{"id":7608,"date":"2020-08-30T04:12:55","date_gmt":"2020-08-30T11:12:55","guid":{"rendered":"https:\/\/webdev.securin.xyz\/?p=7608"},"modified":"2023-07-10T14:53:53","modified_gmt":"2023-07-10T21:53:53","slug":"indias-cybersecurity-policy-disclosure-of-data-breaches","status":"publish","type":"post","link":"https:\/\/webdev.securin.xyz\/articles\/indias-cybersecurity-policy-disclosure-of-data-breaches\/","title":{"rendered":"India’s Cybersecurity Policy: Disclosure of Data Breaches"},"content":{"rendered":"\t\t
In his Independence Day address, the Prime Minister of India said that he dreams of a digital India where cybersecurity is an integral part of national security a push at the right as the country ranks second as target of cyber attacks<\/p>
Echoing the Prime Minister’s push for a national policy, Reliance Industries Chairman, Mukesh Ambani, said that data is the new oil and that data needs to be controlled and owned by the people and not by corporates.<\/p>
While the anticipation is high among the cybersecurity professionals and the industry in India to see the new National policy in place, there are also many questions. Foremost among them is whether it will include a responsible disclosure policy for security breaches.<\/p>
Ram Movva, President and Co-founder of Securin asks, \u201cWill the new national cybersecurity policy include a disclosure policy similar to what the west has?\u201d<\/p><\/blockquote>
One of the many reasons why this question is at the top of the industry\u2019s minds could be the events that are unfolding in Uber\u2019s CSO case.<\/p>
Recently, Uber\u2019s former CSO has been charged with obstruction of justice, and felony charges have been levied because he allegedly covered a security breach incident in 2016. The data breach resulted in the theft of 57 million records of passengers and drivers. If proven guilty, the CSO could go to prison for eight years!<\/p>
Commenting on this incident, George Do, CISO, Gojek said, “CISO’s are consistently challenged with trying to keep their organizations secure. An incident like this reminds us that in addition to having a capable cyber incident response and vulnerability management program, security leaders also benefit from documenting accountable decision-makers.”<\/p><\/blockquote>
Uber makes a classic example of what a company should not do in the event of a security breach.<\/p>
It also raises many other questions in the context of India\u2019s Cybersecurity policy. Critical among them are \u2013<\/p>
1. \u00a0 Will organizations in India voluntarily disclose a security breach and alert their customers about it?<\/p>
2. \u00a0 Will the management and the board take moral responsibility, and will the company bear the financial losses due to the breach?<\/p>
We will have to wait and watch.<\/p><\/blockquote>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"
Will the new national cybersecurity policy include a disclosure policy similar to what the west has?<\/p>\n","protected":false},"author":1,"featured_media":7609,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[82,80,81],"tags":[341,364,363],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/posts\/7608"}],"collection":[{"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/comments?post=7608"}],"version-history":[{"count":5,"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/posts\/7608\/revisions"}],"predecessor-version":[{"id":18772,"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/posts\/7608\/revisions\/18772"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/media\/7609"}],"wp:attachment":[{"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/media?parent=7608"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/categories?post=7608"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/tags?post=7608"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}