Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011.

 [भाग II- खÖड 3(i)] भारत का राजपğ : असाधारण

MINISTRY OF COMMUNICATIONS AND INFORMATION TECHNOLOGY

(Department of Information Technology)

NOTIFICATION

New Delhi, the 11th April, 2011

G.S.R. 313(E).—In exercise of the powers conferred by clause (ob) of subsection (2) of section 87 read with section 43A of the Information Technology Act,

2000 (21 of 2000), the Central Government hereby makes the following rules,

namely.--

1. Short title and commencement — (1) These rules may be called the

Information Technology (Reasonable security practices and procedures and

sensitive personal data or information) Rules, 2011.

 (2) They shall come into force on the date of their publication in the Official

Gazette.

2. Definitions — (1) In these rules, unless the context otherwise requires,--

(a) "Act" means the Information Technology Act, 2000 (21 of 2000);

(b) "Biometrics" means the technologies that measure and analyse human body

characteristics, such as 'fingerprints', 'eye retinas and irises', 'voice patterns',

"facial patterns', 'hand measurements' and 'DNA' for authentication

purposes;

(c) "Body corporate" means the body corporate as defined in clause (i) of

explanation to section 43A of the Act;

(d) "Cyber incidents" means any real or suspected adverse event in relation to

cyber security that violates an explicitly or implicitly applicable security policy

resulting in unauthorised access, denial of service or disruption,

unauthorised use of a computer resource for processing or storage of

information or changes to data, information without authorisation;

(e) "Data" means data as defined in clause (o) of sub-section (1) of section 2 of

the Act;

(f) "Information" means information as defined in clause (v) of sub-section (1) of

section 2 of the Act;

(g) "Intermediary" means an intermediary as defined in clause (w) of sub-section

(1) of section 2 of the Act; 

 THE GAZETTE OF INDIA : EXTRAORDINARY [ PART II-SEC. 3(i)]


(h) "Password" means a secret word or phrase or code or passphrase or secret key,

or encryption or decryption keys that one uses to gain admittance or access to

information;

(i) "Personal information" means any information that relates to a natural person,

which, either directly or indirectly, in combination with other information available or

likely to be available with a body corporate, is capable of identifying such person.

(2) All other words and expressions used and not defined in these rules but defined in the

Act shall have the meanings respectively assigned to them in the Act.

3. Sensitive personal data or information.— Sensitive personal data or information of

a person means such personal information which consists of information relating to;—

(i) password;

(ii) financial information such as Bank account or credit card or debit card or

other payment instrument details ;

(iii) physical, physiological and mental health condition;

(iv) sexual orientation;

(v) medical records and history;

(vi) Biometric information;

(vii) any detail relating to the above clauses as provided to body corporate for

providing service; and

(viii) any of the information received under above clauses by body corporate for

processing, stored or processed under lawful contract or otherwise:

provided that, any information that is freely available or accessible in public domain

or furnished under the Right to Information Act, 2005 or any other law for the time being in

force shall not be regarded as sensitive personal data or information for the purposes of

these rules.

4. Body corporate to provide policy for privacy and disclosure of information.— (1)

The body corporate or any person who on behalf of body corporate collects, receives,

possess, stores, deals or handle information of provider of information, shall provide a

privacy policy for handling of or dealing in personal information including sensitive

personal data or information and ensure that the same are available for view by such

providers of information who has provided such information under lawful contract. Such

policy shall be published on website of body corporate or any person on its behalf and

shall provide for—

(i) Clear and easily accessible statements of its practices and policies;

(ii) type of personal or sensitive personal data or information collected under rule 3; 

[भाग II- खÖड 3(i)] भारत का राजपğ : असाधारण

(iii) purpose of collection and usage of such information;

(iv) disclosure of information including sensitive personal data or information as

provided in rule 6;

(v) reasonable security practices and procedures as provided under rule 8.

5. Collection of information.— (1) Body corporate or any person on its behalf shall

obtain consent in writing through letter or Fax or email from the provider of the sensitive

personal data or information regarding purpose of usage before collection of such

information.

(2) Body corporate or any person on its behalf shall not collect sensitive

personal data or information unless —

(a) the information is collected for a lawful purpose connected with a function or

activity of the body corporate or any person on its behalf; and

(b) the collection of the sensitive personal data or information is considered

necessary for that purpose.

