Handbook on Artificial Intelligence & Machine Learning

by D.P. Mittal

Handbook on Artificial Intelligence & Machine Learning

by D.P. Mittal

CONTENTS

Chapter 1: Artificial Intelligence
1.1 Introduction 1
1.2 Artificial intelligence – An idea 3
1.3 Artificial Intelligence (AI) performing tasks requiring human intelligence 3
1.4 “Artificial intelligence“- nomenclature misnomer 5
1.5 Artificial intelligence - cause for both concern and optimism 7
1.6 Artificial intelligence and e-commerce 9
1.7 Artificial intelligence- Part of daily life 11
1.8 Artificial intelligence needs to be regulated 12
Chapter 2: What is Artificial Intelligence
2.1 Introduction 15
2.2 What is artificial intelligence 17
2.3 Artificial intelligence— kinds 21
2.4 Artificial intelligence - Generative vs Predictive 22
2.5 Application - Speech recognition and computer vision, etc 23
  • 2.5.1 Speech recognition
23
  • 2.5.2 Facial recognition
23
  • 2.5.3 Voice recognition
24
Voice assistants 24
True conversations with virtual assistants©Shutterstock/Zapp2Photo 25
  • 2.5.4 Computer vision
25
  • 2.5.5 Generative AI
25
  • 2.5.6 Generative Pre-trained Transformer (GPT)
26
2.6 Artificial intelligence – History and development 26
  • 2.6.1 History of artificial intelligence: Key dates and names
28
2.7 Artificial intelligence - Ubiquity in Technology 29
2.8 Artificial Intelligence – Role in Market and Industry 31
  • 2.8.1 Finances and Financial Markets
33
  • 2.8.2 Retail and E-Commerce
35
  • 2.8.2a Customer service - Chatbots
36
  • 2.8.3 Manufacturing sector
36
  • 2.8.4 Marketing and Advertising
37
  • 2.8.5 Transportation and Logistics:
37
  • 2.8.6 Robotics- Transforming industries
38
  • 2.8.7 Agriculture
38
  • 2.8.8 Healthcare
39
  • 2.8.9 Education
40
  • 2.8.10 Breaking language barrier
41
  • 2.8.11 Environmental monitoring
41
  • 2.8.12 Climate change
41
  • 2.8.13 Space exploration
42
  • 2.8.14 Drafting legal document
42
  • 2.8.15 Doing social good
42
  • 2.8.16 Wearable technology
42
  • 2.8.17 Fashion Technology- “Augmented Reality (AR)�
43
2.9 Application 44
2.10 Limitations 45
  • 2.10.1 Artificial intelligence (AI) ethics
47
2.11 Risks and harm 50
Chapter 3: Algorithm, Data and Data Processing
3.1 Introduction 53
3.2 Data 53
  • 3.2.1 Data and processed data (information)
55
  • 3.2.2 Data stored in a database
55
  • 3.2.3 Personal Data and Digital Personal Data
56
  • 3.2.4 Data represented though digital technology
57
  • 3.2.5 Data refers to processed information
58
  • 3.2.6 Data processing - manipulation of data by a computer
59
  • 3.2.7 Computer data
59
3.3 Computer functions and computer software 60
  • 3.3.1 Electronic transmission of information
62
  • 3.3.2 Data conversion, storage and retrieval- Internet technology (or “World Wide Web�)
63
  • 3.3.3 Software - meaning
64
  • 3.3.4 Computer programming to accomplish a specific computing result
65
3.4 Algorithm 66
3.5 Artificial intelligence (AI) is naught but algorithms 67
3.6 Algorithms - heart of machine learning 68
3.7 Algorithms and ethics 68
  • 3.7.1 Algorithmic bias
69
  • 3.7.2 Algorithmic transparency
70
  • 3.7.3 Algorithmic accountability (Privacy)
71
Chapter 4: Machine Learning, Deep Learning and Deepfake
4.1 Introduction 72
4.2 Machine Learning 73
  • 4.2.1 AI and ML not same, though used interchangeably
74
4.3 AI vs ML 75
4.4 Machine learning- kinds 76
  • 4.4.1 Supervised machine learning
77
  • 4.4.2 Unsupervised machine learning
80
  • 4.4.3 Semi-supervised learning
81
  • 4.4.4 Reinforcement learning (RL)
81
4.5 Machine learning- Challenges 82
4.6 Machine learning is evolving 83
4.7 Deep learning 83
  • 4.7.1 Functions
84
  • 4.7.2 Deep learning versus Machine learning
86
  • 4.7.3 Deep learning how works
87
  • 4.7.4 Deep learning - Types
87
  • 4.7.5 Deep learning – advantages and challenges
89
4.8 Neural network 89
Interpreting brain signals 90
  • 4.8.1 Neural networks verses machine learning versus deep learning 91
