SlideShare a Scribd company logo
Legal Aspects in IT Security   Is Your Organisation Up-to-Date?? (Ref : IT Act, 2008 & IT Rules 2011) Adv. Prashant Mali [BSc(Phy),MSc(Comp. Sci.),CNA,LLB,ISO 27001 LA] President –  Cyber Law Consulting   (Advocates & Attorneys) Founder  –  Cyber Law Foundation www.cyberlawconsulting.com
COMPENSATION FOR FAILURE TO PROTECT DATA ,[object Object]
What is a Body Corporate ? Under Section 43-A of IT Act,2008 ,[object Object],[object Object],[object Object],[object Object]
[object Object],Personal Information Under Section(2)(1)(i) of IT Rules 2011
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Sensitive Personal Data or Information  Under Section(3) of IT Rules 2011 www.cyberlawconsulting.com
Appointment of Grievance Officer Under Section(5)(9) of IT Rules 2011 ,[object Object]
WEBSITES SHOULD HAVE LEGAL NOTICES Under Section(3) of The IT Rules 2011 ,[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],Vicarious liability of an Organisation (If Resonable Security Practices are not followed)
INDIAN GOVERNMENT CAN PEEP IN YOUR DATA ,[object Object],[object Object]
THANK YOU prashant . [email_address]   Mobile : 09821763157 www.cyberlawconsulting.com

More Related Content

What's hot

India's Data Protection Law 2018- Future Road Ahead
India's Data Protection Law 2018- Future Road AheadIndia's Data Protection Law 2018- Future Road Ahead
India's Data Protection Law 2018- Future Road Ahead
EquiCorp Associates
 
Cyber Law
Cyber LawCyber Law
Cyber Law
Sushma Habib
 
SECURITY BREACH NOTIFICATION CHART 2013
SECURITY BREACH NOTIFICATION CHART 2013SECURITY BREACH NOTIFICATION CHART 2013
SECURITY BREACH NOTIFICATION CHART 2013
- Mark - Fullbright
 
Compliance audit under the Information Technology Act, 2000
Compliance audit under the Information Technology Act, 2000Compliance audit under the Information Technology Act, 2000
Compliance audit under the Information Technology Act, 2000
Sagar Rahurkar
 
INDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYINDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITY
pattok
 
Strengthening the Great Cyber-Wall of China — An Effort in Protecting the Mas...
Strengthening the Great Cyber-Wall of China — An Effort in Protecting the Mas...Strengthening the Great Cyber-Wall of China — An Effort in Protecting the Mas...
Strengthening the Great Cyber-Wall of China — An Effort in Protecting the Mas...
Terrance Tong
 
Personal data protection bill
Personal data protection bill Personal data protection bill
Personal data protection bill
Mathew Chacko
 
Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)
Lance Michalson
 
Nadeem cyber law assignment
Nadeem cyber law assignmentNadeem cyber law assignment
Nadeem cyber law assignment
Nadeem Kazi
 
10. law invest & ethics
10. law invest & ethics10. law invest & ethics
10. law invest & ethics
7wounders
 
Cyber for Beginners v2
Cyber for Beginners v2Cyber for Beginners v2
Cyber for Beginners v2
Kenny Boddye
 
Personally Identifiable Information Protection
Personally Identifiable Information ProtectionPersonally Identifiable Information Protection
Personally Identifiable Information Protection
PECB
 
Startups - data protection
Startups  - data protectionStartups  - data protection
Startups - data protection
Mathew Chacko
 
2017 cyber legislation in Singapore (v2) - case study and discussion of cybe...
2017 cyber legislation in Singapore  (v2) - case study and discussion of cybe...2017 cyber legislation in Singapore  (v2) - case study and discussion of cybe...
2017 cyber legislation in Singapore (v2) - case study and discussion of cybe...
Benjamin Ang
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
Aditya Shukla
 
Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008
ATHULYARAJDS
 
IT Act,2000 - Law
IT Act,2000 - LawIT Act,2000 - Law
IT Act,2000 - Law
Apurva Kavishwar
 
Assignment edu 03
Assignment edu 03 Assignment edu 03
Assignment edu 03
ATHULYARAJDS
 
cyber security legal perspective
cyber security legal perspectivecyber security legal perspective
cyber security legal perspective
Shoeb Ahmed
 
Cyberlaw
CyberlawCyberlaw

What's hot (20)

India's Data Protection Law 2018- Future Road Ahead
India's Data Protection Law 2018- Future Road AheadIndia's Data Protection Law 2018- Future Road Ahead
India's Data Protection Law 2018- Future Road Ahead
 
Cyber Law
Cyber LawCyber Law
Cyber Law
 
SECURITY BREACH NOTIFICATION CHART 2013
SECURITY BREACH NOTIFICATION CHART 2013SECURITY BREACH NOTIFICATION CHART 2013
SECURITY BREACH NOTIFICATION CHART 2013
 
Compliance audit under the Information Technology Act, 2000
Compliance audit under the Information Technology Act, 2000Compliance audit under the Information Technology Act, 2000
Compliance audit under the Information Technology Act, 2000
 
INDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYINDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITY
 
Strengthening the Great Cyber-Wall of China — An Effort in Protecting the Mas...
Strengthening the Great Cyber-Wall of China — An Effort in Protecting the Mas...Strengthening the Great Cyber-Wall of China — An Effort in Protecting the Mas...
Strengthening the Great Cyber-Wall of China — An Effort in Protecting the Mas...
 
Personal data protection bill
Personal data protection bill Personal data protection bill
Personal data protection bill
 
Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)
 
Nadeem cyber law assignment
Nadeem cyber law assignmentNadeem cyber law assignment
Nadeem cyber law assignment
 
10. law invest & ethics
10. law invest & ethics10. law invest & ethics
10. law invest & ethics
 
Cyber for Beginners v2
Cyber for Beginners v2Cyber for Beginners v2
Cyber for Beginners v2
 
Personally Identifiable Information Protection
Personally Identifiable Information ProtectionPersonally Identifiable Information Protection
Personally Identifiable Information Protection
 
Startups - data protection
Startups  - data protectionStartups  - data protection
Startups - data protection
 
2017 cyber legislation in Singapore (v2) - case study and discussion of cybe...
2017 cyber legislation in Singapore  (v2) - case study and discussion of cybe...2017 cyber legislation in Singapore  (v2) - case study and discussion of cybe...
2017 cyber legislation in Singapore (v2) - case study and discussion of cybe...
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008
 
IT Act,2000 - Law
IT Act,2000 - LawIT Act,2000 - Law
IT Act,2000 - Law
 
Assignment edu 03
Assignment edu 03 Assignment edu 03
Assignment edu 03
 
cyber security legal perspective
cyber security legal perspectivecyber security legal perspective
cyber security legal perspective
 
Cyberlaw
CyberlawCyberlaw
Cyberlaw
 

Viewers also liked

Business assignment
Business assignmentBusiness assignment
Business assignment
Karen Kong
 
Legal issues &it act
Legal issues &it actLegal issues &it act
Legal issues &it act
Nandini Raj
 
Implementing security on android application
Implementing security on android applicationImplementing security on android application
Implementing security on android application
IAEME Publication
 
Finding Non-dilutive Funding for Your Technology Startup
Finding Non-dilutive Funding for Your Technology StartupFinding Non-dilutive Funding for Your Technology Startup
Finding Non-dilutive Funding for Your Technology Startup
Non-dilutive.com
 
Penalty Enforcement
Penalty EnforcementPenalty Enforcement
Penalty Enforcement
NUIMSports
 
Penalty enforcement & 10 second runoff
Penalty enforcement  & 10 second runoff Penalty enforcement  & 10 second runoff
Penalty enforcement & 10 second runoff
drs8418
 
