Friday, 30 November 2012

Indian Crisis Management Plan For Cyber Attacks And Cyber Terrorism

The threats of cyber attacks, cyber espionage and cyber terrorism are looming large at India. India needs to understand the seriousness of cyber attacks upon its critical infrastructures and cyberspace. To start with, India must formulate a crisis management plan to tackle cyber attacks, cyber terrorism and cyber espionage attempts.

Crisis management plan (CMP) is a measure of readiness to meet uncertainties and future risks and accidents. If we have a good crisis management plan at place, we can minimise the damage and harm to maximum possible extent.

CMP pertaining to information and communication technology (ICT) is an essential part of national ICT policy of India. The other parts of national ICT policy of India are cyber security policy of India, critical infrastructure protection policy of India, critical national infrastructure protection policy of India from cyber attacks, national security policy of India, etc.

Similarly, we must also formulate a cyber security policy for India. With more and more networks and computers are now connected with public utilities and essential public services, cyber security assumes great significance these days. India is also looking forward for mandatory electronic delivery of services. This would increase the risks of cyber attacks upon crucial public delivery systems of India.

The government of India has issues certain guidelines to safeguard Indian cyberspace. According to these guidelines no sensitive information is to be stored on the systems that are connected to Internet. The Government has also claimed to have formulated Crisis Management Plan for countering cyber attacks and cyber terrorism for implementation by all Ministries/ Departments of Central Government, State Governments and their organizations and critical sectors.

The organisations operating critical information infrastructure have been advised to implement information security management practices based on International Standard ISO 27001. Ministries and Departments have been further advised to carry out their IT systems audit regularly to ensure robustness of their systems. Ministry of External Affairs has also issued a comprehensive set of IT security instructions for all users of MEA and periodically updates them on vulnerabilities.

Although the steps taken by Indian government are praiseworthy, they are not sufficient to ward off the sophisticated cyber attacks. The practical implementation of the crisis management plan of India is still missing. With a beginning already taken place, it needs a political will to give it a final shape and help it to reach its final destination.

Unconstitutional And Illegal Biometrics Collection Laws And Practices In India

India is passing through one of the “Most Dangerous Periods” for Civil Liberties and Human Rights Protections. No time in the past Indian Citizens were so “Vulnerable” to Human Rights Violations and blatant violation of their Fundamental Rights.

The Constitution of India has conferred many Fundamental Rights upon Indian Citizens and Persons. However, Indian Government is acting in clear “Derogation” of these Fundamental Rights and Human Rights.

Article 21 of Indian Constitution confers Privacy Rights in India to all. Similarly, Article 21 also confers Right to Life and Liberty to all that cannot be taken away except by “Due Process of Law”. Articles 14, 19 and 21 collectively protect against “Arbitrary and Unconstitutional State Actions”.

Despite all these “Protections and Rights” we have Authorities like Unique Identification Authority of India (UIDAI) that is not governed by any Law whatsoever. Similarly, we have provisions pertaining to National Population Register (NPR) of India that are clearly “Unconstitutional”.

We have no dedicated Data Protection Laws in India, Data Security Laws in India, Cyber Security Laws in India, etc. Even the Cyber Law of India, incorporated in the Information Technology Act, 2000 (IT Act 2000), is an “Endemic E-Surveillance Enabling Law” that requires urgent “Repeal”.
Cyber Security in India is also in bad shape and even the Supreme Court of India has chided Indian Government to boost up its Cyber Security to protect National Security of India. National Security and Right to Information in India are on “Crossroads” where the “National Security Card” is very frequently played by Indian Government to deny “Legitimate and Eligible Information” to Indian Citizens.

In all this “Political and Legislative Mess” we have a “Bonus” for Indian Government as well. The Parliamentary Oversight of Intelligence Agencies of India is missing and they are “Not Accountable” to any “Legislative and Parliamentary Scrutiny”.  Intelligence related Projects like National Intelligence Grid (NATGRID), Central Monitoring System (CMS) of India, proposed National Counter Terrorism Centre (NCTC) of India, etc have no Parliamentary Approval and Oversight.  

