The Centre for Internet and Society
http://editors.cis-india.org
These are the search results for the query, showing results 71 to 85.
CYFY 2016 - The India Conference on Cyber Security and Internet Governance
http://editors.cis-india.org/internet-governance/news/cyfy-2016-the-india-conference-on-cyber-security-and-internet-governance-4th-edition
<b>Sunil Abraham will participate as a panelist at CYFY 2016 event organized by Observer Research Foundation in New Delhi from September 28 to 30, 2016. </b>
<p style="text-align: justify; ">Into its fourth edition this year, CyFy: The India Conference on Cyber Security and Internet Governance has emerged as a global platform to discuss, debate and deliver digital policy solutions. CyFy 2015 featured nearly 110 participants from over 33 countries, with nearly 800 delegates in attendance. Prominently, the conference sessions featured several experts from Africa and the Asia Pacific, who addressed the policy priority of connecting the next billion. The 2016 iteration of CyFy will highlight the political, economic and strategic questions that underpin this imperative.</p>
<p style="text-align: justify; "><a class="external-link" href="http://cis-india.org/internet-governance/files/cyfy-2016-agenda/view">Download the Agenda </a></p>
<hr />
<p style="text-align: justify; ">See the announcement on <a class="external-link" href="http://cyfy.org/">CYFY website</a> or write to Samir Saran at <a class="mail-link" href="mailto:ssaran@orfonline.org?subject=CyFy 2016">ssaran@orfonline.org</a> or Arun at <a class="mail-link" href="mailto:arun.sukumar@orfonline.org?subject=CyFy 2016">arun.sukumar@orfonline.org</a> for more details on the conference.</p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/news/cyfy-2016-the-india-conference-on-cyber-security-and-internet-governance-4th-edition'>http://editors.cis-india.org/internet-governance/news/cyfy-2016-the-india-conference-on-cyber-security-and-internet-governance-4th-edition</a>
</p>
No publisherpraskrishnaCyber SecurityInternet Governance2016-09-13T15:23:59ZNews Item Cyfy 2015: The India Conference on Cyber Security and Internet Governance
http://editors.cis-india.org/internet-governance/news/cyfy-2015-india-conference-on-cyber-security-and-internet-governance
<b>In its third year, Cyfy; South Asia’s biggest internet policy conference is being held in New Delhi, from 14-16 October, 2015. The event is organized by Observer Research Foundation at Hotel Taj Mansingh. Sunil Abraham is a panelist in the session "Protection of Intellectual Property and Business Secrets in the Knowledge Economy".</b>
<p style="text-align: justify; ">Building on its scope and scale of the previous year — over 55 speakers, from 12 countries, with 350 attendees — the conference discusses issues that affect the emerging world and developed world alike. The conversations will further and widen the debate around internet governance, security, surveillance, freedom of expression, norms of state behaviour, technology and specific societal challenges that emerging and developing countries seek to address by the effective design and deployment on these technologies. In 2015, Cyfy will bring together more experts from South Asia, in order to present new thought on the specific challenges of internet access, policy and regulation, e-governance, financial inclusion, and bottom of the pyramid solutions.</p>
<p>Along with its growing network of both Indian and international partners, ORF looking forward to hosting another thought-provoking and productive few days, and bridging some digital divides in contemporary internet cyber policy debates.</p>
<h3>Protection of Intellectual Property and Business Secrets in the Knowledge Economy</h3>
<p style="text-align: justify; ">Over the past decade, there has been an exponential rise in cyber-enabled theft of intellectual property, and it has been recognized as an unfair predatory practice. With the rise of the globalized knowledge economy, the stability of open trading systems increasingly depends on cross-border IP protection. What is the relevance of the protection of intellectual property and business secrets for economic development and stability of the international trading system?</p>
<hr />
<p><a href="http://editors.cis-india.org/internet-governance/blog/cyfy-agenda" class="internal-link"><b>Download the agenda</b> </a>For more info visit <a class="external-link" href="http://cyfy.org/">here</a>.</p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/news/cyfy-2015-india-conference-on-cyber-security-and-internet-governance'>http://editors.cis-india.org/internet-governance/news/cyfy-2015-india-conference-on-cyber-security-and-internet-governance</a>
</p>
No publisherpraskrishnaCyber SecurityInternet Governance2015-10-17T14:44:42ZNews ItemCYFY 2013: India Conference on Cyber Security and Cyber Governance
http://editors.cis-india.org/news/india-conference-on-cyber-security-and-cyber-governance
<b>The Observer Research Foundation in collaboration with the Federation of Indian Chambers of Commerce and Industry is holding the India Conference on Cyber Security and Cyber Governance at the Oberoi Hotel in New Delhi on October 14 and 15, 2013. Sunil Abraham will participate in this event as a speaker.</b>
<hr />
<p style="text-align: justify; ">Click to download the full details in the <a href="http://editors.cis-india.org/internet-governance/blog/cyfy-brochure.pdf" class="internal-link">event brochure</a>.</p>
<hr />
<p style="text-align: justify; ">Shri Kapil Sibal, Minister of Communications & Technology will give the inaugural address. Shri Shivshankar Menon, National Security Advisor, Government of India will give the keynote address. Shri Shashi Tharoor, Minister of State, Human Resource Development, Government of India will give the dinner table address on October 14.</p>
<p style="text-align: justify; ">On the second day, October 15, Minister Jaak Aaviksoo will give the keynote address and Shri Nehchal Sandhu, Deputy National Advisor, Government of India will give the valedictory address.</p>
<h3 style="text-align: justify; ">List of Speakers</h3>
<ul>
<li style="text-align: justify; ">Kapil Sibal, Minister for Communications and Information Technology, India</li>
<li style="text-align: justify; ">Shivshankar Menon, National Security Advisor, Government of India</li>
<li style="text-align: justify; ">Shashi Tharoor, Minister of State for Human Resource Development, India</li>
<li style="text-align: justify; ">Nehchal Sandhu, Deputy National Security Advisor, Government of India</li>
<li style="text-align: justify; ">A.P. Shah, Former Chief Justice, Delhi High Court</li>
<li style="text-align: justify; ">Arvind Gupta, Director General, Institute for Defence Studies and Analyses, India</li>
<li style="text-align: justify; ">Ashish Chauhan, CEO, Bombay Stock Exchange</li>
<li style="text-align: justify; ">C. Raja Mohan, Distinguished Fellow, ORF</li>
<li style="text-align: justify; ">Christopher Painter, Office of the Coordinator for Cyber Issues, Department Of State, USA</li>
<li style="text-align: justify; ">Dirk Brengelmann, Commissioner for International Cyber Policy, Federal Foreign Office, Germany</li>
<li style="text-align: justify; ">Eric H. Loeb, Vice President, International External Affairs, AT&T</li>
