Please Wait... We are preparing ur result
No Internet! You should check your internet connection. Trying to connect...
  • Products
    • Legal Research Tool
    • Litigation Management Tool
    • Legal Due Diligence - LIBIL
    • Customised AI Solutions
  • Customers
    • Enterprise
      • Case Management Tool for Enterprise
      • Legal Research for Enterprise
      • Customized Legal AI for Enterprise
      • Legal Due diligence for Enterprise
    • Law Firms
      • Case Management Tool for Law Firms
      • Legal Research for Law Firms
      • Legal Due diligence for Law Firms
      • Customized Legal AI for Law Firms
    • Judiciary
      • Legal Research for Judiciary
  • Sectors
    • Background Verification
    • Financial Consulting & Support
    • Banking
    • Financial Risk & Advisory
    • Real Estate
    • Supply Chain & Logistics
    • Fintech
    • Insurance
  • Home
  • More
    • About Legitquest
    • Career
    • Blogs
  • Contact Us
  • Login
Are you looking for a legal tech solutions like Legal Research, Case Management Tool, or a Legal Due Diligence Tool? Fill in the form below.
  • Sections

  • Rule - 1. Short title and commencement.
  • Rule - 2. Definitions.
  • Rule - 3. Location.
  • Rule - 4. Authority.
  • Rule - 5. Functioning on 24-hour basis.
  • Rule - 6. Advisory Committee.
  • Rule - 7. Constituency.
  • Rule - 8. Functions and responsibilities of CERT-In.
  • Rule - 9. Services.
  • Rule - 10. Stakeholders.
  • Rule - 11. Policies and procedures.
  • Rule - 12. CERT-In operations.
  • Rule - 13. Disclosure of information.
  • Rule - 14. Seeking information, carrying out functions and for compliance in terms of sub-Section (6) of Section 70(B) of the Act.
  • Rule - 15. Directions for compliance.
  • Rule - 16. Report of non-compliance.
  • Rule - 17. Point of Contact.
  • Rule - 18. Dealing with non-compliance.
  • Rule - 19. Review Committee.
  • Rule - 20. Action for non-compliance of direction.

Open Sections
Back to Results

Information Technology (The Indian Computer Emergency Response Team and Manner of Performing Functions and Duties) Rules, 2013

Back

Information Technology (The Indian Computer Emergency Response Team and Manner of Performing Functions and Duties) Rules, 2013

[Information Technology (The Indian Computer Emergency Response Team and Manner of Performing Functions and Duties) Rules, 2013][1]

[16th January, 2014]

In exercise of the powers conferred by clause (zf) of sub-section (2) of Section 87, read with sub-section (5) of Section 70-B of the Information Technology Act, 2000 (21 of 2000), the Central Government hereby makes the following rules, namely.

Rule - 1. Short title and commencement.

(1)     These rules may be called the Information Technology (The Indian Computer Emergency Response Team and Manner of Performing Functions and Duties) Rules, 2013.

 

(2)     They shall come into force on the date of their publication in the Official Gazette.

Rule - 2. Definitions.

(1)     In these rules, unless the context otherwise requires,

(a)      “Act” means the Information Technology Act, 2000 (21 of 2000);

 

(b)      “Computer contaminant” means computer contaminant as defined in Section 43-(i) of the Information Technology Act, 2000;

 

(c)      “Computer emergency response” means to coordinate action during cyber security emergencies, provide incident response services to users, publish alerts concerning vulnerabilities and threats, and offer information to help improve cyber security

 

(d)      “Computer resource” means computer resource as defined in Section 2(1)(k) of the Information Technology Act, 2000;

 

(e)      “Computer security incident” means cyber security incident;

 

(f)       “Cyber security” means cyber security as defined in Section 2(1)(nb) of the Information Technology Act, 2000;

 

