SlideShare a Scribd company logo
INFORMATION TECHNOLOGY POLICY
-
NEED OF THE HOUR
By
Vijay Pal Dalmia, Advocate
Partner & Head of Intellectual Property & Information Technology Laws Practice
 Liable for the acts of Employees and Agents etc.
◦ Strict Liability
◦ Vicarious Liability
 Data
◦ Protection and
◦ Secrecy
 Are the norm of the day.
WHY “IT POLICY”!
 Email and Internet Usage
 Laptop/Desktop Usage
 Hardware Usage
◦ Data card
◦ Pen Drive
 Security of Computer Network
◦ System Access
◦ Virus Protection
◦ Installation Rights
 System back up and Maintenance
 Third Party and Remote Access
Data of the Company forms its valuable IP Assets.
 Data may include
◦ Patents
◦ Designs
◦ Copyrights
◦ Trade Secrets (Unpatented)
◦ Customer Data
◦ Business Data
◦ Business Methods
◦ Third Party Data
◦ Formulas
◦ Source Code
◦ Employee Information
WHY “IT POLICY”! .. Continued..
 A company may be UNDER LAW obliged to protect the sensitive
personal data of its customers and employees.
◦ Reference:
 Information Technology Act, 2000
 Holds the Company liable
 Civil action- compensation under Section 43A
 Criminal action- Punishment under Section 72A
for failure to protect any sensitive personal data which its owns,
controls or operates.
◦ Promulgation of Information Technology (Reasonable security
practices and procedures and sensitive personal data or
information) Rules, 2011
 Provides for mandatory Privacy policy for protection of sensitive
personal data.
LEGAL & CONTRACTUAL
OBLIGATION OF A COMPANY!
◦ A Company may be held liable
 To pay Compensation
or
 Criminal Prosecution
For
 Negligent in handling of data,
information leading to DEFAMATION
 Use of unauthorized or pirated software
 A company may also be held liable for criminal
prosecution
◦ Tampering of computer source documents- u/s 65 of the IT Act, 2000
◦ Sending of offensive messages u/s 66A of the IT Act, 2000 through
 Computer resources & Communication devices
◦ Punishment for identity theft- u/s 66C of the IT Act, 2000
◦ Use of computer resource for cheating by impersonation-
 u/s 66D of the IT Act, 2000
◦ Violation of privacy by use of electronic means of a company-
 u/s 66E of the IT Act, 2000.
◦ Publication or transmission of obscene material in electronic form-
 u/s 67 of the IT Act, 2000
Information technology means & includes:
computers,
computer-based networks,
computer peripherals,
operating systems,
e-mail,
Intranet,
software or any combination thereof,
that are made available by a Company for the purpose of
supporting its goals of providing quality products and services
to customers, increase shareholder value and foster employment
satisfaction.
IT Resources of the Company may Include
 Time Management
◦ Office hours can be used only for official work thereby enhancing
productivity
 Utilization and Management
◦ Company resources including computer resources for maximum
 Employer & Employee Relationship
 Customer Relationship
 Poaching can be curbed
 Reduces the risk of use of pirated and unauthorized use of software
 Bandwidth Protection
◦ Authorized Official use of Company network and resources can
increase the functioning of IT system.
ADVANTAGES OF IT POLICY
Information Technology policy intends to:-
Establish a culture of security and trust for all employees;
Establish guidelines governing proper use of IT and Internet by
all employees;
Ensure the use of internet only as a tool for continuous
improvement of efficiency and performance;
Fixing the Responsibility & Liability;
Contd…..
OBJECTIVE & PURPOSE OF
INFORMATION TECHNOLOGY POLICY
 To supplement, not replace, all existing laws, regulations,
agreements, and contracts;
 Preserve the integrity of the information technology systems;
 Protect IT systems against the accidents, failures
or improper use;
 Reserves the right to access confidential data;
Contd/--
OBJECTIVE & PURPOSE OF
INFORMATION TECHNOLOGY POLICY….
Reserves and limit to copy, remove or alter any data,
file or system resources;
Maintain a high level of professionalism in keeping
with Code of Ethics;
Maintain Company’s reputation among trade and
public.
 Most of our communications are now electronic.
 Recipients of electronic documents like
◦ agents,
◦ distributors,
◦ customers etc.
needs the source and authenticity
of the documents or messages.
 Satisfy audit requirements
Contd….
 Assist in compliance with applicable
◦ laws
◦ Regulations
◦ Guidelines and recommendations
 Mitigate risk from a security incident
 Educate users on sound security
practices
 Reduce legal risk
INTRUSIONS
ARE
NOT
ALW
AYS AS
OBVIOUS
AS THIS
EXAM
PLE
Espionage
Employees falling to the lure or trap
of RIVALS, and passing sensitive and
secure data of the company.
Damage to Goodwill,
Reputation,
Credibility of the
Company.
Harassment
Viewing inappropriate content, such as
pornography, hate or violence, can create
an environment that is hostile and
offensive for co-workers, and can damage
reputation of a company.
Productivity
Frequent online browsing,
shopping, and chatting can get
in the way of getting the work
done, and often leads to
resentment from the coworkers
Viruses
Visiting less than reputable
websites can lead to viruses,
spyware, or other malicious
software getting into the
network.
Service Interruptions
Large downloads and
streaming audio and video can
suck up network resources
that other employees need to
do work and service customers
 All
◦ Directors
◦ Employees,
◦ Part-time employees,
◦ Industrial Trainees,
◦ Contractors,
◦ Agents,
◦ & …..others
of an organization directly or indirectly
associated with the conduct of business of the
organization.
Would you be proud to wear your browser history?
Would you be embarrassed if your boss
or your peers saw where you’ve been going?
Portable media (CDs, flash drives)
should not be left on the desk
Passwords (pencil) should not be
posted
Sensitive FAX or call logs
should be put away
Drinks should not be kept near
workstations
 Vaish Associates Advocates
New Delhi   Mumbai    Gurgaon   Bengaluruǀ ǀ ǀ
Celebrating 40 years of professional excellence
IPR & IT Laws Practice Division
1st  & 11th
 Floors   Mohan Dev Building   13, Tolstoy Marg   New Delhi 110001 (India)ǀ ǀ ǀ
Phone: +91 11 49292532 (Direct)
Mobile: +91 9810081079
Phone: +91 11 49292525 (Board)
Fax: +91 11 23320484
www.vaishlaw.com
email:- vpdalmia@vaishlaw.com 
Intellectual Property & Information Technology Laws Division