(3) While collecting information directly from the person concerned, the body

corporate or any person on its behalf snail take such steps as are, in the

circumstances, reasonable to ensure that the person concerned is having the

knowledge of —

(a) the fact that the information is being collected;

(b) the purpose for which the information is being collected;

(c) the intended recipients of the information; and

(d) the name and address of —

(i) the agency that is collecting the information; and

(ii) the agency that will retain the information.

(4) Body corporate or any person on its behalf holding sensitive personal data

or information shall not retain that information for longer than is required for the

purposes for which the information may lawfully be used or is otherwise required under

any other law for the time being in force..

(5) The information collected shall be used for the purpose for which it has

been collected.

(6) Body corporate or any person on its behalf permit the providers of

information, as and when requested by them, to review the information they had

provided and ensure that any personal information or sensitive personal data or

information found to be inaccurate or deficient shall be corrected or amended as

feasible:

Provided that a body corporate shall not be responsible for the authenticity of the

personal information or sensitive personal data or information supplied by

1330 GI/11-2A 

 THE GAZETTE OF INDIA : EXTRAORDINARY [ PART II-SEC. 3(i)]


the provider of information to such boy corporate or any other person acting on

behalf of such body corporate.

(7) Body corporate or any person on its behalf shall, prior to the collection of

information including sensitive personal data or information, provide an option to the

provider of the information to not to provide the data or information sought to be

collected. The provider of information shall, at any time while availing the services or

otherwise, also have an option to withdraw its consent given earlier to the body

corporate. Such withdrawal of the consent shall be sent in writing to the body

corporate. In the case of provider of information not providing or later on withdrawing

his consent, the body corporate shall have the option not to provide goods or

services for which the said information was sought.

(8) Body corporate or any person on its behalf shall keep the information secure

as provided in rule 8.

(9) Body corporate shall address any discrepancies and grievances of their

provider of the information with respect to processing of information in a time bound

manner. For this purpose, the body corporate shall designate a Grievance Officer and

publish his name and contact details on its website. The Grievance Officer shall redress

the grievances or provider of information expeditiously but within one month ' from the

date of receipt of grievance.

6. Disclosure of information.— (1) Disclosure of sensitive personal data or information

by body corporate to any third party shall require prior permission from the provider of

such information, who has provided such information under lawful contract or otherwise,

unless such disclosure has been agreed to in the contract between the body corporate

and provider of information, or where the disclosure is necessary for compliance of a

legal obligation:

 Provided that the information shall be shared, without obtaining prior

consent from provider of information, with Government agencies mandated under the

law to obtain information including sensitive personal data or information for the

purpose of verification of identity, or for prevention, detection, investigation including

cyber incidents, prosecution, and punishment of offences. The Government agency

shall send a request in writing to the body corporate possessing the sensitive personal

data or information stating clearly the purpose of seeking such information. The

Government agency shall also state that the information so obtained shall not be

published or shared with any other person.

(2) Notwithstanding anything contain in sub-rule (1), any sensitive personal

data on Information shall be disclosed to any third party by an order under the law for

the time being in force.

 1330 GI/11-2B 

[भाग II- खÖड 3(i)] भारत का राजपğ : असाधारण

(3) The body corporate or any person on its behalf shall not publish the

sensitive personal data or information.

(4) The third party receiving the sensitive personal data or information from

body corporate or any person on its behalf under sub-rule (1) shall not disclose it further.

7. Transfer of information.-A body corporate or any person on its behalf may transfer

sensitive personal data or information including any information, to any other body

corporate or a person in India, or located in any other country, that ensures the same level

of data protection that is adhered to by the body corporate as provided for under these

Rules. The transfer may be allowed only if it is necessary for the performance of the lawful

contract between the body corporate or any person on its behalf and provider of

information or where such person has consented to data transfer.

8. Reasonable Security Practices and Procedures.— (1) A body corporate or a person

on its behalf shall be considered to have complied with reasonable security practices and

procedures, if they have implemented such security practices and standards and have a

comprehensive documented information security programme and information security

policies that contain managerial, technical, operational and physical security control

measures that are commensurate with the information assets being protected with the

nature of business. In the event of an information security breach, the body corporate or a

person on its behalf shall be required to demonstrate, as and when called upon to do so by

the agency mandated under the law, that they have implemented security control

measures as per their documented information security programme and information

security policies.

