SlideShare uma empresa Scribd logo
1 de 14
Need for having Security, Email & Internet Usage Policy
in Companies - Legal requirements and implications
BY
VIJAY PAL DALMIA, ADVOCATE
SUPREME COURT OF INDIA & DELHI HIGH COURT
M O BI L E: + 9 1 9 8 10081079 E MAI L: V P DALMIA@GMAI L.COM
All organizations must have a robust IT Security, Email & Internet Usage Policy, which should be strictly implemented to
establish standard practices and rules for responsible, safe and productive use of the Electronic mail (e-mail) and the
internet; and to ensure the protection of information/data of the Organisation and prevention of any misuse thereof.
It is a fact of life that most of the Organisations do not have any Data, IT Security, Email & Internet Usage Policy, or may
be having inadequate policies, which fail to protect and safeguard the interest of the organizations and their
management, leading to the risk of unwarranted criminal and civil consequences.
The effective implementation of policies for the protection of data, misuse of internet and emails, becomes difficult in
the court of law in the absence of a well-defined policy, which is duly acknowledged by the employees of the
organizations. The safeguard of data, e-mail system and network of an Organisation has come to play an extremely vital
role in today's fast moving, but invariably technically fragile, business environment. The first step towards enhancing a
company's security is the introduction of a precise yet legally enforceable security policy, informing employees/staff on
the various aspects of their responsibilities, general use of company resources and explaining how sensitive information
must be handled. The policy should also describe in detail the meaning of acceptable use, as well as clearly list the
prohibited activities.
WHY SHOULD AN ORGANIZATION HAVE AN IT POLICY?
Because an organization, its officers including its Directors and Principal Officers, may be directly
and vicariously liable for the acts of organizations' Employees and Agents, etc.,
◦ Under the law relating to
◦ Strict Liability,
◦ Vicarious Liability.
Because Data Protection and Secrecy has become the norm of the day, and it's obligatory to protect
data.
Because every organization is legally obliged to protect its employees, clients and customers from
illegal, unauthorized, inappropriate and unwarranted
◦ Use of
◦ Email;
◦ Internet Usage;
◦ Laptop/Desktops;
◦ Hardware;
◦ Data card;
◦ Pen Drive.
WHY SHOULD AN ORGANIZATION HAVE AN IT POLICY?
Because all organizations need to secure
◦ Computer Network; and
◦ Against Unauthorized System Access to prevent data theft, virus, and malware attacks.
Because every organization needs to prevent its employees from installing illegal software,
directly through internet or CD’s, etc., which exposes an organization to copyright violations.
This can be effected by controlling software Installation Rights.
Because every organization has to create system back up and maintain its IT infrastructure.
Because every organization must control unauthorized Third Party and Remote Access to its
computers and IT network.
WHY SHOULD AN ORGANIZATION HAVE AN IT POLICY?
Because Data of a Company includes its valuable Intellectual Property Assets, which may include
◦ Patents,
◦ Designs,
◦ Copyrights,
◦ Trade Secrets (Unpatented),
◦ Customer Data,
◦ Business Data,
◦ Business Methods,
◦ Third Party Data,
◦ Formulas,
◦ Source Code,
◦ Employee Information.
◦ Know-how
◦ Confidential Information
WHY SHOULD AN ORGANIZATION HAVE AN IT POLICY?
Because an organization may be under a LEGAL & CONTRACTUAL OBLIGATION:
◦ to protect the Sensitive Personal Data of its customers and employees, under the Information
Technology Act, 2000; and
◦ in case of violation of your organization’s legal obligation,
◦ All persons who are directly responsible for the day to management of your organization including its directors and principal
officers may be held legally liable for
◦ Civil action, i.e., compensation under Section 43A, and
◦ Criminal action, i.e., Punishment under Section 72A,
◦ For failure to protect any sensitive personal data which its owns, controls or operates.
◦ As Information Technology (Reasonable security practices and procedures and sensitive personal data
or information) Rules, 2011
◦ provide for having Mandatory Privacy Policy for protection of sensitive personal data.
WHY SHOULD AN ORGANIZATION HAVE AN IT POLICY?
◦ The organization and it's all principal officer and directors may be held liable,
◦ to pay Compensation,
or
◦ for Criminal Prosecution for
◦ Negligent handling of data or information leading to DEFAMATION; or