Security Act 2007
Security Act 2007Security Act 2007
Security Act 2007
Jo Balucanag - Bitonio
 
111cyber law sectins cases.docx new
111cyber law sectins cases.docx new111cyber law sectins cases.docx new
111cyber law sectins cases.docx new
Avinash Tegginmani
 
Network security
Network securityNetwork security
Network security
Nandini Raj
 
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Symantec
 
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...
F5 Networks
 
Using Docker container technology with F5 Networks products and services
Using Docker container technology with F5 Networks products and servicesUsing Docker container technology with F5 Networks products and services
Using Docker container technology with F5 Networks products and services
F5 Networks
 
Ejercicios resueltos de el algebra de baldor
Ejercicios resueltos de el algebra de baldorEjercicios resueltos de el algebra de baldor
Ejercicios resueltos de el algebra de baldorDiegoMendoz
 

Viewers also liked (13)

Business assignment
Business assignmentBusiness assignment
Business assignment
 
Legal issues &it act
Legal issues &it actLegal issues &it act
Legal issues &it act
 
Implementing security on android application
Implementing security on android applicationImplementing security on android application
Implementing security on android application
 
Finding Non-dilutive Funding for Your Technology Startup
Finding Non-dilutive Funding for Your Technology StartupFinding Non-dilutive Funding for Your Technology Startup
Finding Non-dilutive Funding for Your Technology Startup
 
Penalty Enforcement
Penalty EnforcementPenalty Enforcement
Penalty Enforcement
 
Penalty enforcement & 10 second runoff
Penalty enforcement  & 10 second runoff Penalty enforcement  & 10 second runoff
Penalty enforcement & 10 second runoff
 
Security Act 2007
Security Act 2007Security Act 2007
Security Act 2007
 
111cyber law sectins cases.docx new
111cyber law sectins cases.docx new111cyber law sectins cases.docx new
111cyber law sectins cases.docx new
 
Network security
Network securityNetwork security
Network security
 
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
 
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...
 
Using Docker container technology with F5 Networks products and services
Using Docker container technology with F5 Networks products and servicesUsing Docker container technology with F5 Networks products and services
Using Docker container technology with F5 Networks products and services
 
Ejercicios resueltos de el algebra de baldor
Ejercicios resueltos de el algebra de baldorEjercicios resueltos de el algebra de baldor
Ejercicios resueltos de el algebra de baldor
 

Similar to Legal aspects of IT Security-at ISACA conference 2011

security issue in e-commerce
security issue in e-commercesecurity issue in e-commerce
security issue in e-commerce
Palavesa Krishnan
 
IIAC Young Agents - Protecting Your Insureds\' Private Information
IIAC Young Agents - Protecting Your Insureds\' Private InformationIIAC Young Agents - Protecting Your Insureds\' Private Information
IIAC Young Agents - Protecting Your Insureds\' Private Information
Jason Hoeppner
 
Cybersecurity legislation in Singapore (2017)
Cybersecurity legislation in Singapore (2017)Cybersecurity legislation in Singapore (2017)
Cybersecurity legislation in Singapore (2017)
Benjamin Ang
 
Htc itmr 30-05-13
Htc   itmr   30-05-13Htc   itmr   30-05-13
Htc itmr 30-05-13
s.balu swaminathan
 
Legal Obligations of Technology Service Providers as Intermediaries
Legal Obligations of Technology Service Providers as IntermediariesLegal Obligations of Technology Service Providers as Intermediaries
Legal Obligations of Technology Service Providers as Intermediaries
EquiCorp Associates
 
Cie 2 cyber law
Cie 2  cyber lawCie 2  cyber law
Cie 2 cyber law
Mahua Narayan
 
Legal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsLegal aspects of handling cyber frauds
Legal aspects of handling cyber frauds
Sagar Rahurkar
 
Ethical privacy and security issues
Ethical privacy and security issuesEthical privacy and security issues
Ethical privacy and security issues
Marcelo Augusto A. Cosgayon
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Act
anthony4web
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K Pathak
Dipayan Sarkar
 