There is no second opinion that collection of “Highly Sensitive Biometric Details” by any Governmental Agency or Authority in such circumstances is not only “Unconstitutional” but is also “Highly Risky” for Life and Liberty of Indian Citizens/Persons. In fact, collection of Biometric Details by UIDAI and NPR are clearly “Unconstitutional and Illegal” and Indian Citizens and Residents can “Refuse” to provide the same no matter what these Authorities and Laws say.

Human Rights Protection in India is at its nadir. Similarly, Civil Liberties Protection in Indian Cyberspace is in doldrums. If we keep on succumbing to the “Pressure Tactics” of Indian Government, the day would be not far when Indian Government would have complete control over our “Body and Soul”.

Thursday, 29 November 2012

The Extra Steps That TOR Users Must Take

The “Decloaking Engine” invented by HD Moore was one of the most effective ways of showing how exit nodes of TOR system can sniff the unencrypted, plain text and insecure information and data passing through it. A malicious or e-surveillance capable exit node is the weakest link of the privacy and security chain of a TOR user. However, the problem is not with the TOR’s system as this is the way TOR works. The real problem lies with the end user’s perception regarding TOR’s use in general and anonymity and privacy in particular.

There are various media reports that suggest that Wikileaks acquired its whistle blowing ammunition by sniffing or intercepting the traffic flowing through TOR networks. Whether this is true or not is not the real question here. The real question is what TOR is actually offering to the end users?

Interestingly, TOR is very clearly and openly explaining the scope of anonymity and privacy offered by it to the end users. Actually TOR is great for anonymity but average at privacy protection and poor at data security. This is because although the entry node encrypts the data and forwards it to the next node, the exit node sees it in clear text and unencrypted form. This means that although the ultimate site that you wish to access would see the IP address of the exit node and not your original IP address yet the exit node itself is very sure about the data you are sending to the website.

Think about a malicious exit node as a man-in-the middle attacker (MITM).that can sniff your traffic that you are sending to the ultimate website. It may include confidential information like bank accounts, passwords, governmental secret documents, etc. All of these travel in a plain text form and can be sniffed easily by the exit node. To some extent a malicious exit node is also a form of “Extended MITM” attack as the normal MITM attack occurs either at the local network or local wireless network/access point. But in case of MITM attack occurring at the exit node of TOR system, this is happening at a place far beyond your network(s) and jurisdiction. This scary fact must be kept in mind while sending unencrypted and unprotected data across TOR network.

The real problem is that an average TOR user cannot differentiate between a trusted and untrusted exit node. This differentiation is not within his direct control. But he has something great that can reduce his risks of exit node attacks. The TOR users must use great services like OpenSSH or PuTTY while sending confidential information. They may also use their own preferred end to end encryption software and systems but the main idea remains the same. TOR provides the anonymity and a secured connection provides additional privacy and security.

Using Firefox after disabling Add-ons, Active X Controls, Java Scripts, Cookies, etc can also bring additional anonymity and privacy. If you need all these functionalities, you can use two different browsers with different setting i.e. Firefox for TOR and other browser for your other tasks. These steps may not make you absolutely anonymous but would definitely solve the problem of malicious exit nodes sniffing to a great extent.

Source PTLB Blog.

Wednesday, 28 November 2012

Techno Legal Thoughts

I have started a new blog titled Techno Legal Thoughts that would discuss issues like cyber law, cyber forensics, cyber security, trainings and education, cyber threats and cyber attacks, etc.

The purpose of this blog is to share short and contemporary techno legal issues from around the globe. I am also expecting that my colleagues from other platforms would also join me in this endeavour.

Kindly visit Techno Legal Thoughts for more details.

Google Is Rightly Held Liable For Defamatory Contents By Australian Court

In a recent case filed by Milorad Trkulja against search engine Google, the Australian court has held Google liable for defamatory images that were reflected in its search results.

The jury in this case concluded that the search engine was the publisher of images of Trkjulja and related information which suggested he was involved in crime. Google naturally took the defence of being an online service provider (OSP) not liable for defamatory images.