◦ Use of unauthorized or pirated software.
◦ The organization and it's all principal officer including its directors may also be held liable for criminal
prosecution,
◦ Tampering of computer source documents- u/s 65 of the IT Act, 2000,
◦ Sending of offensive messages u/s 66A of the IT Act, 2000 through
◦ Computer resources & Communication devices,
◦ Punishment for identity theft- u/s 66C of the IT Act, 2000,
◦ Use of computer resource for cheating by impersonation- u/s 66D of the IT Act, 2000,
◦ Violation of privacy by use of electronic means of a company- u/s 66E of the IT Act, 2000,
◦ Publication or transmission of obscene material in electronic form- u/s 67 of the IT Act, 2000.
Information technology resources
It is important to note that Information technology resources (IT resources) of a company may
include:
◦ computers,
◦ computer-based networks,
◦ computer peripherals,
◦ operating systems,
◦ e-mail,
◦ Intranet,
◦ software or any combination thereof
◦ that are made available by a Company to support its goals of providing quality products and services to customers, increase
shareholder value and foster employee satisfaction.
TO WHOM DOES IT POLICY APPLY?
IT Policy of the organization should be universally applicable across the organization, including
its
•Directors
•Employees,
•Part-time employees,
•Industrial Trainees,
•Contractors,
•Agents,
•& all others, who may be directly or indirectly associated with the conduct of the business of the
organization.
ADVANTAGES OF HAVING AN IT POLICY:
Time Management, as office hours can be used only for official work thereby enhancing
productivity.
Optimum and efficient utilization and management of company resources including computer
resources for maximum efficiency.
Maintaining healthy, cordial and predefined Employer & Employee Relationship.
Customer Relationship.
Prevent Poaching of your human resource.
Leads to Reduction in the risk of use of pirated and unauthorized use of the software.
Authorized Official use of Company network and resources can improve the functioning of IT
system, which also leads to Bandwidth Protection.
OBJECTIVES & PURPOSE OF HAVING AN INFORMATION
TECHNOLOGY POLICY
◦ Establishing a culture of security and trust for all employees;
◦ Providing guidelines governing proper use of IT and Internet by all employees;
◦ Ensuring the use of internet only as a tool for continuous improvement of efficiency and performance;
◦ Fixing the responsibility & liability in case of misuse of IT resources;
◦ Preserving the integrity of the information technology systems;
◦ Protecting IT systems against the accidents, failures or improper use;
◦ Controlled right to access confidential data;
◦ Controlling of copying, removal or alteration of any data, file or system resources;
◦ Maintenance of a high level of professionalism in keeping with Code of Ethics;
◦ Maintaining Company’s reputation among trade and public;
◦ To supplement, not replace, all existing laws, regulations, agreements, and contracts.
IT POLICY IS THE WAY TO GO AHEAD, AS:
Most of our communications are now electronic.
Recipients of electronic documents, like
◦ agents,
◦ distributors,
◦ Customers etc.
◦ Need the source and authenticity of the documents or messages.
It may satisfy audit requirements.
It assists in compliance with applicable laws, Regulations, Guidelines, and recommendations.
It mitigates risk from a security breach.
Such policy educates users on sound security practices, and
Having such a policy leads to a reduction of legal risk.
RISK FACTOR INVOLVED IN NOT HAVING AN EFFECTIVE
IT POLICY
Espionage: Employees are falling to the lure or trap of RIVALS, and passing sensitive and secure
data of the organization.
Damage to Goodwill, Reputation, Credibility of the organization.
Harassment: Viewing inappropriate content, such as pornography, hate or violence, can create
an environment that is hostile and offensive for co-workers, and can damage the reputation of
the organization.
Viruses: Visiting less than reputable websites can lead to viruses, spyware, or other malicious
software getting into the network.
Productivity: Frequent online browsing, shopping, and chatting can get in the way of getting the
work done, and often leads to resentment from the coworkers.
Service Interruptions: Large downloads and streaming audio and video can suck up network
resources that other employees need to do work and service customers
VIJAY PAL DALMIA, Advocate
Supreme Court of India & Delhi High Court
1st, 9th & 11th Floors ǀ Mohan Dev Building ǀ 13, Tolstoy Marg ǀ New Delhi 110001 (India)
Phone: +91 11 42492532 (Direct)
Mobile: +91 9810081079
email:- vpdalmia@gmail.com

