<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cyber Threats Archives - Bhatt &amp; Joshi Associates</title>
	<atom:link href="https://old.bhattandjoshiassociates.com/tag/cyber-threats/feed/" rel="self" type="application/rss+xml" />
	<link>https://old.bhattandjoshiassociates.com/tag/cyber-threats/</link>
	<description></description>
	<lastBuildDate>Fri, 21 Mar 2025 12:37:20 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.5.7</generator>
	<item>
		<title>Non-Kinetic Warfare: Legal Framework and International Implications</title>
		<link>https://old.bhattandjoshiassociates.com/non-kinetic-warfare-legal-framework-and-international-implications/</link>
		
		<dc:creator><![CDATA[Harshika Mehta]]></dc:creator>
		<pubDate>Thu, 13 Mar 2025 08:25:02 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Geopolitical]]></category>
		<category><![CDATA[International Law]]></category>
		<category><![CDATA[National Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Cyber Threats]]></category>
		<category><![CDATA[Cyber Warfare]]></category>
		<category><![CDATA[Global Security]]></category>
		<category><![CDATA[Hybrid Warfare]]></category>
		<category><![CDATA[Legal Framework]]></category>
		<category><![CDATA[Non Kinetic Warfare]]></category>
		<guid isPermaLink="false">https://bhattandjoshiassociates.com/?p=24795</guid>

					<description><![CDATA[<p><img data-tf-not-load="1" fetchpriority="high" loading="auto" decoding="auto" width="1200" height="628" src="https://old.bhattandjoshiassociates.com/wp-content/uploads/2025/03/non-kinetic-warfare-legal-framework-and-international-implications.png" class="attachment-full size-full wp-post-image" alt="Non-Kinetic Warfare: Legal Framework and International Implications" decoding="async" fetchpriority="high" srcset="https://old.bhattandjoshiassociates.com/wp-content/uploads/2025/03/non-kinetic-warfare-legal-framework-and-international-implications.png 1200w, https://old.bhattandjoshiassociates.com/wp-content/uploads/2025/03/non-kinetic-warfare-legal-framework-and-international-implications-1030x539-300x157.png 300w, https://old.bhattandjoshiassociates.com/wp-content/uploads/2025/03/non-kinetic-warfare-legal-framework-and-international-implications-1030x539.png 1030w, https://old.bhattandjoshiassociates.com/wp-content/uploads/2025/03/non-kinetic-warfare-legal-framework-and-international-implications-768x402.png 768w" sizes="(max-width: 1200px) 100vw, 1200px" /></p>
<p>Introduction In the modern era of conflict, the paradigm of warfare has expanded far beyond the traditional battlefield. Non-kinetic warfare, encompassing methods such as cyberattacks, economic sanctions, information warfare, and psychological operations, has emerged as a significant dimension of contemporary conflicts. This form of warfare does not rely on direct physical force but instead leverages [&#8230;]</p>
<p>The post <a href="https://old.bhattandjoshiassociates.com/non-kinetic-warfare-legal-framework-and-international-implications/">Non-Kinetic Warfare: Legal Framework and International Implications</a> appeared first on <a href="https://old.bhattandjoshiassociates.com">Bhatt &amp; Joshi Associates</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img data-tf-not-load="1" width="1200" height="628" src="https://old.bhattandjoshiassociates.com/wp-content/uploads/2025/03/non-kinetic-warfare-legal-framework-and-international-implications.png" class="attachment-full size-full wp-post-image" alt="Non-Kinetic Warfare: Legal Framework and International Implications" decoding="async" srcset="https://old.bhattandjoshiassociates.com/wp-content/uploads/2025/03/non-kinetic-warfare-legal-framework-and-international-implications.png 1200w, https://old.bhattandjoshiassociates.com/wp-content/uploads/2025/03/non-kinetic-warfare-legal-framework-and-international-implications-1030x539-300x157.png 300w, https://old.bhattandjoshiassociates.com/wp-content/uploads/2025/03/non-kinetic-warfare-legal-framework-and-international-implications-1030x539.png 1030w, https://old.bhattandjoshiassociates.com/wp-content/uploads/2025/03/non-kinetic-warfare-legal-framework-and-international-implications-768x402.png 768w" sizes="(max-width: 1200px) 100vw, 1200px" /></p><div id="bsf_rt_marker"></div><h2><img loading="lazy" decoding="async" class="alignright size-full wp-image-24796" src="https://bhattandjoshiassociates.com/wp-content/uploads/2025/03/non-kinetic-warfare-legal-framework-and-international-implications.png" alt="Non-Kinetic Warfare: Legal Framework and International Implications" width="1200" height="628" srcset="https://old.bhattandjoshiassociates.com/wp-content/uploads/2025/03/non-kinetic-warfare-legal-framework-and-international-implications.png 1200w, https://old.bhattandjoshiassociates.com/wp-content/uploads/2025/03/non-kinetic-warfare-legal-framework-and-international-implications-1030x539-300x157.png 300w, https://old.bhattandjoshiassociates.com/wp-content/uploads/2025/03/non-kinetic-warfare-legal-framework-and-international-implications-1030x539.png 1030w, https://old.bhattandjoshiassociates.com/wp-content/uploads/2025/03/non-kinetic-warfare-legal-framework-and-international-implications-768x402.png 768w" sizes="(max-width: 1200px) 100vw, 1200px" /></h2>
<h2><b>Introduction</b></h2>
<p><span style="font-weight: 400;">In the modern era of conflict, the paradigm of warfare has expanded far beyond the traditional battlefield. Non-kinetic warfare, encompassing methods such as cyberattacks, economic sanctions, information warfare, and psychological operations, has emerged as a significant dimension of contemporary conflicts. This form of warfare does not rely on direct physical force but instead leverages technology, information, and influence to achieve strategic objectives. While non-kinetic warfare offers novel opportunities for states and non-state actors, it also presents complex legal and ethical challenges. This article explores the legal frameworks governing non-kinetic warfare, delves into its evolving dynamics, and examines its international implications.</span></p>
<h2><b>Understanding Non-Kinetic Warfare</b></h2>