More Related Content

What's hot

The importance of information security nowadays
The importance of information security nowadaysThe importance of information security nowadays
The importance of information security nowadays
PECB
 
Kevin Wharram Security Summit
Kevin Wharram Security SummitKevin Wharram Security Summit
Kevin Wharram Security Summit
Kevin Wharram
 
Rapid data services limited
Rapid data services limitedRapid data services limited
Rapid data services limited
oomagoolies
 
MIS ppt 1
MIS ppt 1MIS ppt 1
MIS ppt 1
Pankaj Nandurkar
 
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFETECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
James Wier
 
Information Technology policy
Information Technology policyInformation Technology policy
Information Technology policy
marindi
 
Workplace Surveillance
Workplace SurveillanceWorkplace Surveillance
Workplace Surveillance
Sampath
 
Data protection and privacy
Data protection and privacyData protection and privacy
Data protection and privacy
himanshu jain
 
Cyber Security College Workshop
Cyber Security College WorkshopCyber Security College Workshop
Cyber Security College Workshop
Rahul Nayan
 
Is6120 data security presentation
Is6120 data security presentationIs6120 data security presentation
Is6120 data security presentation
JamesDempsey1
 
Overview of Information Security & Privacy
Overview of Information Security & PrivacyOverview of Information Security & Privacy
Overview of Information Security & Privacy
Nawanan Theera-Ampornpunt
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
Ahmed Moussa
 
Introduction to information security field
Introduction to information security fieldIntroduction to information security field
Introduction to information security field
Ahmed Musaad
 
MIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesMIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical Challenges
Tushar B Kute
 
FINAL Disclosures Art-Cyber Threats n Law Firms-Magner FINAL
FINAL Disclosures Art-Cyber Threats n Law Firms-Magner FINALFINAL Disclosures Art-Cyber Threats n Law Firms-Magner FINAL
FINAL Disclosures Art-Cyber Threats n Law Firms-Magner FINAL
Matthew Magner
 
3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputation3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputation
Nikec Solutions
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
imehreenx
 
Working Remotely Vpn Paradigm
Working Remotely   Vpn ParadigmWorking Remotely   Vpn Paradigm
Working Remotely Vpn Paradigm
pparam02
 
N3275466 - Final Presentation Advance network (1)
N3275466 - Final Presentation  Advance network (1)N3275466 - Final Presentation  Advance network (1)
N3275466 - Final Presentation Advance network (1)
Christopher Lisasi
 
Tl vi a
Tl vi aTl vi a
Tl vi a
blqmiata
 

What's hot (20)

The importance of information security nowadays
The importance of information security nowadaysThe importance of information security nowadays
The importance of information security nowadays
 
Kevin Wharram Security Summit
Kevin Wharram Security SummitKevin Wharram Security Summit
Kevin Wharram Security Summit
 
Rapid data services limited
Rapid data services limitedRapid data services limited
Rapid data services limited
 
MIS ppt 1
MIS ppt 1MIS ppt 1
MIS ppt 1
 
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFETECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
 
Information Technology policy
Information Technology policyInformation Technology policy
Information Technology policy
 
Workplace Surveillance
Workplace SurveillanceWorkplace Surveillance
Workplace Surveillance
 
Data protection and privacy
Data protection and privacyData protection and privacy
Data protection and privacy
 
Cyber Security College Workshop
Cyber Security College WorkshopCyber Security College Workshop
Cyber Security College Workshop
 
Is6120 data security presentation
Is6120 data security presentationIs6120 data security presentation
Is6120 data security presentation
 
Overview of Information Security & Privacy
Overview of Information Security & PrivacyOverview of Information Security & Privacy
Overview of Information Security & Privacy
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 
Introduction to information security field
Introduction to information security fieldIntroduction to information security field
Introduction to information security field
 
MIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesMIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical Challenges
 
FINAL Disclosures Art-Cyber Threats n Law Firms-Magner FINAL
FINAL Disclosures Art-Cyber Threats n Law Firms-Magner FINALFINAL Disclosures Art-Cyber Threats n Law Firms-Magner FINAL
FINAL Disclosures Art-Cyber Threats n Law Firms-Magner FINAL
 
3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputation3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputation
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
Working Remotely Vpn Paradigm
Working Remotely   Vpn ParadigmWorking Remotely   Vpn Paradigm
Working Remotely Vpn Paradigm
 