4.9 Deepfake Technology 91
  • 4.9.1 Deepfake – detection
93
  • 4.9.2 Deepfakes – creation
93
  • 4.9.3 Deepfake – Effects
94
Chapter 5: Generative Artificial Intelligence
5.1 Introduction 96
5.2 Generative AI models / Predictive AI models 97
5.3 Generative AI - meaning 98
  • 5.3.1 Generative AI- Types
99
5.4 Generative AI- A brief history 100
5.5 Rise of Generative Models 102
5.6 Generative Models - Kinds 103
  • 5.6.1 Variational autoencoders (VAEs)
104
  • 5.6.2 Generative Adversarial Networks (GANs)
104
  • 5.6.3 Diffusion models
105
  • 5.6.4 Transformer model
105
  • 5.6.6 Multimodal AI
107
  • 5.6.6a Multimodal AI : AI agents
107
  • 5.6.6b AI agents different from large language models
108
  • 5.6.6c AI agents - potential uses
108
  • 5.6.6d AI agents - risks and challenges
109
5.7 Generative AI - What can create 109
  • 5.7.1 Text
109
  • 5.7.2 Image generation
110
  • 5.7.3 Video
110
  • 5.7.4 Sound, speech and music
110
  • 5.7.5 Software code
111
  • 5.7.6 Design and art
111
  • 5.7.7 Simulations and synthetic data
111
5.8 Generative AI – Benefits 112
5.9 Generative AI - challenges and risks 113
5.10 Leading AI tools 113
Chapter 6: ChatGPT
6.1 Introduction 115
6.2 ChatGPT— Conversational Artificial Intelligence 116
6.3 Evolution of Digital “Avatar� 116
6.4 ChatGPT—Predictive principle 117
6.5 ChatGPT—How does it work? 118
6.6 ChatGPT — How accessed 119
  • 6.6.1 Prompt
120
6.7 Whether ChatGPT is reliable? 120
6.8 ChatGPT— how people used 121
6.9 ChatGPT- Benefits 122
  • 6.9.1 Enhancing Efficiency
123
  • 6.9.2 Around-the-clock availability
123
6.10 Limitations 124
6.11 Challenges and Ethical Considerations: 124
  • 6.11.1 Bias
125
  • 6.11.2 Privacy
125
  • 6.11.3 Plagiarism
125
  • 6.11.4 Employment
126
6.12 ChatGPT updates 126
6.13 ChatGPT-Alternatives 128
  • 6.13.1 ChatGPT, Microsoft’s Co-Pilot, and Google’s Gemini— Distinct benefits and use
129
Chapter 7: Cybersecurity and Cybercrimes
7.1 Introduction 130
7.2 Cybersecurity — meaning 131
7.3 Cybersecurity- Risk elements 132
7.4 Physical assets 133
  • 7.4.1 Computer
134
  • 7.4.2 Computer system
134
  • 7.4.5 Computer network
135
7.5 information assets – Information on computer 135
7.6 Cybersecurity — administrative and physical 137
7.7 Cybersecurity — computerised information 138
  • 7.7.1 Network hackers
139
  • 7.7.2 Crackers
139
7.8 Virus incidents 140
  • 7.8.1 Viruses
140
  • 7.8.2 Worms
141
  • 7.8.3 Trojan horse
141
  • 7.8.4 Logic bomb
142
7.9 Unauthorised disclosure of information 142
7.10 Denial of service 143
7.11 Cybercrimes 143
7.12 Cybercrime — defined 144
7.13 Cybercrimes — Information Technology Act, 2000 144
7.14 Computer a target or a tool for criminal purposes 145
7.15 Tampering computer source document 147
  • 7.15.1 Computer source code
148
  • 7.15.1aComputer source code required to be kept or maintained
149
  • 7.15.2 Concealing, destroying or altering the computer source code
150
7.16 Hacking of computer system 150
7.17 Unauthorised access 152
  • 7.17.1 Unauthorised excess would simply mean — Hacking
153
  • 7.17.1a Hacking- two elements
155
  • 7.17.1b Hacker- Employees
155
7.18 Unauthorised access by employees 155
7.19 Unauthorised downloading, copying, etc 156
7.20 Denial of access (denial of service) 157
7.21 Computer related fraud 158
7.22 Information theft 159
7.23 Cheating by personation 160
  • 7.23.1 Cheating
161
  • 7.23.2 Cheating by personation-Phishing
161
7.24 Violation of Privacy 163
7.25 Cyber Terrorism 164
7.26 Cybersecurity — role that AI plays 165
  • 7.26.1 Behavioural analysis
166
  • 7.26.2 Network Traffic Analysis (NTA)
167
  • 7.26.3 Automation and Response
167
7.27 Security measures 167
Chapter 8: European Union Artificial Intelligence Act
8.1 Introduction 169
8.2 Explanatory memorandum - Reasons for and objectives of the proposal 170
8.3 Aim of the Act 174
8.4 AI applications — classifications 174
Chapter 9: Glossary 177

