Meta tags:
Headings (most frequently used words):
cyber, in, india, 2016, security, and, of, may, for, indian, are, wednesday, april, under, is, advertisement, aadhaar, digital, companies, the, now, bid, space, needed, thursday, issues, like, act, pages, directors, obligations, urgently, laws, tuesday, ignored, projects, with, over, world, individuals, houses, business, nuisance, 2013, by, ads, flux, developments, criminals, paradise, botnet, servers, proof, bullet, fast, them, dns, dynamic, miscreants, crackers, upon, attack, offensive, launched, honeypot, big, attribution, malware, useful, dangers, present, 19, current, saturday, archive, blog, websites, post, july, featured, cities, smart, 14, 11, sunday, 27, 13, hacking, 26, healthcare, area, proposals, research, innovative, soliciting, darpa, entrepreneurs, businesses, june, center, 2017, mobile, iot, things, internet, friday, coe, excellence, 2015,
Text of the page (most frequently used words):
and (313), the (301), cyber (253), #india (135), security (123), for (89), are (80), #that (66), has (53), law (51), #legal (50), #this (46), #indian (45), not (41), #also (35), #have (35), #with (34), share (33), #malware (33), #issues (32), government (32), ago (31), years (31), these (30), attacks (27), mobile (27), technology (26), would (25), iot (25), techno (25), companies (25), dns (24), information (23), laws (23), their (22), services (21), dynamic (20), such (20), use (19), can (18), forensics (18), act (18), 2016 (17), internet (17), must (17), international (17), world (16), crimes (16), criminals (15), they (15), aadhaar (15), been (15), perry4law (15), ptlb (15), cyberspace (15), may (15), however (14), organisation (14), very (14), but (14), malicious (14), from (13), even (13), many (13), flux (13), directors (13), excellence (12), smart (12), email (12), due (12), still (11), service (11), attribution (11), fast (11), other (11), used (11), instance (11), more (10), like (10), liberties (10), under (10), civil (10), blogthis (10), healthcare (10), days (10), posted (10), comments (10), 2000 (10), well (10), only (10), various (10), facebook (10), all (10), centre (10), cities (10), p4lo (10), pinterest (10), twitter (10), digital (10), websites (9), business (9), rights (9), possible (9), difficult (9), infrastructure (9), related (9), things (9), etc (9), individuals (9), pdf (9), requirements (9), level (8), banking (8), warfare (8), become (8), different (8), them (8), research (8), year (8), there (8), project (8), upon (8), regulatory (8), new (8), devices (8), computer (8), big (8), obligations (8), 2013 (8), online (8), attack (8), discovery (8), some (8), server (7), was (7), where (7), systems (7), rules (7), data (7), made (7), management (7), now (7), addresses (7), its (7), projects (7), over (7), financial (7), using (7), electronic (7), manage (7), global (7), development (7), investigation (7), operators (7), much (7), delivery (7), adopted (6), further (6), policy (6), compliance (6), personal (6), about (6), required (6), domain (6), products (6), trends (6), actions (6), servers (6), stakeholders (6), time (6), banks (6), similarly (6), human (6), diligence (6), cannot (6), public (6), framework (6), breach (6), stage (6), name (6), agencies (6), users (6), any (6), part (6), hosted (5), education (5), defence (5), espionage (5), current (5), offensive (5), make (5), individual (5), regard (5), company (5), regulations (5), campaigns (5), absence (5), increase (5), changing (5), proposed (5), dedicated (5), phones (5), point (5), including (5), already (5), corporate (5), disclosure (5), coe (5), long (5), capabilities (5), authorship (5), secure (5), targeting (5), operates (5), same (5), terrorism (5), through (5), present (5), sophisticated (5), increased (5), businesses (5), honeypot (5), fact (5), sensitive (5), hosting (5), compliances (5), into (5), complicated (5), governments (5), future (5), multiple (5), while (5), attackers (5), ransomware (4), sources (4), commercial (4), great (4), helps (4), good (4), criminal (4), both (4), center (4), anti (4), conflict (4), soon (4), his (4), rule (4), whereas (4), being (4), needs (4), national (4), cecsrdi (4), hacking (4), abusing (4), court (4), state (4), crackers (4), governance (4), aspects (4), computers (4), program (4), innovative (4), effective (4), enforcement (4), botnet (4), tools (4), norms (4), skills (4), help (4), end (4), source (4), considered (4), against (4), recently (4), knowledge (4), those (4), true (4), first (4), across (4), non (4), exclusive (4), targeted (4), need (4), measures (4), resources (4), base (4), april (4), loss (4), critical (4), community (4), problems (4), technologies (4), develop (4), particular (4), domains (4), reporting (4), based (4), practice (4), techniques (4), one (4), challenges (4), our (4), around (4), defensive (4), space (4), facing (4), growing (4), potential (4), fields (4), protection (4), were (3), piece (3), crime (3), procedure (3), prescribed (3), june (3), date (3), than (3), proof (3), place (3), automated (3), phishing (3), situation (3), result (3), applicable (3), managing (3), methods (3), nation (3), increasing (3), own (3), nuisance (3), network (3), compromised (3), bullet (3), ensure (3), countries (3), wednesday (3), darpa (3), you (3), july (3), mirrored (3), 100 (3), past (3), detected (3), formulation (3), belong (3), extent (3), active (3), blog (3), sfio (3), website (3), purposes (3), draft (3), adoption (3), posts (3), developments (3), dangers (3), simply (3), before (3), ict (3), houses (3), provisions (3), working (3), take (3), reason (3), 2015 (3), sector (3), november (3), control (3), each (3), address (3), firms (3), aggressive (3), deal (3), researcher (3), cover (3), domicile (3), 2014 (3), decisions (3), between (3), scale (3), perhaps (3), target (3), bank (3), robust (3), becomes (3), commerce (3), top (3), attention (3), after (3), option (3), among (3), paid (3), high (3), small (3), defeating (3), developers (3), two (3), policies (3), frameworks (3), provided (3), cross (3), border (3), software (3), serious (3), declared (3), near (3), privacy (3), needed (3), thus (3), infrastructures (3), intelligence (3), trainings (3), indians (3), process (3), bad (3), will (3), central (3), mandatory (3), then (3), significantly (3), launched (3), full (3), virus (3), virtual (3), should (3), provide (3), means (3), which (3), when (3), subsidiary (3), just (3), especially (3), govt (3), risk (3), found (3), ensuring (3), industry (3), because (3), 2011 (3), bill (3), essential (3), sufficient (3), most (3), presently (3), measure (3), number (3), matter (3), institute (3), mit (3), taking (3), every (3), field (3), predicted (3), health (3), mobiles (3), perspective (3), encryption (3), abiding (3), till (3), back (3), trace (2), uptime (2), supported (2), ease (2), generating (2), believe (2), set (2), towards (2), identities (2), actors (2), concurrent (2), files (2), countermeasure (2), interested (2), tactically (2), destruction (2), next (2), trying (2), what (2), purpose (2), independent (2), themselves (2), private (2), procurement (2), blacklisting (2), basic (2), powerful (2), operationally (2), web (2), toward (2), compromise (2), disabling (2), relevant (2), ground (2), specific (2), uses (2), russian (2), she (2), steal (2), customised (2), legitimate (2), developing (2), arm (2), allows (2), behavioral (2), without (2), who (2), provides (2), constantly (2), supreme (2), though (2), anonymity (2), double (2), shutting (2), activities (2), implemented (2), had (2), anybody (2), redirection (2), impossible (2), provider (2), jurisdiction (2), include (2), concepts (2), cases (2), ability (2), abused (2), could (2), product (2), analysis (2), free (2), networks (2), physical (2), method (2), currently (2), parties (2), specifically (2), response (2), side (2), enhanced (2), behind (2), ever (2), aims (2), points (2), range (2), circumstances (2), down (2), counterstrike (2), hosts (2), putting (2), providers (2), adversary (2), peer (2), person (2), operator (2), lack (2), command (2), customers (2), options (2), applies (2), grids (2), nations (2), strategies (2), complying (2), thursday (2), treaty (2), problem (2), applications (2), simple (2), concerned (2), reserve (2), singh (2), copyright (2), rbi (2), appointed (2), realised (2), chief (2), officer (2), ciso (2), gulshan (2), rai (2), demands (2), convictions (2), violation (2), come (2), infected (2), science (2), traditional (2), wrong (2), open (2), 2018 (2), intermediary (2), pertaining (2), protections (2), statutory (2), telecom (2), eds (2), alarming (2), talking (2), everybody (2), word (2), buzz (2), matrimonial (2), certain (2), comply (2), authentication (2), eliminated (2), really (2), implementation (2), mind (2), solutions (2), evolving (2), ascertain (2), president (2), taken (2), massachusetts (2), guidelines (2), developed (2), damaging (2), short (2), shortcomings (2), occurs (2), 2017 (2), wide (2), march (2), february (2), january (2), arise (2), requirement (2), october (2), september (2), august (2), authorities (2), aware (2), seeks (2), ignored (2), reached (2), environment (2), started (2), urgently (2), rise (2), give (2), contact (2), concept (2), making (2), enable (2), breaches (2), institutions (2), case (2), nevertheless (2), practices (2), always (2), tool (2), reality (2), missing (2), highly (2), fear (2), unique (2), regarding (2), hospitals (2), ranging (2), frauds (2), how (2), art (2), association (2), standards (2), recent (2), fight (2), satellites (2), people (2), real (2), system (2), yet (2), manner (2), stages (2), keep (2), coronavirus (2), find (2), nist (2), liabilities (2), requires (2), stay (2), away (2), why (2), novel (2), major (2), cause (2), harmonisation (2), titled (2), update (2), interest (2), prescribe (2), ransom (2), weak (2), better (2), clearly (2), enacted (2), proposals (2), home (2), area (2), money (2), artificial (2), advanced (2), work (2), risky (2), providing (2), bid (2), agriculture (2), three (2), role (2), seriously (2), capable (2), few (2), afpoh (2), advertisement (2), truth (2), once (2), traditionally (2), times (2), starting, stuxnet, care, faced, exception, suffering, organisational, done, sign, managed, decrypted, lethargic, moment, established, medium, goz, remained, zeus, paying, principles, facilitated, indifferent, makes, escaping, gameover, duqu, infection, automatically, finfisher, invoked, blackshades, snake, uroburos, pushy, unlimited, outlined, flame, disposal, face, wold, allow, undefeatable, earliest, minimised, carbanak, cloud, circulation, computing, instead, strengthening, receiving, acquiring, left, barking, tree, gone, fbi, witnessed, backdoor, demanding, corporation, corporations, frequently, encrypted, innovate, vskimmer, oriented, kill, gamble, amount, goodwill, faith, stealing, generously, driven, proper, contemporary, timely, preventing, causing, trojan, absolutely, witness, tremendous, damage, grabber, memory, ineffective, emerged, uncontrollable, impact, dump, violate, addition, sunday, course, concern, naturally, usages, closely, implementable, pipeline, direction, modes, reliable, believed, play, successful, betting, prepared, phone, smooth, hassle, details, subsequent, covered, discuss, distant, dream, adequate, rough, waters, heading, revised, confidential, writing, suitably, decrypts, incorporating, design, document, inventors, consider, dispose, protecting, released, guide, integrating, influence, diverse, prominent, encrypts, entrepreneurs, writers, saturday, transactions, conducive, ready, biggest, hurdles, pertain, mechanisms, woes, ubiquitous, importance, committing, front, regulated, updated, incidences, insecure, neither, prudent, nor, false, sense, projecting, divert, critics, professionals, put, sometime, fiction, task, lives, guys, steps, ahead, ardent, players, absolute, myth, claiming, her, ignorant, realities, exist, ads, advertise, properties, peril, guidance, communicate, issued, thereby, reduce, cost, operation, improve, productivity, controlled, launching, protocols, avoid, combines, hardware, communication, intrusive, created, automatic, friday, deseed, block, your, biometric, irresolvable, jeopardise, safety, whatever, tells, constitutional, anomaly, publication, available, partially, reveal, operate, little, caught, extremely, reliably, confidently, attribute, stems, least, accountability, spanning, jurisdictions, observable, visibility, view, defender, entirely, friendly, territory, organization, enterprise, largely, obstructed, layers, indirection, characterization, indicators, file, publicly, fidelity, identifiers, decompose, validating, enriching, algorithms, predictive, profiles, within, context, scalable, fuse, historical, picture, activity, semantically, transparent, rich, compressed, representations, extract, biometrics, vantage, consistently, identify, personas, endpoint, involving, several, opaque, hashes, evade, vast, recommends, federal, conferred, courts, nature, prosecute, extradite, hurdle, directly, attributable, scenario, soliciting, see, strongly, fronts, expand, best, mechanism, coordination, graver, market, consists, ddos, persistent, threat, spyware, lost, stolen, list, illustrative, scope, proposal, defenders, create, resume, operations, superficially, tactics, procedures, detailed, inhibits, policymaker, considerations, goal, objective, collect, validate, pertinent, collection, require, investigate, approaches, revolutionary, advances, excluded, primarily, results, evolutionary, improvements, existing, defense, agency, solve, invited, adherence, unlawful, conceptualise, inves, proportion, crossed, territorial, boundaries, variou, cooperation, friends, prefer, grossly, deficient, telelaw, ceicsli, cjnews, war, read, article, transmission, progress, begin, covid, pandemic, spread, tlcehi, farmers, ignore, strategy, military, happened, strengthen, rejuvenated, battle, natural, choice, cars, addressed, forum, plays, important, growth, order, agric, rural, qualitative, communities, expertise, tlcoeiot, invest, ask, lawyers, solving, legaltech, techlaw, era, communications, round, uninterrupted, anymore, stubbo, orwellian, proxy, technique, hide, sites, botnets, acting, proxies, refer, combination, networking, distributed, load, balancing, resistant, able, counter, single, behaviour, seems, similar, micro, macro, regional, authoritative, physically, fluxing, located, original, panels, defective, technical, controversial, farm, repealed, haryana, involves, complaint, filing, cedilri, scattered, shaped, judicial, precedents, compl, host, resource, useful, featured, post, subscribe, atom, older, vendors, issue, facilities, platform, specially, designed, unconstitutional, imposed, smaller, neglected, app, vault, tlcoeedi, regulate, monitor, indulge, alike, news, landmark, legislation, matters, relat, aarushi, judiciary, murder, successive, playing, contempt, union, territories, infancy, accepted, heart, campus, google, fraternity, ethical, speed, powered, blogger, 2012, december, archive, coesci, firm, delhi, rapid, tackle, learning, renowned, per, media, report, rafael, reif, shown, desired, enhan, collaborations, renewable, distance, vlc, urbanisation, led, democratic, punishable, pokernation, fortuity, gaming, pvt, ltd, served, notice, potenti, fundamental, attributes, country, combined, contrast, totalitarian, availing, drafted, invitation, unaware, destablise, forensic, comparatively, newer, itself, narendra, modi, offences, offence, population, aspect, sustainability, aim, conductive, living, com, hear, clients, increas, leads, worldwide, methodologies, going, sit, application, informs, documents, digvijaya, shivraj, chouhan, forged, doubt, remains, iii, resulted, masses, models, depend, map, blacklisted, anticipate, greater, launch, comfortably, evading, viruses, browser, demand, cracker, bay, strikes, eliminate, possibilities, continuous, miscreants, updates, operating, mandated, indicated, versed, administration, legislature, sure, fix, powers, office, install, out, inspection, takes, build, relatively, gather, adapter, settings, routes, login, names, areas, tallinn, manual, label, resolved, serve, blaming, china, villain, vulnerability, revealed, advantage, unsecured, pin, unprotected, unsafe, scada, adopt, alone, notification, inquiry, penetrate, penalties, disclose, reasonable, indirectly, meet, liability, common, phenomenon, lax, maintaining, disclosing, adverse, publicity, creating, sole, general, formulated, action, breached, none, howsoever, listed, initiatives, typical, imperative, engage, originator, correlation, forcing, integral, prosecuting, arising, violations, abundant, coming, ministry, affairs, mca, corresponding, purely, far, notified, felt, complex, clear, sooner, universally, acceptable, position, easily, equally, responsible, constitute, tuesday, parliament, enact, cater, consideration, easy, reverse, circumvent, accurate, content, assigned, isp, changes, notify, customer, reach, advance, upgraded, advantages, disadvantages, paradise, remedy, positive, worst, malady, hence, avoided, genuine, unnecessarily, harassed, denied, otherwise, entitled, job, disproportionate, consistent, spamming, sought, bypassing, randomly, generated, disposable, sub, hop, chain, final, usually, innocent, whose, payloads, installed, deployed, establishing, prevent, abuses, continued, infect, escape, layer, solely, relied, conviction, negative, nefarious, implants, spear, injury, remedied, hack, site, internal, scan, bssids, audio, video, recordings, laptop, attacking, trap, sql, injection, lures, php, functional, included, social, engineering, element, grabbed, mail, yandex, exploiting, patched, vulnerabilities, idea, built, test, grab, temporarily, theme, having, exceed, limits, self, safe, gain, support, legitimacy, proportionate, harm, caused, permissible, stored, connection, either, commensurate, presupposes, produce, legalised, reasonably, destructive, effects, completely, destroys, functioning, offending, others, disable, pages,
Text of the page (random words):
f darpa is to develop technologies for generating operationally and tactically relevant information about multiple concurrent independent malicious cyber campaigns the objective is to not only collect and validate this pertinent information but to create the means to share such information with any of a number of interested parties without putting at risk the sources and methods used for collection proposed research should investigate innovative approaches that enable revolutionary advances in science devices or systems specifically excluded is research that primarily results in evolutionary improvements to the existing state of practice malicious actors in cyberspace currently operate with little fear of being caught due to the fact that