Section 70: Protected system


(1) The appropriate Government may, by notification in the Official Gazette, declare any computer resource which directly or indirectly affects the facility of Critical Information Infrastructure, to be a protected system.

Explanation: For the purposes of this section, “Critical Information Infrastructure” means the computer resource, the incapacitation or destruction of which , shall have debilitating impact on national security, economy, public health or safety.

(2) The appropriate Government may, by order in writing, authorise the persons who are authorised to access protected systems notified under sub-section (1)

(3) Any person who secures access or attempts to secure access to a protected system in contravention of the provisions of this section shall be punished with imprisonment of either description for a term which may extend to ten years and shall also be liable to fine.

(4) The Central Government shall prescribe the information security practices and procedures for such protected system.

 

[et_social_follow icon_style="flip" icon_shape="circle" icons_location="top" col_number="auto" counts="true" counts_num="200" outer_color="light" network_names="true"]

Comments

  1. MINISTRY OF COMMUNICATIONS AND INFORMATION TECHNOLOGY
    (Department of Electronic and Information Technology)
    (UNIQUE IDENTIFICATION AUTHORITY OF INDIA)

    NOTIFICATION
    New Delhi, the 11th December, 2015

    G.S.R. 993(E).— In exercise of the powers conferred by sub-section (1) of Section 70 of the Information Technology Act, 2000 (21 of 2000), the Central Government hereby declares the UIDAI’s Central Identities Data Repository (CIDR) facilities, Information Assets, Logistics Infrastructure and Dependencies Installed at UIDAI (Unique Identification Authority of India) locations to be Protected System for the Purpose of Information Technology Act 2000.

    Authorised personnel as per Sub-section (2) of Section 70 of IT Act 2000 (amended 2008) having role based access to UIDAI-CIDR facility are:

    1. Designated UIDAI officers & Support Staff.
    2. UIDAI authorised team members of contracted Managed Service Provider (MSP).
    3. Other authorised third party Vendors and its partners.
    4. UIDAI authorised business partners.

    source: http://meity.gov.in/sites/upload_files/dit/files/UIDAI%20CII%20notification%20Dec15.pdf

  2. Firos V State of Kerala (2006):
    http://www.itlaw.in/firos-vs-state-of-kerala-2006/

Trackbacks

  1. […] (LRIT) system under the Ministry of Shipping remains the only transportation to be declared as a “protected system” under the Information Technology Act, […]

Speak Your Mind

*

*


You can browse with left or right arrows within the Chapter OR

Browse other chapters: Preamble
Chapter 1: Preliminary (section 1-2)
Chapter 2: Digital Signature and Electronic Signature (section 3-3A)
Chapter 3: Electronic Governance (section 4-10A)
Chapter 4: Attribution Acknowledgment and Dispatch of Electronic Records (section 11-13)
Chapter 5: Secure Electronic Records And Secure Electronic Signatures (section 14-16)
Chapter 6: Regulation of Certifying Authorities (section 17-34)
Chapter 7: Electronic Signature Certificates (section 35-39)
Chapter 8: Duties Of Subscribers (section 40-42)
Chapter 9: Penalties Compensation And Adjudication (section 43-47)
Chapter 10: The Cyber Appellate Tribunal (section 48-64)
Chapter 11: Offences (section 65-78)
Chapter 12: Intermediaries Not To Be Liable In Certain Cases (section 79)
Chapter 12A: Examiner Of Electronic Evidence (section 79A)
Chapter 13: Miscellaneous (section 80-90)



IT Act Chapters | IT Rules | Judgements | Grievance Officer | Domain Disputes | Legal Pages | Social