Mais conteúdo relacionado

Semelhante a Need for having Security, Email & Internet Usage Policy in Companies - Legal requirements and implications- Vijay Pal Dalmia-Advocate

Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital AgeManaging Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital AgePerficient, Inc.
 
Free_business_IT_security_policy_template_v5.pdf
Free_business_IT_security_policy_template_v5.pdfFree_business_IT_security_policy_template_v5.pdf
Free_business_IT_security_policy_template_v5.pdfklodianelezi1
 
Risk Insight - Employee Internet Usage at Work
Risk Insight - Employee Internet Usage at WorkRisk Insight - Employee Internet Usage at Work
Risk Insight - Employee Internet Usage at WorkGary Chambers
 
Information Ethics
Information EthicsInformation Ethics
Information EthicsUMaine
 
Internet Policy Final Project (Group 6)
Internet Policy Final Project (Group 6)Internet Policy Final Project (Group 6)
Internet Policy Final Project (Group 6)Matthew Charles
 
The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law Owako Rodah
 
Legal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxLegal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxfatimagull32
 
Shutting the digital gate - data preservation and HR
Shutting the digital gate - data preservation and HRShutting the digital gate - data preservation and HR
Shutting the digital gate - data preservation and HRsarah kabirat
 
Data privacy and security in uae
Data privacy and security in uaeData privacy and security in uae
Data privacy and security in uaeRishalHalid1
 
3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docx3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docxBHANU281672
 
3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docx3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docxlorainedeserre
 
Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection Regulation Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection Regulation Jim Kaplan CIA CFE
 
3.6 legislation and regulations
3.6 legislation and regulations3.6 legislation and regulations
3.6 legislation and regulationsmrmwood
 
Internet usage policy(1)
Internet usage policy(1)Internet usage policy(1)
Internet usage policy(1)scobycakau
 

Semelhante a Need for having Security, Email & Internet Usage Policy in Companies - Legal requirements and implications- Vijay Pal Dalmia-Advocate (20)

Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital AgeManaging Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
 
Free_business_IT_security_policy_template_v5.pdf
Free_business_IT_security_policy_template_v5.pdfFree_business_IT_security_policy_template_v5.pdf
Free_business_IT_security_policy_template_v5.pdf
 
Risk Insight - Employee Internet Usage at Work
Risk Insight - Employee Internet Usage at WorkRisk Insight - Employee Internet Usage at Work
Risk Insight - Employee Internet Usage at Work
 
08 pdf show-239
08   pdf show-23908   pdf show-239
08 pdf show-239
 
Information Ethics
Information EthicsInformation Ethics
Information Ethics
 
Internet Policy Final Project (Group 6)
Internet Policy Final Project (Group 6)Internet Policy Final Project (Group 6)
Internet Policy Final Project (Group 6)
 
Corporate ethics
Corporate ethicsCorporate ethics
Corporate ethics
 
The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law
 
Legal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxLegal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptx
 
IT Policy
IT PolicyIT Policy
IT Policy
 
Shutting the digital gate - data preservation and HR
Shutting the digital gate - data preservation and HRShutting the digital gate - data preservation and HR
Shutting the digital gate - data preservation and HR
 
Data privacy and security in uae
Data privacy and security in uaeData privacy and security in uae
Data privacy and security in uae
 
The general data protection act overview
The general data protection act overviewThe general data protection act overview
The general data protection act overview
 
3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docx3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docx
 
3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docx3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docx
 
Ethical privacy and security issues
Ethical privacy and security issuesEthical privacy and security issues
Ethical privacy and security issues
 
Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection Regulation Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection Regulation
 
Tl vi a
Tl vi aTl vi a
Tl vi a
 
3.6 legislation and regulations
3.6 legislation and regulations3.6 legislation and regulations
3.6 legislation and regulations
 
Internet usage policy(1)
Internet usage policy(1)Internet usage policy(1)
Internet usage policy(1)
 

