Deprecated (16384): The ArrayAccess methods will be removed in 4.0.0.Use getParam(), getData() and getQuery() instead. - /home/brlfuser/public_html/src/Controller/ArtileDetailController.php, line: 73 You can disable deprecation warnings by setting `Error.errorLevel` to `E_ALL & ~E_USER_DEPRECATED` in your config/app.php. [CORE/src/Core/functions.php, line 311]Code Context
trigger_error($message, E_USER_DEPRECATED);
}
$message = 'The ArrayAccess methods will be removed in 4.0.0.Use getParam(), getData() and getQuery() instead. - /home/brlfuser/public_html/src/Controller/ArtileDetailController.php, line: 73 You can disable deprecation warnings by setting `Error.errorLevel` to `E_ALL & ~E_USER_DEPRECATED` in your config/app.php.' $stackFrame = (int) 1 $trace = [ (int) 0 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/ServerRequest.php', 'line' => (int) 2421, 'function' => 'deprecationWarning', 'args' => [ (int) 0 => 'The ArrayAccess methods will be removed in 4.0.0.Use getParam(), getData() and getQuery() instead.' ] ], (int) 1 => [ 'file' => '/home/brlfuser/public_html/src/Controller/ArtileDetailController.php', 'line' => (int) 73, 'function' => 'offsetGet', 'class' => 'Cake\Http\ServerRequest', 'object' => object(Cake\Http\ServerRequest) {}, 'type' => '->', 'args' => [ (int) 0 => 'catslug' ] ], (int) 2 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Controller/Controller.php', 'line' => (int) 610, 'function' => 'printArticle', 'class' => 'App\Controller\ArtileDetailController', 'object' => object(App\Controller\ArtileDetailController) {}, 'type' => '->', 'args' => [] ], (int) 3 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/ActionDispatcher.php', 'line' => (int) 120, 'function' => 'invokeAction', 'class' => 'Cake\Controller\Controller', 'object' => object(App\Controller\ArtileDetailController) {}, 'type' => '->', 'args' => [] ], (int) 4 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/ActionDispatcher.php', 'line' => (int) 94, 'function' => '_invoke', 'class' => 'Cake\Http\ActionDispatcher', 'object' => object(Cake\Http\ActionDispatcher) {}, 'type' => '->', 'args' => [ (int) 0 => object(App\Controller\ArtileDetailController) {} ] ], (int) 5 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/BaseApplication.php', 'line' => (int) 235, 'function' => 'dispatch', 'class' => 'Cake\Http\ActionDispatcher', 'object' => object(Cake\Http\ActionDispatcher) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {} ] ], (int) 6 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Runner.php', 'line' => (int) 65, 'function' => '__invoke', 'class' => 'Cake\Http\BaseApplication', 'object' => object(App\Application) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {}, (int) 2 => object(Cake\Http\Runner) {} ] ], (int) 7 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Routing/Middleware/RoutingMiddleware.php', 'line' => (int) 162, 'function' => '__invoke', 'class' => 'Cake\Http\Runner', 'object' => object(Cake\Http\Runner) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {} ] ], (int) 8 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Runner.php', 'line' => (int) 65, 'function' => '__invoke', 'class' => 'Cake\Routing\Middleware\RoutingMiddleware', 'object' => object(Cake\Routing\Middleware\RoutingMiddleware) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {}, (int) 2 => object(Cake\Http\Runner) {} ] ], (int) 9 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Routing/Middleware/AssetMiddleware.php', 'line' => (int) 88, 'function' => '__invoke', 'class' => 'Cake\Http\Runner', 'object' => object(Cake\Http\Runner) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {} ] ], (int) 10 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Runner.php', 'line' => (int) 65, 'function' => '__invoke', 'class' => 'Cake\Routing\Middleware\AssetMiddleware', 'object' => object(Cake\Routing\Middleware\AssetMiddleware) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {}, (int) 2 => object(Cake\Http\Runner) {} ] ], (int) 11 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Error/Middleware/ErrorHandlerMiddleware.php', 'line' => (int) 96, 'function' => '__invoke', 'class' => 'Cake\Http\Runner', 'object' => object(Cake\Http\Runner) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {} ] ], (int) 12 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Runner.php', 'line' => (int) 65, 'function' => '__invoke', 'class' => 'Cake\Error\Middleware\ErrorHandlerMiddleware', 'object' => object(Cake\Error\Middleware\ErrorHandlerMiddleware) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {}, (int) 2 => object(Cake\Http\Runner) {} ] ], (int) 13 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Runner.php', 'line' => (int) 51, 'function' => '__invoke', 'class' => 'Cake\Http\Runner', 'object' => object(Cake\Http\Runner) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {} ] ], (int) 14 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Server.php', 'line' => (int) 98, 'function' => 'run', 'class' => 'Cake\Http\Runner', 'object' => object(Cake\Http\Runner) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\MiddlewareQueue) {}, (int) 1 => object(Cake\Http\ServerRequest) {}, (int) 2 => object(Cake\Http\Response) {} ] ], (int) 15 => [ 'file' => '/home/brlfuser/public_html/webroot/index.php', 'line' => (int) 39, 'function' => 'run', 'class' => 'Cake\Http\Server', 'object' => object(Cake\Http\Server) {}, 'type' => '->', 'args' => [] ] ] $frame = [ 'file' => '/home/brlfuser/public_html/src/Controller/ArtileDetailController.php', 'line' => (int) 73, 'function' => 'offsetGet', 'class' => 'Cake\Http\ServerRequest', 'object' => object(Cake\Http\ServerRequest) { trustProxy => false [protected] params => [ [maximum depth reached] ] [protected] data => [[maximum depth reached]] [protected] query => [[maximum depth reached]] [protected] cookies => [ [maximum depth reached] ] [protected] _environment => [ [maximum depth reached] ] [protected] url => 'latest-news-updates/cyber-insecurity-is-the-new-normal-preeti-singh-21820/print' [protected] base => '' [protected] webroot => '/' [protected] here => '/latest-news-updates/cyber-insecurity-is-the-new-normal-preeti-singh-21820/print' [protected] trustedProxies => [[maximum depth reached]] [protected] _input => null [protected] _detectors => [ [maximum depth reached] ] [protected] _detectorCache => [ [maximum depth reached] ] [protected] stream => object(Zend\Diactoros\PhpInputStream) {} [protected] uri => object(Zend\Diactoros\Uri) {} [protected] session => object(Cake\Http\Session) {} [protected] attributes => [[maximum depth reached]] [protected] emulatedAttributes => [ [maximum depth reached] ] [protected] uploadedFiles => [[maximum depth reached]] [protected] protocol => null [protected] requestTarget => null [private] deprecatedProperties => [ [maximum depth reached] ] }, 'type' => '->', 'args' => [ (int) 0 => 'catslug' ] ]deprecationWarning - CORE/src/Core/functions.php, line 311 Cake\Http\ServerRequest::offsetGet() - CORE/src/Http/ServerRequest.php, line 2421 App\Controller\ArtileDetailController::printArticle() - APP/Controller/ArtileDetailController.php, line 73 Cake\Controller\Controller::invokeAction() - CORE/src/Controller/Controller.php, line 610 Cake\Http\ActionDispatcher::_invoke() - CORE/src/Http/ActionDispatcher.php, line 120 Cake\Http\ActionDispatcher::dispatch() - CORE/src/Http/ActionDispatcher.php, line 94 Cake\Http\BaseApplication::__invoke() - CORE/src/Http/BaseApplication.php, line 235 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\RoutingMiddleware::__invoke() - CORE/src/Routing/Middleware/RoutingMiddleware.php, line 162 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\AssetMiddleware::__invoke() - CORE/src/Routing/Middleware/AssetMiddleware.php, line 88 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Error\Middleware\ErrorHandlerMiddleware::__invoke() - CORE/src/Error/Middleware/ErrorHandlerMiddleware.php, line 96 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Http\Runner::run() - CORE/src/Http/Runner.php, line 51 Cake\Http\Server::run() - CORE/src/Http/Server.php, line 98
Deprecated (16384): The ArrayAccess methods will be removed in 4.0.0.Use getParam(), getData() and getQuery() instead. - /home/brlfuser/public_html/src/Controller/ArtileDetailController.php, line: 74 You can disable deprecation warnings by setting `Error.errorLevel` to `E_ALL & ~E_USER_DEPRECATED` in your config/app.php. [CORE/src/Core/functions.php, line 311]Code Context
trigger_error($message, E_USER_DEPRECATED);
}
$message = 'The ArrayAccess methods will be removed in 4.0.0.Use getParam(), getData() and getQuery() instead. - /home/brlfuser/public_html/src/Controller/ArtileDetailController.php, line: 74 You can disable deprecation warnings by setting `Error.errorLevel` to `E_ALL & ~E_USER_DEPRECATED` in your config/app.php.' $stackFrame = (int) 1 $trace = [ (int) 0 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/ServerRequest.php', 'line' => (int) 2421, 'function' => 'deprecationWarning', 'args' => [ (int) 0 => 'The ArrayAccess methods will be removed in 4.0.0.Use getParam(), getData() and getQuery() instead.' ] ], (int) 1 => [ 'file' => '/home/brlfuser/public_html/src/Controller/ArtileDetailController.php', 'line' => (int) 74, 'function' => 'offsetGet', 'class' => 'Cake\Http\ServerRequest', 'object' => object(Cake\Http\ServerRequest) {}, 'type' => '->', 'args' => [ (int) 0 => 'artileslug' ] ], (int) 2 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Controller/Controller.php', 'line' => (int) 610, 'function' => 'printArticle', 'class' => 'App\Controller\ArtileDetailController', 'object' => object(App\Controller\ArtileDetailController) {}, 'type' => '->', 'args' => [] ], (int) 3 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/ActionDispatcher.php', 'line' => (int) 120, 'function' => 'invokeAction', 'class' => 'Cake\Controller\Controller', 'object' => object(App\Controller\ArtileDetailController) {}, 'type' => '->', 'args' => [] ], (int) 4 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/ActionDispatcher.php', 'line' => (int) 94, 'function' => '_invoke', 'class' => 'Cake\Http\ActionDispatcher', 'object' => object(Cake\Http\ActionDispatcher) {}, 'type' => '->', 'args' => [ (int) 0 => object(App\Controller\ArtileDetailController) {} ] ], (int) 5 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/BaseApplication.php', 'line' => (int) 235, 'function' => 'dispatch', 'class' => 'Cake\Http\ActionDispatcher', 'object' => object(Cake\Http\ActionDispatcher) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {} ] ], (int) 6 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Runner.php', 'line' => (int) 65, 'function' => '__invoke', 'class' => 'Cake\Http\BaseApplication', 'object' => object(App\Application) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {}, (int) 2 => object(Cake\Http\Runner) {} ] ], (int) 7 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Routing/Middleware/RoutingMiddleware.php', 'line' => (int) 162, 'function' => '__invoke', 'class' => 'Cake\Http\Runner', 'object' => object(Cake\Http\Runner) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {} ] ], (int) 8 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Runner.php', 'line' => (int) 65, 'function' => '__invoke', 'class' => 'Cake\Routing\Middleware\RoutingMiddleware', 'object' => object(Cake\Routing\Middleware\RoutingMiddleware) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {}, (int) 2 => object(Cake\Http\Runner) {} ] ], (int) 9 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Routing/Middleware/AssetMiddleware.php', 'line' => (int) 88, 'function' => '__invoke', 'class' => 'Cake\Http\Runner', 'object' => object(Cake\Http\Runner) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {} ] ], (int) 10 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Runner.php', 'line' => (int) 65, 'function' => '__invoke', 'class' => 'Cake\Routing\Middleware\AssetMiddleware', 'object' => object(Cake\Routing\Middleware\AssetMiddleware) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {}, (int) 2 => object(Cake\Http\Runner) {} ] ], (int) 11 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Error/Middleware/ErrorHandlerMiddleware.php', 'line' => (int) 96, 'function' => '__invoke', 'class' => 'Cake\Http\Runner', 'object' => object(Cake\Http\Runner) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {} ] ], (int) 12 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Runner.php', 'line' => (int) 65, 'function' => '__invoke', 'class' => 'Cake\Error\Middleware\ErrorHandlerMiddleware', 'object' => object(Cake\Error\Middleware\ErrorHandlerMiddleware) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {}, (int) 2 => object(Cake\Http\Runner) {} ] ], (int) 13 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Runner.php', 'line' => (int) 51, 'function' => '__invoke', 'class' => 'Cake\Http\Runner', 'object' => object(Cake\Http\Runner) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {} ] ], (int) 14 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Server.php', 'line' => (int) 98, 'function' => 'run', 'class' => 'Cake\Http\Runner', 'object' => object(Cake\Http\Runner) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\MiddlewareQueue) {}, (int) 1 => object(Cake\Http\ServerRequest) {}, (int) 2 => object(Cake\Http\Response) {} ] ], (int) 15 => [ 'file' => '/home/brlfuser/public_html/webroot/index.php', 'line' => (int) 39, 'function' => 'run', 'class' => 'Cake\Http\Server', 'object' => object(Cake\Http\Server) {}, 'type' => '->', 'args' => [] ] ] $frame = [ 'file' => '/home/brlfuser/public_html/src/Controller/ArtileDetailController.php', 'line' => (int) 74, 'function' => 'offsetGet', 'class' => 'Cake\Http\ServerRequest', 'object' => object(Cake\Http\ServerRequest) { trustProxy => false [protected] params => [ [maximum depth reached] ] [protected] data => [[maximum depth reached]] [protected] query => [[maximum depth reached]] [protected] cookies => [ [maximum depth reached] ] [protected] _environment => [ [maximum depth reached] ] [protected] url => 'latest-news-updates/cyber-insecurity-is-the-new-normal-preeti-singh-21820/print' [protected] base => '' [protected] webroot => '/' [protected] here => '/latest-news-updates/cyber-insecurity-is-the-new-normal-preeti-singh-21820/print' [protected] trustedProxies => [[maximum depth reached]] [protected] _input => null [protected] _detectors => [ [maximum depth reached] ] [protected] _detectorCache => [ [maximum depth reached] ] [protected] stream => object(Zend\Diactoros\PhpInputStream) {} [protected] uri => object(Zend\Diactoros\Uri) {} [protected] session => object(Cake\Http\Session) {} [protected] attributes => [[maximum depth reached]] [protected] emulatedAttributes => [ [maximum depth reached] ] [protected] uploadedFiles => [[maximum depth reached]] [protected] protocol => null [protected] requestTarget => null [private] deprecatedProperties => [ [maximum depth reached] ] }, 'type' => '->', 'args' => [ (int) 0 => 'artileslug' ] ]deprecationWarning - CORE/src/Core/functions.php, line 311 Cake\Http\ServerRequest::offsetGet() - CORE/src/Http/ServerRequest.php, line 2421 App\Controller\ArtileDetailController::printArticle() - APP/Controller/ArtileDetailController.php, line 74 Cake\Controller\Controller::invokeAction() - CORE/src/Controller/Controller.php, line 610 Cake\Http\ActionDispatcher::_invoke() - CORE/src/Http/ActionDispatcher.php, line 120 Cake\Http\ActionDispatcher::dispatch() - CORE/src/Http/ActionDispatcher.php, line 94 Cake\Http\BaseApplication::__invoke() - CORE/src/Http/BaseApplication.php, line 235 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\RoutingMiddleware::__invoke() - CORE/src/Routing/Middleware/RoutingMiddleware.php, line 162 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\AssetMiddleware::__invoke() - CORE/src/Routing/Middleware/AssetMiddleware.php, line 88 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Error\Middleware\ErrorHandlerMiddleware::__invoke() - CORE/src/Error/Middleware/ErrorHandlerMiddleware.php, line 96 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Http\Runner::run() - CORE/src/Http/Runner.php, line 51 Cake\Http\Server::run() - CORE/src/Http/Server.php, line 98
Warning (512): Unable to emit headers. Headers sent in file=/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Error/Debugger.php line=853 [CORE/src/Http/ResponseEmitter.php, line 48]Code Contextif (Configure::read('debug')) {
trigger_error($message, E_USER_WARNING);
} else {