it is extremely difficult in some cases perhaps even impossible to reliably and confidently attribute actions in cyberspace to individuals the reason cyber attribution is difficult stems at least in part from a lack of end to end accountability in the current internet infrastructure cyber campaigns spanning jurisdictions networks and devices are only partially observable from the point of view of a defender that operates entirely in friendly cyber territory e g an organization s enterprise network the identities of malicious cyber operators are largely obstructed by the use of multiple layers of indirection the current characterization of malicious cyber campaigns based on indicators of compromise such as file hashes and command and control infrastructure identifiers allows malicious operators to evade the defenders and resume operations simply by superficially changing their tools as well as aspects of their tactics techniques and procedures the lack of detailed information about the actions and identities of the adversary cyber operators inhibits policymaker considerations and decisions for both cyber and non cyber response options the enhanced attribution program aims to make currently opaque malicious cyber adversary actions and individual cyber operator attribution transparent by providing high fidelity visibility into all aspects of malicious cyber operator actions and to increase the government s ability to publicly reveal the actions of individual malicious cyber operators without damaging sources and methods the program will develop techniques and tools for generating operationally and tactically relevant information about multiple concurrent independent malicious cyber campaigns each involving several operators and the means to share such information with any of a number of interested parties e g as part of a response option the program seeks to develop a technologies to extract behavioral and physical biometrics from a range of devices and vantage points to consistently identify virtual personas and individual malicious cyber operators over time and across different endpoint devices and c2 infrastructures b techniques to decompose the software tools and actions of malicious cyber operators into semantically rich and compressed knowledge representations c scalable techniques to fuse manage and project such ground truth information over time toward developing a full historical and current picture of malicious activity d algorithms for developing predictive behavioral profiles within the context of cyber campaigns and e technologies for validating and perhaps enriching this knowledge base with other sources of data including public and commercial sources of information posted by ptlb at 12 43 am no comments email this blogthis share to twitter share to facebook share to pinterest sunday may 1 2016 malware are big nuisance for business houses and individuals world over business houses and individuals are facing sophisticated malware attacks around the world this is true about not only big business companies but even small and medium business houses cyber criminals are also targeting individuals for sensitive personal and financial information ransomware attacks are increasing and they are targeting stakeholders ranging from big hospitals banks and individual computer users even at the organisational level the directors and top management are lethargic towards cyber security of the organisation for instance the directors of indian companies are not at all paying attention to cyber security issues as the indian government is not pushy at all regarding ensuring cyber security in companies and at the level of indian cyberspace these directors are escaping their legal liabilities even if a cyber breach occurs there are no cyber security breach disclosure norms in india and this makes the directors and top management indifferent toward cyber security related legal obligations in india india has no dedicated cyber security law though it is absolutely required due to projects like digital india and aadhaar cyber criminals are targeting banking sector of india with ease and stealing big amount of money the reserve bank of india rbi had even declared that it would open up an it subsidiary that wold take care of cyber security issues of banks in india however till may 2016 there is no sign of such an it subsidiary similarly the indian government has appointed dr gulshan rai as the first chief information security officer ciso of india but much has to be done after this stage in the present cyber security environment malware have emerged as undefeatable and uncontrollable cyber security product and services providers have no other option left but to innovate so that