Preview

Sarkar

Powerful Essays
Open Document
Open Document
1580 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Sarkar
[भाग II- ख ड 3(i)]

भारत का राजप

: असाधारण

NOTIFICATION New Delhi, the 11th April, 2011

G.S.R. 315(E).— In exercise of the powers conferred by clause (zg) of subsection (2) of section 87 read with sub-section (2) of section 79 of the Information Technology Act, 2000 (21 of 2000), the Central Government hereby makes the following rules, namely:—

1. Short title and commencement.— (1) These rules may be called the Information Technology (Guidelines for Cyber Cafe) Rules, 2011.

(2) They shall come into force on the date of their publication in the Official Gazette. 2. Definitions — (1) In these rules, unless the context otherwise requires,-(a) "Act" means the Information Technology Act, 2000 (21 of 2000); (b) "Appropriate Government" means the Central Government or the State Government or an Union Territory Administration; (c) "Cyber Cafe" means cyber cafe as defined in clause (na) of sub-section (1) of section 2 of the Act; (d) "computer resource" means a computer resource as defined in clause (k) of subsection (1) of section 2 of the Act; (e) "Data" means data as defined in clause (o) of sub-section (1) of section 2 of the Act; (f) "Information" means information as defined in clause (v) of sub-section (1) of section 2 of the Act; (g) "Intermediary" means an intermediary as defined in clause (w) of sub-section (1) of section 2 of the Act; (h) "Registration Agency" means an agency designated by the Appropriate Government to register cyber cafe for their operation; (i) "Log Register" - means a register maintained by the Cyber Cafe for access and use of computer resource;

1330 GI/11-4A

THE GAZETTE OF INDIA: EXTRAORDINARY

[ PART II-SEC. 3(i)]

(j) "User" means a person who avails or access the computer resource and includes other persons jointly participating in availing or accessing the computer resource in a cyber cafe. (2) All other words and expressions used and not defined in these rules but defined in the Act shall have the meanings

You May Also Find These Documents Helpful

  • Satisfactory Essays

    The Computer Misuse Act 1990 it is a law that does not allow certain activities when using computers, this include: hacking into other people's systems, misusing software or helping a person to gain access to protected files on someone's else's computer.…

    • 605 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Kidlr Privacy Policy

    • 611 Words
    • 3 Pages

    For the purpose of Data Protection Act 1998 (The Act), data processor and controller is Kidlr..........…

    • 611 Words
    • 3 Pages
    Good Essays
  • Better Essays

    These regulations have come into force at different times according to the type of service involved. They contain definitions of the services and activities that people must be registered to provide. In some cases, they contain details about the stages at which different types of provider will be brought into the registration system. They also contain details of the standards that people registered to provide…

    • 1394 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Abstract An information technology Acceptable Use Policy (AUP) creates an understanding of what is acceptable and not acceptable between users of a system and the system owner. The AUP provides the details of criteria to establish the same rules for everyone. The AUP also serves as documentation, which the user signs, to justify that the user know the rules that they are to follow and the consequences in not following the rules.…

    • 2122 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Proctor and Gamble

    • 2195 Words
    • 9 Pages

    • Rumours surfaced immediately after P&G introduced the tool free no. system to address customer complaints…

    • 2195 Words
    • 9 Pages
    Good Essays
  • Good Essays

    Regulation of Internet

    • 680 Words
    • 3 Pages

    The usage of computer, internet, smart phones and other related devices are now an integral part of our daily lives. With the exponential raise in technology, there is also a corresponding rise in Crimes specific to new technologies. The laws prevailing till 1999 proved to be inadequate to address the growing threat of the new realm of crimes in cyber space. Therefore, the Information Technology Act, 2000 came to be enacted. This Act was further amended in 2008.…

    • 680 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Information Technology

    • 765 Words
    • 4 Pages

    The act was implemented in Federal Reserve Board Regulation E which outlined the responsibilities of the customer and of the financial institution. When an EFT error has occurred the responsibility of the customer include:…

