Good Food Recipe

About good recipes, and about quality home cooking the best healthy dinner recipes from a good recipe in the UK.

Government monitoring of computer data

Context

Recently, the Ministry of Home Affairs issued an order in which security and intelligence agencies stored in the suspicious computer using the powers of sub-section (1) of Section 69 of the Information Technology Act-2000 with the Rule 4 of the Information Technology Rules, 2009. Information and data and calls are monitored for monitoring.

What is the dispute?

What data we keep in our computer … what are our online activities … who are our contacts …? These and other such questions are being raised after the order of the government in the eyes of the common people, in which the security and intelligence agencies of the country were empowered to monitor, synchronize and investigate the data present in any computer. Are there.

These questions are related to one more question … Will the government be really looking at our computers?

What is the government say?

The government says that this is not a new rule. Under Section 69 of the Information Technology Act-2000, if any person misuses the expression of freedom and it is a challenge for the security of the nation, then the rights agencies can take action. Only their computers are monitored, which are challenges for national security, integrity and involve in terrorist activities. Computer or data of ordinary people are not monitored

Why Need Data Monitoring?

No general monitoring instruction has been issued in the recent notification and this decision has been taken in view of national security. Adequate security arrangements have been made keeping in view national security. Authorized Central agencies have been allowed to interfere, monitor and break their password in the information produced, transmitted, received or stored in any computer under the Information Technology Act. This order is in the interest of national security and public order and it is already in law. In this it is said only that there are authorized agencies for this and it is only under Section 69 of the IT Act. This section of IT Act permits intervention, monitoring or breaking of password for any information generated, transmitted and stored in any computer in national security and public interest.

These agencies have been given the right to monitor

In the latest notification, 10 security and intelligence agencies have been given powers to monitor computer and IT related equipment:

  • Intelligence Bureau (IB)
  • Narcotics control bureau (NCB)
  • Enforcement Directorate (ED)
  • Central Board of Direct Taxes (CBDT)
  • Directorate of Revenue Intelligence (DRI)
  • Central Bureau of Investigation (CBI)
  • National Investigation Agency (NIA)
  • Cabinet Secretariat (RAW-RAW)
  • Directorate of Signal Intelligence (only for Jammu and Kashmir, North Eastern and Assam service areas)
  • Commissioner of Police, Delhi

What does the recent release notification?

Rule 2009 ie Rule 4 of the Information Technology (Process and Safety for monitoring and monitoring of information) Rules, 2009, provides that … the competent authority does not allow any government agency to To create, monitor, monitor or investigate the information generated, transmitted, received or preserved in computer resources for the purposes mentioned in subsection (1) of section 69 of the Act. Can AD.

  • In accordance with the rules framed in 2009 and since then, the statutory order has been released on December 20, according to the effective rules.
  • No new authority has been given to the agency implementing any security or law through this order.
  • Notification has been issued to notify ISPs, TSPs, intermediaries etc. to encode existing orders.
  • For each case connected, investigated, monitored and investigated, it has to be approved by the competent authority i.e. the Central Home Secretary.

Leave a Reply

Your email address will not be published. Required fields are marked *