Lexology Panoramic Guide On Cybersecurity in India 2024
Lexology Panoramic Guide On Cybersecurity in India 2024
CYBERSECURITY
India
LEXOLOGY
Cybersecurity
Contributing Editors
Edward R McNicholas and Fran Faircloth
Ropes & Gray LLP
Explore on Lexology
Contents
Cybersecurity
LEGAL FRAMEWORK
Key legislation
Most affected economic sectors
International standards
Personnel and director obligations
Key deunitions
Mandatory minimvm protectiCe measvres
hybertFreats to intellectval property
hybertFreats to critical infrastrvctvre
Restrictions on cybertFreat information sFaring
hriminal actiCities
hlovd compvting
Voreign organisations
BEST PRACTICE
Recommended additional protections
GoCernment incentiCes
Indvstry standards and codes of practice
Responding to breacFes
-olvntary information sFaring
PvblicEpriCate cooperation
Insvrance
ENFORCEMENT
Regvlatory avtForities
x'tent of avtForitiesw pojers
Most common enforcement issves
Regvlatory and data svbkect notiucation
Penalties for nonEcompliance jitF cybersecvrity regvlations
Penalties for failvre to report tFreats and breacFes
PriCate enforcement
Contributors
India
LEGAL FRAMEWORK
Key legislation
Dvmmarise tFe main statvtes and regvlations tFat regvlate or promote
cybersecvrity@ ?oes yovr kvrisdiction FaCe dedicated cybersecvrity lajsW
While India does not have a dedicated cybersecurity law, there are several legislations
and sector-speciSc regulations that, among others, regulate cybersecurity, and promote
the maintenance of cybersecurity standards. One of the primary legislations dealing with
cybersecurity, data protection and cybercrimes is the Information Technology Act 2000
(the IT Act), read with the rules and regulations framed thereunder. The IT Act not only
provides legal recognition and protection for transactions carried out through electronic data
interchange and other means of electronic communication, but also contains provisions
that are aimed at safeguarding electronic data, information or records, and preventing
unauthorised or unlawful use of a computer system. Fome of the cybercrimes that are
speciScally envisaged and punishable under the IT Act are hacking, denial-of-service attacks,
phishing, malware attacks, identity fraud and electronic theft.
In accordance with the Information Technology (The Indian Computer Emergency Response
Team and Manner of Performing Dunctions and 1uties) Rules 2038, the Computer
Emergency Response Team (CERT-In) has been established as the nodal agency, which deals
with cybersecurity incidents and responding to these incidents. It is tasked with performing
certain functions including collection, analysis and dissemination of information on cyber
incidents, issuing guidelines, advisories, vulnerability notes and white papers relating to
information security practices, procedures, response and reporting of cyber incidents. To
perform these functions, CERT-In is empowered to call for information and issue directions
to service providers, intermediaries, data centres, body corporates and any other person.
Exercising such powers, CERT-In had issued the directions dated 2q April 2022 (CERT-In
1irections) for strengthening cyber security in India. ClariScations to the 1irections were
issued by CERT-In by way of freQuently asked Questions on 3q May 2022 (DA:s).
In addition to the above, other relevant rules framed under the IT Act in the context of
cybersecurity include•
Other laws that contain cybersecurity-related provisions include the Indian Penal Code 3q60,
which punishes offences, including those committed in cyberspace (such as defamation,
cheating, criminal intimidation and obscenity), and the Companies (Management and
Administration) Rules 2034 (the CAM Rules) framed under the Companies Act 2038, which
reQuire companies to ensure that electronic records and security systems are secure from
unauthorised access and tampering.
In addition to the above, there are sector-speciSc regulations issued by regulators such as the
Reserve Bank of India (RBI), the Insurance Regulatory and 1evelopment Authority of India,
the 1epartment of Telecommunication (1OT) and the Fecurities Exchange Board of India
(FEBI), which mandate cybersecurity standards to be maintained by their regulated entities,
such as banks, insurance companies, telecom service providers, and listed entities.
The proposed 1igital India Act 2028 (1IA) that will replace the IT Act can be expected to bring
a robust and dedicated law dealing with cybersecurity.
With the rise of digital payments, cybercrimes involving payment transactions in the online
space have signiScantly increased and become complex. While the RBI has been active
in reQuiring companies operating payment systems to build secure authentication and
transaction security mechanisms (such as two-factor authentication, EM9 chips, PCI 1FF
compliance and tokenisation), given that these payment companies often offer real-time
frictionless payment experiences to their consumers, it leaves less time for banks and other
entities operating in the payment ecosystem to identify and respond to cyberthreats. In light
of the above, there is an increased need for such entities to identify and develop cybersecurity
standards commensurate with the nature of the information assets handled by them and
evaluate the possible harm in the event of any cybersecurity attack, to ensure that these
emerging risks are mitigated.
Moreover, the covid-3' pandemic has led to increased dependencies on digital infrastructure
for many organisations, as employees are being given the option of working remotely.
