☀️ JOIN SPN MOBILE
Forums
New posts
Guru Granth Sahib
Composition, Arrangement & Layout
ਜਪੁ | Jup
ਸੋ ਦਰੁ | So Dar
ਸੋਹਿਲਾ | Sohilaa
ਰਾਗੁ ਸਿਰੀਰਾਗੁ | Raag Siree-Raag
Gurbani (14-53)
Ashtpadiyan (53-71)
Gurbani (71-74)
Pahre (74-78)
Chhant (78-81)
Vanjara (81-82)
Vaar Siri Raag (83-91)
Bhagat Bani (91-93)
ਰਾਗੁ ਮਾਝ | Raag Maajh
Gurbani (94-109)
Ashtpadi (109)
Ashtpadiyan (110-129)
Ashtpadi (129-130)
Ashtpadiyan (130-133)
Bara Maha (133-136)
Din Raen (136-137)
Vaar Maajh Ki (137-150)
ਰਾਗੁ ਗਉੜੀ | Raag Gauree
Gurbani (151-185)
Quartets/Couplets (185-220)
Ashtpadiyan (220-234)
Karhalei (234-235)
Ashtpadiyan (235-242)
Chhant (242-249)
Baavan Akhari (250-262)
Sukhmani (262-296)
Thittee (296-300)
Gauree kii Vaar (300-323)
Gurbani (323-330)
Ashtpadiyan (330-340)
Baavan Akhari (340-343)
Thintteen (343-344)
Vaar Kabir (344-345)
Bhagat Bani (345-346)
ਰਾਗੁ ਆਸਾ | Raag Aasaa
Gurbani (347-348)
Chaupaday (348-364)
Panchpadde (364-365)
Kaafee (365-409)
Aasaavaree (409-411)
Ashtpadiyan (411-432)
Patee (432-435)
Chhant (435-462)
Vaar Aasaa (462-475)
Bhagat Bani (475-488)
ਰਾਗੁ ਗੂਜਰੀ | Raag Goojaree
Gurbani (489-503)
Ashtpadiyan (503-508)
Vaar Gujari (508-517)
Vaar Gujari (517-526)
ਰਾਗੁ ਦੇਵਗੰਧਾਰੀ | Raag Dayv-Gandhaaree
Gurbani (527-536)
ਰਾਗੁ ਬਿਹਾਗੜਾ | Raag Bihaagraa
Gurbani (537-556)
Chhant (538-548)
Vaar Bihaagraa (548-556)
ਰਾਗੁ ਵਡਹੰਸ | Raag Wadhans
Gurbani (557-564)
Ashtpadiyan (564-565)
Chhant (565-575)
Ghoriaan (575-578)
Alaahaniiaa (578-582)
Vaar Wadhans (582-594)
ਰਾਗੁ ਸੋਰਠਿ | Raag Sorath
Gurbani (595-634)
Asatpadhiya (634-642)
Vaar Sorath (642-659)
ਰਾਗੁ ਧਨਾਸਰੀ | Raag Dhanasaree
Gurbani (660-685)
Astpadhiya (685-687)
Chhant (687-691)
Bhagat Bani (691-695)
ਰਾਗੁ ਜੈਤਸਰੀ | Raag Jaitsree
Gurbani (696-703)
Chhant (703-705)
Vaar Jaitsaree (705-710)
Bhagat Bani (710)
ਰਾਗੁ ਟੋਡੀ | Raag Todee
ਰਾਗੁ ਬੈਰਾੜੀ | Raag Bairaaree
ਰਾਗੁ ਤਿਲੰਗ | Raag Tilang
Gurbani (721-727)
Bhagat Bani (727)
ਰਾਗੁ ਸੂਹੀ | Raag Suhi
Gurbani (728-750)
Ashtpadiyan (750-761)
Kaafee (761-762)
Suchajee (762)
Gunvantee (763)
Chhant (763-785)
Vaar Soohee (785-792)
Bhagat Bani (792-794)
ਰਾਗੁ ਬਿਲਾਵਲੁ | Raag Bilaaval
Gurbani (795-831)
Ashtpadiyan (831-838)
Thitteen (838-840)
Vaar Sat (841-843)