<li style="text-align: justify; ">Gabriel Siboni, Director, Cyber Warfare Program, Institute for National Security Studies, Tel Aviv University, Israel</li>
<li style="text-align: justify; ">Jaak Aaviksoo, Minister of Education and Research of the Republic of Estonia</li>
<li style="text-align: justify; ">Jamie Shea, Deputy Assistant Secretary General, Emerging Security Challenges, NATO</li>
<li style="text-align: justify; ">Joe Sullivan, CSO, Facebook</li>
<li style="text-align: justify; ">John Mallery, Research Scientist, MIT Computer Science & Artificial Intelligence Laboratory, USA</li>
<li style="text-align: justify; ">Maurizio Martellini, Secretary General, Landau Network-Centro Volta and IWG Executive Secretary, Italy</li>
<li style="text-align: justify; ">Michael Cheatham, Head U.S. Representative Office, Indo-US Science and. Technology Forum, USA</li>
<li style="text-align: justify; ">M.M.Oberoi, Indian Police Service, Joint commissioner of Police, Delhi Police, Government of India</li>
<li style="text-align: justify; ">Oleg Demidov, The Russian Center for Policy Studies, Russia</li>
<li style="text-align: justify; ">Peter Grabosky, Researcher, Australian National University, Australia</li>
<li style="text-align: justify; ">Prakash Nagpal, Senior Vice President, Product Marketing and Marketing, Narus</li>
<li style="text-align: justify; ">Rajan Mathews, Director General, Cellular Operators Association of India</li>
<li style="text-align: justify; ">Ram Narain, Deputy Director General (Security), Department of Telecommunication (DoT), Government of India</li>
<li style="text-align: justify; ">Sandro Gaycken, Freie Universität Berlin, Institute of Computer Science, Germany</li>
<li style="text-align: justify; ">Sean Kanuck, National Intelligence Officer for Cyber Issues, Office of the Director of National Intelligence, USA</li>
<li style="text-align: justify; ">Sunil Abraham, Executive Director, Centre for Internet and Society, Bangalore</li>
<li style="text-align: justify; ">Vijay Madan, Chief Mentor, Tata Teleservices (former Director, C-DOT), India</li>
<li style="text-align: justify; ">Vivke Lall, President & CEO, Reliance Industries Limited</li>
</ul>
<p>
For more details visit <a href='http://editors.cis-india.org/news/india-conference-on-cyber-security-and-cyber-governance'>http://editors.cis-india.org/news/india-conference-on-cyber-security-and-cyber-governance</a>
</p>
No publisherpraskrishnaCyber SecurityInternet Governance2013-09-26T06:50:15ZNews ItemCyberspying: Government may ban Gmail for official communication
http://editors.cis-india.org/news/times-of-india-august-30-2013-cyberspying-govt-may-ban-gmail-for-official-communication
<b>The government will soon ask all its employees to stop using Google's Gmail for official communication, a move intended to increase security of confidential government information after revelations of widespread cyberspying by the US.
</b>
<hr style="text-align: justify; " />
<p style="text-align: justify; ">This article was <a class="external-link" href="http://timesofindia.indiatimes.com/tech/tech-news/internet/Cyberspying-Government-employees-may-face-Gmail-ban/articleshow/22156529.cms">published in the Times of India </a>on August 30, 2013. Sunil Abraham is quoted.</p>
<hr />
<p style="text-align: justify; ">A senior official in the ministry of communications and information technology said the government plans to send a formal notification to nearly 5 lakh employees barring them from email service providers such as Gmail that have their servers in the US, and instead asking them to stick to the official email service provided by India's National Informatics Centre.<br /><br />"Gmail data of Indian users resides in other countries as the servers are located outside. Currently, we are looking to address this in the government domain, where there are large amounts of critical data," said J Satyanarayana, secretary in the department of electronics and information technology.</p>
<p style="text-align: justify; "><span style="float:left; "><br /></span></p>
<p style="text-align: justify; "><span style="float:left; "> </span></p>
<p style="text-align: justify; "><span style="float:left; "><br /></span></p>
<h3 style="text-align: justify; ">Snowden fallout</h3>
<p style="text-align: justify; "><span id="advenueINTEXT" style="float:left; ">The move comes in the wake of revelations by former US <a href="http://timesofindia.indiatimes.com/topic/National-Security-Agency">National Security Agency</a> contractor Edward <a href="http://timesofindia.indiatimes.com/topic/Snowden-%28musician%29">Snowden</a> that the <a href="http://timesofindia.indiatimes.com/topic/US-Government">US government</a> had direct access to large amounts of personal data on the internet such as emails and chat messages from companies like Google, Facebook and Apple through a programme called <a href="http://timesofindia.indiatimes.com/topic/PRISM">PRISM</a>. <br /><br /> Documents leaked by Snowden showed that NSA may have accessed network infrastructure in many countries, causing concerns of potential security threats and data breaches. Even as the new policy is being formulated, there has been no mention yet of how compliance will be ensured. <br /><br /> Several senior government officials in India, including ministers of state for communications & IT Milind Deora and Kruparani Killi, have their Gmail IDs listed in government portals as their official email. <br /><br /> A <a href="http://timesofindia.indiatimes.com/topic/Google-India">Google India</a> spokeswoman said the company has not been informed about the ban, and hence it cannot comment on speculation. "Nothing is documented so far, so for us, it is still speculation," Google said in an email response. <br /><br /> A senior official in the IT department admitted on condition of anonymity that employees turn to service providers such as Gmail because of the ease of use compared with official email services, as well as the bureaucratic processes that govern creation of new accounts. <br /><br /> "You can just go and create an account in Gmail easily, whereas for a government account, you have to go through a process because we have to ensure that he is a genuine government user." <br /><br /> Last week, IT Minister Kapil Sibal said the new policy would require all government officials living abroad to use NIC servers that are directly linked to a server in India while accessing government email services. Sibal said there has been no evidence of the US accessing Internet data from India. <br /><br /> Sunil Abraham, executive director of Bangalore-based research firm Centre for Internet and Society, said he agrees with the government's decision to ban Gmail for official communication and that any official violating this needs to be punished. <br /><br /> "After Snowden's revelations, we can never be sure to what extent foreign governments are intercepting government emails," he said. Abraham, however, called the government's decision a "late reaction", as the use of Gmail and other free email services by bureaucrats has increased in the past. <br /><br /> "Use of official government email would also make it easier to achieve greater transparency and anti-corruption initiatives. Ministers, intelligence and law enforcement officials should not be allowed to use alternate email providers under any circumstance." </span></p>