    • 765 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    ©Lessig 1998: This essay was presented at the Taiwan Net ’98 conference, in Taipei, March, 1998.…

    • 6041 Words
    • 25 Pages
    Powerful Essays
  • Good Essays

    Computer Fraud Act Essay

    • 549 Words
    • 3 Pages

    exclusively for the use of a financial institution or the United States Government, or, in the case of a computer not exclusively for such use, used by or for a financial institution or the United States Government and the conduct constituting the offense affects that use by or for the financial institution or the Government; or…

    • 549 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Now the Internet grows at unprecedented rates, it has resulted in not only the increasing in the amount of available knowledge but also the increasing in the problems about the usage and distribution. The growth of www creates some new questions that older laws cannot answer. So the computer ethic has emerged Computer ethics is concerned with standards of conduct as they pertain to computers. Two pressing concerns in computer ethics are questions of copyright and privacy, all of which are discussion in detail in the following sections. Other problem exists as well, such as censorship, computer crime. Within the following content will include:…

    • 319 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Welebir, B. and Kleiner,B.H.(2005),"How to write a proper Internet usage policy", Journal of Management ResearchNews, Vol. 28 Iss: 2 pp. 80 – 87.…

    • 5923 Words
    • 24 Pages
    Powerful Essays
  • Better Essays

    Pemra Rules

    • 6279 Words
    • 26 Pages

    GOVERNMENT OF PAKISTAN MINISTRY OF INFORMATION AND BROADCASTING NOTIFICATION Islamabad, the 12th December, 2009 S.R.O.-1120(I)/2009.- In exercise of the powers conferred by sub-section (1) of section 39 of the Pakistan Electronic Media Regulatory Authority Ordinance, 2002 (XIII of 2002), the Pakistan Electronic Media Regulatory Authority, with the approval of the Federal Government, is pleased to make the following rules, namely:1. Short title and commencement.- (1) These rules shall be called the Pakistan Electronic Media Regulatory Authority Rules, 2009. (2) They shall come into force at once. 2. Definitions.- (1) In these rules, unless there is anything repugnant in the subject or context,(a) “application form" means the application form as may be prescribed by the Authority for grant of a licence; (b) “applicable licence fee” means the licence fee prescribed by the Authority or where applicable, determined through bidding by Authority; (c) “authorized officer” means the Chairman or a member, or any member of staff, expert, consultant, adviser, other officer or employee of the Authority to whom the Authority has by general or special order delegated its powers, responsibilities or functions under the Ordinance for carrying out the purposes of the Ordinance, rules or regulations made thereunder; (d) “cable television operator” means any person who owns, controls, manages or runs any cable television system and includes local loop holder; (e) “cable TV system” means any system consisting of closed transmission paths and associated signal generation, control and distribution equipment, designed to receive and re-transmit television channels or programs for reception by multiple subscribers; (f) “code" means the code of conduct for media broadcasters and cable TV operators specified in Schedule-A; (g) “Council” means the Council of Complaints established under the Ordinance; (h) “eligible channel” means a TV channel licensed by the Authority or otherwise declared to…

    • 6279 Words
    • 26 Pages
    Better Essays
  • Powerful Essays

    (2) It shall come into force on such date as the Central Government may, by notification…

    • 3012 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    In contrast, cybercrime is becoming a threat to government itself. Due to lack of necessary legislation to tackle such type of crime, cyber criminals are almost in the safe side to commit such crime. In the Information and Communication Technology Act.2006, there are several clauses against cybercrime. But this Information and Communication Technology act is not the concert one. By enacting this act, there is a chance to become safe side after committing crimes. So, considering these facts a comprehensive Cybercrime Protection Act should be imposed.…

    • 7199 Words
    • 29 Pages
    Powerful Essays
  • Powerful Essays

    Pndt Act

    • 5013 Words
    • 21 Pages

    (3) It shall come into force on such date as the Central Government may, by notification in the Official Gazette, appoint.…

    • 5013 Words
    • 21 Pages
    Powerful Essays