Mais de Vijay Dalmia

DIGITAL PERSONAL DATA PROTECTION ACT 2023-PPT-VPD.pptx
DIGITAL PERSONAL DATA PROTECTION ACT 2023-PPT-VPD.pptxDIGITAL PERSONAL DATA PROTECTION ACT 2023-PPT-VPD.pptx
DIGITAL PERSONAL DATA PROTECTION ACT 2023-PPT-VPD.pptxVijay Dalmia
 
Enforcement Of Intellectual Property Rights Through Customs
Enforcement Of Intellectual Property Rights Through CustomsEnforcement Of Intellectual Property Rights Through Customs
Enforcement Of Intellectual Property Rights Through CustomsVijay Dalmia
 
White Collar Crime by Vijay Pal Dalmia.pptx
White Collar Crime by Vijay Pal Dalmia.pptxWhite Collar Crime by Vijay Pal Dalmia.pptx
White Collar Crime by Vijay Pal Dalmia.pptxVijay Dalmia
 
Taxation of Cryptocurrencies – Virtual Digital Assets in India-VPDalmia.pptx
Taxation of Cryptocurrencies – Virtual Digital Assets in India-VPDalmia.pptxTaxation of Cryptocurrencies – Virtual Digital Assets in India-VPDalmia.pptx
Taxation of Cryptocurrencies – Virtual Digital Assets in India-VPDalmia.pptxVijay Dalmia
 
Indian Approach On Bitcoins-cryptocurrencies- Blockchain Legal Practical Pe...
Indian Approach On Bitcoins-cryptocurrencies- Blockchain  Legal  Practical Pe...Indian Approach On Bitcoins-cryptocurrencies- Blockchain  Legal  Practical Pe...
Indian Approach On Bitcoins-cryptocurrencies- Blockchain Legal Practical Pe...Vijay Dalmia
 
Police Remand- Judicial Remand & Default Bail-Vijay Pal Dalmia Advocate.pptx
Police Remand- Judicial Remand & Default Bail-Vijay Pal Dalmia Advocate.pptxPolice Remand- Judicial Remand & Default Bail-Vijay Pal Dalmia Advocate.pptx
Police Remand- Judicial Remand & Default Bail-Vijay Pal Dalmia Advocate.pptxVijay Dalmia
 
Police Remand Judicial Remand & Default bail by Vijay Pal Dalmia Advocate
Police Remand  Judicial Remand & Default bail by Vijay Pal Dalmia AdvocatePolice Remand  Judicial Remand & Default bail by Vijay Pal Dalmia Advocate
Police Remand Judicial Remand & Default bail by Vijay Pal Dalmia AdvocateVijay Dalmia
 
Indian approach on bitcoins, cryptocurrencies and blockchain – legal practica...
Indian approach on bitcoins, cryptocurrencies and blockchain – legal practica...Indian approach on bitcoins, cryptocurrencies and blockchain – legal practica...
Indian approach on bitcoins, cryptocurrencies and blockchain – legal practica...Vijay Dalmia
 
Sanction for prosecution of offences under chapter xii of the income tax act
Sanction for prosecution of offences under chapter xii of the income tax actSanction for prosecution of offences under chapter xii of the income tax act
Sanction for prosecution of offences under chapter xii of the income tax actVijay Dalmia
 
Reasonable security practices and procedures and sensitive personal data or i...
Reasonable security practices and procedures and sensitive personal data or i...Reasonable security practices and procedures and sensitive personal data or i...
Reasonable security practices and procedures and sensitive personal data or i...Vijay Dalmia
 
Guide for de-mystifying law of trade mark enfocrement and litigation in india
Guide  for  de-mystifying law of trade mark enfocrement and litigation in indiaGuide  for  de-mystifying law of trade mark enfocrement and litigation in india
Guide for de-mystifying law of trade mark enfocrement and litigation in indiaVijay Dalmia
 
IPR Enforcement in India through Criminal Measures - By Vijay Pal Dalmia
IPR Enforcement in India through Criminal Measures - By Vijay Pal DalmiaIPR Enforcement in India through Criminal Measures - By Vijay Pal Dalmia
IPR Enforcement in India through Criminal Measures - By Vijay Pal DalmiaVijay Dalmia
 
Process of criminal trial in india
Process of criminal trial in indiaProcess of criminal trial in india
Process of criminal trial in indiaVijay Dalmia
 
