securitylinkindia

Securing India’s Cyberspace: A Legal and Policy Perspective

Ashish Kumawat, Former Security Professional with Reliance Group Support Services; PhD in Public Policy and Law from Central University of Rajasthan In any nation, laws and public policies are the torchlights for development within any domain. It sets forth the path to be followed, the existence of a liberal/ restrictive space within which the innovations can flourish or be curtailed. However, the main problem pertains to the long gestation period in the visibility of the outcomes, which may restrict the promptness of the governments to amend the policy or to resort to Parliament to amend the laws. The same may also hold for cyber-space in India. As per the Data Security Council of India (DSCI), India remains the second most cyber-attack-affected country globally. Dr U.K. Vairagade, associate professor, Dr. (Sow.) IBP Women’s College (Aurangabad) says that the modern thief can still do more with a computer than with a gun. Dr Vairagade argues that today’s terrorists can do much more harm with a keyboard than with a bomb. In this age of artificial intelligence, internet of things and cloud computing, do people like Osama still need to hijack a narrow plane? The obvious answer, as we all may agree, is that today, a simple attack on critical infrastructure can be more devastating than any other attack. One of the best and most recent examples of this case is Russia’s cyber-attacks on Ukraine. Therefore, the importance of cyber-security cannot be underestimated. Anju A. Singh, assistant professor, V.N. Patil Law College (Aurangabad), states that we cannot ignore cyber-security in India as it has become an indispensable asset to protect businesses, governments, institutions, and individuals. Legal and policy strategies adopted in India Given the importance of cyber-security and its potential to disrupt the political as well as socio-economic fabric of the nation, India did not remain aloof in the challenges brought about by growing cyberspace. It promptly adopted the following strategies. Legislative strategies A. The Information Technology Act, 2000 (IT Act, 2000) and its Amendment in 2008 (IT Act, 2008): It envisages a coalition of actors where responsibilities are fixed among various stakeholders. The important sections in these Acts are: Section 43: It makes hacking anyone’s computer or network a punishable offence. It includes manipulation of storage, the introduction of contaminants or computer viruses, denial of access, damage to any associated component of computer vision network data etc.; Section 43A: This section was introduced via amendment in 2008 to the original act. It makes a body corporate responsible for protecting the ‘sensitive personal data’ of its stakeholders. Here central government holds the right to prescribe what ‘sensitive personal data’ means. Section 66F: The act of cyber terrorism shall be punishable with imprisonment which can be extended to life imprisonment. Section 72A: This section makes it a criminal offence to disclose personal data without the data subjects’ consent or in any breach of a lawful contract. Here the person performing the contract is aware that their action can likely cause wrongful loss or gain. One of the critical institutional mechanisms that arose from the IT Act of 2008 was the establishment of the Computer Emergency Response Team – India (CERT-IN), which was responsible for scanning internet traffic. B. Draft Digital Personal Data Protection Bill 2022: An upgrade over the withdrawn Draft Data Protection Bill, 2019, it fixes liabilities on data fiduciaries (an institution which keeps the data of users/ citizens). It also gives necessary rights to citizens, like obtaining information and seeking necessary corrections. One crucial aspect is the right to seek the erasure of data once the data’s purpose has been met. However, there is an element of differentiality in this clause’s applicability to private and specific public organisations. C. Indian penal code (IPC): Section 500 (defamatory emails): it attracts imprisonment up to 2 years or a fine or both. IPC under sections 463 and 383 makes email spoofing and web jacking punishable crimes, respectively. Further, sections 201, 292, 294, 409,448 and 509 can be used to govern cyber-crimes. Also, the Supreme Court’s original jurisdiction under Article 21 of the Constitution can be invoked in cyber-crimes affecting privacy. Policy and associated strategies: A. National Cyber Security Policy 2013: One of the most promising aspects of this policy was the set up of the National Critical Information Infrastructure Protection Centre (NCIIPC) under the National Technical Research Organisation (NTRO). India has successfully started leveraging this institution. For example, it’s a successful warning against the Shadow Pad attack. Another key feature of this policy was creating a talent pool of five lakh cybersecurity professionals by 2018. Further, it envisages the concept of shared responsibility for tackling social and economic issues in the form of emphasis on public-private partnerships. One of the successful initiatives has been Cyber Surakshit Bharat Initiative. B. Cyber security and R&D: there have been significant developments in the field of R&D, like the creation of the techno-legal National Cyber Security Database of India. Also, a Cyber Security Software Repository has been created. Further, many initiatives have been taken to advance cyber security at the individual, organisational level. cases: There have been certain landmark Indian cases related to the prevention of cybercrime and various interpretations related to the IT Act of 2000 and 2008, IPC. These also have implications for the evolution of the policies. These are: Suhas Katti case: It is related to posting derogatory messages about a divorced woman. The accused was punished under section 67 of the IT Act, 2000 and section 469, 509 of IPC. Pune City Bank case: Few Citibank employees won customers’ trust, got the pin numbers from them and transferred USD 3,50,000 to bogus accounts. Later, the accounts where the money was transferred had to be frozen. Jogesh Kwatra case: Jogesh Kwatra, an employee of the plaintiff company, started sending defamatory, vulgar emails to his subordinates and customers worldwide. The aim was apparent- to defame the company. Finally, Delhi High Court assumed the jurisdiction in this case. Bank NSP case: This case pertained to deception using…

