3
Most read
12
Most read
16
Most read
INFORMATION TECHNOLOGY POLICY
-
NEED OF THE HOUR
By
Vijay Pal Dalmia, Advocate
Partner & Head of Intellectual Property & Information Technology Laws Practice
 Liable for the acts of Employees and Agents etc.
◦ Strict Liability
◦ Vicarious Liability
 Data
◦ Protection and
◦ Secrecy
 Are the norm of the day.
WHY “IT POLICY”!
 Email and Internet Usage
 Laptop/Desktop Usage
 Hardware Usage
◦ Data card
◦ Pen Drive
 Security of Computer Network
◦ System Access
◦ Virus Protection
◦ Installation Rights
 System back up and Maintenance
 Third Party and Remote Access
Data of the Company forms its valuable IP Assets.
 Data may include
◦ Patents
◦ Designs
◦ Copyrights
◦ Trade Secrets (Unpatented)
◦ Customer Data
◦ Business Data
◦ Business Methods
◦ Third Party Data
◦ Formulas
◦ Source Code
◦ Employee Information
WHY “IT POLICY”! .. Continued..
 A company may be UNDER LAW obliged to protect the sensitive
personal data of its customers and employees.
◦ Reference:
 Information Technology Act, 2000
 Holds the Company liable
 Civil action- compensation under Section 43A
 Criminal action- Punishment under Section 72A
for failure to protect any sensitive personal data which its owns,
controls or operates.
◦ Promulgation of Information Technology (Reasonable security
practices and procedures and sensitive personal data or
information) Rules, 2011
 Provides for mandatory Privacy policy for protection of sensitive
personal data.
LEGAL & CONTRACTUAL
OBLIGATION OF A COMPANY!
◦ A Company may be held liable
 To pay Compensation
or
 Criminal Prosecution
For
 Negligent in handling of data,
information leading to DEFAMATION
 Use of unauthorized or pirated software
 A company may also be held liable for criminal
prosecution
◦ Tampering of computer source documents- u/s 65 of the IT Act, 2000
◦ Sending of offensive messages u/s 66A of the IT Act, 2000 through
 Computer resources & Communication devices
◦ Punishment for identity theft- u/s 66C of the IT Act, 2000
◦ Use of computer resource for cheating by impersonation-
 u/s 66D of the IT Act, 2000
◦ Violation of privacy by use of electronic means of a company-
 u/s 66E of the IT Act, 2000.
◦ Publication or transmission of obscene material in electronic form-
 u/s 67 of the IT Act, 2000
Information technology means & includes:
computers,
computer-based networks,
computer peripherals,
operating systems,
e-mail,
Intranet,
software or any combination thereof,
that are made available by a Company for the purpose of
supporting its goals of providing quality products and services
to customers, increase shareholder value and foster employment
satisfaction.
IT Resources of the Company may Include
 Time Management
◦ Office hours can be used only for official work thereby enhancing
productivity
 Utilization and Management
◦ Company resources including computer resources for maximum
 Employer & Employee Relationship
 Customer Relationship
 Poaching can be curbed
 Reduces the risk of use of pirated and unauthorized use of software
 Bandwidth Protection
◦ Authorized Official use of Company network and resources can
increase the functioning of IT system.
ADVANTAGES OF IT POLICY
Information Technology policy intends to:-
Establish a culture of security and trust for all employees;
Establish guidelines governing proper use of IT and Internet by
all employees;
Ensure the use of internet only as a tool for continuous
improvement of efficiency and performance;
Fixing the Responsibility & Liability;
Contd…..
OBJECTIVE & PURPOSE OF
INFORMATION TECHNOLOGY POLICY
 To supplement, not replace, all existing laws, regulations,
agreements, and contracts;
 Preserve the integrity of the information technology systems;
 Protect IT systems against the accidents, failures
or improper use;
 Reserves the right to access confidential data;
Contd/--
OBJECTIVE & PURPOSE OF
INFORMATION TECHNOLOGY POLICY….
Reserves and limit to copy, remove or alter any data,
file or system resources;
Maintain a high level of professionalism in keeping
with Code of Ethics;
Maintain Company’s reputation among trade and
public.
 Most of our communications are now electronic.
 Recipients of electronic documents like
◦ agents,
◦ distributors,
◦ customers etc.
needs the source and authenticity
of the documents or messages.
 Satisfy audit requirements
Contd….
 Assist in compliance with applicable
◦ laws
◦ Regulations
◦ Guidelines and recommendations
 Mitigate risk from a security incident
 Educate users on sound security
practices
 Reduce legal risk
INTRUSIONS
ARE
NOT
ALW
AYS AS
OBVIOUS
AS THIS
EXAM
PLE
Espionage
Employees falling to the lure or trap
of RIVALS, and passing sensitive and
secure data of the company.
Damage to Goodwill,
Reputation,
Credibility of the
Company.
Harassment
Viewing inappropriate content, such as
pornography, hate or violence, can create
an environment that is hostile and
offensive for co-workers, and can damage
reputation of a company.
Productivity
Frequent online browsing,
shopping, and chatting can get
in the way of getting the work
done, and often leads to
resentment from the coworkers
Viruses
Visiting less than reputable
websites can lead to viruses,
spyware, or other malicious
software getting into the
network.
Service Interruptions
Large downloads and
streaming audio and video can
suck up network resources
that other employees need to
do work and service customers
 All
◦ Directors
◦ Employees,
◦ Part-time employees,
◦ Industrial Trainees,
◦ Contractors,
◦ Agents,
◦ & …..others
of an organization directly or indirectly
associated with the conduct of business of the
organization.
Information Technology Policy for Corporates - Need of the Hour
Would you be proud to wear your browser history?
Would you be embarrassed if your boss
or your peers saw where you’ve been going?
Portable media (CDs, flash drives)
should not be left on the desk
Passwords (pencil) should not be
posted
Sensitive FAX or call logs
should be put away
Drinks should not be kept near
workstations
 Vaish Associates Advocates
New Delhi   Mumbai    Gurgaon   Bengaluruǀ ǀ ǀ
Celebrating 40 years of professional excellence
IPR & IT Laws Practice Division
1st  & 11th
 Floors   Mohan Dev Building   13, Tolstoy Marg   New Delhi 110001 (India)ǀ ǀ ǀ
Phone: +91 11 49292532 (Direct)
Mobile: +91 9810081079
Phone: +91 11 49292525 (Board)
Fax: +91 11 23320484
www.vaishlaw.com
email:- vpdalmia@vaishlaw.com 
Intellectual Property & Information Technology Laws Division

