Legal Document View

Unlock Advanced Research with PRISMAI

- Know your Kanoon - Doc Gen Hub - Counter Argument - Case Predict AI - Talk with IK Doc - ...
Upgrade to Premium
[Cites 0, Cited by 0] [Entire Act]

Union of India - Section

Section 2 in The Information Technology (Procedure And Safeguard For Monitoring And Collecting Traffic Data Or Information) Rules, 2009

2. Definitions

.-In these rules, unless the context otherwise requires, -
(a)"Act" means the Information Technology Act, 2000 (21 of 2000);
(b)"communication" means dissemination, transmission, carriage of information or signal in somemanner and include both a direct communication and an indirect communication;
(c)"communication link" means the use of satellite, microwave, radio, terrestrial line, wire, wireless or any other communication media to inter-connect computer resource;
(d)"competent authority" means the Secretary to the Government of India in the Department of Information Technology under the Ministry of Communications and Information Technology;
(e)"computer resource" means computer resource as defined in clause (k) of sub-section (1) of section 2 of the Act;
(f)"cyber security incident" means any real or suspected adverse event in relation to cyber security that violates an explicitly or implicitly applicable security policy resulting in unauthorised access, denial of service/disruption, unauthorised use of a computer resource for processing or storage of information or changes to data, information without authorisation;
(g)"cyber security breaches" means unauthorised acquisition or unauthorised use by a person of data or information that compromises the confidentiality, integrity or availability of information maintained in a computer resource;
(h)"information" means information as defined in clause (v) of sub-section (1) of section 2 of the Act;
(i)"information security practices" means implementation of security policies and standards in order to minimize the cyber security incidents and breaches;
(j)"intermediary" means an intermediary as defined in clause (w) of sub-section (1) of section 2 of the Act;
(k)"monitor" with its grammatical variations and cognate expressions, includes to view or inspect or record or collect traffic data or information generated, transmitted, received or stored in a computer resource by means of a monitoring device;
(l)"monitoring device" means any electronic, mechanical, electro-mechanical, electro-magnetic, optical or other instrument, device, equipment or apparatus which is used or can be used, whether by itself in combination with any other instrument, device, equipment or apparatus, to view or inspect or record or collect traffic data or information;
(m)"port" or "application port" means a set of software rules which identifies and permits communication between application to application, network to network, computer to computer, computer system to computer system;
(n)"Review Committee" means the Review Committee constituted under rule 419-A of the Indian Telegraph Rules, 1951;
(o)"security policy" means documented business rules and processes for protecting information and the computer resource;
(p)"traffic data" means traffic data as defined in Explanation (ii) to section 698 of the Act.