$response = object(Cake\Http\Response) { 'status' => (int) 200, 'contentType' => 'text/html', 'headers' => [ 'Content-Type' => [ [maximum depth reached] ] ], 'file' => null, 'fileRange' => [], 'cookies' => object(Cake\Http\Cookie\CookieCollection) {}, 'cacheDirectives' => [], 'body' => '<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <link rel="canonical" href="https://im4change.in/<pre class="cake-error"><a href="javascript:void(0);" onclick="document.getElementById('cakeErr67f060c1c57c7-trace').style.display = (document.getElementById('cakeErr67f060c1c57c7-trace').style.display == 'none' ? '' : 'none');"><b>Notice</b> (8)</a>: Undefined variable: urlPrefix [<b>APP/Template/Layout/printlayout.ctp</b>, line <b>8</b>]<div id="cakeErr67f060c1c57c7-trace" class="cake-stack-trace" style="display: none;"><a href="javascript:void(0);" onclick="document.getElementById('cakeErr67f060c1c57c7-code').style.display = (document.getElementById('cakeErr67f060c1c57c7-code').style.display == 'none' ? '' : 'none')">Code</a> <a href="javascript:void(0);" onclick="document.getElementById('cakeErr67f060c1c57c7-context').style.display = (document.getElementById('cakeErr67f060c1c57c7-context').style.display == 'none' ? '' : 'none')">Context</a><pre id="cakeErr67f060c1c57c7-code" class="cake-code-dump" style="display: none;"><code><span style="color: #000000"><span style="color: #0000BB"></span><span style="color: #007700"><</span><span style="color: #0000BB">head</span><span style="color: #007700">> </span></span></code> <span class="code-highlight"><code><span style="color: #000000"> <link rel="canonical" href="<span style="color: #0000BB"><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">Configure</span><span style="color: #007700">::</span><span style="color: #0000BB">read</span><span style="color: #007700">(</span><span style="color: #DD0000">'SITE_URL'</span><span style="color: #007700">); </span><span style="color: #0000BB">?><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$urlPrefix</span><span style="color: #007700">;</span><span style="color: #0000BB">?><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$article_current</span><span style="color: #007700">-></span><span style="color: #0000BB">category</span><span style="color: #007700">-></span><span style="color: #0000BB">slug</span><span style="color: #007700">; </span><span style="color: #0000BB">?></span>/<span style="color: #0000BB"><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$article_current</span><span style="color: #007700">-></span><span style="color: #0000BB">seo_url</span><span style="color: #007700">; </span><span style="color: #0000BB">?></span>.html"/> </span></code></span> <code><span style="color: #000000"><span style="color: #0000BB"> </span><span style="color: #007700"><</span><span style="color: #0000BB">meta http</span><span style="color: #007700">-</span><span style="color: #0000BB">equiv</span><span style="color: #007700">=</span><span style="color: #DD0000">"Content-Type" </span><span style="color: #0000BB">content</span><span style="color: #007700">=</span><span style="color: #DD0000">"text/html; charset=utf-8"</span><span style="color: #007700">/> </span></span></code></pre><pre id="cakeErr67f060c1c57c7-context" class="cake-context" style="display: none;">$viewFile = '/home/brlfuser/public_html/src/Template/Layout/printlayout.ctp' $dataForView = [ 'article_current' => object(App\Model\Entity\Article) { 'id' => (int) 21673, 'title' => 'Cyber insecurity is the new normal -Preeti Singh', 'subheading' => '', 'description' => '<div align="justify"> -The Hindustan Times </div> <p align="justify"> <br /> A couple of months ago, I was in South Block for a meeting at the ministry of defence. Security norms dictate leaving mobile and electronic devices at the checkpoint. Imagine my horror when I came back an hour later to see one of the guards going through my iPad. This cavalier attitude towards individual privacy is illustrative of an interesting dilemma between the inevitability of a more intrusive State and its obligation to protect the privacy of its citizens. </p> <p align="justify"> India has unveiled a new National Cyber Security Policy to deal with growing cyber threats. It will be interesting to see the efficacy with which these intentions are translated into preparing the country for a new global normal. In this inextricably connected world, technology - like humans - has its limits and is not failsafe. It is also equally true that the tech-empowered State is the only way forward, where new technologies like cloud computing, big data analytics and increased mobility will play the defining role in delivering welfare to the marginalised millions. All of them have one thing in common: they rely on the interaction among large public datasets that include everything from your bank information to biometrics. </p> <p align="justify"> This means that cyber threats don't just threaten our privacy or a State's; they threaten to disable the very architecture that seeks to deliver welfare. Also, the battle is no longer limited to a bunch of ingenious hackers against unsuspecting individuals, but is heading into a full-blown war with sustained and targeted attacks against nation states, where the right to privacy is collateral damage. </p> <p align="justify"> WikiLeaks, Edward Snowden and PRISM may have captured our imagination of late, but issues of surveillance and data privacy have been slow to take root in India. The country's efforts to build the world's largest biometric database under the Unique Identification (UID) project - and the fear mongering that has followed such intrusive data collection - makes it all the more crucial that the less-talked-about components in the new policy, like the creation of security awareness and stronger legal frameworks, are put in place at the earliest. India urgently needs a well-thought-out cyber security law to protect against the misuse of individual freedoms. </p> <p align="justify"> We also need to be prepared for that inevitable breach, where the role of regulatory mechanisms and legal checks and balances will become crucial. One of India's biggest problems is the lack of a stringently-imposed legal deterrence, which invites opportunists to break the law with impunity. This becomes all the more important while protecting the nation's critical data and information systems, as well as preserving the trust of over a billion citizens willing to surrender personal information at every turn. </p> <p align="justify"> But the government has signalled its willingness to at least open the doors to greater collaboration and proven wisdom, in securing these limits, and the constant allusion to public-private partnerships in the new policy is refreshing, as is the preference for open standards. A corollary to this is that though the policy displays a preference for indigenisation, it does not harp on it. </p> <p align="justify"> Unfortunately, the price we must pay for having the world at our fingertips is knowing that someone from that world will always be tempted to sneak a peek. Being part of the global commons makes cyberspace a particularly challenging environment to draw boundaries in, and some might criticise the government for not adequately addressing these concerns. Well, here's one thing we should be clear about: other countries have absolutely no obligation to respect Indian citizens' right to privacy, especially when it comes to 'national security' concerns. But the Indian government does. Let's also bear in mind that the limits of this obligation will always be hazy, whether we like it or not. </p> <p align="justify"> In the end, no policy can guard us against the abuse of discretion. That is the new normal. Next time, I'll remember to password-lock my iPad. </p> <p align="justify"> <em>Preeti Singh is editor, iGovernment.in at 9.9 Media </em> </p>', 'credit_writer' => 'The Hindustan Times, 5 July, 2013, http://www.hindustantimes.com/News-Feed/Columns/Cyber-insecurity-is-the-new-normal/Article1-1087834.aspx', 'article_img' => '', 'article_img_thumb' => '', 'status' => (int) 1, 'show_on_home' => (int) 1, 'lang' => 'EN', 'category_id' => (int) 16, 'tag_keyword' => '', 'seo_url' => 'cyber-insecurity-is-the-new-normal-preeti-singh-21820', 'meta_title' => null, 'meta_keywords' => null, 'meta_description' => null, 'noindex' => (int) 0, 'publish_date' => object(Cake\I18n\FrozenDate) {}, 'most_visit_section_id' => null, 'article_big_img' => null, 'liveid' => (int) 21820, 'created' => object(Cake\I18n\FrozenTime) {}, 'modified' => object(Cake\I18n\FrozenTime) {}, 'edate' => '', 'tags' => [ [maximum depth reached] ], 'category' => object(App\Model\Entity\Category) {}, '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[hasErrors]' => false, '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'Articles' }, 'articleid' => (int) 21673, 'metaTitle' => 'LATEST NEWS UPDATES | Cyber insecurity is the new normal -Preeti Singh', 'metaKeywords' => 'E-Governance,internet,ICTs,Privacy', 'metaDesc' => ' -The Hindustan Times A couple of months ago, I was in South Block for a meeting at the ministry of defence. Security norms dictate leaving mobile and electronic devices at the checkpoint. Imagine my horror when I came back an hour...', 'disp' => '<div align="justify">-The Hindustan Times</div><p align="justify"><br />A couple of months ago, I was in South Block for a meeting at the ministry of defence. Security norms dictate leaving mobile and electronic devices at the checkpoint. Imagine my horror when I came back an hour later to see one of the guards going through my iPad. This cavalier attitude towards individual privacy is illustrative of an interesting dilemma between the inevitability of a more intrusive State and its obligation to protect the privacy of its citizens.</p><p align="justify">India has unveiled a new National Cyber Security Policy to deal with growing cyber threats. It will be interesting to see the efficacy with which these intentions are translated into preparing the country for a new global normal. In this inextricably connected world, technology - like humans - has its limits and is not failsafe. It is also equally true that the tech-empowered State is the only way forward, where new technologies like cloud computing, big data analytics and increased mobility will play the defining role in delivering welfare to the marginalised millions. All of them have one thing in common: they rely on the interaction among large public datasets that include everything from your bank information to biometrics.</p><p align="justify">This means that cyber threats don't just threaten our privacy or a State's; they threaten to disable the very architecture that seeks to deliver welfare. Also, the battle is no longer limited to a bunch of ingenious hackers against unsuspecting individuals, but is heading into a full-blown war with sustained and targeted attacks against nation states, where the right to privacy is collateral damage.</p><p align="justify">WikiLeaks, Edward Snowden and PRISM may have captured our imagination of late, but issues of surveillance and data privacy have been slow to take root in India. The country's efforts to build the world's largest biometric database under the Unique Identification (UID) project - and the fear mongering that has followed such intrusive data collection - makes it all the more crucial that the less-talked-about components in the new policy, like the creation of security awareness and stronger legal frameworks, are put in place at the earliest. India urgently needs a well-thought-out cyber security law to protect against the misuse of individual freedoms.</p><p align="justify">We also need to be prepared for that inevitable breach, where the role of regulatory mechanisms and legal checks and balances will become crucial. One of India's biggest problems is the lack of a stringently-imposed legal deterrence, which invites opportunists to break the law with impunity. This becomes all the more important while protecting the nation's critical data and information systems, as well as preserving the trust of over a billion citizens willing to surrender personal information at every turn.</p><p align="justify">But the government has signalled its willingness to at least open the doors to greater collaboration and proven wisdom, in securing these limits, and the constant allusion to public-private partnerships in the new policy is refreshing, as is the preference for open standards. A corollary to this is that though the policy displays a preference for indigenisation, it does not harp on it.</p><p align="justify">Unfortunately, the price we must pay for having the world at our fingertips is knowing that someone from that world will always be tempted to sneak a peek. Being part of the global commons makes cyberspace a particularly challenging environment to draw boundaries in, and some might criticise the government for not adequately addressing these concerns. Well, here's one thing we should be clear about: other countries have absolutely no obligation to respect Indian citizens' right to privacy, especially when it comes to 'national security' concerns. But the Indian government does. Let's also bear in mind that the limits of this obligation will always be hazy, whether we like it or not.</p><p align="justify">In the end, no policy can guard us against the abuse of discretion. That is the new normal. Next time, I'll remember to password-lock my iPad.</p><p align="justify"><em>Preeti Singh is editor, iGovernment.in at 9.9 Media </em></p>', 'lang' => 'English', 'SITE_URL' => 'https://im4change.in/', 'site_title' => 'im4change', 'adminprix' => 'admin' ] $article_current = object(App\Model\Entity\Article) { 'id' => (int) 21673, 'title' => 'Cyber insecurity is the new normal -Preeti Singh', 'subheading' => '', 'description' => '<div align="justify"> -The Hindustan Times </div> <p align="justify"> <br /> A couple of months ago, I was in South Block for a meeting at the ministry of defence. Security norms dictate leaving mobile and electronic devices at the checkpoint. Imagine my horror when I came back an hour later to see one of the guards going through my iPad. This cavalier attitude towards individual privacy is illustrative of an interesting dilemma between the inevitability of a more intrusive State and its obligation to protect the privacy of its citizens. </p> <p align="justify"> India has unveiled a new National Cyber Security Policy to deal with growing cyber threats. It will be interesting to see the efficacy with which these intentions are translated into preparing the country for a new global normal. In this inextricably connected world, technology - like humans - has its limits and is not failsafe. It is also equally true that the tech-empowered State is the only way forward, where new technologies like cloud computing, big data analytics and increased mobility will play the defining role in delivering welfare to the marginalised millions. All of them have one thing in common: they rely on the interaction among large public datasets that include everything from your bank information to biometrics. </p> <p align="justify"> This means that cyber threats don't just threaten our privacy or a State's; they threaten to disable the very architecture that seeks to deliver welfare. Also, the battle is no longer limited to a bunch of ingenious hackers against unsuspecting individuals, but is heading into a full-blown war with sustained and targeted attacks against nation states, where the right to privacy is collateral damage. </p> <p align="justify"> WikiLeaks, Edward Snowden and PRISM may have captured our imagination of late, but issues of surveillance and data privacy have been slow to take root in India. The country's efforts to build the world's largest biometric database under the Unique Identification (UID) project - and the fear mongering that has followed such intrusive data collection - makes it all the more crucial that the less-talked-about components in the new policy, like the creation of security awareness and stronger legal frameworks, are put in place at the earliest. India urgently needs a well-thought-out cyber security law to protect against the misuse of individual freedoms. </p> <p align="justify"> We also need to be prepared for that inevitable breach, where the role of regulatory mechanisms and legal checks and balances will become crucial. One of India's biggest problems is the lack of a stringently-imposed legal deterrence, which invites opportunists to break the law with impunity. This becomes all the more important while protecting the nation's critical data and information systems, as well as preserving the trust of over a billion citizens willing to surrender personal information at every turn. </p> <p align="justify"> But the government has signalled its willingness to at least open the doors to greater collaboration and proven wisdom, in securing these limits, and the constant allusion to public-private partnerships in the new policy is refreshing, as is the preference for open standards. A corollary to this is that though the policy displays a preference for indigenisation, it does not harp on it. </p> <p align="justify"> Unfortunately, the price we must pay for having the world at our fingertips is knowing that someone from that world will always be tempted to sneak a peek. Being part of the global commons makes cyberspace a particularly challenging environment to draw boundaries in, and some might criticise the government for not adequately addressing these concerns. Well, here's one thing we should be clear about: other countries have absolutely no obligation to respect Indian citizens' right to privacy, especially when it comes to 'national security' concerns. But the Indian government does. Let's also bear in mind that the limits of this obligation will always be hazy, whether we like it or not. </p> <p align="justify"> In the end, no policy can guard us against the abuse of discretion. That is the new normal. Next time, I'll remember to password-lock my iPad. </p> <p align="justify"> <em>Preeti Singh is editor, iGovernment.in at 9.9 Media </em> </p>', 'credit_writer' => 'The Hindustan Times, 5 July, 2013, http://www.hindustantimes.com/News-Feed/Columns/Cyber-insecurity-is-the-new-normal/Article1-1087834.aspx', 'article_img' => '', 'article_img_thumb' => '', 'status' => (int) 1, 'show_on_home' => (int) 1, 'lang' => 'EN', 'category_id' => (int) 16, 'tag_keyword' => '', 'seo_url' => 'cyber-insecurity-is-the-new-normal-preeti-singh-21820', 'meta_title' => null, 'meta_keywords' => null, 'meta_description' => null, 'noindex' => (int) 0, 'publish_date' => object(Cake\I18n\FrozenDate) {}, 'most_visit_section_id' => null, 'article_big_img' => null, 'liveid' => (int) 21820, 'created' => object(Cake\I18n\FrozenTime) {}, 'modified' => object(Cake\I18n\FrozenTime) {}, 'edate' => '', 'tags' => [ (int) 0 => object(Cake\ORM\Entity) {}, (int) 1 => object(Cake\ORM\Entity) {}, (int) 2 => object(Cake\ORM\Entity) {}, (int) 3 => object(Cake\ORM\Entity) {} ], 'category' => object(App\Model\Entity\Category) {}, '[new]' => false, '[accessible]' => [ '*' => true, 'id' => false ], '[dirty]' => [], '[original]' => [], '[virtual]' => [], '[hasErrors]' => false, '[errors]' => [], '[invalid]' => [], '[repository]' => 'Articles' } $articleid = (int) 21673 $metaTitle = 'LATEST NEWS UPDATES | Cyber insecurity is the new normal -Preeti Singh' $metaKeywords = 'E-Governance,internet,ICTs,Privacy' $metaDesc = ' -The Hindustan Times A couple of months ago, I was in South Block for a meeting at the ministry of defence. Security norms dictate leaving mobile and electronic devices at the checkpoint. Imagine my horror when I came back an hour...' $disp = '<div align="justify">-The Hindustan Times</div><p align="justify"><br />A couple of months ago, I was in South Block for a meeting at the ministry of defence. Security norms dictate leaving mobile and electronic devices at the checkpoint. Imagine my horror when I came back an hour later to see one of the guards going through my iPad. This cavalier attitude towards individual privacy is illustrative of an interesting dilemma between the inevitability of a more intrusive State and its obligation to protect the privacy of its citizens.