LAW OF THE SEMICONDUCTOR INTEGRATED CIRCUITS IN INDIA By Vijay Pal Dalmia
LAW OF THE SEMICONDUCTOR INTEGRATED CIRCUITS IN INDIA By Vijay Pal DalmiaLAW OF THE SEMICONDUCTOR INTEGRATED CIRCUITS IN INDIA By Vijay Pal Dalmia
LAW OF THE SEMICONDUCTOR INTEGRATED CIRCUITS IN INDIA By Vijay Pal DalmiaVijay Dalmia
 
Reasonable security practices and procedures and sensitive personal data or i...
Reasonable security practices and procedures and sensitive personal data or i...Reasonable security practices and procedures and sensitive personal data or i...
Reasonable security practices and procedures and sensitive personal data or i...Vijay Dalmia
 
Types of electronic contracts
Types of electronic contractsTypes of electronic contracts
Types of electronic contractsVijay Dalmia
 
Ipr enforcement in india
Ipr enforcement in indiaIpr enforcement in india
Ipr enforcement in indiaVijay Dalmia
 
Patent law and Indian perspective
Patent law and Indian perspectivePatent law and Indian perspective
Patent law and Indian perspectiveVijay Dalmia
 
Wills in the indian perspective
Wills in the indian perspectiveWills in the indian perspective
Wills in the indian perspectiveVijay Dalmia
 
Law of Tele-medicine in India
Law of Tele-medicine in IndiaLaw of Tele-medicine in India
Law of Tele-medicine in IndiaVijay Dalmia
 

Mais de Vijay Dalmia (20)

DIGITAL PERSONAL DATA PROTECTION ACT 2023-PPT-VPD.pptx
DIGITAL PERSONAL DATA PROTECTION ACT 2023-PPT-VPD.pptxDIGITAL PERSONAL DATA PROTECTION ACT 2023-PPT-VPD.pptx
DIGITAL PERSONAL DATA PROTECTION ACT 2023-PPT-VPD.pptx
 
Enforcement Of Intellectual Property Rights Through Customs
Enforcement Of Intellectual Property Rights Through CustomsEnforcement Of Intellectual Property Rights Through Customs
Enforcement Of Intellectual Property Rights Through Customs
 
White Collar Crime by Vijay Pal Dalmia.pptx
White Collar Crime by Vijay Pal Dalmia.pptxWhite Collar Crime by Vijay Pal Dalmia.pptx
White Collar Crime by Vijay Pal Dalmia.pptx
 
Taxation of Cryptocurrencies – Virtual Digital Assets in India-VPDalmia.pptx
Taxation of Cryptocurrencies – Virtual Digital Assets in India-VPDalmia.pptxTaxation of Cryptocurrencies – Virtual Digital Assets in India-VPDalmia.pptx
Taxation of Cryptocurrencies – Virtual Digital Assets in India-VPDalmia.pptx
 
Indian Approach On Bitcoins-cryptocurrencies- Blockchain Legal Practical Pe...
Indian Approach On Bitcoins-cryptocurrencies- Blockchain  Legal  Practical Pe...Indian Approach On Bitcoins-cryptocurrencies- Blockchain  Legal  Practical Pe...
Indian Approach On Bitcoins-cryptocurrencies- Blockchain Legal Practical Pe...
 
Police Remand- Judicial Remand & Default Bail-Vijay Pal Dalmia Advocate.pptx
Police Remand- Judicial Remand & Default Bail-Vijay Pal Dalmia Advocate.pptxPolice Remand- Judicial Remand & Default Bail-Vijay Pal Dalmia Advocate.pptx
Police Remand- Judicial Remand & Default Bail-Vijay Pal Dalmia Advocate.pptx
 
Police Remand Judicial Remand & Default bail by Vijay Pal Dalmia Advocate
Police Remand  Judicial Remand & Default bail by Vijay Pal Dalmia AdvocatePolice Remand  Judicial Remand & Default bail by Vijay Pal Dalmia Advocate
Police Remand Judicial Remand & Default bail by Vijay Pal Dalmia Advocate
 
Indian approach on bitcoins, cryptocurrencies and blockchain – legal practica...
Indian approach on bitcoins, cryptocurrencies and blockchain – legal practica...Indian approach on bitcoins, cryptocurrencies and blockchain – legal practica...
Indian approach on bitcoins, cryptocurrencies and blockchain – legal practica...
 