(2) The international Standard IS/ISO/IEC 27001 on "Information Technology - Security

Techniques - Information Security Management System - Requirements" is one such

standard referred to in sub-rule (1).

(3) Any industry association or an entity formed by such an association, whose members

are self-regulating by following other than IS/ISO/IEC codes of best practices for data

protection as per sub-rule(1), shall get its codes of best practices duly approved and

notified by the Central Government for effective implementation.

(4) The body corporate or a person on its behalf who have implemented either IS/ISO/IEC

27001 standard or the codes of best practices for data protection as approved and notified

under sub-rule (3) shall be deemed to have complied with reasonable security practices

and procedures provided that such standard or the codes of best practices have been

certified or audited on a regular basis by entities through independent auditor, duly

approved by the Central Government. The audit of reasonable security practices and

procedures shall be carried cut by an auditor at least once a year or as and when the body

corporate or a person on its behalf undertake significant upgradation of its process and

computer resource. 

 THE GAZETTE OF INDIA : EXTRAORDINARY [ PART II-SEC. 3(i)]

NOTIFICATION

New Delhi, the 11th April, 2011

G.S.R. 314(E).— In exercise of the powers conferred by clause (zg) of subsection (2)

of section 87 read with sub-section (2) of section 79 of the Information Technology Act, 2000

(21 of 2000), the Central Government hereby makes the following rules, namely.-

1. Short title and commencement — (1) These rules may be called the Information

Technology (Intermediaries guidelines) Rules, 2011.

(2) They shall come into force on the date of their publication in the Official

Gazette

2. Definitions — (1) In these rules, unless the context otherwise requires,--

(a) "Act" means the Information Technology Act, 2000 (21 of 2000);

(b) "Communication link” means a connection between a hyperlink or graphical element

(button, drawing, image) and one or more such items in the same or different

electronic document wherein upon clicking on a hyperlinked item, the user is

automatically transferred to the other end of the hyperlink which could be another

document website or graphical element.

(c) "Computer resource” means computer resources as defined in clause (k) of subsection (1) of section 2 of the Act;

(d) "Cyber security incidnt” means any real or suspected adverse event in relation to cyber

security that violates an explicity or implicity applicable security policy resulting in

unauthotrised access, denial of service or disruption, unauthorised use of a computer

resource for processing or storage of information or changes to data, information

without authorisation;

(e) "Data" means data as defined in clause (o) of sub-section (1) of section 2 of the Act; 

[भाग II- खÖड 3(i)] भारत का राजपğ : असाधारण

(f) "Electronic Signature" means electronic signature as defined in clause (ta) of subsection (1) of section 2 of the Act;

(g) "Indian Computer Emergency Response Team” means the Indian Computer

Emergency Response Team appointed under sub section (1) section 70 (B) of the Act;

(h) “Information” means information as defined in clause (v) of sub-section (1) of section 2 of the

Act;

(i) “Intermediary” means an intermediary as defined in clause (w) of sub-section (1) of section 2 of

the Act;

 (j) "User" means any person who access or avail any computer resource of intermediary

for the purpose of hosting, publishing, sharing, transacting, displaying or uploading

information or views and includes other persons jointly participating in using the

computer resource of an intermediary.

(2) Ail other words and expressions used and not defined in these rules but defined in the Act

shall have the meanings respectively assigned to them in the Act.

3. Due diligence to he observed by intermediary — The intermediary shall observe following

due diligence while discharging his duties, namely : —

(1) The intermediary shall publish the rules and regulations, privacy policy and

user agreement for access-or usage of the intermediary's computer resource by

any person.

