Let's Build a Responsible Cyber Society

Visit
www.ceac.in


Visit
www.arbitration.in

 

Comments on the consultative Paper on Making Rules under ITAA 2008

Issue 1:

(a) Should it be proposed that there should be a set of practices to be followed by all?.

(i) If so, should they be based on a combination of ISO 27001 (or ISF), OECD Security Principles for design and operations of ISMS as per the needs of an organization, based on information assets and risk assessment; coupled with security assessments based on CobIT?

(ii) If so, should an organization be required to declare the standard it is following, apply the same with vigour and create a mechanism for assessing security controls?. It will outline its size and type of business and create a written document stating the standard and the controls selected by it and how are they deployed. (Should it be a short document in case of small organizations that provides minimum services and collects minimum personal data?).

(b) Could this approach be construed to constitute “reasonable security practices” ? Will failure to implement the same be construed to be negligence on the part of the organization?

(c) Should the rule categorize body corporates into small, medium, large size and prescribe standards? 

Comments/Suggestions:  

There is no doubt that known security standards such as ISO 27001 etc present an easy option to frame rules. It must however be remembered that ITA 2000 under its schedule had proposed a security guidelines of its own which constituted an indigenous security standard as per ITA 2000. Similarly, RBI had provided its own Information Security guidelines to Banks. The principles adopted here were not in conflict with BS 7799 or other standards but they still constituted an indigenous standard. 

However, standards such as ISO 27001 are commercial standards where the user of the standards is expected to pay money even to know what the standards are. Hence it is not ideal for the Indian cyber laws to be made dependent on any standard on which an external agency is claiming proprietary rights. Adoption of such standards will create vested interests in defining of standards, procedures for audit and certification. 

It is not necessary to introduce such a dependency for the Indian law on foreign standards.  

On the other hand, this is an opportunity for India to either develop its own security standards. Alternatively, it is an opportunity to prescribe a self declared security practice with open standards.  This would mean that the users would define what standards they adopt for protecting their information assets and make it public. The declaration would not be sufficient if it simply says that either “ISO 27001” is being followed. The detailed security procedures should be declared as an open standard. 

As an example of how this can be achieved, I am enclosing a draft security prescription developed by me for the Legal Process Outsourcing Companies in India, named LIPS1008. (This was developed as a guideline to LPOs in India by Naavi and the specifications are considered open information  to public.) 

The principle adopted in LIPS1008 and which is recommended under ITA 2008 is that the security practice would be defined by the organization itself and disclosed for the benefit of all stake holders including prospective customers etc. The audit and certification process would ensure that what is declared in the policy is actually followed. This principle is used in HIPAA where the organization is left to use its declaration on implementing  or not implementing certain specifications.  

The critical difference between the suggested approach and other current practices is that there is no secrecy about the information security policy being adopted by an organization. Today the IS policy is considered as an internal document of an organization and its customers donot have adequate information about the policies. HIPAA therefore prescribes that the Privacy policies has to be publicized and reasonably distributed to the stake holders. This principle should be extended to ITA 2008. 

Under this suggested approach, every organization should develop a “Information Security Practice Document” for the organization and publish it for public consumption. The audit certificate should also be published with whatever comments are made by the auditors. The stake holders are open to decide on the reliability of the security practices based on the declared policy as well as the credibility of the auditors. 

In the enclosed suggested standard for Legal Process Outsourcing companies in India, it is also proposed that the auditor may classify the security practice as level I, II or III to make it easy for organizations to adopt a base level security at first and then gradually move up the value chain. This is also practiced in the quality certifications. 

In the event the declared security practice is below par, then the organization is likely to lose its credibility in the market place. There is therefore a market based self correction mechanism. If an organization declares a higher security level in its policy and fails to adopt the same, it would amount to a breach of its own declared policy and constitute a criminal offence. The offence would also get transmitted to the management both by Section 85 of ITA 2000 as well as through the operation of Clause 49 of listing regulations. 

This approach of self declaration of security practice will obviate the need to categorize corporates into small, medium etc since security requirements need not necessarily depend on the size of the organization whether defined in terms of turnover or manpower.  

Issue 2: Should personal information be defined as information relating to an identified or identifiable natural person.?

(An identifiable person is one who can be identified directly or indirectly in particular by reference to an identification number or to one or more factors specific to his physical, physiological, mental, economic, cultural or social identity.)

