cyber security unit 5
cyber security unit 5
Unit 5
Contents to Study
Need for an Information Security Policies: An information security policy is a set of rules,
guidelines, and procedures that outline how an organization should manage, protect, and
distribute its information assets. The policy aims to reduce the risk of data breaches,
unauthorized access, and other security threats by providing a structured approach to information
security management.
An effective information security policy should be tailored to the organization's specific needs
and risk profile, as well as being regularly updated to account for changes in the threat landscape,
technology, and business environment.
Information security policies play a critical role in an organization's overall security posture.
They serve as a foundation for establishing a secure environment and mitigating potential risks.
The value of information security policies can be outlined as follows:
Cost savings: By proactively addressing security risks, organizations can reduce the
financial impact of security incidents, including costs associated with data breaches,
system downtime, and regulatory fines.
The AUP sets the ground rules for using an organization's IT resources, including computers,
mobile devices, networks, email systems, and the internet. It aims to prevent activities that may
compromise security, violate laws or regulations, or harm productivity. Key elements of an AUP
may include:
Guidelines for email and instant messaging usage (e.g., avoiding phishing scams, not
sharing sensitive information via email).
Rules for using social media and personal devices in the workplace.
This policy provides a framework for securing an organization's network infrastructure. It may
include:
Intrusion detection and prevention systems (e.g., monitoring for suspicious network
activity, automatic response mechanisms).
This policy defines how access to information assets is granted, managed, and monitored. It may
include:
Procedures for granting, modifying, and revoking access rights (e.g., approval workflows,
regular access reviews).
Logging and monitoring of user activities (e.g., tracking login attempts, auditing access to
sensitive data).
This policy governs the entire data lifecycle, from creation and storage to disposal. It may
include:
Handling procedures for different data types (e.g., storage locations, access restrictions,
encryption requirements).
Data backup and recovery processes (e.g., frequency, storage media, offsite storage).
Data retention and disposal policies (e.g., legal requirements, secure deletion methods).
Guidelines for sharing data internally and externally (e.g., secure file transfer methods,
third-party data sharing agreements).
This policy sets the rules for employees and contractors who access the organization's network
and resources remotely. It may include:
Device security guidelines (e.g., antivirus software, system updates, device encryption).
Restrictions on remote access locations and networks (e.g., prohibiting public Wi-Fi
connections).
Procedures for revoking remote access privileges (e.g., when an employee leaves the
organization).
Cyber Law also called IT Law is the law regarding Information-technology including
computers and the internet. It is related to legal informatics and supervises the digital
circulation of information, software, information security, and e-commerce.
IT law does not consist of a separate area of law rather it encloses aspects of contract,
intellectual property, privacy, and data protection laws. Intellectual property is a key element
of IT law. The area of software license is controversial and still evolving in Europe and
elsewhere.
According to the Ministry of Electronics and Information Technology, Government of
India:
Cyber Laws yields legal recognition to electronic documents and a structure to support e-filing
and e-commerce transactions and also provides a legal structure to reduce, check cybercrimes.
Importance of Cyber Law:
1. It covers all transactions over the internet.
2. It keeps eye on all activities over the internet.
3. It touches every action and every reaction in cyberspace.
Cyber laws contain different types of purposes. Some laws create rules for how individuals and
companies may use computers and the internet while some laws protect people from becoming
the victims of crime through unscrupulous activities on the internet. The major areas of cyber
law include:
Fraud:
Consumers depend on cyber laws to protect them from online fraud. Laws are made to prevent
identity theft, credit card theft, and other financial crimes that happen online. A person who
commits identity theft may face confederate or state criminal charges. They might also
encounter a civil action brought by a victim. Cyber lawyers work to both defend and prosecute
against allegations of fraud using the internet.
Copyright:
The internet has made copyright violations easier. In the early days of online communication,
copyright violations were too easy. Both companies and individuals need lawyers to bring an
action to impose copyright protections. Copyright violation is an area of cyber law that protects
the rights of individuals and companies to profit from their creative works.
Defamation:
Several personnel uses the internet to speak their mind. When people use the internet to say
things that are not true, it can cross the line into defamation. Defamation laws are civil laws that
save individuals from fake public statements that can harm a business or someone’s reputation.
When people use the internet to make statements that violate civil laws, that is called Defamation
law.
Harassment and Stalking:
Sometimes online statements can violate criminal laws that forbid harassment and stalking.
