Tax Management India. Com
Law and Practice  :  Digital eBook
Research is most exciting & rewarding


  TMI - Tax Management India. Com
Follow us:
  Facebook   Twitter   Linkedin   Telegram

TMI Blog

Home

Information Security Guidelines

X X   X X   Extracts   X X   X X

→ Full Text of the Document

X X   X X   Extracts   X X   X X

..... ashing of unaccounted money abroad. The information and/or evidence of such tax avoidance/evasion and the underlying criminal activity is often located outside the territorial jurisdiction and is obtained only through bilateral and multilateral co-operation amongst countries/jurisdictions. 2. The Government of India has played an important role on international forums in developing international consensus for such cooperation as per globally accepted norms. The Government of a country/jurisdiction will, however, agree to exchange information with another country only if the information exchanged is kept confidential, used only for the specified purposes and disclosed only to authorized person(s) in accordance with the agreement on the .....

X X   X X   Extracts   X X   X X

→ Full Text of the Document

X X   X X   Extracts   X X   X X

..... Conducting security reviews ensuring that action is taken to plug any identified/potential gaps. ( d ) Providing monthly reports to the CISO on the status of information security policy, violations and information security incidents. 5. If an unauthorized disclosure takes place, the LISC should undertake an investigation and prepare a complete report, fixing responsibility and recommending actions to be taken against the person(s) concerned for the breach. The report should also suggest measures to be taken to avoid similar incidents in the future. Action for breach of confidentiality including under the conduct rules and initiation of proceedings under section 2 .....

X X   X X   Extracts   X X   X X

→ Full Text of the Document

X X   X X   Extracts   X X   X X

..... mation security guidelines consist of following sections: ( a ) Background- Provides an overview and the coverage of each domain and states the important evolutions and developments in each area. ( b ) Relevance of domain to information security-Establishes role and scope of a domain in context of Information Security. ( c ) Management guidelines- Provides domain specific recommendations in the form of guidelines and objectives. These are denoted by the nomenclature XX.G followed by the guideline number, where XX is the code for domain. For example, PH.G1, PH.G2, G3 ... .....

X X   X X   Extracts   X X   X X

→ Full Text of the Document

X X   X X   Extracts   X X   X X

..... Description A Buildings having offices of Investigation Directorate, Central Charges, I CI, FT TR, Systems Directorate B Buildings having offices of Range Heads (other than covered under category A) C Remaining buildings 11. The due dates for taking action are as under: S. No. Action to be taken Action by Due Date 1 Setting up of Local Information Security Committee (LISC) headed by a Pr. CIT level officer All Pr.CCIT 31st July 2015 2 .....

X X   X X   Extracts   X X   X X

→ Full Text of the Document

X X   X X   Extracts   X X   X X

 

 

 

 

Quick Updates:Latest Updates