</p><p align="justify">India has unveiled a new National Cyber Security Policy to deal with growing cyber threats. It will be interesting to see the efficacy with which these intentions are translated into preparing the country for a new global normal. In this inextricably connected world, technology - like humans - has its limits and is not failsafe. It is also equally true that the tech-empowered State is the only way forward, where new technologies like cloud computing, big data analytics and increased mobility will play the defining role in delivering welfare to the marginalised millions. All of them have one thing in common: they rely on the interaction among large public datasets that include everything from your bank information to biometrics.</p><p align="justify">This means that cyber threats don't just threaten our privacy or a State's; they threaten to disable the very architecture that seeks to deliver welfare. Also, the battle is no longer limited to a bunch of ingenious hackers against unsuspecting individuals, but is heading into a full-blown war with sustained and targeted attacks against nation states, where the right to privacy is collateral damage.</p><p align="justify">WikiLeaks, Edward Snowden and PRISM may have captured our imagination of late, but issues of surveillance and data privacy have been slow to take root in India. The country's efforts to build the world's largest biometric database under the Unique Identification (UID) project - and the fear mongering that has followed such intrusive data collection - makes it all the more crucial that the less-talked-about components in the new policy, like the creation of security awareness and stronger legal frameworks, are put in place at the earliest. India urgently needs a well-thought-out cyber security law to protect against the misuse of individual freedoms.</p><p align="justify">We also need to be prepared for that inevitable breach, where the role of regulatory mechanisms and legal checks and balances will become crucial. One of India's biggest problems is the lack of a stringently-imposed legal deterrence, which invites opportunists to break the law with impunity. This becomes all the more important while protecting the nation's critical data and information systems, as well as preserving the trust of over a billion citizens willing to surrender personal information at every turn.</p><p align="justify">But the government has signalled its willingness to at least open the doors to greater collaboration and proven wisdom, in securing these limits, and the constant allusion to public-private partnerships in the new policy is refreshing, as is the preference for open standards. A corollary to this is that though the policy displays a preference for indigenisation, it does not harp on it.</p><p align="justify">Unfortunately, the price we must pay for having the world at our fingertips is knowing that someone from that world will always be tempted to sneak a peek. Being part of the global commons makes cyberspace a particularly challenging environment to draw boundaries in, and some might criticise the government for not adequately addressing these concerns. Well, here's one thing we should be clear about: other countries have absolutely no obligation to respect Indian citizens' right to privacy, especially when it comes to 'national security' concerns. But the Indian government does. Let's also bear in mind that the limits of this obligation will always be hazy, whether we like it or not.</p><p align="justify">In the end, no policy can guard us against the abuse of discretion. That is the new normal. Next time, I'll remember to password-lock my iPad.</p><p align="justify"><em>Preeti Singh is editor, iGovernment.in at 9.9 Media </em></p>' $lang = 'English' $SITE_URL = 'https://im4change.in/' $site_title = 'im4change' $adminprix = 'admin'</pre><pre class="stack-trace">include - APP/Template/Layout/printlayout.ctp, line 8 Cake\View\View::_evaluate() - CORE/src/View/View.php, line 1413 Cake\View\View::_render() - CORE/src/View/View.php, line 1374 Cake\View\View::renderLayout() - CORE/src/View/View.php, line 927 Cake\View\View::render() - CORE/src/View/View.php, line 885 Cake\Controller\Controller::render() - CORE/src/Controller/Controller.php, line 791 Cake\Http\ActionDispatcher::_invoke() - CORE/src/Http/ActionDispatcher.php, line 126 Cake\Http\ActionDispatcher::dispatch() - CORE/src/Http/ActionDispatcher.php, line 94 Cake\Http\BaseApplication::__invoke() - CORE/src/Http/BaseApplication.php, line 235 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\RoutingMiddleware::__invoke() - CORE/src/Routing/Middleware/RoutingMiddleware.php, line 162 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\AssetMiddleware::__invoke() - CORE/src/Routing/Middleware/AssetMiddleware.php, line 88 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Error\Middleware\ErrorHandlerMiddleware::__invoke() - CORE/src/Error/Middleware/ErrorHandlerMiddleware.php, line 96 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Http\Runner::run() - CORE/src/Http/Runner.php, line 51</pre></div></pre>latest-news-updates/cyber-insecurity-is-the-new-normal-preeti-singh-21820.html"/> <meta http-equiv="Content-Type" content="text/html; charset=utf-8"/> <link href="https://im4change.in/css/control.css" rel="stylesheet" type="text/css" media="all"/> <title>LATEST NEWS UPDATES | Cyber insecurity is the new normal -Preeti Singh | Im4change.org</title> <meta name="description" content=" -The Hindustan Times A couple of months ago, I was in South Block for a meeting at the ministry of defence. Security norms dictate leaving mobile and electronic devices at the checkpoint. Imagine my horror when I came back an hour..."/> <script src="https://im4change.in/js/jquery-1.10.2.js"></script> <script type="text/javascript" src="https://im4change.in/js/jquery-migrate.min.js"></script> <script language="javascript" type="text/javascript"> $(document).ready(function () { var img = $("img")[0]; // Get my img elem var pic_real_width, pic_real_height; $("<img/>") // Make in memory copy of image to avoid css issues .attr("src", $(img).attr("src")) .load(function () { pic_real_width = this.width; // Note: $(this).width() will not pic_real_height = this.height; // work for in memory images. }); }); </script> <style type="text/css"> @media screen { div.divFooter { display: block; } } @media print { .printbutton { display: none !important; } } </style> </head> <body> <table cellpadding="0" cellspacing="0" border="0" width="98%" align="center"> <tr> <td class="top_bg"> <div class="divFooter"> <img src="https://im4change.in/images/logo1.jpg" height="59" border="0" alt="Resource centre on India's rural distress" style="padding-top:14px;"/> </div> </td> </tr> <tr> <td id="topspace"> </td> </tr> <tr id="topspace"> <td> </td> </tr> <tr> <td height="50" style="border-bottom:1px solid #000; padding-top:10px;" class="printbutton"> <form><input type="button" value=" Print this page " onclick="window.print();return false;"/></form> </td> </tr> <tr> <td width="100%"> <h1 class="news_headlines" style="font-style:normal"> <strong>Cyber insecurity is the new normal -Preeti Singh</strong></h1> </td> </tr> <tr> <td width="100%" style="font-family:Arial, 'Segoe Script', 'Segoe UI', sans-serif, serif"><font size="3"> <div align="justify">-The Hindustan Times</div><p align="justify"><br />A couple of months ago, I was in South Block for a meeting at the ministry of defence. Security norms dictate leaving mobile and electronic devices at the checkpoint. Imagine my horror when I came back an hour later to see one of the guards going through my iPad. This cavalier attitude towards individual privacy is illustrative of an interesting dilemma between the inevitability of a more intrusive State and its obligation to protect the privacy of its citizens.</p><p align="justify">India has unveiled a new National Cyber Security Policy to deal with growing cyber threats. It will be interesting to see the efficacy with which these intentions are translated into preparing the country for a new global normal. In this inextricably connected world, technology - like humans - has its limits and is not failsafe. It is also equally true that the tech-empowered State is the only way forward, where new technologies like cloud computing, big data analytics and increased mobility will play the defining role in delivering welfare to the marginalised millions. All of them have one thing in common: they rely on the interaction among large public datasets that include everything from your bank information to biometrics.</p><p align="justify">This means that cyber threats don't just threaten our privacy or a State's; they threaten to disable the very architecture that seeks to deliver welfare. Also, the battle is no longer limited to a bunch of ingenious hackers against unsuspecting individuals, but is heading into a full-blown war with sustained and targeted attacks against nation states, where the right to privacy is collateral damage.</p><p align="justify">WikiLeaks, Edward Snowden and PRISM may have captured our imagination of late, but issues of surveillance and data privacy have been slow to take root in India. The country's efforts to build the world's largest biometric database under the Unique Identification (UID) project - and the fear mongering that has followed such intrusive data collection - makes it all the more crucial that the less-talked-about components in the new policy, like the creation of security awareness and stronger legal frameworks, are put in place at the earliest. India urgently needs a well-thought-out cyber security law to protect against the misuse of individual freedoms.</p><p align="justify">We also need to be prepared for that inevitable breach, where the role of regulatory mechanisms and legal checks and balances will become crucial. One of India's biggest problems is the lack of a stringently-imposed legal deterrence, which invites opportunists to break the law with impunity. This becomes all the more important while protecting the nation's critical data and information systems, as well as preserving the trust of over a billion citizens willing to surrender personal information at every turn.</p><p align="justify">But the government has signalled its willingness to at least open the doors to greater collaboration and proven wisdom, in securing these limits, and the constant allusion to public-private partnerships in the new policy is refreshing, as is the preference for open standards. A corollary to this is that though the policy displays a preference for indigenisation, it does not harp on it.</p><p align="justify">Unfortunately, the price we must pay for having the world at our fingertips is knowing that someone from that world will always be tempted to sneak a peek. Being part of the global commons makes cyberspace a particularly challenging environment to draw boundaries in, and some might criticise the government for not adequately addressing these concerns. Well, here's one thing we should be clear about: other countries have absolutely no obligation to respect Indian citizens' right to privacy, especially when it comes to 'national security' concerns. But the Indian government does. Let's also bear in mind that the limits of this obligation will always be hazy, whether we like it or not.</p><p align="justify">In the end, no policy can guard us against the abuse of discretion. That is the new normal. Next time, I'll remember to password-lock my iPad.</p><p align="justify"><em>Preeti Singh is editor, iGovernment.in at 9.9 Media </em></p> </font> </td> </tr> <tr> <td> </td> </tr> <tr> <td height="50" style="border-top:1px solid #000; border-bottom:1px solid #000;padding-top:10px;"> <form><input type="button" value=" Print this page " onclick="window.print();return false;"/></form> </td> </tr> </table></body> </html>' } $maxBufferLength = (int) 8192 $file = '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Error/Debugger.php' $line = (int) 853 $message = 'Unable to emit headers. Headers sent in file=/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Error/Debugger.php line=853'Cake\Http\ResponseEmitter::emit() - CORE/src/Http/ResponseEmitter.php, line 48 Cake\Http\Server::emit() - CORE/src/Http/Server.php, line 141 [main] - ROOT/webroot/index.php, line 39
Warning (2): Cannot modify header information - headers already sent by (output started at /home/brlfuser/public_html/vendor/cakephp/cakephp/src/Error/Debugger.php:853) [CORE/src/Http/ResponseEmitter.php, line 148]Code Context$response->getStatusCode(),
($reasonPhrase ? ' ' . $reasonPhrase : '')
));
$response = object(Cake\Http\Response) { 'status' => (int) 200, 'contentType' => 'text/html', 'headers' => [ 'Content-Type' => [ [maximum depth reached] ] ], 'file' => null, 'fileRange' => [], 'cookies' => object(Cake\Http\Cookie\CookieCollection) {}, 'cacheDirectives' => [], 'body' => '<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <link rel="canonical" href="https://im4change.in/<pre class="cake-error"><a href="javascript:void(0);" onclick="document.getElementById('cakeErr67f060c1c57c7-trace').style.display = (document.getElementById('cakeErr67f060c1c57c7-trace').style.display == 'none' ? '' : 'none');"><b>Notice</b> (8)</a>: Undefined variable: urlPrefix [<b>APP/Template/Layout/printlayout.ctp</b>, line <b>8</b>]<div id="cakeErr67f060c1c57c7-trace" class="cake-stack-trace" style="display: none;"><a href="javascript:void(0);" onclick="document.getElementById('cakeErr67f060c1c57c7-code').style.display = (document.getElementById('cakeErr67f060c1c57c7-code').style.display == 'none' ? '' : 'none')">Code</a> <a href="javascript:void(0);" onclick="document.getElementById('cakeErr67f060c1c57c7-context').style.display = (document.getElementById('cakeErr67f060c1c57c7-context').style.display == 'none' ? '' : 'none')">Context</a><pre id="cakeErr67f060c1c57c7-code" class="cake-code-dump" style="display: none;"><code><span style="color: #000000"><span style="color: #0000BB"></span><span style="color: #007700"><</span><span style="color: #0000BB">head</span><span style="color: #007700">> </span></span></code> <span class="code-highlight"><code><span style="color: #000000"> <link rel="canonical" href="<span style="color: #0000BB"><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">Configure</span><span style="color: #007700">::</span><span style="color: #0000BB">read</span><span style="color: #007700">(</span><span style="color: #DD0000">'SITE_URL'</span><span style="color: #007700">); </span><span style="color: #0000BB">?><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$urlPrefix</span><span style="color: #007700">;</span><span style="color: #0000BB">?><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$article_current</span><span style="color: #007700">-></span><span style="color: #0000BB">category</span><span style="color: #007700">-></span><span style="color: #0000BB">slug</span><span style="color: #007700">; </span><span style="color: #0000BB">?></span>/<span style="color: #0000BB"><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$article_current</span><span style="color: #007700">-></span><span style="color: #0000BB">seo_url</span><span style="color: #007700">; </span><span style="color: #0000BB">?