This has led to enormous cybersecurity-related vulnerabilities and challenges for large and
small organisations alike and made them rethink cybersecurity preparedness, policies and
budgets.
International standards
’as yovr kvrisdiction adopted any international standards related to
cybersecvrityW
Yes, the FP1I Rules reQuire body corporates that handle sensitive personal data or
information to implement /reasonable security practices and procedures/ by maintaining
a comprehensively documented information security programme. This programme should
include managerial, technical, operational and physical security control measures that are
commensurate with the nature of the information being protected. In this context, the FP1I
Rules recognise the International Ftandard IFO7IEC 2–003 on Information technology 5
Fecurity techniQues 5 Information security management systems 5 ReQuirements, as one
such approved security standard that can be implemented by a body corporate for protection
of personal information. All body corporates that comply with this standard are subVect to
audit checks by an independent government-approved auditor at least once a year or as and
when they undertake a signiScant upgrade of their processes and computer resources.
The newly enacted, albeit yet to be notiSed, 1P1P Act also puts an obligation on data
Sduciaries to adopt reasonable security safeguards to prevent personal data breach.
Unlike the FP1I Rules, the 1P1P Act does not recognise any speciSc standards to be
followed. ;aving said that, more clarity on speciSc security standards and safeguards to
be implemented under the 1P1P Act may emerge once the rules are framed and notiSed
thereunder.
that the merchants onboarded by them are compliant with such data security standards and
best practices. Fimilarly, FEBI reQuires stock exchanges, depositories, clearing corporations,
etc, to follow best practices of standards such as IFO7IEC 2–003, IFO7IEC 2–002 and COBIT
‘, or their subseQuent revisions, if any, from time to time.
Fection q‘ of the IT Act also speciScally states that in case of any contravention of the
provisions stipulated thereunder, any person who, at the time of contravention, was in charge
of supervising the affairs of a company will be liable and proceeded against, unless he or
she is able to prove that the contravention took place without his or her knowledge, or that
he or she exercised all due diligence to prevent the contravention. Therefore, personnel can
protect themselves from liability by being aware of and deploying adeQuate cybersecurity
measures.
Feparately, as per the CAM Rules, the managing director, company secretary, or any other
director or o’cer of the company (as may be decided by the board) is responsible for the
maintenance and security of electronic records. This person is reQuired, inter alia, to provide
adeQuate protection against unauthorised access, alteration or tampering of recordsj ensure
that computer systems, software and hardware are secured and validated to ensure their
accuracy, reliability, and accessibilityj and take all necessary steps to ensure the security,
integrity, and conSdentiality of records. Any failure by such personnel in this regard may be
construed to be a breach of their duties towards the organisation and is punishable with
a Sne. The CAM Rules also reQuire an electronic voting system for companies with eQuity
shares listed on a recognised stock exchange, and every company having not less than one
thousand members to have adeQuate cyber security in place.
It is also important to note that the CERT-In 1irections now reQuire service providers,
intermediaries, data centres, body corporate and government organisations to designate
a Point of Contact to interface with CERT-In. All communications from CERT-In seeking
information and providing directions for compliance are to be sent to the said Point of
Contact. The information relating to a Point of Contact is reQuired to be sent to CERT-In as
well as kept updated from time to time. Accordingly, to demonstrate bonaSde compliance
with the CERT-In 1irections, the management and persons in charge are to ensure such a
Point of Contact is appointed and such details are communicated to CERT-In.
Key devnitions
’oj does yovr kvrisdiction deune wcybersecvrityw and wcybercrimewW
Under the IT Act, KcybersecurityJ means protecting information, eQuipment, devices,
computers, computer resources, communication devices and information stored therein
from unauthorised access, use, disclosure, disruption, modiScation or destruction.
KCybercrimeJ, on the other hand, has not been expressly deSned under any central statute
or regulationsj however, the National Cyber Crime Reporting Portal (a body set up by the
government to facilitate reporting of cybercrime complaints) has deSned /cybercrimeJ to
mean /any unlawful act where a computer or communication device or computer network is
used to commit or facilitate the commission of crimeJ. Durther, the Information Technology
(The Indian Computer Emergency Response Team and Manner of Performing Dunctions
and 1uties) Rules 2038 deSne /cyber security incident/ as any real or suspected adverse
event in relation to cyber security that violates an explicitly or implicitly applicable security
policy resulting in unauthorised access, denial of service or disruption, unauthorised use of a
computer resource for processing or storage of information or changes in data, information
without authorisation.
Under the CAM Rules, Kcyber securityJ is deSned as protecting information, eQuipment,
devices, computers, computer resources, communication devices and information stored
therein from unauthorised access, use, disclosures, disruption, modiScation or destruction.