Appendices

THE DIGITAL PERSONAL DATA PROTECTION ACT, 2023

Chapter I: Preliminary
1. Short title and commencement 217
2. Definitions 217
3. Application of Act 220
Chapter II: Obligations of Data Fiduciary
4. Grounds for processing personal data 221
5. Notice 221
6. Consent 222
7. Certain legitimate 224
8. General obligations of Data Fiduciary 225
9. Processing of personal data of children 227
10. Additional obligations of Significant Data Fiduciary 228
Chapter III: Rights and Duties of Data Principal
11. Right to access information about personal data 228
12. Right to correction and erasure of personal data 229
13. Right of grievance redressal 230
14. Right to nominate 230
15. Duties of Data Principal 230
Chapter IV: Special Provisions
16. Processing of personal data outside India 231
17. Exemptions 231
Chapter V: Data Protection Board of India
18. Establishment of Board 233
19. Composition and qualifications for appointment of Chairperson and Members 233
20. Salary, allowances payable to and term of office 234
21. Disqualifications for appointment and continuation as Chairperson and Members of Board 234
22. Registration by Members and filling of vacancy 234
23. Proceedings of Board 234
24. Officers and employees of Board 235
25. Members and officers to be public servants 235
26. Powers of Chairperson 235
Chapter VI: Powers, Functions and Procedure to be Followed by Board
27. Powers and functions of Board 236
28. Procedure to be followed by Board 237
Chapter VII: Appeal and Alternate Dispute Resolution
29. Appeal to Appellate Tribunal 238
30. Orders passed by Appellate Tribunal to be excecutable as decree 239
31. Atternate dispute resolution 239
32. Voluntary undertaking 239
Chapter VIII: Penalties and Adjudication
33. Penalties 240
34. Crediting sums realised by way of penalties to Consolidated Fund of India 240
Chapter IX: Miscellaneous
35. Protection of action taken in good faith 240
36. Power to call information 240
37. Power of Central Government to issue directions 240
38. Consistency with other laws 241
39. Bar of jurisdiction 241
40. Power to make rules 241
41. Laying of rules and certain notifications 243
42. Power to amend Schedule 243
43. Power to remove difficulties 244
44. Amendments to certain Acts 244
The Schedule 245

