Important Notice For All J&K Govt Employees, Check Here
Government Implements Measures to Prevent Unauthorized Access to Sensitive Data
Srinagar, Oct 24: In a bid to uphold information security and data protection, the Government of Jammu and Kashmir has issued a directive regarding unauthorized access to sensitive data by officials.
The government emphasizes that unauthorized access to confidential information is a violation of existing IT rules and is subject to legal consequences under the IT Act of 2000.
The circular issued by the administration highlights the need to maintain the security and confidentiality of sensitive official data, in accordance with data protection regulations outlined in the IT Act of 2000 and the Information Technology Security Guidelines established by the Ministry of Electronics and Information Technology, Government of India.
Unauthorized access encompasses activities such as viewing, copying, sharing, or disseminating sensitive data without proper authorization.
Unauthorized access to sensitive data is treated as a penal offense under the IT Act of 2000. Those found in breach of these rules will face disciplinary and legal action under relevant legal provisions.
To prevent such incidents, all officers and officials using the e-office platform are strictly prohibited from accessing sensitive data without explicit authorization from the designated authority.
Departments are urged to conduct audits to detect sensitive events and patterns that indicate fraudulent or unauthorized data access, proceeding with legal action as required. Furthermore, officers and officials who have been transferred or no longer require access to e-office must not retain access to their previous accounts. Departments are instructed to inform the Information Technology Department promptly to facilitate the deactivation of accounts in such cases.
The Information Technology Department will promptly block access to e-office for these officers and officials in their previous offices or places of posting. In addition, each department must designate a Nodal officer to liaise with the Information Technology Department for closing or suspending accounts of officers or officials due to transfers or superannuation.
The Information Technology Department will implement procedures for Users Accounts Management, Data Resource Protection, and Sensitive System Protection, aligned with the IT Act, and will submit monthly reports regarding unauthorized access to the General Administration Department.
This move by the government reflects its commitment to enhancing data security and ensuring compliance with IT regulations to protect sensitive information.