<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>B&#039;Cognizance &#124; Business Magazine &#187; iWiz</title>
	<atom:link href="https://bcognizance.iiita.ac.in/archive/apr-oct15/?cat=8&#038;feed=rss2" rel="self" type="application/rss+xml" />
	<link>https://bcognizance.iiita.ac.in/archive/apr-oct15</link>
	<description>B&#039;Cognizance &#124; Business Magazine</description>
	<lastBuildDate>Thu, 20 Aug 2015 16:33:22 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>Compliance Hiccups and Cure</title>
		<link>https://bcognizance.iiita.ac.in/archive/apr-oct15/?p=84</link>
		<comments>https://bcognizance.iiita.ac.in/archive/apr-oct15/?p=84#comments</comments>
		<pubDate>Sun, 26 Apr 2015 08:20:59 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[iWiz]]></category>

		<guid isPermaLink="false">http://localhost/bcognizance/?p=84</guid>
		<description><![CDATA[IT, security and compliance officers discuss the issues relating companies these days and what steps organizations can take to reduce potential regulatory compliance risks and security threats. &#8220;Failure to meet rules and guidelines set by compliance standards could mean fines, penalties and loss of trust.” Andrew Hodes   IT departments are not only to be]]></description>
				<content:encoded><![CDATA[<h2>IT, security and compliance officers discuss the issues relating companies these days and what steps organizations can take to reduce potential regulatory compliance risks and security threats.</h2>
<p><strong><em>&#8220;Failure to meet rules and guidelines set by compliance standards could mean fines, penalties and loss of trust.” Andrew Hodes</em></strong></p>
<p><strong><em> </em></strong></p>
<p>IT departments are not only to be entangled by the security risks these days but also have to comply with the various industry and federal regulations to keep sensitive customer data safe and to uphold the trust levels of the potential customers. With the ongoing notion of BYOD</p>
<p>(Bring Your Own Device) it’s an up keeping task for the organizations to comply to the industry and federal regulation standards. Its very vital for the organizations to tap these potential compliance vulnerabilities to function and deliver in alignment to the industry and federal regulations. Some of the biggest hiccups to the organizations to keep complaint are</p>
<ol>
<li><strong>Employees:</strong> Employees play a vital role in compliance .Adherence to industry and federal standards are purely employee oriented and controls to tap this leakage is very essential for an organization. To overcome this threat, it&#8217;s important to educate all employees on different ways information can be acquired through very low-tech methods and give them tools they can use.</li>
<li><strong>Cloud Service Providers.</strong>To ensure that sensitive data is being properly protected in the cloud, choose a trusted service provider. Cloud services present significant benefits in of cost savings, scalability, flexibility, however, to ensure that your or your customer&#8217;s data is properly protected and in compliance with all relevant regulations, the vendor/service provider should meet the underlying regulatory requirements, whether the cloud is engineered to be HIPAA-ready or to comply with PCI or FISMA standards.</li>
<li>To avoid the potential theft of data from mobile workers, provide travel laptops to employees and create specific information security policies to protect the network from cyber penetration.</li>
<li><strong>Third-Party Apps (S hadow IT).</strong>The biggest compliance-related issue facing CIOs today is shadow IT, a threat caused by the use of unseen third-party solutions including devices and apps, the flow of data and information in an unregulated unchecked manner causes a potential compliance threat to the stakeholders.  Educate end users; give CIOs the controlled power to constantly assess services for suitability; and deploy modern enterprise cloud solutions to solve overall compliance problems.</li>
</ol>
<blockquote><p><em>ASHUTOSH JOSHI</em><br />
<em> MBA (IT) 4th SEM</em></p></blockquote>
]]></content:encoded>
			<wfw:commentRss>https://bcognizance.iiita.ac.in/archive/apr-oct15/?feed=rss2&#038;p=84</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Wake up — it’s time to be aware about Information Technology Act</title>
		<link>https://bcognizance.iiita.ac.in/archive/apr-oct15/?p=82</link>
		<comments>https://bcognizance.iiita.ac.in/archive/apr-oct15/?p=82#comments</comments>
		<pubDate>Sun, 26 Apr 2015 08:19:24 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[iWiz]]></category>

		<guid isPermaLink="false">http://localhost/bcognizance/?p=82</guid>
		<description><![CDATA[With the vast expansion of Internet services and their necessities in the digital world, awareness about Internet regulation is must. The great majority of Internet users are not aware that they access a regulated version of World Wide Web where doing something to anything may result to a very dangerous transgression for the future. A]]></description>