></span>.html"/> </span></code></span> <code><span style="color: #000000"><span style="color: #0000BB"> </span><span style="color: #007700"><</span><span style="color: #0000BB">meta http</span><span style="color: #007700">-</span><span style="color: #0000BB">equiv</span><span style="color: #007700">=</span><span style="color: #DD0000">"Content-Type" </span><span style="color: #0000BB">content</span><span style="color: #007700">=</span><span style="color: #DD0000">"text/html; charset=utf-8"</span><span style="color: #007700">/> </span></span></code></pre><pre id="cakeErr67f060c1c57c7-context" class="cake-context" style="display: none;">$viewFile = '/home/brlfuser/public_html/src/Template/Layout/printlayout.ctp' $dataForView = [ 'article_current' => object(App\Model\Entity\Article) { 'id' => (int) 21673, 'title' => 'Cyber insecurity is the new normal -Preeti Singh', 'subheading' => '', 'description' => '<div align="justify"> -The Hindustan Times </div> <p align="justify"> <br /> A couple of months ago, I was in South Block for a meeting at the ministry of defence. Security norms dictate leaving mobile and electronic devices at the checkpoint. Imagine my horror when I came back an hour later to see one of the guards going through my iPad. This cavalier attitude towards individual privacy is illustrative of an interesting dilemma between the inevitability of a more intrusive State and its obligation to protect the privacy of its citizens. </p> <p align="justify"> India has unveiled a new National Cyber Security Policy to deal with growing cyber threats. It will be interesting to see the efficacy with which these intentions are translated into preparing the country for a new global normal. In this inextricably connected world, technology - like humans - has its limits and is not failsafe. It is also equally true that the tech-empowered State is the only way forward, where new technologies like cloud computing, big data analytics and increased mobility will play the defining role in delivering welfare to the marginalised millions. All of them have one thing in common: they rely on the interaction among large public datasets that include everything from your bank information to biometrics. </p> <p align="justify"> This means that cyber threats don't just threaten our privacy or a State's; they threaten to disable the very architecture that seeks to deliver welfare. Also, the battle is no longer limited to a bunch of ingenious hackers against unsuspecting individuals, but is heading into a full-blown war with sustained and targeted attacks against nation states, where the right to privacy is collateral damage. </p> <p align="justify"> WikiLeaks, Edward Snowden and PRISM may have captured our imagination of late, but issues of surveillance and data privacy have been slow to take root in India. The country's efforts to build the world's largest biometric database under the Unique Identification (UID) project - and the fear mongering that has followed such intrusive data collection - makes it all the more crucial that the less-talked-about components in the new policy, like the creation of security awareness and stronger legal frameworks, are put in place at the earliest. India urgently needs a well-thought-out cyber security law to protect against the misuse of individual freedoms. </p> <p align="justify"> We also need to be prepared for that inevitable breach, where the role of regulatory mechanisms and legal checks and balances will become crucial. One of India's biggest problems is the lack of a stringently-imposed legal deterrence, which invites opportunists to break the law with impunity. This becomes all the more important while protecting the nation's critical data and information systems, as well as preserving the trust of over a billion citizens willing to surrender personal information at every turn. </p> <p align="justify"> But the government has signalled its willingness to at least open the doors to greater collaboration and proven wisdom, in securing these limits, and the constant allusion to public-private partnerships in the new policy is refreshing, as is the preference for open standards. A corollary to this is that though the policy displays a preference for indigenisation, it does not harp on it. </p> <p align="justify"> Unfortunately, the price we must pay for having the world at our fingertips is knowing that someone from that world will always be tempted to sneak a peek. Being part of the global commons makes cyberspace a particularly challenging environment to draw boundaries in, and some might criticise the government for not adequately addressing these concerns. Well, here's one thing we should be clear about: other countries have absolutely no obligation to respect Indian citizens' right to privacy, especially when it comes to 'national security' concerns. But the Indian government does. Let's also bear in mind that the limits of this obligation will always be hazy, whether we like it or not. </p> <p align="justify"> In the end, no policy can guard us against the abuse of discretion. That is the new normal. Next time, I'll remember to password-lock my iPad. </p> <p align="justify"> <em>Preeti Singh is editor, iGovernment.in at 9.9 Media </em> </p>', 'credit_writer' => 'The Hindustan Times, 5 July, 2013, http://www.hindustantimes.com/News-Feed/Columns/Cyber-insecurity-is-the-new-normal/Article1-1087834.aspx', 'article_img' => '', 'article_img_thumb' => '', 'status' => (int) 1, 'show_on_home' => (int) 1, 'lang' => 'EN', 'category_id' => (int) 16, 'tag_keyword' => '', 'seo_url' => 'cyber-insecurity-is-the-new-normal-preeti-singh-21820', 'meta_title' => null, 'meta_keywords' => null, 'meta_description' => null, 'noindex' => (int) 0, 'publish_date' => object(Cake\I18n\FrozenDate) {}, 'most_visit_section_id' => null, 'article_big_img' => null, 'liveid' => (int) 21820, 'created' => object(Cake\I18n\FrozenTime) {}, 'modified' => object(Cake\I18n\FrozenTime) {}, 'edate' => '', 'tags' => [ [maximum depth reached] ], 'category' => object(App\Model\Entity\Category) {}, '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[hasErrors]' => false, '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'Articles' }, 'articleid' => (int) 21673, 'metaTitle' => 'LATEST NEWS UPDATES | Cyber insecurity is the new normal -Preeti Singh', 'metaKeywords' => 'E-Governance,internet,ICTs,Privacy', 'metaDesc' => ' -The Hindustan Times A couple of months ago, I was in South Block for a meeting at the ministry of defence. Security norms dictate leaving mobile and electronic devices at the checkpoint. Imagine my horror when I came back an hour...', 'disp' => '<div align="justify">-The Hindustan Times</div><p align="justify"><br />A couple of months ago, I was in South Block for a meeting at the ministry of defence. Security norms dictate leaving mobile and electronic devices at the checkpoint. Imagine my horror when I came back an hour later to see one of the guards going through my iPad. This cavalier attitude towards individual privacy is illustrative of an interesting dilemma between the inevitability of a more intrusive State and its obligation to protect the privacy of its citizens.</p><p align="justify">India has unveiled a new National Cyber Security Policy to deal with growing cyber threats. It will be interesting to see the efficacy with which these intentions are translated into preparing the country for a new global normal. In this inextricably connected world, technology - like humans - has its limits and is not failsafe. It is also equally true that the tech-empowered State is the only way forward, where new technologies like cloud computing, big data analytics and increased mobility will play the defining role in delivering welfare to the marginalised millions. All of them have one thing in common: they rely on the interaction among large public datasets that include everything from your bank information to biometrics.</p><p align="justify">This means that cyber threats don't just threaten our privacy or a State's; they threaten to disable the very architecture that seeks to deliver welfare. Also, the battle is no longer limited to a bunch of ingenious hackers against unsuspecting individuals, but is heading into a full-blown war with sustained and targeted attacks against nation states, where the right to privacy is collateral damage.</p><p align="justify">WikiLeaks, Edward Snowden and PRISM may have captured our imagination of late, but issues of surveillance and data privacy have been slow to take root in India. The country's efforts to build the world's largest biometric database under the Unique Identification (UID) project - and the fear mongering that has followed such intrusive data collection - makes it all the more crucial that the less-talked-about components in the new policy, like the creation of security awareness and stronger legal frameworks, are put in place at the earliest. India urgently needs a well-thought-out cyber security law to protect against the misuse of individual freedoms.</p><p align="justify">We also need to be prepared for that inevitable breach, where the role of regulatory mechanisms and legal checks and balances will become crucial. One of India's biggest problems is the lack of a stringently-imposed legal deterrence, which invites opportunists to break the law with impunity. This becomes all the more important while protecting the nation's critical data and information systems, as well as preserving the trust of over a billion citizens willing to surrender personal information at every turn.</p><p align="justify">But the government has signalled its willingness to at least open the doors to greater collaboration and proven wisdom, in securing these limits, and the constant allusion to public-private partnerships in the new policy is refreshing, as is the preference for open standards. A corollary to this is that though the policy displays a preference for indigenisation, it does not harp on it.</p><p align="justify">Unfortunately, the price we must pay for having the world at our fingertips is knowing that someone from that world will always be tempted to sneak a peek. Being part of the global commons makes cyberspace a particularly challenging environment to draw boundaries in, and some might criticise the government for not adequately addressing these concerns. Well, here's one thing we should be clear about: other countries have absolutely no obligation to respect Indian citizens' right to privacy, especially when it comes to 'national security' concerns. But the Indian government does. Let's also bear in mind that the limits of this obligation will always be hazy, whether we like it or not.</p><p align="justify">In the end, no policy can guard us against the abuse of discretion. That is the new normal. Next time, I'll remember to password-lock my iPad.</p><p align="justify"><em>Preeti Singh is editor, iGovernment.in at 9.9 Media </em></p>', 'lang' => 'English', 'SITE_URL' => 'https://im4change.in/', 'site_title' => 'im4change', 'adminprix' => 'admin' ] $article_current = object(App\Model\Entity\Article) { 'id' => (int) 21673, 'title' => 'Cyber insecurity is the new normal -Preeti Singh', 'subheading' => '', 'description' => '<div align="justify"> -The Hindustan Times </div> <p align="justify"> <br /> A couple of months ago, I was in South Block for a meeting at the ministry of defence. Security norms dictate leaving mobile and electronic devices at the checkpoint. Imagine my horror when I came back an hour later to see one of the guards going through my iPad. This cavalier attitude towards individual privacy is illustrative of an interesting dilemma between the inevitability of a more intrusive State and its obligation to protect the privacy of its citizens. </p> <p align="justify"> India has unveiled a new National Cyber Security Policy to deal with growing cyber threats. It will be interesting to see the efficacy with which these intentions are translated into preparing the country for a new global normal. In this inextricably connected world, technology - like humans - has its limits and is not failsafe. It is also equally true that the tech-empowered State is the only way forward, where new technologies like cloud computing, big data analytics and increased mobility will play the defining role in delivering welfare to the marginalised millions. All of them have one thing in common: they rely on the interaction among large public datasets that include everything from your bank information to biometrics. </p> <p align="justify"> This means that cyber threats don't just threaten our privacy or a State's; they threaten to disable the very architecture that seeks to deliver welfare. Also, the battle is no longer limited to a bunch of ingenious hackers against unsuspecting individuals, but is heading into a full-blown war with sustained and targeted attacks against nation states, where the right to privacy is collateral damage. </p> <p align="justify"> WikiLeaks, Edward Snowden and PRISM may have captured our imagination of late, but issues of surveillance and data privacy have been slow to take root in India. The country's efforts to build the world's largest biometric database under the Unique Identification (UID) project - and the fear mongering that has followed such intrusive data collection - makes it all the more crucial that the less-talked-about components in the new policy, like the creation of security awareness and stronger legal frameworks, are put in place at the earliest. India urgently needs a well-thought-out cyber security law to protect against the misuse of individual freedoms. </p> <p align="justify"> We also need to be prepared for that inevitable breach, where the role of regulatory mechanisms and legal checks and balances will become crucial. One of India's biggest problems is the lack of a stringently-imposed legal deterrence, which invites opportunists to break the law with impunity. This becomes all the more important while protecting the nation's critical data and information systems, as well as preserving the trust of over a billion citizens willing to surrender personal information at every turn. </p> <p align="justify"> But the government has signalled its willingness to at least open the doors to greater collaboration and proven wisdom, in securing these limits, and the constant allusion to public-private partnerships in the new policy is refreshing, as is the preference for open standards. A corollary to this is that though the policy displays a preference for indigenisation, it does not harp on it. </p> <p align="justify"> Unfortunately, the price we must pay for having the world at our fingertips is knowing that someone from that world will always be tempted to sneak a peek. Being part of the global commons makes cyberspace a particularly challenging environment to draw boundaries in, and some might criticise the government for not adequately addressing these concerns. Well, here's one thing we should be clear about: other countries have absolutely no obligation to respect Indian citizens' right to privacy, especially when it comes to 'national security' concerns. But the Indian government does. Let's also bear in mind that the limits of this obligation will always be hazy, whether we like it or not. </p> <p align="justify"> In the end, no policy can guard us against the abuse of discretion. That is the new normal. Next time, I'll remember to password-lock my iPad. </p> <p align="justify"> <em>Preeti Singh is editor, iGovernment.in at 9.9 Media </em> </p>', 'credit_writer' => 'The Hindustan Times, 5 July, 2013, http://www.hindustantimes.com/News-Feed/Columns/Cyber-insecurity-is-the-new-normal/Article1-1087834.aspx', 'article_img' => '', 'article_img_thumb' => '', 'status' => (int) 1, 'show_on_home' => (int) 1, 'lang' => 'EN', 'category_id' => (int) 16, 'tag_keyword' => '', 'seo_url' => 'cyber-insecurity-is-the-new-normal-preeti-singh-21820', 'meta_title' => null, 'meta_keywords' => null, 'meta_description' => null, 'noindex' => (int) 0, 'publish_date' => object(Cake\I18n\FrozenDate) {}, 'most_visit_section_id' => null, 'article_big_img' => null, 'liveid' => (int) 21820, 'created' => object(Cake\I18n\FrozenTime) {}, 'modified' => object(Cake\I18n\FrozenTime) {}, 'edate' => '', 'tags' => [ (int) 0 => object(Cake\ORM\Entity) {}, (int) 1 => object(Cake\ORM\Entity) {}, (int) 2 => object(Cake\ORM\Entity) {}, (int) 3 => object(Cake\ORM\Entity) {} ], 'category' => object(App\Model\Entity\Category) {}, '[new]' => false, '[accessible]' => [ '*' => true, 'id' => false ], '[dirty]' => [], '[original]' => [], '[virtual]' => [], '[hasErrors]' => false, '[errors]' => [], '[invalid]' => [], '[repository]' => 'Articles' } $articleid = (int) 21673 $metaTitle = 'LATEST NEWS UPDATES | Cyber insecurity is the new normal -Preeti Singh' $metaKeywords = 'E-Governance,internet,ICTs,Privacy' $metaDesc = ' -The Hindustan Times A couple of months ago, I was in South Block for a meeting at the ministry of defence. Security norms dictate leaving mobile and electronic devices at the checkpoint. Imagine my horror when I came back an hour...' $disp = '<div align="justify">-The Hindustan Times</div><p align="justify"><br />A couple of months ago, I was in South Block for a meeting at the ministry of defence. Security norms dictate leaving mobile and electronic devices at the checkpoint. Imagine my horror when I came back an hour later to see one of the guards going through my iPad. This cavalier attitude towards individual privacy is illustrative of an interesting dilemma between the inevitability of a more intrusive State and its obligation to protect the privacy of its citizens.</p><p align="justify">India has unveiled a new National Cyber Security Policy to deal with growing cyber threats. It will be interesting to see the efficacy with which these intentions are translated into preparing the country for a new global normal. In this inextricably connected world, technology - like humans - has its limits and is not failsafe. It is also equally true that the tech-empowered State is the only way forward, where new technologies like cloud computing, big data analytics and increased mobility will play the defining role in delivering welfare to the marginalised millions. All of them have one thing in common: they rely on the interaction among large public datasets that include everything from your bank information to biometrics.