(g)      “Cyber incident” means any real or suspected adverse event that is likely to cause or causes an offence or contravention, harm to critical functions and services across the public and private sectors by impairing the confidentiality, integrity, or availability of electronic information, systems, services or networks resulting in unauthorised access, denial of service or disruption, unauthorised use of a computer resource, changes to data or information without authorisation; or threatens public safety, undermines public confidence, have a negative effect on the national economy, or diminishes the security posture of the nation;

 

(h)     “Cyber security incident” means any real or suspected adverse event in relation to cyber security that violates an explicitly or implicitly applicable security policy resulting in unauthorized access, denial of service or disruption, unauthorised use of a computer resource for processing or storage of information or changes to data, information without authorisation;

 

(i)       “Cyber security breaches” means unauthorised acquisition or unauthorised use by a person as well as an entity of data or information that compromises the confidentiality, integrity or availability of information maintained in a computer resource;

 

(j)       “Director General” means the Director General of the Indian Computer Emergency Response Team;

 

(k)      “Indian Computer Emergency Response Team” means the Indian Computer Emergency Response Team set up under sub-section (1) of Section 70(B) of the Act;

 

(l)       “Information” means information as defined in Section 2(1)(v) of the Information Technology Act, 2000;

 

(m)    “Information security practices” means implementation of security policies and standards in order to minimise the cyber security incidents and breaches;

 

(n)     “National Critical Information Infrastructure Protection Centre” means the national nodal agency for protection of Critical Information Infrastructure set up under sub-section (1) of Section 70(B) of the Act;

 

(o)      “Security policy” means documented business rules and processes for protecting information and the computer resource;

 

(p)      “Vulnerability” means the existence of a flaw or weakness in hardware or software of a computer resource that can be exploited resulting in their adverse or different functioning other than the intended functions.

 

(2)     Words and expressions used in these rules but not defined and defined in the Act shall have the same meaning as is assigned to them in the Act.

Rule - 3. Location.

The Indian Computer Emergency Response Team (hereinafter referred in these rules as CERT-In) shall function at Department of Electronics and Information Technology, Ministry of Communications and Information Technology and shall be located at “Electronics Niketan”, 6, CGO Complex, Lodhi Road, New Delhi - 110 003.

Rule - 4. Authority.

CERT-In shall be a part and under the administrative control of the Department of Electronics and Information Technology, Ministry of Communications and Information Technology.

Rule - 5. Functioning on 24-hour basis.

CERT-In shall function on 24-hours basis on all days of the year including Government and other holidays and the contact details of CERT-In shall be published on its website www.certin.org.in and are updated from time to time.

Rule - 6. Advisory Committee.

An Advisory Committee shall advise CERT-In on policy matters and services related to cyber security to enable it to fulfil its mandated roles and functions. The Advisory Committee shall have the following composition:

(i) Secretary, Department of Electronics and Information Technology

Chairman

(ii) Representative from the Ministry of Defence

Member

(iii) Representative of the Ministry of Home Affairs

Member

(iv) Representative of the Ministry of Law and Justice

Member

(v) Representative of the Department of Telecommunications

Member

(vi) Representative of the National Security Council Secretariat

Member

(vii) Representative of National Critical Information Infrastructure Protection Centre

Member

(viii) Representative of Indian Institute of Science (IISc), Bengaluru

Member

(ix) Representative of an Indian Industry Association, selected by yearly rotation amongst different Indian Industry Associations, without reappointment from the same Industry Association having a representative on the Council in the immediately preceding year

Member

(x) Representative of any other Ministry as and when required

Special Invitee

(xi) Representative of State Governments (by rotation)

Special Invitee

(xii) Director General, CERT-In

Member-Convener

Rule - 7. Constituency.

CERT-In constituency shall be the Indian cyber community.

Rule - 8. Functions and responsibilities of CERT-In.

CERT-In shall have functions as prescribed in Section 70-B of the Act and those which may be assigned to it from time to time. It shall function as the trusted referral agency for cyber users in India for responding to cyber security incidents and will assist cyber users in the country in implementing measures to reduce the risk of cyber security incidents.