Should sensitive personal information be defined to include data such as that pertaining to racial or ethnic origins political or religious beliefs or health or sex life?

Comments/Suggestions :

In the absence of a detailed Privacy Protection Act, we need to provide a comprehensive definition of what is “Sensitive Personal Information”.  While the objective is to protect the individual privacy, it should be ensured that criminals donot take advantage of the information to hide and launch criminal activities. There is also an issue of whether the protection of privacy is restricted to a living person or extends to a dead person at least for a certain length of time.

In defining the personal information, the critical aspects are “Health” and “Financial”. “Religious” and “Political affiliations” are factors used in UK Data Protection Act. Information on legal aspects pertaining to a person, educational details, salary and employment particulars etc are also sensitive information. Contact information such as mobile number, street address and personal identity details such as Bank account number, PAN Card number, Passport number etc are also sensitive. In the internet arena, IP address, “Who Is” information, personal e-mail also may be considered as “sensitive information”.  The list is therefore exhaustive and can be covered only by an inclusive definition.  It may also be a matter of personal choice that some information is considered sensitive by some and not so by others.

Obviously, any information that is not identifiable to an individual is  considered “De identified information” and is to be excluded from the need to be protected. However certain information becomes identifiable in the hands of certain persons  and remain de identified in the hands of others. For example, IP address in the hands of an ISP is identifiable but not in the hands of other members of public. Hence, a blog in which IP address of the person posting the information is not a sensitive personal information. Similarly, the e-mail service provider need not hide the IP address of the sender from the header information since it is not independently identifiable information in the hands of the recipient.

It is also possible to define “Sensitive Personal Information” under two categories namely,  what the rules define and what the individual prefers to. 

We need to therefore define “Personal Sensitive Information” as  

“In the absence of any agreement to the contrary, Sensitive Personal  information related to an individual means any information which in the hands of the receiver is capable of being used to identify the individual with or without any collateral information that the receiver may possess and has the potential to be used to cause wrongful harm to such a person”.  

Explanation: Sensitive Personal information  includes,  as the context may determine,  the name, street address, telephone number, mobile, PAN card number, Passport Number, educational details, parental details, e-mail address, IP Address, IMEI number, political, religious or political affiliations.  

This definition provides that any service provider who obtains information from an individual may have to at the time of obtaining the information, provide an option to the individual to check any or all of the information as “Sensitive personal information” not to be parted with unless a specific authorization is provided.  

Exception to this rule has to be the requirements of law enforcement, public interest and national interest. 

The above definition restricts the coverage to natural living persons only. There does not appear to be an adequate case to extend the definition to dead persons and other than natural persons.  

Issue 3:  

Should an Intermediary be required to store traffic data that identifies a subscriber or a user relating to a transaction or communication conducted by him, for a period of 6 months following the time of transaction, in a secure way and make it available to authorized persons within a reasonable time? 

-If so what should constitute a reasonable time?

- Should the content be required to be stored?

-If so then the question of the format and duration need to be addressed. 

Comments/Suggestions : 

There is no second thought that traffic data needs to be stored. T the same time the period of 6 months as suggested is not adequate. The absolute minimum is one year and desirable period is around 3 years. 

Content need not be stored since it becomes subject matter of confidentiality disputes and also leads to arguments of unmanageable storage requirements. 

Information under this section should be furnished if called for by a designated authority expeditiously and not later than 48 hours. In the event such retrieval is not possible, a suitable notice in reply has to be provided to the authority explaining the reasons for which the delay is inevitable indicating the time frame within which the information will be furnished which should be reasonable.


Failure to meet the obligation is any way punishable under the act itself. 

Issue 4:  

Should the guidelines u/s 79/2 prescribe that an intermediary be required to declare its privacy policy, security policy, and the operations policy and process with respect to handling of third party content and expect its subscribers to read and agree with the same?

-Should the intermediary be required to give an undertaking to cooperate with and work under the direction of officers designated by the government under various sections of the IT Amendment Act 2008?

-Should it undertake to act within 24-72 hours of receiving any orders for removing any offensive content?

-Should it be obliged to take any action on any offensive content hosted by it on its infrastructure from any person other than the designated government officers? 

Comment/Suggestion: It should be part of the “Due Diligence” obligations of an intermediary that appropriate disclosures are made which are truthful and adequately followed. 