<p><span style="font-weight: 400;">Non-kinetic warfare refers to strategies and tactics that achieve objectives without the direct use of physical force. It includes cyber warfare, electronic warfare, economic measures, propaganda, disinformation campaigns, and other methods aimed at undermining an adversary&#8217;s capabilities or resolve. Unlike traditional kinetic warfare, which relies on physical destruction and military engagement, non-kinetic warfare focuses on influencing perceptions, decision-making processes, and systems.</span></p>
<p><span style="font-weight: 400;">The rise of non-kinetic warfare is closely tied to technological advancements and globalization. The interconnected nature of the modern world makes it possible to target financial systems, communication networks, and societal cohesion without crossing physical borders. This shift has raised questions about the applicability of existing legal frameworks designed for conventional warfare. The asymmetry of non-kinetic warfare also empowers smaller states and non-state actors to challenge more powerful adversaries, altering the balance of power in international relations.</span></p>
<h2><b>Legal Framework Governing Non-Kinetic Warfare</b></h2>
<h3><b>International Humanitarian Law (IHL)</b></h3>
<p><span style="font-weight: 400;">International Humanitarian Law, also known as the law of armed conflict, primarily governs kinetic warfare. However, its principles also extend to certain aspects of non-kinetic warfare. IHL is grounded in treaties such as the Geneva Conventions and their Additional Protocols, which aim to protect civilians and limit the methods and means of warfare. These principles provide a foundation for assessing the legality of non-kinetic operations.</span></p>
<p><span style="font-weight: 400;">For example, cyber operations that result in physical damage, loss of life, or the disruption of essential services could fall under the scope of IHL. The Tallinn Manual on the International Law Applicable to Cyber Warfare, developed by legal and military experts, provides guidance on applying IHL principles to cyber operations. It emphasizes that the principles of distinction, proportionality, and necessity apply to cyberattacks during armed conflict. For instance, a cyber operation targeting a power grid that causes widespread harm to civilians could be deemed a violation of IHL. The manual underscores that the intentional targeting of civilian infrastructure is prohibited, regardless of the method employed.</span></p>
<h3><b>United Nations Charter</b></h3>
<p><span style="font-weight: 400;">The United Nations Charter is a cornerstone of international law that regulates the use of force. Article 2(4) prohibits the threat or use of force against the territorial integrity or political independence of any state. While this provision was initially framed with kinetic warfare in mind, it has been interpreted to include certain forms of non-kinetic warfare.</span></p>
<p><span style="font-weight: 400;">For instance, a large-scale cyberattack causing significant economic or infrastructural damage could be classified as a use of force. The International Court of Justice (ICJ) in the Nicaragua case (1986) held that acts equivalent in scale and effects to the use of armed force, such as economic coercion, may violate international law. This principle has implications for assessing non-kinetic actions under the Charter. Furthermore, Article 51 of the UN Charter, which recognizes the inherent right of self-defense, could potentially be invoked in response to a non-kinetic attack that meets the threshold of an armed attack.</span></p>
<h3><b>Customary International Law</b></h3>
<p><span style="font-weight: 400;">Customary international law, derived from consistent state practice and opinio juris, also plays a role in regulating non-kinetic warfare. For example, the prohibition against interfering in the internal affairs of another state is a customary norm that applies to information warfare and disinformation campaigns. Actions that destabilize governments, manipulate electoral processes, or undermine public trust in institutions may violate this principle.</span></p>
<p><span style="font-weight: 400;">The International Law Commission’s Draft Articles on State Responsibility further clarify the obligations of states in preventing and addressing wrongful acts. These principles are relevant in attributing responsibility for non-kinetic operations, especially those conducted covertly or through proxies.</span></p>
<h3><b>Domestic Legal Frameworks</b></h3>
<p><span style="font-weight: 400;">In addition to international law, domestic legal frameworks regulate non-kinetic warfare. National laws on cybercrime, data protection, and national security often intersect with non-kinetic methods. For instance, the U.S. Computer Fraud and Abuse Act (CFAA) criminalizes unauthorized access to computer systems, while the European Union’s General Data Protection Regulation (GDPR) addresses privacy concerns arising from data manipulation. These frameworks create additional layers of accountability for non-kinetic actions that affect individuals, businesses, and governments.</span></p>
<h2><b>Regulation of Specific Forms of Non-Kinetic Warfare</b></h2>
<h3><b>Cyber Warfare</b></h3>
<p><span style="font-weight: 400;">Cyber warfare is one of the most prominent forms of non-kinetic warfare. It involves the use of digital attacks to disrupt, damage, or destroy computer networks and infrastructure. The regulation of cyber warfare is still evolving, with international efforts focusing on norms, confidence-building measures, and cooperative frameworks.</span></p>
<p><span style="font-weight: 400;">The Tallinn Manual provides a comprehensive analysis of how existing international law applies to cyber operations. However, the lack of a binding international treaty on cyber warfare leaves significant gaps. The Budapest Convention on Cybercrime addresses cybercrime but does not directly cover state-sponsored cyberattacks. This regulatory gap underscores the need for a globally accepted legal instrument to address the unique challenges posed by cyber warfare.</span></p>
<h3><b>Information Warfare</b></h3>
