Understanding IT Security Policies
Understanding IT Security Policies
2
Learning objective
To have an understanding of :
1. Concepts of Information Technology Act, 2000, Digital signatures /
certificates as provided in the Act
2. GoI’s (MeitY’s) IT policy
3. IT Security Policy of IAAD
4. Emerging application
One IAAD One system (OIOS)
e-Office
5. Role as custodian of third party data
3
References
4
Information Technology Act - 2000
Information Technology Act - 2000
Brief
The IT Act provides a legal framework for electronic governance, e-
commerce by giving recognition to electronic records and digital
signatures.
It also defines cyber crimes and prescribes penalties for them.
The Act directed the formation of a Controller of Certifying Authorities to
regulate the issuance of digital signatures.
It also established a Cyber Appellate Tribunal to resolve disputes rising
from this law.
6
Information Technology Act - 2000
History of IT Act
The United Nations General Assembly have adopted the Model Law on
Electronic Commerce on 30th January 1997 known as United Nations
Commission on International Trade Law (UNCITRAL) on E-Commerce
Enacted on 17th May 2000 – India is 12th nation in the world to adopt
cyber laws
India passed the Information Technology Act, 2000 on 17th October 2000
Amended in December 2008
Amended Act is known as – The Information Technology (amendment)
Act, 2008 7
IT Act 2000 - contents
Information Technology Act 2000, has
13 chapters, 94 sections and 4 schedules.
First 14 sections deals with legal aspects concerning digital
signature.
Further sections deal with certifying authorities who are
13
Features of digital signature
The three important features of digital signature are:
Authentication – They authenticate the source of messages. Since
the ownership of a digital certificate is bound to a specific user, the
signature shows that the user sent it.
Integrity – Sometimes, the sender and receiver of a message need an
assurance that the message was not altered during transmission. A digital
certificate provides this feature.
Non-Repudiation – A sender cannot deny sending a message which has a
digital signature.
14
Digital Signature – IT Act
According to the Information Technology Act, 2000, digital signatures
mean authentication of any electronic record by a subscriber by means of
an electronic method or procedure in accordance with the provisions of
section 3. Further, the IT Act, 2000 deals with digital signatures under
Sections 2, 3, and 15.
Section 2(1)(p)
According to Section 2(1)(p), digital signature means ‘authentication of
record.
Further, every subscriber has a private key and a public key which are
Ministry of Electronics and Information Technology (MeitY) has framed polices for
various areas of IT.
Few of them is listed below:
Policy on Use of IT Resources
Email Policy
Framework & Guidelines for Use of Social Media for Government Organisations
20
GoI policies in guidelines
In Brief :
All government officials are expected to use only official email ID
23
IAAD security policy statement
It is the policy of the organisation to ensure that:
1. Assets will be classified as to the level of protection required
Audit Planning and Design Regulations, Structured Data (Fin. & Training
Standards, Operational Data)
Guidelines,
Audit Execution and
Documentation Manuals Semi/Un Structured Data
Asset Inventory
(e.g. GOs/ OMs/Reports)
Budget
Audit Reporting and Repository
Follow Up of Audit IFMS, VLC, PFMS Expenditure
Checklists Monitoring
28
Audit Process Management System (APMS)
Primary system of record (Single Source of Truth) for the entire chain of audit
activities
From audit planning and design through audit execution to issue and follow-up of
Inspection Reports (IRs) to processing and finalisation of Audit Reports
Activities through the IT system, not post facto recording
Will ensure consistent, reliable data in a uniform format across all Audit Offices
Dispense with numerous monthly/ quarterly returns – internal to Field Audit
Office (FAO) and to CAG’s office
Supports better and real-time monitoring of the audit process, especially audit
execution
Integration/ linkage with HR and Training systems
Integrated with Audit KMS (Knowledge Management System)
29
Audit Process Management System (APMS)
Workflow-based; primary system of record for all audit processes
Not post facto data entry
Maintaining the Audited organisation Universe (Apex Auditable Entities; Audit
Units and Implementing Units)
Online preparation of Audit Memos/ Requisitions
Online preparation/ processing of Inspection Reports
Uploading of supporting documentation
Follow-up of IRs
ATN/ATRs processing
Covers all types of audit – Compliance, Performance, Financial audit
RFP* to include requirement of local language support
Interface with Audited organisation
30
*RFP : Request for Proposal
Audit KMS
Audit Guidance
Regulations; Auditing Standards
Auditing Guidelines; Guidance Notes; Practice Guides
Manuals (CAG’s Office and Field Office)
Repository of audit checklists (by type of Audited organisation)
For adapting and use, as appropriate, by different Field Audit Offices
Audited organisation Information
Will not be uniform; will vary across audit offices/ audit streams
Unstructured information (e.g. GOs/ GRs; Budget papers; Annual/ longer term Plans; DPRs;
Procurement Documentation; Evaluation Reports)
Data marts –databases from Audited organisation organisations, e.g. All-India/ Central databases
like NREGASOFT; U-DISE*
Financial systems – State IFMS; VLC; Central PFMS
Continuously growing/ updating; will need strong moderating (centrally and locally) to maintain documentation
relevance
MIS Dashboard
Document Management System
Technical Support
Business Rule Machine Sharing of
Import Data Collection Analysis
Engine Learning results
Quality
SoF DP DAN ML AR Follow-up
Assurance
Risk Field Preparation of Quality Pursuance & Certification of
assessment audit Draft IR Assurance (IR) Settlement accounts
1. What are the major changes (before/ after) that OIOS introduces?
39
Emerging Applications
eOffice
Introduction to eOffice
A Digital Workplace Establish a Single
Solution in Product for reuse in
Government offices the Government
eOffice
Initiated in 2009. Based on Central
Developed and Secretariat Manual of
Implemented by National e-Office Procedure
Informatics Centre (NIC) (CSMeOP)
41
eOffice - benefits
Enhance transparency
Increase accountability
Receipts Files
Dispatch Reports
44
Role as custodian of
third party data
(Reference: CAG Office security hand book and guidelines on data analytics and big
data management)
Ownership of data
With rapid computerisation, most of the activities of auditable entities are being
recorded electronically, in various IT systems
This data is available to audit, in different forms and from different sources.
The auditor should obtain a certificate stating that the data is complete and the
same as in the IT system of the audited entity at the time of receiving data.
The ownership of the data sets remains that of the audited entity
IA&AD holds this data only in a fiduciary capacity.
HoDs are to assume the ownership of the data sets and exercise such controls on
security and confidentiality of the data as envisaged for the data owner.
46
Data security as custodian of data
In case of electronic records, making multiple copies, modifying data, deleting etc. are
easier.
Hence, the data provided by data sources must be kept in safe custody for reference.
all analysis must be undertaken only in copies of the source data.
Compliance to all rules, procedures and agreements regarding data security,
confidentiality and use of data of the audited entity/ third party must be ensured by
audit.
within the overall framework of data protection and security prescribed by IA&AD
from time to time.
Complete and chronological record of all data shared between data source owner and
the auditor should be stored in an unaltered and secure manner.
47
Data security as custodian of data
While handling data, limit to the bare necessity, the number of personnel
with access to the raw data
Establish a trail of personnel who have accessed data.
Computers which are used for data analytics are not connected to internet
Data obtained from the audited entity, should be handled due diligence to
avoid any kind of unauthorised disclosure
The concerns and instructions of the owners of data, if any, should be
ascertained and kept in view.
Field offices may obtain data sets whose ownership is not with auditable
entities under their audit jurisdiction. Security of such data sets also need to
ensured.
48
Thanks