Rule 3: Due diligence to be observed by intermediary


The intermediary shall observe following due diligence while discharging his duties, namely : —

(1) The intermediary shall publish the rules and regulations, privacy policy and user agreement for access-or usage of the intermediary’s computer resource by any person.

(2) Such rules and regulations, terms and conditions or user agreement shall inform the users of computer resource not to host, display, upload, modify, publish, transmit, update or share any information that —

(a) belongs to another person and to which the user does not have any right to;

(b) is grossly harmful, harassing, blasphemous defamatory, obscene, pornographic, paedophilic, libellous, invasive of another’s privacy, hateful, or racially, ethnically objectionable, disparaging, relating or encouraging money laundering or gambling, or otherwise unlawful in any manner whatever;

(c) harm minors in any way;

(d) infringes any patent, trademark, copyright or other proprietary rights;

(e) violates any law for the time being in force;

(f) deceives or misleads the addressee about the origin of such messages or communicates any information which is grossly offensive or menacing in nature;

(g) impersonate another person;

(h) contains software viruses or any other computer code, files or programs designed to interrupt, destroy or limit the functionality of any computer resource;

(i) threatens the unity, integrity, defence, security or sovereignty of India, friendly relations with foreign states, or public order or causes incitement to the commission of any cognisable offence or prevents investigation of any offence or is insulting any other nation.

(3) The intermediary shall not knowingly host or publish any information or shall not initiate the transmission, select the receiver of transmission, and select or modify the information contained in the transmission as specified in sub-rule (2):

Provided that the following actions by an intermediary shall not amount to hosing, publishing, editing or storing of any such information as specified in sub-rule: (2) —

(a) temporary or transient or intermediate storage of information automatically within the computer resource as an intrinsic feature of such computer resource, involving no exercise of any human editorial control, for onward transmission or communication to another computer resource;

(b) removal of access to any information, data or communication link by an intermediary after such information, data or communication link comes to the actual knowledge of a person authorised by the intermediary pursuant to any order or direction as per the provisions of the Act;

(4) The intermediary, on whose computer system the information is stored or hosted or published, upon obtaining knowledge by itself or been brought to actual knowledge by an affected person in writing or through email signed with electronic signature about any such information as mentioned in sub-rule (2) above, shall act within thirty six hours and where applicable, work with user or owner of such information to disable such information that is in contravention of sub-rule (2). Further the intermediary shall preserve such information and associated records for at least ninety days for investigation purposes,

(5) The Intermediary shall inform its users that in case of non-compliance with rules and regulations, user agreement and privacy policy for access or usage of intermediary computer resource, the Intermediary has the right to immediately terminate the access or usage lights of the users to the computer resource of Intermediary and remove non-compliant information..

(6) The intermediary shall strictly follow the provisions of the Act or any other laws for the time being in force.

(7) When required by lawful order, the intermediary shall provide information or any such investigative, protective, cyber security activity. The information or any such assistance shall be provided for the purpose of verification of identity, or for prevention, detection, investigation, prosecution, cyber security incidents and punishment of offences under any law for the time being in force, on a request in writing stating clearly the purpose of seeking such information or any such assistance.

(8) The intermediary shall take all reasonable measures to secure its computer resource and information contained therein following the reasonable security practices and procedures as prescribed in the Information Technology (Reasonable security practices and procedures and sensitive personal Information) Rules, 2011.

(9) The intermediary shall report cyber security incidents and also share cyber security incidents related information with the Indian Computer Emergency Response Team.

(10) The intermediary shall not knowingly deploy or install or modify the technical configuration of computer resource or become party to any such act which may change or has the potential to change the normal course of operation of the computer resource than what it is supposed to “perform thereby circumventing any law for the time being in force: provided that the intermediary may develop, produce, distribute or employ technological means for the sole purpose of performing the acts of securing the computer resource and information contained therein.

(11) The intermediary shall publish on its website the name of the Grievance Officer and his contact details as well as mechanism by which users or any victim who suffers as a result of access or usage of computer resource by any person in violation of rule 3 can notify their complaints against such access or usage of computer resource of the intermediary or other matters pertaining to the computer resources made available by it. The Grievance Officer shall redress the complaints within one month from the date of receipt of complaint.