<p><span style="font-weight: 400;">Information warfare involves the dissemination of propaganda, fake news, and disinformation to influence public opinion and decision-making. While freedom of expression is a fundamental right, international law prohibits certain forms of harmful information warfare. The International Covenant on Civil and Political Rights (ICCPR) recognizes freedom of expression but allows restrictions to protect national security, public order, and the rights of others.</span></p>
<p><span style="font-weight: 400;">The European Court of Human Rights (ECtHR) has addressed cases related to disinformation and hate speech, balancing freedom of expression with societal interests. For example, in Delfi AS v. Estonia (2015), the ECtHR upheld liability for harmful online content, emphasizing the importance of protecting individuals and communities from harmful speech. This case illustrates the growing recognition of the need to regulate information warfare in a manner consistent with human rights principles.</span></p>
<h3><b>Economic Sanctions</b></h3>
<p><span style="font-weight: 400;">Economic sanctions, often used as a tool of non-kinetic warfare, involve restrictions on trade, financial transactions, and resource access to exert pressure on target states. Sanctions are typically regulated by the United Nations Security Council under Chapter VII of the UN Charter. However, unilateral sanctions imposed by individual states or regional organizations have raised legal and ethical concerns.</span></p>
<p><span style="font-weight: 400;">The ICJ has addressed the legality of sanctions in cases such as Iran v. United States (2018), where it examined the compatibility of U.S. sanctions with international obligations. The court emphasized the need for proportionality and adherence to international law in implementing sanctions. The misuse of sanctions for coercive purposes that exceed legitimate objectives raises questions about their legality and morality.</span></p>
<h2><b>Challenges in Regulating Non-Kinetic Warfare</b></h2>
<h3><b>Attribution</b></h3>
<p><span style="font-weight: 400;">One of the most significant challenges in regulating non-kinetic warfare is attribution. Identifying the perpetrators of cyberattacks or disinformation campaigns is often difficult, as actors can conceal their identities and operate through proxies. This creates obstacles for legal accountability and enforcement. Attribution requires sophisticated technical expertise, international cooperation, and transparent mechanisms to ensure credibility.</span></p>
<h3><b>Ambiguity in Legal Frameworks</b></h3>
<p><span style="font-weight: 400;">Existing legal frameworks often lack clarity and specificity regarding non-kinetic warfare. The absence of a universally accepted definition of cyber warfare or information warfare complicates efforts to develop cohesive regulations. This ambiguity allows states to exploit legal gray areas, undermining efforts to establish accountability and deter wrongful acts.</span></p>
<h3><b>Enforcement and Compliance</b></h3>
<p><span style="font-weight: 400;">Enforcing international law in the context of non-kinetic warfare is inherently challenging. Non-kinetic actions often fall below the threshold of armed conflict, making it difficult to invoke IHL or other legal mechanisms. Additionally, the lack of enforcement mechanisms for international norms and agreements hampers compliance. Strengthening international institutions and fostering multilateral cooperation are essential for addressing these challenges.</span></p>
<h2><b>Case Laws and Judgments </b></h2>
<h3><b>Stuxnet Case</b></h3>
<p><span style="font-weight: 400;">The Stuxnet cyberattack, attributed to the United States and Israel, targeted Iran’s nuclear facilities in 2010. This operation highlighted the potential of cyber warfare to achieve strategic objectives without traditional military engagement. While no formal legal proceedings addressed the incident, it sparked debates on the applicability of IHL to cyberattacks and the need for clearer legal frameworks.</span></p>
<h3><b>Russian Interference in U.S. Elections</b></h3>
<p><span style="font-weight: 400;">The alleged Russian interference in the 2016 U.S. presidential election through disinformation campaigns and hacking raised questions about the legality of such actions under international law. The incident underscored the need for stronger norms and regulations to address information warfare. The use of covert methods to influence democratic processes poses significant challenges for accountability and justice.</span></p>
<h3><b>Economic Sanctions and the ICJ</b></h3>
<p><span style="font-weight: 400;">In the case of Iran v. United States (2018), the ICJ examined the legality of U.S. sanctions against Iran following the withdrawal from the Joint Comprehensive Plan of Action (JCPOA). The court’s interim measures emphasized the importance of humanitarian considerations in implementing sanctions, providing guidance on the limits of economic measures. This case illustrates the need for balancing strategic objectives with respect for human rights and international obligations.</span></p>
<h2><strong>International Implications of Non-Kinetic Warfare</strong></h2>
<p><span style="font-weight: 400;">The rise of non-kinetic warfare has profound implications for international relations and security. It blurs the lines between war and peace, creating a gray zone where traditional concepts of sovereignty and conflict are challenged. Non-kinetic methods enable states to project power without triggering conventional military responses, potentially destabilizing international order.</span></p>
<p><span style="font-weight: 400;">Moreover, the use of non-kinetic warfare by non-state actors, such as terrorist organizations and cybercriminals, complicates attribution and accountability. The asymmetric nature of these threats requires innovative legal and policy responses to ensure global security. The growing interdependence of states and the transnational nature of non-kinetic warfare demand coordinated efforts to prevent escalation and protect shared interests.</span></p>
<h2><b>Conclusion: The Future of Non-Kinetic Warfare</b></h2>
