Info. Technology Law https://www.itlaw.in/information-technology-procedure-safeguards-interception-monitoring-decryption-information-rules-2009/ Export date: Thu Mar 28 22:54:46 2024 / +0000 GMT |
Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009Rule 1: Short title and commencement 1 Rule 2: Definitions 2 Rule 3: Direction for interception or monitoring or decryption of any information 3 Rule 4: Authorisation of agency of Government 4 Rule 5: Issue of decryption direction by competent authority 5 Rule 6: Interception or monitoring or decryption of information by a State beyond its jurisdiction 6 Rule 7: Contents for direction 7 Rule 8: Competent authority to consider alternative means in acquiring information 8 Rule 9: Direction of interception or monitoring or decryption of any specific information 9 Rule 10: Direction to specify the name and designation of the officer to whom information to be disclosed 10 Rule 11: Period within which direction shall remain in force 11 Rule 12: Authorised agency to designate nodal officer 12 Rule 13: Intermediary to provide facilities, etc. 13 Rule 14: Intermediary to designate officers to receive and handle 14 Rule 15: Acknowledgement of Instruction 15 Rule 16: Maintenance of records by designated officer 16 Rule 17: Decryption key holder to disclose decryption key or provide decryption assistance 17 Rule 18: Submission of the list of interception or monitoring or decryption of information 18 Rule 19: Intermediary to ensure effective check in handling matter of interception or monitoring or decryption of information 19 Rule 20: Intermediary to ensure effective check in handling matter of interception or monitoring or decryption of information 20 Rule 21: Responsibility of intermediary 21 Rule 22: Review of directions of competent authority 22 Rule 23: Destruction of records of interception or monitoring or decryption of information 23 Rule 24: Prohibition of interception or monitoring or decryption of information without authorisation 24 Rule 25: Prohibition of disclosure of intercepted or monitored decrypted information 25 |
Links:
|
Post date: 2014-12-21 22:26:01 Post date GMT: 2014-12-21 16:56:01 Post modified date: 2019-10-08 00:53:55 Post modified date GMT: 2019-10-07 19:23:55 |
Export date: Thu Mar 28 22:54:46 2024 / +0000 GMT This page was exported from Info. Technology Law [ https://www.itlaw.in ] Export of Post and Page has been powered by [ Universal Post Manager ] plugin from www.ProfProjects.com |