More Related Content

PPTX
PPT
IT Policy
PPT
It Policies
PDF
Information Technology policy
PDF
ICT Awareness Programme
PPT
Cyber security awareness training by cyber security infotech(csi)
PDF
FREE A4 Cyber Security Awareness Posters-Device Security
DOC
Sample IT Policy
IT Policy
It Policies
Information Technology policy
ICT Awareness Programme
Cyber security awareness training by cyber security infotech(csi)
FREE A4 Cyber Security Awareness Posters-Device Security
Sample IT Policy

What's hot (20)

PPTX
InformationSecurity
PPTX
Cyber Security Awareness Program.pptx
PDF
Security Awareness Training
PPTX
Access control
PDF
Cybersecurity Employee Training
PPTX
Data Security - English
PPTX
Security Policies and Standards
PPSX
Security policies
PPTX
Browser forensics
PPT
Basics of Information System Security
PPTX
ICT and end user security awareness slides
PPTX
Information Security Awareness
PPTX
Information Security Awareness Training Open
PPT
Information Security Policies and Standards
PPTX
Information security
PPTX
Cyber security
PDF
Cyber Forensics Module 1
PDF
Security Awareness Training
PDF
Data Loss Prevention: Challenges, Impacts & Effective Strategies
PPTX
Incident response
InformationSecurity
Cyber Security Awareness Program.pptx
Security Awareness Training
Access control
Cybersecurity Employee Training
Data Security - English
Security Policies and Standards
Security policies
Browser forensics
Basics of Information System Security
ICT and end user security awareness slides
Information Security Awareness
Information Security Awareness Training Open
Information Security Policies and Standards
Information security
Cyber security
Cyber Forensics Module 1
Security Awareness Training
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Incident response
Ad