</p><p align="justify">This means that cyber threats don't just threaten our privacy or a State's; they threaten to disable the very architecture that seeks to deliver welfare. Also, the battle is no longer limited to a bunch of ingenious hackers against unsuspecting individuals, but is heading into a full-blown war with sustained and targeted attacks against nation states, where the right to privacy is collateral damage.</p><p align="justify">WikiLeaks, Edward Snowden and PRISM may have captured our imagination of late, but issues of surveillance and data privacy have been slow to take root in India. The country's efforts to build the world's largest biometric database under the Unique Identification (UID) project - and the fear mongering that has followed such intrusive data collection - makes it all the more crucial that the less-talked-about components in the new policy, like the creation of security awareness and stronger legal frameworks, are put in place at the earliest. India urgently needs a well-thought-out cyber security law to protect against the misuse of individual freedoms.</p><p align="justify">We also need to be prepared for that inevitable breach, where the role of regulatory mechanisms and legal checks and balances will become crucial. One of India's biggest problems is the lack of a stringently-imposed legal deterrence, which invites opportunists to break the law with impunity. This becomes all the more important while protecting the nation's critical data and information systems, as well as preserving the trust of over a billion citizens willing to surrender personal information at every turn.</p><p align="justify">But the government has signalled its willingness to at least open the doors to greater collaboration and proven wisdom, in securing these limits, and the constant allusion to public-private partnerships in the new policy is refreshing, as is the preference for open standards. A corollary to this is that though the policy displays a preference for indigenisation, it does not harp on it.</p><p align="justify">Unfortunately, the price we must pay for having the world at our fingertips is knowing that someone from that world will always be tempted to sneak a peek. Being part of the global commons makes cyberspace a particularly challenging environment to draw boundaries in, and some might criticise the government for not adequately addressing these concerns. Well, here's one thing we should be clear about: other countries have absolutely no obligation to respect Indian citizens' right to privacy, especially when it comes to 'national security' concerns. But the Indian government does. Let's also bear in mind that the limits of this obligation will always be hazy, whether we like it or not.</p><p align="justify">In the end, no policy can guard us against the abuse of discretion. That is the new normal. Next time, I'll remember to password-lock my iPad.</p><p align="justify"><em>Preeti Singh is editor, iGovernment.in at 9.9 Media </em></p>' $lang = 'English' $SITE_URL = 'https://im4change.in/' $site_title = 'im4change' $adminprix = 'admin'</pre><pre class="stack-trace">include - APP/Template/Layout/printlayout.ctp, line 8 Cake\View\View::_evaluate() - CORE/src/View/View.php, line 1413 Cake\View\View::_render() - CORE/src/View/View.php, line 1374 Cake\View\View::renderLayout() - CORE/src/View/View.php, line 927 Cake\View\View::render() - CORE/src/View/View.php, line 885 Cake\Controller\Controller::render() - CORE/src/Controller/Controller.php, line 791 Cake\Http\ActionDispatcher::_invoke() - CORE/src/Http/ActionDispatcher.php, line 126 Cake\Http\ActionDispatcher::dispatch() - CORE/src/Http/ActionDispatcher.php, line 94 Cake\Http\BaseApplication::__invoke() - CORE/src/Http/BaseApplication.php, line 235 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\RoutingMiddleware::__invoke() - CORE/src/Routing/Middleware/RoutingMiddleware.php, line 162 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\AssetMiddleware::__invoke() - CORE/src/Routing/Middleware/AssetMiddleware.php, line 88 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Error\Middleware\ErrorHandlerMiddleware::__invoke() - CORE/src/Error/Middleware/ErrorHandlerMiddleware.php, line 96 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Http\Runner::run() - CORE/src/Http/Runner.php, line 51</pre></div></pre>latest-news-updates/cyber-insecurity-is-the-new-normal-preeti-singh-21820.html"/> <meta http-equiv="Content-Type" content="text/html; charset=utf-8"/> <link href="https://im4change.in/css/control.css" rel="stylesheet" type="text/css" media="all"/> <title>LATEST NEWS UPDATES | Cyber insecurity is the new normal -Preeti Singh | Im4change.org</title> <meta name="description" content=" -The Hindustan Times A couple of months ago, I was in South Block for a meeting at the ministry of defence. Security norms dictate leaving mobile and electronic devices at the checkpoint. Imagine my horror when I came back an hour..."/> <script src="https://im4change.in/js/jquery-1.10.2.js"></script> <script type="text/javascript" src="https://im4change.in/js/jquery-migrate.min.js"></script> <script language="javascript" type="text/javascript"> $(document).ready(function () { var img = $("img")[0]; // Get my img elem var pic_real_width, pic_real_height; $("<img/>") // Make in memory copy of image to avoid css issues .attr("src", $(img).attr("src")) .load(function () { pic_real_width = this.width; // Note: $(this).width() will not pic_real_height = this.height; // work for in memory images. }); }); </script> <style type="text/css"> @media screen { div.divFooter { display: block; } } @media print { .printbutton { display: none !important; } } </style> </head> <body> <table cellpadding="0" cellspacing="0" border="0" width="98%" align="center"> <tr> <td class="top_bg"> <div class="divFooter"> <img src="https://im4change.in/images/logo1.jpg" height="59" border="0" alt="Resource centre on India's rural distress" style="padding-top:14px;"/> </div> </td> </tr> <tr> <td id="topspace"> </td> </tr> <tr id="topspace"> <td> </td> </tr> <tr> <td height="50" style="border-bottom:1px solid #000; padding-top:10px;" class="printbutton"> <form><input type="button" value=" Print this page " onclick="window.print();return false;"/></form> </td> </tr> <tr> <td width="100%"> <h1 class="news_headlines" style="font-style:normal"> <strong>Cyber insecurity is the new normal -Preeti Singh</strong></h1> </td> </tr> <tr> <td width="100%" style="font-family:Arial, 'Segoe Script', 'Segoe UI', sans-serif, serif"><font size="3"> <div align="justify">-The Hindustan Times</div><p align="justify"><br />A couple of months ago, I was in South Block for a meeting at the ministry of defence. Security norms dictate leaving mobile and electronic devices at the checkpoint. Imagine my horror when I came back an hour later to see one of the guards going through my iPad. This cavalier attitude towards individual privacy is illustrative of an interesting dilemma between the inevitability of a more intrusive State and its obligation to protect the privacy of its citizens.</p><p align="justify">India has unveiled a new National Cyber Security Policy to deal with growing cyber threats. It will be interesting to see the efficacy with which these intentions are translated into preparing the country for a new global normal. In this inextricably connected world, technology - like humans - has its limits and is not failsafe. It is also equally true that the tech-empowered State is the only way forward, where new technologies like cloud computing, big data analytics and increased mobility will play the defining role in delivering welfare to the marginalised millions. All of them have one thing in common: they rely on the interaction among large public datasets that include everything from your bank information to biometrics.</p><p align="justify">This means that cyber threats don't just threaten our privacy or a State's; they threaten to disable the very architecture that seeks to deliver welfare. Also, the battle is no longer limited to a bunch of ingenious hackers against unsuspecting individuals, but is heading into a full-blown war with sustained and targeted attacks against nation states, where the right to privacy is collateral damage.</p><p align="justify">WikiLeaks, Edward Snowden and PRISM may have captured our imagination of late, but issues of surveillance and data privacy have been slow to take root in India. The country's efforts to build the world's largest biometric database under the Unique Identification (UID) project - and the fear mongering that has followed such intrusive data collection - makes it all the more crucial that the less-talked-about components in the new policy, like the creation of security awareness and stronger legal frameworks, are put in place at the earliest. India urgently needs a well-thought-out cyber security law to protect against the misuse of individual freedoms.</p><p align="justify">We also need to be prepared for that inevitable breach, where the role of regulatory mechanisms and legal checks and balances will become crucial. One of India's biggest problems is the lack of a stringently-imposed legal deterrence, which invites opportunists to break the law with impunity. This becomes all the more important while protecting the nation's critical data and information systems, as well as preserving the trust of over a billion citizens willing to surrender personal information at every turn.</p><p align="justify">But the government has signalled its willingness to at least open the doors to greater collaboration and proven wisdom, in securing these limits, and the constant allusion to public-private partnerships in the new policy is refreshing, as is the preference for open standards. A corollary to this is that though the policy displays a preference for indigenisation, it does not harp on it.</p><p align="justify">Unfortunately, the price we must pay for having the world at our fingertips is knowing that someone from that world will always be tempted to sneak a peek. Being part of the global commons makes cyberspace a particularly challenging environment to draw boundaries in, and some might criticise the government for not adequately addressing these concerns. Well, here's one thing we should be clear about: other countries have absolutely no obligation to respect Indian citizens' right to privacy, especially when it comes to 'national security' concerns. But the Indian government does. Let's also bear in mind that the limits of this obligation will always be hazy, whether we like it or not.</p><p align="justify">In the end, no policy can guard us against the abuse of discretion. That is the new normal. Next time, I'll remember to password-lock my iPad.</p><p align="justify"><em>Preeti Singh is editor, iGovernment.in at 9.9 Media </em></p> </font> </td> </tr> <tr> <td> </td> </tr> <tr> <td height="50" style="border-top:1px solid #000; border-bottom:1px solid #000;padding-top:10px;"> <form><input type="button" value=" Print this page " onclick="window.print();return false;"/></form> </td> </tr> </table></body> </html>' } $reasonPhrase = 'OK'header - [internal], line ?? Cake\Http\ResponseEmitter::emitStatusLine() - CORE/src/Http/ResponseEmitter.php, line 148 Cake\Http\ResponseEmitter::emit() - CORE/src/Http/ResponseEmitter.php, line 54 Cake\Http\Server::emit() - CORE/src/Http/Server.php, line 141 [main] - ROOT/webroot/index.php, line 39
Warning (2): Cannot modify header information - headers already sent by (output started at /home/brlfuser/public_html/vendor/cakephp/cakephp/src/Error/Debugger.php:853) [CORE/src/Http/ResponseEmitter.php, line 181]Notice (8): Undefined variable: urlPrefix [APP/Template/Layout/printlayout.ctp, line 8]Code Context$value
), $first);
$first = false;
$response = object(Cake\Http\Response) { 'status' => (int) 200, 'contentType' => 'text/html', 'headers' => [ 'Content-Type' => [ [maximum depth reached] ] ], 'file' => null, 'fileRange' => [], 'cookies' => object(Cake\Http\Cookie\CookieCollection) {}, 'cacheDirectives' => [], 'body' => '<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <link rel="canonical" href="https://im4change.in/<pre class="cake-error"><a href="javascript:void(0);" onclick="document.getElementById('cakeErr67f060c1c57c7-trace').style.display = (document.getElementById('cakeErr67f060c1c57c7-trace').style.display == 'none' ? '' : 'none');"><b>Notice</b> (8)</a>: Undefined variable: urlPrefix [<b>APP/Template/Layout/printlayout.ctp</b>, line <b>8</b>]<div id="cakeErr67f060c1c57c7-trace" class="cake-stack-trace" style="display: none;"><a href="javascript:void(0);" onclick="document.getElementById('cakeErr67f060c1c57c7-code').style.display = (document.getElementById('cakeErr67f060c1c57c7-code').style.display == 'none' ? '' : 'none')">Code</a> <a href="javascript:void(0);" onclick="document.getElementById('cakeErr67f060c1c57c7-context').style.display = (document.getElementById('cakeErr67f060c1c57c7-context').style.display == 'none' ? '' : 'none')">Context</a><pre id="cakeErr67f060c1c57c7-code" class="cake-code-dump" style="display: none;"><code><span style="color: #000000"><span style="color: #0000BB"></span><span style="color: #007700"><</span><span style="color: #0000BB">head</span><span style="color: #007700">> </span></span></code> <span class="code-highlight"><code><span style="color: #000000"> <link rel="canonical" href="<span style="color: #0000BB"><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">Configure</span><span style="color: #007700">::</span><span style="color: #0000BB">read</span><span style="color: #007700">(</span><span style="color: #DD0000">'SITE_URL'</span><span style="color: #007700">); </span><span style="color: #0000BB">?><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$urlPrefix</span><span style="color: #007700">;</span><span style="color: #0000BB">?><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$article_current</span><span style="color: #007700">-></span><span style="color: #0000BB">category</span><span style="color: #007700">-></span><span style="color: #0000BB">slug</span><span style="color: #007700">; </span><span style="color: #0000BB">?></span>/<span style="color: #0000BB"><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$article_current</span><span style="color: #007700">-></span><span style="color: #0000BB">seo_url</span><span style="color: #007700">; </span><span style="color: #0000BB">?></span>.html"/> </span></code></span> <code><span style="color: #000000"><span style="color: #0000BB"> </span><span style="color: #007700"><</span><span style="color: #0000BB">meta http</span><span style="color: #007700">-</span><span style="color: #0000BB">equiv</span><span style="color: #007700">=</span><span style="color: #DD0000">"Content-Type" </span><span style="color: #0000BB">content</span><span style="color: #007700">=</span><span style="color: #DD0000">"text/html; charset=utf-8"</span><span style="color: #007700">/> </span></span></code></pre><pre id="cakeErr67f060c1c57c7-context" class="cake-context" style="display: none;">$viewFile = '/home/brlfuser/public_html/src/Template/Layout/printlayout.ctp' $dataForView = [ 'article_current' => object(App\Model\Entity\Article) { 'id' => (int) 21673, 'title' => 'Cyber insecurity is the new normal -Preeti Singh', 'subheading' => '', 'description' => '<div align="justify"> -The Hindustan Times </div> <p align="justify"> <br /> A couple of months ago, I was in South Block for a meeting at the ministry of defence. Security norms dictate leaving mobile and electronic devices at the checkpoint. Imagine my horror when I came back an hour later to see one of the guards going through my iPad. This cavalier attitude towards individual privacy is illustrative of an interesting dilemma between the inevitability of a more intrusive State and its obligation to protect the privacy of its citizens. </p> <p align="justify"> India has unveiled a new National Cyber Security Policy to deal with growing cyber threats. It will be interesting to see the efficacy with which these intentions are translated into preparing the country for a new global normal. In this inextricably connected world, technology - like humans - has its limits and is not failsafe. It is also equally true that the tech-empowered State is the only way forward, where new technologies like cloud computing, big data analytics and increased mobility will play the defining role in delivering welfare to the marginalised millions. All of them have one thing in common: they rely on the interaction among large public datasets that include everything from your bank information to biometrics. </p> <p align="justify"> This means that cyber threats don't just threaten our privacy or a State's; they threaten to disable the very architecture that seeks to deliver welfare. Also, the battle is no longer limited to a bunch of ingenious hackers against unsuspecting individuals, but is heading into a full-blown war with sustained and targeted attacks against nation states, where the right to privacy is collateral damage. </p> <p align="justify"> WikiLeaks, Edward Snowden and PRISM may have captured our imagination of late, but issues of surveillance and data privacy have been slow to take root in India. The country's efforts to build the world's largest biometric database under the Unique Identification (UID) project - and the fear mongering that has followed such intrusive data collection - makes it all the more crucial that the less-talked-about components in the new policy, like the creation of security awareness and stronger