THE INFORMATION TECHNOLOGY ACT, 2000

90. Power of State Government to make rules

Chapter I: Preliminary
1. Short title, extent, commencement and application 247
2. Definitions 248
Chapter II: Digital Signature and Electronic Signature
3. Authentication of electronic records 251
  • 3A. Electronic signature
251
Chapter III: Electronic Governance
4. Legal recognition of electronic records 252
5. Legal recognition of electronic signatures 252
6. Use of electronic records and electronic signatures in government and its agencies 252
  • 6A. Delivery of service by service provider
253
7. Retention of electronic records 253
  • 7A. Audit of documents, etc., maintained in electronic form
254
8. Publication of rule, regulation, etc., in Electronic Gazette 254
9. Sections 6, 7 and 8 not to confer right to insist document should be accepted in electronic form 254
10. Power to make rules by Central Government in respect of electronic signature 254
  • 10A. Validity of contracts formed through electronic means
254
Chapter IV: Attribution, acknowledgement and despatch of electronic records
11. Attribution of electronic records 255
12. Acknowledgement of receipt 255
13. Time and place of despatch and receipt of electronic record 255
Chapter V: Secure Electronic Records and Secure Electronic Signatures
14. Secure electronic record 256
15. Secure electronic signature 256
16. Security procedures and practices 256
Chapter VI: Regulation of Certifying Authorities
17. Appointment of Controller and other officers 256
18. Functions of Controller 257
19. Recognition of Foreign Certifying Authorities 257
20. Omitted 258
21. Licence to issue electronic signature certificates 258
22. Application for licence 258
23. Renewal of licence 258
24. Procedure for grant or rejection of licence 259
25. Suspension of licence 259
26. Notice of suspension or revocation of licence 259
27. Power to delegate 260
28. Power to investigate contraventions 260
29. Access to computers and data 260
30. Certifying Authority to follow certain procedures 260
31. Certifying Authority to ensure compliance of the Act, etc 260
32. Display of licence 260
33. Surrender of licence 261
34. Disclosure 261
Chapter VII: Electronic Signature Certificates
35. Certifying authority to issue Electronic Signature Certificate 261
36. Representations upon issuance of Digital Signature Certificate 262
37. Suspension of Digital Signature Certificate 262
38. Revocation of Digital Signature Certificate 262
39. Notice of suspension or revocation 263
Chapter VIII: Duties of Subscribers
40. Generating key pair 263
  • 40A. Duties of subscriber of Electronic Signature Certificate
263
41. Acceptance of Digital Signature Certificate 263
42. Control of private key 264
Chapter IX: Penalties, Compensation and Adjudication
43. Penalty and compensation for damage to computer, computer system, etc 264
  • 43A. Compensation for failure to protect data
265
44. Penalty for failure to furnish information, return, etc 266
45. Residuary penalty 266
46. Power to adjudicate 266
47. Factors to be taken into account by the adjudicating officer 267
Chapter X: Appellate Tribunal 267
48. Establishment of Appellate Tribunal 267
52D. Decision by majority 269
55. Orders constituting Appellate Tribunal to be final and not to invalidate its proceedings 269
57. Appeal to Appellate Tribunal 270
58. Procedure and powers of the Appellate Tribunal 270
59. Right to legal representation 271
60. Limitation 271
61. Civil court not to have jurisdiction 271
62. Appeal to High Court 271
63. Compounding of contraventions 271
64. Recovery of penalty or compensation 272
Chapter XI: Offences
65. Tampering with computer source documents 272
66. Computer related offences 272
  • 66B. Punishment for dishonestly receiving stolen computer resource or communication device
273
  • 66C. Punishment for identity theft
273
  • 66D. Punishment for cheating by personation by using computer resource
273
  • 66E. Punishment for violation of privacy
273
  • 66F. Punishment for cyber terrorism
274
67. Punishment for publishing or transmitting obscene material in electronic form 274
  • 67A. Punishment for publishing or transmitting of material containing sexually explicit act, etc., in electronic form
274
  • 67B. Punishment for publishing or transmitting of material depicting children in sexually explicit act, etc., in electronic form
275
  • 67C. Preservation and retention of information by intermediaries
275
68. Power of the Controller to give directions 275
69. Power to issue directions for interception or monitoring or decryption of any information through any computer resource 276
  • 69A. Power to issue directions for blocking for public access of any information through any computer resource
276
  • 69B. Power to authorise to monitor and collect traffic data or information through any computer resource for cyber security
277
70. Protected system 277
  • 70A. National nodal agency
278
  • 70B. Indian Computer Emergency Response Team to serve as national agency for incident response
278
71. Penalty for misrepresentation 279
72. Penalty for breach of confidentiality and privacy 279
  • 72A. Penalty for disclosure of information in breach of lawful contract
279
73. Penalty for publishing Electronic Signature Certificate false in certain particulars 279
74. Publication for fraudulent purpose 279
75. Act to apply for offences or contravention committed outside India 280
76. Confiscation 280
77. Compensation, penalties or confiscation not to interfere with other punishment 280
  • 77A. Compounding of offences
280
  • 77B. Offences with three years imprisonment to be bailable
280
78. Power to investigate offences 280
Chapter XII: Intermediaries not to be Liable in Certain Cases
79. Exemption from liability of intermediary in certain cases 281
Chapter XIIa: Examiner of Electronic Evidence
79A. Central Government to notify Examiner of Electronic Evidence 281
Chapter XIII: Miscellaneous
80. Power of police officer and other officers to enter, search, etc 282
81. Act to have overriding effect 282
  • 81A. Application of the Act to electronic cheque and truncated cheque
282
82. Controller, Deputy Controller and Assistant Controller to be public servants 283
83. Power to give directions 283
84. Protection of action taken in good faith 283
  • 84A. Modes or methods of encryption
283
  • 84B. Punishment for abetment of offences
283
  • 84C. Punishment for attempt to commit offences
283
85. Offences by companies 283
86. Removal of difficulties 284
87. Power of Central Government to make rules 284
88. Constitution of Advisory Committee 286
89. Power of Controller to make regulations 287
288
FIRST SCHEDULE 289
SECOND SCHEDULE 289
THIRD SCHEDULE 291
FOURTH SCHEDULE 291