Chhant (843-848)
Vaar Bilaaval (849-855)
Bhagat Bani (855-858)
ਰਾਗੁ ਗੋਂਡ | Raag Gond
Gurbani (859-869)
Ashtpadiyan (869)
Bhagat Bani (870-875)
ਰਾਗੁ ਰਾਮਕਲੀ | Raag Ramkalee
Ashtpadiyan (902-916)
Gurbani (876-902)
Anand (917-922)
Sadd (923-924)
Chhant (924-929)
Dakhnee (929-938)
Sidh Gosat (938-946)
Vaar Ramkalee (947-968)
ਰਾਗੁ ਨਟ ਨਾਰਾਇਨ | Raag Nat Narayan
Gurbani (975-980)
Ashtpadiyan (980-983)
ਰਾਗੁ ਮਾਲੀ ਗਉੜਾ | Raag Maalee Gauraa
Gurbani (984-988)
Bhagat Bani (988)
ਰਾਗੁ ਮਾਰੂ | Raag Maaroo
Gurbani (889-1008)
Ashtpadiyan (1008-1014)
Kaafee (1014-1016)
Ashtpadiyan (1016-1019)
Anjulian (1019-1020)
Solhe (1020-1033)
Dakhni (1033-1043)
ਰਾਗੁ ਤੁਖਾਰੀ | Raag Tukhaari
Bara Maha (1107-1110)
Chhant (1110-1117)
ਰਾਗੁ ਕੇਦਾਰਾ | Raag Kedara
Gurbani (1118-1123)
Bhagat Bani (1123-1124)
ਰਾਗੁ ਭੈਰਉ | Raag Bhairo
Gurbani (1125-1152)
Partaal (1153)
Ashtpadiyan (1153-1167)
ਰਾਗੁ ਬਸੰਤੁ | Raag Basant
Gurbani (1168-1187)
Ashtpadiyan (1187-1193)
Vaar Basant (1193-1196)
ਰਾਗੁ ਸਾਰਗ | Raag Saarag
Gurbani (1197-1200)
Partaal (1200-1231)
Ashtpadiyan (1232-1236)
Chhant (1236-1237)
Vaar Saarang (1237-1253)
ਰਾਗੁ ਮਲਾਰ | Raag Malaar
Gurbani (1254-1293)
Partaal (1265-1273)
Ashtpadiyan (1273-1278)
Chhant (1278)
Vaar Malaar (1278-91)
Bhagat Bani (1292-93)
ਰਾਗੁ ਕਾਨੜਾ | Raag Kaanraa
Gurbani (1294-96)
Partaal (1296-1318)
Ashtpadiyan (1308-1312)
Chhant (1312)
Vaar Kaanraa
Bhagat Bani (1318)
ਰਾਗੁ ਕਲਿਆਨ | Raag Kalyaan
Gurbani (1319-23)
Ashtpadiyan (1323-26)
ਰਾਗੁ ਪ੍ਰਭਾਤੀ | Raag Prabhaatee
Gurbani (1327-1341)
Ashtpadiyan (1342-51)
ਰਾਗੁ ਜੈਜਾਵੰਤੀ | Raag Jaijaiwanti
Gurbani (1352-53)
Salok | Gatha | Phunahe | Chaubole | Swayiye
Sehskritee Mahala 1
Sehskritee Mahala 5
Gaathaa Mahala 5
Phunhay Mahala 5
Chaubolae Mahala 5
Shaloks Bhagat Kabir
Shaloks Sheikh Farid
Swaiyyae Mahala 5
Swaiyyae in Praise of Gurus
Shaloks in Addition To Vaars
Shalok Ninth Mehl
Mundavanee Mehl 5
ਰਾਗ ਮਾਲਾ, Raag Maalaa
What's new
New posts
New media
New media comments
New resources
Latest activity
Videos
New media
New comments
Library
Latest reviews
Donate
Log in
Register
What's new
New posts
Menu
Log in
Register
Install the app
Install
Welcome to all New Sikh Philosophy Network Forums!
Explore Sikh Sikhi Sikhism...