Sanction for prosecution of offences under chapter xii of the income tax act
Sanction for prosecution of offences under chapter xii of the income tax actSanction for prosecution of offences under chapter xii of the income tax act
Sanction for prosecution of offences under chapter xii of the income tax act
 
Reasonable security practices and procedures and sensitive personal data or i...
Reasonable security practices and procedures and sensitive personal data or i...Reasonable security practices and procedures and sensitive personal data or i...
Reasonable security practices and procedures and sensitive personal data or i...
 
Guide for de-mystifying law of trade mark enfocrement and litigation in india
Guide  for  de-mystifying law of trade mark enfocrement and litigation in indiaGuide  for  de-mystifying law of trade mark enfocrement and litigation in india
Guide for de-mystifying law of trade mark enfocrement and litigation in india
 
IPR Enforcement in India through Criminal Measures - By Vijay Pal Dalmia
IPR Enforcement in India through Criminal Measures - By Vijay Pal DalmiaIPR Enforcement in India through Criminal Measures - By Vijay Pal Dalmia
IPR Enforcement in India through Criminal Measures - By Vijay Pal Dalmia
 
Process of criminal trial in india
Process of criminal trial in indiaProcess of criminal trial in india
Process of criminal trial in india
 
LAW OF THE SEMICONDUCTOR INTEGRATED CIRCUITS IN INDIA By Vijay Pal Dalmia
LAW OF THE SEMICONDUCTOR INTEGRATED CIRCUITS IN INDIA By Vijay Pal DalmiaLAW OF THE SEMICONDUCTOR INTEGRATED CIRCUITS IN INDIA By Vijay Pal Dalmia
LAW OF THE SEMICONDUCTOR INTEGRATED CIRCUITS IN INDIA By Vijay Pal Dalmia
 
Reasonable security practices and procedures and sensitive personal data or i...
Reasonable security practices and procedures and sensitive personal data or i...Reasonable security practices and procedures and sensitive personal data or i...
Reasonable security practices and procedures and sensitive personal data or i...
 
Types of electronic contracts
Types of electronic contractsTypes of electronic contracts
Types of electronic contracts
 
Ipr enforcement in india
Ipr enforcement in indiaIpr enforcement in india
Ipr enforcement in india
 
Patent law and Indian perspective
Patent law and Indian perspectivePatent law and Indian perspective
Patent law and Indian perspective
 
Wills in the indian perspective
Wills in the indian perspectiveWills in the indian perspective
Wills in the indian perspective
 
Law of Tele-medicine in India
Law of Tele-medicine in IndiaLaw of Tele-medicine in India
Law of Tele-medicine in India
 

Último

The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...James Watkins, III JD CFP®
 
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书Fir L
 
一比一原版西澳大学毕业证学位证书
 一比一原版西澳大学毕业证学位证书 一比一原版西澳大学毕业证学位证书
一比一原版西澳大学毕业证学位证书SS A
 
THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labourBhavikaGholap1
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书Fir L
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书Fir L
 
Arbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaArbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaNafiaNazim
 
Debt Collection in India - General Procedure
Debt Collection in India  - General ProcedureDebt Collection in India  - General Procedure
Debt Collection in India - General ProcedureBridgeWest.eu
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书Fs Las
 
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdfBPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdflaysamaeguardiano
 
一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书E LSS
 
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULEsreeramsaipranitha
 
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书Fir L
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx2020000445musaib
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxRRR Chambers
 
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书FS LS
 
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书Fs Las
 

Último (20)

The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...
 
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
 
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
 
一比一原版西澳大学毕业证学位证书
 一比一原版西澳大学毕业证学位证书 一比一原版西澳大学毕业证学位证书
一比一原版西澳大学毕业证学位证书
 
THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labour
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书
 
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
 
Arbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaArbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in India
 
Debt Collection in India - General Procedure
Debt Collection in India  - General ProcedureDebt Collection in India  - General Procedure
Debt Collection in India - General Procedure
 
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
 
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdfBPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
 
一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书
 
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
 
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
 
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
 
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
 

Need for having Security, Email & Internet Usage Policy in Companies - Legal requirements and implications- Vijay Pal Dalmia-Advocate