However, Google failed to realise that the safe harbour protection available to it ceases to exist the moment it is put to notice of the defamatory or any copyright infringing material and it fails to take any action upon the same.

If even after being aware of such offending material a search engine like Google does not take action, it is certainly liable for the consequences as the safe harbour protection is not available to it.

Of late Google has also been defying both Indian and US laws that pertains to copyright protection, trademarks protection and offensive contents removal laws. In fact, Google has been deleting the original and copyright protected articles and is supporting copyright infringers by not removing the copyright violating results from the search results.

A dedicated website titled websites, blogs and news censorship by Google and India and a corresponding discussion group has also been started by Perry4Law’s Techno Legal Base (PTLB) to demarcate the legal liabilities of Google for engaging in many forms of search results censorships and not taking appropriate legal action after receiving a valid content removal request.

We must ascertain is Google playing stupid or is it actually stupid? Google has been ignoring in many cases the applicable laws for removal of copyright violating material and offending contents. And merely because it is an intermediary or OSP does not protect it from civil and criminal liabilities especially when it is aware of the offending contents.

Monday, 26 November 2012

Indian National Cyber Security Database

This post talks about the latest techno legal cyber security initiative by Perry4Law Techno Legal Base (PTLB). The initiative is known as National Cyber Security Database of India (NCSDI) and it is a unique techno legal cyber security initiative.


See Cyber Security Issues In India for more details.

Cyber Crimes Investigation Centre Of India

Research and development plays a major role in developing cyber security capabilities. It is also crucial to develop methods to fight against cyber crimes and cyber attacks. Private initiatives like cyber security research centre of India (CSRCI), cyber forensics research and development centre of India (CFRDCI), cyber and hi-tech crimes investigation and training centre (CHCIT) of India, cyber security research and development centre of India (CSRDCI), etc are crucial in this regard.

At Perry4Law and Perry4Law Techno Legal Base (PTLB) we are managing the exclusive techno legal cyber crime and high tech investigation and training centre of India.

See Cyber Crimes Investigation Centre Of India for more details.

Sunday, 25 November 2012

Indian Data Security Laws

As on date, we have no dedicated Data Privacy Laws In India and Data Protection Law In India. Even a dedicated Privacy Law Of India is missing. There is an urgent need to formulate Techno Legal Data Security Laws In India, Cyber Security Law In India, Privacy Rights And Laws In India, etc. While formulating such laws, we must keep in mind that Privacy Rights In India In The Information Age are different from the traditional privacy requirements.

See Cyber Security Issues In India for more.

National Cyber Security Database Of India (NCSDI)

Keeping various cyber security mandates in mind, Perry4Law’s Techno Legal Base (PTLB) has been operating the exclusive techno legal cyber security research centre of India (CSRCI) and national cyber security database of India (NCSDI) is an integral part of the same. We hope the cyber security projects and initiatives of PTLB would prove useful to all concerned. 

See Cyber Security Issues In India for more.

Cyber Security Research Centre Of India

The need for cyber security research centre of India was imminent. Thanks to the efforts of private players, Indian cyber security research centre is no more a fiction. The exclusive techno legal cyber security research centre of India has already been functioning in India for long. It is being supported by cyber crime investigation centre of India and cyber forensics research and development centre of India.

The present cyber security environment of India needs effective skills development to deal with growing cyber threats against India. There are numerous vexing cyber security issues in India that requires attention at the highest level. Further, cyber security laws in India and cyber security policy of India must also be formulated.

See Cyber Security Issues In India for more.

Cyber Security Laws In India

Cyber security, cyber forensics, etc are fields that require techno legal expertise to manage. The growing cyber security issues in India and demand for cyber forensics in India has increased the demand for techno legal skills development in India.

At Perry4Law and Perry4Law Techno Legal Base (PTLB) we have been ensuring legal enablement of ICT systems in India for long. We are also managing exclusive techno legal centre of excellence for cyber crimes investigation in India, techno legal centre of excellence for cyber forensics in India, cyber security research centre of India, etc.  In this work we are discussing the cyber security laws of India.