N3275466 - Final Presentation Advance network (1)
N3275466 - Final Presentation  Advance network (1)N3275466 - Final Presentation  Advance network (1)
N3275466 - Final Presentation Advance network (1)
 
Tl vi a
Tl vi aTl vi a
Tl vi a
 

Viewers also liked

Блоговете между двата блогкемпа във Велико Търново
Блоговете между двата блогкемпа във Велико ТърновоБлоговете между двата блогкемпа във Велико Търново
Блоговете между двата блогкемпа във Велико Търново
Veselin Nikolov
 
Access versus dedicated panel: ESOMAR panel conference Dublin 2008
Access versus dedicated panel: ESOMAR panel conference Dublin 2008Access versus dedicated panel: ESOMAR panel conference Dublin 2008
Access versus dedicated panel: ESOMAR panel conference Dublin 2008
Kristof De Wulf
 
Git WorkFlow & Best Practice
Git WorkFlow & Best PracticeGit WorkFlow & Best Practice
Git WorkFlow & Best Practice
Hiraq Citra M
 
Native Floridians
Native FloridiansNative Floridians
Native Floridians
brandonfoster
 
Fade tools
Fade toolsFade tools
Fade toolsShdwClaw
 
Grey Visual Design Web Site Mini-Portfolio
Grey Visual Design Web Site Mini-PortfolioGrey Visual Design Web Site Mini-Portfolio
Grey Visual Design Web Site Mini-Portfolio
Grey Visual
 
Guide for de mystifying law of trade mark litigation in India-2014
Guide for de mystifying law of trade mark litigation in India-2014Guide for de mystifying law of trade mark litigation in India-2014
Guide for de mystifying law of trade mark litigation in India-2014
Vijay Dalmia
 
Doug Altman 15 Jan09 V4
Doug Altman 15 Jan09 V4Doug Altman 15 Jan09 V4
Doug Altman 15 Jan09 V4
US Cochrane Center
 
Law of Tele-medicine in India
Law of Tele-medicine in IndiaLaw of Tele-medicine in India
Law of Tele-medicine in India
Vijay Dalmia
 
Collaborative Geomatics for Social Innovation and Sustainability
Collaborative Geomatics for Social Innovation and SustainabilityCollaborative Geomatics for Social Innovation and Sustainability
Collaborative Geomatics for Social Innovation and Sustainability
Emily Robson
 
Virtual World Integration Steps for EFL in Japan
Virtual World Integration Steps for EFL in JapanVirtual World Integration Steps for EFL in Japan
Virtual World Integration Steps for EFL in Japan
Mike McKay
 
Milieuproblematiek
MilieuproblematiekMilieuproblematiek
Milieuproblematiek
guest994697
 
Cypris Chat 2010 Year End Presentation
Cypris Chat 2010 Year End PresentationCypris Chat 2010 Year End Presentation
Cypris Chat 2010 Year End Presentation
Mike McKay
 
Nimda Worm
Nimda WormNimda Worm
Nimda Worm
Goaway96
 
A FEW SAMPLE SLIDES
A FEW SAMPLE SLIDESA FEW SAMPLE SLIDES
A FEW SAMPLE SLIDES
Lenni
 
Introducción al Email Marketing
Introducción al Email Marketing Introducción al Email Marketing
Introducción al Email Marketing
krasis
 
Shn, permaculture pilot, 2008 april, 11 20
Shn, permaculture pilot, 2008 april, 11 20Shn, permaculture pilot, 2008 april, 11 20
Shn, permaculture pilot, 2008 april, 11 20
joaovox
 
IPR Enforcement in India through Criminal Measures - By Vijay Pal Dalmia
IPR Enforcement in India through Criminal Measures - By Vijay Pal DalmiaIPR Enforcement in India through Criminal Measures - By Vijay Pal Dalmia
IPR Enforcement in India through Criminal Measures - By Vijay Pal Dalmia
Vijay Dalmia
 
Nimda Wor Mv2
Nimda Wor Mv2Nimda Wor Mv2
Nimda Wor Mv2
Goaway96
 
Go & microservices
Go & microservicesGo & microservices
Go & microservices
Hiraq Citra M
 

Viewers also liked (20)

Блоговете между двата блогкемпа във Велико Търново
Блоговете между двата блогкемпа във Велико ТърновоБлоговете между двата блогкемпа във Велико Търново
Блоговете между двата блогкемпа във Велико Търново
 
Access versus dedicated panel: ESOMAR panel conference Dublin 2008
Access versus dedicated panel: ESOMAR panel conference Dublin 2008Access versus dedicated panel: ESOMAR panel conference Dublin 2008
Access versus dedicated panel: ESOMAR panel conference Dublin 2008
 
Git WorkFlow & Best Practice
Git WorkFlow & Best PracticeGit WorkFlow & Best Practice
Git WorkFlow & Best Practice
 
Native Floridians
Native FloridiansNative Floridians
Native Floridians
 
Fade tools
Fade toolsFade tools
Fade tools
 
Grey Visual Design Web Site Mini-Portfolio
Grey Visual Design Web Site Mini-PortfolioGrey Visual Design Web Site Mini-Portfolio
Grey Visual Design Web Site Mini-Portfolio
 