There is no need for a separate undertaking to be given by an intermediary to cooperate with the enforcement authorities. This is an obligation under the act. 

Removal of “Offensive Content” is a sensitive issue since the power to take a final judgment of whether a content is fit for removal cannot be delegated without appropriate evaluation in a judicial perspective. 

If the intermediary refuses to act when notified by an appropriate authority, he anyway takes on the liability for the offence.  

However, there needs to a safeguard that the powers of blocking, interception etc may not be abused either because of political or other considerations. Hence it is necessary that a “Netizen Protection Commission” or in its absence a “Netizen Protection Advisory Board” be constituted as an agency which may consider any request for exercise of powers under the Act by Government agencies and the Police for interception etc and advise the intermediary suitably. 

If such a body is constituted, the notices received from the public if any about offensive content may also be sent to the same authority for directions. It can also take a view like an ombudsman when the designated authority does not concur with the view of a complainant and refuse to get the alleged offensive content removed. 

Though the power of mandatory blocking or removal of content be exercised only after the designated Government official issues the orders, an intermediary may under the “Due Diligence” be expected to act and suspend publication of any content if a notice is received from any other person and the intermediary considers the notice as tenable in principle. The content may be restored or removed upon suitable directions being received later by the designated agency.

For this purpose each intermediary may be required to keep an internal mechanism to receive and act on such notices. For example if an intermediary receives a credible notice that a content in say a social networking site is against the national interest and a notice is received by them, the matter has to be attended to expeditiously without waiting for formalities such as getting the directions from an appropriate authority.


Annexure

(Comments on the consultative Paper on Making Rules under ITAA 2008)

 P.S:
This is A suggested information Security framework for Legal Process Outsourcing Companies in India prepared by Naavi which is indicative of the framework under which a reasonable security standard be developed under ITA 2008. The detailed action plan is left to the discretion of the management.

Specifications of LIPS 1008

Number

Description

Level 1

Level 2

Level 3

LIPS 1

Client Consent

A letter of consent to be obtained from every client whose information is processed authorizing the organization to outsource the data as per the Privacy and Security Practice Statement, a copy of which must be made appropriately available to every client. Every version of the statement from the date of inception of the Policy shall be archived and the client is notified of any changes subsequent to the date of consent with an option made available to the client to refuse the changes.

A letter of consent to be obtained from every client whose information is processed authorizing the organization to outsource the data as per the Privacy and Security Practice Statement, a copy of which must be made appropriately available to every client. Every version of the statement from the date of inception of the Policy shall be archived and the client is notified of any changes subsequent to the date of consent with an option made available to the client to refuse the changes.

A letter of consent to be obtained from every client whose information is processed authorizing the organization to outsource the data as per the Privacy and Security Practice Statement, a copy of which must be made appropriately available to every client. Every version of the statement from the date of inception of the Policy shall be archived and the client is notified of any changes subsequent to the date of consent with an option made available to the client to refuse the changes.

LIPS 2

Employee Awareness

Every Employee of the Organization shall be made aware of the information privacy and security policy of the organization as contained in the Privacy and Security Policy Statement (PSPS) and other initiatives undertaken by the Organization towards its implementation. The employees shall also be adequately trained in the use of any software or hardware devices used for the implementation of the policy. Every employee shall undertake a “Test of Awareness” at least once each year and the performance documented in the employee service records.

Every Employee of the Organization shall be made aware of the information privacy and security policy of the organization as contained in the Privacy and Security Policy Statement (PSPS) and other initiatives undertaken by the Organization towards its implementation. The employees shall also be adequately trained in the use of any software or hardware devices used for the implementation of the policy. Every employee shall undertake a “Test of Awareness” at least once each year and the performance documented in the employee service records.

Every Employee of the Organization shall be made aware of the information privacy and security policy of the organization as contained in the Privacy and Security Policy Statement (PSPS) and other initiatives undertaken by the Organization towards its implementation. The employees shall also be adequately trained in the use of any software or hardware devices used for the implementation of the policy. Every employee shall undertake a “Test of Awareness” at least once each year and the performance documented in the employee service records.

LIPS 3

Employee Declaration

Every Employee shall sign a declaration of Ethics in duplicate agreeing to abide by the requirements as required under the PSPS a copy of which is kept along with the service records of the employee. One copy is returned to the employee.