In November 2028, the RBI issued the Master 1irections on Information Technology
Governance, Risk, Controls and Assurance Practices (Master 1irections), applicable to
regulated entities such as banks and non-banking Snancial companies (NBDCs), which
deSne Kcyber securityJ as preservation of conSdentiality, integrity and availability of
information and7or information systems through the cyber medium. As per the deSnition,
other properties, such as authenticity, accountability, non-repudiation and reliability can also
be involved in cyber security. Durther, the Master 1irections deSne a Kcyber incidentJ as a cyber
event that adversely affects the cyber security of an information asset, whether resulting
from malicious activity or not. Also, the Master 1irections deSne Kcyber-attackJ as a malicious
attempt (or more than one attempt) to exploit vulnerabilities through the cyber medium to
damage, disrupt or gain unauthorised access to assets. The Master 1irections will come into
effect from 3 April 2024.
The courts in India have also dealt with various instances of cybercrime over the
years. The GuVarat ;igh Court, in the case of Jaydeep Vrujlal Depani v State of Gujarat
(R7FCR.A7‘–0q7203q Order), recognised a publicly available deSnition of KcybercrimeJ to
mean Kthe offences that are committed against individuals or groups of individuals with a
criminal motive to intentionally harm the reputation of the victim or cause physical or mental
harm, or loss, to the victim directly or indirectly, using modern telecommunication networks
such as Internet (networks including but not limited to Chat rooms, emails, notice boards
and groups) and mobile phones (Bluetooth7FMF7MMF)J.
While the IT Act does not make any distinction between cybersecurity and data privacy, in
our view, these issues are distinct but also deeply interconnected, as ensuring the privacy
of any data (whether of an individual or a corporate) reQuires adeQuate cybersecurity
processes to be implemented by organisations. Durther, cybersecurity and information
security frameworks are developed by organisations at a broader level to build resilience
against various forms of cyberthreat, including cybercrimes that entail more extensive
engagement with regulatory authorities depending on the extent of the harm caused, the
nature of the information handled by the body corporate, sector sensitivities, etc.
Additionally, in the telecommunications sector, the licence conditions imposed by the 1OT
reQuire every licensee to implement the following measures•
induct only those network elements into its telecom network that have been tested as
per relevant contemporary Indian or international security standards (eg, the IT and
ITEF elements against the IFO7IEC 3‘40q standards, the IFO 2–000 series standards
for information security management systems and the 8GPP and 8GPP2 security
standards for telecom and telecom-related elements).
Durther, critical information infrastructure (CII) is separately regulated by the National Critical
Information Infrastructure Protection Centre (NCIIPC) and the /Guidelines for the Protection
of National Critical Information Infrastructure/ (CII Guidelines). CII has been deSned under the
IT Act to mean any computer resource, the incapacitation or destruction of which can have
a debilitating impact on national security, the economy, public health or safety. Under the CII
Guidelines, certain best practices and controls are provided as minimum recommendations
to be implemented by the CIIs at different stages of CII functioning, to maintain safe
and secure operations. In addition to the CII Guidelines, the NCIIPC in April 2020 also
issued covid-3' guidelines titled /Building Resilience against Cyber Attacks during CO9I1-3'
Crisis/, which intend to provide guidance to CIIs on various issues, including managing
email phishing risks, protection of organisational assets and enabling employees to work
remotely. Durther, the National Fecurity Council Fecretariat has released, /Cyber Fecurity
Audit 5 Baseline ReQuirements/ (CFA-BR) for Cyber information infrastructure prescribing
minimum, common, and harmonised baseline criterion for cyber security audits, which is to
be mandatorily followed by all CII.
Under the provisions of the IT Act, a nodal body 5 the NCIIPC 5 has been set up to work in
the interest of CII protection. The NCIIPC is authorised to reduce vulnerabilities of CII against
cyberterrorism, cyber warfare and other threats. Certain identiSed CIIs are in sectors such
as transport, telecoms, banking, insurance, Snance, power, energy and governance.
The recently notiSed Central Electricity Regulatory Commission (Indian Electricity Grid Code)
Regulations 2028 prescribe measures to be taken by, among others, captive generating
plants and energy storage systems to safeguard the national grid from spyware, malware,
cyber attacks and network hacking, and also include reQuirements for a procedure for a
security audit from time to time and a cybersecurity framework, among others.
Fector-speciSc cybersecurity regulations are also available for sectors such as banking,
telecommunications, Snance and insurance.
In any case, the FP1I Rules reQuire a body corporate to disclose personal data or sensitive
personal information subVect to prior consent of the data subVect. ;owever, this condition
can be waived if the disclosure is to government agencies mandated under the IT Act for
the purpose of veriScation of identity, or for the prevention or investigation of any offences,
including cybercrimes. The FP1I Rules also permit disclosure without consent in cases
where the disclosure is made pursuant to an enforceable order under applicable law.
The FP1I Rules also allow a body corporate to transfer data to any other body corporate or a
person in India or in any other country that ensures the same level of data protection that is
adhered to by the body corporate. ;owever, the transfer may be allowed only if it is necessary
for the performance of a lawful contract between the body corporate and the data subVect
or where the person has consented to the data transfer.