Viewers also liked (19)

PPT
3.5 ICT Policies
PPT
3.4 ict strategy
PPT
COBIT and IT Policy Presentation
PPTX
INFORMATION AND COMMUNICATION TECHNOLOGY (ICT) POLICY 2014
PPTX
Introduction to ITIL Service Management
DOCX
Lorette Hanna CV
PPT
Ict policy planning and implementation issues
PPTX
ITIL® INTERMEDIATE CAPABILITY OSA_BOOSTurSKILLS
PPT
Itil introduction
PPTX
ITIL(v3): A Beginers Guide
PPTX
The how, why and what of ITIL® certifications
PDF
Adopting ITIL framework
PDF
ITIL® V3 Foundation Exam Tutorial
PDF
Itil Mind Maps
PPTX
3.7 developing ict solutions
PPT
June2007 Implementing Itil Problem Mgmt
PPT
FCAPS from an ITIL perspective
PPTX
3.10 Introducing large ict systems into organisations
PDF
ITIL & CMMI for Services
3.5 ICT Policies
3.4 ict strategy
COBIT and IT Policy Presentation
INFORMATION AND COMMUNICATION TECHNOLOGY (ICT) POLICY 2014
Introduction to ITIL Service Management
Lorette Hanna CV
Ict policy planning and implementation issues
ITIL® INTERMEDIATE CAPABILITY OSA_BOOSTurSKILLS
Itil introduction
ITIL(v3): A Beginers Guide
The how, why and what of ITIL® certifications
Adopting ITIL framework
ITIL® V3 Foundation Exam Tutorial
Itil Mind Maps
3.7 developing ict solutions
June2007 Implementing Itil Problem Mgmt
FCAPS from an ITIL perspective
3.10 Introducing large ict systems into organisations
ITIL & CMMI for Services
Ad

Similar to Information Technology Policy for Corporates - Need of the Hour (20)

PPTX
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
PPT
Information ethics & intro to information security
PPT
Ethics and information security 2
PPTX
Corporate ethics
PPTX
Information security: importance of having defined policy & process
PPTX
corporateethics11111111111111111111.pptx
PPTX
chapter 5.pptxggggggggggggggggggggggggggg
PDF
A Case For Information Protection Programs
PPT
Information Ethics
PPTX
02 Legal, Ethical, and Professional Issues in Information Security
PPTX
Legal, Ethical, and Professional Issues In Information Security
PPTX
Laws and ethics in information assurance
PDF
Surveillance of Your Electronic Systems
PPTX
Law and Order in PK in a country is most important
PDF
Chapter 12 iso 27001 awareness
PPT
Legal aspects of IT Security-at ISACA conference 2011
PDF
Lecture 8.pdf
PDF
internet security and cyber lawUnit1
PPTX
egal, Ethical, and Professional Issues in Information Security.pptx
PDF
Regulatory Compliance under the Information Technology Act, 2000
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Information ethics & intro to information security
Ethics and information security 2
Corporate ethics
Information security: importance of having defined policy & process
corporateethics11111111111111111111.pptx
chapter 5.pptxggggggggggggggggggggggggggg
A Case For Information Protection Programs
Information Ethics
02 Legal, Ethical, and Professional Issues in Information Security
Legal, Ethical, and Professional Issues In Information Security
Laws and ethics in information assurance
Surveillance of Your Electronic Systems
Law and Order in PK in a country is most important
Chapter 12 iso 27001 awareness
Legal aspects of IT Security-at ISACA conference 2011
Lecture 8.pdf
internet security and cyber lawUnit1
egal, Ethical, and Professional Issues in Information Security.pptx
Regulatory Compliance under the Information Technology Act, 2000

More from Vijay Dalmia (20)