Cyber security laws
Cyber security lawsCyber security laws
AI, Blockchain, IoT GDPR Compliance AT A Glance
AI, Blockchain, IoT GDPR Compliance AT A GlanceAI, Blockchain, IoT GDPR Compliance AT A Glance
AI, Blockchain, IoT GDPR Compliance AT A Glance
Alex G. Lee, Ph.D. Esq. CLP
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
Vijay Dalmia
 
Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)
Lance Michalson
 
Data Privacy - Security of Personal Information
Data Privacy - Security of Personal InformationData Privacy - Security of Personal Information
Data Privacy - Security of Personal Information
JDP Consulting
 
SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)
Asish Verma
 
Access Control, Authentication, and Public Key Infrastructure.docx
Access Control, Authentication, and Public Key Infrastructure.docxAccess Control, Authentication, and Public Key Infrastructure.docx
Access Control, Authentication, and Public Key Infrastructure.docx
nettletondevon
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
Tushar Rajput
 
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Raleigh ISSA
 
Reasonable security practices and procedures and sensitive personal data or i...
Reasonable security practices and procedures and sensitive personal data or i...Reasonable security practices and procedures and sensitive personal data or i...
Reasonable security practices and procedures and sensitive personal data or i...
Vijay Dalmia
 

Similar to Legal aspects of IT Security-at ISACA conference 2011 (20)

security issue in e-commerce
security issue in e-commercesecurity issue in e-commerce
security issue in e-commerce
 
IIAC Young Agents - Protecting Your Insureds\' Private Information
IIAC Young Agents - Protecting Your Insureds\' Private InformationIIAC Young Agents - Protecting Your Insureds\' Private Information
IIAC Young Agents - Protecting Your Insureds\' Private Information
 
Cybersecurity legislation in Singapore (2017)
Cybersecurity legislation in Singapore (2017)Cybersecurity legislation in Singapore (2017)
Cybersecurity legislation in Singapore (2017)
 
Htc itmr 30-05-13
Htc   itmr   30-05-13Htc   itmr   30-05-13
Htc itmr 30-05-13
 
Legal Obligations of Technology Service Providers as Intermediaries
Legal Obligations of Technology Service Providers as IntermediariesLegal Obligations of Technology Service Providers as Intermediaries
Legal Obligations of Technology Service Providers as Intermediaries
 
Cie 2 cyber law
Cie 2  cyber lawCie 2  cyber law
Cie 2 cyber law
 
Legal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsLegal aspects of handling cyber frauds
Legal aspects of handling cyber frauds
 
Ethical privacy and security issues
Ethical privacy and security issuesEthical privacy and security issues
Ethical privacy and security issues
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Act
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K Pathak
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 
AI, Blockchain, IoT GDPR Compliance AT A Glance
AI, Blockchain, IoT GDPR Compliance AT A GlanceAI, Blockchain, IoT GDPR Compliance AT A Glance
AI, Blockchain, IoT GDPR Compliance AT A Glance
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)
 
Data Privacy - Security of Personal Information
Data Privacy - Security of Personal InformationData Privacy - Security of Personal Information
Data Privacy - Security of Personal Information
 
SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)
 
Access Control, Authentication, and Public Key Infrastructure.docx
Access Control, Authentication, and Public Key Infrastructure.docxAccess Control, Authentication, and Public Key Infrastructure.docx
Access Control, Authentication, and Public Key Infrastructure.docx
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
 
Reasonable security practices and procedures and sensitive personal data or i...
Reasonable security practices and procedures and sensitive personal data or i...Reasonable security practices and procedures and sensitive personal data or i...
Reasonable security practices and procedures and sensitive personal data or i...
 