<p>
For more details visit <a href='http://editors.cis-india.org/news/times-of-india-august-30-2013-cyberspying-govt-may-ban-gmail-for-official-communication'>http://editors.cis-india.org/news/times-of-india-august-30-2013-cyberspying-govt-may-ban-gmail-for-official-communication</a>
</p>
No publisherpraskrishnaCyber SecurityInternet GovernanceSurveillance2013-09-02T04:19:53ZNews ItemCyberspace and External Affairs:A Memorandum for India Summary
http://editors.cis-india.org/internet-governance/blog/arindrajit-basu-and-elonnai-hickok-november-30-2018-cyberspace-and-external-affairs
<b>This memorandum seeks to summarise the state of the global debate in cyberspace; outline how India can craft it’s global strategic vision and finally, provides a set of recommendations for the MEA as they craft their cyber diplomacy strategy.</b>
<p class="moz-quote-pre" style="text-align: justify; ">It limits itself to advocating certain procedural steps that the Ministry of External Affairs should take towards propelling India forward as a leading voice in the global cyber norms space and explains why occupying this leadership position should be a vital foreign policy priority. It does not delve into content-based recommendations at this stage. Further, this memorandum is not meant to serve as exhaustive academic research on the subject but builds on previous research by the Centre for Internet & Society in this area to highlight key policy windows that can be driven by India.</p>
<p class="moz-quote-pre" style="text-align: justify; ">This memorandum provides a background to global norms formation focussing on key global developments over the past month; traces the opportunities s for India to play a lead role in the global norms formulation debate and then charts out process related recommendations on next steps towards India taking this forward.</p>
<hr />
<p class="moz-quote-pre" style="text-align: justify; "><a class="external-link" href="http://cis-india.org/internet-governance/files/cyberspace-and-external-affairs">Click here</a> to read more</p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/blog/arindrajit-basu-and-elonnai-hickok-november-30-2018-cyberspace-and-external-affairs'>http://editors.cis-india.org/internet-governance/blog/arindrajit-basu-and-elonnai-hickok-november-30-2018-cyberspace-and-external-affairs</a>
</p>
No publisherArindrajit Basu and Elonnai HickokCyber SecurityInternet GovernancePrivacy2018-12-01T04:10:51ZBlog EntryCybersecurity: The Intersection of Policy and Technology
http://editors.cis-india.org/internet-governance/news/cybersecurity-the-intersection-of-policy-and-technology
<b>Sunil Abraham and Aayush Rathi attended a round-table on 'Cybersecurity: The Intersection of Policy and Technology'. The event was organised by Synergia Foundation, Bengaluru.</b>
<p style="text-align: justify; ">The speakers for the round-table were Deborah Housen-Couriel, Professor at the Kennedy School of Government, Gaurav Gupta - Principal Secretary for IT, BT, and S&T, Government of Karnataka, and Dana Kursh, Consul General of Israel to South India.</p>
<p style="text-align: justify; ">The discussion at the round-table centred around developing approaches aimed at resolving the 'grand challenge' of cyber security. The role of deeper collaborations between various stakeholders such as academia, corporate enterprises, law enforcement and the government in arriving at cogent solutions was emphasised upon. For more on the discussion at the round-table, a press note can be found <a class="external-link" href="https://www.synergiafoundation.in/news-analysis/cybersecurity-intersection-policy-technology">here</a>.</p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/news/cybersecurity-the-intersection-of-policy-and-technology'>http://editors.cis-india.org/internet-governance/news/cybersecurity-the-intersection-of-policy-and-technology</a>
</p>
No publisherAdminCyber SecurityInternet Governance2018-03-25T03:24:23ZNews ItemCybersecurity Visuals Media Handbook: Launch Event
http://editors.cis-india.org/internet-governance/blog/cybersecurity-visuals-media-handbook-launch-event
<b>6th December | 6 pm | Centre for Internet and Society, Bangalore</b>
<p> </p>
<p>The existing cybersecurity imagery in media publications has been observed to be limited in its communication of the discourse prevailing in cybersecurity policy circles, relying heavily on stereotypes such as hooded men, padlocks, and binary codes.</p>
<p><br />In order to enable a clearer, more nuanced representation of cybersecurity concepts, we, at CIS, along with <a class="external-link" href="http://designbeku.in/">Design Beku</a> are launching the Cybersecurity Visuals Media Handbook. This handbook has been conceived to be a concise guide for media publications to understand the specific concepts within cybersecurity and use it as a reference to create visuals that are more informative, relevant, and look beyond stereotypes.</p>
<p>We will be launching the interactive digital handbook on 6th December, 2019, at the Centre for Internet and Society, Bangalore, at 6 pm. The event would include a discussion on the purpose, process, and concepts behind this illustrated guide by CIS researchers and Design Beku.</p>
<p>The launch will be followed by a panel discussion on Digital Media Illustrations & the Politics of Technology. We will be joined by Padmini Ray Murray, Paulanthony George, and Kruthika N S in the panel. It will be moderated by Saumyaa Naidu.</p>
<p dir="ltr"><strong>Padmini Ray Murray</strong></p>
<p dir="ltr">Padmini founded the Design Beku collective in 2018 to help not-for-profit organisations explore their potential through research-led design and digital development. Trained as an academic researcher, Padmini currently as the head of communications at Obvious, a design studio. She regularly gives talks and publishes on the necessity of technology and design to be decolonial, local, and ethical. <strong><br /></strong></p>
<p dir="ltr"><strong>Paulanthony George</strong></p>
<p dir="ltr">Paulanthony hates writing bios in the third person.<br />My research focuses on the relationships between made objects, the maker and the behaviour of making, in the context of spreadable digital media (and behaviours stemming from it). I study internet memes inside and outside of India and phenomenon such as dissent, satire, free expression and ambivalent behaviour fostered by them. The research is at the intersection of digital ethnography, culture studies, human-computer interaction, humour studies and critical theory. I spend my time watching people. I draw them, the way they are, the way some people want to be and sometimes I have interesting conversations with them.</p>
<p><span id="gmail-docs-internal-guid-5cb9e515-7fff-777e-6b99-8a216379ee39">
</span></p>
<p dir="ltr"><strong>Kruthika N S</strong></p>
<p dir="ltr">Kruthika NS is a lawyer at LawNK and researcher at the Sports Law & Policy Centre, Bengaluru. She uses art as a medium to explore the intersections of the law and society, with gender justice featuring as the central theme of her work. Her art has included subjects such as the #MeToo movement in India, and the feminist principles of the internet, among several other doodles.</p>