<p><span style="font-weight: 400;">Non-kinetic warfare represents a paradigm shift in the conduct of conflicts, necessitating a reevaluation of existing legal frameworks. While international law provides some guidance, significant gaps and ambiguities remain. Addressing these challenges requires collaborative efforts among states, international organizations, and legal experts to develop comprehensive regulations that balance security, sovereignty, and human rights.</span></p>
<p><span style="font-weight: 400;">As the nature of warfare continues to evolve, the legal and ethical dimensions of non-kinetic methods will play a critical role in shaping the future of international relations. Strengthening the legal framework for non-kinetic warfare is essential to ensure accountability, protect civilian populations, and maintain global stability. Expanding dialogue, fostering transparency, and enhancing international cooperation will be pivotal in addressing the complexities of this emerging domain.</span></p>
<div style="margin-top: 5px; margin-bottom: 5px;" class="sharethis-inline-share-buttons" ></div><p>The post <a href="https://old.bhattandjoshiassociates.com/non-kinetic-warfare-legal-framework-and-international-implications/">Non-Kinetic Warfare: Legal Framework and International Implications</a> appeared first on <a href="https://old.bhattandjoshiassociates.com">Bhatt &amp; Joshi Associates</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>International Legal Responses to Cybersecurity Threats</title>
		<link>https://old.bhattandjoshiassociates.com/international-legal-responses-to-cybersecurity-threats/</link>
		
		<dc:creator><![CDATA[Komal Ahuja]]></dc:creator>
		<pubDate>Tue, 11 Feb 2025 11:32:28 +0000</pubDate>
				<category><![CDATA[Cyber Law]]></category>
		<category><![CDATA[Cybercrime]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Digital Law]]></category>
		<category><![CDATA[Cyber Attacks]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[Cyber Regulation]]></category>
		<category><![CDATA[Cyber Threats]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[Digital Governance]]></category>
		<category><![CDATA[Global Security]]></category>
		<category><![CDATA[International Law]]></category>
		<category><![CDATA[legal frameworks]]></category>
		<guid isPermaLink="false">https://bhattandjoshiassociates.com/?p=24333</guid>

					<description><![CDATA[<p><img loading="lazy" width="1200" height="628" src="https://old.bhattandjoshiassociates.com/wp-content/uploads/2025/02/International-Legal-Responses-to-Cybersecurity-Threats.png" class="attachment-full size-full wp-post-image" alt="International Legal Responses to Cybersecurity Threats" decoding="async" srcset="https://old.bhattandjoshiassociates.com/wp-content/uploads/2025/02/International-Legal-Responses-to-Cybersecurity-Threats.png 1200w, https://old.bhattandjoshiassociates.com/wp-content/uploads/2025/02/International-Legal-Responses-to-Cybersecurity-Threats-1030x539-300x157.png 300w, https://old.bhattandjoshiassociates.com/wp-content/uploads/2025/02/International-Legal-Responses-to-Cybersecurity-Threats-1030x539.png 1030w, https://old.bhattandjoshiassociates.com/wp-content/uploads/2025/02/International-Legal-Responses-to-Cybersecurity-Threats-768x402.png 768w" sizes="(max-width: 1200px) 100vw, 1200px" /></p>
<p>Introduction In the digital age, cybersecurity has emerged as a critical challenge for governments, organizations, and individuals worldwide. With increasing reliance on digital infrastructure, the threat of cyberattacks, data breaches, and cyber warfare poses significant risks to national security, economic stability, and public trust. International law, traditionally rooted in principles designed for physical conflicts and [&#8230;]</p>
<p>The post <a href="https://old.bhattandjoshiassociates.com/international-legal-responses-to-cybersecurity-threats/">International Legal Responses to Cybersecurity Threats</a> appeared first on <a href="https://old.bhattandjoshiassociates.com">Bhatt &amp; Joshi Associates</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" width="1200" height="628" src="https://old.bhattandjoshiassociates.com/wp-content/uploads/2025/02/International-Legal-Responses-to-Cybersecurity-Threats.png" class="attachment-full size-full wp-post-image" alt="International Legal Responses to Cybersecurity Threats" decoding="async" srcset="https://old.bhattandjoshiassociates.com/wp-content/uploads/2025/02/International-Legal-Responses-to-Cybersecurity-Threats.png 1200w, https://old.bhattandjoshiassociates.com/wp-content/uploads/2025/02/International-Legal-Responses-to-Cybersecurity-Threats-1030x539-300x157.png 300w, https://old.bhattandjoshiassociates.com/wp-content/uploads/2025/02/International-Legal-Responses-to-Cybersecurity-Threats-1030x539.png 1030w, https://old.bhattandjoshiassociates.com/wp-content/uploads/2025/02/International-Legal-Responses-to-Cybersecurity-Threats-768x402.png 768w" sizes="(max-width: 1200px) 100vw, 1200px" /></p><div id="bsf_rt_marker"></div><h2><img loading="lazy" decoding="async" class="alignright size-full wp-image-24335" src="https://bhattandjoshiassociates.com/wp-content/uploads/2025/02/International-Legal-Responses-to-Cybersecurity-Threats.png" alt="International Legal Responses to Cybersecurity Threats" width="1200" height="628" srcset="https://old.bhattandjoshiassociates.com/wp-content/uploads/2025/02/International-Legal-Responses-to-Cybersecurity-Threats.png 1200w, https://old.bhattandjoshiassociates.com/wp-content/uploads/2025/02/International-Legal-Responses-to-Cybersecurity-Threats-1030x539-300x157.png 300w, https://old.bhattandjoshiassociates.com/wp-content/uploads/2025/02/International-Legal-Responses-to-Cybersecurity-Threats-1030x539.png 1030w, https://old.bhattandjoshiassociates.com/wp-content/uploads/2025/02/International-Legal-Responses-to-Cybersecurity-Threats-768x402.png 768w" sizes="(max-width: 1200px) 100vw, 1200px" /></h2>
<h2><strong>Introduction</strong></h2>
<p><span style="font-weight: 400;">In the digital age, cybersecurity has emerged as a critical challenge for governments, organizations, and individuals worldwide. With increasing reliance on digital infrastructure, the threat of cyberattacks, data breaches, and cyber warfare poses significant risks to national security, economic stability, and public trust. International law, traditionally rooted in principles designed for physical conflicts and territorial disputes, faces the complex task of addressing cybersecurity threats in a borderless and rapidly evolving digital landscape. This article explores the current international legal frameworks governing cybersecurity, recent developments, and the challenges associated with enforcing these norms.</span></p>