Under the 1P1P Act, any processing (including disclosure) of personal data will reQuire
consent accompanied or preceded by a notice by the data Sduciary to the data principal
(except in certain cases identiSed under the 1P1P Act as legitimate use). ;owever,
disclosure of information may be done to the state or any of its instrumentalities, for fulSlling
any obligation under any law for the time being in force in India. Durther, disclosure may also
be done for the purpose of ascertaining the Snancial information and assets and liabilities of
any person who has defaulted in payment due on account of a loan or advance taken from a
Snancial institution. Fuch disclosure will be subVect to processing being in accordance with
the provisions regarding disclosure of information or data in any other law for the time being
in force.
Certain laws, such as the Indian Telegraph Act 3qq‘ (the Telegraph Act) and the IT Act, permit
governmental and regulatory authorities to access private communications and personally
identiSable data in speciSc circumstances. The Telegraph Act empowers the government
to intercept messages in the interest of public safety, national security or the prevention
of crime, subVect to certain prescribed safeguards. In that scenario, the telecom licensee
that has been granted a licence by the 1OT is mandated to provide necessary facilities to
the designated authorities of the central government or the relevant state government for
interception of the messages passing through its network.
The IT Act also grants similar authority to the government and its authorised agencies. Any
person or o’cer authorised by the government (central or state) can, inter alia, direct any
of its agencies to intercept, monitor or decrypt, or cause to be intercepted, monitored or
decrypted, any information that is generated, transmitted, received or stored in any computer
resource, in the event that it is satisSed that it is necessary or expedient to do so in the interest
of sovereignty and the integrity of India, the defence of India, the security of the state, friendly
relations with foreign states, public order or preventing incitement to the commission of any
cognisable offence relating to the above, or for the investigation of any offence. In our view,
the instances described in the IT Act can be relied on by the government agencies to intercept
data for cybersecurity incidents if they relate to contravention or investigation of any crime.
Criminal actiVities
HFat are tFe principal cyberactiCities )svcF as Facqing tFat are
criminalised by tFe laj of yovr kvrisdictionW
Cybercrime activities are speciScally dealt with under the IT Act. It prescribes penalties
ranging from Snes to imprisonment for various types of cyber activities, including hackingj
tampering with computer source codej denial-of-service attacksj phishingj malware attacksj
identity fraudj electronic theftj cyberterrorismj privacy violationsj and the introduction of
any computer contaminant or virus. Durther, the CERT-In directions also set out speciSc
cyber security incidents, including targeted scanning7probing of critical networks7systemsj
attacks on internet of things (IoT) devices and associated systems, networks, software and
serversj attacks on servers, such as database, mail and 1NF, and network devices, such as
routers.
Cloud computing
’oj Fas yovr kvrisdiction addressed information secvrity cFallenges
associated jitF clovd compvtingW
CERT-In 1irections are applicable to cloud service providers as well. The CERT-In 1irections
have imposed certain obligations on cloud service providers, vis-a-vis data retention, and
reporting. Dor instance, as per the 1irections, any attack or malicious7suspicious activities
affecting systems7servers7software7applications related to cloud computing have to be
mandatorily reported to CERT-In, within six hours of noticing such incident or being brought
to notice about such incident. Durther, cloud service providers are reQuired to register and
retain certain mandatory data for their subscribers.
Durther, given that cloud computing services are rendered and received over the internet or
through the digital medium, certain other provisions of the IT Act, the FP1I Rules and the
Intermediaries Guidelines may be relevant to these services.
Dor instance, the FP1I Rules allow a body corporate to transfer data to any other body
corporate or a person in India or in any other country that ensures the same level of data
protection that is adhered to by the body corporate. ;owever, the transfer may be allowed
only if it is necessary for the performance of a lawful contract between the body corporate
and the data subVect or where the person has consented to the data transfer. Accordingly,
in our view, any entity engaged in the cloud computing business will need to ensure that it
maintains the same level of information security standards as that of the data controller (ie,
the person collecting the information from the data subVect).
Also, depending on the business model, a cloud services provider may fall within the
deSnition of an intermediary under the IT Act (deSned as any person who on behalf of
another person receives, stores or transmits that record or provides any service with respect
to that record and includes telecom service providers, network service providers, internet
service providers, web-hosting service providers, search engines, online payment sites,
online-auction sites, online-market places and cybercafes). As an intermediary, the cloud
service provider will need to observe due diligence measures to claim safe harbour protection
from liability arising from the content stored by it. These due diligence measures include
taking all reasonable steps to secure its computer resource and the information contained
therein by adopting the security practices prescribed under the FP1I Rules.
The RBI also issued KGuidelines on Regulation of Payment Aggregators and Payment
GatewaysJ on 3– March 2020, and KRegulation of Payment Aggregator 5 Cross Border (PA 5
Cross Border)J on 83 October 2028, where it is mandated for all payment aggregators, and
payment aggregators 5 cross border, to adhere to the data-storage reQuirements applicable
for payments data to ensure that all data is stored only in India for the RBI/s unfettered
supervisory access.