Sign up
Log in
Discussions
Hard Talk
Interviews
India Puts Tight Leash On Internet Free Speech
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Reply to thread
Message
<blockquote data-quote="Mai Harinder Kaur" data-source="post: 145945" data-attributes="member: 3558"><p>The full text of this law can be found at <a href="http://www.mit.gov.in/sites/upload_files/dit/files/due_dilligance4intermediary07_02_11.pdf" target="_blank">http://www.mit.gov.in/sites/upload_files/dit/files/due_dilligance4intermediary07_02_11.pdf</a></p><p></p><p>In fact, due to the importance of this, I reproduce it here!</p><p></p><p>Draft Rules - Due diligence observed by intermediaries guidelines</p><p> Page 1 of 4</p><p></p><p>[To be published in THE GAZETTE OF INDIA, EXTRAORDINARY, Part II, </p><p>Section 3, Sub-section (i) of dated the ----------, 2011]</p><p>Government of India</p><p>MINISTRY OF COMMUNICATIONS AND INFORMATION TECHNOLOGY </p><p>(Department of Information Technology)</p><p>NOTIFICATION</p><p>New Delhi, the ------------, 2011</p><p>G.S.R. ……. (E).― In exercise of the powers conferred by clause (zg) of subsection (2) of section 87, read with sub-section (2) of section 79 of the Information </p><p></p><p>Technology Act, 2000 (21 of 2000), the Central Government hereby makes the </p><p>following rules, namely: ―</p><p>1. Short title and commencement.― (1) These rules may be called the Information </p><p>Technology (Due diligence observed by intermediaries guidelines) Rules, 2011.</p><p> (2) They shall come into force on the date of their publication in the Official </p><p>Gazette.</p><p>2. Definitions.― In these rules, unless the context otherwise requires,--</p><p>(a) “Act” means the Information Technology Act, 2000 (21 of 2000); </p><p>(b) “Blog” means a type of website, usually maintained by an individual with </p><p>regular entries of commentary, descriptions of events, or other material such </p><p>as graphics or video. Usually blog is a shared on-line journal where users </p><p>can post diary entries about their personal experiences and hobbies;</p><p>(c) “Blogger” means a person who keeps and updates a blog;</p><p>(d) “Computer resource” means computer resource as defined in clause (k) of </p><p>sub-section (1) of section 2 of the Act;</p><p>(e) “Cyber security incident” means any real or suspected adverse event in </p><p>relation to cyber security that violates an explicitly or implicitly applicable </p><p>security policy resulting in unauthorised access, denial of service or </p><p>disruption, unauthorized use of a computer resource for processing or </p><p>storage of information or changes to data, information without authorisation;</p><p>(f) “Data” means data as defined in clause (o) of sub-section (1) of section 2 of </p><p>the Act; </p><p>(g) "Electronic Signature" means electronic signature as defined in clause (ta) of </p><p>sub-section (1) of section 2 of the Act;Draft Rules - Due diligence observed by intermediaries guidelines</p><p></p><p>(h) “Indian Computer Emergency Response Team” means the Indian Computer </p><p>Emergency Response Team appointed under sub section (1) of section </p><p>70(B) of the Act;</p><p></p><p></p><p>(i) “Information” means information as defined in clause (v) of sub-section (1) of </p><p>section 2 of the Act; </p><p>(j) “Intermediary” means an intermediary as defined in clause (w) of sub-section </p><p>(1) of section 2 of the Act;</p><p>(k) “User” means any person including blogger who uses any computer </p><p>resource for the purpose of sharing information, views or otherwise and </p><p>includes other persons jointly participating in using the computer resource of </p><p>intermediary.</p><p>3. Due Diligence observed by intermediary.— The intermediary shall observe </p><p>following due diligence while discharging its duties.-</p><p>(1) The intermediary shall publish the terms and conditions of use of its </p><p>website, user agreement, privacy policy etc..</p><p>(2) The intermediary shall notify users of computer resource not to use, </p><p>display, upload, modify, publish, transmit, update, share or store any </p><p>information that : —</p><p>(a) belongs to another person; </p><p>(b) is harmful, threatening, abusive, harassing, blasphemous,</p><p>objectionable, defamatory, vulgar, obscene, pornographic,</p><p>paedophilic, libellous, invasive of another's privacy, hateful, or </p><p>racially, ethnically or otherwise objectionable, disparaging, relating or </p><p>encouraging money laundering or gambling, or otherwise unlawful in </p><p>any manner whatever; </p><p>(c) harm minors in any way;</p><p>(d) infringes any patent, trademark, copyright or other proprietary rights;</p><p>(e) violates any law for the time being in force;</p><p>(f) discloses sensitive personal information of other person or to which the </p><p>user does not have any right to;</p><p>(g) causes annoyance or inconvenience or deceives or misleads the </p><p>addressee about the origin of such messages or communicates any </p><p>information which is grossly offensive or menacing in nature;</p><p>(h) impersonate another person;</p><p>(i) contains software viruses or any other computer code, files or </p><p>programs designed to interrupt, destroy or limit the functionality of any </p><p>computer resource;</p><p></p><p>Draft Rules - Due diligence observed by intermediaries guidelines</p><p> Page 3 of 4</p><p>(j) threatens the unity, integrity, defence, security or sovereignty of India, </p><p>friendly relations with foreign states, or or public order or causes </p><p>incitement to the commission of any cognisable offence or prevents </p><p>investigation of any offence or is insulting any other nation.