When a person makes threatening statements again and again about someone else online, there
is a violation of both civil and criminal laws. Cyber lawyers both prosecute and defend people
when stalking occurs using the internet and other forms of electronic communication.
Freedom of Speech:
Freedom of speech is an important area of cyber law. Even though cyber laws forbid certain
behaviors online, freedom of speech laws also allows people to speak their minds. Cyber lawyers
must advise their clients on the limits of free speech including laws that prohibit obscenity.
Cyber lawyers may also defend their clients when there is a debate about whether their actions
consist of permissible free speech.
Trade Secrets:
Companies doing business online often depend on cyber laws to protect their trade secrets. For
example, Google and other online search engines spend lots of time developing the algorithms
that produce search results. They also spend a great deal of time developing other features like
maps, intelligent assistance, and flight search services to name a few. Cyber laws help these
companies to take legal action as necessary to protect their trade secrets.
Every time you click a button that says you agree to the terms and conditions of using a
website, you have used cyber law. There are terms and conditions for every website that are
somehow related to privacy concerns.
Digital signatures have been given legal validity and sanction in the Act.
It has opened the doors for the entry of corporate companies for issuing Digital Signatures
Certificates in the business of being Certifying Authorities.
It gives authority to the companies or organizations to file any form, application, or any
other document with any office, authority, body, or agency owned or controlled by the
suitable Government in e-form using such e-form as may be prescribed by the suitable
Government.
The IT Act also addresses the important issues of security, which are so critical to the
success of electronic transactions.
Digital Personal Data Protection Act 2023 are formed to protect the rights and duties related to
the management of large amounts of digital personal data created in the economy. It aims to
maintain a balance between individual privacy rights and at the same allow data to be used for
various purposes. Recently Digital Personal Data Protection Act (DPDPA), 2023 was passed
that will replace the existing Information Technology Act, 2000, the Draft Indian
Telecommunication Bill, 2022, and a Policy addressing the governance of non-personal data.
There are numerous types of tools of protection that come under the term “intellectual property”.
Notable among these are the following:
1. Patent
2. Trademark
3. Geographical indications
4. Layout Designs of Integrated Circuits
5. Trade secrets
6. Copyrights
7. Industrial Designs
In cyberspace, sometimes one person makes a profit by using another person’s creation
without the owner’s consent. This is a violation of privacy, and it is protected by IPR. We
have certain laws to avoid violation of Intellectual Property Rights in cyberspace and when it
is violated, then additionally we have several remedies in law.
1. Linking –
It permits a Website user to visit another location on the Internet. By simply clicking on a
word or image on one Web page, the user can view another Web page elsewhere in the
world, or simply elsewhere on the same server as the original page.Linking damages the
rights or interests of the owner of the Linked webpage. It may create the supposition that the
two linked sites are the same and promote the same idea. In this way, the linked sites can lose
their income as it is often equal to the number of persons who visit their page.
2. Software Piracy –
Software piracy refers to the act of stealing software that is lawfully shielded. This stealing
comprises various actions like copying, spreading, altering, or trading the software. It also
comes under the Indian copyright act.
An example of software piracy is downloading a replica of Microsoft Word from any website
other than Microsoft to avoid paying for it as it is a paid software. Piracy can be of 3 types:
3. Cybersquatting –
Cybersquatting means unauthorized registration and use of Internet domain names that are
similar to any business’s trademarks, service marks, or company names. For example, let us
consider Xyz is a very famous company and the company hadn’t created a website yet. A
cybersquatter could buy xyz.com, looking to sell the domain to the company Xyz at a later
date for a profit. The domain name of a famous company can even be used to attract traffic
and this traffic will help cybersquatters earn a lot of money through advertising.
When more than one individual believes that they have the right to register a specific domain
name, then this can lead to a Domain Name Dispute. It arises when a registered trademark is
registered by another individual or organization who is not the owner of a trademark that is
registered.
Trademark means a mark capable of being depicted diagrammatically and which may
distinguish the products or services of one person from those of others and will embody the
form of products, their packaging, and combination of colors. A registered service mark
represents a service. Trademark infringement refers to the unlawful use of a trademark or
service mark which can cause ambiguity, fraud, or confusion about the actual company a
product or service came from. Trademark owners can take the help of the law if they believe
their marks are being infringed.
