Govt declares ICICI, HDFC, NPCI's IT resources as critical information infrastructure
Tags: National News
The government has declared the IT resources of ICICI Bank, HDFC Bank and UPI managing entity NPCI as 'critical information infrastructure' under Section 70 of the IT Act, 2000.
Damage to them will have implications for national security and any person who tampers with or accesses them unauthorizedly can be jailed for up to 10 years.
About Critical Information Infrastructure (CII)
According to the Information Technology Act of 2000, 'critical information infrastructure' as a computer resource means its inability or loss to have a disastrous effect on national security, economy, public health or security.
The government has the power, under the Act, to declare any data, database, IT network or communication infrastructure as a CII for the protection of that digital asset.
Why is CII classification and protection necessary?
Governments around the world are moving quickly to protect their critical information infrastructure.
IT resources are the backbone of many important functions in a country's infrastructure, and given their interrelationship, any disruption can have cascading effects across sectors.
For example, failure of information technology in power grids can lead to prolonged disruptions in other sectors like healthcare, banking services.
In October 2020, as India grappled with the pandemic, Mumbai's electricity grid supply suddenly snapped, affecting hospitals, trains and businesses in the big city.
It was caused by a cyber attack.
National Critical Information Infrastructure Sectors- National Critical Information Infrastructure Protection Centre (NCIIPC) has identified the following critical information infrastructure-
Electricity and Energy
Banking, Financial Services & Insurance
Strategic & Public Enterprises
National Critical Information Infrastructure Protection Centre (NCIIPC)
It is the nodal agency for taking all measures to protect the nation’s critical information infrastructure.
It was established in January 2014.
It guards CII from unauthorised access, modification, use, disclosure, disruption, incapacitation or distraction.
Please Rate this article, so that we can improve the quality for you -