Info. Technology Law
https://www.itlaw.in/information-technology-procedure-safeguards-interception-monitoring-decryption-information-rules-2009/
Export date: Thu Mar 28 22:54:46 2024 / +0000 GMT

Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009


Rule 1: Short title and commencement 1

Rule 2: Definitions 2

Rule 3: Direction for interception or monitoring or decryption of any information 3

Rule 4: Authorisation of agency of Government 4

Rule 5: Issue of decryption direction by competent authority 5

Rule 6: Interception or monitoring or decryption of information by a State beyond its jurisdiction 6

Rule 7: Contents for direction 7

Rule 8: Competent authority to consider alternative means in acquiring information 8

Rule 9: Direction of interception or monitoring or decryption of any specific information 9

Rule 10: Direction to specify the name and designation of the officer to whom information to be disclosed 10

Rule 11: Period within which direction shall remain in force 11

Rule 12: Authorised agency to designate nodal officer 12

Rule 13: Intermediary to provide facilities, etc. 13

Rule 14: Intermediary to designate officers to receive and handle 14

Rule 15: Acknowledgement of Instruction 15

Rule 16: Maintenance of records by designated officer 16

Rule 17: Decryption key holder to disclose decryption key or provide decryption assistance 17

Rule 18: Submission of the list of interception or monitoring or decryption of information 18

Rule 19: Intermediary to ensure effective check in handling matter of interception or monitoring or decryption of information 19

Rule 20: Intermediary to ensure effective check in handling matter of interception or monitoring or decryption of information 20

Rule 21: Responsibility of intermediary 21

Rule 22: Review of directions of competent authority 22

Rule 23: Destruction of records of interception or monitoring or decryption of information 23

Rule 24: Prohibition of interception or monitoring or decryption of information without authorisation 24

Rule 25: Prohibition of disclosure of intercepted or monitored decrypted information 25
Links:
  1. http://www.itlaw.in/rule-1-short-title-and-commenc ement-6
  2. http://www.itlaw.in/rule-2-definitions-6
  3. http://www.itlaw.in/rule-3-direction-interception- monitoring-decryption-information
  4. http://www.itlaw.in/rule-4-authorisation-agency-go vernment
  5. http://www.itlaw.in/rule-5-issue-decryption-direct ion-competent-authority
  6. http://www.itlaw.in/rule-6-interception-monitoring -decryption-information-state-beyond-jurisdiction/
  7. http://www.itlaw.in/rule-7-contents-direction
  8. http://www.itlaw.in/rule-8-competent-authority-con sider-alternative-means-acquiring-information
  9. http://www.itlaw.in/rule-9-direction-interception- monitoring-decryption-specific-information
  10. http://www.itlaw.in/rule-10-direction-specify-name -designation-officer-information-disclosed
  11. http://www.itlaw.in/rule-11-period-within-directio n-shall-remain-force
  12. http://www.itlaw.in/rule-12-authorised-agency-desi gnate-nodal-officer
  13. http://www.itlaw.in/rule-13-intermediary-provide-f acilities-etc
  14. http://www.itlaw.in/rule-14-intermediary-designate -officers-receive-handle
  15. http://www.itlaw.in/rule-15-acknowledgement-instru ction
  16. http://www.itlaw.in/rule-16-maintenance-records-de signated-officer
  17. http://www.itlaw.in/rule-17-decryption-key-holder- disclose-decryption-key-provide-decryption-assista nce
  18. http://www.itlaw.in/rule-18-submission-list-interc eption-monitoring-decryption-information
  19. http://www.itlaw.in/rule-19-intermediary-ensure-ef fective-check-handling-matter-interception-monitor ing-decryption-information
  20. http://www.itlaw.in/rule-20-intermediary-ensure-ef fective-check-handling-matter-interception-monitor ing-decryption-information
  21. http://www.itlaw.in/rule-21-responsibility-interme diary
  22. http://www.itlaw.in/rule-22-review-directions-comp etent-authority
  23. http://www.itlaw.in/rule-23-destruction-records-in terception-monitoring-decryption-information
  24. http://www.itlaw.in/rule-24-prohibition-intercepti on-monitoring-decryption-information-without-autho risation
  25. http://www.itlaw.in/rule-25-prohibition-disclosure -intercepted-monitored-decrypted-information
Post date: 2014-12-21 22:26:01
Post date GMT: 2014-12-21 16:56:01

Post modified date: 2019-10-08 00:53:55
Post modified date GMT: 2019-10-07 19:23:55

Export date: Thu Mar 28 22:54:46 2024 / +0000 GMT
This page was exported from Info. Technology Law [ https://www.itlaw.in ]
Export of Post and Page has been powered by [ Universal Post Manager ] plugin from www.ProfProjects.com