More from Adv Prashant Mali

Electronic evidence for delhi judicial academy prashant mali
Electronic evidence  for delhi judicial academy prashant maliElectronic evidence  for delhi judicial academy prashant mali
Electronic evidence for delhi judicial academy prashant mali
Adv Prashant Mali
 
Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant Mali
Adv Prashant Mali
 
9 things about indian cyber law prashant mali
9 things about indian cyber law   prashant mali9 things about indian cyber law   prashant mali
9 things about indian cyber law prashant mali
Adv Prashant Mali
 
Social Media and Cyber Law in India By Prashant Mali
Social Media and Cyber Law in India By Prashant MaliSocial Media and Cyber Law in India By Prashant Mali
Social Media and Cyber Law in India By Prashant Mali
Adv Prashant Mali
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in india
Adv Prashant Mali
 
Electronic Evidence fraud conference
Electronic Evidence   fraud conferenceElectronic Evidence   fraud conference
Electronic Evidence fraud conference
Adv Prashant Mali
 
Cloud computing legal issues
Cloud computing legal issuesCloud computing legal issues
Cloud computing legal issues
Adv Prashant Mali
 
What is business continuity planning-bcp
What is business continuity planning-bcpWhat is business continuity planning-bcp
What is business continuity planning-bcp
Adv Prashant Mali
 
What is digital signature or DSC
What is digital signature or DSCWhat is digital signature or DSC
What is digital signature or DSC
Adv Prashant Mali
 
Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010
Adv Prashant Mali
 
Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010
Adv Prashant Mali
 
Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010
Adv Prashant Mali
 
Cloud computing and Law-India legal summit
Cloud computing and Law-India legal summitCloud computing and Law-India legal summit
Cloud computing and Law-India legal summit
Adv Prashant Mali
 
Cloud computing and law-India legal summit 2011
Cloud computing and law-India legal summit 2011Cloud computing and law-India legal summit 2011
Cloud computing and law-India legal summit 2011
Adv Prashant Mali
 

More from Adv Prashant Mali (14)

Electronic evidence for delhi judicial academy prashant mali
Electronic evidence  for delhi judicial academy prashant maliElectronic evidence  for delhi judicial academy prashant mali
Electronic evidence for delhi judicial academy prashant mali
 
Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant Mali
 
9 things about indian cyber law prashant mali
9 things about indian cyber law   prashant mali9 things about indian cyber law   prashant mali
9 things about indian cyber law prashant mali
 
Social Media and Cyber Law in India By Prashant Mali
Social Media and Cyber Law in India By Prashant MaliSocial Media and Cyber Law in India By Prashant Mali
Social Media and Cyber Law in India By Prashant Mali
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in india
 
Electronic Evidence fraud conference
Electronic Evidence   fraud conferenceElectronic Evidence   fraud conference
Electronic Evidence fraud conference
 
Cloud computing legal issues
Cloud computing legal issuesCloud computing legal issues
Cloud computing legal issues
 
What is business continuity planning-bcp
What is business continuity planning-bcpWhat is business continuity planning-bcp
What is business continuity planning-bcp
 
What is digital signature or DSC
What is digital signature or DSCWhat is digital signature or DSC
What is digital signature or DSC
 
Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010
 
Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010
 
Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010
 
Cloud computing and Law-India legal summit
Cloud computing and Law-India legal summitCloud computing and Law-India legal summit
Cloud computing and Law-India legal summit
 
Cloud computing and law-India legal summit 2011
Cloud computing and law-India legal summit 2011Cloud computing and law-India legal summit 2011
Cloud computing and law-India legal summit 2011
 

Recently uploaded

University of North Carolina at Charlotte degree offer diploma Transcript
University of North Carolina at Charlotte degree offer diploma TranscriptUniversity of North Carolina at Charlotte degree offer diploma Transcript
University of North Carolina at Charlotte degree offer diploma Transcript
tscdzuip
 
The various stages, after the initial invitation has been made to the public ...
The various stages, after the initial invitation has been made to the public ...The various stages, after the initial invitation has been made to the public ...
The various stages, after the initial invitation has been made to the public ...
Yashwanth Rm
 
