Information Technology rules notified under the Information Technology ( Amendment ) Act, 2008

Information Technology rules notified under the Information Technology ( Amendment )Act, 2008

UNIT 7

INFORMATION TECHNOLOGY RULES NOTIFIED UNDER THE INFORMATION TECHNOLOGY (AMENDMENT) ACT,2008

Please refer to our earlier IT Modules for other topics under The Information Technology (Amendment) Act, 2008 (‘IT Act’)

The following are the Information Technology rules as notified by the CentralGovernment:

The Information Technology (Certifying Authorities) Rules, 2000

These rules prescribe the eligibility, appointment and working of Certifying Authorities. These rules also lay down the technical standards, procedures and security methods tobe used by a Certifying Authority.

The Cyber Regulations Appellate Tribunal (Procedure) Rules, 2000

These rules prescribe the appointment and working of the Cyber Regulations Appellate Tribunal whose primary role is to hear appeals against orders of the Adjudicating Officers.

The Information Technology (Certifying Authority) Regulations 2001

They provide further technical standards and procedures to be used by a Certifying Authority.

The Information Technology (Qualification and Experience of Adjudicating Officers and Manner of Holding Enquiry)Rules 2003

These rules prescribe the qualifications required for Adjudicating Officers.Their chief responsibility under the IT Act is to adjudicate cases such as unauthorized  access, unauthorized copying of data ,spread of viruses,denial of service attacks ,disruption of computers,computer manipulation etc.

The Cyber Regulations Appellate Tribunal (Salary, Allowances and other terms and conditions of service of Presiding Officer)Rules 2003

These rules prescribe the salary, allowances and
other terms for the Presiding Officer of the Cyber Regulations Appellate Tribunal.

The Information Technology (Other Standards) Rules 2003

The IT Act was amended by the Negotiable Instruments (Amendments and Miscellaneous Provisions) Act 2002 which introduced the concept of electronic cheques and truncated cheques.

They state the standards to be observed by the Controller to ensure that the secrecy and security of the digital signatures are assured.

The Information Technology (Other powers of Civil Court vested in Cyber Appellate Tribunal) Rules 2003

These rules provide some additional powers to the Cyber Regulations Appellate Tribunal.

The Information Technology (Use of Electronic Records and Digital Signature)Rules 2004

These rules   state the manner and format in which the electronic records shall be filed,created or issued. They also state the manner or method of payment of any fees or charges for filing or creating any electronic record.

The Information Technology (Security Procedure) Rules,2004

These rulesstate when an electronic record and a digital signature are deemed to be secure for the purposes of the IT Act.

The Information Technology (Procedure and Safeguards for Blocking for Access of Information by Public)Rules 2009

Theserules  state the designation of an officer of the Central Government for the purpose of issuing direction for blocking for access by the public any information generated, transmitted,received, stored or hosted in any computer resource under sub-section (2 ) of section 69 A of the IT Act.It provides the procedure and the safeguards to be followed by the designated officer.

The Cyber Appellate Tribunal (Salary Allowances and other Terms and Conditions of Service of Chairperson and Members)Rules 2009

These rules provide for the salary,allowances and terms of service of the Chairperson and members.

The Cyber Appellate Tribunal (Procedure for Investigation of Misbehavior or Incapacity of Chairperson and Members)Rules 2009

These rules provide for the procedure for investigation of misbehavior or incapacity of the Chairperson and members.

The Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011

The rules prescribe security standards for personal information stored electronically.The Security Practices Rules require entities holding sensitive personal information of users to maintain certain specified security standards.

The Information Technology (Intermediary Guidelines) Rules, 2011

These rules provide due diligence requirements for intermediaries.The Intermediary Guidelines Rules prohibit content of specific nature on the internet. An intermediary, such as a website host, is required to block such content.

The Information Technology (Guidelines for Cyber Café) Rules, 2011

The rules require cyber cafés to identify users and maintain records of use.The Cyber Café Rules require cyber cafés to register with a registration agency and maintain a log of identity of users and their internet usage.

Information Technology (Electronic Service Delivery) Rules, 2011

An important order relating to blocking of websites was passed on 27th February 2003, under which the Computer Emergency Response team (CERT-IND) may instruct the Department of Telecommunications to block a website

Delivery) Rules, 2011

The rules provide a framework for electronic delivery of services such as licenses, forms and certificates.Under the Electronic Service Delivery Rules the government can specify certain services, such as applications, certificates, licenses etc, to be delivered electronically.

E: contact@alayalegal.com; T: +91 124 4288371 /2 /3; F: +91 124 437 0997 3
©Copyright Protected. Privileged & Confidential for private circulation only.
For information purposes only. This paper is not to be construed as ‘legal advice’
The Author(s) and the Firm disclaim any and all liability in respect of the present circulation.

Leave your comment

*

code