act 2018Research on Digital Security Act 2018
Research on Digital Security Act 2018
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
 
Privacy issues in data analytics
Privacy issues in data analyticsPrivacy issues in data analytics
Privacy issues in data analytics
 
Information technology (intermediary guidelines and digital media ethics code...
Information technology (intermediary guidelines and digital media ethics code...Information technology (intermediary guidelines and digital media ethics code...
Information technology (intermediary guidelines and digital media ethics code...
 
Chandrayaan 3’s Lunar Journey and India’s Digital Personal Data Protection Bi...
Chandrayaan 3’s Lunar Journey and India’s Digital Personal Data Protection Bi...Chandrayaan 3’s Lunar Journey and India’s Digital Personal Data Protection Bi...
Chandrayaan 3’s Lunar Journey and India’s Digital Personal Data Protection Bi...
 
Project 2020 Scenarios for the Future of.docx
Project 2020 Scenarios for the Future of.docxProject 2020 Scenarios for the Future of.docx
Project 2020 Scenarios for the Future of.docx
 
Special Committee review of the Personal Information Protection Act (PIPA): ...
Special Committee review of the Personal Information Protection Act (PIPA):  ...Special Committee review of the Personal Information Protection Act (PIPA):  ...
Special Committee review of the Personal Information Protection Act (PIPA): ...
 
Forecast cybersecurity regulation v3
Forecast cybersecurity regulation v3Forecast cybersecurity regulation v3
Forecast cybersecurity regulation v3
 
Presentation Yun Li
Presentation Yun LiPresentation Yun Li
Presentation Yun Li
 
Presentation Y U N L I
Presentation  Y U N  L IPresentation  Y U N  L I
Presentation Y U N L I
 
Presentation Yun Li
Presentation Yun LiPresentation Yun Li
Presentation Yun Li
 
Presentation Yun Li
Presentation Yun LiPresentation Yun Li
Presentation Yun Li
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
 
BT Cloud Security Whitepaper
BT Cloud Security WhitepaperBT Cloud Security Whitepaper
BT Cloud Security Whitepaper
 
The Cybersecurity Executive Order
The Cybersecurity Executive OrderThe Cybersecurity Executive Order
The Cybersecurity Executive Order
 
Social Media and Law Enforcement - Presentation by Central Bureau of Investi...
Social Media and Law Enforcement  - Presentation by Central Bureau of Investi...Social Media and Law Enforcement  - Presentation by Central Bureau of Investi...
Social Media and Law Enforcement - Presentation by Central Bureau of Investi...
 
Marsden #Regulatingcode MIT
Marsden #Regulatingcode MITMarsden #Regulatingcode MIT
Marsden #Regulatingcode MIT
 
Magazine Feature
Magazine FeatureMagazine Feature
Magazine Feature
 

Recently uploaded

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 

Recently uploaded (20)

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 

New IT Rules 2021 Analysis

  • 3. page 3 “One Single Vulnerability is all an Attacker Need”. Window Snyder, Chief Security Officer,Fastly
  • 5. • The Government of India had framed the Information Technology (Guidelines for Intermediaries and Digital Media Ethics Code) Rules, 2021, in February this year.These rules require the social media intermediaries/ platforms to adhere to a vastly tighter set of rules within three months, which ended on May 25. • Till now almost all major social media intermediaries have not adhered to all the requirements. • But non-compliance can only make things worse, especially in a situation in which the relationship between some platforms such asTwitter and the Government seems to have broken down. • While there are positive aspects about the said guidelines, there are, equally, glaring ambiguities and susceptibilities that appear to be in conflict with the basic tenets of democracy and constitutional values. INTRODUCTION A brief intro of New IT rules 2021.. page 5
  • 6. POSITIVESIDEOF THENEWI.T. RULES The Rules must be credited for they mandate duties such as: • Removal of non-consensual intimate pictures within 24 hours, • Publication of compliance reports to increase transparency, • Setting up a dispute resolution mechanism for content removal, • Adding a label to information for users to know whether content is advertised, owned, sponsored or exclusively controlled. page 6
  • 7. ASSOCIATEDISSUESWITH THERULES page 7 a) Rules Ultra-vires to the IT Act: It is of significant concern that the purview of the IT Act, 2000, has been expanded to bring digital news media under its regulatory ambit without legislative action. • There has been criticism about bringing in a plethora of new rules that ought to be normally triggered only via legislative action. b) Depriving of Fair Recourse:An intermediary is now supposed to take down content within 36 hours upon receiving orders from the Government. • This deprives the intermediary of a fair recourse in the event that it disagrees with the Government’s order due to a strict timeline.
  • 8. ASSOCIATEDISSUESWITH THERULES page 8 c) Undermining Free Speech:The rules place fetters upon free speech by fixing the Government as the ultimate adjudicator of objectionable speech online. d)Traceability Issue:Till now social media platforms have the immunity that users received from end-to-end encryption was that intermediaries did not have access to the contents of their messages. • Imposing this mandatory requirement of traceability will break this immunity, thereby weakening the security of the privacy of these conversations. • The threat here is not only one of privacy but to the extent of invasion and deprivation from a safe space. Continued.
  • 9. ASSOCIATEDISSUESWITH THERULES page 9 e) Counterproductive in Absence of Data Privacy Law: It could prove counterproductive in a country where the citizens still do not have a data privacy law to guard themselves against excesses committed by any party. f) Compliance Burden:The Rules create futile additional operational costs for intermediaries by requiring them to have Indian resident nodal officers, compliance officers and grievance officers. • This may not be in favour of many small digital entities and may open the floodgates for all kinds of interventions. Continued.
  • 10. WAYFORWARD page 10 Uniform Application of Law: Regulation has an important place in the scheme of things, and no one advocates giving a free pass to digital platforms. • Further, the laws to combat unlawful content are already in place.What is required is their uniform application. Deliberating with Stakeholders:There are indeed many problems with the new rules, but the major issue was that these were introduced without much public consultation. • The solution to ongoing criticism about these rules is to start afresh with the publication of a white paper.
  • 11. WAYFORWARD page 11 Statutory Backing: After that, if regulation is still deemed to be necessary, then it must be implemented through legislation that is debated in Parliament instead of relying upon executive rule-making powers. Expediting Data Protection Law: Making platforms share more information could prove counterproductive in a country where the citizens still do not have a data privacy law to guard themselves against excesses committed by any party. • In this context, there is a need to expedite the passing of the personal data protection bill, 2019. Continued.
  • 12. CONCLUSION • The Supreme Court, in the case of Life Insurance Corporation.Of India vs Prof. Manubhai D. Shah (1992) had elevated ‘the freedom to circulate one’s views as the lifeline of any democratic institution’. • In this context, five industry bodies, including the CII, FICCI and the U.S.-India Business Council have sought an extension of 6-12 months for compliance.This is an opportunity for the Government to hear out the industry, and also shed its high-handed way of rule-making.
  • 13. REFERENCESUSED Some referred website links are mentioned here:- • https://www.drishtiias.com/daily-updates/daily- news-editorials/information-technology-rules- 2021-1 • https://thewire.in/tech/explainer-how-the-new-it- rules-take-away-our-digital-rights • https://inc42.com/buzz/as-india-it-rules-go-into- effect-are-facebook-twitter-and-co-compliant/ page 13