PPTX
DIGITAL PERSONAL DATA PROTECTION ACT 2023-PPT-VPD.pptx
PPTX
Enforcement Of Intellectual Property Rights Through Customs
PPTX
White Collar Crime by Vijay Pal Dalmia.pptx
PPTX
Taxation of Cryptocurrencies – Virtual Digital Assets in India-VPDalmia.pptx
PPT
Indian Approach On Bitcoins-cryptocurrencies- Blockchain Legal Practical Pe...
PPTX
Police Remand- Judicial Remand & Default Bail-Vijay Pal Dalmia Advocate.pptx
PPTX
Police Remand Judicial Remand & Default bail by Vijay Pal Dalmia Advocate
PPT
Indian approach on bitcoins, cryptocurrencies and blockchain – legal practica...
PDF
Sanction for prosecution of offences under chapter xii of the income tax act
PDF
Reasonable security practices and procedures and sensitive personal data or i...
PDF
Guide for de-mystifying law of trade mark enfocrement and litigation in india
PPT
IPR Enforcement in India through Criminal Measures - By Vijay Pal Dalmia
PDF
Process of criminal trial in india
PPT
LAW OF THE SEMICONDUCTOR INTEGRATED CIRCUITS IN INDIA By Vijay Pal Dalmia
PPT
Reasonable security practices and procedures and sensitive personal data or i...
PPT
Types of electronic contracts
PPT
Ipr enforcement in india
PPT
Patent law and Indian perspective
PPTX
Wills in the indian perspective
PDF
Law of Tele-medicine in India
DIGITAL PERSONAL DATA PROTECTION ACT 2023-PPT-VPD.pptx
Enforcement Of Intellectual Property Rights Through Customs
White Collar Crime by Vijay Pal Dalmia.pptx
Taxation of Cryptocurrencies – Virtual Digital Assets in India-VPDalmia.pptx
Indian Approach On Bitcoins-cryptocurrencies- Blockchain Legal Practical Pe...
Police Remand- Judicial Remand & Default Bail-Vijay Pal Dalmia Advocate.pptx
Police Remand Judicial Remand & Default bail by Vijay Pal Dalmia Advocate
Indian approach on bitcoins, cryptocurrencies and blockchain – legal practica...
Sanction for prosecution of offences under chapter xii of the income tax act
Reasonable security practices and procedures and sensitive personal data or i...
Guide for de-mystifying law of trade mark enfocrement and litigation in india
IPR Enforcement in India through Criminal Measures - By Vijay Pal Dalmia
Process of criminal trial in india
LAW OF THE SEMICONDUCTOR INTEGRATED CIRCUITS IN INDIA By Vijay Pal Dalmia
Reasonable security practices and procedures and sensitive personal data or i...
Types of electronic contracts
Ipr enforcement in india
Patent law and Indian perspective
Wills in the indian perspective
Law of Tele-medicine in India

Recently uploaded (20)