Every Employee shall sign a declaration of Ethics in duplicate agreeing to abide by the requirements as required under the PSPS a copy of which is kept along with the service records of the employee. One copy is returned to the employee.

Every Employee shall sign a declaration of Ethics in duplicate agreeing to abide by the requirements as required under the PSPS a copy of which is kept along with the service records of the employee. One copy is returned to the employee.

LIPS 4

Assigned Responsibility

The responsibility for Privacy and Information security compliance shall be allocated to an official who shall provide periodical compliance reports and certificates to the management every month. The official may be holding any other responsibility additionally

The responsibility for Privacy and Information security compliance shall be allocated to an official who shall provide periodical compliance reports and certificates to the management every month. The official may be holding any other responsibility additionally

The responsibility for Privacy and Information security compliance shall be allocated to an official who shall provide periodical compliance reports and certificates to the management every month. The official may be holding any other responsibility additionally

LIPS 5

Employee Background Check

Every employee’s background is verified with reference to the documentary evidences submitted during the time of his employment in the application.

 

Every employee’s background is verified with reference to the documentary evidences submitted during the time of his employment and with reference to the “Referees” indicated in the application with written with reference to the “Referees” indicated acknowledgements duly verified for correctness.

 

Every employee’s background is verified with reference to the documentary evidences submitted during the time of his employment and with reference to the “Referees” indicated in the application with written acknowledgements duly verified and supported by independent agency. The H R manager shall provide a declaration to the management that the background verification has been completed as required

LIPS 6

Information Classification

Information handled by the organization shall be classified appropriately on the basis of its sensitivity. The classification tag shall enable assignment of designated employee force for access on a need to know basis and management of access privileges

Information handled by the organization shall be classified appropriately on the basis of its sensitivity. The classification tag shall enable assignment of designated employee force for access on a need to know basis and management of access privileges

Information handled by the organization shall be classified appropriately on the basis of its sensitivity. The classification tag shall enable assignment of designated employee force for access on a need to know basis and management of access privileges

LIPS 7

Employee Cyber Usage Policy

The employees will be bound by an ethical declaration and subject to a self impose discipline as defined in the security policy documents.

The employees will be bound by an ethical declaration and subject to a self impose discipline as defined in the security policy documents. Additionally, the employee activities on the Internet would be fully monitored and logs archived for both real time and post event audit. Any violations will be suitably recorded and sanctions invoked. 

 

 

: The employees will be bound by an ethical declaration and subject to a self impose discipline as defined in the security policy documents. Additionally, the employees will be allowed to use Internet only to the extent of pre-defined business purpose and a suitable firewall controlling access will be used. The activities will be fully monitored and logs archived for both real time and post event audit. Any violations will be suitably recorded and sanctions invoked.

LIPS 8

Media Usage Policy

The employees will be bound by an ethical declaration and subject to a self impose discipline as defined in the security policy documents

The employees will be bound by an ethical declaration and subject to a self impose discipline as defined in the security policy documents. Additionally, restrictions would be imposed on the use of external media and laptops to reasonably prevent unauthorized copying of data.

The employees will be bound by an ethical declaration and subject to a self impose discipline as defined in the security policy documents. Additionally, employees will have access to data only through a remote access environment from thin clients and no data would be permanently storable in the local machines except under specific authorizations and in a secure manner

LIPS 9

Sanction Policy

Appropriate sanctions will be imposed for violations of any of the security policies with the sanctions being commensurate with the nature of violations.

Appropriate sanctions will be imposed for violations of any of the security policies with the sanctions being commensurate with the nature of violations.

Additionally, suitable clauses would be introduced in the employee contracts and NDAs to be signed by the employees.

Appropriate sanctions will be imposed for violations of any of the security policies with the sanctions being commensurate with the nature of violations.

Additionally, suitable clauses would be introduced in the employee contracts and NDAs to be signed by the employees and such NDAs are obtained both at the time of employment and at the time each major assignment is handled.

LIPS 10

   Privacy and Security Practice Statement

Organization will develop a detailed Privacy and Security Policy Statement which would be approved by the Board and signed by the CEO and CTO. The statement would be adequately communicated to all the employees as well as the clients and business associates of the organization. A copy should be made available through the website of the Company. The organization may develop different versions of the statement for the public and internal use as the management may find it necessary. 

