India has reaffirmed its commitment to the new rules of cyber security under a directive from the country’s Computer Emergency Response Team, known as Cert-In, which will force virtual private server providers, cloud service providers and virtual private network service providers (VPNs). save customer information.
Service providers will be required to maintain a database that includes user IP addresses, names, subscription dates, user email addresses, verified addresses, and contact information.
India’s junior IT minister Raji Chandrasekhar has been released Frequently Asked Questions The document on Wednesday addresses concerns about the new rules, in particular the requirement that technology companies provide information to the government about data breaches within six hours of the incident.
“The nature of user թվականին risk risks in 2022 is different from what it was a decade ago. ‘Incident fast և mandatory reporting is a mandatory prerequisite for remedial action to ensure cyberspace stability and flexibility,” Chandrasekhar said. .
According to: Reuters:Chandrasekhar also said that technology companies should “leave” the country if they do not want to obey the new order of the government.
At the same time, VPN provider ProtonVPN expressed concerns on the new rules, claiming that the regulations “attack privacy, threaten to put citizens under the microscope”, that the company adheres to its “no registration policy”.
The FAQ document states that those who do not follow the rules for failing to provide this information will be punished with imprisonment of up to one year, a fine of up to 100,000 rubles, or both. The new rules are expected to take effect in late June, after being first published on April 28.
see secret product in Box below
‘The accuracy or reliability of any information/material/calculation contained in this article is not guaranteed. This information has been brought to you by collecting from various mediums / astrologers / almanacs / discourses / beliefs / scriptures. Our purpose is only to deliver information, its users should take it as mere information. In addition, any use thereof shall be the responsibility of the user himself.’