PPTX
white collar crime .pptx power function and punishment
PDF
2022CH12581 - Civil Rights vs Morzak, Harrison, Chrisman et al. (Cook County,...
PDF
AI in Modern Warfare and Business Ethics Ortynska Law Ventures Cafe.pdf
PPT
Judicial Process of Law Chapter 2 Law and Legal Systems
PDF
Divorce Attorney Chicago – Guiding You Through Every Step
PPTX
Philippine Politics and Governance - Lesson 10 - The Executive Branch
PPTX
RA 11313 (Anti Bastos Law) by Romielyn Abecia.pptx
PPTX
kabarak lecture 2.pptx on development of family law in kenya
PPTX
Rights of the Accused Presentation CLEPI
PDF
Avoiding Costly Pitfalls Critical Errors That Could Sabotage Your OFAC Compli...
PDF
CORPORATE GOOD GOVERNANCE_ CONTEMPORARY TRENDS AND CHALLENGES (1).pdf
PPT
Gender sensitivity and fair language implementation
PDF
Common Estate Planning Mistakes to Avoid in Wisconsin
PPTX
Unit 2The Making of India's Constitution
DOCX
CHAPTER 1 OBLICON.............................
PPTX
Constitution of india module one of ktu
PDF
Palghar-286Nilemore-VoterList-Aug25-1.pdf
PDF
Brown and Beige Vintage Classic Illustration Paper Project History Presenta_2...
PDF
devolution-handbook (1).pdf the growh of devolution from 2010
PDF
8-14-25 Examiner Report from NJ Bankruptcy (Heller)
white collar crime .pptx power function and punishment
2022CH12581 - Civil Rights vs Morzak, Harrison, Chrisman et al. (Cook County,...
AI in Modern Warfare and Business Ethics Ortynska Law Ventures Cafe.pdf
Judicial Process of Law Chapter 2 Law and Legal Systems
Divorce Attorney Chicago – Guiding You Through Every Step
Philippine Politics and Governance - Lesson 10 - The Executive Branch
RA 11313 (Anti Bastos Law) by Romielyn Abecia.pptx
kabarak lecture 2.pptx on development of family law in kenya
Rights of the Accused Presentation CLEPI
Avoiding Costly Pitfalls Critical Errors That Could Sabotage Your OFAC Compli...
CORPORATE GOOD GOVERNANCE_ CONTEMPORARY TRENDS AND CHALLENGES (1).pdf
Gender sensitivity and fair language implementation
Common Estate Planning Mistakes to Avoid in Wisconsin
Unit 2The Making of India's Constitution
CHAPTER 1 OBLICON.............................
Constitution of india module one of ktu
Palghar-286Nilemore-VoterList-Aug25-1.pdf
Brown and Beige Vintage Classic Illustration Paper Project History Presenta_2...
devolution-handbook (1).pdf the growh of devolution from 2010
8-14-25 Examiner Report from NJ Bankruptcy (Heller)