THE INFORMATION TECHNOLOGY (CERTIFYING AUTHORITIES) RULES, 2000

1. Short title and commencement 292
2. Definitions 292
3. The manner in which information be authenticated by means of Digital Signature 293
4. Creation of Digital Signature 293
5. Verification of Digital Signature 293
  • 5A. Verification of Digital Signature Certificate
294
6. Standards 294
7. Digital Signature Certificate Standard 295
8. Licensing of Certifying Authorities 295
9. Location of the Facilities 297
10. Submission of Application 297
11. Fee 298
12. Cross Certification 298
13. Validity of licence 298
14. Suspension of licence 299
15. Renewal of licence 299
16. Issuance of licence 299
17. Refusal of Licence 299
18. Governing Laws 300
19. Security Guidelines for Certifying Authorities 300
20. Commencement of Operation by Licenced Certifying Authorities 300
21. Requirements Prior to Cessation as Certifying Authority 300
22. Database of Certifying Authorities 301
23. Digital Signature Certificate 302
24. Generation of Digital Signature Certificate 303
25. Issue of Digital Signature Certificate 303
26. Certificate Lifetime 303
27. Archival of Digital Signature Certificate 304
28. Compromise of Digital Signature Certificate 304
29. Revocation of Digital Signature Certificate 304
30. Fees for issue of Digital Signature Certificate 305
31. Audit 305
32. Auditors relationship with Certifying Authority 306
33. Confidential Information 306
34. Access to Confidential Information 306
Schedule I: Form for Application for Grant of Licence to be a Certifying Authority 306
Schedule II: Information Technology (It) Security Guidelines 309
Schedule III: Security Guidelines for Certifying Authorities 326
Schedule IV: 335
Form A: Application Form for Issue of Digital Certificate for Subscriber of Government and Banking Sector 335
Form B: Application Form for Issue of Digital Signature Certificate for Subscribers Other than Government and Banking Sector 336
Form C: Application Form for Issue of Digital Signature Certificate Through EkYC Based Identity Verification of Digital Signature Certificate Applicant 337
Schedule V: Glossary 337