Guide for de mystifying law of trade mark litigation in India-2014
Guide for de mystifying law of trade mark litigation in India-2014Guide for de mystifying law of trade mark litigation in India-2014
Guide for de mystifying law of trade mark litigation in India-2014
 
Doug Altman 15 Jan09 V4
Doug Altman 15 Jan09 V4Doug Altman 15 Jan09 V4
Doug Altman 15 Jan09 V4
 
Law of Tele-medicine in India
Law of Tele-medicine in IndiaLaw of Tele-medicine in India
Law of Tele-medicine in India
 
Collaborative Geomatics for Social Innovation and Sustainability
Collaborative Geomatics for Social Innovation and SustainabilityCollaborative Geomatics for Social Innovation and Sustainability
Collaborative Geomatics for Social Innovation and Sustainability
 
Virtual World Integration Steps for EFL in Japan
Virtual World Integration Steps for EFL in JapanVirtual World Integration Steps for EFL in Japan
Virtual World Integration Steps for EFL in Japan
 
Milieuproblematiek
MilieuproblematiekMilieuproblematiek
Milieuproblematiek
 
Cypris Chat 2010 Year End Presentation
Cypris Chat 2010 Year End PresentationCypris Chat 2010 Year End Presentation
Cypris Chat 2010 Year End Presentation
 
Nimda Worm
Nimda WormNimda Worm
Nimda Worm
 
A FEW SAMPLE SLIDES
A FEW SAMPLE SLIDESA FEW SAMPLE SLIDES
A FEW SAMPLE SLIDES
 
Introducción al Email Marketing
Introducción al Email Marketing Introducción al Email Marketing
Introducción al Email Marketing
 
Shn, permaculture pilot, 2008 april, 11 20
Shn, permaculture pilot, 2008 april, 11 20Shn, permaculture pilot, 2008 april, 11 20
Shn, permaculture pilot, 2008 april, 11 20
 
IPR Enforcement in India through Criminal Measures - By Vijay Pal Dalmia
IPR Enforcement in India through Criminal Measures - By Vijay Pal DalmiaIPR Enforcement in India through Criminal Measures - By Vijay Pal Dalmia
IPR Enforcement in India through Criminal Measures - By Vijay Pal Dalmia
 
Nimda Wor Mv2
Nimda Wor Mv2Nimda Wor Mv2
Nimda Wor Mv2
 
Go & microservices
Go & microservicesGo & microservices
Go & microservices
 

Similar to IT Policy - Need of the Hour

Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Vijay Dalmia
 
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdfWhat Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
SecureCurve
 
CBC GDPR The Physics
CBC GDPR The PhysicsCBC GDPR The Physics
CBC GDPR The Physics
Jason Chapman
 
Case study financial_services
Case study financial_servicesCase study financial_services
Case study financial_services
G. Subramanian
 
Cyber 101 for smb execs v1
Cyber 101 for smb execs v1Cyber 101 for smb execs v1
Cyber 101 for smb execs v1
NetWatcher
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
Hokme
 
Chapter 12 iso 27001 awareness
Chapter 12 iso 27001 awarenessChapter 12 iso 27001 awareness
Chapter 12 iso 27001 awareness
newbie2019
 
Cyber Insurance
Cyber InsuranceCyber Insurance
Cyber Insurance
ClubHack
 
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
AugmentedWorldExpo
 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & process
Information Technology Society Nepal
 
08 pdf show-239
08   pdf show-23908   pdf show-239
08 pdf show-239
#TheFraudTube
 
Cyber security guide
Cyber security guideCyber security guide
Cyber security guide
Mark Bennett
 
Security and control in mis
Security and control in misSecurity and control in mis
Security and control in mis
Gurjit
 
Risk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docxRisk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docx
healdkathaleen
 
An insight into information security.pptx
An insight into information security.pptxAn insight into information security.pptx
An insight into information security.pptx
Securityium
 
Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)
GuardEra Access Solutions, Inc.
 
Data Loss During Downsizing
Data Loss During DownsizingData Loss During Downsizing
Data Loss During Downsizing
Constantine Karbaliotis
 
Chapter 17 a fraud in e commerce Jen
Chapter 17 a  fraud in e commerce JenChapter 17 a  fraud in e commerce Jen
Chapter 17 a fraud in e commerce Jen
VidaB
 
Network Security - What Every Business Needs to Know
Network Security - What Every Business Needs to KnowNetwork Security - What Every Business Needs to Know
Network Security - What Every Business Needs to Know
mapletronics
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOs
gppcpa
 

Similar to IT Policy - Need of the Hour (20)

Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
 
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdfWhat Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
 
CBC GDPR The Physics
CBC GDPR The PhysicsCBC GDPR The Physics
CBC GDPR The Physics
 
Case study financial_services
Case study financial_servicesCase study financial_services
Case study financial_services
 
Cyber 101 for smb execs v1
Cyber 101 for smb execs v1Cyber 101 for smb execs v1
Cyber 101 for smb execs v1
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
 
Chapter 12 iso 27001 awareness
Chapter 12 iso 27001 awarenessChapter 12 iso 27001 awareness
Chapter 12 iso 27001 awareness
 
Cyber Insurance
Cyber InsuranceCyber Insurance
Cyber Insurance
 
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & process
 
08 pdf show-239
08   pdf show-23908   pdf show-239
08 pdf show-239
 
Cyber security guide
Cyber security guideCyber security guide
Cyber security guide
 
Security and control in mis
Security and control in misSecurity and control in mis
Security and control in mis
 