<p dir="ltr"><strong>Saumyaa Naidu</strong></p>
<p dir="ltr">Saumyaa is a designer and researcher at the Centre for Internet and Society. <strong> </strong></p>
<p> </p>
<p><br /><strong>Agenda</strong><br />6:00 - 6:15 pm - Introduction <br />6:15 - 6:45 pm - Presentation on the Media Handbook by Paulanthony George<br />6:45 - 7:00 pm - Tea/ Coffee <br />7:00 - 8:00 pm - Panel discussion on Digital Media Illustrations & the Politics of Technology<br />8:00 - 8:30 pm - Tea/ Coffee and Snacks</p>
<p>The interactive version of handbook can be accessed <a class="external-link" href="http://cis-india.github.io/cybersecurityvisuals/index">here</a>. The print versions of the handbook can be accessed at: <a class="external-link" href="https://drive.google.com/file/d/13Llq1vD5Eb-yo2YE3X6dRPaZ_WsMYhfa/view?usp=sharing">Single Scroll Printing</a>, <a class="external-link" href="https://drive.google.com/file/d/1mK_lxA0Eeb7GWxqZk4IM3cBxKdWakKS9/view?usp=sharing">Tiled-Paste Printing</a>.</p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/blog/cybersecurity-visuals-media-handbook-launch-event'>http://editors.cis-india.org/internet-governance/blog/cybersecurity-visuals-media-handbook-launch-event</a>
</p>
No publishersaumyaaCybersecurityCyber SecurityEventInternet Governance2019-12-06T09:27:37ZEventCyberattacks a significant threat to democracy: Modi
http://editors.cis-india.org/internet-governance/news/livemint-november-24-2017-komal-gupta-cyberattacks-a-significant-threat-to-democracy-modi
<b>We have to ensure that cyberspace does not become a playground for dark horses of radicalism, says PM Narendra Modi at the fifth Global Conference on Cyber Space in Delhi.</b>
<p style="text-align: justify; ">The article by Komal Gupta was published in <a class="external-link" href="http://www.livemint.com/Industry/S0TsLMI3yEzlc6XSxdUmtK/Cyberattacks-a-significant-threat-to-democracy-Narendra-Mod.html">Livemint</a> on November 24, 2017.</p>
<hr />
<p style="text-align: justify; ">Prime Minister Narendra Modi on Thursday said creating a safe and secure cyberspace is on the primary agenda of the government as cyberattacks were a threat to democracy.</p>
<p style="text-align: justify; ">Modi’s assurance of decisively dealing with cyberattacks comes at a time when policymakers are making an unprecedented push to popularize digital transactions and cut down use of cash in order to have a more transparent and accountable economic environment. The government is at present working on a draft policy for tackling ransomware, a malicious software.</p>
<p style="text-align: justify; ">“We have to ensure that cyberspace does not become a playground for dark horses of radicalism,” Modi said, while inaugurating the fifth Global Conference on Cyber Space (GCCS) in the national capital.</p>
<p style="text-align: justify; ">A total of 50 incidents of cyberattacks affecting 19 financial organizations were reported from 2016 until June 2017, <i>PTI </i>reported in August.</p>
<p style="text-align: justify; ">With multiple cyberattacks affecting key infrastructure assets like ports and major payment companies recently, the government has decided to come out with a draft policy for tackling ransomware, a senior government official told <i>Mint </i>during the conference. “CERT-In (The Indian Computer Emergency Response Team) is working on a draft policy for tackling ransomware which will be put up for consultation by various stakeholders, including organized enterprise users of IT (Information Technology), solution providers and internet service providers (ISPs),” Ajay Kumar, additional secretary in the ministry of electronics and information technology said.</p>
<p style="text-align: justify; ">Kumar said the draft policy will focus on the proprietary steps the country will take in case of a ransomware attack. This will include the steps for the sharing of information to try and restrict the loss as much as possible. A centre of excellence will be set up to find solutions to attacks or neutralise the malware, he added.</p>
<p style="text-align: justify; ">The need to set up a safe and secure cyberspace is one the major concerns of the government as it is moving to create a ‘less-cash’ economy. Earlier this year, the government announced the “DigiDhan Mission” to achieve a 25 billion digital transactions target, outlined in the Union budget for this fiscal.</p>
<p style="text-align: justify; ">Modi said empowerment through digital access is the aim of the government and digital technology has saved around $10 billion so far by eliminating middlemen.</p>
<p style="text-align: justify; ">The MyGov platform is a prime example of how technology strengthens offices. PRAGATI has resulted in faster governance decisions through general consensus, he added.</p>
<p style="text-align: justify; ">PRAGATI (Pro-Active Governance And Timely Implementation) is an interactive platform aimed at addressing the common man’s grievances and monitoring and reviewing programmes and projects of the central and state governments.</p>
<p style="text-align: justify; ">Umang stands for Unified Mobile Application for New-age Governance. It provides all pan India e-Gov services ranging from central to local government bodies and other citizen-centric services like Aadhaar and Digilocker on one single platform or mobile app.</p>
<p style="text-align: justify; ">Modi said, “the app will provide over hundred citizen-centric services. It will automatically add pressure among peers and result in a better performance.”</p>
<p style="text-align: justify; ">Law and IT minister Ravi Shankar Prasad, speaking at the event, said privacy of individuals was of utmost importance but “privacy cannot withhold innovation.” He further said the citizens’ right of accessing the internet is “non-negotiable” and the government will not allow any company to restrict people’s entry to the worldwide web.</p>
<p style="text-align: justify; ">Speaking on Facebook’s Free Basics programme, Prasad said the government did not allow social networking giant’s programme because it offered access to select internet services. Facebook had introduced its Free Basics programme in India in 2015 to offer free basic internet access to people in partnership with telecom operators. Prasad said the idea behind Free Basics was that everything will be free, namely eduction, health, entertainment and others, if one enters the Net through one gate (Facebook’s).</p>
<p style="text-align: justify; ">“I said India is a democracy, we don’t believe in one gate. We believe in multiple gates. Therefore, this gate locking for India will not be accepted and I did not allow it. This stems (from) our commitment that internet must be accessible to all,” he added.</p>
<p style="text-align: justify; ">Sri Lankan Prime Minister Ranil Wickremesinghe, who was present at the event, said there was no legal framework on cyberspace and he hoped the conference would lead to a consensus to finalize the terms of the framework. “Our government has a lot more to do in net neutrality but we have taken progressive and revolutionary step in this regard,” added Wickremesinghe.</p>
<p style="text-align: justify; ">Wickremesinghe is on a four-day visit to India with the aim of boosting bilateral ties.</p>
<p style="text-align: justify; ">On the first day of the conference, India agreed to establish a joint working group with Iran to work in different IT areas.</p>