Seven Camp April 2024 Cohort Booklet.pdf
Seven Camp April 2024 Cohort Booklet.pdfSeven Camp April 2024 Cohort Booklet.pdf
Seven Camp April 2024 Cohort Booklet.pdf
FinTech Belgium
 
Understanding-Stocks-and-Real-Estate.pptx
Understanding-Stocks-and-Real-Estate.pptxUnderstanding-Stocks-and-Real-Estate.pptx
Understanding-Stocks-and-Real-Estate.pptx
cosmo-soil
 
Money20/20 and EU Networking Event of 20/24!
Money20/20 and EU Networking Event of 20/24!Money20/20 and EU Networking Event of 20/24!
Money20/20 and EU Networking Event of 20/24!
FinTech Belgium
 
CONTABILIDAD FINANCIERA / ENSAYO DE CONTABILIDAD
CONTABILIDAD FINANCIERA / ENSAYO DE CONTABILIDADCONTABILIDAD FINANCIERA / ENSAYO DE CONTABILIDAD
CONTABILIDAD FINANCIERA / ENSAYO DE CONTABILIDAD
godiperoficial
 
3-الملخصات الهيكلية للمعايير المراجعة المصرية.pdf
3-الملخصات الهيكلية للمعايير المراجعة المصرية.pdf3-الملخصات الهيكلية للمعايير المراجعة المصرية.pdf
3-الملخصات الهيكلية للمعايير المراجعة المصرية.pdf
Riadh ASSOUAK
 
How Poonawalla Fincorp and IndusInd Bank’s Co-Branded RuPay Credit Card Cater...
How Poonawalla Fincorp and IndusInd Bank’s Co-Branded RuPay Credit Card Cater...How Poonawalla Fincorp and IndusInd Bank’s Co-Branded RuPay Credit Card Cater...
How Poonawalla Fincorp and IndusInd Bank’s Co-Branded RuPay Credit Card Cater...
beulahfernandes8
 
1比1复刻(ksu毕业证书)美国堪萨斯州立大学毕业证本科文凭证书原版一模一样
1比1复刻(ksu毕业证书)美国堪萨斯州立大学毕业证本科文凭证书原版一模一样1比1复刻(ksu毕业证书)美国堪萨斯州立大学毕业证本科文凭证书原版一模一样
1比1复刻(ksu毕业证书)美国堪萨斯州立大学毕业证本科文凭证书原版一模一样
28xo7hf
 
Ending stagnation: How to boost prosperity across Scotland
Ending stagnation: How to boost prosperity across ScotlandEnding stagnation: How to boost prosperity across Scotland
Ending stagnation: How to boost prosperity across Scotland
ResolutionFoundation
 
Discover the Future of Dogecoin with Our Comprehensive Guidance
Discover the Future of Dogecoin with Our Comprehensive GuidanceDiscover the Future of Dogecoin with Our Comprehensive Guidance
Discover the Future of Dogecoin with Our Comprehensive Guidance
36 Crypto
 
How to Invest in Cryptocurrency for Beginners: A Complete Guide
How to Invest in Cryptocurrency for Beginners: A Complete GuideHow to Invest in Cryptocurrency for Beginners: A Complete Guide
How to Invest in Cryptocurrency for Beginners: A Complete Guide
Daniel
 
Initial Public Offering (IPO) Process.ppt
Initial Public Offering (IPO) Process.pptInitial Public Offering (IPO) Process.ppt
Initial Public Offering (IPO) Process.ppt
ribhi87
 
Economic trends from a business point of view (May 2024)
Economic trends from a business point of view (May 2024)Economic trends from a business point of view (May 2024)
Economic Risk Factor Update: June 2024 [SlideShare]
Economic Risk Factor Update: June 2024 [SlideShare]Economic Risk Factor Update: June 2024 [SlideShare]
Economic Risk Factor Update: June 2024 [SlideShare]
Commonwealth
 