Risk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docxRisk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docx
 
An insight into information security.pptx
An insight into information security.pptxAn insight into information security.pptx
An insight into information security.pptx
 
Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)
 
Data Loss During Downsizing
Data Loss During DownsizingData Loss During Downsizing
Data Loss During Downsizing
 
Chapter 17 a fraud in e commerce Jen
Chapter 17 a  fraud in e commerce JenChapter 17 a  fraud in e commerce Jen
Chapter 17 a fraud in e commerce Jen
 
Network Security - What Every Business Needs to Know
Network Security - What Every Business Needs to KnowNetwork Security - What Every Business Needs to Know
Network Security - What Every Business Needs to Know
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOs
 

More from Vijay Dalmia

DIGITAL PERSONAL DATA PROTECTION ACT 2023-PPT-VPD.pptx
DIGITAL PERSONAL DATA PROTECTION ACT 2023-PPT-VPD.pptxDIGITAL PERSONAL DATA PROTECTION ACT 2023-PPT-VPD.pptx
DIGITAL PERSONAL DATA PROTECTION ACT 2023-PPT-VPD.pptx
Vijay Dalmia
 
Enforcement Of Intellectual Property Rights Through Customs
Enforcement Of Intellectual Property Rights Through CustomsEnforcement Of Intellectual Property Rights Through Customs
Enforcement Of Intellectual Property Rights Through Customs
Vijay Dalmia
 
White Collar Crime by Vijay Pal Dalmia.pptx
White Collar Crime by Vijay Pal Dalmia.pptxWhite Collar Crime by Vijay Pal Dalmia.pptx
White Collar Crime by Vijay Pal Dalmia.pptx
Vijay Dalmia
 
Taxation of Cryptocurrencies – Virtual Digital Assets in India-VPDalmia.pptx
Taxation of Cryptocurrencies – Virtual Digital Assets in India-VPDalmia.pptxTaxation of Cryptocurrencies – Virtual Digital Assets in India-VPDalmia.pptx
Taxation of Cryptocurrencies – Virtual Digital Assets in India-VPDalmia.pptx
Vijay Dalmia
 
Indian Approach On Bitcoins-cryptocurrencies- Blockchain Legal Practical Pe...
Indian Approach On Bitcoins-cryptocurrencies- Blockchain  Legal  Practical Pe...Indian Approach On Bitcoins-cryptocurrencies- Blockchain  Legal  Practical Pe...
Indian Approach On Bitcoins-cryptocurrencies- Blockchain Legal Practical Pe...
Vijay Dalmia
 
Police Remand- Judicial Remand & Default Bail-Vijay Pal Dalmia Advocate.pptx
Police Remand- Judicial Remand & Default Bail-Vijay Pal Dalmia Advocate.pptxPolice Remand- Judicial Remand & Default Bail-Vijay Pal Dalmia Advocate.pptx
Police Remand- Judicial Remand & Default Bail-Vijay Pal Dalmia Advocate.pptx
Vijay Dalmia
 
Police Remand Judicial Remand & Default bail by Vijay Pal Dalmia Advocate
Police Remand  Judicial Remand & Default bail by Vijay Pal Dalmia AdvocatePolice Remand  Judicial Remand & Default bail by Vijay Pal Dalmia Advocate
Police Remand Judicial Remand & Default bail by Vijay Pal Dalmia Advocate
Vijay Dalmia
 
Indian approach on bitcoins, cryptocurrencies and blockchain – legal practica...
Indian approach on bitcoins, cryptocurrencies and blockchain – legal practica...Indian approach on bitcoins, cryptocurrencies and blockchain – legal practica...
Indian approach on bitcoins, cryptocurrencies and blockchain – legal practica...
Vijay Dalmia
 
Sanction for prosecution of offences under chapter xii of the income tax act
Sanction for prosecution of offences under chapter xii of the income tax actSanction for prosecution of offences under chapter xii of the income tax act
Sanction for prosecution of offences under chapter xii of the income tax act
Vijay Dalmia
 
Reasonable security practices and procedures and sensitive personal data or i...
Reasonable security practices and procedures and sensitive personal data or i...Reasonable security practices and procedures and sensitive personal data or i...
Reasonable security practices and procedures and sensitive personal data or i...
Vijay Dalmia
 
Guide for de-mystifying law of trade mark enfocrement and litigation in india
Guide  for  de-mystifying law of trade mark enfocrement and litigation in indiaGuide  for  de-mystifying law of trade mark enfocrement and litigation in india
Guide for de-mystifying law of trade mark enfocrement and litigation in india
Vijay Dalmia
 
Process of criminal trial in india
Process of criminal trial in indiaProcess of criminal trial in india
Process of criminal trial in india
Vijay Dalmia
 
LAW OF THE SEMICONDUCTOR INTEGRATED CIRCUITS IN INDIA By Vijay Pal Dalmia
LAW OF THE SEMICONDUCTOR INTEGRATED CIRCUITS IN INDIA By Vijay Pal DalmiaLAW OF THE SEMICONDUCTOR INTEGRATED CIRCUITS IN INDIA By Vijay Pal Dalmia
LAW OF THE SEMICONDUCTOR INTEGRATED CIRCUITS IN INDIA By Vijay Pal Dalmia
Vijay Dalmia
 