  • 1. Need for having Security, Email & Internet Usage Policy in Companies - Legal requirements and implications BY VIJAY PAL DALMIA, ADVOCATE SUPREME COURT OF INDIA & DELHI HIGH COURT M O BI L E: + 9 1 9 8 10081079 E MAI L: V P DALMIA@GMAI L.COM
  • 2. All organizations must have a robust IT Security, Email & Internet Usage Policy, which should be strictly implemented to establish standard practices and rules for responsible, safe and productive use of the Electronic mail (e-mail) and the internet; and to ensure the protection of information/data of the Organisation and prevention of any misuse thereof. It is a fact of life that most of the Organisations do not have any Data, IT Security, Email & Internet Usage Policy, or may be having inadequate policies, which fail to protect and safeguard the interest of the organizations and their management, leading to the risk of unwarranted criminal and civil consequences. The effective implementation of policies for the protection of data, misuse of internet and emails, becomes difficult in the court of law in the absence of a well-defined policy, which is duly acknowledged by the employees of the organizations. The safeguard of data, e-mail system and network of an Organisation has come to play an extremely vital role in today's fast moving, but invariably technically fragile, business environment. The first step towards enhancing a company's security is the introduction of a precise yet legally enforceable security policy, informing employees/staff on the various aspects of their responsibilities, general use of company resources and explaining how sensitive information must be handled. The policy should also describe in detail the meaning of acceptable use, as well as clearly list the prohibited activities.
  • 3. WHY SHOULD AN ORGANIZATION HAVE AN IT POLICY? Because an organization, its officers including its Directors and Principal Officers, may be directly and vicariously liable for the acts of organizations' Employees and Agents, etc., ◦ Under the law relating to ◦ Strict Liability, ◦ Vicarious Liability. Because Data Protection and Secrecy has become the norm of the day, and it's obligatory to protect data. Because every organization is legally obliged to protect its employees, clients and customers from illegal, unauthorized, inappropriate and unwarranted ◦ Use of ◦ Email; ◦ Internet Usage; ◦ Laptop/Desktops; ◦ Hardware; ◦ Data card; ◦ Pen Drive.
  • 4. WHY SHOULD AN ORGANIZATION HAVE AN IT POLICY? Because all organizations need to secure ◦ Computer Network; and ◦ Against Unauthorized System Access to prevent data theft, virus, and malware attacks. Because every organization needs to prevent its employees from installing illegal software, directly through internet or CD’s, etc., which exposes an organization to copyright violations. This can be effected by controlling software Installation Rights. Because every organization has to create system back up and maintain its IT infrastructure. Because every organization must control unauthorized Third Party and Remote Access to its computers and IT network.
  • 5. WHY SHOULD AN ORGANIZATION HAVE AN IT POLICY? Because Data of a Company includes its valuable Intellectual Property Assets, which may include ◦ Patents, ◦ Designs, ◦ Copyrights, ◦ Trade Secrets (Unpatented), ◦ Customer Data, ◦ Business Data, ◦ Business Methods, ◦ Third Party Data, ◦ Formulas, ◦ Source Code, ◦ Employee Information. ◦ Know-how ◦ Confidential Information
  • 6. WHY SHOULD AN ORGANIZATION HAVE AN IT POLICY? Because an organization may be under a LEGAL & CONTRACTUAL OBLIGATION: ◦ to protect the Sensitive Personal Data of its customers and employees, under the Information Technology Act, 2000; and ◦ in case of violation of your organization’s legal obligation, ◦ All persons who are directly responsible for the day to management of your organization including its directors and principal officers may be held legally liable for ◦ Civil action, i.e., compensation under Section 43A, and ◦ Criminal action, i.e., Punishment under Section 72A, ◦ For failure to protect any sensitive personal data which its owns, controls or operates. ◦ As Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011 ◦ provide for having Mandatory Privacy Policy for protection of sensitive personal data.