				<content:encoded><![CDATA[<p>With the vast expansion of Internet services and their necessities in the digital world, awareness about Internet regulation is must. The great majority of Internet users are not aware that they access a regulated version of World Wide Web where doing something to anything may result to a very dangerous transgression for the future. A lot of discussion and debate has taken place about privacy and IT act, whether with regard to freedom of speech, citizens&#8217; rights, state surveillance or the Internet licensing stand. However, the most critical aspect that gives way to all these discussions and debates is, what should the citizens&#8217; in India must know about Internet laws? How Internet users can make themselves more secure and safe by ensuring better protection of personal data?</p>
<p>Often laws are defined in a manner that it lay down all the substantive rights of the citizens. But it is due to lack of awareness of beneficiaries that most of the time they fail to respect and realize rights, demand justice, accountability and effective remedies at all levels. Recently, after hearing batch of public interest litigation on ambit, Honorable Supreme Court finally quashed down section 66(A) which allowed arrests for &#8220;inconvenient, abusive, and annoying messages on any online media, including ones involving freedom of expression&#8221;. The government also admit that section 66(A) of the Information and Technology Act had certain &#8220;aberrations amounting to abuse&#8221;. It means from now on section 66(A) atleast doesn&#8217;t have any legal standing.</p>
<p>Indians would have rejoice this decision, but wait how many of us know, that by striking down section 66(A), the Supreme Court of India paved the path for other challenges in cyber space for citizens&#8217;. Until the issue of further amendments in IT Act, every citizen must be aware about his/her privacy and cyber laws which will be helpful to exercise their rights. There are certain sections and articles which must be understood by every Indians in cyber space. These are discussed below:</p>
<ol>
<li><strong>Article 19</strong> of the Constitution of India states:</li>
<li><strong>Article 19(1)(a):</strong> grants every citizens with the right to freedom of speech and expression.</li>
<li><strong>Article 19(2):</strong> states, that nothing in sub-clause (a) of clause (1) shall affect the operation of any existing law, or prevent the State from making any law, in so far as such law imposes reasonable restrictions on the exercise of the right conferred by the said sub-clause in the interests of the sovereignty and integrity of India, the security of the State, friendly relations with foreign States, public order, decency or morality or in relation to contempt of court, defamation or incitement to an offence.</li>
</ol>
<p>Thus there is distinct contradiction between section 66(A) and article 19(2) of the Indian Constitution, which provides government to issue another amendment to exercise powers under Article 19(2).</p>
<p><strong>Section 69(A) &#8221; Power to block any content &#8221; </strong>of Information Technology Act states:</p>
<p>Section 69(A) allows the Indian government the power to block/censor any website or internet service, without giving the creator or provider of the content a chance to defend the material or even to get it unblocked. Within this, any information generated, transmitted, received, stored or hosted on any computer resource, if found offending or annoying can be blocked for access by the public.</p>
<p><strong>Section 79 &#8220;Punishment for platforms like YouTube, <span style="text-decoration: underline;">ISP</span>, etc.&#8221;</strong> of Information Technology Act states:</p>
<p>The <span style="text-decoration: underline;">“</span>intermediary<span style="text-decoration: underline;">”</span> such as ISP, YouTube, Twitter, Facebook, etc. can be punished if they does not actively censor material that the government or any person complains about, without giving intermediary any chance to defend the content. This section provides a dangerous tool to disrupt the business of an intermediary by flooding it with baseless complains and notices.</p>
<p><strong>Section 84(B)&#8221;Punishment for abetment of offences&#8221; and Section 84(C) &#8220;Punishment for attempt to commit offences&#8221;</strong> of Information Technology Act states:</p>
<p>This gives the powers to police officers of the rank of an Inspector to arrest any person without a warrant in case of any instigation or attempt of committing any offense under IT Act. There is no defined objective guidelines, which could help police officer in arresting any person in a public place who is about to commit a cyber crime.</p>
<p><strong>Section 118(D)&#8221;Punishment for causing annoyance by sending mails&#8221;</strong> of Kerala Police Act states:</p>
<p>Like section 66(A), it is illegal to cause annoyance to anyone in an “indecent manner” by sending messages or mails by any means. This was meant to be a safeguard against stalkers and spammers, but unfortunately becomes a way of suppressing certain kinds of speech as &#8220;online illegal speech&#8221; is not defined under this act.</p>