Reasonable security practices and procedures and sensitive personal data or i...
Reasonable security practices and procedures and sensitive personal data or i...Reasonable security practices and procedures and sensitive personal data or i...
Reasonable security practices and procedures and sensitive personal data or i...
Vijay Dalmia
 
Types of electronic contracts
Types of electronic contractsTypes of electronic contracts
Types of electronic contracts
Vijay Dalmia
 
Ipr enforcement in india
Ipr enforcement in indiaIpr enforcement in india
Ipr enforcement in india
Vijay Dalmia
 
Patent law and Indian perspective
Patent law and Indian perspectivePatent law and Indian perspective
Patent law and Indian perspective
Vijay Dalmia
 
Wills in the indian perspective
Wills in the indian perspectiveWills in the indian perspective
Wills in the indian perspective
Vijay Dalmia
 
Law of nutritional and supplement food products in India-The Conflict
Law of nutritional and  supplement food products in India-The ConflictLaw of nutritional and  supplement food products in India-The Conflict
Law of nutritional and supplement food products in India-The Conflict
Vijay Dalmia
 
Online gaming and gambling laws in India
Online gaming and gambling laws in IndiaOnline gaming and gambling laws in India
Online gaming and gambling laws in India
Vijay Dalmia
 

More from Vijay Dalmia (20)

DIGITAL PERSONAL DATA PROTECTION ACT 2023-PPT-VPD.pptx
DIGITAL PERSONAL DATA PROTECTION ACT 2023-PPT-VPD.pptxDIGITAL PERSONAL DATA PROTECTION ACT 2023-PPT-VPD.pptx
DIGITAL PERSONAL DATA PROTECTION ACT 2023-PPT-VPD.pptx
 
Enforcement Of Intellectual Property Rights Through Customs
Enforcement Of Intellectual Property Rights Through CustomsEnforcement Of Intellectual Property Rights Through Customs
Enforcement Of Intellectual Property Rights Through Customs
 
White Collar Crime by Vijay Pal Dalmia.pptx
White Collar Crime by Vijay Pal Dalmia.pptxWhite Collar Crime by Vijay Pal Dalmia.pptx
White Collar Crime by Vijay Pal Dalmia.pptx
 
Taxation of Cryptocurrencies – Virtual Digital Assets in India-VPDalmia.pptx
Taxation of Cryptocurrencies – Virtual Digital Assets in India-VPDalmia.pptxTaxation of Cryptocurrencies – Virtual Digital Assets in India-VPDalmia.pptx
Taxation of Cryptocurrencies – Virtual Digital Assets in India-VPDalmia.pptx
 
Indian Approach On Bitcoins-cryptocurrencies- Blockchain Legal Practical Pe...
Indian Approach On Bitcoins-cryptocurrencies- Blockchain  Legal  Practical Pe...Indian Approach On Bitcoins-cryptocurrencies- Blockchain  Legal  Practical Pe...
Indian Approach On Bitcoins-cryptocurrencies- Blockchain Legal Practical Pe...
 
Police Remand- Judicial Remand & Default Bail-Vijay Pal Dalmia Advocate.pptx
Police Remand- Judicial Remand & Default Bail-Vijay Pal Dalmia Advocate.pptxPolice Remand- Judicial Remand & Default Bail-Vijay Pal Dalmia Advocate.pptx
Police Remand- Judicial Remand & Default Bail-Vijay Pal Dalmia Advocate.pptx
 
Police Remand Judicial Remand & Default bail by Vijay Pal Dalmia Advocate
Police Remand  Judicial Remand & Default bail by Vijay Pal Dalmia AdvocatePolice Remand  Judicial Remand & Default bail by Vijay Pal Dalmia Advocate
Police Remand Judicial Remand & Default bail by Vijay Pal Dalmia Advocate
 
Indian approach on bitcoins, cryptocurrencies and blockchain – legal practica...
Indian approach on bitcoins, cryptocurrencies and blockchain – legal practica...Indian approach on bitcoins, cryptocurrencies and blockchain – legal practica...
Indian approach on bitcoins, cryptocurrencies and blockchain – legal practica...
 
Sanction for prosecution of offences under chapter xii of the income tax act
Sanction for prosecution of offences under chapter xii of the income tax actSanction for prosecution of offences under chapter xii of the income tax act
Sanction for prosecution of offences under chapter xii of the income tax act
 
Reasonable security practices and procedures and sensitive personal data or i...
Reasonable security practices and procedures and sensitive personal data or i...Reasonable security practices and procedures and sensitive personal data or i...
Reasonable security practices and procedures and sensitive personal data or i...
 
Guide for de-mystifying law of trade mark enfocrement and litigation in india
Guide  for  de-mystifying law of trade mark enfocrement and litigation in indiaGuide  for  de-mystifying law of trade mark enfocrement and litigation in india
Guide for de-mystifying law of trade mark enfocrement and litigation in india
 
Process of criminal trial in india
Process of criminal trial in indiaProcess of criminal trial in india
Process of criminal trial in india
 
LAW OF THE SEMICONDUCTOR INTEGRATED CIRCUITS IN INDIA By Vijay Pal Dalmia
LAW OF THE SEMICONDUCTOR INTEGRATED CIRCUITS IN INDIA By Vijay Pal DalmiaLAW OF THE SEMICONDUCTOR INTEGRATED CIRCUITS IN INDIA By Vijay Pal Dalmia
LAW OF THE SEMICONDUCTOR INTEGRATED CIRCUITS IN INDIA By Vijay Pal Dalmia
 
Reasonable security practices and procedures and sensitive personal data or i...
Reasonable security practices and procedures and sensitive personal data or i...Reasonable security practices and procedures and sensitive personal data or i...
Reasonable security practices and procedures and sensitive personal data or i...
 