Rule - 9. Services.

CERT-In shall broadly provide following services.

(1)     response to cyber security incidents;

 

(2)     prediction and prevention of cyber security incidents;

 

(3)     analysis and forensics of cyber security incidents;

 

(4)     information security assurance and audits;

 

(5)     awareness and technology exposition in the area of cyber security;

 

(6)     training or upgrade of technical know-how for the entities covered under Rule 10 and sub-rule (2) of Rule 11;

 

(7)     scanning of cyber space with respect to cyber security vulnerabilities, breaches and malicious activities.

Rule - 10. Stakeholders.

CERT-In shall interact with and seek assistance from the following stakeholders to collect, share and disseminate information and also to respond and prevent cyber security incidents, namely.

(a)      Sectoral Computer Emergency Response Teams;

 

(b)      Intermediaries;

 

(c)      Internet Registry and Domain Registrars;

 

(d)      Industry;

 

(e)      Vendors of Information Technology products including security products and services;

 

(f)       Academia, Research and Development Organizations;

 

(g)      Security and Law Enforcement Agencies;

 

(h)     Individuals or group of individuals;

 

(i)       International Computer Emergency Response Teams, Forums and expert groups;

 

(j)       Agency engaged for the protection of Critical Information Infrastructure;

 

(k)      Department of Telecommunications.

Rule - 11. Policies and procedures.

(1)     Types of incidents and level of support.

(a)      CERT-In shall address all types of cyber security incidents cyber incidents which occur or are expected to occur in the country but the level of support given by CERT-In will vary depending on the type and severity of the incident, affected entity, be it individual or group of individuals, organisations in the Government, public and private domain, and the resources available with CERT-In at that time, though in all cases a quick response with an aim to minimize any further damage or loss of information to the affected entity will be made in a shortest possible time. Resources will be assigned according to the following priorities listed in decreasing order.

(I)      threats to the physical safety of human beings due to cyber security incidents;

 

(II)     cyber incidents and cyber security incidents of severe nature (such as denial of service, distributed denial of service, intrusion, spread of computer contaminant,) on any part of the public information infrastructure including backbone network infrastructure;

 

(III)   large-scale or most frequent incidents such as identity theft, intrusion into computer resource, defacement of websites etc.;

 

(IV)   compromise of individual user accounts on multi-user systems;

 

(V)     types of incidents other than those mentioned above will be prioritised according to their apparent severity and extent.

(b)      CERT-In shall endeavour to respond and present information and assistance to the affected entities to deal with cyber security incidents as appropriate and the ultimate responsibility of the security of the computer resource shall rest with owner of the computer resource.

(2)     Cooperation and collaboration,CERT-In shall collaborate with.

(I)      organisations within and outside the country engaged in the specialised areas in protecting and responding to cyber security incidents;

 

(II)     organisations engaged in collection of intelligence in general, law enforcement, investigation and forensics;

 

(III)   academia, industry, service providers and research and development institutions;

 

(IV)   individuals or group of individuals.

 

(3)     Communication and authentication with CERT-In.


The stakeholders and public at large can communicate with the CERT-In through communication systems ranging from telephone, fax, email and postal letters. The appropriate procedures will be disseminated through its website from time to time.

Rule - 12. CERT-In operations.

(1)     Incident reporting, response and Information dissemination CERT-In shall operate an Incident Response Help Desk on 24 hours basis on all days including Government and other public holidays to facilitate reporting of cyber security incidents.

(a)      Reporting of incidents: Any individual, organisation or corporate entity affected by cyber security incidents may report the incident to CERT-In. The type of cyber security incidents as identified in Annexure shall be mandatorily reported to CERT-In as early as possible to leave scope for action. Service providers, intermediaries, data centers and body corporate shall report the cyber security incidents to CERT-In within a reasonable time of occurrence or noticing the incident to have scope for timely action.

