Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009


Rule 1: Short title and commencement

Rule 2: Definitions

Rule 3: Direction for interception or monitoring or decryption of any information

Rule 4: Authorisation of agency of Government

Rule 5: Issue of decryption direction by competent authority

Rule 6: Interception or monitoring or decryption of information by a State beyond its jurisdiction

Rule 7: Contents for direction

Rule 8: Competent authority to consider alternative means in acquiring information

Rule 9: Direction of interception or monitoring or decryption of any specific information

Rule 10: Direction to specify the name and designation of the officer to whom information to be disclosed

Rule 11: Period within which direction shall remain in force

Rule 12: Authorised agency to designate nodal officer

Rule 13: Intermediary to provide facilities, etc.

Rule 14: Intermediary to designate officers to receive and handle

Rule 15: Acknowledgement of Instruction

Rule 16: Maintenance of records by designated officer

Rule 17: Decryption key holder to disclose decryption key or provide decryption assistance

Rule 18: Submission of the list of interception or monitoring or decryption of information

Rule 19: Intermediary to ensure effective check in handling matter of interception or monitoring or decryption of information

Rule 20: Intermediary to ensure effective check in handling matter of interception or monitoring or decryption of information

Rule 21: Responsibility of intermediary

Rule 22: Review of directions of competent authority

Rule 23: Destruction of records of interception or monitoring or decryption of information

Rule 24: Prohibition of interception or monitoring or decryption of information without authorisation

Rule 25: Prohibition of disclosure of intercepted or monitored decrypted information

 

[et_social_follow icon_style="flip" icon_shape="circle" icons_location="top" col_number="auto" counts="true" counts_num="200" outer_color="light" network_names="true"]

Trackbacks

  1. […] Ministry of Home Affairs (MHA) on 20 December 2018, has notified agencies in exercise of the powers conferred by sub-section (1) of Section 69 of the Information Technology Act, 2000, read with Rule 4 of Information Technology (Procedure and Safeguards for Interception, Monitoring and Decrypt…. […]

Speak Your Mind

*

*


You can browse with left or right arrows within the Chapter OR

Browse other chapters: Preamble
Chapter 1: Preliminary (section 1-2)
Chapter 2: Digital Signature and Electronic Signature (section 3-3A)
Chapter 3: Electronic Governance (section 4-10A)
Chapter 4: Attribution Acknowledgment and Dispatch of Electronic Records (section 11-13)
Chapter 5: Secure Electronic Records And Secure Electronic Signatures (section 14-16)
Chapter 6: Regulation of Certifying Authorities (section 17-34)
Chapter 7: Electronic Signature Certificates (section 35-39)
Chapter 8: Duties Of Subscribers (section 40-42)
Chapter 9: Penalties Compensation And Adjudication (section 43-47)
Chapter 10: The Cyber Appellate Tribunal (section 48-64)
Chapter 11: Offences (section 65-78)
Chapter 12: Intermediaries Not To Be Liable In Certain Cases (section 79)
Chapter 12A: Examiner Of Electronic Evidence (section 79A)
Chapter 13: Miscellaneous (section 80-90)



IT Act Chapters | IT Rules | Judgements | Grievance Officer | Domain Disputes | Legal Pages | Social