Types of electronic contracts
Types of electronic contractsTypes of electronic contracts
Types of electronic contracts
 
Ipr enforcement in india
Ipr enforcement in indiaIpr enforcement in india
Ipr enforcement in india
 
Patent law and Indian perspective
Patent law and Indian perspectivePatent law and Indian perspective
Patent law and Indian perspective
 
Wills in the indian perspective
Wills in the indian perspectiveWills in the indian perspective
Wills in the indian perspective
 
Law of nutritional and supplement food products in India-The Conflict
Law of nutritional and  supplement food products in India-The ConflictLaw of nutritional and  supplement food products in India-The Conflict
Law of nutritional and supplement food products in India-The Conflict
 
Online gaming and gambling laws in India
Online gaming and gambling laws in IndiaOnline gaming and gambling laws in India
Online gaming and gambling laws in India
 

Recently uploaded

The Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdfThe Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdf
veteranlegal
 
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence LawyersDefending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
HarpreetSaini48
 
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee
 
Lifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point PresentationLifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point Presentation
seri bangash
 
What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...
lawyersonia
 
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Syed Muhammad Humza Hussain
 
Energizing Communities, Fostering Growth, Sustaining Futures
Energizing Communities, Fostering Growth, Sustaining FuturesEnergizing Communities, Fostering Growth, Sustaining Futures
Energizing Communities, Fostering Growth, Sustaining Futures
USDAReapgrants.com
 
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdfV.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
bhavenpr
 
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
CIkumparan
 
The Art and Science of Cryptoforensic Investigation: Best Practices and Tools
The Art and Science of Cryptoforensic Investigation: Best Practices and ToolsThe Art and Science of Cryptoforensic Investigation: Best Practices and Tools
The Art and Science of Cryptoforensic Investigation: Best Practices and Tools
Milind Agarwal
 
The Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in ItalyThe Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in Italy
BridgeWest.eu
 
Incometax Compliance_PF_ ESI- June 2024
Incometax  Compliance_PF_ ESI- June 2024Incometax  Compliance_PF_ ESI- June 2024
Incometax Compliance_PF_ ESI- June 2024
EbizfilingIndia
 
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
SKshi
 
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Massimo Talia
 
fnaf lore.pptx ...................................
fnaf lore.pptx ...................................fnaf lore.pptx ...................................
fnaf lore.pptx ...................................
20jcoello
 
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptxPatenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
ssuser559494
 
San Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at SeaSan Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at Sea
Justin Ordoyo
 
Business Laws Sunita saha
Business Laws Sunita sahaBusiness Laws Sunita saha
Business Laws Sunita saha
sunitasaha5
 
Search Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement OfficersSearch Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement Officers
RichardTheberge
 
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
osenwakm
 

Recently uploaded (20)

The Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdfThe Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdf
 
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence LawyersDefending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
 
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
 
Lifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point PresentationLifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point Presentation
 
What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...
 
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
 
Energizing Communities, Fostering Growth, Sustaining Futures
Energizing Communities, Fostering Growth, Sustaining FuturesEnergizing Communities, Fostering Growth, Sustaining Futures
Energizing Communities, Fostering Growth, Sustaining Futures
 
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdfV.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
 
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
 
The Art and Science of Cryptoforensic Investigation: Best Practices and Tools
The Art and Science of Cryptoforensic Investigation: Best Practices and ToolsThe Art and Science of Cryptoforensic Investigation: Best Practices and Tools
The Art and Science of Cryptoforensic Investigation: Best Practices and Tools
 
The Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in ItalyThe Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in Italy
 
Incometax Compliance_PF_ ESI- June 2024
Incometax  Compliance_PF_ ESI- June 2024Incometax  Compliance_PF_ ESI- June 2024
Incometax Compliance_PF_ ESI- June 2024
 
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
 
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
 
fnaf lore.pptx ...................................
fnaf lore.pptx ...................................fnaf lore.pptx ...................................
fnaf lore.pptx ...................................
 
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptxPatenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
 
San Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at SeaSan Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at Sea
 
Business Laws Sunita saha
Business Laws Sunita sahaBusiness Laws Sunita saha
Business Laws Sunita saha
 
Search Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement OfficersSearch Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement Officers
 