  • 7. WHY SHOULD AN ORGANIZATION HAVE AN IT POLICY? ◦ The organization and it's all principal officer and directors may be held liable, ◦ to pay Compensation, or ◦ for Criminal Prosecution for ◦ Negligent handling of data or information leading to DEFAMATION; or ◦ Use of unauthorized or pirated software. ◦ The organization and it's all principal officer including its directors may also be held liable for criminal prosecution, ◦ Tampering of computer source documents- u/s 65 of the IT Act, 2000, ◦ Sending of offensive messages u/s 66A of the IT Act, 2000 through ◦ Computer resources & Communication devices, ◦ Punishment for identity theft- u/s 66C of the IT Act, 2000, ◦ Use of computer resource for cheating by impersonation- u/s 66D of the IT Act, 2000, ◦ Violation of privacy by use of electronic means of a company- u/s 66E of the IT Act, 2000, ◦ Publication or transmission of obscene material in electronic form- u/s 67 of the IT Act, 2000.
  • 8. Information technology resources It is important to note that Information technology resources (IT resources) of a company may include: ◦ computers, ◦ computer-based networks, ◦ computer peripherals, ◦ operating systems, ◦ e-mail, ◦ Intranet, ◦ software or any combination thereof ◦ that are made available by a Company to support its goals of providing quality products and services to customers, increase shareholder value and foster employee satisfaction.
  • 9. TO WHOM DOES IT POLICY APPLY? IT Policy of the organization should be universally applicable across the organization, including its •Directors •Employees, •Part-time employees, •Industrial Trainees, •Contractors, •Agents, •& all others, who may be directly or indirectly associated with the conduct of the business of the organization.
  • 10. ADVANTAGES OF HAVING AN IT POLICY: Time Management, as office hours can be used only for official work thereby enhancing productivity. Optimum and efficient utilization and management of company resources including computer resources for maximum efficiency. Maintaining healthy, cordial and predefined Employer & Employee Relationship. Customer Relationship. Prevent Poaching of your human resource. Leads to Reduction in the risk of use of pirated and unauthorized use of the software. Authorized Official use of Company network and resources can improve the functioning of IT system, which also leads to Bandwidth Protection.
  • 11. OBJECTIVES & PURPOSE OF HAVING AN INFORMATION TECHNOLOGY POLICY ◦ Establishing a culture of security and trust for all employees; ◦ Providing guidelines governing proper use of IT and Internet by all employees; ◦ Ensuring the use of internet only as a tool for continuous improvement of efficiency and performance; ◦ Fixing the responsibility & liability in case of misuse of IT resources; ◦ Preserving the integrity of the information technology systems; ◦ Protecting IT systems against the accidents, failures or improper use; ◦ Controlled right to access confidential data; ◦ Controlling of copying, removal or alteration of any data, file or system resources; ◦ Maintenance of a high level of professionalism in keeping with Code of Ethics; ◦ Maintaining Company’s reputation among trade and public; ◦ To supplement, not replace, all existing laws, regulations, agreements, and contracts.
  • 12. IT POLICY IS THE WAY TO GO AHEAD, AS: Most of our communications are now electronic. Recipients of electronic documents, like ◦ agents, ◦ distributors, ◦ Customers etc. ◦ Need the source and authenticity of the documents or messages. It may satisfy audit requirements. It assists in compliance with applicable laws, Regulations, Guidelines, and recommendations. It mitigates risk from a security breach. Such policy educates users on sound security practices, and Having such a policy leads to a reduction of legal risk.
  • 13. RISK FACTOR INVOLVED IN NOT HAVING AN EFFECTIVE IT POLICY Espionage: Employees are falling to the lure or trap of RIVALS, and passing sensitive and secure data of the organization. Damage to Goodwill, Reputation, Credibility of the organization. Harassment: Viewing inappropriate content, such as pornography, hate or violence, can create an environment that is hostile and offensive for co-workers, and can damage the reputation of the organization. Viruses: Visiting less than reputable websites can lead to viruses, spyware, or other malicious software getting into the network. Productivity: Frequent online browsing, shopping, and chatting can get in the way of getting the work done, and often leads to resentment from the coworkers. Service Interruptions: Large downloads and streaming audio and video can suck up network resources that other employees need to do work and service customers
  • 14. VIJAY PAL DALMIA, Advocate Supreme Court of India & Delhi High Court 1st, 9th & 11th Floors ǀ Mohan Dev Building ǀ 13, Tolstoy Marg ǀ New Delhi 110001 (India) Phone: +91 11 42492532 (Direct) Mobile: +91 9810081079 email:- vpdalmia@gmail.com