(2) Such rules and regulations, terms and conditions or user agreement shall

inform the users of computer resource not to host, display, upload, modify,

publish, transmit, update or share any information that —

(a) belongs to another person and to which the user does not have any right

to;

(b) is grossly harmful, harassing, blasphemous defamatory, obscene,

pornographic, paedophilic, libellous, invasive of another's privacy,

hateful, or racially, ethnically objectionable, disparaging, relating or

encouraging money laundering or gambling, or otherwise unlawful in any

manner whatever;

(c) harm minors in any way;

(d) infringes any patent, trademark, copyright or other proprietary rights;

(e) violates any law for the time being in force;

(f) deceives or misleads the addressee about the origin of such messages or

communicates any information which is grossly offensive or menacing in

nature;

(g) impersonate another person;

1330 GI/11-3A 

 THE GAZETTE OF INDIA : EXTRAORDINARY [ : EXTRAORDINARY [ PART II-SEC. 3(i)] 3(i)]

(h) contains software viruses or any other computer code, files or programs

designed to interrupt, destroy or limit the functionality of any computer

resource;

(i) threatens the unity, integrity, defence, security or sovereignty of India, friendly

relations with foreign states, or public order or causes incitement to the

commission of any cognisable offence or prevents investigation of any offence or

is insulting any other nation

(3) The intermediary shall not knowingly host or publish any information or shall not

initiate the transmission, select the receiver of transmission, and select or modify the

information contained in the transmission as specified in sub-rule (2):

provided that the following actions by an intermediary shall not amount to hosing,

publishing, editing or storing of any such information as specified in

sub-rule: (2) —

(a) temporary or transient or intermediate storage of information automatically

within the computer resource as an intrinsic feature of such computer resource,

involving no exercise of any human editorial control, for onward transmission or

communication to another computer resource;

(b) removal of access to any information, data or communication link by an

intermediary after such information, data or communication link comes to the actual

knowledge of a person authorised by the intermediary pursuant to any order or

direction as per the provisions of the Act;

(4) The intermediary, on whose computer system the information is stored or hosted or

published, upon obtaining knowledge by itself or been brought to actual knowledge by an

affected person in writing or through email signed with electronic signature about any

such information as mentioned in sub-rule (2) above, shall act within thirty six hours and

where applicable, work with user or owner of such information to disable such information

that is in contravention of sub-rule (2). Further the intermediary shall preserve such

information and associated records for at least ninety days for investigation purposes,

(5) The Intermediary shall inform its users that in case of non-compliance with rules and

regulations, user agreement and privacy policy for access or usage of intermediary

computer resource, the Intermediary has the right to immediately terminate the access or

usage lights of the users to the computer resource of Intermediary and remove noncompliant information..

(6) The intermediary shall strictly follow the provisions of the Act or any other laws for the

time being in force.

(7) When required by lawful order, the intermediary shall provide information or any such

assistance to Government Agencies who are lawfully authorised for

1330 GI/11-3B 

[भाग II- खÖड 3(i)] भारत का राजपğ : असाधारण

investigative, protective, cyber security activity. The information or any such assistance shall be

provided for the purpose of verification of identity, or for prevention, detection, investigation,

prosecution, cyber security incidents and punishment of offences under any law for the time

being in force, on a request in writing staling clearly the purpose of seeking such information or

any such assistance.

(8) The intermediary shall take all reasonable measures to secure its computer resource and

information contained therein following the reasonable security practices and procedures as

prescribed in the Information Technology (Reasonable security practices and procedures and

sensitive personal Information) Rules, 2011.

(9) The intermediary shall report cyber security incidents and also share cyber security

incidents related information with the Indian Computer Emergency Response Team.

(10) The intermediary shall not knowingly deploy or install or modify the technical

configuration of computer resource or become party to any such act which may change or has

the potential to change the normal course of operation of the computer resource than what it is

supposed to "perform thereby circumventing any law for the time being in force:

provided that the intermediary may develop, produce, distribute or employ

technological means for the sole purpose of performing the acts of securing the computer

resource and information contained therein.

(11) The intermediary shall publish on its website the name of the Grievance Officer and his

contact details as well as mechanism by which users or any victim who suffers as a result of

access or usage of computer resource by any person in violation of rule 3 can notify their

complaints against such access or usage of computer resource of the intermediary or other

matters pertaining to the computer resources made available by it. The Grievance Officer shall

redress the complaints within one month from the date of receipt of complaint.