Information Technology Policy for Corporates - Need of the Hour

  • 1. INFORMATION TECHNOLOGY POLICY - NEED OF THE HOUR By Vijay Pal Dalmia, Advocate Partner & Head of Intellectual Property & Information Technology Laws Practice
  • 2.  Liable for the acts of Employees and Agents etc. ◦ Strict Liability ◦ Vicarious Liability  Data ◦ Protection and ◦ Secrecy  Are the norm of the day. WHY “IT POLICY”!
  • 3.  Email and Internet Usage  Laptop/Desktop Usage  Hardware Usage ◦ Data card ◦ Pen Drive  Security of Computer Network ◦ System Access ◦ Virus Protection ◦ Installation Rights  System back up and Maintenance  Third Party and Remote Access
  • 4. Data of the Company forms its valuable IP Assets.  Data may include ◦ Patents ◦ Designs ◦ Copyrights ◦ Trade Secrets (Unpatented) ◦ Customer Data ◦ Business Data ◦ Business Methods ◦ Third Party Data ◦ Formulas ◦ Source Code ◦ Employee Information WHY “IT POLICY”! .. Continued..
  • 5.  A company may be UNDER LAW obliged to protect the sensitive personal data of its customers and employees. ◦ Reference:  Information Technology Act, 2000  Holds the Company liable  Civil action- compensation under Section 43A  Criminal action- Punishment under Section 72A for failure to protect any sensitive personal data which its owns, controls or operates. ◦ Promulgation of Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011  Provides for mandatory Privacy policy for protection of sensitive personal data. LEGAL & CONTRACTUAL OBLIGATION OF A COMPANY!
  • 6. ◦ A Company may be held liable  To pay Compensation or  Criminal Prosecution For  Negligent in handling of data, information leading to DEFAMATION  Use of unauthorized or pirated software
  • 7.  A company may also be held liable for criminal prosecution ◦ Tampering of computer source documents- u/s 65 of the IT Act, 2000 ◦ Sending of offensive messages u/s 66A of the IT Act, 2000 through  Computer resources & Communication devices ◦ Punishment for identity theft- u/s 66C of the IT Act, 2000 ◦ Use of computer resource for cheating by impersonation-  u/s 66D of the IT Act, 2000 ◦ Violation of privacy by use of electronic means of a company-  u/s 66E of the IT Act, 2000. ◦ Publication or transmission of obscene material in electronic form-  u/s 67 of the IT Act, 2000
  • 8. Information technology means & includes: computers, computer-based networks, computer peripherals, operating systems, e-mail, Intranet, software or any combination thereof, that are made available by a Company for the purpose of supporting its goals of providing quality products and services to customers, increase shareholder value and foster employment satisfaction. IT Resources of the Company may Include
  • 9.  Time Management ◦ Office hours can be used only for official work thereby enhancing productivity  Utilization and Management ◦ Company resources including computer resources for maximum  Employer & Employee Relationship  Customer Relationship  Poaching can be curbed  Reduces the risk of use of pirated and unauthorized use of software  Bandwidth Protection ◦ Authorized Official use of Company network and resources can increase the functioning of IT system. ADVANTAGES OF IT POLICY
  • 10. Information Technology policy intends to:- Establish a culture of security and trust for all employees; Establish guidelines governing proper use of IT and Internet by all employees; Ensure the use of internet only as a tool for continuous improvement of efficiency and performance; Fixing the Responsibility & Liability; Contd….. OBJECTIVE & PURPOSE OF INFORMATION TECHNOLOGY POLICY
  • 11.  To supplement, not replace, all existing laws, regulations, agreements, and contracts;  Preserve the integrity of the information technology systems;  Protect IT systems against the accidents, failures or improper use;  Reserves the right to access confidential data; Contd/-- OBJECTIVE & PURPOSE OF INFORMATION TECHNOLOGY POLICY….
  • 12. Reserves and limit to copy, remove or alter any data, file or system resources; Maintain a high level of professionalism in keeping with Code of Ethics; Maintain Company’s reputation among trade and public.
  • 13.  Most of our communications are now electronic.  Recipients of electronic documents like ◦ agents, ◦ distributors, ◦ customers etc. needs the source and authenticity of the documents or messages.  Satisfy audit requirements Contd….
  • 14.  Assist in compliance with applicable ◦ laws ◦ Regulations ◦ Guidelines and recommendations  Mitigate risk from a security incident  Educate users on sound security practices  Reduce legal risk INTRUSIONS ARE NOT ALW AYS AS OBVIOUS AS THIS EXAM PLE
  • 15. Espionage Employees falling to the lure or trap of RIVALS, and passing sensitive and secure data of the company. Damage to Goodwill, Reputation, Credibility of the Company.
  • 16. Harassment Viewing inappropriate content, such as pornography, hate or violence, can create an environment that is hostile and offensive for co-workers, and can damage reputation of a company. Productivity Frequent online browsing, shopping, and chatting can get in the way of getting the work done, and often leads to resentment from the coworkers Viruses Visiting less than reputable websites can lead to viruses, spyware, or other malicious software getting into the network. Service Interruptions Large downloads and streaming audio and video can suck up network resources that other employees need to do work and service customers
  • 17.  All ◦ Directors ◦ Employees, ◦ Part-time employees, ◦ Industrial Trainees, ◦ Contractors, ◦ Agents, ◦ & …..others of an organization directly or indirectly associated with the conduct of business of the organization.
  • 19. Would you be proud to wear your browser history? Would you be embarrassed if your boss or your peers saw where you’ve been going?
  • 20. Portable media (CDs, flash drives) should not be left on the desk Passwords (pencil) should not be posted Sensitive FAX or call logs should be put away Drinks should not be kept near workstations
  • 21.  Vaish Associates Advocates New Delhi   Mumbai    Gurgaon   Bengaluruǀ ǀ ǀ Celebrating 40 years of professional excellence IPR & IT Laws Practice Division 1st  & 11th  Floors   Mohan Dev Building   13, Tolstoy Marg   New Delhi 110001 (India)ǀ ǀ ǀ Phone: +91 11 49292532 (Direct) Mobile: +91 9810081079 Phone: +91 11 49292525 (Board) Fax: +91 11 23320484 www.vaishlaw.com email:- [email protected]  Intellectual Property & Information Technology Laws Division