<p style="text-align: justify; ">India will provide technical advice to Mauritius for setting up the digilocker infrastructure. An MoU has been signed with Denmark for future cooperation in the IT sector.</p>
<p style="text-align: justify; ">“While a policy on ransomware is welcome, there is much more to be done. Implementation of the 2014 National Cybersecurity Policy has been very slow. Even the simplest bits, such as a secure process for receiving vulnerability disclosure has been lacking,” said Pranesh Prakash, policy director at the Centre for Internet and Society, a Bengaluru-based think tank.</p>
<p style="text-align: justify; "><i>PTI contributed to this story.</i></p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/news/livemint-november-24-2017-komal-gupta-cyberattacks-a-significant-threat-to-democracy-modi'>http://editors.cis-india.org/internet-governance/news/livemint-november-24-2017-komal-gupta-cyberattacks-a-significant-threat-to-democracy-modi</a>
</p>
No publisherAdminCyber SecurityInternet GovernancePrivacy2017-11-24T13:29:17ZNews ItemCyber-Security in the Age of Smart Manufacturing
http://editors.cis-india.org/internet-governance/news/cyber-security-in-the-age-of-smart-manufacturing
<b>Arindrajit Basu attended the event 'Cyber-security in the age of Smart Manufacturing.' The event 'BTS - CyberComm 2018' was organised by the Federation of Indian Chamber of Commerce & industry (FICCI) in association with Karnataka Innovation and Technology Society, and Government of Karnataka at The Lalit Ashok, Bengaluru on September 26, 2018.</b>
<p style="text-align: justify; ">The event was aimed at understanding the cyber security threats revolving around Industry 4.0 and smart manufacturing. The speakers included Mr. Gaurav Gupta, Principal Secretary, IT, BT and S&T Department, Government of Karnataka;Mr. Sanjay Mujoo, Vice President, Pointnext Global Centre Bangalore, Hewlett Packard Enterprise, India;Mr. Yogesh Andlay, Founder, Nucleus Software & Polaris Financial Technology and Mr. Ambrish Bakaya, Co-Chair, ICT and Digital Economy Committee FICCI.</p>
<p style="text-align: justify; ">Apart from discussing how to cover the threat vectors as businesses increasingly become digitised and use digital supply chains,the event was also useful in terms of obtaining an understanding of how the Karnataka government is approaching the digital ecosystem. The Centres of Excellence aim to bring on board academics, industry bodies and practitioners to develop best practices. FICCI, which was co-hosting this event indicated that they will continue to work with the government to further this agenda.</p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/news/cyber-security-in-the-age-of-smart-manufacturing'>http://editors.cis-india.org/internet-governance/news/cyber-security-in-the-age-of-smart-manufacturing</a>
</p>
No publisherAdminCyber SecurityInternet Governance2018-10-02T00:23:45ZNews ItemCyber Security Summit 2015
http://editors.cis-india.org/internet-governance/news/cyber-security-summit-2015
<b>The Government of Karnataka in association with Biz Wingz Production House organized this Summit on November 27, 2015 at JW Marriott, Bangalore from 10.30 a.m. to 5.30 p.m. Sunil Abraham was a panelist. </b>
<p style="text-align: justify; ">Cloud-based applications are often the darling of the CFO and the nemesis of the CISO & CIOs. How can an organization migrate to the cloud, thus relinquishing control, but still maintain <span class="highlightedSearchTerm">security</span>? Are we sacrificing <span class="highlightedSearchTerm">security</span> and robustness in exchange for other priorities? How do ‘Snowden’ disclosures change the legal and risk nature of cloud decision making and governance? What can proactive cloud providers do to capture the opportunity in the disruption? The panel explored these topics and more to provide the cutting edge thinking and perspectives you need to shape your own cloud strategies in ways that balance multiple priorities.</p>
<h3 style="text-align: justify; ">Panelists</h3>
<ul>
<li>Parag Deodhar, Chief Risk Officer, Bharti AXA General Insurance & Chief Operational Risk Officer India</li>
<li>Sunil Abraham, Executive Director, Centre for Internet and Society</li>
<li>Atul kumar, GM IT, Syndicate Bank</li>
<li>Lopa Mudra Basu, AVP & Head of Enterprise <span class="highlightedSearchTerm">Security</span> & Risk Governance, SLK Global</li>
<li>Sagar Karan, Chief Information <span class="highlightedSearchTerm">Security</span> Officer, Fullerton India Credit Co. Ltd.</li>
<li>R Vijay, CISO –Technology, Mahindra & Mahindra Financial Services Limited</li>
<li>Sanjivan S Shirke, Senior Vice President-Information Technology, Head -Information <span class="highlightedSearchTerm">Security</span>, UTI Asset Management Company Limited.</li>
<li>Sanjay Sahay, IPS, ADGP, Grievances & Human Rights, Police Dept, Govt of Karnataka (moderator).</li>
</ul>
<p><a class="external-link" href="https://www.eventshigh.com/detail/Bangalore/f8cf8b1a68202dca7543ec973f7ae2c0-cyber-security-summit-2015">More information about this event</a></p>
<ul>
</ul>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/news/cyber-security-summit-2015'>http://editors.cis-india.org/internet-governance/news/cyber-security-summit-2015</a>
</p>
No publisherpraskrishnaCyber SecurityInternet Governance2015-12-16T02:10:24ZNews ItemCyber Security Policy Research
http://editors.cis-india.org/internet-governance/events/cyber-security-policy-research
<b>Tim Maurer will give a presentation on cybersecurity policy research at the Centre for Internet & Society's New Delhi office on October 18, 2015, from 2 p.m. to 5 p.m. Geetha Hariharan and Sunil Abraham will participate in this event.</b>
<p style="text-align: justify; ">Tim Maurer's talk will give an outline of the definitional issues involved, the various threats to the confidentiality, integrity, and availability of information and underlying infrastructure, the actors involved and international efforts to address cybersecurity. The talk will also provide an overview of existing and ongoing cyber security policy research.</p>
<h2 style="text-align: justify; ">Tim Maurer</h2>
<p><img src="http://editors.cis-india.org/home-images/Tim.jpg/@@images/897b814d-5366-4da7-9270-b3c69b69020f.jpeg" alt="Tim" class="image-inline" title="Tim" /></p>
<p style="text-align: justify; ">Tim Maurer is an associate at the Carnegie Endowment for International Peace. His work focuses on cyberspace and international affairs, with a concentration on global cybersecurity norms, human rights online, Internet governance, and their interlinkages. He is writing a book on cybersecurity and proxy actors.<br /><br />Maurer serves as a member of the Research Advisory Network of the Global Commission on Internet Governance, the Freedom Online Coalition’s cybersecurity working group “An Internet Free and Secure,” and co-chaired the Civil Society Advisory Board of the Global Conference on CyberSpace. In 2014, he developed the Global Cyber Definitions Database for the chair of the OSCE to support the implementation of the OSCE’s cyber confidence-building measures. In 2013 and 2014, Maurer spoke about cybersecurity at the United Nations in New York and Geneva and co-authored “Tipping the Scale: An Analysis of Global Swing States in the Internet Governance Debate,” published by the Global Commission on Internet Governance. His work has also been published by Jane’s Intelligence Review, TIME, Foreign Policy, CNN, Slate, and other academic and media venues.<br /><br />Prior to joining Carnegie, Maurer was the director of the Global Cybersecurity Norms and Resilience Project at New America and head of research of New America’s Cybersecurity Initiative. He also gained experience with the United Nations in Rwanda, Geneva, and New York focusing on humanitarian assistance and the coordination of the UN system.</p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/events/cyber-security-policy-research'>http://editors.cis-india.org/internet-governance/events/cyber-security-policy-research</a>