 [F. No. 11(3)/2011-CLFE]

 N. RAVI SHANKER, Jt. Secy.

[भाग II- खÖड 3(i)] भारत का राजपğ : असाधारण

NOTIFICATION

New Delhi, the 11th April, 2011

G.S.R. 315(E).— In exercise of the powers conferred by clause (zg) of subsection (2) of section 87 read with sub-section (2) of section 79 of the Information

Technology Act, 2000 (21 of 2000), the Central Government hereby makes the following

rules, namely:—

1. Short title and commencement.— (1) These rules may be called the Information

Technology (Guidelines for Cyber Cafe) Rules, 2011.

(2) They shall come into force on the date of their publication in the Official Gazette.

2. Definitions — (1) In these rules, unless the context otherwise requires,--

(a) "Act" means the Information Technology Act, 2000 (21 of 2000);

(b) "Appropriate Government" means the Central Government or the State Government

or an Union Territory Administration;

(c) "Cyber Cafe" means cyber cafe as defined in clause (na) of sub-section (1) of

section 2 of the Act;

(d) "computer resource" means a computer resource as defined in clause (k) of subsection (1) of section 2 of the Act;

(e) "Data" means data as defined in clause (o) of sub-section (1) of section 2 of the

Act;

(f) "Information" means information as defined in clause (v) of sub-section (1) of

section 2 of the Act;

(g) "Intermediary" means an intermediary as defined in clause (w) of sub-section (1)

of section 2 of the Act;

(h) "Registration Agency" means an agency designated by the Appropriate

Government to register cyber cafe for their operation;

(i) "Log Register" - means a register maintained by the Cyber Cafe for access and

use of computer resource;

1330 GI/11-4A 

 THE GAZETTE OF INDIA: EXTRAORDINARY [ PART II-SEC. 3(i)]


(j) "User" means a person who avails or access the computer resource and includes other

persons jointly participating in availing or accessing the computer resource in a cyber

cafe.

(2) All other words and expressions used and not defined in these rules but defined in the Act

shall have the meanings respectively assigned to them in the Act.

3. Agency for registration of cyber cafe.— (1) All cyber cafes shall be registered with a unique

registration number with an agency called as registration agency as notified by the Appropriate

Government in this regard. The broad terms of registration shall include:

(i) name of establishment;

(ii) address with contact details including email address;

(iii) whether individual or partnership or sole properitership or society or company;

(iv) date of incorporation;

(v) name of owner/partner/properiter/director;

(vi) whether registered or not (if yes, copy of registration with Registrar of Firms or

Registrar of Companies or Societies); and

(vii) type of service to be provided from cyber cafe

Registration of cyber cafe may be followed up with a physical visit by an officer from the

registration agency.

(2) The details of registration of cyber cafe shall be published on the website of the

registration agency.

(3) The Appropriate Government shall make an endeavour to set up on-line registration

facility to enable cyber cafe to register on-line.

(4) The detailed process of registration to be mandatorily followed by each Registration

Agency notified by the Appropriate Government shall be separately notified under these rules by

the central Government.

4. Identification of User.— (1) The Cyber Cafe shall not allow any user to use its computer

resource without the identity of the user being established. The intending user may establish his

identify by producing a document which shall identify the users to the satisfaction of the Cyber

Cafe. Such document may include any of the following :—

(i) Identity card issued by any School or College; or

1330 GI/11-4B 

[भाग II- खÖड 3(i)] भारत का राजपğ : असाधारण

(ii) Photo Credit Card or debit card issued by a Bank or Post Office; or

(iii) Passport; or

(iv) Voter Identity Card; or

(v) Permanent Account Number (PAN) card issued by Income-Tax Authority; or

(vi) Photo Identity Card issued by the employer or any Government Agency;

or

(vi) Driving License issued by the Appropriate Government; or

(vii) Unique Identification (UID) Number issued by the Unique Identification Authority

of India (UIDAI).

(2) The Cyber Cafe shall keep a record of the user identification document by either

storing a photocopy or a scanned copy of the document duly authenticated by the user and

authorised representative of cyber cafe. Such record shall be securely maintained for a period

of at least one year.

(3) In addition to the identity established by an user under sub-rule (1), he may be

photographed by the Cyber Cafe using a web camera installed on one of the computers in the

Cyber Cafe for establishing the identity of the user. Such web camera photographs, duly

authenticated by the user and authorised representative of cyber cafe, shall be part of the log

register which may be maintained in physical or electronic form.

