"This website is the Wikipedia of Indian Cyber Laws".. A Visitor's remark
REQUEST ONLINE MEETING
Status of Internet Broadband in India
Dec 28: The National Broadband Plan recommended by TRAI has many interesting statistics regarding the growth of Internet activity in India and its impact on the economy. According to the report the Government has acknowledged a shortfall in realization of its broadband goals in 2010. As against a targeted 20m users, the achievement has been only 10.3 million users. This amounts to a penetration of 0.8% against a tele density of 60.99. The national broad band plan which includes setting up of a wide optic fiber network envisages provision of 75 million broadband connections by 2012 of which 17 million will be on DSL, 30 million on cable and 28 million on wireless bradband. This is expected to further increase to 160 million by 2014. Next three years is therefore expected to be a golden period for broadband connectivity in India. Copy of Report: Copy of Press Release
IT Refund Fraud.. Department Should Act
Dec 24: For some time it is reported that phishing mails in the name of the IT department are being used for internet frauds. Here is a sample of a mail sent from one of the readers of naavi.org. The hyperlink included points to an image website ovcghana.com. (Who is information available here) Probably a trojan is embedded in the link which could steal passwords. The mail is an "impersonation" and is an offence under Section 66D of ITA 2008.
It is now the responsibility of IT department to take action against the impersonator by registering a complaint for investigation with the Police. Silence amounts to facilitation of the fraud and possibly lead to vicarious liabilities. An Adjudicator or a Police Authority may also take cognizance of the presence of the mail and start an investigation.
The who is information is protected under the notorious "Privacy Protection Policy" of ICANN wih a service provider called Domains By Proxy Inc. Hence action has to start with a demand for the name and address of the registration from the proxy registrant failing which the proxy registrant should be considered as an accomplice and case should be filed on the company for recovery of compensation to the extent of a couple of million US $.
I hope IT department takes up the complaint in the interest of the general public.
Quickheal Introduces Laptop Theft identification services
Dec 17: Quickheal which is one of the indigenous manufacturers of anti virus software has introduced a free service for tracking laptops through Mac identification. Presently the service is available in select towns and is expected to be extended to other cities soon. More information
Law to enable Electronic Surveillance
Dec 16: India is considering an enactment to make it mandatory for telecom service providers to enable surveillance by the state as a security measure, on the lines of the US law "Communication Assistance for Law Enforcement Act" (CALEA): Report in ET
It may be recalled that when the licensing terms for "Landing Stations" were first released in India, they contained similar provisions. Naavi.org had also commented on the same throught he article:
Dec14: Mobile number portability all over India is scheduled to be introduced from 20th January 2011. According to PIB press release, the request needs to be completed within 7 days and cost not more than Rs 19. This much awaited facility should bring relief to many mobile subscribers who are stuck with inefficient service providers. There is one rumour that is floating in the market that there is a systematic effort to destabilize BSNL so that its customers can migrate to other service providers and this is behind the recent technical problems that has surfaced in BSNL. Hope the top management of BSNL take steps to dispel these doubts..
Nira Radia Tapes to test Privacy Laws
Dec9: The release of Nira Radia's tapes by the media has opened an important debate on the Privacy laws in the country. Now that Mr Ratan Tata has filed a petition at the Supreme Court, the scope of Article 21 of the Constitution and need for separate legislation for Privacy protection will come for review... Related Article : Also read cis-infis.org
The Wikileaks has also created a stir in global circles by releasing documents which are considered sensitive by different Governments opening up a debate on what is the limit to which privacy invasion can go. (See article)
Naavi.org has also raised issues arising out of Privacy protection of "Who is" services and IP address hiding in e-mails which prevent quick investigations of cyber crimes.
In 2006, the Government of India had introduced a Personal Privacy Protection Bill (Details here) which however did not get passed. Whenever a new legislation on Privacy Protection is considered it is necessary that there are adequate provisions whereby Privacy Protection Right does not become the tool for criminals to hide.
US Considering XML approach to EHR
Dec9: In order to enable better health data exchange between organizations, National Coordinator for Health IT and Centers for Medicare and Medicaid services has started the process to develop an XML based universal exchange language. Report
Chinese Cyber Threats Re Visited
Dec 5: The wiki leaks expose has confirmed the role of China as a Cyber War practitioner if ever a confirmation was required. The Chinese hacker group which released the "Blaster" worm in 2003 is believed to have Government links which have shared the source code for Windows OS. Related Article.
The task now is to consider measures of how to respond to the Chinese threats. In the light of Stuxnet type of attacks and Manchurian Chips, the supply of computer/Telecommunication hardware from China is the biggest source of security risk.
IISC led committee for security certification of telecom equipments was set up for this purpose. Hope it would take some measures that would help mitigate this China-hardware risk.