See Cyber Security Issues In India for more.

Cyber Security Issues And Challenges In India

Cyber Security in India is one area that has to be given top priority by Indian government. The Cyber Security reflections in India prove this point. There are many policy related issues that Indian government must urgently take care of.


A special focus upon Cyber Security for Power Energy and Utilities in India must be given. Power Grids Cyber Security in India and its Challenges has emerged as special area of concern and India is clearly not in a position to defend its power infrastructure.

See Cyber Security Issues In India for more.

Cyber Security Challenges In India

Cyber security issues in India have added a new variety of challenges for India. Till now cyber security in India and its challenges and problems are well known and India has also realised that urgent attention in this direction is needed. For instance, the cyber security challenges for the smart grids in India were realised during the recent power outrage in India.

See Cyber Security Issues In India for more.

Cyber Espionage Against India And Its Challenges, Solutions And Defences

The Cyber Security Policy of India must be urgently formulated that must incorporate provisions regarding Cyber Warfare, Cyber Terrorism, Critical Infrastructure Protection, Cyber Espionage, etc. In the ultimate analysis, enhancing Cyber Security of India is the ultimate solution.

See Cyber Security Issues In India for more.

Cyber Security In India: Its Challenges And Problems

Cyber Security in India is gaining importance day by day. However, the same is not a result of any Cyber Security Policy of India but due to the problems that India is facing. India has for long ignored Cyber Security aspect and this has caused tremendous loss to it. Now Cyber Security Problems of India have reached a stage where if immediate action is not taken, it may cause irreversible and irreparable loss to India.

See Cyber Security Issues In India for more.

Cyber Terrorism Against India And Its Defences And Solutions

Cyber terrorism in India is not a new concept. However, for long concepts like cyber warfare, cyber terrorism, etc were not taken seriously by Indian government. Naturally, cyber security in India also could not flourish. The cyber security capabilities of India also could not develop in such circumstances.

See Cyber Security Issues In India for more.

Cyber Security By Mrs.Y

Mrs. Y has recently entered the service provider world as a network security engineer, after a decade in EDU. Likes long walks in hubsites, traveling to security conferences, and spending extended hours in the Bat Cave. Sincerely believes that every problem can be solved with a "for" loop.

See Mrs. Y Posts for more.

Critical Infrastructure Protection In India Is Needed

Critical infrastructure protection (CIP) in India is an integral part of cyber security of India and the same must be a part of cyber security policy of India as well. Similarly, critical ICT infrastructure protection in India is also urgently required.

Malware like Stuxnet and Duqu have already proved that critical infrastructures like power grids, nuclear facilities, satellites, defense networks, governmental informatics infrastructures, etc are vulnerable to sophisticated cyber attacks. The truth is that cyber attacks are affecting Indian critical infrastructure.

See Cyber Security Issues In India for more.

Cyber Warfare Against India And Its Defenses

Cyber Security in India needs to be strengthened keeping in mind the growing cases of Cyber Attacks and Cyber Espionage attacks against India. Even Cyber Warfare against India is well known and is not new. Ensuring 100% cyber security is next to impossible. However, we can minimise Cyber Attacks. India has remained indifferent towards Cyber Security for long. This resulted in poor Cyber Security Capabilities and Expertise. It is only now that India has paid attention to this crucial field and it is still not too late.

See Cyber Security Issues In India for more.

Cyber Security In India

The traditional methodology of securing computers by installing anti virus, firewalls and anti malware tools are also ineffective in such a situation. Although ensuring cyber security in absolute terms is next to impossible yet with patience and adequate cyber security skills development, India can develop cyber security capabilities.

See Cyber Security Issues In India for more.

Cyber Security In India: Some Reflections

The cyber laws and cyber security trends of India 2011 by Perry4Law and Perry4Law Techno Legal Base (PTLB) has clearly showed the cyber security vulnerabilities of India. The cyber law trends of India 2012 have also projected an increased rate of cyber crimes in India and cyber attacks against India in the year 2012. These projections have now come true and India has become really vulnerable to cyber crimes and cyber attacks.