sophisticated malware can be detected at the earliest stage anonymity tools and use of dynamic dns fast flux and bullet proof servers has further complicated the problems for law enforcement agencies world over instead of strengthening the cyber security capabilities law enforcement agencies around the world are barking the wrong tree they are trying to kill encryption and compromise the cyber security by demanding backdoor in the security products fbi of us has even gone to the extent of acquiring long arm jurisdiction through us supreme court that would allow it to target global computers this would clearly violate civil liberties and cyber laws of various nations cyber criminals have unlimited resources at their disposal these days many of them are even supported by state actors and this allows them to make customised malware that cannot be detected and eliminated by traditional anti virus and security products as a result the contemporary cyber security products and services are ineffective in preventing such malware from causing damage world has already faced sophisticated malware like stuxnet duqu flame uroburos snake blackshades finfisher gameover zeus goz etc these malware were unique as they were detected much after they infected the targeted systems some of these systems remained infected for many years and this facilitated targeted cyber espionage and customised infection of these systems the financial sector has its own share of cyber security problems and challenges malware targeting financial sector are also in circulation for long these include carbanak vskimmer trojan malware dump memory grabber etc that cause tremendous financial loss world over it is not just the financial loss but also loss of faith and goodwill that banks and other financial institutions have to face perry4law organisation p4lo has provided the cyber security trends in india 2016 that have predicted that use of botnet and malware would increase in the year 2016 the trends has also predicted that critical infrastructure cloud computing and e health would also be on the receiving end we have already witnessed an increased use of ransomware and malware for targeting hospitals and health industry similarly big corporations are also frequently targeted and their data are encrypted by the cyber criminals this data is then decrypted only after the ransom is paid by the corporation to the cyber criminal the year 2016 would witness an increased use of malware for various purposes like cyber terrorism cyber warfare and cyber espionage it is for us to develop both offensive and defensive cyber security capabilities and a robust cyber security infrastructure so that the impact of these malware can be minimised if not eliminated posted by ptlb at 12 22 am no comments email this blogthis share to twitter share to facebook share to pinterest wednesday april 27 2016 with projects like digital india and aadhaar cyber security laws in india are urgently needed india has generously adopted technology driven projects like digital india aadhaar etc technology can enable proper and timely management of issues pertaining to these projects however technology would also give rise to cyber security cyber law and other techno legal issues in india for instance smart cities have unique and techno legal cyber security and civil liberties issues that are still not managed by indian government similarly digital india project of indian government is also suffering from many shortcomings and absence of cyber security infrastructure is one of them as a matter of fact cyber security infrastructure of india is missing and starting technology oriented projects in these circumstances is a big risk and gamble the cyber security trends in india 2016 by perry4law organisation p4lo have predicted an increased number of cyber attacks against india the trends have also outlined that there would be an increase in use of malware and ransomware against various stakeholders in india in the year 2016 as on date malware are defeating cyber security products and services world wide and india is no exception to this situation what is most alarming is absence of legal frameworks and guidelines regarding cyber security issues in india the correlation between a legal framework and cyber security is not difficult to anticipate and conceptualise cyber security compliances require adherence to certain well established legal principles the moment a cyber security breach occurs many legal issues and compliance requirements are automatically invoked for instance in a typical cyber attack it becomes imperative to ascertain and find the originator of such attack the requirements to engage in first instance analysis e discovery and cyber