Foreign organisations
Durther, in the context of applicability of the CERT-In 1irections to overseas entities, the
clariScations issued by CERT-In by way of DA:s, suggest that the CERT-In 1irections will
apply to all entities in the matter of cyber incidents and cyber security incidents as along as
the service is catering to users in India. This seems to indicate that CERT-In is of the view that
CERT-In 1irections would continue to apply as long as catering to Indian users, irrespective
of fulSlment of the reQuirements of section –‘ of the IT Act. We will have to await clarity on
the interplay between section –‘ of the IT Act and the position indicated by the DA:s issued
on the applicability of CERT-In 1irections.
BEST PRACTICE
Under the 1igital India initiative, the Ministry of Electronics and Information Technology
(MeitY) has set up the Cyber Fwachhta &endra (Botnet Cleaning and Malware Analysis
Centre), operated by the Computer Emergency Response Team (CERT-In), to work with
internet service providers and product or antivirus companies to provide information and
tools to users on botnet and malware threats. Fimilar proactive measures are deployed by
sector-speciSc regulators from time to time.
GoVernment incentiVes
H Dinancial sector• the Reserve Bank of India has issued various guidelines for ensuring
cybersecurity and the handling of cyber fraud within the banking sector. They can be
accessed at www.rbi.org.in and include the following•
Responding to breaches
Zre tFere generally recommended best practices and procedvres for
responding to breacFesW
1epending on the nature and the extent of the cybersecurity incident and the sensitivity of
the sector, cyber incident response strategies may differ from one business to another. Fome
common measures that are recommended include•
Many companies also prefer to conduct regular assessments of the vulnerabilities in their
systems, including by inviting focused hacking. 1epending on the sector, organisations can
also reach out to CERT-In and seek advice on incident recovery, containing the damage and
restoring their systems to operation. Drom time to time, CERT-In also issues advisories on
actions recommended for parties that have been affected by cybersecurity incidents.
Moreover, Ministry of ;ome Affairs Ministry has operationalised a toll-free National ;elpline
number /3'80/ (previously /3‘‘260/) and an online reporting platform, namely, the /National
Cyber Crime Reporting Portal/ to enable persons to make immediate complaints of Snancial
loss caused to such persons due to cyber Snancial frauds including debit or credit card fraud,
e-wallet and internet banking related fraud, etc. Durther, the platform can be used to report
other types of cybercrimes.
In addition, the Fecurities Exchange Board of India (FEBI), in its /Cyber Fecurity
Cyber Resilience Dramework/ for Ftock Brokers71epository Participants, has mandated
stockbrokers and depository participants to submit Quarterly reports to stock exchanges
and depositories with information on cyberattacks and threats experienced by such entities
and the corresponding measures that were taken to mitigate the vulnerabilities, threats and
attacks.
Public-priVate cooperation
’oj do tFe goCernment and priCate sector cooperate to deCelop
cybersecvrity standards and procedvresW
The government issues consultation papers to invite feedback and suggestions from the
private sector, which aids the formulation of policies and laws in respect of cybersecurity.
Dor instance, presently, the government is working with the private sector to develop its 2020
cybersecurity strategy. In addition, in 203' the National Cyber Fecurity Coordinator and the
1ata Fecurity Council of India launched an online repository on cyber tech called KTechsagarJ
to facilitate exchange and collaboration on matters of innovation and cybersecurity between
businesses and academia. It is intended to provide an overview of India/s cybersecurity
preparedness and relevant stakeholders.
In a Srst of its kind public-private partnership, MeitY in 203q launched /Cyber Furakshit
Bharat/ to strengthen the cybersecurity ecosystem in India, by spreading awareness about
cybercrime and undertaking capacity-building for CIFOs and IT staff across all government
departments. The founding partners of the consortium are IT companies Microsoft, Intel,
WIPRO, Redhat and 1imension 1ata. Additionally, knowledge partners include CERT-In, NIC,
NAFFCOM and the DI1O Alliance and consultancy Srms 1eloitte and EY.
Insurance
Is insvrance for cybersecvrity breacFes aCailable in yovr kvrisdiction and
is svcF insvrance obtainable for most organisationsW ’oj common is itW
Cybersecurity insurance has gained momentum in India. It is aimed at shielding online users
against the damage and loss that may arise as a result of unauthorised disclosure of or
access to personal and Snancial data. Cyber insurance is prevalent and common in the
banking, IT and ITEF, retail and manufacturing sectors.
Durthermore, last year a task force set up by government submitted recommendations for
formulation of a National Cyber Fecurity Ftrategy 2028, which can be expected to provide
certain guidance on cyber insurance. ;owever, the Ftrategy has not yet been released.
ENFORCEMENT
Regulatory authorities
HFicF regvlatory avtForities are primarily responsible for enforcing
cybersecvrity rvlesW
The Computer Emergency Response Team (CERT-In) is the nodal agency recognised
under the Information Technology Act 2000 (IT Act) for the coordination of cyber incident
response activities and the handling of cybersecurity incidents. Durther, the government has
also established certain authorities and agencies for according protection speciScally to
the critical infrastructure of India, such as the National Critical Information Infrastructure
Protection Centre, which was created to assess and prevent threats to vital installations and
critical infrastructure in India. As and when a cybersecurity incident is determined, individuals
and organisations can seek remedy from the adVudicating authorities appointed under the
IT Act.