See Cyber Security Issues In India for more.

Cyber Security Issues In India

I have been following many good blogs and cyber security issues in India is one of my favourite blogs. The blog is discussing many cyber security issues pertaining to both India and abroad. Some of the topics include cyber law, cyber security, cyber forensics, cyber warfare, cyber espionage, cyber terrorism, etc. A must read blog for all cyber security enthusiastics.

Cyber Forensic Investigation Solutions in India Are Needed


Cyber forensics requires application of both technical and legal mind to a situation. If either of them is missing, the entire purpose of cyber forensics exercise would be frustrated. Cyber forensics also requires a greater degree of care and expertise as compared to electronic discovery whose purposes may be limited in nature.

IP Address Tracking Methods And Techniques For E-Mails

An Internet Protocol Address (IP Address) is the starting point for not only initiating communications across the Internet but also to trace back the same to a particular Computer System. Of course, an IP Address is not always as it seems to be and there may be instances of IP Address Spoofing where the IP Address is forged to mislead the Traceability exercise. This is also the reason why an IP Address should not be the exclusive criteria to arrest and convict an accused.

See Cyber Forensics In India for more.

Hidden Internet: The Unexplored, Hidden And Deep Web And Internet


The tussle between Anonymity and Traceability has been going on for many years. Law Enforcement Agencies are pushing for lesser Anonymity and greater Traceability whereas Civil Liberty Groups and Netizens are demanding greater Anonymity and Privacy. The battle is epic and it is not going to end soon.

IP Address Spoofing And Its Defenses

Internet Protocol Address (IP Address) plays a very significant role in our day to day lives. Whether it is Cyber Security or Cyber Forensics, IP Address has a crucial role to play. IP Address is also the Starting Point for any Cyber Crime Investigation. So it is of utmost importance that an IP Address must be correctly ascertained.

See Cyber Forensics In India for more.

IP Address Should Not Be The Sole Criteria For Arrest And Conviction


The Indian Approach to Cyber Forensics has not been very encouraging. Despite many claims and promises, Cyber Forensics in India has still not evolved properly. There are very few Law Enforcement Personnel who are aware of Cyber Law and even fewer are those who know about Cyber Forensics.

The Basics Of Internet Protocol (IP) Address System

An Internet Protocol (IP) Address is an important aspect of not only the World Wide Web (WWW)/Internet but is also required for conducting a successful Cyber Forensics Analysis. So it is important to have a basic knowledge about IP Address. In this Article I would try to cover the most significant aspects of IP Address and a detailed and technical analysis is beyond the scope of this Article.

See Cyber Forensics In India for more.

Cyber Forensics And Indian Approach

The “Poor Condition” of Cyber Forensics in India is attributable to many factors. Firstly, we have no Legal Enablement of ICT Systems in India. Concepts like E-Courts, Online Dispute Resolution (ODR), etc are still missing in India. Secondly, the ICT Policies and Strategies of India are “Defective” and they do not cater the requirements of Cyber Law, Cyber Security, Cyber Forensics, etc. Thirdly, the Parliament of India is not “Comfortable” with ICT related issues. If Parliament is itself not aware of the Techno Legal Concepts like Cyber Law, Cyber Security, Cyber Forensics, etc not much development can take place.

See Cyber Forensics In India for more.

Indian Cyber Security: Are We Secured Enough?

We must stress upon Acceptable International ICT Policies and Strategies while keeping in mind the Golden Principle that National Security and Human Rights Must Be Reconciled in India and World wide, opines Praveen Dalal managing partner of Perry4Law and CEO of PTLB.

See Cjnews India for more.

Cyber Security In India

Friday, 23 November 2012

Cyber Espionage In India

Cyber espionage is an area that has recently attracted the attentions of Indian government and corporate houses alike. Both Indian government and corporate houses are the biggest loosers from cyber espionage. Sensitive information on national security and trade secrets and commercial information has been occasionally stolen through cyber espionage in India.

