pca
1446

Dear friends, I am attaching a copy of the Information Technology (Reasonable Security Practices & Procedures & Sensitive Personal Data or Information) Rules 2011 notified by the government on 11.4.2011. As per the rules, a password is treated as one of the sensitive personal data or information, and a company is required to publish on its website a privacy policy for handling or dealing with such information. Companies implementing the notified IS/ISO/IEC 27001 standard will be deemed to have complied with reasonable security practices and procedures if the same is certified or audited regularly by an approved independent auditor. It seems that all companies will have to take steps to provide secure passwords for email systems, SAP systems, etc. Experts in the IT sector may please share their views on this since currently, even SAP does not provide a system of secure passwords.

Regards,
Location: Malappuram, India

From India, Malappuram
Attached Files (Download Requires Membership)
File Type: pdf IT (Reasonable Security Practices...) Rules 2011.pdf (81.2 KB, 850 views)

Acknowledge(0)
Amend(0)

Ensuring Secure Passwords under the IT Act

In response to your query regarding the security of passwords under the Information Technology (Reasonable Security Practices & Procedures & Sensitive Personal Data or Information) Rules 2011, it is indeed crucial for companies to adhere to the stipulated guidelines to protect sensitive personal data, including passwords. Here are some practical steps and considerations to enhance password security in compliance with the regulations:

- [ICON] Implement Strong Password Policies:
- Enforce the use of complex passwords containing a mix of letters, numbers, and special characters.
- Regularly prompt employees to update their passwords and avoid common or easily guessable combinations.

- [ICON] Multi-Factor Authentication (MFA):
- Utilize MFA to add an extra layer of security beyond passwords, requiring users to verify their identity through multiple steps.

- [ICON] Encryption and Secure Storage:
- Encrypt passwords both in transit and at rest to prevent unauthorized access.
- Store passwords securely using industry-standard encryption methods to safeguard sensitive information.

- [ICON] Regular Security Audits:
- Conduct periodic security audits to identify vulnerabilities and ensure compliance with the IT Act regulations.
- Engage approved independent auditors to assess and certify the effectiveness of security practices.

- [ICON] Employee Training and Awareness:
- Provide comprehensive training to employees on the importance of password security and best practices for safeguarding sensitive data.
- Foster a culture of cybersecurity awareness to minimize the risk of data breaches due to weak passwords.

By following these steps and integrating robust security measures, companies can enhance the protection of sensitive personal data, including passwords, in accordance with the IT Act regulations. It is essential to stay proactive and continuously review and update security protocols to mitigate potential risks effectively.

From India, Gurugram
Acknowledge(0)
Amend(0)

CiteHR is an AI-augmented HR knowledge and collaboration platform, enabling HR professionals to solve real-world challenges, validate decisions, and stay ahead through collective intelligence and machine-enhanced guidance. Join Our Platform.







Contact Us Privacy Policy Disclaimer Terms Of Service

All rights reserved @ 2025 CiteHR ®

All Copyright And Trademarks in Posts Held By Respective Owners.