(4) A minor without photo Identity card shall be accompanied by an adult with any of the

documents as required under sub-rule (1).

(5) A person accompanying a user shall be allowed to enter cyber cafe after he has

established his identity by producing a document listed in sub-rule(1) and record of same shall

be kept in accordance with sub-rule (2).

(6) The Cyber cafe shall immediately report to the concerned police, if they have

reasonable doubt or suspicion regarding any user.

5. Log Register.— (1) After the identity of the user and any person accompanied with him

has been established as per sub-rule (1) of rule 4, the Cyber Cafe shall record and

maintain the required information of each user as well as accompanying person, if any, in

the log register for a minimum period of one year.

(2) The Cyber Cafe may maintain an online version of the log register. Such online version of

log register shall be authenticated by using digital or electronic 

 THE GAZETTE OF INDIA: EXTRAORDINARY [ PART II-SEC. 3(i)]


signature. The log register shall contain at least the following details of the user,

namely : —

(ii) Name

(iii) Address

(iv) Gender

(v) Contact Number

(vi) Type and detail of identification document

(vii) Date

(vii) Computer terminal identification

(viii) Log in Time

(ix) Log out Time

(3) Cyber Cafe shall prepare a monthly report of the log register showing date- wise details

on the usage of the computer resource and submit a hard and soft copy of the same to the person

or agency as directed by the registration agency by the 5th day of next month.

(4) The cyber cafe owner shall be responsible for storing and maintaining backups of

following log records for each access or login by any user of its computer resource for atleast

one year:—

 (i) History of websites accessed using computer resource al cyber cafe;

 (ii) Logs of proxy server installed at cyber cafe.

Cyber Cafe may refer to "Guidelines for auditing and logging - CISG-2008-01" prepared and

updated from time to time by Indian Computer Emergency Response Team (CERT-ln) for any

assistance related to logs. This document is available at www.cert-in.org.in

(5) Cyber cafe shall ensure that log register is not altered and maintained in a secure

manner for a period of at least one year.

6. Management of Physical Layout and computer resource.— (1) Partitions of Cubicles built

or installed if any, inside the Cyber Cafe, shall not exceed four and half feet in height from the

floor level.

(2) The screen of all computers installed other than in Partitions or Cubicles shall face

'outward', i.e. they shall face the common open space of the Cyber Cafe.

(3) Any Cyber Cafe having cubicles or partitions shall not allow minors to use any computer

resource in cubicles or partitions except when they are accompanied by their guardians or

parents. 

[भाग II- खÖड 3(i)] भारत का राजपğ : असाधारण

(4) All time clocks of the computer systems and servers installed in the Cyber Cafe shall be

synchronised with the Indian Standard Time.

(5) All the computers in the cyber cafe may be equipped with the commercially available

safety or filtering software so as to avoid as far as possible, access to the websites relating to

pornography including child pornography or obscene information.

(6) Cyber Cafe shall take sufficient precautions to ensure that their computer resource are not

utilised for any illegal activity.

(7) Cyber Cafe shall display a board, clearly visible to the users, prohibiting them from viewing

pornographic sites as well as copying or downloading information which is prohibited under the

law.

(8) Cyber Cafe shall incorporate reasonable preventive measures to disallow the user from

tampering with the computer system settings.

(9) Cyber cafe shall maintain the user identity information and the log register in a secure

manner.

(10) Cyber cafe shall also maintain a record of its stafr for a period of one year

(11) Cyber cafe shall not misuse or alter the information in the log register.

7. Inspection of Cyber Cafe : (1) An officer autnorised by the registration agency, is authorised

to check or inspect cyber cafe and the computer resource of network established therein, at any

time for the compliance of these rules. The cyber cafe owner shall provide every related

document, registers and any necessary information to the inspecting officer on demand.

[F. No. 11(3)/2011-CLFE]

 N. RAVI SHANKER, Jt. Secy. 

NOTIFICATION

New Delhi, the 11th April, 2011

G.S.R. 316(E).—In exercise of the powers conferred by clause (ca) of sub-section (2) of

section 87, read with sub-section (2) of section 6A of the Information Technology Act, 2000

(21 of 2000), the Central Government hereby makes the following rules, namely:-

1. Short title and commencement.- (1) These rules may be called the information

Technology (Electronic Service Delivery) Rules, 2011.