</p>
No publisherpraskrishnaCyber SecurityEventInternet Governance2015-10-16T16:47:12ZEventCyber Security of Smart Grids in India
http://editors.cis-india.org/internet-governance/blog/dataquest-april-25-2016-vanya-rakesh-and-elonnai-hickok-cyber-security-of-smart-grids-in-india
<b>An integral component of the ambitious flagship programme of the Indian Government- Digital India, which paves way for a digital data avalanche in the country, is a well-designed digital infrastructure ensuring high connectivity and integration of services, the potential areas being smart cities, smart homes, smart energy and smart grids, to list a few. Likewise, the 100 Smart Cities Mission envisions changing the face of urbanization in India, to manage the exponential growth of population in the cities by creating smart cities with ICT driven solutions, along with big data analytics. Smart grid technologies are key for both these schemes.</b>
<p>The article by Elonnai Hickok and Vanya Rakesh was published by <a class="external-link" href="http://www.dqindia.com/cyber-security-of-smart-grids-in-india/">Dataquest</a> on April 25, 2016</p>
<hr />
<p style="text-align: justify; ">Smart grid is a promising power delivery infrastructure integrated with communication and information technologies which enables monitoring, prediction and management of energy usages. Establishment of smart grids becomes highly important for the Indian economy, as the present grid losses are one of the highest in the world at upto 50% and costing India upto 1.5% of its GDP. India operates one of the largest synchronous grids in the world – covering an area of over 3 million sq km, 260 GW capacity and over 200 million customers with the estimated demand of India increasing 4 times by the year 2032.</p>
<p style="text-align: justify; ">In the year 2013, the Ministry of Power (MoP), in consultation with India Smart Grid Forum and India Smart Grid Task Force released a smart grid vision and roadmap for India, a key policy document aligned to MoP’s overarching objectives of “Access, Availability and Affordability of Power for All”. It lays plans for a framework to address cyber security concerns in smart grids as well. To achieve goals envisaged in the roadmap, the Government of India established the National Smart Grid Mission in the year 2015 for planning, monitoring and implementation of policies and programs related to Smart Grid activities.</p>
<p style="text-align: justify; ">A number of smart grid projects have been introduced, and are currently underway. KEPCO in Kerala has established smart meter/intelligent power transmission and distribution equipment system in the year 2011 and the smart grid operations focus on peak reduction, load standardization, reduction in power transmission/distribution loss, response to new/renewable energy and reduction in black-out time. Gujarat was introduced to India’s first modernized electrical grid in the year 2014, to study consumer behaviour of electricity usage and propose a tariff structure based on usage and load on the power utility by installing new meters embedded with SIM card to monitor the data. The Bangalore Electricity Supply Company Ltd. (BESCOM) project in Bangalore envisaged the Smart Grid Pilot Project for integration of renewable and distributed energy resources into the grid, which is vital to meet growing electricity demands of the country, curb power losses, and enhance accessibility to quality power.</p>
<h3 style="text-align: justify; ">Cybersecurity challenges</h3>
<p style="text-align: justify; ">At the same time, the introduction of a smart grid brings with it certain security risks and concerns, particularly to a nation’s cyber security. Increased interconnection and integration may render the grids vulnerable to cyber threats, putting stored data and computers at great risk.With sufficient cyber security measures, policies and framework in place, a Smart Grid can be made more efficient, reliable and secure as failure to address these problems will hinder the modernization of the existing power system. Smart Grids, comprising of numerous communication, intelligent, monitoring and electrical elements employed in power grid, have a greater exposure to cyber-attacks that can potentially disrupt power supply in a city.</p>
<div style="text-align: justify; "></div>
<div style="text-align: justify; ">Cyber security and data privacy are some of the key challenges for smart grids in India, as establishment of digital electricity infrastructure entails the challenge of communication security and data management. Digital network and systems are highly prone to malicious attacks from hackers which can lead to misutilisation of consumers’ data, making cyber security the key issue to be addressed. Vulnerabilities allow an attacker to break a system, corrupt user privacy, acquire unauthorized access to control the software, and modify load conditions to destabilize the grid. Hackers or attackers, who compromise a smart meter can immediately alter their energy costs or change generated energy meter readings to monetize it by help of remote PCs. Also, inserting false information could mislead the electric utility into making incorrect decisions about the local usage and capacity.</div>
<div style="text-align: justify; "></div>
<div style="text-align: justify; "></div>
<h3 style="text-align: justify; ">Initiatives in India</h3>
<div style="text-align: justify; ">As cybersecurity is critical for Digital India and the Smart City Concept note highlights a smart grid to be resilient to cyber attacks, a National Cyber Coordination Centre is being established by the Indian Government. Also, National Cyber Safety and Security Standards has been started with a vision to safeguard the nation from the current threats in the cyberspace, undertaking research to understand the nature of cyber threats and Cyber Crimes by facilitating a common platform where experts shall provide an effective solution for the complex and alarming problems in the society towards cyber security domain. Innovative strategies and compliance procedures are being developed to curb the increasing complexity of the Global Cyber Threats faced by countries at large.</div>
<div style="text-align: justify; "></div>