legal frameworks, are put in place at the earliest. India urgently needs a well-thought-out cyber security law to protect against the misuse of individual freedoms. </p> <p align="justify"> We also need to be prepared for that inevitable breach, where the role of regulatory mechanisms and legal checks and balances will become crucial. One of India's biggest problems is the lack of a stringently-imposed legal deterrence, which invites opportunists to break the law with impunity. This becomes all the more important while protecting the nation's critical data and information systems, as well as preserving the trust of over a billion citizens willing to surrender personal information at every turn. </p> <p align="justify"> But the government has signalled its willingness to at least open the doors to greater collaboration and proven wisdom, in securing these limits, and the constant allusion to public-private partnerships in the new policy is refreshing, as is the preference for open standards. A corollary to this is that though the policy displays a preference for indigenisation, it does not harp on it. </p> <p align="justify"> Unfortunately, the price we must pay for having the world at our fingertips is knowing that someone from that world will always be tempted to sneak a peek. Being part of the global commons makes cyberspace a particularly challenging environment to draw boundaries in, and some might criticise the government for not adequately addressing these concerns. Well, here's one thing we should be clear about: other countries have absolutely no obligation to respect Indian citizens' right to privacy, especially when it comes to 'national security' concerns. But the Indian government does. Let's also bear in mind that the limits of this obligation will always be hazy, whether we like it or not. </p> <p align="justify"> In the end, no policy can guard us against the abuse of discretion. That is the new normal. Next time, I'll remember to password-lock my iPad. </p> <p align="justify"> <em>Preeti Singh is editor, iGovernment.in at 9.9 Media </em> </p>', 'credit_writer' => 'The Hindustan Times, 5 July, 2013, http://www.hindustantimes.com/News-Feed/Columns/Cyber-insecurity-is-the-new-normal/Article1-1087834.aspx', 'article_img' => '', 'article_img_thumb' => '', 'status' => (int) 1, 'show_on_home' => (int) 1, 'lang' => 'EN', 'category_id' => (int) 16, 'tag_keyword' => '', 'seo_url' => 'cyber-insecurity-is-the-new-normal-preeti-singh-21820', 'meta_title' => null, 'meta_keywords' => null, 'meta_description' => null, 'noindex' => (int) 0, 'publish_date' => object(Cake\I18n\FrozenDate) {}, 'most_visit_section_id' => null, 'article_big_img' => null, 'liveid' => (int) 21820, 'created' => object(Cake\I18n\FrozenTime) {}, 'modified' => object(Cake\I18n\FrozenTime) {}, 'edate' => '', 'tags' => [ [maximum depth reached] ], 'category' => object(App\Model\Entity\Category) {}, '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[hasErrors]' => false, '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'Articles' }, 'articleid' => (int) 21673, 'metaTitle' => 'LATEST NEWS UPDATES | Cyber insecurity is the new normal -Preeti Singh', 'metaKeywords' => 'E-Governance,internet,ICTs,Privacy', 'metaDesc' => ' -The Hindustan Times A couple of months ago, I was in South Block for a meeting at the ministry of defence. Security norms dictate leaving mobile and electronic devices at the checkpoint. Imagine my horror when I came back an hour...', 'disp' => '<div align="justify">-The Hindustan Times</div><p align="justify"><br />A couple of months ago, I was in South Block for a meeting at the ministry of defence. Security norms dictate leaving mobile and electronic devices at the checkpoint. Imagine my horror when I came back an hour later to see one of the guards going through my iPad. This cavalier attitude towards individual privacy is illustrative of an interesting dilemma between the inevitability of a more intrusive State and its obligation to protect the privacy of its citizens.</p><p align="justify">India has unveiled a new National Cyber Security Policy to deal with growing cyber threats. It will be interesting to see the efficacy with which these intentions are translated into preparing the country for a new global normal. In this inextricably connected world, technology - like humans - has its limits and is not failsafe. It is also equally true that the tech-empowered State is the only way forward, where new technologies like cloud computing, big data analytics and increased mobility will play the defining role in delivering welfare to the marginalised millions. All of them have one thing in common: they rely on the interaction among large public datasets that include everything from your bank information to biometrics.</p><p align="justify">This means that cyber threats don't just threaten our privacy or a State's; they threaten to disable the very architecture that seeks to deliver welfare. Also, the battle is no longer limited to a bunch of ingenious hackers against unsuspecting individuals, but is heading into a full-blown war with sustained and targeted attacks against nation states, where the right to privacy is collateral damage.</p><p align="justify">WikiLeaks, Edward Snowden and PRISM may have captured our imagination of late, but issues of surveillance and data privacy have been slow to take root in India. The country's efforts to build the world's largest biometric database under the Unique Identification (UID) project - and the fear mongering that has followed such intrusive data collection - makes it all the more crucial that the less-talked-about components in the new policy, like the creation of security awareness and stronger legal frameworks, are put in place at the earliest. India urgently needs a well-thought-out cyber security law to protect against the misuse of individual freedoms.</p><p align="justify">We also need to be prepared for that inevitable breach, where the role of regulatory mechanisms and legal checks and balances will become crucial. One of India's biggest problems is the lack of a stringently-imposed legal deterrence, which invites opportunists to break the law with impunity. This becomes all the more important while protecting the nation's critical data and information systems, as well as preserving the trust of over a billion citizens willing to surrender personal information at every turn.</p><p align="justify">But the government has signalled its willingness to at least open the doors to greater collaboration and proven wisdom, in securing these limits, and the constant allusion to public-private partnerships in the new policy is refreshing, as is the preference for open standards. A corollary to this is that though the policy displays a preference for indigenisation, it does not harp on it.</p><p align="justify">Unfortunately, the price we must pay for having the world at our fingertips is knowing that someone from that world will always be tempted to sneak a peek. Being part of the global commons makes cyberspace a particularly challenging environment to draw boundaries in, and some might criticise the government for not adequately addressing these concerns. Well, here's one thing we should be clear about: other countries have absolutely no obligation to respect Indian citizens' right to privacy, especially when it comes to 'national security' concerns. But the Indian government does. Let's also bear in mind that the limits of this obligation will always be hazy, whether we like it or not.</p><p align="justify">In the end, no policy can guard us against the abuse of discretion. That is the new normal. Next time, I'll remember to password-lock my iPad.</p><p align="justify"><em>Preeti Singh is editor, iGovernment.in at 9.9 Media </em></p>', 'lang' => 'English', 'SITE_URL' => 'https://im4change.in/', 'site_title' => 'im4change', 'adminprix' => 'admin' ] $article_current = object(App\Model\Entity\Article) { 'id' => (int) 21673, 'title' => 'Cyber insecurity is the new normal -Preeti Singh', 'subheading' => '', 'description' => '<div align="justify"> -The Hindustan Times </div> <p align="justify"> <br /> A couple of months ago, I was in South Block for a meeting at the ministry of defence. Security norms dictate leaving mobile and electronic devices at the checkpoint. Imagine my horror when I came back an hour later to see one of the guards going through my iPad. This cavalier attitude towards individual privacy is illustrative of an interesting dilemma between the inevitability of a more intrusive State and its obligation to protect the privacy of its citizens. </p> <p align="justify"> India has unveiled a new National Cyber Security Policy to deal with growing cyber threats. It will be interesting to see the efficacy with which these intentions are translated into preparing the country for a new global normal. In this inextricably connected world, technology - like humans - has its limits and is not failsafe. It is also equally true that the tech-empowered State is the only way forward, where new technologies like cloud computing, big data analytics and increased mobility will play the defining role in delivering welfare to the marginalised millions. All of them have one thing in common: they rely on the interaction among large public datasets that include everything from your bank information to biometrics. </p> <p align="justify"> This means that cyber threats don't just threaten our privacy or a State's; they threaten to disable the very architecture that seeks to deliver welfare. Also, the battle is no longer limited to a bunch of ingenious hackers against unsuspecting individuals, but is heading into a full-blown war with sustained and targeted attacks against nation states, where the right to privacy is collateral damage. </p> <p align="justify"> WikiLeaks, Edward Snowden and PRISM may have captured our imagination of late, but issues of surveillance and data privacy have been slow to take root in India. The country's efforts to build the world's largest biometric database under the Unique Identification (UID) project - and the fear mongering that has followed such intrusive data collection - makes it all the more crucial that the less-talked-about components in the new policy, like the creation of security awareness and stronger legal frameworks, are put in place at the earliest. India urgently needs a well-thought-out cyber security law to protect against the misuse of individual freedoms. </p> <p align="justify"> We also need to be prepared for that inevitable breach, where the role of regulatory mechanisms and legal checks and balances will become crucial. One of India's biggest problems is the lack of a stringently-imposed legal deterrence, which invites opportunists to break the law with impunity. This becomes all the more important while protecting the nation's critical data and information systems, as well as preserving the trust of over a billion citizens willing to surrender personal information at every turn. </p> <p align="justify"> But the government has signalled its willingness to at least open the doors to greater collaboration and proven wisdom, in securing these limits, and the constant allusion to public-private partnerships in the new policy is refreshing, as is the preference for open standards. A corollary to this is that though the policy displays a preference for indigenisation, it does not harp on it. </p> <p align="justify"> Unfortunately, the price we must pay for having the world at our fingertips is knowing that someone from that world will always be tempted to sneak a peek. Being part of the global commons makes cyberspace a particularly challenging environment to draw boundaries in, and some might criticise the government for not adequately addressing these concerns. Well, here's one thing we should be clear about: other countries have absolutely no obligation to respect Indian citizens' right to privacy, especially when it comes to 'national security' concerns. But the Indian government does. Let's also bear in mind that the limits of this obligation will always be hazy, whether we like it or not. </p> <p align="justify"> In the end, no policy can guard us against the abuse of discretion. That is the new normal. Next time, I'll remember to password-lock my iPad. </p> <p align="justify"> <em>Preeti Singh is editor, iGovernment.in at 9.9 Media </em> </p>', 'credit_writer' => 'The Hindustan Times, 5 July, 2013, http://www.hindustantimes.com/News-Feed/Columns/Cyber-insecurity-is-the-new-normal/Article1-1087834.aspx', 'article_img' => '', 'article_img_thumb' => '', 'status' => (int) 1, 'show_on_home' => (int) 1, 'lang' => 'EN', 'category_id' => (int) 16, 'tag_keyword' => '', 'seo_url' => 'cyber-insecurity-is-the-new-normal-preeti-singh-21820', 'meta_title' => null, 'meta_keywords' => null, 'meta_description' => null, 'noindex' => (int) 0, 'publish_date' => object(Cake\I18n\FrozenDate) {}, 'most_visit_section_id' => null, 'article_big_img' => null, 'liveid' => (int) 21820, 'created' => object(Cake\I18n\FrozenTime) {}, 'modified' => object(Cake\I18n\FrozenTime) {}, 'edate' => '', 'tags' => [ (int) 0 => object(Cake\ORM\Entity) {}, (int) 1 => object(Cake\ORM\Entity) {}, (int) 2 => object(Cake\ORM\Entity) {}, (int) 3 => object(Cake\ORM\Entity) {} ], 'category' => object(App\Model\Entity\Category) {}, '[new]' => false, '[accessible]' => [ '*' => true, 'id' => false ], '[dirty]' => [], '[original]' => [], '[virtual]' => [], '[hasErrors]' => false, '[errors]' => [], '[invalid]' => [], '[repository]' => 'Articles' } $articleid = (int) 21673 $metaTitle = 'LATEST NEWS UPDATES | Cyber insecurity is the new normal -Preeti Singh' $metaKeywords = 'E-Governance,internet,ICTs,Privacy' $metaDesc = ' -The Hindustan Times A couple of months ago, I was in South Block for a meeting at the ministry of defence. Security norms dictate leaving mobile and electronic devices at the checkpoint. Imagine my horror when I came back an hour...' $disp = '<div align="justify">-The Hindustan Times</div><p align="justify"><br />A couple of months ago, I was in South Block for a meeting at the ministry of defence. Security norms dictate leaving mobile and electronic devices at the checkpoint. Imagine my horror when I came back an hour later to see one of the guards going through my iPad. This cavalier attitude towards individual privacy is illustrative of an interesting dilemma between the inevitability of a more intrusive State and its obligation to protect the privacy of its citizens.</p><p align="justify">India has unveiled a new National Cyber Security Policy to deal with growing cyber threats. It will be interesting to see the efficacy with which these intentions are translated into preparing the country for a new global normal. In this inextricably connected world, technology - like humans - has its limits and is not failsafe. It is also equally true that the tech-empowered State is the only way forward, where new technologies like cloud computing, big data analytics and increased mobility will play the defining role in delivering welfare to the marginalised millions. All of them have one thing in common: they rely on the interaction among large public datasets that include everything from your bank information to biometrics.</p><p align="justify">This means that cyber threats don't just threaten our privacy or a State's; they threaten to disable the very architecture that seeks to deliver welfare. Also, the battle is no longer limited to a bunch of ingenious hackers against unsuspecting individuals, but is heading into a full-blown war with sustained and targeted attacks against nation states, where the right to privacy is collateral damage.</p><p align="justify">WikiLeaks, Edward Snowden and PRISM may have captured our imagination of late, but issues of surveillance and data privacy have been slow to take root in India. The country's efforts to build the world's largest biometric database under the Unique Identification (UID) project - and the fear mongering that has followed such intrusive data collection - makes it all the more crucial that the less-talked-about components in the new policy, like the creation of security awareness and stronger legal frameworks, are put in place at the earliest. India urgently needs a well-thought-out cyber security law to protect against the misuse of individual freedoms.</p><p align="justify">We also need to be prepared for that inevitable breach, where the role of regulatory mechanisms and legal checks and balances will become crucial. One of India's biggest problems is the lack of a stringently-imposed legal deterrence, which invites opportunists to break the law with impunity. This becomes all the more important while protecting the nation's critical data and information systems, as well as preserving the trust of over a billion citizens willing to surrender personal information at every turn.</p><p align="justify">But the government has signalled its willingness to at least open the doors to greater collaboration and proven wisdom, in securing these limits, and the constant allusion to public-private partnerships in the new policy is refreshing, as is the preference for open standards. A corollary to this is that though the policy displays a preference for indigenisation, it does not harp on it.