Fector-speciSc regulators have also attempted to enforce compliance with their respective
information security standards. Dor example, the Reserve Bank of India (RBI) imposed
a monetary penalty of 26.6 million rupees on the Bank of Bahrain &uwait BFC, India
Operations for non-compliance with the directions of the Cyber Fecurity Dramework in Banks.
In zanuary 2020, the Union Minister for ;ome Affairs inaugurated the Indian Cyber Crime
Coordination Centre (I4C) to deal with all types of cybercrime in a comprehensive and
coordinated manner. One of the components of I4C is the National Cyber Crime Reporting
Portal, which is a citi en-centric initiative that enables citi ens to report all kinds of
cybercrime online, with a speciSc focus on crimes against women and children 5 particularly
child pornography, child sexual abuse material and online content pertaining to rapes,
gang rapes and similar crimes. The complaints reported on this portal are dealt with by
law enforcement agencies and police, based on the information made available in the
complaints.
The 1igital Personal 1ata Protection Act 2028 (1P1P Act) mandates a data Sduciary to
have reasonable security safeguards in place to prevent breach of personal data. The 1ata
Protection Board of India established by the central government under the 1P1P Act can
impose a monetary penalty of up to 2.‘ billion rupees for breach in observing this obligation.
Durther, the adVudicating authorities appointed under the IT Act have the powers of a civil
court to call for evidence and documents, and summon witnesses in connection with an
inQuiry into any contravention under the IT Act.
As per the provisions of the IT Act, for national security and for investigation of any offence
(including cybersecurity offences), authorised government o’cers can issue orders to
intercept, monitor or decrypt any computer resource, ask intermediaries to provide access
to any information or to block access to any information stored, received or generated in any
computer resource. Additionally, law enforcement agencies can be authorised to monitor
and collect tra’c data or information generated, received or transmitted in any computer
resource, and can conSscate any computer resource in respect of which any contravention
of the IT Act has been carried out.
Indian law also provides law enforcement authorities with various other mechanisms to
pursue, investigate and prosecute cyber criminals. Dor instance, the Indian Penal Code 3q60
(IPC) is a comprehensive code intended to cover most substantive aspects of criminal law.
Criminal activities punishable under the IPC do extend to the online cyberspace infrastructure
and will be dealt with in the same manner.
Under the 1P1P Act, the 1ata Protection Board of India established by the central
government can inQuire into breach of personal data under certain circumstances and
impose penalty.
offshore entities that do not have a business presence in India, as well as a’xing liability
in multi-layered business outsourcing structures. The absence of a comprehensive data
protection law that allocates cybersecurity responsibilities between all relevant stakeholders
is also a concern. Over time, the private sector and the government have felt the need to
develop more cybercrime and prosecution expertise among the police personnel responsible
for prosecuting offences under the IT Act, and speciSc local cyber cells have been set up to
address this gap.
In addition, sector-speciSc regulators have their own reporting reQuirements. Dor instance,
the RBI reQuires banks to comply with the Cyber Fecurity Dramework in Banks, which, among
others, reQuires banks to report cybersecurity incidents to the RBI within two to six hours. The
Guidelines on Regulation of Payment Aggregators and Payment Gateways issued by the RBI
reQuire payment aggregators to put in place a mechanism for the monitoring, handling and
follow-up of cybersecurity incidents and breaches. These incidents and breaches must be
reported immediately to the 1epartment of Payment and Fettlement Fystems, RBI, Central
O’ce, Mumbai, and reported to CERT-In.
As per the 1P1P Act, a data Sduciary is reQuired to notify the 1ata Protection Board of India
(established by the central government) and the data principal affected by such breach. The
form and manner of such notiScation will be prescribed in the rules to be formulated under
the 1P1P Act.
Fection 66C of the IT Act provides that a person who, fraudulently or dishonestly, makes use
of the electronic signature, password or any other uniQue identiScation feature of any other
person will be punished with imprisonment of up to three years and will also be liable for
payment of a Sne of up to 300,000 rupees.
Additionally, the IT Act under Fection –0B provides for imprisonment of up to one year
or a Sne of up to 300,000 rupees, or both, for any failure by an entity (service provider,
intermediary, data centre, body corporate, etc) to provide reQuisite information reQuested by
CERT-In. Durthermore, sector-speciSc authorities (such as the RBI) may also levy penalties
for non-compliance with their respective cybersecurity standards.
Durther, under the 1P1P Act failure to have reasonable security safeguards in place to
prevent breach of personal data can result in imposition on the data Sduciary of a Snancial
penalty of up to 2.‘ billion rupees.