<p style="text-align: justify; ">The National Cyber Security Policy 2013 was released with an umbrella framework for providing guidance for actions related to security of cyberspace, by the Department of Electronics and Information Technology (DeitY). The Working Group on Information Technology established under the Planning Commission has also published a 12 year plan on IT development in India with a road map for cyber security, stating six key priority and focus areas for cyber security including:Enabling Legal Framework ; Security Policy, Compliance and Assurance; Security R&D; Security Incident – Early Warning and Response ; Security awareness, skill development and training, and Collaboration.</p>
<div style="text-align: justify; "></div>
<p style="text-align: justify; ">In case of Bangalore, to ensure smooth implementation of BESCOM’s vision, the company realised the need to put a cyber-security system in place to protect the smart grid installations in Bangalore city. To ensure security, BESCOM has come out with a separate IT security policy and dedicated trained IT cadre to safeguard its data and servers, becoming one of the few Discoms in India to take such measures for safeguarding the servers and data network from cyber crimes and threats.</p>
<h3 style="text-align: justify; ">Way forward</h3>
<p style="text-align: justify; ">An electric system like Smart grids has enormous and far-reaching economic and social benefits. However, increased interconnection and integration tends to introduce cyber-vulnerabilities into the grid. With the evolution of cyber threats/attacks over time, it can be said that there are a lot of challenges for implementing cyber security in Indian smart grid. Considering importance of secure smart grid networks for flagship projects in India, the existing regulatory framework does not seem to adequately take into consideration the cyber security implications.</p>
<div style="text-align: justify; "></div>
<p style="text-align: justify; ">In light of this, the government must aim to develop and adopt high level cybersecurity policy to withstand cyber-attacks. Also, India must focus on skills development in this domain and have a capable workforce to achieve the targets set by Indian Government. The country must look up to develop an overall intelligence framework that brings together industry, governments and individuals with specific capabilities for this purpose.</p>
<div style="text-align: justify; "></div>
<p style="text-align: justify; ">The National Cyber Security Policy 2013, protecting public and private infrastructure from cyber attacks, along with all kinds of information, such as personal information of web users, banking and financial information,etc. is yet to be implemented by the Government properly. In the Indian Power sector, the cyber security regulations or mandates are absent in the National Electricity Policy (NEP) as well as the Electricity Act 2003 and its amendment in 2007, with no reference to cyber security concerns. These key legislations must be amended to take into account the growing challenges due to increased use of ICT in the power sector.</p>
<div style="text-align: justify; "></div>
<div style="text-align: justify; ">As the concept of smart grids is still evolving in India, professional intervention from various domains has pushed for adoption and development of standard process and products. Many international standard setting organisations like IEC, IEEE, NIST, CENELEC are engaged in standardization activities of Smart Grids and in India, the Bureau of Indian Standards (BIS) has been rolling out several varieties of standards targeting various technologies. Therefore, BIS must develop standards taking into account the security challenges in the cyberspace as well.</div>
<div style="text-align: justify; "></div>
<div style="text-align: justify; "></div>
<p style="text-align: justify; ">Apart from policy and regulatory measure, the system on which the smart grids are built and networked must be made architecturally strong and secure.One of the areas where due attention is required is making the Supervisory Control and Data Acquisition (SCADA) secure, a system that operates with coded signals to provide control of remote equipment and is entirely based on computer systems and network. Numerous systems also employ the Public Key Infrastructure (PKI) to secure the Smart Grids and address the security challenges by enabling identification, verification, validation and authentication of connected meters for network access. This can be leveraged for securing data integrity, revenue streams and service continuity. The key vulnerable areas prone to cyber attacks on information transmission are network information, data integrity and privacy of information. The information transmission networks must be well-designed as the network unavailability may result in the loss of real-time monitoring of critical smart grid infrastructures and power system disasters.</p>
<div style="text-align: justify; "></div>
<p style="text-align: justify; ">Addressing these fast growing challenges and cyber security needs of the country by adopting suitable regulatory, policy and architectural steps would help achieve the objectives of Digital India and Smart Cities enabling “Access, Availability and Affordability for All”.</p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/blog/dataquest-april-25-2016-vanya-rakesh-and-elonnai-hickok-cyber-security-of-smart-grids-in-india'>http://editors.cis-india.org/internet-governance/blog/dataquest-april-25-2016-vanya-rakesh-and-elonnai-hickok-cyber-security-of-smart-grids-in-india</a>
</p>
No publisherElonnai Hickok and Vanya RakeshCyber SecurityInternet Governance2016-04-28T15:34:17ZBlog EntryCyber Policy 2.0
http://editors.cis-india.org/internet-governance/news/cyber-policy-2.0
<b>National Law University organized an executive education program in Bangalore on August 17, 2019. Arindrajit Basu was a speaker. He spoke on Deconstructing the India regulatory approach to data governance and cyber security.</b>
<p>For more details about the program, <a class="external-link" href="http://policyandgovernance.in/cyber-policy-2/">click here</a></p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/news/cyber-policy-2.0'>http://editors.cis-india.org/internet-governance/news/cyber-policy-2.0</a>
</p>
No publisherAdminCyber SecurityInternet GovernanceCyberspace2019-08-19T14:18:13ZNews ItemCyber Dialogue Conference 2014
http://editors.cis-india.org/news/cyber-dialogue-conference-2014
<b>The Cyber Dialogue conference, presented by the Canada Centre for Global Security Studies at the Munk School of Global Affairs, University of Toronto, will convene an influential mix of global leaders from government, civil society, academia and private enterprise to participate in a series of facilitated public plenary conversations and working groups around cyberspace security and governance.</b>
<p style="text-align: justify; ">Malavika Jayaram is <a class="external-link" href="http://www.cyberdialogue.ca/2014-participants/">participating in this event</a> being held on March 30 and 31, 2014. Full event <a class="external-link" href="http://www.cyberdialogue.ca/">details here</a>.</p>
<hr style="text-align: justify; " />
<h2 style="text-align: justify; ">After Snowden, Whither Internet Freedom?</h2>