India has been a victim of cyber espionage on many occasions where crackers operating in foreign jurisdictions regularly attack Indian computers and have successfully taken out sensitive information. International community is stressing upon enhancement of their cyber security capabilities unlike India.

As a result of this apathy, India is facing serious cyber threats. With the growing cyber threats against India like cyber terrorism, cyber warfare, cyber espionage, etc, it is very much required to have good national cyber security policy of India.

Homeland Security of India must be strengthened and in order to do so we must take care of issues like Cyber Law, Cyber Security, Cyber Espionage, Cyber Forensics, Cyber Terrorism, Cyber Warfare, etc, informs Praveen Dalal, managing partner of New Delhi based law firm Perry4Law and CEO of the exclusive techno legal cyber security research and development centre of India and PTLB.

Cyber espionage is not only committed for commercial benefits but it may also be motivated by patriotic feelings resulting in cyber assaults on businesses and other governmental computer systems.

Cyber Espionage may be committed by an insider or an outsider with the help of Internet and computer. The problem is that Cyber Espionage is inexpensive and relatively easy to commit and it is also difficult to prove with absolute certainty, says Dalal. Having an effective Cyber Security Mechanism at place can help in prevention of majority of Cyber Espionage issues, but there is no full proof method of preventing Cyber Espionage, claims Dalal. With adequate resources and time, a Cracker can penetrate and exploit the intended target, says Dalal.

Cyber Security in India has not received much attention of Indian government and there is not even a Cyber Security Policy of India. In fact India is vulnerable to cyber espionage, cyber crimes, cyber terrorism and many similar cyber threats. India is not serious at all regarding digital issues and others are taking advantage of this political will vacuum.

Source: Cjnews India

Wednesday, 21 November 2012

Google Is Violating Copyright Laws Of US And India

The posts titled Google is openly violating dmca compliance,  Google is playing stupid and is winning too and “Is Google Playing Stupid Or Is It Actually Stupid?” have proved that Google is not following the provisions of DMCA law of US in true law and spirit.

On the contrary, Google is deliberately deleting and manipulating the original and copyrighted articles instead of the infringing material. The situation has become so worst that an exclusive resource titled Websites, Blogs And News Censorship By Google And India has been provided by Perry4Law and Perry4Law’s Techno Legal Base (PTLB). See the resource for complete details of censorship activities of Google and Indian government.

Monday, 19 November 2012

Cyber Crimes Against Indian Women And Their Techno Legal Solutions


Cyber Crimes against Women in India is at rise. However, in the absence of Cyber Law Awareness in India very few women are aware as to where to file a Compliant or how to pursue a Cyber Crime Case in India.

Sunday, 18 November 2012

E-Delivery Of Public Services Development Policy Loan Of India

The Government and Indian Bureaucrats need to change their mindset and stress more upon “Outcomes and Services” rather than mere ICT procurement. India needs a “Services-Based Approach” that is not only Transparent, Accountable and Legal but also backed by a more efficient and willing Government. Presently the Bureaucrats and Government of India are in a “Resistance Mode” towards novel and effective E-Governance Policies and Strategies and they are merely “Computerising” traditional official functions only. This is benefiting neither the Government nor the citizens and is resulting in wastage of thousands of crores of public money and loans amount of United Nations Development Programme (UNDP) and World Bank.

Some have even alleged that E-Delivery of Public Services in India is missing and World Bank is not at all interested in establishing Transparency and Accountability in Indian NEGP. World Bank must ensure accountability of Indian NEGP in order to show that its Loans are actually meant for growth and development of Indian masses rather than benefiting few Politicians and Bureaucrats as is happening right now.

Source: ICTPS Blog

E-Delivery Of Services In India Missing

Electronic delivery of services in India (e-delivery of services in India) is in really bad shape thanks to the myopic attitude of our Indian government and its committees. As on date we have no mandatory framework for e-governance services in India.