THE INFORMATION TECHNOLOGY (OTHER POWERS OF CIVIL COURT VESTED IN CYBER APPELLATE TRIBUNAL) RULES, 2003

1. Short title and commencement 355
2. Definitions 355
3. Powers of Cyber Appellate Tribunal 355

THE INFORMATION TECHNOLOGY (USE OF ELECTRONIC RECORDS AND DIGITAL SIGNATURES) RULES, 2004

1. Short title and commencement 356
2. Definitions 356
3. Filing of form, application or any other document 356
4. Issue or grant of any licence, permit, sanction or approval 357
5. Payment and receipt of fee or charges 357

THE INFORMATION TECHNOLOGY (SECURITY PROCEDURE) RULES, 2004

1. Short title and commencement 358
2. Definitions 358
3. Secure electronic record 358
4. Secure digital signature 358

THE INFORMATION TECHNOLOGY (PROCEDURE AND SAFEGUARDS FOR INTERCEPTION, MONITORING AND DECRYPTION OF INFORMATION) RULES, 2009

1. Short title and commencement 360
2. Definitions 360
3. Directions for interception or monitoring or decryption of any information 362
4. Authorization of agency of Government 362
5. Issue of decryption direction by competent authority 362
6. Interception or monitoring or decryption of information by a State beyond its jurisdiction 363
7. Contents of direction 363
8. Competent authority to consider alternative means in acquiring information 363
9. Direction of interception or monitoring or decryption of any specific information 363
10. Direction to specify the name and designation of the officer to whom information to be disclosed 363
11. Period within which direction shall remain in force 363
12. Authorized agency to designate nodal officer 363
13. Intermediary to provide facilities, etc 364
14. Intermediary to designate officers to receive and handle requisition 364
15. Acknowledgement of instruction 364
16. Maintenance of records by designated officer 364
17. Decryption key holder to disclose decryption key or provide decryption assistance 364
18. Submission of list of interception or monitoring or decryption of information 365
19. Intermediary to ensure effective check in handling matter of interception or monitoring or decryption of information 365
20. Intermediary to ensure effective check in handling matter of interception or monitoring or decryption of information 365
21. Responsibility of intermediary 365
22. Review of directions of competent authority 365
23. Destruction of records of interception or monitoring or decryption of information 366
24. Prohibition of interception or monitoring or decryption of information without authorization 366
25. Prohibition of disclosure of intercepted or monitored or decrypted information 367

THE INFORMATION TECHNOLOGY (PROCEDURE AND SAFEGUARDS FOR BLOCKING FOR ACCESS OF INFORMATION BY PUBLIC) RULES, 2009

1. Short title and commencement 368
2. Definitions 368
3. Designated Officer 369
4. Nodal officer of organization 369
5. Direction by Designated Officer 369
6. Forwarding of request by organization 369
7. Committee for examination of request 370
8. Examination of request 370
9. Blocking of information in cases of emergency 371
10. Process of order of court for blocking of information 371
11. Expeditious disposal of request 371
12. Action for non-compliance of direction by intermediary 371
13. Intermediary to designate one person to receive and handle directions 371
14. Meeting of Review Committee 371
15. Maintenance of records by Designated Officer 372
16. Requests and complaints to be confidential 372
FORM 372

THE INFORMATION TECHNOLOGY (PROCEDURE AND SAFEGUARD FOR MONITORING AND COLLECTING TRAFFIC DATA OR INFORMATION) RULES, 2009

1. Short title and commencement 374
2. Definitions 374
3. Directions for monitoring 375
4. Authorised agency of Government for monitoring and collection of traffic data or information 376
5. Intermediary to ensure effective check in handling, monitoring or collection of traffic data or information 377
6. Responsibility of intermediary 377
7. Review of directions of competent authority 377
8. Destruction of records 377
9. Prohibition of monitoring or collection of traffic data or information without authorisation 378
10. Prohibition of disclosure of traffic data or information by authorised agency 379
11. Maintenance of confidentiality 379