<h2><b>The Nature of Cybersecurity Threats</b></h2>
<p><span style="font-weight: 400;">Cybersecurity threats encompass a broad spectrum of malicious activities, ranging from hacking and phishing to ransomware attacks and state-sponsored cyber operations. These threats target critical infrastructure, such as power grids, healthcare systems, and financial institutions, often with devastating consequences. Cybercrime, including identity theft and financial fraud, further exacerbates the vulnerabilities of individuals and businesses.</span></p>
<p><span style="font-weight: 400;">State-sponsored cyberattacks, such as the alleged Russian interference in the 2016 U.S. presidential elections or the 2020 SolarWinds hack, highlight the geopolitical dimensions of cybersecurity. Such incidents raise questions about the application of international law, including state responsibility, sovereignty, and the use of force in cyberspace.</span></p>
<h2><b>Existing International Legal Frameworks </b></h2>
<p><span style="font-weight: 400;">The applicability of international law to cybersecurity threats is governed by several principles and treaties, although no comprehensive global treaty specifically addresses cybersecurity. Key frameworks include:</span></p>
<ol>
<li><b> The United Nations Charter:</b><span style="font-weight: 400;"> The principles of state sovereignty, non-intervention, and the prohibition of the use of force are foundational to international law. Cyber operations that cause physical damage or loss of life may qualify as a &#8220;use of force&#8221; under Article 2(4) of the UN Charter. Additionally, the right to self-defense under Article 51 may apply to cyberattacks that reach the threshold of an &#8220;armed attack.&#8221;</span></li>
<li><b> The Tallinn Manual:</b><span style="font-weight: 400;"> Although not legally binding, the Tallinn Manual on the International Law Applicable to Cyber Warfare provides an influential interpretation of how existing international law applies to cyber operations. Developed by legal experts under the auspices of the NATO Cooperative Cyber Defence Centre of Excellence, the manual addresses issues such as state responsibility, neutrality, and proportionality in cyber conflicts.</span></li>
<li><b> The Budapest Convention on Cybercrime:</b><span style="font-weight: 400;"> The Council of Europe’s Budapest Convention is the first international treaty addressing internet crimes. It provides a framework for harmonizing national laws, enhancing investigative techniques, and fostering international cooperation in combating cybercrime. However, its limited membership and criticism from non-signatory states, such as China and Russia, pose challenges to its universality.</span></li>
<li><b> The UN Group of Governmental Experts (GGE) and Open-Ended Working Group (OEWG):</b><span style="font-weight: 400;"> The UN has facilitated discussions among member states on the application of international law to cyberspace through the GGE and OEWG processes. These forums have produced consensus reports affirming that existing international law applies to cyberspace, but they have also highlighted divisions among states regarding norms and enforcement.</span></li>
</ol>
<h2><strong>Challenges in Applying International Law to Cybersecurity Threats</strong></h2>
<p><span style="font-weight: 400;">The unique characteristics of cyberspace complicate the application and enforcement of international law. Key challenges include:</span></p>
<ol>
<li><b> Attribution:</b><span style="font-weight: 400;"> Identifying the perpetrators of a cyberattack is notoriously difficult, given the ability to mask identities and operate through proxies. Without reliable attribution, holding states or non-state actors accountable under international law becomes challenging.</span></li>
<li><b> Jurisdictional Issues:</b><span style="font-weight: 400;"> Cyberattacks often transcend national borders, involving multiple jurisdictions with varying legal standards. Coordinating international responses and prosecutions can be hindered by conflicting laws and priorities.</span></li>
<li><b> Lack of Consensus:</b><span style="font-weight: 400;"> States have differing views on key issues, such as the definition of cyberattacks, the threshold for invoking self-defense, and the role of non-state actors. Geopolitical rivalries further impede efforts to establish a comprehensive international treaty.</span></li>
<li><b> Enforcement Mechanisms:</b><span style="font-weight: 400;"> Unlike traditional conflicts, cyber operations rarely involve physical assets or territories, making it difficult to impose traditional enforcement measures such as sanctions or military intervention.</span></li>
</ol>
<h2><b>Recent Developments in Cybersecurity Governance</b></h2>
<p><span style="font-weight: 400;">In recent years, there have been notable advancements in cybersecurity governance at both international and regional levels. For example:</span></p>
<ol>
<li><b> United Nations Initiatives:</b><span style="font-weight: 400;"> The OEWG’s 2021 report emphasized the need for capacity building, confidence-building measures, and adherence to voluntary norms for responsible state behavior in cyberspace. These efforts aim to foster trust and cooperation among states.</span></li>
<li><b> Regional Frameworks:</b><span style="font-weight: 400;"> Organizations such as the European Union and ASEAN have developed regional cybersecurity strategies to address cross-border threats. The EU’s General Data Protection Regulation (GDPR) has also set global standards for data protection and privacy.</span></li>
<li><b> Private Sector and Multi-Stakeholder Engagement:</b><span style="font-weight: 400;"> Tech companies, civil society organizations, and academia play an increasingly important role in shaping cybersecurity norms. Initiatives such as Microsoft’s Cybersecurity Tech Accord and the Global Forum on Cyber Expertise (GFCE) reflect the growing importance of public-private partnerships.</span></li>