This is a clear case of denial of digital empowerment of Indian citizens by the Indian government. The information technology act 2000 (IT Act 2000), which is the sole cyber law of India, carries few provisions pertaining to e-governance in India. However, the IT Act 2000 expressly put an embargo upon mandatory e-governance services in India.

It is really surprising that after more than 12 years of enactment of IT Act, 2000 the parliamentary standing committee on information and technology still believes that states would not be able to meet the e-governance needs of India. If a country cannot put in place e-governance services for 12 years and is still insisting upon more years, it puts a question mark upon the capabilities of that nation.

No doubt India is really poor at e-readiness and e-governance in India is dying. Indian government is presently facing a “technology bankruptcy” and “ICT emergency” vis-à-vis cyber crimes, cyber attacks, cyber security and other related issues.

There is nothing wrong in enacting a good law in this regard but there is everything wrong when we make excuses for not enactment of such law at all. We need time bound enactment exercises and by allowing unlimited time to enact such laws, we are doing no good to India. It is high time for us to ensure e-delivery of services in India.

Source: PTLB Blog

Electronic Service Delivery Policy Of India

Like in the past, once again the World Bank has given a huge loan to Indian government to ensure a Policy for Electronic Delivery of Services in India. However, this loan itself is based upon a “Wrong Premise” that restricts the obligations to formulate “Policy Alone” in this crucial field. The loan should have been tied up with a Sound and Effective Electronic Delivery of Services Legal Framework in India.

To justify usage of this loan amount, a bill for Electronic Services Delivery in India has been proposed. However, the proposed Draft Electronic Services Delivery Bill 2011 “failed” to provide Mandatory E-Governance Services in India. In fact, the proposed EDS Bill 2011 has been criticised by many in India.

Source: ICTPS Blog

Guidelines For PDF For World Bank Assisted Indian E- Delivery of Public Services DPL Project

The Government of India received a loan from World Bank towards programme management and financial support for National e-Governance Plan (NeGP), for an amount of US$ 150 million (about Rs 700 crore) during 2011-12. The loan is referred to as “India: e-Delivery of Public Services Development Policy Loan” and is envisaged to support NeGP’s countrywide plans of increasing online services for citizens in their locality, to improve the quality of basic governance in areas of concern to the common man.

With a view to facilitate preparation of project proposals, DeitY has, vide its Office Memorandum no. 2(1)/05-EGD(Vol-IV)(Pt IV)(14147) dated 31st Oct 2012 circulated detailed Implementation Guidelines. These Guidelines, inter-alia, provide for a “Project Development Fund (PDF)” under which proposals seeking funding assistance for formulation and development of new projects have been sought.

The present Guidelines have been formulated to facilitate Ministries/Departments and States/UTs in formulation and submission of proposals for accessing funding assistance under the above referred PDF facility.

To provide assistance for project formulation and project development to Ministries/Departments of Government of India and the States/UTs and to ensure expediting electronic delivery of services, a corpus fund titled ‘Project Development Fund (PDF)” for World Bank assisted “India: e-Delivery of Public Services DPL Project”, with an initial contribution of Rs. 20 crore is being set up. This amount would be available from Department of Electronics & Information Technology (DeitY’s) budgetary allocation available for 2012-2013 under externally-aided project and would be administered by the National e-Governance Division (NeGD) under DeitY.

Project Development Fund aims to provide financial assistance to the Centre/State/UTs for formulation and conceptualization of New & Innovative Initiatives.

E-Delivery Of Public Services in India

E-delivery of services is closely related to successful use of e-governance. E-governance in India is in bad shape and is generally unsuccessful. In fact, techno legal experts have even claimed that e-governance in India dying.

According to Praveen Dalal, managing partner of New Delhi base law firm Perry4Law and leading techno legal expert of India, E-Delivery of Services in India cannot succeed till we have “Mandatory E-governance Services in India”. Presently, providing of E-Delivery of Services in India is discretionary and this is resulting in “Poor Growth” of E-Governance in India, says Dalal. Even the proposed Essential Services Delivery Bill 2011 of India is “Not Conducive” for E-Delivery of Services in India, informs Dalal.

Source: Cjnews India