</p><p align="justify">Unfortunately, the price we must pay for having the world at our fingertips is knowing that someone from that world will always be tempted to sneak a peek. Being part of the global commons makes cyberspace a particularly challenging environment to draw boundaries in, and some might criticise the government for not adequately addressing these concerns. Well, here's one thing we should be clear about: other countries have absolutely no obligation to respect Indian citizens' right to privacy, especially when it comes to 'national security' concerns. But the Indian government does. Let's also bear in mind that the limits of this obligation will always be hazy, whether we like it or not.</p><p align="justify">In the end, no policy can guard us against the abuse of discretion. That is the new normal. Next time, I'll remember to password-lock my iPad.</p><p align="justify"><em>Preeti Singh is editor, iGovernment.in at 9.9 Media </em></p>' $lang = 'English' $SITE_URL = 'https://im4change.in/' $site_title = 'im4change' $adminprix = 'admin'</pre><pre class="stack-trace">include - APP/Template/Layout/printlayout.ctp, line 8 Cake\View\View::_evaluate() - CORE/src/View/View.php, line 1413 Cake\View\View::_render() - CORE/src/View/View.php, line 1374 Cake\View\View::renderLayout() - CORE/src/View/View.php, line 927 Cake\View\View::render() - CORE/src/View/View.php, line 885 Cake\Controller\Controller::render() - CORE/src/Controller/Controller.php, line 791 Cake\Http\ActionDispatcher::_invoke() - CORE/src/Http/ActionDispatcher.php, line 126 Cake\Http\ActionDispatcher::dispatch() - CORE/src/Http/ActionDispatcher.php, line 94 Cake\Http\BaseApplication::__invoke() - CORE/src/Http/BaseApplication.php, line 235 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\RoutingMiddleware::__invoke() - CORE/src/Routing/Middleware/RoutingMiddleware.php, line 162 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\AssetMiddleware::__invoke() - CORE/src/Routing/Middleware/AssetMiddleware.php, line 88 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Error\Middleware\ErrorHandlerMiddleware::__invoke() - CORE/src/Error/Middleware/ErrorHandlerMiddleware.php, line 96 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Http\Runner::run() - CORE/src/Http/Runner.php, line 51</pre></div></pre>latest-news-updates/cyber-insecurity-is-the-new-normal-preeti-singh-21820.html"/> <meta http-equiv="Content-Type" content="text/html; charset=utf-8"/> <link href="https://im4change.in/css/control.css" rel="stylesheet" type="text/css" media="all"/> <title>LATEST NEWS UPDATES | Cyber insecurity is the new normal -Preeti Singh | Im4change.org</title> <meta name="description" content=" -The Hindustan Times A couple of months ago, I was in South Block for a meeting at the ministry of defence. Security norms dictate leaving mobile and electronic devices at the checkpoint. Imagine my horror when I came back an hour..."/> <script src="https://im4change.in/js/jquery-1.10.2.js"></script> <script type="text/javascript" src="https://im4change.in/js/jquery-migrate.min.js"></script> <script language="javascript" type="text/javascript"> $(document).ready(function () { var img = $("img")[0]; // Get my img elem var pic_real_width, pic_real_height; $("<img/>") // Make in memory copy of image to avoid css issues .attr("src", $(img).attr("src")) .load(function () { pic_real_width = this.width; // Note: $(this).width() will not pic_real_height = this.height; // work for in memory images. }); }); </script> <style type="text/css"> @media screen { div.divFooter { display: block; } } @media print { .printbutton { display: none !important; } } </style> </head> <body> <table cellpadding="0" cellspacing="0" border="0" width="98%" align="center"> <tr> <td class="top_bg"> <div class="divFooter"> <img src="https://im4change.in/images/logo1.jpg" height="59" border="0" alt="Resource centre on India's rural distress" style="padding-top:14px;"/> </div> </td> </tr> <tr> <td id="topspace"> </td> </tr> <tr id="topspace"> <td> </td> </tr> <tr> <td height="50" style="border-bottom:1px solid #000; padding-top:10px;" class="printbutton"> <form><input type="button" value=" Print this page " onclick="window.print();return false;"/></form> </td> </tr> <tr> <td width="100%"> <h1 class="news_headlines" style="font-style:normal"> <strong>Cyber insecurity is the new normal -Preeti Singh</strong></h1> </td> </tr> <tr> <td width="100%" style="font-family:Arial, 'Segoe Script', 'Segoe UI', sans-serif, serif"><font size="3"> <div align="justify">-The Hindustan Times</div><p align="justify"><br />A couple of months ago, I was in South Block for a meeting at the ministry of defence. Security norms dictate leaving mobile and electronic devices at the checkpoint. Imagine my horror when I came back an hour later to see one of the guards going through my iPad. This cavalier attitude towards individual privacy is illustrative of an interesting dilemma between the inevitability of a more intrusive State and its obligation to protect the privacy of its citizens.</p><p align="justify">India has unveiled a new National Cyber Security Policy to deal with growing cyber threats. It will be interesting to see the efficacy with which these intentions are translated into preparing the country for a new global normal. In this inextricably connected world, technology - like humans - has its limits and is not failsafe. It is also equally true that the tech-empowered State is the only way forward, where new technologies like cloud computing, big data analytics and increased mobility will play the defining role in delivering welfare to the marginalised millions. All of them have one thing in common: they rely on the interaction among large public datasets that include everything from your bank information to biometrics.</p><p align="justify">This means that cyber threats don't just threaten our privacy or a State's; they threaten to disable the very architecture that seeks to deliver welfare. Also, the battle is no longer limited to a bunch of ingenious hackers against unsuspecting individuals, but is heading into a full-blown war with sustained and targeted attacks against nation states, where the right to privacy is collateral damage.</p><p align="justify">WikiLeaks, Edward Snowden and PRISM may have captured our imagination of late, but issues of surveillance and data privacy have been slow to take root in India. The country's efforts to build the world's largest biometric database under the Unique Identification (UID) project - and the fear mongering that has followed such intrusive data collection - makes it all the more crucial that the less-talked-about components in the new policy, like the creation of security awareness and stronger legal frameworks, are put in place at the earliest. India urgently needs a well-thought-out cyber security law to protect against the misuse of individual freedoms.</p><p align="justify">We also need to be prepared for that inevitable breach, where the role of regulatory mechanisms and legal checks and balances will become crucial. One of India's biggest problems is the lack of a stringently-imposed legal deterrence, which invites opportunists to break the law with impunity. This becomes all the more important while protecting the nation's critical data and information systems, as well as preserving the trust of over a billion citizens willing to surrender personal information at every turn.</p><p align="justify">But the government has signalled its willingness to at least open the doors to greater collaboration and proven wisdom, in securing these limits, and the constant allusion to public-private partnerships in the new policy is refreshing, as is the preference for open standards. A corollary to this is that though the policy displays a preference for indigenisation, it does not harp on it.</p><p align="justify">Unfortunately, the price we must pay for having the world at our fingertips is knowing that someone from that world will always be tempted to sneak a peek. Being part of the global commons makes cyberspace a particularly challenging environment to draw boundaries in, and some might criticise the government for not adequately addressing these concerns. Well, here's one thing we should be clear about: other countries have absolutely no obligation to respect Indian citizens' right to privacy, especially when it comes to 'national security' concerns. But the Indian government does. Let's also bear in mind that the limits of this obligation will always be hazy, whether we like it or not.</p><p align="justify">In the end, no policy can guard us against the abuse of discretion. That is the new normal. Next time, I'll remember to password-lock my iPad.</p><p align="justify"><em>Preeti Singh is editor, iGovernment.in at 9.9 Media </em></p> </font> </td> </tr> <tr> <td> </td> </tr> <tr> <td height="50" style="border-top:1px solid #000; border-bottom:1px solid #000;padding-top:10px;"> <form><input type="button" value=" Print this page " onclick="window.print();return false;"/></form> </td> </tr> </table></body> </html>' } $cookies = [] $values = [ (int) 0 => 'text/html; charset=UTF-8' ] $name = 'Content-Type' $first = true $value = 'text/html; charset=UTF-8'header - [internal], line ?? Cake\Http\ResponseEmitter::emitHeaders() - CORE/src/Http/ResponseEmitter.php, line 181 Cake\Http\ResponseEmitter::emit() - CORE/src/Http/ResponseEmitter.php, line 55 Cake\Http\Server::emit() - CORE/src/Http/Server.php, line 141 [main] - ROOT/webroot/index.php, line 39
<head>
<link rel="canonical" href="<?php echo Configure::read('SITE_URL'); ?><?php echo $urlPrefix;?><?php echo $article_current->category->slug; ?>/<?php echo $article_current->seo_url; ?>.html"/>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8"/>
$viewFile = '/home/brlfuser/public_html/src/Template/Layout/printlayout.ctp' $dataForView = [ 'article_current' => object(App\Model\Entity\Article) { 'id' => (int) 21673, 'title' => 'Cyber insecurity is the new normal -Preeti Singh', 'subheading' => '', 'description' => '<div align="justify"> -The Hindustan Times </div> <p align="justify"> <br /> A couple of months ago, I was in South Block for a meeting at the ministry of defence. Security norms dictate leaving mobile and electronic devices at the checkpoint. Imagine my horror when I came back an hour later to see one of the guards going through my iPad. This cavalier attitude towards individual privacy is illustrative of an interesting dilemma between the inevitability of a more intrusive State and its obligation to protect the privacy of its citizens. </p> <p align="justify"> India has unveiled a new National Cyber Security Policy to deal with growing cyber threats. It will be interesting to see the efficacy with which these intentions are translated into preparing the country for a new global normal. In this inextricably connected world, technology - like humans - has its limits and is not failsafe. It is also equally true that the tech-empowered State is the only way forward, where new technologies like cloud computing, big data analytics and increased mobility will play the defining role in delivering welfare to the marginalised millions. All of them have one thing in common: they rely on the interaction among large public datasets that include everything from your bank information to biometrics. </p> <p align="justify"> This means that cyber threats don't just threaten our privacy or a State's; they threaten to disable the very architecture that seeks to deliver welfare. Also, the battle is no longer limited to a bunch of ingenious hackers against unsuspecting individuals, but is heading into a full-blown war with sustained and targeted attacks against nation states, where the right to privacy is collateral damage. </p> <p align="justify"> WikiLeaks, Edward Snowden and PRISM may have captured our imagination of late, but issues of surveillance and data privacy have been slow to take root in India. The country's efforts to build the world's largest biometric database under the Unique Identification (UID) project - and the fear mongering that has followed such intrusive data collection - makes it all the more crucial that the less-talked-about components in the new policy, like the creation of security awareness and stronger legal frameworks, are put in place at the earliest. India urgently needs a well-thought-out cyber security law to protect against the misuse of individual freedoms. </p> <p align="justify"> We also need to be prepared for that inevitable breach, where the role of regulatory mechanisms and legal checks and balances will become crucial. One of India's biggest problems is the lack of a stringently-imposed legal deterrence, which invites opportunists to break the law with impunity. This becomes all the more important while protecting the nation's critical data and information systems, as well as preserving the trust of over a billion citizens willing to surrender personal information at every turn. </p> <p align="justify"> But the government has signalled its willingness to at least open the doors to greater collaboration and proven wisdom, in securing these limits, and the constant allusion to public-private partnerships in the new policy is refreshing, as is the preference for open standards. A corollary to this is that though the policy displays a preference for indigenisation, it does not harp on it. </p> <p align="justify"> Unfortunately, the price we must pay for having the world at our fingertips is knowing that someone from that world will always be tempted to sneak a peek. Being part of the global commons makes cyberspace a particularly challenging environment to draw boundaries in, and some might criticise the government for not adequately addressing these concerns. Well, here's one thing we should be clear about: other countries have absolutely no obligation to respect Indian citizens' right to privacy, especially when it comes to 'national security' concerns. But the Indian government does. Let's also bear in mind that the limits of this obligation will always be hazy, whether we like it or not. </p> <p align="justify"> In the end, no policy can guard us against the abuse of discretion. That is the new normal. Next time, I'll remember to password-lock my iPad. </p> <p align="justify"> <em>Preeti Singh is editor, iGovernment.in at 9.9 Media </em> </p>', 'credit_writer' => 'The Hindustan Times, 5 July, 2013, http://www.hindustantimes.com/News-Feed/Columns/Cyber-insecurity-is-the-new-normal/Article1-1087834.aspx', 'article_img' => '', 'article_img_thumb' => '', 'status' => (int) 1, 'show_on_home' => (int) 1, 'lang' => 'EN', 'category_id' => (int) 16, 'tag_keyword' => '', 'seo_url' => 'cyber-insecurity-is-the-new-normal-preeti-singh-21820', 'meta_title' => null, 'meta_keywords' => null, 'meta_description' => null, 'noindex' => (int) 0, 'publish_date' => object(Cake\I18n\FrozenDate) {}, 'most_visit_section_id' => null, 'article_big_img' => null, 'liveid' => (int) 21820, 'created' => object(Cake\I18n\FrozenTime) {}, 'modified' => object(Cake\I18n\FrozenTime) {}, 'edate' => '', 'tags' => [ [maximum depth reached] ], 'category' => object(App\Model\Entity\Category) {}, '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[hasErrors]' => false, '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'Articles' }, 'articleid' => (int) 21673, 'metaTitle' => 'LATEST NEWS UPDATES | Cyber insecurity is the new normal -Preeti Singh', 'metaKeywords' => 'E-Governance,internet,ICTs,Privacy', 'metaDesc' => ' -The Hindustan Times A couple of months ago, I was in South Block for a meeting at the ministry of defence. Security norms dictate leaving mobile and electronic devices at the checkpoint. Imagine my horror when I came back an hour...', 'disp' => '<div align="justify">-The Hindustan Times</div><p align="justify"><br />A couple of months ago, I was in South Block for a meeting at the ministry of defence. Security norms dictate leaving mobile and electronic devices at the checkpoint. Imagine my horror when I came back an hour later to see one of the guards going through my iPad. This cavalier attitude towards individual privacy is illustrative of an interesting dilemma between the inevitability of a more intrusive State and its obligation to protect the privacy of its citizens.</p><p align="justify">India has unveiled a new National Cyber Security Policy to deal with growing cyber threats. It will be interesting to see the efficacy with which these intentions are translated into preparing the country for a new global normal. In this inextricably connected world, technology - like humans - has its limits and is not failsafe. It is also equally true that the tech-empowered State is the only way forward, where new technologies like cloud computing, big data analytics and increased mobility will play the defining role in delivering welfare to the marginalised millions. All of them have one thing in common: they rely on the interaction among large public datasets that include everything from your bank information to biometrics.</p><p align="justify">This means that cyber threats don't just threaten our privacy or a State's; they threaten to disable the very architecture that seeks to deliver welfare. Also, the battle is no longer limited to a bunch of ingenious hackers against unsuspecting individuals, but is heading into a full-blown war with sustained and targeted attacks against nation states, where the right to privacy is collateral damage.</p><p align="justify">WikiLeaks, Edward Snowden and PRISM may have captured our imagination of late, but issues of surveillance and data privacy have been slow to take root in India. The country's efforts to build the world's largest biometric database under the Unique Identification (UID) project - and the fear mongering that has followed such intrusive data collection - makes it all the more crucial that the less-talked-about components in the new policy, like the creation of security awareness and stronger legal frameworks, are put in place at the earliest. India urgently needs a well-thought-out cyber security law to protect against the misuse of individual freedoms.