<li><b> Emerging Technologies:</b><span style="font-weight: 400;"> Advances in artificial intelligence, quantum computing, and blockchain present both opportunities and risks for cybersecurity. International law must adapt to address the implications of these technologies, including their potential misuse by malicious actors.</span></li>
</ol>
<h2><b>The Role of International Courts and Arbitration</b></h2>
<p><span style="font-weight: 400;">While there have been few cases directly addressing cybersecurity in international courts, legal mechanisms such as arbitration and dispute resolution are gaining relevance. The International Court of Justice (ICJ) and other forums may provide avenues for states to resolve disputes arising from cyber operations. However, the absence of precedent and the complexity of cyber issues pose significant hurdles.</span></p>
<h2><b>Future Directions and Recommendations for Tackling Cybersecurity Threats</b></h2>
<p><span style="font-weight: 400;">To strengthen international legal responses to cybersecurity threats, the following steps are essential:</span></p>
<ol>
<li><b> Developing a Comprehensive Treaty:</b><span style="font-weight: 400;"> Efforts to negotiate a global treaty on cybersecurity should be intensified, focusing on shared norms, definitions, and enforcement mechanisms. Such a treaty could draw from existing frameworks like the Budapest Convention while addressing gaps in coverage.</span></li>
<li><b> Enhancing Attribution Capabilities:</b><span style="font-weight: 400;"> Investments in technology and international collaboration are necessary to improve the accuracy and reliability of attribution mechanisms. Transparent and credible attribution processes can deter malicious actors and facilitate accountability.</span></li>
<li><b> Promoting Capacity Building:</b><span style="font-weight: 400;"> Developing nations often lack the resources and expertise to address cybersecurity threats effectively. Capacity-building initiatives, including training programs and knowledge-sharing platforms, can help bridge this gap.</span></li>
<li><b> Encouraging Multi-Stakeholder Governance:</b><span style="font-weight: 400;"> Cybersecurity governance should involve all relevant stakeholders, including governments, private companies, and civil society. Collaborative approaches can foster innovation and resilience while ensuring inclusivity.</span></li>
</ol>
<h2><b>Conclusion  </b></h2>
<p><span style="font-weight: 400;">Cybersecurity threats represent one of the most pressing challenges of the 21st century, requiring robust and adaptive international legal responses. While existing frameworks provide a foundation, gaps in enforcement, attribution, and consensus highlight the need for continued efforts to strengthen cybersecurity governance. By fostering cooperation, building capacity, and embracing innovative solutions, the international community can mitigate cyber risks and ensure the security and stability of the digital world.</span></p>
<div style="margin-top: 5px; margin-bottom: 5px;" class="sharethis-inline-share-buttons" ></div><p>The post <a href="https://old.bhattandjoshiassociates.com/international-legal-responses-to-cybersecurity-threats/">International Legal Responses to Cybersecurity Threats</a> appeared first on <a href="https://old.bhattandjoshiassociates.com">Bhatt &amp; Joshi Associates</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cybersecurity in India &#8211; Indian Computer Emergency Response Team (CERT-In)</title>
		<link>https://old.bhattandjoshiassociates.com/cybersecurity-in-india-indian-computer-emergency-response-team-cert-in/</link>
		
		<dc:creator><![CDATA[Komal Ahuja]]></dc:creator>
		<pubDate>Tue, 10 Dec 2024 09:59:02 +0000</pubDate>
				<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[Cyber Law]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Privacy and Data Protection]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[CERT-In]]></category>
		<category><![CDATA[Cyber Laws]]></category>
		<category><![CDATA[Cyber Threats]]></category>
		<category><![CDATA[Cybersecurity in India]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[Digital Security]]></category>
		<category><![CDATA[Indian Computer Emergency Response Team]]></category>
		<guid isPermaLink="false">https://bhattandjoshiassociates.com/?p=23610</guid>

					<description><![CDATA[<p><img loading="lazy" width="1200" height="628" src="https://old.bhattandjoshiassociates.com/wp-content/uploads/2024/12/cybersecurity-in-india-indian-computer-emergency-response-team-cert-in.png" class="attachment-full size-full wp-post-image" alt="Cybersecurity in India - Indian Computer Emergency Response Team (CERT-In)" decoding="async" srcset="https://old.bhattandjoshiassociates.com/wp-content/uploads/2024/12/cybersecurity-in-india-indian-computer-emergency-response-team-cert-in.png 1200w, https://old.bhattandjoshiassociates.com/wp-content/uploads/2024/12/cybersecurity-in-india-indian-computer-emergency-response-team-cert-in-1030x539-300x157.png 300w, https://old.bhattandjoshiassociates.com/wp-content/uploads/2024/12/cybersecurity-in-india-indian-computer-emergency-response-team-cert-in-1030x539.png 1030w, https://old.bhattandjoshiassociates.com/wp-content/uploads/2024/12/cybersecurity-in-india-indian-computer-emergency-response-team-cert-in-768x402.png 768w" sizes="(max-width: 1200px) 100vw, 1200px" /></p>
<p>Introduction In an increasingly digital world, cybersecurity has become a critical aspect of national security and economic stability. The Indian Computer Emergency Response Team (CERT-In) is the national nodal agency tasked with responding to cybersecurity incidents, protecting critical infrastructure, and ensuring safe internet usage across government and private sectors. Established in 2004 under the Ministry [&#8230;]</p>