Organization will develop a detailed Privacy and Security Policy Statement which would be approved by the Board and signed by the CEO and CTO. The statement would be adequately communicated to all the employees as well as the clients and business associates of the organization. A copy should be made available through the website of the Company. The organization may develop different versions of the statement for the public and internal use as the management may find it necessary.

Organization will develop a detailed Privacy and Security Policy Statement which would be approved by the Board and signed by the CEO and CTO. The statement would be adequately communicated to all the employees as well as the clients and business associates of the organization. A copy should be made available through the website of the Company. The organization may develop different versions of the statement for the public and internal use as the management may find it necessary.

LIPS 11

Physical Security

Organization shall have appropriate policies and procedures to ensure that only authorized persons will have access to the working area containing IT assets including the Wireless perimeters. An appropriate documentation would be maintained for guest access provided.

 

Organization shall have appropriate policies and procedures to ensure that only authorized persons will have access to the working area containing IT assets including the Wireless perimeters. An appropriate documentation shall be maintained for guest access provided. The access points shall be monitored by appropriate electronic access monitoring devices.

 

Organization shall have appropriate policies and procedures to ensure that only authorized persons will have access to the working area containing IT assets including the Wireless perimeters. An appropriate documentation shall be maintained for guest access provided. The access points shall be monitored by appropriate electronic access monitoring devices. The entry and exit of authorized persons to the work area would be linked to the attendance and any anomalies recorded as a security breach incident.

LIPS 12

Logical Access Security

Policies and Procedures shall be implemented for ensuring that access to any IT device is made available only with appropriate access authentication such as Passwords. Appropriate measures shall be initiated for ensuring that a strong password policy is maintained across the organization.

Policies and Procedures shall be implemented for ensuring that access to any IT device is made available only with appropriate two factor access authentication such as Passwords along with any other factor such as biometric or an external token. Appropriate measures shall be initiated for ensuring that the policy is complied with across the organization.

Policies and Procedures shall be implemented for ensuring that access to any IT device is made available only with secured digital signatures which include hashing, asymmetric encryption and use of a cryptographic token. Appropriate measures shall be initiated for ensuring that the policy is complied with across the organization.

LIPS 13

Information Storage Security

Policies and Procedures shall be appointed to ensure that information under storage is accessible only by authorized persons on a “Need to Know” basis.

 

Policies and Procedures shall be appointed to ensure that information under storage is kept in encrypted form and accessible only by authorized persons on a “Need to Know” basis. 

 

 

Policies and Procedures shall be appointed to ensure that information under storage is kept in encrypted form and accessible only by authorized persons on a “Need to Know” basis. Access shall be backed up by data integrity control, audit trail monitoring and archival.

LIPS 14

Information Transmission Security

Transmission of Information into and out of the systems would be monitored by a suitable Firewall and appropriate polices and procedures shall be implemented to ensure that viruses and other malicious codes are filtered effectively.

Transmission of Information into and out of the systems would be monitored by a suitable Firewall and appropriate polices and procedures shall be implemented to ensure that viruses and other malicious codes are filtered effectively. Appropriate audit trail would be maintained and archived to ensure future reference if required. All confidential mails shall be appropriately encrypted.

 

Transmission of Information into and out of the systems would be monitored by a suitable Firewall and appropriate polices and procedures shall be implemented to ensure that viruses and other malicious codes are filtered effectively. Appropriate audit trail would be maintained and archived to ensure future reference if required. All confidential mails shall be appropriately encrypted. All outward mails likely to cause any liability to the organization shall be digitally signed by the sender.

LIPS 15

Hardware/Software Policy

Policies and Procedures shall be put in place to ensure that any hardware or software or hardware used by the organization is certified by the supplier to be free from known security vulnerabilities.

Policies and procedures shall be put in place to ensure that Hardware and Software used by an organization shall be tested by a third party security auditor and certified to be free of known security vulnerabilities.

Policies and Procedures shall be put in place to ensure that Hardware and Software used by the organization is backed by a source code audit certificate from a third party.

LIPS 16

Web Presence Policy

Policies and Procedures shall be put in place to ensure that the domain name, hosting facilities and content used by the organization is adequately protected against malicious attacks, unauthorized alteration and IPR infringement. Suitable Privacy Policy and Disclosure Documents indicating the identity of the owner of the web content shall be provided on the website of the organization.