</p><p>(3) The intermediary shall not itself host or publish or edit or store any </p><p>information or shall not initiate the transmission, select the receiver of </p><p>transmission, and select or modify the information contained in the </p><p>transmission as specified in sub-rule (2).</p><p>(4) The intermediary upon obtaining actual knowledge by itself or been brought </p><p>to actual knowledge by an authority mandated under the law for the time being </p><p>in force in writing or through email signed with electronic signature about any </p><p>such information as mentioned in sub-rule (2) above, shall act expeditiously to </p><p>work with user or owner of such information to remove access to such </p><p>information that is claimed to be infringing or to be the subject of infringing </p><p>activity. Further the intermediary shall inform the police about such information </p><p>and preserve the records for 90 days.</p><p>(5) The Intermediary shall inform its users that in case of non-compliance with </p><p>terms of use of the services and privacy policy provided by the Intermediary, </p><p>the Intermediary has the right to immediately terminate the access rights of the </p><p>users to the site of Intermediary.</p><p>(6) The intermediary shall follow provisions of the Act or any other laws for the </p><p>time being in force.</p><p>(7) The intermediary shall not disclose sensitive personal information.</p><p>(8) Disclosure of information by intermediary to any third party shall require </p><p>prior permission or consent from the provider of such information, who has </p><p>provided such information under lawful contract or otherwise.</p><p>(9) Intermediary shall provide information to government agencies who are </p><p>lawfully authorised for investigative, protective, cyber security or intelligence </p><p>activity. The information shall be provided for the purpose of verification of </p><p>identity, or for prevention, detection, investigation, prosecution, cyber security </p><p>incidents and punishment of offences under any law for the time being in force, </p><p>on a written request stating clearly the purpose of seeking such information.</p><p> (10) The information collected by the intermediary shall be used for the </p><p>purpose for which it has been collected.</p><p>(11) The intermediary shall take all measures to secure its computer resource </p><p>and integrity of information received, stored, transmitted or hosted shall be </p><p>ensured. </p><p></p><p>Draft Rules - Due diligence observed by intermediaries guidelines</p><p> Page 4 of 4</p><p>(12) The intermediary shall report cyber security incidents and also share cyber </p><p>security incidents related information with the Indian Computer Emergency </p><p>Response Team.</p><p>(13) The intermediary shall not deploy or install or modify the technological </p><p>measures or become party to any such act which may change or has the </p><p>potential to change the normal course of operation of the computer resource </p><p>than what it is supposed to perform thereby circumventing any law for the time </p><p>being in force.</p><p>Provided that the intermediary may develop, produce, distribute or </p><p>employ technological means for the sole purpose of performing the acts of </p><p>securing the computer resource. </p><p>(14) The intermediary shall publish on its website the designated agent to </p><p>receive notification of claimed infringements.</p></blockquote><p></p>
[QUOTE="Mai Harinder Kaur, post: 145945, member: 3558"] The full text of this law can be found at [URL]http://www.mit.gov.in/sites/upload_files/dit/files/due_dilligance4intermediary07_02_11.pdf[/URL] In fact, due to the importance of this, I reproduce it here! Draft Rules - Due diligence observed by intermediaries guidelines Page 1 of 4 [To be published in THE GAZETTE OF INDIA, EXTRAORDINARY, Part II, Section 3, Sub-section (i) of dated the ----------, 2011] Government of India MINISTRY OF COMMUNICATIONS AND INFORMATION TECHNOLOGY (Department of Information Technology) NOTIFICATION New Delhi, the ------------, 2011 G.S.R. ……. (E).― In exercise of the powers conferred by clause (zg) of subsection (2) of section 87, read with sub-section (2) of section 79 of the Information Technology Act, 2000 (21 of 2000), the Central Government hereby makes the following rules, namely: ― 1. Short title and commencement.― (1) These rules may be called the Information Technology (Due diligence observed by intermediaries guidelines) Rules, 2011. (2) They shall come into force on the date of their publication in the Official Gazette. 2. Definitions.― In these rules, unless the context otherwise requires,-- (a) “Act” means the Information Technology Act, 2000 (21 of 2000); (b) “Blog” means a type of website, usually maintained by an individual with regular entries of commentary, descriptions of events, or other material such as graphics or video. Usually blog is a shared on-line journal where users can post diary entries about their personal experiences and hobbies; (c) “Blogger” means a person who keeps and updates a blog; (d) “Computer resource” means computer resource as defined in clause (k) of sub-section (1) of section 2 of the Act; (e) “Cyber security incident” means any real or suspected adverse event in relation to cyber security that violates an explicitly or implicitly applicable security policy resulting in unauthorised access, denial of service or disruption, unauthorized use of a computer resource for processing or storage of information or changes to data, information without authorisation; (f) “Data” means data as defined in clause (o) of sub-section (1) of section 2 of the Act; (g) "Electronic Signature" means electronic signature as defined in clause (ta) of sub-section (1) of section 2 of the Act;Draft Rules - Due diligence observed by intermediaries guidelines (h) “Indian Computer Emergency Response Team” means the Indian Computer Emergency Response Team appointed under sub section (1) of section 70(B) of the Act; (i) “Information” means information as defined in clause (v) of sub-section (1) of section 2 of the Act; (j) “Intermediary” means an intermediary as defined in clause (w) of sub-section (1) of section 2 of the Act; (k) “User” means any person including blogger who uses any computer resource for the purpose of sharing information, views or otherwise and includes other persons jointly participating in using the computer resource of intermediary. 