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
 

IT Policy - Need of the Hour

  • 1. INFORMATION TECHNOLOGY POLICY - NEED OF THE HOUR By Vijay Pal Dalmia, Advocate Partner & Head of Intellectual Property & Information Technology Laws Practice
  • 2.  Liable for the acts of Employees and Agents etc. ◦ Strict Liability ◦ Vicarious Liability  Data ◦ Protection and ◦ Secrecy  Are the norm of the day. WHY “IT POLICY”!
  • 3.  Email and Internet Usage  Laptop/Desktop Usage  Hardware Usage ◦ Data card ◦ Pen Drive  Security of Computer Network ◦ System Access ◦ Virus Protection ◦ Installation Rights  System back up and Maintenance  Third Party and Remote Access
  • 4. Data of the Company forms its valuable IP Assets.  Data may include ◦ Patents ◦ Designs ◦ Copyrights ◦ Trade Secrets (Unpatented) ◦ Customer Data ◦ Business Data ◦ Business Methods ◦ Third Party Data ◦ Formulas ◦ Source Code ◦ Employee Information WHY “IT POLICY”! .. Continued..
  • 5.  A company may be UNDER LAW obliged to protect the sensitive personal data of its customers and employees. ◦ Reference:  Information Technology Act, 2000  Holds the Company liable  Civil action- compensation under Section 43A  Criminal action- Punishment under Section 72A for failure to protect any sensitive personal data which its owns, controls or operates. ◦ Promulgation of Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011  Provides for mandatory Privacy policy for protection of sensitive personal data. LEGAL & CONTRACTUAL OBLIGATION OF A COMPANY!
  • 6. ◦ A Company may be held liable  To pay Compensation or  Criminal Prosecution For  Negligent in handling of data, information leading to DEFAMATION  Use of unauthorized or pirated software
  • 7.  A company may also be held liable for criminal prosecution ◦ Tampering of computer source documents- u/s 65 of the IT Act, 2000 ◦ Sending of offensive messages u/s 66A of the IT Act, 2000 through  Computer resources & Communication devices ◦ Punishment for identity theft- u/s 66C of the IT Act, 2000 ◦ Use of computer resource for cheating by impersonation-  u/s 66D of the IT Act, 2000 ◦ Violation of privacy by use of electronic means of a company-  u/s 66E of the IT Act, 2000. ◦ Publication or transmission of obscene material in electronic form-  u/s 67 of the IT Act, 2000
  • 8. Information technology means & includes: computers, computer-based networks, computer peripherals, operating systems, e-mail, Intranet, software or any combination thereof, that are made available by a Company for the purpose of supporting its goals of providing quality products and services to customers, increase shareholder value and foster employment satisfaction. IT Resources of the Company may Include
  • 9.  Time Management ◦ Office hours can be used only for official work thereby enhancing productivity  Utilization and Management ◦ Company resources including computer resources for maximum  Employer & Employee Relationship  Customer Relationship  Poaching can be curbed  Reduces the risk of use of pirated and unauthorized use of software  Bandwidth Protection ◦ Authorized Official use of Company network and resources can increase the functioning of IT system. ADVANTAGES OF IT POLICY
  • 10. Information Technology policy intends to:- Establish a culture of security and trust for all employees; Establish guidelines governing proper use of IT and Internet by all employees; Ensure the use of internet only as a tool for continuous improvement of efficiency and performance; Fixing the Responsibility & Liability; Contd….. OBJECTIVE & PURPOSE OF INFORMATION TECHNOLOGY POLICY
  • 11.  To supplement, not replace, all existing laws, regulations, agreements, and contracts;  Preserve the integrity of the information technology systems;  Protect IT systems against the accidents, failures or improper use;  Reserves the right to access confidential data; Contd/-- OBJECTIVE & PURPOSE OF INFORMATION TECHNOLOGY POLICY….
  • 12. Reserves and limit to copy, remove or alter any data, file or system resources; Maintain a high level of professionalism in keeping with Code of Ethics; Maintain Company’s reputation among trade and public.
  • 13.  Most of our communications are now electronic.  Recipients of electronic documents like ◦ agents, ◦ distributors, ◦ customers etc. needs the source and authenticity of the documents or messages.  Satisfy audit requirements Contd….
  • 14.  Assist in compliance with applicable ◦ laws ◦ Regulations ◦ Guidelines and recommendations  Mitigate risk from a security incident  Educate users on sound security practices  Reduce legal risk INTRUSIONS ARE NOT ALW AYS AS OBVIOUS AS THIS EXAM PLE
  • 15. Espionage Employees falling to the lure or trap of RIVALS, and passing sensitive and secure data of the company. Damage to Goodwill, Reputation, Credibility of the Company.
  • 16. Harassment Viewing inappropriate content, such as pornography, hate or violence, can create an environment that is hostile and offensive for co-workers, and can damage reputation of a company. Productivity Frequent online browsing, shopping, and chatting can get in the way of getting the work done, and often leads to resentment from the coworkers Viruses Visiting less than reputable websites can lead to viruses, spyware, or other malicious software getting into the network. Service Interruptions Large downloads and streaming audio and video can suck up network resources that other employees need to do work and service customers
  • 17.  All ◦ Directors ◦ Employees, ◦ Part-time employees, ◦ Industrial Trainees, ◦ Contractors, ◦ Agents, ◦ & …..others of an organization directly or indirectly associated with the conduct of business of the organization.
  • 18.
  • 19. Would you be proud to wear your browser history? Would you be embarrassed if your boss or your peers saw where you’ve been going?
  • 20. Portable media (CDs, flash drives) should not be left on the desk Passwords (pencil) should not be posted Sensitive FAX or call logs should be put away Drinks should not be kept near workstations
  • 21.  Vaish Associates Advocates New Delhi   Mumbai    Gurgaon   Bengaluruǀ ǀ ǀ Celebrating 40 years of professional excellence IPR & IT Laws Practice Division 1st  & 11th  Floors   Mohan Dev Building   13, Tolstoy Marg   New Delhi 110001 (India)ǀ ǀ ǀ Phone: +91 11 49292532 (Direct) Mobile: +91 9810081079 Phone: +91 11 49292525 (Board) Fax: +91 11 23320484 www.vaishlaw.com email:- vpdalmia@vaishlaw.com  Intellectual Property & Information Technology Laws Division