Read More

Building the Digital Future with AI Driven Autonomic Operations

Prakash Prabhu – Chief Business Officer & Co-Founder, VisionBot We have seen how Visionbot™ can take your visual inspection monitoring to the next level. With Visionbot™, you can automate those manual workflows using AI and Deep Learning. It’s like having a super-smart assistant that can detect objects, events, and anomalies in real-time. And get this, it works with your existing fixed video cameras, so you don’t need to invest in any additional hardware Imagine this: Most of your operational workflows are already semi-automated and captured by your ERP system. How about unifying multiple data points generated within all your business processes with the power of Visual AI. The autonomic enterprise is a self-optimizing business that applies AI and automation to decisioning, operations, and servicing across the organization. You can get real-time reports and alerts from the field or shop floor without any hassle. Field workers can simply send and get reports over images, videos, or text while on duty. Visionbot™ will do its magic, leveraging AI and Deep Learning to analyse and detect any issues or anomalies. This frees up your field workforce and supervisory staff to focus more on their core tasks and services. No more wasting time on manual reporting and supervision. Business operations in any agile enterprise is a combination of processes, interactions and activities that result in products services and information, and ultimately provide value to customers and stakeholders of the organization. Automation of business operations tends to be relatively based on historical processes with adaptability based on anticipated conditions. Autonomic business operations extend this by evaluating current and changing processes with more adaptability based on changing conditions. When you unify Visual AI with data driven process automation, you leverage Inferential and Generative AI techniques that optimize and automate back-end processes at scale. At Visionbot™, we work on deep learning and various implementations of GANs to enhance operational efficiencies in core areas of construction, manufacturing, logistics, retail and many more verticals. The incremental journey to an autonomous enterprise is not a leap but a consistent shift Manual-led: Where people make most decisions, performing all functions. Automated: Where tech handles routine while people take on non-routine actions for scale and efficiency. Self-learning/ AI-guided: Where tech provides the real-time insights people need to make decisions for relevance and speed. Self-optimizing: Where tech drives agility autonomously while people focus on innovating to meet enterprise-wide objectives. Enterprise owners and technology innovation leaders wanting to exploit emergent autonomic business operations trends should: Create visibility and understanding of internal operations that underpin operational excellence and external interactions as represented by customer journey models. Do this by discovering exceptions and shadow operations with process mining, and providing input to the Autonomic operational process. Operationalize the design of risk, compliance and, by extension, sustainability controls through understanding and connecting these controls to the day-to-day business operations. Explore the path from autonomous business operations to autonomic business operations – the automation of automation, or automation with limited human intervention. According to Gartner research by 2024, 25% of global enterprises will have embraced process mining as a step-up to autonomic business. This means showing adaptive behaviour and aiming to enhance adapt ability and resilience of an organization by delivering continuous insights, guidance and actions connected to the actual situation (current state), targeted at a new operating model (future state), and driven by decision support capabilities (AI data driven). Business operations resilience Based on available day-to-day operational data, process mining tools continuously seek and find the relevant objective operational data. The advanced process mining algorithms then provide an accurate model of the ways of work in a format that can be understood by anybody in the organization. Autonomous business operations resilience Adding execution or automation capabilities to the mined data allows for an autonomous way of handling this operation. Autonomous does not relate to outcomes and only acts within predefined patterns or predefined rules that limit the change to processes, activities and/ or information. Autonomic business operations resilience Through providing awareness and learning capabilities, the full resilience life cycle is handled in an autonomic way. Autonomic implies the ability to adjust the structural rules or patterns based on the observed changes in the real-world process activity versus the historical baseline context within a business operations model. Autonomic business operations will have considerable impact in many business areas. Operational excellence. Customer experience. Risk and compliance. Sustainability Automation EXAMPLE : AI driven Autonomic operations Optimization of Production Schedule It can analyse thousands of Production Scenarios and create valid and optimal plans/ schedules that maximizes yield while improving other important production outcomes. EXAMPLE : AI driven Autonomic operations Optimization of Production Schedule I t can analyse thousands of Production Scenarios and create valid and optimal plans/ schedules that maximizes yield while improving other important production outcomes. ROI Example 10-20% improvement in OTIF planning and scheduling performance. 25% improvement in customer satisfaction. Reduced Delta between Forecast and Billed Sales. 15% reduction in rolling inventory levels. Data Needed Historical Production Yield data. Historical Production Schedules used. Order Booked. Forecast. Inventory schedules. Why Visionbot™? 1.1 Purpose Built AI State-of-the-art and configurable AI engine built with deep industry expertise. 1.2 Outcome Driven Committed to creating value with an collaborative outcome-oriented approach. 1.3 Interconnected Decisions Interconnected decisions enabled through our Visionbot™ AI Cloud platform tailored for consumer businesses. 1.4 Time to Value Accelerated deployment, scalable architecture, faster time-to-value. With Visionbot™, decisions & workflows are continuously optimized by real-time, unified AI, process mining and automated visual discovery. Connect with our experts to understand how companies are using Visionbot™ AI driven Computer Vision to strengthen security, safety and streamline operations. https://visionbot.com/contactus We welcome Technology Integrators and sector specific VAR’s to be come a Visionbot™ channel partner, and discover the opportunity to offer a cutting-edge AI-powered computer vision solution to your customers. https://visionbot.com/partnering.    

Read More