(2) They shall come into force on the date of their publication in the Official Gazette.

2. Definitions.- In these rules, unless the context otherwise requires,-

(a) "Act" means the Information Technology Act, 2000 (21 of 2000);

1330 GI/11—5B 

[भाग II‐ खÖड 3(i)] भारत का राजपत्र : असाधारण

(b) "appropriate Government" means the Central Government or the state Government or an

Union Territory Administration;

(c) "authorised agent" means an agent of the appropriate Government or service provider and

includes an operator of an electronically enabled kiosk who is permitted under these rules to

deliver public services to the users with the help of a computer resource or any

communication device, by following the procedure specified in the rules;

(d) "certificate" means a certificate required to be issued by a statutory authority empowered

under any Act, rule, regulation or Order of the appropriate Government to issue a certificate

to confirm the status, right or responsibility of a person, either natural or artificial, and

includes a certificate in electronic form printed and delivered in such form as may be

specified by the appropriate authority;

(e) "Certifying Authority" means certifying authority as defined in clause (g) of sub-section (1)

of section 2 of the Act;

(f) "communication device" means the communication device as defined in clause (ha) of

sub-section (1) of section 2 of the Act;

(g) "computer resource" means the computer resource as defined in clause (k) of sub-section

(1) of section 2 of the Act;

(h) "Electronically enabled kiosk" means the cyber cafe as defined in clause (na) of subsection (1) of section 2 of the Act;

(i) "Electronic Service Delivery" means the delivery of public services in the form of filing

receipt of forms and applications, issue or grant of any license, permit, certificate, sanction

or approval and the receipt or payment of money by electronic means by following the

procedure specified under rule 3;

(j) "electronic signature" means the electronic signature as defined in clause (ta) of subsection (1) of section 2 of the Act;

(k) "Electronic Signature Certificate" means the electronic signature certificate as defined in

clause (tb) of sub-section (1) of section 2 of the Act;

 THE GAZETTE OF INDIA : EXTRAORDINARY [ INDIA : EXTRAORDINARY [ PART II-SEC. 3(i)] 3(i)]

(l) "Repository of Electronically Signed Electronic Records" means a collection of all

electronically signed electronic records, stored and managed in accordance with these

rules;

(m) "service provider" means a service provider as referred to in Explanation to sub-section

(1) of section 6A of the Act;

(n) "signing authority " means an authority empowered under any Act, rules, regulations or

Order of the appropriate Government to issue a certificate.

3. System of Electronic Service Delivery.-

(1) The appropriate Government may on its own or through an agency authorised

by it, deliver public services through electronically- enabled kiosks or any other

electronic service delivery mechanism.

(2) The appropriate Government or its agencies may specify the form and the manner of

Electronic Service Delivery.

(3) The appropriate Government may determine the manner of encrypting sensitive electronic

records requiring confidentiality, white they are electronically signed.

(4) The appropriate Government shall notify the service providers and their agents authorised

for Electronic Service Delivery.

(5) The appropriate Government may allow receipt of payments made by adopting the

Electronic Service Delivery System to be a deemed receipt of payment effected in

compliance with the financial code and treasury code of such Government.

(6) The appropriate Government may authorise service providers or their authorised agents

to collect, retain and appropriate such service charges as may be specified by the

appropriate Government for the purpose of providing such services from the person

availing such services:

Provided that the apportioned service charges shall be clearly indicated on the receipt

to be given to the person availing the services.

(7) The appropriate Government shall by notification specify the scale of service charges

which may be charged and collected by the service providers and their authorised agents

for various kinds of services.

(8) The appropriate Government may also determine the norms on service levels to be

complied with by the Service Provider and the authorised agents. 

[भाग II‐ खÖड 3(i)] भारत का राजपत्र : असाधारण

4. Notification of Electronic Service Delivery.-

(1) The appropriate Government may notify the services that shall be delivered

electronically from time to time.

(2) The appropriate Government may identify and notify, from time to time, the list or signing

authorities in respect of different classes of licenses, permits, certificates, sanctions,

payment receipt approvals and local limits of their respective jurisdictions.

(3) The notification shall specify the nature of certificate, the names of the signing

authorities, as approved by the appropriate Government, the period of effectiveness of

the authority and the extent of their jurisdiction.

