This memorandum sets forth requirements for National Security Systems (NSS) that are equivalent to or exceed the cybersecurity requirements for Federal Information Systems set forth within Executive Order 14028 of May 12, 2021 (Improving the Nation’s Cybersecurity), and establishes...
Cyber Law
We observe with increasing concern that cyber threats to the security of the Alliance are complex, destructive, coercive, and becoming ever more frequent. This has been recently illustrated by ransomware incidents and other malicious cyber activity, targeting our critical...
We are launching advanced technology academic programmes in our universities and creating artificial intelligence competence centres at our leading universities and research institutions. Their work will be an important step towards creating a system of interdisciplinary research incorporating both...
Guideline are applicable to all Responsible Entities as well as System Integrators, Equipment Manufacturers, Suppliers/Vendors, Service Providers, IT Hardware and Software OEMs engaged in the Indian Power Supply System for protection of Control Systems for System Operation and Operation...
r. The Government has launched the National Cyber Crime Reporting Portal (www.cybercrime.gov.in), to enable public to report incidents pertaining to all types of cyber crimes, with a special focus on cyber crimes against women and children.
This reference aid draws on CTIIC’s experience promoting interagency situational awareness and information sharing during previous significant cyber events—including cyber threats to elections. It provides a guide to cyber threat terms and related terminology issues likely to arise when...
Claims linking 5G technology with COVID-19 pandemic are false and have no scientific basis

2 min read
It has come to the notice of the Department of Telecommunications (DoT), Ministry of Communications that several misleading messages are being circulated on various social media platforms claiming that the second wave of coronavirus has been caused by the...
At the FBI, we’ve been fighting the cyber threat for many years now. We began our early high-tech crime effort in the mid-1990s, and created our Cyber Division almost 20 years ago, in 2002. We’ve become known for our...
The second part explores illegal trafficking of people, drugs, and other illicit goods as a global phenomenon, aided by the ease of international travel, funds transfer, and communication. Finally, international approaches to crime detection prevention are presented. The work...
Sec 69A of IT Act: Power to block data generation, transmission, stored or hosted in any computer.

1 min read
Power to issue directions for blocking for public access of any information through any computer resource.
Government of India invoking it’s power under section 69A of the Information Technology Act read with the relevant provisions of the Information Technology (Procedure and Safeguards for Blocking of Access of Information by Public) Rules 2009 and in view...
This Regulation lays down rules relating to the protection of natural persons with regard to the processing of personal data and rules relating to the free movement of personal data.