(b)      The details regarding methods and formats for reporting cyber security incidents, vulnerability reporting and remediation, incident response procedures and dissemination of information on cyber security shall be published on the website of CERT-In www.cert-in.org.in and will be updated from time to time.

(2)     CERT-In shall exchange relevant information relating to attacks, vulnerabilities and solutions in respect of critical sector with National Critical Information Infrastructure Protection Centre.

Rule - 13. Disclosure of information.

(1)     During the course of interaction with user community and discharging its functions CERT-In may collect and analyse information relating to cyber security incidents from individuals, organisations and computer resource. CERT-In shall follow applicable legal restrictions, orders of competent Indian courts and ethical practices with regard to disclosure of information and shall maintain reasonable controls and internal checks to maintain confidentiality of such information.

 

(2)     CERT-In shall not disclose any information which may lead to identification of individual, group of individuals or organizations affected by cyber security incidents without their explicit written consent or orders of Indian competent courts. CERT-In shall take appropriate measures to protect such information and shall also not disclose the identity of individuals, group of individuals and organisations sharing the information and reporting cyber security incidents to it, without their explicit written consent or orders of Indian competent courts.

 

(3)     CERT-In may share or disclose the general trends of cyber security incidents, cyber security breaches freely to assist general public for the purpose of resolving and preventing cyber security incidents and promoting awareness.

 

(4)     Save as provided in sub-rules (1), (2) and (3) of Rule 13, it may be necessary or expedient so to do, for CERT-In to disclose all relevant information to the stakeholders, in the interest of sovereignty or integrity of India, defence of India, security of the State, friendly relations with foreign States or public order or for preventing incitement to the commission of an offence relating to cognizable offences or enhancing cyber security in the country.

Rule - 14. Seeking information, carrying out functions and for compliance in terms of sub-Section (6) of Section 70(B) of the Act.

(1)     Authority, Any officer of CERT-In, not below the rank of Deputy Secretary to the Government of India may seek information from service providers, intermediaries, data centres, body corporate and any other person for carrying out the functions provided in sub-section (4) of Section 70(B) of the Act.

 

(2)     For cyber security, CERT-In may take recourse for monitoring and collection of traffic data in accordance with the provisions of Section 69-B of the Information Technology Act, 2000 and rules notified thereunder.

 

(3)     Format for submission of information—The information sought by CERT-In shall be submitted within the duration and in the format provided along with the communication sent for seeking the information.

 

(4)     Manner of seeking and submission of information—CERT-In may seek the information through digitally signed email, fax or registered postal mail. The information shall be submitted to CERT-In through any suitable communication channel such as digitally signed email, fax, registered postal letters, Read only Compact Disc or Read only Digital Versatile Disc, depending upon the volume of information and as specified by CERT-In. CERT-In may also provide a secure upload facility on their server to the individual Point of Contact as defined in Rule 17.

Rule - 15. Directions for compliance.

In pursuance of its mandated roles and functions as provided in sub-section (4) of Section 70(B) of the Act and with a view to enhancing cyber security of the information infrastructure in the country, Director General, CERT-In shall designate, an officer not below the rank of Director to the Government of India, to issue directions or advisory to service providers, intermediaries, data centres, body corporate and any other person. Such directions or advisory for compliance shall be issued by email signed with electronic signature, fax or registered postal mail. The service providers, intermediaries, data centres, body corporate and any other person shall comply with such directions or advisories and also report to CERT-In, within the time period and the manner as provided in the direction or advisory.

Rule - 16. Report of non-compliance.

In case of any non-compliance of directions within the time period by any such named service providers, intermediaries, data centres, body corporate and any other person, the concerned aforesaid officer shall submit a non-compliance report to the Director General providing details of such non-compliance within two days from the date of expiry of such directions.

Rule - 17. Point of Contact.