Scope of Coverage
1. Trade Marks
2. Patents
3. Copyrights
4. Industrial designs
5. Geographical indications
6. Layout designs of integrated circuit
7. Varieties of plant
8. Information Technology and Cybercrimes
9. Data protection
Governing Regulations
The TRIPS agreement has made way for the harmonization of Indian laws connected with
Intellectual Property Rights. The agreement was implemented with the minimum standards for
the protection of IPR. A time-frame has been specified within which the participating countries
are required to effect changes in their respective laws to meet the requisite compliance standards.
The rest of the article seeks to highlight the amendments brought forth by the agreement in
intellectual property laws.
Patents
Patent was first introduced to the realms of Indian business in the year 1911 courtesy of the
Indian Patent and Designs Act, 1911. This Act was superseded in the year 1972 with the
enforcement of the Patents Act, 1970. The Act, which is now the governing Act for Patents in the
country till now, went through an amendment in 2005 to be compliant with the TRIPS agreement
and is now known as the Patents (Amendments) Act, 2005. The Amendment oversaw the
extension of product patent to all fields of technology including foods, drugs, chemicals, and
micro-organisms. Furthermore, the provisions pertaining to Exclusive Marketing Rights (EMRs)
has been repealed and a provision enabling grant of a compulsory license has been framed as its
replacement. For Further References: Patent for Business Idea in India
Trademarks
A trademark is a unique symbol that differentiates one brand from the other and is considered
essential for protecting the brand from being illegally replicated. The TRIPS agreement for the
protection of trademarks incorporates the protection of distinguishing marks, recognition of
service marks, indefinite periodical renewal of registration, abolition of compulsory licensing of
trademarks, etc. In view of enacting the newly fabricated laws, the Indian Trade and
Merchandise Marks Act, 1958 was annulled to pave the way for the Trade Marks Act, 1999. The
newly introduced governing regulation is designed in accordance with the international systems
and practices mandated by the TRIPS agreement. The Trademarks Act of 1999 provides for the
registration of service marks, the filing of multiclass applications, enhancing the term of
trademark registration to 10 years, the recognition of the concept of well-known marks, etc. The
Indian legal framework has also extended the protection to Domain Names. While the previous
regulation merely included Goods and Services for the purpose of registration, the infringement
rules for the current regulations have been modified to include the unauthorized use of similar or
confusingly similar marks. These amendments provide lesser room for defaults. The police are
now entitled to seize any infringing materials without producing a warrant. Trademark
infringement could impose the defaulter with imprisonment for a term of at least 6 months,
which may extend to three years. This would be coupled with a fine of not less than Rs. 50,000
which may even go up to Rs. 2,00,00.
The Amendment of the Trademark Act in 2010 led to India’s foray into the Madrid Protocol in
2013, thereby enabling Indian entities to register their trademarks in 97 countries by filing a
single application form. Likewise, foreign entities of the member countries are also allowed to
register their marks in India. For Further References: Registrable Trademarks Relative Grounds
for Trademark Refusal
Copyright
Not many Acts in India has passed the test of time, but the Copyright Act falls among such
exceptions. The Act was formulated in the year 1957 and has been amended from time-to-time to
be on par with the international standards as specified in TRIPS. The Act preserves the right of
artistic endeavors which includes painting, sculpting, drawing, engraving, photography, artistic
craftsmanship, dramatic work, literary work, musical work, sound recording, and
cinematography. and is reflective of the Berne Convention for Protection of Literary and Artistic
Works, 1886 and the Universal Copyrights Convention. Apart from these two conventions, the
country is a party to the Geneva Convention for the protection of rights of Producers or
Phonograms. The country is also an active member of the World Intellectual Property
Organization (WIPO) and the United Nations Educational, Scientific and Cultural Organization
(UNESCO). The following are some of the featured provisions of the Act:
The Act doesn’t mandate the need for qualitative work, as any unique work with little in
common with other works qualify for this purpose.The creator of the work is accorded with
lifetime copyrights, which will continue to be valid a little more after his/her lifespan, i.e. until
60 years after his/her death.The creator is not only vested with rights of authorship but the rights
of protecting his/her works against any amendments.The year 1984 witnessed the inclusion of
computer programming into the Act.
In the event of any defaults, the Copyright Act provides for civil remedies in the following
manner:
1. Permeant injunction.
2. Damages or accounts of profits.
3. Delivery of the infringing material for destruction.
4. Provision of the cost of legal proceedings to the defender.
5. Imprisonment of a period ranging between 6 months and two years.
6. A fine ranging between Rs. 50,000 and Rs. 2,00,000.