<p><strong>Section 43(A) &#8220;Compensation for failure to protect data&#8221; and Section 72(A) &#8220;Punishment for disclosure of information in breach of lawful contract&#8221; </strong>of Information Technology Act states:</p>
<p>These sections provide the concept of data privacy and its protection. Section 43(A) helps in getting compensations from any corporate body for the negligence in implementing or maintaining reasonable security practices and procedures by complying with the best standards like ISO 27001, etc. for safeguarding the sensitive personal data or information (SPDI). Here SPDI includes:</p>
<ol>
<li>Passwords</li>
<li>Financial information such as bank account or credit card or debit card or other payment instrument details</li>
<li>Biometric information</li>
<li>Deoxyribonucleic acid data</li>
<li>Sexual preferences and practices</li>
<li>Medical history and health</li>
<li>Political affiliation</li>
<li>Commission, or alleged commission, of any offence and</li>
<li>Ethnicity, religion, race or caste</li>
</ol>
<p>Further section 72(A) also deals with personal sensitive information and provides punishment for disclosure of information without the information provider’s consent or in breach of lawful contract. Both of these sections are at a nascent stage which needs to be stringent.</p>
<p>Apart from urgent amendments in IT Act, a special attention must be paid to the data privacy rights in India which is an essential part of civil liberties protection in cyberspace. A right to privacy bill, 2014 is in draft phase, which will help individuals to protect against misuse of data by government or private agencies. Until then each one of us must be careful while accessing, downloading or uploading different contents and stuffs on internet.</p>
<blockquote><p><em>Akansha Pandey</em><br />
<em> MS- Cyber Law Information Security</em><br />
<em> IIITA</em></p></blockquote>
]]></content:encoded>
			<wfw:commentRss>https://bcognizance.iiita.ac.in/archive/apr-oct15/?feed=rss2&#038;p=82</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Bring Your Own Cloud</title>
		<link>https://bcognizance.iiita.ac.in/archive/apr-oct15/?p=78</link>
		<comments>https://bcognizance.iiita.ac.in/archive/apr-oct15/?p=78#comments</comments>
		<pubDate>Sun, 26 Apr 2015 08:14:57 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[iWiz]]></category>

		<guid isPermaLink="false">http://localhost/bcognizance/?p=78</guid>
		<description><![CDATA[&#8220;Bring Your Own Device&#8221; (BYOD) has been popular for quite some time now. It is driven mainly by workers desire to use their own devices like phones, tablets, laptops etc. This practice has got its own benefits like flexibility, round the clock access to data, higher productivity and lesser dependency on central IT Hub. But,]]></description>
				<content:encoded><![CDATA[<p>&#8220;Bring Your Own Device&#8221; (BYOD) has been popular for quite some time now. It is driven mainly by workers desire to use their own devices like phones, tablets, laptops etc. This practice has got its own benefits like flexibility, round the clock access to data, higher productivity and lesser dependency on central IT Hub. But, BOYD can easily cause disruptions to IT compliances and IT processes of an organization.</p>
<p>A new trends has emerged on the lines of BOYD called &#8220;Bring Your Own Cloud&#8221; or BYOC, which allows workers to utilize public or private third-party cloud services to complete their job tasks.</p>
<p><strong>What is &#8220;Bring Your Own Cloud&#8221;?</strong></p>
<p>In BYOC, workgroups or individual employees of the organization uses low cost, fast and efficient public or private third-party cloud services to get the work done. An organization might encourage its employees to use public or third-party cloud services in order to reduce capital and operational costs related to IT. This is prevalent in large organization that can&#8217;t spare resources or people to keep with changes in IT.</p>
<p><strong>What are the advantages of BYOC?</strong></p>
<ol>
<li>Less utilization of the organization&#8217;s resources.</li>
<li>Less expensive</li>
<li>Faster and efficient</li>
<li>Agile and easy access</li>
</ol>
<p><strong>What are the disadvantages of BYOC?</strong></p>
<p>BYOC is also referred to as &#8220;shadow IT&#8221; due its pervasiveness. The implications of BYOC are as follows:</p>
<p>1) Lack or loss of overall control: The organization doesn&#8217;t know who&#8217;s using what, and so, it has no control on the data access, its management and resource planning.</p>
<p>2) Inconsistency of System: With disparate systems in use, inconsistencies creeps into the IT environment.</p>
<p>3) Increase Risk of Data loss: with the use of third-party cloud services there is always a threat of data loss.</p>
<p>4) Greater risk of errors: This is due to non IT-professionals managing the infrastructure.</p>
<p><strong>What are the controls or best practices for BYOC?</strong></p>
<p>To mitigate the possible risks, the following could be consider as best practices or controls to be incorporated in the organization’s IT process.</p>