forensics also arise due to such cyber attack the reporting requirement to the compliance and regulatory authorities also arise however none of this applies to indian companies and individuals that are facing cyber attacks no matter howsoever sophisticated and damaging such cyber attack are in india companies and individuals are not reporting cyber security breaches and attacks to the government and its agencies the cyber security developments in india 2015 by p4lo short listed all these shortcomings of indian cyber security initiatives the indian government has in the past declared that cyber security breach disclosure norms of india would be formulated very soon however till now no action has been taken in this regard and companies and individuals are still not reporting cyber security breached to indian government and its agencies for instance cyber crimes and cyber attacks against banks of india is a very common phenomenon in india however banks of india are not only lax while maintaining cyber security but they are also not disclosing such cyber crimes and cyber attacks due to fear of adverse publicity and regulatory penalties this is creating more problems for the bank customers in general and banking cyber security in india in particular the information technology act 2000 it act 2000 is the sole cyber law of india however it is not capable of forcing the companies and individuals to disclose cyber security breaches and cyber crimes nevertheless the rules under the it act 2000 prescribe cyber law due diligence pdf internet intermediary liability reasonable cyber security practices etc they indirectly cover some aspects of cyber security disclosure norms but they are not sufficient to meet the demands of present times indian parliament needs to enact a dedicated cyber security law of india that can cater all these regulatory and compliance requirements such a law needs to take into consideration techno legal requirements of cyber security the sooner such a law is enacted the better it would be for the national interest of india as cyber security is an essential and integral part of the national security policy of india posted by ptlb at 8 22 am no comments email this blogthis share to twitter share to facebook share to pinterest tuesday april 26 2016 cyber security obligations of directors of indian companies under indian companies act 2013 are ignored by them cyber security is no more a problem of technology people of an organisation now the top management is equally concerned and responsible for various cyber law and cyber security related issues recently the reserve bank of india rbi declared that it would constitute an it subsidiary for managing cyber security issues of banks in india even the indian government has appointed dr gulshan rai as the first chief information security officer ciso of india it has been long felt that we need a dedicated cyber security law of india presently few provisions pertaining to cyber security can be found in information technology act 2000 however the it act 2000 is not sufficient to address the complex and techno legal issues of cyber security especially those arising at the international level international legal issues of cyber security are still not clear as there is no universally acceptable cyber law treaty and cyber security treaty pdf the position has become really alarming as malware are easily defeating cyber security products and services these days recently the ministry of corporate affairs mca notified many provisions of the indian companies act 2013 pdf and corresponding rules under the same most of the corporate stakeholders have considered the new company law of india as a purely corporate regulatory framework however this is not true as the indian companies act 2013 has prescribed legal obligations that are far more complicated than the traditional company law the truth is that the new company law of india has prescribed many techno legal compliance requirements that very few companies and their directors are capable of managing as a result cyber law and cyber security related legal violations would be in abundant in the coming times with the formulation of the proposed cyber security breach disclosure norms of india and possible cyber security laws in india indian companies and their directors would find themselves in a legal fix the powers of serious frauds investigation office sfio have also been significantly increased by the companies act 2013 sfio has become very active in prosecuting indian companies and their directors in the recent past with the notification of the companies inspection investigation and inquiry rules 2014 pdf sfio would become more active in this regard the legislature made it...
|