Importance of community participation in development projects.pdf
Importance of community participation in development projects.pdfImportance of community participation in development projects.pdf
Importance of community participation in development projects.pdf
krisretro1
 
13 Jun 24 ILC Retirement Income Summit - slides.pptx
13 Jun 24 ILC Retirement Income Summit - slides.pptx13 Jun 24 ILC Retirement Income Summit - slides.pptx
13 Jun 24 ILC Retirement Income Summit - slides.pptx
ILC- UK
 
Seeman_Fiintouch_LLP_Newsletter_Jun_2024.pdf
Seeman_Fiintouch_LLP_Newsletter_Jun_2024.pdfSeeman_Fiintouch_LLP_Newsletter_Jun_2024.pdf
Seeman_Fiintouch_LLP_Newsletter_Jun_2024.pdf
Ashis Kumar Dey
 
一比一原版(cwu毕业证书)美国中央华盛顿大学毕业证如何办理
一比一原版(cwu毕业证书)美国中央华盛顿大学毕业证如何办理一比一原版(cwu毕业证书)美国中央华盛顿大学毕业证如何办理
一比一原版(cwu毕业证书)美国中央华盛顿大学毕业证如何办理
asukqco
 
Exploring-Madhya-Pradesh-Culture-Heritage-and-Land-Records.pptx
Exploring-Madhya-Pradesh-Culture-Heritage-and-Land-Records.pptxExploring-Madhya-Pradesh-Culture-Heritage-and-Land-Records.pptx
Exploring-Madhya-Pradesh-Culture-Heritage-and-Land-Records.pptx
cosmo-soil
 

Recently uploaded (20)

University of North Carolina at Charlotte degree offer diploma Transcript
University of North Carolina at Charlotte degree offer diploma TranscriptUniversity of North Carolina at Charlotte degree offer diploma Transcript
University of North Carolina at Charlotte degree offer diploma Transcript
 
The various stages, after the initial invitation has been made to the public ...
The various stages, after the initial invitation has been made to the public ...The various stages, after the initial invitation has been made to the public ...
The various stages, after the initial invitation has been made to the public ...
 
Seven Camp April 2024 Cohort Booklet.pdf
Seven Camp April 2024 Cohort Booklet.pdfSeven Camp April 2024 Cohort Booklet.pdf
Seven Camp April 2024 Cohort Booklet.pdf
 
Understanding-Stocks-and-Real-Estate.pptx
Understanding-Stocks-and-Real-Estate.pptxUnderstanding-Stocks-and-Real-Estate.pptx
Understanding-Stocks-and-Real-Estate.pptx
 
Money20/20 and EU Networking Event of 20/24!
Money20/20 and EU Networking Event of 20/24!Money20/20 and EU Networking Event of 20/24!
Money20/20 and EU Networking Event of 20/24!
 
CONTABILIDAD FINANCIERA / ENSAYO DE CONTABILIDAD
CONTABILIDAD FINANCIERA / ENSAYO DE CONTABILIDADCONTABILIDAD FINANCIERA / ENSAYO DE CONTABILIDAD
CONTABILIDAD FINANCIERA / ENSAYO DE CONTABILIDAD
 
3-الملخصات الهيكلية للمعايير المراجعة المصرية.pdf
3-الملخصات الهيكلية للمعايير المراجعة المصرية.pdf3-الملخصات الهيكلية للمعايير المراجعة المصرية.pdf
3-الملخصات الهيكلية للمعايير المراجعة المصرية.pdf
 
How Poonawalla Fincorp and IndusInd Bank’s Co-Branded RuPay Credit Card Cater...
How Poonawalla Fincorp and IndusInd Bank’s Co-Branded RuPay Credit Card Cater...How Poonawalla Fincorp and IndusInd Bank’s Co-Branded RuPay Credit Card Cater...
How Poonawalla Fincorp and IndusInd Bank’s Co-Branded RuPay Credit Card Cater...
 