The service providers, intermediaries, data centres and body corporate shall designate a Point of Contact to interface with CERT-In. The information relating to a Point of Contact shall be sent to CERT-In in the format specified by it and shall be updated from time to time. All communications from CERT-In seeking information and providing directions for compliance shall be sent to the said Point of Contact.

Rule - 18. Dealing with non-compliance.

ll cases of non-compliance with respect to the communications seeking information under Rule 14 and directions issued for compliance under Rule 15 shall be submitted to the Review Committee constituted under Rule 19.

Rule - 19. Review Committee.

(1)     A Review Committee shall be constituted by the Central Government to review the.

(a)      non-compliance of the communication, seeking information under Rule 14, issued to the service providers, intermediaries, data centres, body corporate and any other person;

 

(b)      non-compliance of the directions issued to the service providers, intermediaries, data centres, body corporate and any other person under Rule 15;

 

(c)      terming non-compliance of directions within the time period specified under Rule 15 by any such named service providers, intermediaries, data centres, body corporate and any other person as an offence under sub-section (7) of Section 70-B of the Act.

 

(2)     The Review Committee shall consist of the following.

(I) Secretary, Department of Electronics and Information Technology

Chairman

(II) Joint Secretary, Ministry of Law and Justice

Member

(III) Joint Secretary Level Officer, Department of Telecommunications

Member

(IV) Joint Secretary, Ministry of Home Affairs

Member

(V) Group Coordinator (Cyber Law and e-Security), Department of Electronics & Information Technology

Member-Convenor

(3)     The Review Committee shall meet as often as necessary.

Rule - 20. Action for non-compliance of direction.

Based on the non-compliance report as submitted by the concerned aforesaid officer under Rule 16 and such direction of the Review Committee under Rule 19, the Director General shall authorise an officer of CERT-In to file a complaint before the court as provided under sub-section (8) Section 70-B of the Act.



[1] Vide Noti. No. G.S.R. 20(E), dated 16-1-2014, published in the Gazette of India, Extra., Part II, Section 3(i), dated 16-1-2014, pp. 12-16, No. 15

 

Priced to suit your business

Simple plans, no contract, no setup and hidden fees

Request Pricing Plans
Company
  • Our Team
  • Gallery
  • Contact Us
  • Careers
Information
  • Terms & Conditions
  • We value your Privacy
  • Newsletter
  • FAQ
  • Blog
  • Free Legal Aid
Products
  • Legal Research
  • Litigation Management Tool (Patrol)
  • LIBIL (Legal Worthiness)
  • Customised AI Solutions
Litigation Check
  • Criminal Record Check Online
  • Client Due Diligence
  • Customer Due Diligence
  • Tool For Legal Teams
  • Crime Database Search Tool
  • Criminal Background Verification
Legal Tech Solutions for Corporate
  • Case Management Tool for Corporate
  • Legal Research for Corporate
  • Customized Legal AI for Corporate
  • Legal Due diligence for Enterprise
Legal Tech Solutions for Law Firms
  • Case Management Tool for Law Firms
  • Legal Research for Law Firms
  • Legal Due diligence for Law Firms
  • Customized Legal AI for Law Firms
Legal Tech Solutions for Judiciary
  • Legal Research for Judiciary
Customers
  • Enterprise
  • Judiciary
  • Law Firms
Sectors
  • Background Verification
  • Financial Consulting & Support
  • Banking
  • Financial Risk & Advisory
  • Real Estate
  • Supply Chain & Logistics
  • Fintech
  • Insurance
Contact
India Flag

A-149, Block A, LGF, Defence Colony, New Delhi, India - 110024.

Follow Us
X (Twitter) Join Our Community
©2022 - LQ Global Services Private Limited. All rights reserved.
Section Access

Register to Access this Feature (No Payment Required)

Subscribe Us

Section Access is a Premium Feature. Please Register by Clicking Below button.