 

Comments

  1. Cyber Lawyer says:

    Allahabad High Court ordered in the matter of Amitabh Thakur V Union Of India, decided on 09 May 2012 that the Government of India should ensure within three months that as per Rule 11, all the intermediary publish the name of the Grievance Officer and his contact details on the social networking websites. To know more about Grievance officer requirements, please visit: http://www.GrievanceOfficer.in.

    And to get the legal pages / policies drafted by Cyber Law Experts, please visit: http://www.LegalPages.in !

  2. Cyber Lawyer says:

    Clarification on The Information Technology (Intermediary Guidelines) Rules, 2011 under section 79 of the Information Technology Act, 2000 (dated : 18.03.2013)

    The Department of Electronics and Information Technology had notified Information Technology (Intermediary Guidelines) Rules, 2011 under section 79 of the Information Technology Act, 2000 on 11.4.2011 vide notification no. G.S.R. 314(E).

    These Rules provide a due diligence framework to be observed by intermediary while discharging his duties. Sub-rule (4) of Rule 3 provides that the intermediary upon obtaining knowledge by itself or been brought to actual knowledge by an affected person in writing or through email signed with electronic signature about any such information as mentioned in sub-rule (2), shall act within thirty six hours and where applicable, work with user or owner of such information to disable such
    information that is in contravention of sub-rule (2).

    The Indian intermediaries have implemented these Rules. However some Industry Associations have requested for a clarification on the words “….. shall act within thirty-six hours…” as mentioned in sub-rule (4) of Rule 3. It is clarified that the intended meaning of the said words is that the intermediary shall respond or acknowledge to the complainant within thirty six hours of receiving the complaint/grievances about any such information as mentioned in sub-rule (2) of Rule 3 and initiate appropriate action as per law. Further, the Grievance Officer of the intermediary shall redress such complaints promptly but in any case within one month from the date of receipt of complaint in accordance with sub-rule (11) of Rule 3. The intermediary should have a publicly accessible and published grievance redressal process by which complaints can be lodged.

Trackbacks

  1. […] particular, clause 11 of Rules 3 of the Information Technology (Intermediary Guidelines) Rules, 2011 provides as […]

  2. […] particular Rules 3 of the Information Technology (Intermediary Guidelines) Rules, 2011 provides as […]

  3. […] (“IT Act”) and rules thereunder, and is published in accordance with the provisions of Rule 3 (1) of the Information Technology (Intermediaries Guidelines) Rules 2011, which mandates for publishing of rules and regulations, privacy policy and terms of use for access […]

  4. […] (“IT Act”) and rules thereunder, and is published in accordance with the provisions of Rule 3 (1) of the Information Technology (Intermediaries Guidelines ) Rules 2011, which mandates for publishing of rules and regulations, privacy policy and terms of use for access […]

Speak Your Mind

*

*


You can browse with left or right arrows within the Chapter OR

Browse other chapters: Preamble
Chapter 1: Preliminary (section 1-2)
Chapter 2: Digital Signature and Electronic Signature (section 3-3A)
Chapter 3: Electronic Governance (section 4-10A)
Chapter 4: Attribution Acknowledgment and Dispatch of Electronic Records (section 11-13)
Chapter 5: Secure Electronic Records And Secure Electronic Signatures (section 14-16)
Chapter 6: Regulation of Certifying Authorities (section 17-34)
Chapter 7: Electronic Signature Certificates (section 35-39)
Chapter 8: Duties Of Subscribers (section 40-42)
Chapter 9: Penalties Compensation And Adjudication (section 43-47)
Chapter 10: The Cyber Appellate Tribunal (section 48-64)
Chapter 11: Offences (section 65-78)
Chapter 12: Intermediaries Not To Be Liable In Certain Cases (section 79)
Chapter 12A: Examiner Of Electronic Evidence (section 79A)
Chapter 13: Miscellaneous (section 80-90)




IT Act Chapters | IT Rules | Judgements | Grievance Officer | Domain Disputes | Legal Pages | Social

Share This