THE INFORMATION TECHNOLOGY (REASONABLE SECURITY PRACTICES AND PROCEDURES AND SENSITIVE PERSONAL DATA OR INFORMATION) RULES, 2011

1. Short title and commencement 380
2. Definitions 380
3. Sensitive personal data or information 381
4. Body corporate to provide policy for privacy and disclosure of information 381
5. Collection of information 381
6. Disclosure of information 383
7. Transfer of information 383
8. Reasonable security practices and procedures 383

THE INFORMATION TECHNOLOGY (INTERMEDIARIES GUIDELINES) RULES, 2011

1. Short title and commencement 385
2. Definitions 385
3. Due diligence to be observed by intermediary 386

THE INFORMATION TECHNOLOGY (GUIDELINES FOR CYBER CAFE) RULES, 2011

1. Short title and commencement 388
2. Definitions 388
3. Agency for registration of cyber cafe 389
4. Identification of user 389
5. Log register 390
6. Management of physical layout and computer resource 390
7. Inspection of cyber cafe 391
SCHEDULE-I: CYBER CAFE REGISTRATION FORM 392
SCHEDULE-II: STATE AND UT CODES 393

THE INFORMATION TECHNOLOGY (ELECTRONIC SERVICE DELIVERY) RULES, 2011

1. Short title and commencement 395
2. Definitions 395
3. System of electronic service delivery 396
4. Notification of electronic service delivery 396
5. Creation of repository of electronically signed electronic records by Government Authorities 397
6. Procedure for making changes in a repository of electronically signed electronic records 397
7. Responsibility of service provider and authorised agents for financial management and accounting 397
8. Audit of the information system and accounts of service provider and authorised agents 398
9. Use of special stationery in electronic service delivery 398

THE INFORMATION TECHNOLOGY (THE INDIAN COMPUTER EMERGENCY RESPONSE TEAM AND MANNER OF PERFORMING FUNCTIONS AND DUTIES) RULES, 2013

1. Short title and commencement 399
2. Definitions 399
3. Location 400
4. Authority 400
5. Functioning on 24-hour basis 400
6. Advisory Committee 400
7. Constituency 401
8. Functions and responsibilities of CERT-In 401
9. Services 401
10. Stakeholders 401
11. Policies and procedures 402
12. CERT-In operations 403
13. Disclosure of information 403
14. Seeking information, carrying out functions and for compliance in terms of sub-section (6) of section 70B of the Act 404
15. Directions for compliance 404
16. Report of non-compliance 404
17. Point of Contact 404
18. Dealing with non-compliance 405
19. Review Committee 405
20. Action for non-compliance of direction 405

THE INFORMATION TECHNOLOGY (NATIONAL CRITICAL INFORMATION INFRASTRUCTURE PROTECTION CENTRE AND MANNER OF PERFORMING FUNCTIONS AND DUTIES) RULES, 2013

1. Short title and commencement 406
2. Definitions 406
4. Functions and duties of the National Critical Information Infrastructure Protection Centre 407
5. Manner of performing functions and duties 408
6. Advisory Committee 409
7. Research and Development 410

THE DIGITAL SIGNATURE (END ENTITY) RULES, 2015

1. Short title and commencement 411
2. Definitions 411
3. Manner of authentication of information by means of digital signature 413
4. Creation of digital signature 414
5. Verification of digital signature 414
6. Verification of Digital Signature Certificate 415
7. Digital signature standards 415
8. Manner of authentication of information by means of xml digital signature 416
9. Creation of xml digital signature 416
10. Verification of xml digital signature 417
11. The xml digital signature standards 418
13. Digital Signature functions Standard 420