In addition, sector-speciSc regulators have their own reporting reQuirements. Dor instance,
failure to report within the timelines prescribed for banks under the Cyber Fecurity
Dramework in Banks may result in the imposition of penalties by the RBI. Dor the
telecommunications sector, the uniSed licence conditions stipulate that any failure by the
licensee to comply with the obligations provided therein, including reporting of any intrusions,
attacks and frauds on the technical facilities, may render the concerned licensee liable to a
monetary penalty of up to ‘00 million rupees per breach.
Under the 1P1P Act, a failure to notify the 1ata Protection Board of India or affected data
principal of a personal data breach can result in a penalty of up to 2 billion rupees.
PriVate enforcement
’oj can parties seeq priCate redress for vnavtForised cyberactiCity or
failvre to adeTvately protect systems and dataW
The IT Act makes statutory remedies available to persons affected by a cyber security
incident. Fection 48A of the IT Act expressly provides that whenever a body corporate
possesses or deals with any sensitive personal data or information, and is negligent in
maintaining reasonable security practices and procedures that in turn cause wrongful loss or
wrongful gain to any person, the body corporate will be liable to pay damages to the person
affected. Therefore, the affected party may initiate a civil action against the negligent body
corporate, making it liable to pay damages.
Durther, a civil action may also be brought against any person who, without permission of
the owner of a computer or a computer system or network, does any of the acts mentioned
under section 48 of the IT Act, including but not limited to accessing or securing access to
the computer or computer system or network, downloading or extracting any data from it,
contaminating it with a virus or other malware, or causing any damage to it.
The Ministry of ;ome Affairs has operationalised a toll-free National ;elpline number /3'80/
(previously /3‘‘260/) and an online reporting platform, namely, the /National Cyber Crime
Reporting Portal/ to enable persons to immediately report Snancial loss caused to persons
due to cyber Snancial frauds including debit or credit card fraud, e-wallet and internet banking
related fraud, etc. This reporting platform can also be used by persons to report other kinds of
cybercrimes, which include unauthorised access of data or data breach, ransomware, online
and social media-related crimes, cryptocurrency related frauds, etc.
Under the newly enacted 1P1P Act, a data principal has a right to readily available means
of grievance redressal to be provided by the data Sduciary and7or consent manager. The
right available to a data principal is for an act or omission by the data Sduciary and consent
manager regarding the performance of their obligation under the 1P1P Act or exercise of the
data principalJs rights under the 1P1P Act. Dor instance, such acts or omissions can include
failure to have reasonable security safeguards in place to prevent breach of personal data
and failure to intimate the affected data principal of a personal data breach.
H have information security systems in place that are commensurate to the information
assets sought to be protectedj
H appoint a grievance o’cer to address any discrepancies and grievances of the
provider of such informationj
H have a privacy policy for providing information on how such information is used and
disclosed, etcj and
H in addition, organisations are reQuired to audit the reasonable security practices and
procedures that have been implemented at least once a year, or as and when the
body corporate or a person on their behalf undertakes signiScant upgrading of their
process and computer resourcesj
H Companies (Management and Administration) Rules 2034• companies, when dealing
with electronic records, are reQuired to ensure the security of any such records,
including•
Record-qeeping re uirements
?escribe any rvles reTviring organisations to qeep records of cybertFreats
or attacqs@
CERT-In 1irections prescribe that entities, such as service providers, intermediaries, data
centres, body corporate and government organisations (Entity) are reQuired to maintain logs
of Information and Communication Technology (ICT) systems for a rolling period of 3q0
days. The logs to be maintained will depend on the sector in which an Entity is operating
and may include Srewall logs, event logs of critical systems, application logs, 9PN logs, etc.
Relevant logs need to be provided to CERT-In when cyber incidents are reported or when so
ordered by CERT-In. The DA:s suggest that these logs can be stored outside India as long
as a copy is retained within India. The DA:s also provide that logs for successful as well as
unsuccessful events must be recorded.
The aforementioned directions and more particularly the reQuirement to maintain logs have
been challenged in 1elhi ;igh Court via a writ petition. The petition is pending before the
;igh Court, and based on public records will come up for hearing in March 2024.
Fector-speciSc regulators have prescribed storage reQuirements for regulated entities. Dor
instance, IR1AI issued the KIR1AI Information and Cyber Fecurity Guidelines 2028J, which
reQuire information and communications technology (ICT) to be maintained for a rolling
period of 3q0 days and within the Indian Vurisdiction.
Lastly, in accordance with the Fecurities Exchange Board of India Guidelines (/Cyber Fecurity
Cyber Resilience Dramework/ for Ftock Brokers71epository Participants), stockbrokers and
depository participants are reQuired to ensure that records of user access to critical systems
are identiSed and logged for audit and review purposes, and the logs should be maintained
and stored in a secure location for a period not less than two years.