1比1复刻(ksu毕业证书)美国堪萨斯州立大学毕业证本科文凭证书原版一模一样
1比1复刻(ksu毕业证书)美国堪萨斯州立大学毕业证本科文凭证书原版一模一样1比1复刻(ksu毕业证书)美国堪萨斯州立大学毕业证本科文凭证书原版一模一样
1比1复刻(ksu毕业证书)美国堪萨斯州立大学毕业证本科文凭证书原版一模一样
 
Ending stagnation: How to boost prosperity across Scotland
Ending stagnation: How to boost prosperity across ScotlandEnding stagnation: How to boost prosperity across Scotland
Ending stagnation: How to boost prosperity across Scotland
 
Discover the Future of Dogecoin with Our Comprehensive Guidance
Discover the Future of Dogecoin with Our Comprehensive GuidanceDiscover the Future of Dogecoin with Our Comprehensive Guidance
Discover the Future of Dogecoin with Our Comprehensive Guidance
 
How to Invest in Cryptocurrency for Beginners: A Complete Guide
How to Invest in Cryptocurrency for Beginners: A Complete GuideHow to Invest in Cryptocurrency for Beginners: A Complete Guide
How to Invest in Cryptocurrency for Beginners: A Complete Guide
 
Initial Public Offering (IPO) Process.ppt
Initial Public Offering (IPO) Process.pptInitial Public Offering (IPO) Process.ppt
Initial Public Offering (IPO) Process.ppt
 
Economic trends from a business point of view (May 2024)
Economic trends from a business point of view (May 2024)Economic trends from a business point of view (May 2024)
Economic trends from a business point of view (May 2024)
 
Economic Risk Factor Update: June 2024 [SlideShare]
Economic Risk Factor Update: June 2024 [SlideShare]Economic Risk Factor Update: June 2024 [SlideShare]
Economic Risk Factor Update: June 2024 [SlideShare]
 
Importance of community participation in development projects.pdf
Importance of community participation in development projects.pdfImportance of community participation in development projects.pdf
Importance of community participation in development projects.pdf
 
13 Jun 24 ILC Retirement Income Summit - slides.pptx
13 Jun 24 ILC Retirement Income Summit - slides.pptx13 Jun 24 ILC Retirement Income Summit - slides.pptx
13 Jun 24 ILC Retirement Income Summit - slides.pptx
 
Seeman_Fiintouch_LLP_Newsletter_Jun_2024.pdf
Seeman_Fiintouch_LLP_Newsletter_Jun_2024.pdfSeeman_Fiintouch_LLP_Newsletter_Jun_2024.pdf
Seeman_Fiintouch_LLP_Newsletter_Jun_2024.pdf
 
一比一原版(cwu毕业证书)美国中央华盛顿大学毕业证如何办理
一比一原版(cwu毕业证书)美国中央华盛顿大学毕业证如何办理一比一原版(cwu毕业证书)美国中央华盛顿大学毕业证如何办理
一比一原版(cwu毕业证书)美国中央华盛顿大学毕业证如何办理
 
Exploring-Madhya-Pradesh-Culture-Heritage-and-Land-Records.pptx
Exploring-Madhya-Pradesh-Culture-Heritage-and-Land-Records.pptxExploring-Madhya-Pradesh-Culture-Heritage-and-Land-Records.pptx
Exploring-Madhya-Pradesh-Culture-Heritage-and-Land-Records.pptx
 

Legal aspects of IT Security-at ISACA conference 2011

  • 1. Legal Aspects in IT Security Is Your Organisation Up-to-Date?? (Ref : IT Act, 2008 & IT Rules 2011) Adv. Prashant Mali [BSc(Phy),MSc(Comp. Sci.),CNA,LLB,ISO 27001 LA] President – Cyber Law Consulting (Advocates & Attorneys) Founder – Cyber Law Foundation www.cyberlawconsulting.com
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10. THANK YOU prashant . [email_address] Mobile : 09821763157 www.cyberlawconsulting.com