Let's Build a Responsible Cyber Society

Visit
www.ceac.in


Visit
www.arbitration.in

 

Rules to be Framed under ITA 2008 by Central Government
 

ITA 2008 has designated  "Appropriate Government" to make suitable rules and regulations under different sections. It has also indicated under Sections 87 and 90 specific powers of the Central and State Governments to frame rules. Under ITA 2000 there are already certain rules which automatically get carried over to ITA 2008 regime. Some may need changes and some may have to be drafted for the first time.

Presently, the Central Government is in the process of consulting industry bodies to take their views before framing rules under Sections 43A, 67C and Section 79.

This note tries to focus attention on some of the rules that are required to be framed by Central Government.

Following are the sections under which new rules require to be made.

Section Description Jurisdiction Comments
3(3) Electronic Signature- identification of the person, reliable authentication technique and procedure for affixing Central Government Required only when a system of Electronic Signature is under consideration.
6 E-Governance-filing, creation or issue an electronic record Appropriate Government Existing rules may suffice.
6A E-Governance-authorization of service providers Appropriate Government Some State Governments Governments already have rules. This needs to be re-notified. Others need to develop.
10 Electronic Signature Central Government Required only when a system of Electronic Signature is under consideration.
16 Security Procedures for Secure Electronic Record and Secure Electronic Signature Central Government Existing rules may suffice
43A Reasonable Security Practices and Procedures and Sensitive Personal Data or Information Central  Government Required to be notified
48-64 Cyber Appellate Tribunal-Various issues of operation Central Government Required to be notified
67C Data Preservation and Retention by Intermediaries Central Government Required to be notified
69 Interception, monitoring or decryption of information-Procedures and Safeguards Central or State Government Required to be notified
69A Blocking Access to websites,  Information-Procedures and Safeguards Central Government Required to be notified
69B Monitoring and Collecting Traffic Data-Procedures and Safeguards Central Government Required to be notified
70 Protected System-notification and procedures for access Appropriate Government Required to be notified. Many of the earlier notifications from State Governments will be irrelevant since the section now is restricted to Critical Information Infrastructure.
70A National Nodal Agency-designation Central Government Required to be notified
70 B Indian Computer Emergency Team-designation, procedures etc Central Government Required to be notified
79 Guidelines for Intermediaries Central Government Required to be notified
79A Digital Evidence Examiner Central Government Required to be notified

 

Out of the above the provisions regarding "Electronic Signatures" other than "Digital Signatures" become relevent only when technology players suggest some possible alternatives to Digital Signatures.

Provisions regarding 6A has to be reviewed by each State Government. Some State Governments such as Karnataka have already formulated rules in this regard. They may however need to be re-notified under Section 6A.

Requirements under Sections 70,70A and 70B are of concern to the Central Government particularly to the Ministry of Communications and IT.

The regulations regarding Cyber Appellate Tribunal  needs to determined by the MCIT if necessary in consultation with the Presiding Officer already appointed.

While the Government has made its moves for consultation with NASSCOM and its associates regarding rules to be formed under Sections 43A, 67C and 79, there appears to be no move made regarding the procedures and safeguards required under Sections 69,69A and 69B.

A Consultation paper is now under circulation regarding the collection of views on Sections 43A, 67C and 79. The consultation paper indicates the following four issues on which views have been sought.

Issue 1:
 

(a) Should it be proposed that there should be a set of practices to be followed by all?.


(i) If so, should they be based on a combination of ISO 27001 (or ISF), OECD Security Principles for design and operations of ISMS as per the needs of an organization, based on information assets and risk assessment; coupled with security assessments based on CobIT?
(ii) If so, should an organization be required to declare the standard it is following, apply the same with vigour and create a mechanism for assessing security controls?. It will outline its size and type of business and create a written document stating the standard and the controls selected by it and how are they deployed. (Should it be a short document in case of small organizations that provides minimum services and collects minimum personal data?).
 

(b) Could this approach be construed to constitute “reasonable security practices” ? Will failure to implement the same be construed to be negligence on the part of the organization?
 

(c) Should the rule categorize body corporates into small, medium, large size and prescribe standards?
 

Issue 2:

Should personal information be defined as information relating to an identified or identifiable natural person.?
(An identifiable person is one who can be identified directly or indirectly in particular by reference to an identification number or to  one or more factors specific to his physical, physiological, mental, economic, cultural or social identity.)

Should sensitive personal information be defined to include data such as that pertaining to racial or ethnic origins political or religious beliefs or health or sex life?

Issue 3:

Should an Intermediary be required to store traffic data that identifies a subscriber or a user relating to a transaction or communication conducted by him, for a period of 6 months following the time of transaction, in a secure way and make it available to authorized persons within a reasonable time?
 

-If so what should constitute a reasonable time?
- Should the content be required to be stored?
-If so then the question of the format and duration need to be addressed.

Issue 4:

Should the guidelines u/s 79/2 prescribe that an intermediary be required to declare its privacy policy, security policy, and the
operations policy and process with respect to handling of third party cntent and expect its subscribers to read and agree with the same?
-Should the intermediary be required to give an undertaking to cooperate with and work under the direction of officers designated by the government under various sections of the IT Amendment Act 2008?
-Should it undertake to act within 24-72 hours of receiving any orders for removing any offensive content?
-Should it be obliged to take any action on any offensive content hosted by it on its infrastructure from any person other than the
designated government officers?

Any member of the public who wants to send his comment for publication at Naavi.org is invited to send his comments. If received in time, we would also forward the same to the relevant authorities.

For the sake of being a thought starter, some of the comments are provided here. More will be added in the follow up article.

 

Naavi

March 21, 2009

Related Articles:

Comments on the consultative Paper on Making Rules under ITAA 2008

Suggested Information Security Framework for ITA 2008 Compliance

Concern for Privacy Rights Vs National Security-

Application of IISF-309 for Share Broking firms

Visit
www.Naavi.net

Visit
www.lookalikes.in