Amendments in cyber act on cards with new encryption and privacy policies, says JS, deity


Department of Electronics and Information Technology (DEITY) is contemplating amendments to the existing Indian cyber laws to make them align with prevailing realities of modern times as well bring about new encryption and privacy policies to cater to evolving cyber space, according to its Joint Secretary, R K Sudhanshu. Addressing a National Conference on “Cyber […]


cybersecuritypntDepartment of Electronics and Information Technology (DEITY) is contemplating amendments to the existing Indian cyber laws to make them align with prevailing realities of modern times as well bring about new encryption and privacy policies to cater to evolving cyber space, according to its Joint Secretary, R K Sudhanshu.

Addressing a National Conference on “Cyber Security –  Cyberix 2016 : Securing Digital India” under aegis of PHD Chamber of Commerce and Industry here , Sudhanshu said that the existing cyber laws have not been able to keep pace with cyber crimes, reported in modern times and therefore, require suitable amendments.

“The department is already engaged with this detailing exercise and might make amendments in the prevailing cyber Act so that with fresh amendments, the cyber security was made robust and effective.  Likewise, the department would also unveil a new encryption and privacy policies so that data protection relating to information and technology is aligned and catered to in an effective manner”, he said.

Speaking on the occasion DACIDS, DIARA Indian Army, Brig. M U Nair felt that with new innovations that have been taken place in cyber and IT landscape, the sensitivities relating to data protection in the Indian army, air force and navy is becoming vulnerable and therefore, collective steps needed to be put in place so that their cyber space stays put totally foolproof  and infallible.

International Expert on Cyber Security, Intel, U.K, Dr. Claire Vishik, said “today there are 50 billion connected devices all around the world and there are some points which the users and developers need to know. First of all, the developer needs to know the intent of other developers, legacy integration etc, and to have cyber security there should be innovative threat models, extensible framework and most importantly technology professionals, who are updated about latest technologies and they have ability to develop with the new technologies”.

 “While the users should have good knowledge of technology and have security and privacy features installed in each of their device and to reduce the cyber crime, also there should be educational systems, which provide technological background from the basic level”, she added.

In his welcome remarks, Vice President, PHD Chamber, Gopal Jiwarajka said that in India there are 460 million internet users, and with these many number of users there is rise in cyber crime. Internet increases communication and facilitate culture but this can also be used to do cyber crime, and example from this can be seen as, India stands in fifth position in online payment hacking.

Co-Chairman, Committee on Electronics and ICT, PHD Chamber, Atul Anand said with increasing number of online users, cyber security should be updated so that there are no chances of cyber crime. To reduce the cyber crime one can use his body impressions like finger prints so that no one else can operate it and thus reduce the chances of hacking. Government of India has set up various organizations to reduce the cyber crime.

He also said there should be security education and awareness programmes, so as to educate people about internet hacks and how they can save themselves from it. Various testing labs and National Threat Intelligence Centre have been put up to reduce the risk of cyber crime and evolve new strategies regarding cyber security, thus securing Digital India for socio- economic growth of the country.

No Comments Yet

Leave a Reply

Your email address will not be published.

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>


*