</p><p align="justify">We also need to be prepared for that inevitable breach, where the role of regulatory mechanisms and legal checks and balances will become crucial. One of India's biggest problems is the lack of a stringently-imposed legal deterrence, which invites opportunists to break the law with impunity. This becomes all the more important while protecting the nation's critical data and information systems, as well as preserving the trust of over a billion citizens willing to surrender personal information at every turn.</p><p align="justify">But the government has signalled its willingness to at least open the doors to greater collaboration and proven wisdom, in securing these limits, and the constant allusion to public-private partnerships in the new policy is refreshing, as is the preference for open standards. A corollary to this is that though the policy displays a preference for indigenisation, it does not harp on it.</p><p align="justify">Unfortunately, the price we must pay for having the world at our fingertips is knowing that someone from that world will always be tempted to sneak a peek. Being part of the global commons makes cyberspace a particularly challenging environment to draw boundaries in, and some might criticise the government for not adequately addressing these concerns. Well, here's one thing we should be clear about: other countries have absolutely no obligation to respect Indian citizens' right to privacy, especially when it comes to 'national security' concerns. But the Indian government does. Let's also bear in mind that the limits of this obligation will always be hazy, whether we like it or not.</p><p align="justify">In the end, no policy can guard us against the abuse of discretion. That is the new normal. Next time, I'll remember to password-lock my iPad.</p><p align="justify"><em>Preeti Singh is editor, iGovernment.in at 9.9 Media </em></p>', 'lang' => 'English', 'SITE_URL' => 'https://im4change.in/', 'site_title' => 'im4change', 'adminprix' => 'admin' ] $article_current = object(App\Model\Entity\Article) { 'id' => (int) 21673, 'title' => 'Cyber insecurity is the new normal -Preeti Singh', 'subheading' => '', 'description' => '<div align="justify"> -The Hindustan Times </div> <p align="justify"> <br /> A couple of months ago, I was in South Block for a meeting at the ministry of defence. Security norms dictate leaving mobile and electronic devices at the checkpoint. Imagine my horror when I came back an hour later to see one of the guards going through my iPad. This cavalier attitude towards individual privacy is illustrative of an interesting dilemma between the inevitability of a more intrusive State and its obligation to protect the privacy of its citizens. </p> <p align="justify"> India has unveiled a new National Cyber Security Policy to deal with growing cyber threats. It will be interesting to see the efficacy with which these intentions are translated into preparing the country for a new global normal. In this inextricably connected world, technology - like humans - has its limits and is not failsafe. It is also equally true that the tech-empowered State is the only way forward, where new technologies like cloud computing, big data analytics and increased mobility will play the defining role in delivering welfare to the marginalised millions. All of them have one thing in common: they rely on the interaction among large public datasets that include everything from your bank information to biometrics. </p> <p align="justify"> This means that cyber threats don't just threaten our privacy or a State's; they threaten to disable the very architecture that seeks to deliver welfare. Also, the battle is no longer limited to a bunch of ingenious hackers against unsuspecting individuals, but is heading into a full-blown war with sustained and targeted attacks against nation states, where the right to privacy is collateral damage. </p> <p align="justify"> WikiLeaks, Edward Snowden and PRISM may have captured our imagination of late, but issues of surveillance and data privacy have been slow to take root in India. The country's efforts to build the world's largest biometric database under the Unique Identification (UID) project - and the fear mongering that has followed such intrusive data collection - makes it all the more crucial that the less-talked-about components in the new policy, like the creation of security awareness and stronger legal frameworks, are put in place at the earliest. India urgently needs a well-thought-out cyber security law to protect against the misuse of individual freedoms. </p> <p align="justify"> We also need to be prepared for that inevitable breach, where the role of regulatory mechanisms and legal checks and balances will become crucial. One of India's biggest problems is the lack of a stringently-imposed legal deterrence, which invites opportunists to break the law with impunity. This becomes all the more important while protecting the nation's critical data and information systems, as well as preserving the trust of over a billion citizens willing to surrender personal information at every turn. </p> <p align="justify"> But the government has signalled its willingness to at least open the doors to greater collaboration and proven wisdom, in securing these limits, and the constant allusion to public-private partnerships in the new policy is refreshing, as is the preference for open standards. A corollary to this is that though the policy displays a preference for indigenisation, it does not harp on it. </p> <p align="justify"> Unfortunately, the price we must pay for having the world at our fingertips is knowing that someone from that world will always be tempted to sneak a peek. Being part of the global commons makes cyberspace a particularly challenging environment to draw boundaries in, and some might criticise the government for not adequately addressing these concerns. Well, here's one thing we should be clear about: other countries have absolutely no obligation to respect Indian citizens' right to privacy, especially when it comes to 'national security' concerns. But the Indian government does. Let's also bear in mind that the limits of this obligation will always be hazy, whether we like it or not. </p> <p align="justify"> In the end, no policy can guard us against the abuse of discretion. That is the new normal. Next time, I'll remember to password-lock my iPad. </p> <p align="justify"> <em>Preeti Singh is editor, iGovernment.in at 9.9 Media </em> </p>', 'credit_writer' => 'The Hindustan Times, 5 July, 2013, http://www.hindustantimes.com/News-Feed/Columns/Cyber-insecurity-is-the-new-normal/Article1-1087834.aspx', 'article_img' => '', 'article_img_thumb' => '', 'status' => (int) 1, 'show_on_home' => (int) 1, 'lang' => 'EN', 'category_id' => (int) 16, 'tag_keyword' => '', 'seo_url' => 'cyber-insecurity-is-the-new-normal-preeti-singh-21820', 'meta_title' => null, 'meta_keywords' => null, 'meta_description' => null, 'noindex' => (int) 0, 'publish_date' => object(Cake\I18n\FrozenDate) {}, 'most_visit_section_id' => null, 'article_big_img' => null, 'liveid' => (int) 21820, 'created' => object(Cake\I18n\FrozenTime) {}, 'modified' => object(Cake\I18n\FrozenTime) {}, 'edate' => '', 'tags' => [ (int) 0 => object(Cake\ORM\Entity) {}, (int) 1 => object(Cake\ORM\Entity) {}, (int) 2 => object(Cake\ORM\Entity) {}, (int) 3 => object(Cake\ORM\Entity) {} ], 'category' => object(App\Model\Entity\Category) {}, '[new]' => false, '[accessible]' => [ '*' => true, 'id' => false ], '[dirty]' => [], '[original]' => [], '[virtual]' => [], '[hasErrors]' => false, '[errors]' => [], '[invalid]' => [], '[repository]' => 'Articles' } $articleid = (int) 21673 $metaTitle = 'LATEST NEWS UPDATES | Cyber insecurity is the new normal -Preeti Singh' $metaKeywords = 'E-Governance,internet,ICTs,Privacy' $metaDesc = ' -The Hindustan Times A couple of months ago, I was in South Block for a meeting at the ministry of defence. Security norms dictate leaving mobile and electronic devices at the checkpoint. Imagine my horror when I came back an hour...' $disp = '<div align="justify">-The Hindustan Times</div><p align="justify"><br />A couple of months ago, I was in South Block for a meeting at the ministry of defence. Security norms dictate leaving mobile and electronic devices at the checkpoint. Imagine my horror when I came back an hour later to see one of the guards going through my iPad. This cavalier attitude towards individual privacy is illustrative of an interesting dilemma between the inevitability of a more intrusive State and its obligation to protect the privacy of its citizens.</p><p align="justify">India has unveiled a new National Cyber Security Policy to deal with growing cyber threats. It will be interesting to see the efficacy with which these intentions are translated into preparing the country for a new global normal. In this inextricably connected world, technology - like humans - has its limits and is not failsafe. It is also equally true that the tech-empowered State is the only way forward, where new technologies like cloud computing, big data analytics and increased mobility will play the defining role in delivering welfare to the marginalised millions. All of them have one thing in common: they rely on the interaction among large public datasets that include everything from your bank information to biometrics.</p><p align="justify">This means that cyber threats don't just threaten our privacy or a State's; they threaten to disable the very architecture that seeks to deliver welfare. Also, the battle is no longer limited to a bunch of ingenious hackers against unsuspecting individuals, but is heading into a full-blown war with sustained and targeted attacks against nation states, where the right to privacy is collateral damage.</p><p align="justify">WikiLeaks, Edward Snowden and PRISM may have captured our imagination of late, but issues of surveillance and data privacy have been slow to take root in India. The country's efforts to build the world's largest biometric database under the Unique Identification (UID) project - and the fear mongering that has followed such intrusive data collection - makes it all the more crucial that the less-talked-about components in the new policy, like the creation of security awareness and stronger legal frameworks, are put in place at the earliest. India urgently needs a well-thought-out cyber security law to protect against the misuse of individual freedoms.</p><p align="justify">We also need to be prepared for that inevitable breach, where the role of regulatory mechanisms and legal checks and balances will become crucial. One of India's biggest problems is the lack of a stringently-imposed legal deterrence, which invites opportunists to break the law with impunity. This becomes all the more important while protecting the nation's critical data and information systems, as well as preserving the trust of over a billion citizens willing to surrender personal information at every turn.</p><p align="justify">But the government has signalled its willingness to at least open the doors to greater collaboration and proven wisdom, in securing these limits, and the constant allusion to public-private partnerships in the new policy is refreshing, as is the preference for open standards. A corollary to this is that though the policy displays a preference for indigenisation, it does not harp on it.</p><p align="justify">Unfortunately, the price we must pay for having the world at our fingertips is knowing that someone from that world will always be tempted to sneak a peek. Being part of the global commons makes cyberspace a particularly challenging environment to draw boundaries in, and some might criticise the government for not adequately addressing these concerns. Well, here's one thing we should be clear about: other countries have absolutely no obligation to respect Indian citizens' right to privacy, especially when it comes to 'national security' concerns. But the Indian government does. Let's also bear in mind that the limits of this obligation will always be hazy, whether we like it or not.</p><p align="justify">In the end, no policy can guard us against the abuse of discretion. That is the new normal. Next time, I'll remember to password-lock my iPad.</p><p align="justify"><em>Preeti Singh is editor, iGovernment.in at 9.9 Media </em></p>' $lang = 'English' $SITE_URL = 'https://im4change.in/' $site_title = 'im4change' $adminprix = 'admin'
include - APP/Template/Layout/printlayout.ctp, line 8 Cake\View\View::_evaluate() - CORE/src/View/View.php, line 1413 Cake\View\View::_render() - CORE/src/View/View.php, line 1374 Cake\View\View::renderLayout() - CORE/src/View/View.php, line 927 Cake\View\View::render() - CORE/src/View/View.php, line 885 Cake\Controller\Controller::render() - CORE/src/Controller/Controller.php, line 791 Cake\Http\ActionDispatcher::_invoke() - CORE/src/Http/ActionDispatcher.php, line 126 Cake\Http\ActionDispatcher::dispatch() - CORE/src/Http/ActionDispatcher.php, line 94 Cake\Http\BaseApplication::__invoke() - CORE/src/Http/BaseApplication.php, line 235 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\RoutingMiddleware::__invoke() - CORE/src/Routing/Middleware/RoutingMiddleware.php, line 162 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\AssetMiddleware::__invoke() - CORE/src/Routing/Middleware/AssetMiddleware.php, line 88 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Error\Middleware\ErrorHandlerMiddleware::__invoke() - CORE/src/Error/Middleware/ErrorHandlerMiddleware.php, line 96 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Http\Runner::run() - CORE/src/Http/Runner.php, line 51
![]() |
Cyber insecurity is the new normal -Preeti Singh |
-The Hindustan Times
India has unveiled a new National Cyber Security Policy to deal with growing cyber threats. It will be interesting to see the efficacy with which these intentions are translated into preparing the country for a new global normal. In this inextricably connected world, technology - like humans - has its limits and is not failsafe. It is also equally true that the tech-empowered State is the only way forward, where new technologies like cloud computing, big data analytics and increased mobility will play the defining role in delivering welfare to the marginalised millions. All of them have one thing in common: they rely on the interaction among large public datasets that include everything from your bank information to biometrics. This means that cyber threats don't just threaten our privacy or a State's; they threaten to disable the very architecture that seeks to deliver welfare. Also, the battle is no longer limited to a bunch of ingenious hackers against unsuspecting individuals, but is heading into a full-blown war with sustained and targeted attacks against nation states, where the right to privacy is collateral damage. WikiLeaks, Edward Snowden and PRISM may have captured our imagination of late, but issues of surveillance and data privacy have been slow to take root in India. The country's efforts to build the world's largest biometric database under the Unique Identification (UID) project - and the fear mongering that has followed such intrusive data collection - makes it all the more crucial that the less-talked-about components in the new policy, like the creation of security awareness and stronger legal frameworks, are put in place at the earliest. India urgently needs a well-thought-out cyber security law to protect against the misuse of individual freedoms. We also need to be prepared for that inevitable breach, where the role of regulatory mechanisms and legal checks and balances will become crucial. One of India's biggest problems is the lack of a stringently-imposed legal deterrence, which invites opportunists to break the law with impunity. This becomes all the more important while protecting the nation's critical data and information systems, as well as preserving the trust of over a billion citizens willing to surrender personal information at every turn. But the government has signalled its willingness to at least open the doors to greater collaboration and proven wisdom, in securing these limits, and the constant allusion to public-private partnerships in the new policy is refreshing, as is the preference for open standards. A corollary to this is that though the policy displays a preference for indigenisation, it does not harp on it. Unfortunately, the price we must pay for having the world at our fingertips is knowing that someone from that world will always be tempted to sneak a peek. Being part of the global commons makes cyberspace a particularly challenging environment to draw boundaries in, and some might criticise the government for not adequately addressing these concerns. Well, here's one thing we should be clear about: other countries have absolutely no obligation to respect Indian citizens' right to privacy, especially when it comes to 'national security' concerns. But the Indian government does. Let's also bear in mind that the limits of this obligation will always be hazy, whether we like it or not. In the end, no policy can guard us against the abuse of discretion. That is the new normal. Next time, I'll remember to password-lock my iPad. Preeti Singh is editor, iGovernment.in at 9.9 Media |