<p>The post <a href="https://old.bhattandjoshiassociates.com/cybersecurity-in-india-indian-computer-emergency-response-team-cert-in/">Cybersecurity in India &#8211; Indian Computer Emergency Response Team (CERT-In)</a> appeared first on <a href="https://old.bhattandjoshiassociates.com">Bhatt &amp; Joshi Associates</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" width="1200" height="628" src="https://old.bhattandjoshiassociates.com/wp-content/uploads/2024/12/cybersecurity-in-india-indian-computer-emergency-response-team-cert-in.png" class="attachment-full size-full wp-post-image" alt="Cybersecurity in India - Indian Computer Emergency Response Team (CERT-In)" decoding="async" srcset="https://old.bhattandjoshiassociates.com/wp-content/uploads/2024/12/cybersecurity-in-india-indian-computer-emergency-response-team-cert-in.png 1200w, https://old.bhattandjoshiassociates.com/wp-content/uploads/2024/12/cybersecurity-in-india-indian-computer-emergency-response-team-cert-in-1030x539-300x157.png 300w, https://old.bhattandjoshiassociates.com/wp-content/uploads/2024/12/cybersecurity-in-india-indian-computer-emergency-response-team-cert-in-1030x539.png 1030w, https://old.bhattandjoshiassociates.com/wp-content/uploads/2024/12/cybersecurity-in-india-indian-computer-emergency-response-team-cert-in-768x402.png 768w" sizes="(max-width: 1200px) 100vw, 1200px" /></p><div id="bsf_rt_marker"></div><h2><img loading="lazy" decoding="async" class="alignright size-full wp-image-23612" src="https://bhattandjoshiassociates.com/wp-content/uploads/2024/12/cybersecurity-in-india-indian-computer-emergency-response-team-cert-in.png" alt="Cybersecurity in India - Indian Computer Emergency Response Team (CERT-In)" width="1200" height="628" srcset="https://old.bhattandjoshiassociates.com/wp-content/uploads/2024/12/cybersecurity-in-india-indian-computer-emergency-response-team-cert-in.png 1200w, https://old.bhattandjoshiassociates.com/wp-content/uploads/2024/12/cybersecurity-in-india-indian-computer-emergency-response-team-cert-in-1030x539-300x157.png 300w, https://old.bhattandjoshiassociates.com/wp-content/uploads/2024/12/cybersecurity-in-india-indian-computer-emergency-response-team-cert-in-1030x539.png 1030w, https://old.bhattandjoshiassociates.com/wp-content/uploads/2024/12/cybersecurity-in-india-indian-computer-emergency-response-team-cert-in-768x402.png 768w" sizes="(max-width: 1200px) 100vw, 1200px" /></h2>
<h2><b>Introduction</b></h2>
<p><span style="font-weight: 400;">In an increasingly digital world, cybersecurity has become a critical aspect of national security and economic stability. The Indian Computer Emergency Response Team (CERT-In) is the national nodal agency tasked with responding to cybersecurity incidents, protecting critical infrastructure, and ensuring safe internet usage across government and private sectors. Established in 2004 under the Ministry of Electronics and Information Technology (MeitY), CERT-In plays a pivotal role in securing India&#8217;s cyberspace. This article explores the regulatory framework, key responsibilities of CERT-In, and the legal landscape surrounding cybersecurity in India, alongside relevant case laws and emerging challenges.</span></p>
<h2><b>Formation and Evolution of CERT-In</b></h2>
<p><span style="font-weight: 400;">The rapid growth of the internet and information technology in the late 1990s and early 2000s brought with it an increased risk of cyber threats, including hacking, data breaches, and cyber espionage. Recognizing the need for a specialized agency to handle cybersecurity issues, the Indian government established CERT-In in 2004 under Section 70B of the </span><i><span style="font-weight: 400;">Information Technology Act, 2000</span></i><span style="font-weight: 400;">.</span></p>
<p><span style="font-weight: 400;">CERT-In was tasked with responding to computer security incidents, advising government and private entities on how to protect their networks, and fostering collaboration between different stakeholders to create a robust cybersecurity ecosystem. Over the years, its role has expanded to include the monitoring of cybersecurity threats at a national level, the dissemination of threat intelligence, and the formulation of cybersecurity guidelines and policies.</span></p>
<h2><b>Functions and Responsibilities of CERT-In</b></h2>
<p><span style="font-weight: 400;">CERT-In serves as the national agency for managing cybersecurity incidents and promoting best practices in cybersecurity across sectors. Its core functions include:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><b>Incident Response</b><span style="font-weight: 400;">: CERT-In acts as the first responder to cybersecurity incidents. It identifies, tracks, and mitigates cyber threats, such as malware attacks, phishing schemes, and data breaches. It also coordinates with international cybersecurity organizations to track and respond to global cyber threats.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Monitoring and Alerts</b><span style="font-weight: 400;">: CERT-In continuously monitors the Indian cyberspace for potential security threats and issues alerts to government departments, businesses, and the general public. These alerts help organizations take preventive actions against emerging cybersecurity threats.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Vulnerability Management</b><span style="font-weight: 400;">: CERT-In identifies vulnerabilities in information systems and provides recommendations to patch them. It conducts security audits of critical infrastructure and ensures that organizations adopt best practices in cybersecurity.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Capacity Building and Training</b><span style="font-weight: 400;">: CERT-In conducts training programs and workshops to enhance the cybersecurity capabilities of government agencies, private companies, and individuals. It promotes awareness about cybersecurity through educational initiatives and public advisories.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>International Cooperation</b><span style="font-weight: 400;">: CERT-In collaborates with global cybersecurity organizations to enhance India’s cyber defense mechanisms. It has established partnerships with other national CERTs, cybersecurity firms, and international agencies like INTERPOL and the International Telecommunication Union (ITU) to share threat intelligence and best practices.</span></li>
</ul>
<h2><b>Regulatory Framework Governing Cybersecurity in India</b></h2>