Policies and Procedures shall be put in place to ensure that the domain name, hosting facilities and content used by the organization is adequately protected against malicious attacks, unauthorized alteration and IPR infringement. Suitable Privacy Policy and Disclosure Documents indicating the identity of the owner of the web content shall be provided on the website of the organization.  The web content is monitored by the organization at periodical intervals and self certified for data integrity.

: Policies and Procedures shall be put in place to ensure that the domain name, hosting facilities and content used by the organization is adequately protected against malicious attacks, unauthorized alteration and IPR infringement. Suitable Privacy Policy and Disclosure Documents indicating the identity of the owner of the web content shall be provided on the website of the organization. The web content is monitored by a security monitoring agency at periodical intervals and certified for data integrity.

LIPS 17

Grievance Redressal Policy

The organization shall designate an official as “Security Grievance Resolution Officer” (SGRO) to be the single point contact person accountable for handling all disputes related to the information security and contact details of such a person including e-mail and physical address is provided on the website.

 

The organization shall designate an official “Security Grievance Resolution Officer” (SGRO) to be the single point contact person accountable for handling all disputes related to information security and contact details of such a person including e-mail and physical address is provided on the website. The organization shall also designate an external person of repute as an “Ombudsman” to resolve the disputes which cannot be resolved by the SGRO. 

 

 

 

The organization shall designate an official “Security Grievance Resolution Officer” (SGRO) to be the single point contact person accountable for handling all disputes related to information security and contact details of such a person including e-mail and physical address is provided on the website. The organization shall also designate an external person of repute as an “Ombudsman” to resolve the disputes which cannot be resolved by the SGRO.

The organization shall also set in place an arbitration mechanism to handle disputes which are not resolved by the Ombudsman.

LIPS 18

         BA Agreement Policy

Policies and Procedures shall be put in place to ensure that the Information security responsibilities of an organization shall also be followed by any external agency which is provided access to the protected information by a suitable contractual arrangement with appropriate indemnity provisions.

Policies and Procedures shall be put in place to ensure that the Information security responsibilities of an organization shall also be followed by any external agency which is provided access to the protected information by a suitable contractual arrangement with appropriate indemnity provisions.

Policies and Procedures shall be put in place to ensure that the Information security responsibilities of an organization shall also be followed by any external agency which is provided access to the protected information by a suitable contractual arrangement with appropriate indemnity provisions.

LIPS 19

DLP-OLR Policy

Policies and Procedures shall be put in place by the Organization to maintain incident monitoring system and an appropriate Disaster Recover and Business Continuity Plan to meet any contingencies arising out of security breach incidents.

Policies and Procedures shall be put in place by the Organization to maintain incident monitoring system and an appropriate Disaster Recover and Business Continuity Plan to meet any contingencies arising out of security breach incidents. Appropriate evidence archival systems shall be maintained to ensure capability for “Defensive Legal Protection” against any liability claims that may arise on the organization

Policies and Procedures shall be put in place by the Organization to maintain incident monitoring system and an appropriate Disaster Recover and Business Continuity Plan to meet any contingencies arising out of security breach incidents. Appropriate evidence archival systems shall be maintained to ensure capability for “Defensive Legal Protection” against any liability claims that may arise on the organization by virtue of any security breach and also empower the organization to launch  “Offensive Legal Remedy” procedures

LIPS 20

Policy Documentation

The organization shall retain all Policy documents related to information security for a period of a minimum of 5 years either in print or electronic form.   

The organization shall retain all Policy and other compliance documents related to compliance of information security for a period of a minimum of 5 years either in print or electronic form.

The organization shall retain all Policy and other compliance documents related to compliance of information security for a period of a minimum of 5 years both in print or electronic form.

LIPS 21

Management Certificate/Audit Policy

The operational management shall submit a certificate of compliance of information security to the Board of Directors once a year recording there in the observed short comings and how they are proposed to be remedied with appropriate implementation schedules. 

The Board of Directors shall incorporate a certificate of compliance of information security in the annual report to the share holders of the Company recording there in the observed short comings and how they are proposed to be remedied with appropriate implementation schedules.

The Board of Directors shall incorporate a certificate of compliance of information security in the annual report to the share holders of the Company recording there in the observed short comings by an external auditor, the management’s perceptions and how the management proposes to meet the audit suggestions.

  Back to main Article

Naavi

March 21, 2009

Visit
www.Naavi.net

Visit
www.lookalikes.in