The Information Technology (The Indian Computer Emergency Response Team and Manner
of Performing Dunctions and 1uties) Rules 2038 permit cybersecurity incidents to be
reported by any individual organi ation or corporate entity to CERT-In. In addition, as per
the CERT-In 1irections speciSed types of cybersecurity incidents (target-scanning or probing
of critical networks or systems, unauthorised access of an IT system and data, malicious
code attacks, identity theft, spooSng, phishing, data breach, data leak, unauthorised access
to social media accounts, attacks or incident affecting digital payment systems, attacks or
malicious7suspicious activities affecting systems7servers7software7applications related to
cloud computing, blockchain, virtual assets, virtual asset exchanges, etc) must be reported to
CERT-In by service providers, intermediaries, data centres, bodies corporate and government
organisations within six hours of noticing the incident or being brought to notice about the
incident. The KGuidelines on Information Fecurity Practices for Government EntitiesJ issued
by CERT-In also reQuire such entities to report a cyber incident to CERT-IN within six hours
of noticing the incident or being brought to notice about the incident.
The Intermediaries Guidelines reQuire the intermediaries, as part of their due diligence
obligations, to notify CERT-In of security breaches. CERT-In publishes the formats for
reporting cybersecurity incidents on its website from time to time, which reQuires mentioning
the time of occurrence of the incident, the type of incident, information regarding the affected
systems or network, the symptoms observed, the relevant technical systems deployed, and
the actions taken, among others.
In addition to the reporting reQuirements under the IT Act, separate reporting reQuirements
are applicable for cybersecurity incidents occurring in regulated sectors. Dor instance, the
Cyber Fecurity Dramework in Banks reQuires banks to inform the RBI of any cybersecurity
incident within two to six hours of the breach and include details of it in a standard reporting
template. Fuch report must include all unusual cybersecurity incidents (whether they were
successful or were attempts that did not succeed). Fimilarly, the KIR1AI Information and
Cyber Fecurity Guidelines 2028J reQuire all insurers, including foreign reinsurance branches
(DRBs) and insurance intermediaries regulated by IR1AI, to report cyber incidents to CERT-In
within six hours of noticing or being brought to notice about such incidents, with a copy to
IR1AI and other concerned regulators7authorities.
As per the Fecurities and Exchange Board of India (Listing Obligations and 1isclosure
ReQuirements) Regulations 203‘, all listed entities need to submit a Quarterly report of the
details of cyber security incidents or breaches or loss of data or documents to the recognised
stock exchange.
Time frames
HFat is tFe timeline for reporting to tFe avtForitiesW
As per the Information Technology (The Indian Computer Emergency Response Team
and Manner of Performing Dunctions and 1uties) Rules 2038 and the CERT-In 1irections,
speciSc types of cybersecurity incidents, such as target-scanning or probing of critical
networks or systems, unauthorised access of an IT system and data, malicious code
attacks, identity theft, spooSng, phishing, data breach, data leak, unauthorised access to
social media accounts, attacks or incident affecting digital payment systems, attacks or
malicious7 suspicious activities affecting systems7servers7software7applications related to
cloud computing, blockchain, virtual assets, virtual asset exchanges, etc) must be reported to
CERT-In by service providers, intermediaries, data centres, body corporates and government
organisations within six hours of noticing the incident or being brought to notice about the
incident.
In the past year, however, there has been a renewed focus on the adoption of robust
cybersecurity practices in India, from both, the government and the private sector. 1ue
to the covid-3' pandemic and the large-scale remote work and new technology adoption
resulting from it, the private sector has been Quite vigilant in adapting its processing,
updating its budgets and responding to cyber threats in a timely and nuanced manner.
Feveral organisations, such as the 1ata Fecurity Council of India, have proactively issued
advisories and assisted other private sector organisations to seamlessly transition to safer
digital processes. We expect these initiatives to guide the government in terms of the
level of cybersecurity preparedness expected from organisations, how the private sector
has responded to cybersecurity threats, a renewed focus on the revision of policies and
the diversiSed skill-set of response stakeholders, and testing the e’cacy of protective
technologies and strategies. Timely and descriptive cybersecurity reporting by the private
sector will bring in more collaboration and clarity on better practices. The varied experiences
of regulated businesses regarding cyber incidents will help guide policy, as it is likely that
sensitive sectors such as healthcare and social security will reQuire a higher standard of
compliance in view of the nature of their operations and risk assessment.
The proposed 1igital India Act 2028 (1IA) that will replace the Information Technology
Act 2000 (IT Act) can also be expected to bring a robust and dedicated law dealing with
cybersecurity.
The newly enacted 1igital Personal 1ata Protection Act 2028 (1P1P Act) and the rules to
be notiSed thereunder will also play a critical role in shaping the regulatory environment in
relation to the protection of personal data, as they seek to prescribe certain obligations of
data Sduciaries (persons who determine the purpose and means of processing of personal
data), which include among other things the use of reasonable security safeguards to prevent
personal data breach, deletion of data after the purpose for collection is served, having a
grievance redressal mechanism in place and processing of personal data only for lawful
purpose for which appropriate consent has been received. Durther, the data Sduciary and
data processor need to notify the 1ata Protection Board of India (proposed to be constituted
under the 1P1P Act) in case of breach of this personal data. The 1ata Protection Board may
in the event direct the data Sduciary to remedy this personal data breach or mitigate any
harm caused to data principals.