TTHE INFORMATION TECHNOLOGY (INTERMEDIARY GUIDELINES AND DIGITAL MEDIA ETHICS CODE) RULES, 2021

Part I: Preliminary
1. Short Title and Commencement 421
2. Definitions 421
Part II: Due Diligence By Intermediaries And Grievance Redressal Mechanism
3. Due diligence by an intermediary 424
  • 3A. Appeal to Grievance Appellate Committee(s)
429
4. Additional due diligence to be observed by significant social media intermediary and online gaming intermediary 430
  • 4A. Verification of online real money game
434
  • 4B. Applicability of certain obligations after an initial period
437
  • 4C. Obligations in relation to online game other than online real money game
437
5. Additional due diligence to be observed by an intermediary in relation to news and current affairs content 437
6. Notification of other intermediary 437
7. Non-observance of Rules 438
Part III: Code of Ethics and Procedure and Safeguards in Relation to Digitalmedia
8. Application of this Part 438
9. Observance and adherence to the Code 438
Chapter I: Grievance Redressal Mechanism
10. Furnishing and processing of grievance 439
Chapter II: Self Regulating Mechanism - Level I
11. Self-Regulating mechanism at Level I 439
Chapter III: Self Regulating Mechanism - Level II
12. Self-regulating body 440
Chapter IV: Oversight Mechanism - Level III
13. Oversight mechanism 441
14. Inter-Departmental Committee 441
15. Procedure for issuing of direction 442
16. Blocking of information in case of emergency 443
17. Review of directions issued 443
Chapter V: Furnishing of Information
18. Furnishing of information 444
Chapter VI: Miscellaneous
19. Disclosure of Information 444
APPENDIX 444
CODE OF ETHICS 444
SCHEDULE 446

THE INFORMATION TECHNOLOGY (CERTIFYING AUTHORITY) REGULATIONS, 2001

1. Short title and commencement 449
2. Definitions 449
3. Terms and conditions of licence to issue Digital Signature Certificate 449
4. The standards followed by the Certifying Authority for carrying out its functions 452
5. Every Certifying Authority shall disclose 464
6. Communication of compromise or Private Key 465
FORM: COMMUNICATION OF COMPROMISE OF PRIVATE KEY 465

THE INFORMATION TECHNOLOGY (RECOGNITION OF FOREIGN CERTIFYING AUTHORITIES OPERATING UNDER A REGULATORY AUTHORITY) REGULATIONS, 2013

1. Short title and Commencement 466
2. Definitions 466
3. Recognition of Foreign Certifying Authorities which operate under a regulatory authority in that country 467

THE INFORMATION TECHNOLOGY (RECOGNITION OF FOREIGN CERTIFYING AUTHORITIES NOT OPERATING UNDER ANY REGULATORY AUTHORITY) REGULATIONS, 2013

1. Short title and commencement 470
2. Definitions 470
3. Criteria for recognition of foreign certifying authorities which does not operate under any regulatory authority 471
Subject Index (Refers to paras) 477

About the Author

D.P. Mittal

D.P. Mittal-D.P. Mittal is an advocate, tax and business law consultant. He has authored about two hundred articles in Indian and foreign magazines and journals and also books on various law subjects; some of them are as follows: Interpretation of Taxing Statutes, Wills, Deeds and Documents; Laws relating to Copyrights, Patents, Trade Marks and GATT; Business and Commercial Laws; Law of Arbitration, ADR and Contract in India; Indian Patents Law; Natural Justice, Judicial Review & Administrative Law; Law of Trade Marks; Law of Information Technology (Cyber Law); Law of Arbitration (2002); Indian Patents Law and Procedure (2002); Trade Marks Passing off and Geographical Indications of Goods - Law and Procedure (2002); Competition Law; Law relating to Sick Industries; Interpretation of Statutes; Law Dictionary

View other books from Accounts
Handbook on Artificial Intelligence & Machine Learning
Pages: 512
Language: English
ISBN: 9789356036208
645 Price : ₹ 795
Price Inclusive of Delivery Charges
Save ₹150 (19% OFF)
Add to Cart
Share :

Have Questions About This Book?

Our course advisors are here to help you make the right decision for your career growth.

Join Us !!

List your Books

Share your knowledge and help shape the next generation of tech-savvy CA & Tax professionals while building a rewarding career in education.

Get Started