3. Due Diligence observed by intermediary.— The intermediary shall observe following due diligence while discharging its duties.- (1) The intermediary shall publish the terms and conditions of use of its website, user agreement, privacy policy etc.. (2) The intermediary shall notify users of computer resource not to use, display, upload, modify, publish, transmit, update, share or store any information that : — (a) belongs to another person; (b) is harmful, threatening, abusive, harassing, blasphemous, objectionable, defamatory, vulgar, obscene, pornographic, paedophilic, libellous, invasive of another's privacy, hateful, or racially, ethnically or otherwise objectionable, disparaging, relating or encouraging money laundering or gambling, or otherwise unlawful in any manner whatever; (c) harm minors in any way; (d) infringes any patent, trademark, copyright or other proprietary rights; (e) violates any law for the time being in force; (f) discloses sensitive personal information of other person or to which the user does not have any right to; (g) causes annoyance or inconvenience or deceives or misleads the addressee about the origin of such messages or communicates any information which is grossly offensive or menacing in nature; (h) impersonate another person; (i) contains software viruses or any other computer code, files or programs designed to interrupt, destroy or limit the functionality of any computer resource; Draft Rules - Due diligence observed by intermediaries guidelines Page 3 of 4 (j) threatens the unity, integrity, defence, security or sovereignty of India, friendly relations with foreign states, or or public order or causes incitement to the commission of any cognisable offence or prevents investigation of any offence or is insulting any other nation. (3) The intermediary shall not itself host or publish or edit or store any information or shall not initiate the transmission, select the receiver of transmission, and select or modify the information contained in the transmission as specified in sub-rule (2). (4) The intermediary upon obtaining actual knowledge by itself or been brought to actual knowledge by an authority mandated under the law for the time being in force in writing or through email signed with electronic signature about any such information as mentioned in sub-rule (2) above, shall act expeditiously to work with user or owner of such information to remove access to such information that is claimed to be infringing or to be the subject of infringing activity. Further the intermediary shall inform the police about such information and preserve the records for 90 days. (5) The Intermediary shall inform its users that in case of non-compliance with terms of use of the services and privacy policy provided by the Intermediary, the Intermediary has the right to immediately terminate the access rights of the users to the site of Intermediary. (6) The intermediary shall follow provisions of the Act or any other laws for the time being in force. (7) The intermediary shall not disclose sensitive personal information. (8) Disclosure of information by intermediary to any third party shall require prior permission or consent from the provider of such information, who has provided such information under lawful contract or otherwise. (9) Intermediary shall provide information to government agencies who are lawfully authorised for investigative, protective, cyber security or intelligence activity. The information shall be provided for the purpose of verification of identity, or for prevention, detection, investigation, prosecution, cyber security incidents and punishment of offences under any law for the time being in force, on a written request stating clearly the purpose of seeking such information. (10) The information collected by the intermediary shall be used for the purpose for which it has been collected. (11) The intermediary shall take all measures to secure its computer resource and integrity of information received, stored, transmitted or hosted shall be ensured. Draft Rules - Due diligence observed by intermediaries guidelines Page 4 of 4 (12) The intermediary shall report cyber security incidents and also share cyber security incidents related information with the Indian Computer Emergency Response Team. (13) The intermediary shall not deploy or install or modify the technological measures or become party to any such act which may change or has the potential to change the normal course of operation of the computer resource than what it is supposed to perform thereby circumventing any law for the time being in force. Provided that the intermediary may develop, produce, distribute or employ technological means for the sole purpose of performing the acts of securing the computer resource. (14) The intermediary shall publish on its website the designated agent to receive notification of claimed infringements. [/QUOTE]
Insert quotes…
Verification
Post reply
Discussions
Hard Talk
Interviews
India Puts Tight Leash On Internet Free Speech
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.
Accept
Learn more…
Top