<p>1) The employees should be encouraged to use a single cloud storage for any work related activity and no personal data should be stored in that particular storage.</p>
<p>2) Use version-control sign-out process to ensure that multiple copies don&#8217;t exist and there is a record of everyone who has a personal copy.</p>
<p>3) Programs like word processor, spreadsheet, presentation-programs etc. should be standardized on a file format which is widely supported, and employees should be encouraged to only use the prescribed format.</p>
<p>4) Detailed BYOD policies wrapped up with BYOC policies should be adopted by the organizations.</p>
<p>5) Collaboration should be supported by sharing access to an organization-controlled cloud storage service and apps having same source.</p>
<p><strong>Conclusion:</strong></p>
<p>For today&#8217;s organizations it is wiser to accept that employees will rely on the tools they know best, and to accommodate employee choices and apply governance practices that offer an adequate level of protection.</p>
<p>&nbsp;</p>
<blockquote><p><em> RAHUL KUMAR</em><br />
<em> MBA (IT) 4<sup>th</sup> SEM</em></p></blockquote>
]]></content:encoded>
			<wfw:commentRss>https://bcognizance.iiita.ac.in/archive/apr-oct15/?feed=rss2&#038;p=78</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Information insecurity due to data leakage by Chinese smart phone companies</title>
		<link>https://bcognizance.iiita.ac.in/archive/apr-oct15/?p=76</link>
		<comments>https://bcognizance.iiita.ac.in/archive/apr-oct15/?p=76#comments</comments>
		<pubDate>Sun, 26 Apr 2015 07:30:56 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[iWiz]]></category>

		<guid isPermaLink="false">http://localhost/bcognizance/?p=76</guid>
		<description><![CDATA[Smart phones have become a necessity of one’s life. Now a days more than a trend or symbol of aristocracy they have become a need. A customer wants a smart phone with a reasonable price and high end features. Most of the companies have emerged with brilliant marketing strategies but Chinese smartphones seems to be]]></description>
				<content:encoded><![CDATA[<p>Smart phones have become a necessity of one’s life. Now a days more than a trend or symbol of aristocracy they have become a need. A customer wants a smart phone with a reasonable price and high end features. Most of the companies have emerged with brilliant marketing strategies but Chinese smartphones seems to be taking off in the Indian market because they are a great combination of off modern features and low price but then the question arises how does the Chinese smart phone companies like Xiaomi, Gionee and Oppo fare off so well in the Indian market even after having a security leakage issue. Although these companies seems to satisfy the customer in every aspect but they have a major security leakage issue.<br />
According to report in a national daily Chinese smartphones are leaking some major information which are sent back to the the servers in China. The IAF has also alerted its people to avoid using these smartphones and an initial testing was also done by F-Secure on August 7, 2014 on a Redmi 1S, which had the issue of data automatically being transmitted while Xiaomi claims that their smartphones are safe and the Indian Air Force had issues a notice based on a two-month-old report by F-Secure.<br />
Although after an update of the OS, they tested the handset again on August 14, to confirm that the issue is no longer present. The Note states that F-Secure, a security firm, carried out tests on the Redmi 1S, only to find that the phone was forwarding the carrier name, phone number, IMEI, address book records and SMS to the Chinese servers in Beijing. The report also mentioned about a user in Hong Kong, reporting that the Redmi Note automatically connected to a particular IP address hosted in China. The IP address belongs to the CNNIC, which is the administrative agency for Internet affairs operating under the Ministry of Information Industry of China.<br />
Although there are laws against the leakage of privacy but the user must himself take care about the security of his data.<br />
Some important sections have been substituted and inserted by the IT Amendment Act, 2008 in which Section 66E, Section 66B and Section 69B provide strict laws for information security.<br />
However actions takes time to take place but the Chinese companies have firmly rooted in the Indian market and that is why they thriving it so well.<br />
Although at user level there are lots of ways for to ensure the security of data. There are applications available for android and iOS to by the name OS monitor and viaProtect to provide the user information about the data being sent by different applications without his knowledge.<br />
So, somehow we ourselves can put a step forward to avoid the insecurity of our data.</p>
<p>Source: Deccan Chronicle and Intellectual Property &amp; Information Technology Laws Division</p>
<blockquote><p><em>Varun Kumar</em><br />
<em> IIIT Allahabad</em></p></blockquote>
]]></content:encoded>
			<wfw:commentRss>https://bcognizance.iiita.ac.in/archive/apr-oct15/?feed=rss2&#038;p=76</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