(4) The appropriate Government may notify changes to the list of signing authorities from

time to time, taking into consideration the terms and conditions of the services of

employees holding positions of signing authorities.

5. Creation of repository of electronically signed electronic records by Government

Authorities.-

(1) All authorities that issue any license, permit, certificate, sanction or approval

electronically, shall create, archive and maintain a repository of electronically signed

electronic records of such licenses, permits, certificates, sanctions or approvals, as the

case may be, online with due timestamps of creation of these individual electronic

records.

(2) The appropriate Government may specify the manner of creating, establishing, archiving

and maintaining the repository of electronically signed electronic records referred to in

sub-rule (1).

(3) The authorities may electronically sign the electronic records of such licenses, permits,

certificates, sanctions or approvals for each record or as a whole for a specific duration

and shall be responsible in administering them online.

(4) The appropriate Government may specify the security procedures in respect of the

electronic data, information, applications, repository of digitally signed electronic records

and information technology assets under their respective control and that security

procedures shall be followed by the Head of the Department and the signing authorities.

Explanation.- The expression "security procedures" referred to in sub-rule (4) shall

include requirements for the storage and management of 

 THE GAZETTE OF INDIA : EXTRAORDINARY [ IA : EXTRAORDINARY [ PART II-SEC. 3(i)] 3(i)]

cryptographic keys, restrictions for downloading the certificates on to browsers, and of

complying with the requirements of certifying authorities.

6. Procedure for making changes in a repository of electronically signed electronic records.-

(1) The appropriate Government may either suo moto or after receiving an

application from an interested party, make or order to make an appropriate change in a

repository of electronically signed electronic records along with recording the reasons

for making such a change.

(2) Any change effected to any record in a repository of electronically signed electronic

records and any addition or deletion of a record from such repository shall be

electronically signed by the person who is authorised to make such changes along with

the time stamps of original creation and modification times.

(3) The appropriate Government may determine the manner of electronically signing the

event of deletion of a record from the repository of electronically signed electronic

records.

(4) The appropriate Government may also determine the manner of provisioning secure

access to the repository of digitally signed electronic records.

(5) The appropriate Government may also determine the requirements for maintaining

audit trails of all changes made to repository of digitally signed electronic records.

7. Responsibility of service provider and authorised agents for financial management and

accounting.- The appropriate Government may direct every service provider and authorised

agent to keep an updated and accurate account of the transactions, receipts, vouchers and

specify the formats for maintaining accounts of transactions and receipt of payment in respect

of the electronic services delivered and the said records shall be produced for inspection and

audit before an agency or person nominated by the appropriate Government.

8. Audit of the Information System and Accounts of service provider and authorised agents.-

(1)The appropriate Government may cause an audit to be conducted of the affairs of the

service providers and authorised agents in the State at such intervals as deemed

necessary by nominating such audit agencies. 

[भाग II‐ खÖड 3(i)] भारत का राजपत्र : असाधारण

(2) The audit may cover aspects such as the security, confidentiality and the privacy of

information, the functionality and performance of any software application used in the

electronic service delivery and the accuracy of accounts kept by the service providers and

authorised agents.

(3) The service providers and the authorised agents shall provide such information and

assistance to the audit agencies nominated by the appropriate authority, to comply, with

the directions given by the audit agencies and to rectify the defects and deficiencies

pointed out by the audit agencies within the time limit specified by the audit agency.

(4) All service providers and the authorised agents shall submit a due declaration for

protecting the data of every individual transaction and citizen and any unauthorised

disclosure to anyone without the written consent of either the individual or the appropriate

Government shall be debarred from providing such a service any further and the

provisions of section 45 of the Act shall be applicable in such cases.

9. Use of special stationery in electronic service delivery.- The appropriate Government may

specify different types of special stationery, with accompanying security features for forms,

applications, licenses, permits, certificates, receipts of payment and such other documents as part of

Electronic Service Delivery.

[F. No. 11 (3)/2011 -CLFE]

SHANKAR AGGARWAL, Addl.Secy.

Printed by the Manager, Government of India Press, Ring Road. Mayapuri. New Delhi-110064

and Published by the Controller of Publications, Delhi-1 I0054

Comments