<p style="text-align: justify; ">A recent stream of documents leaked by former NSA contractor Edward Snowden has shed light on an otherwise highly secretive world of cyber surveillance. Among the revelations — which include details on mass domestic intercepts and covert efforts to shape and weaken global encryption standards — perhaps the most important for the future of global cyberspace are those concerning the way the U.S. government compelled the secret cooperation of American telecommunications, Internet, and social media companies with signals intelligence programs.</p>
<p style="text-align: justify; ">For American citizens, the NSA story has touched off soul-searching discussions about the legality of mass surveillance programs, whether they violate the Fourth and Fifth Amendments of the U.S. Constitution, and whether proper oversight and accountability exist to protect American citizens' rights. But for the rest of the world, they lay bare an enormous “homefield advantage” enjoyed by the United States — a function of the fact that AT&T, Verizon, Google, Facebook, Twitter, Yahoo!, and many other brand name giants are headquartered in the United States.</p>
<p style="text-align: justify; ">Prior to the Snowden revelations, global governance of cyberspace was already at a breaking point. The vast majority of Internet users — now and into the future — are coming from the world’s global South, from regions like Africa, Asia, Latin America, and the Middle East. Of the six billion mobile phones on the planet, four billion of them are already located in the developing world. Notably, many of the fastest rates of connectivity to cyberspace are among the world’s most fragile states and/or autocratic regimes, or in countries where religion plays a major role in public life. Meanwhile, countries like Russia, China, Saudi Arabia, Indonesia, India, and others have been pushing for greater sovereign controls in cyberspace. While a US-led alliance of countries, known as the Freedom Online Coalition, was able to resist these pressures at the Dubai ITU summit and other forums like it, the Snowden revelations will certainly call into question the sincerity of this coalition. Already some world leaders, such as Brazil’s President Rousseff, have argued for a reordering of governance of global cyberspace away from U.S. controls.</p>
<p style="text-align: justify; ">For the fourth annual Cyber Dialogue, we are inviting a selected group of participants to address the question, “After Snowden, Whither Internet Freedom?” What are the likely reactions to the Snowden revelations going to be among countries of the global South? How will the Freedom Online Coalition respond? What is the future of the “multi-stakeholder” model of Internet governance? Does the “Internet Freedom” agenda still carry any legitimacy? What do we know about “other NSA’s” out there? What are the likely implications for rights, security, and openness in cyberspace of post-Snowden nationalization efforts, like those of Brazil’s?</p>
<p style="text-align: justify; ">As in previous Cyber Dialogues, participants will be drawn from a cross-section of government (including law enforcement, defence, and intelligence), the private sector, and civil society. In order to canvass worldwide reaction to the Snowden revelations, this year’s Cyber Dialogue will include an emphasis on thought leaders from the global South, including Africa, Asia, Latin America, and the Middle East.</p>
<p>
For more details visit <a href='http://editors.cis-india.org/news/cyber-dialogue-conference-2014'>http://editors.cis-india.org/news/cyber-dialogue-conference-2014</a>
</p>
No publisherpraskrishnaFreedom of Speech and ExpressionCyber SecurityInternet GovernancePrivacy2014-04-08T05:09:54ZNews ItemCyber crimes shoot up 52% in India over last year
http://editors.cis-india.org/news/the-hindu-business-line-july-2-2014-kv-kurmanath-cyber-crimes-shoot-up-in-india-over-last-year
<b>There has been a sharp increase in the incidence of cyber crime in the country. The number of cases registered in 2013 under the IT Act has gone up by 52 per cent to 4,192 as against 2,761 in the previous year. </b>
<p style="text-align: justify; ">The article by K.V.Kurmanath was <a class="external-link" href="http://www.thehindubusinessline.com/news/cyber-crimes-shoot-up-52-in-india-over-last-year/article6168812.ece?utm_source=RSS_Feed&utm_medium=RSS&utm_campaign=RSS_Syndication">published in the Hindu Businessline</a> on July 2, 2014. Bhairav Acharya gave his inputs.</p>
<hr />
<p style="text-align: justify; ">If you add the cases registered under the IPC, the total number of cyber crime cases crosses the 5,500-mark. Police across the country arrested 3,301 persons in connection with these cases.</p>
<p style="text-align: justify; ">Maharashtra and Andhra Pradesh (undivided) have topped the list with 681 and 635 cases respectively under the IT Act, both showing an almost 50 per cent growth in cyber crimes over the previous year. In the previous year, Maharashtra had registered 471 and Andhra Pradesh 429.</p>
<p style="text-align: justify; ">Cyber security experts have been cautioning people to be careful while using the Internet. Besides increasing the security of the networks they are using, users must be careful while engaging with strangers.</p>
<p style="text-align: justify; ">A recent Microsoft report said many customer infections involve users tricked to install secondary offers, indicating a shift in malware proliferation. According to the latest data provided by the National Crime Records Bureau, the official chronicler of crime in the country, cyber crime registered under the Indian Penal Code (IPC) has shown a much higher growth rate of 122 per cent in 2013 over the previous year’s figure. IPC cases went up to 1,316 in 2013 from 595 in the previous year. Maharashtra topped the list here too with the cops booking 226 cases in this category.</p>
<h3 style="text-align: justify; ">Wrong nomenclature?</h3>
<p style="text-align: justify; ">Bhairav Acharya of the Centre for Internet and Society feels that the term cyber crime has not been defined well. “It is time we do away with the practice of calling any crime a ‘cyber crime’ just because the person who does it uses a computer,” he said.</p>
<p style="text-align: justify; ">“Instead, I think the term ‘cyber crime’ should only be used in relation to offences that can only be committed by using information and communications technology (ICT) such as the internet (which is comprised of the world wide web, email protocols, file transfer protocols, and more) as well as network infrastructure that is not the internet,” he said.</p>
<p style="text-align: justify; ">Hence, only if there is a direct causal link between the crime and ICT and network technology should a crime be called a cyber crime, Acharya says.</p>
<p style="text-align: justify; ">Other States with a high number of cases booked under the IT Act include Karnataka (513), Kerala (349), Madhya Pradesh (282) and Rajasthan (239). Gujarat showed a decline with the number coming down to 61 from 68 in the previous year.</p>
<p>
For more details visit <a href='http://editors.cis-india.org/news/the-hindu-business-line-july-2-2014-kv-kurmanath-cyber-crimes-shoot-up-in-india-over-last-year'>http://editors.cis-india.org/news/the-hindu-business-line-july-2-2014-kv-kurmanath-cyber-crimes-shoot-up-in-india-over-last-year</a>
</p>
No publisherpraskrishnaCyber SecurityInternet GovernanceSocial Media2014-07-03T10:14:26ZNews Item