<p><span style="font-weight: 400;">Cybersecurity in India is regulated by a combination of laws, policies, and guidelines, with CERT-In playing a central role in enforcing these regulations. The key legislation governing cybersecurity in India is the </span><i><span style="font-weight: 400;">Information Technology Act, 2000</span></i><span style="font-weight: 400;">, along with its subsequent amendments.</span></p>
<h3><b>Information Technology Act, 2000</b></h3>
<p><span style="font-weight: 400;">The </span><i><span style="font-weight: 400;">Information Technology (IT) Act, 2000</span></i><span style="font-weight: 400;"> is the primary legal framework governing the use of digital technologies and the internet in India. The Act provides legal recognition to electronic transactions and digital signatures, but more importantly, it lays down rules for cybersecurity and the protection of personal data.</span></p>
<p><span style="font-weight: 400;">Section 70B of the IT Act formally established CERT-In and assigned it the responsibility for protecting the country’s cyberspace. CERT-In has the authority to respond to cybersecurity incidents, advise the government on cybersecurity issues, and monitor the country’s critical information infrastructure (CII).</span></p>
<p><span style="font-weight: 400;">The IT Act also prescribes penalties for cybersecurity breaches. Under Section 66, hacking, data theft, and other cybercrimes are punishable by fines and imprisonment. Section 43A mandates organizations to implement reasonable security practices for the protection of sensitive personal data, holding them liable for compensation if negligence leads to data breaches.</span></p>
<h3><b>Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011</b></h3>
<p><span style="font-weight: 400;">These rules, issued under Section 43A of the IT Act, specify the security measures that organizations must adopt to protect sensitive personal data. CERT-In oversees compliance with these rules, particularly in sectors like banking, healthcare, and telecommunications, where the protection of personal data is crucial.</span></p>
<h3><b>National Cyber Security Policy, 2013</b></h3>
<p><span style="font-weight: 400;">The </span><i><span style="font-weight: 400;">National Cyber Security Policy, 2013</span></i><span style="font-weight: 400;"> was introduced to create a secure cyberspace environment for businesses, government, and citizens. The policy outlines measures to protect critical information infrastructure, develop a skilled workforce in cybersecurity, and promote research and development in the field.</span></p>
<p><span style="font-weight: 400;">CERT-In plays a key role in implementing the objectives of the National Cyber Security Policy. It is responsible for developing threat detection capabilities, conducting cybersecurity audits, and coordinating efforts to secure India’s cyber ecosystem. The policy also encourages collaboration between government and private entities to improve cybersecurity resilience.</span></p>
<h3><b>Personal Data Protection Bill, 2019</b></h3>
<p><span style="font-weight: 400;">While still under consideration in Parliament, the </span><i><span style="font-weight: 400;">Personal Data Protection Bill, 2019</span></i><span style="font-weight: 400;">, once enacted, will provide a comprehensive legal framework for data protection in India. It places greater emphasis on the protection of personal data and introduces stricter penalties for data breaches. CERT-In will play a vital role in ensuring that organizations comply with data protection requirements, particularly in relation to cybersecurity measures.</span></p>
<h2><b>Case Laws Related to Cybersecurity In India</b></h2>
<p><span style="font-weight: 400;">Over the years, Indian courts have dealt with several significant cases that highlight the legal challenges surrounding cybersecurity and the protection of data.</span></p>
<h3><b>Shreya Singhal v. Union of India (2015)</b></h3>
<p><span style="font-weight: 400;">In this landmark case, the Supreme Court struck down Section 66A of the IT Act, which criminalized the transmission of &#8220;offensive&#8221; information over the internet. The court ruled that the provision was vague and violated the right to freedom of speech and expression under Article 19(1)(a) of the Constitution.</span></p>
<p><span style="font-weight: 400;">While the case focused on free speech, it had significant implications for cybersecurity and data regulation. The judgment emphasized the need for a clear and well-defined legal framework for cybersecurity that does not infringe on fundamental rights. CERT-In’s role in regulating cybersecurity became more prominent in the wake of this decision, as it highlighted the importance of safeguarding online freedom while ensuring security.</span></p>
<h3><b>Justice K.S. Puttaswamy (Retd.) v. Union of India (2017) (Right to Privacy Case)</b></h3>
<p><span style="font-weight: 400;">In this case, the Supreme Court recognized the right to privacy as a fundamental right under Article 21 of the Constitution. The judgment has far-reaching implications for data protection and cybersecurity, as it places greater emphasis on the protection of personal data from unauthorized access or breaches.</span></p>
<p><span style="font-weight: 400;">The judgment also underscored the need for strong cybersecurity practices to protect individuals&#8217; personal data in the digital age. CERT-In&#8217;s role in ensuring compliance with data protection norms became more critical after this ruling, particularly in sectors like telecommunications, healthcare, and banking, where sensitive personal data is frequently processed.</span></p>
<h3><b>Internet and Mobile Association of India v. Reserve Bank of India (2018)</b></h3>
<p><span style="font-weight: 400;">This case concerned the Reserve Bank of India’s (RBI) directive prohibiting banks from dealing with virtual currencies like Bitcoin. The Supreme Court struck down the RBI&#8217;s directive in 2020, stating that it was disproportionate and did not account for the evolving nature of technology.</span></p>
<p><span style="font-weight: 400;">Although this case focused on cryptocurrency, it highlighted the challenges regulators face in adapting to emerging technologies and cyber threats. CERT-In has been closely involved in monitoring cybersecurity risks associated with cryptocurrencies and blockchain technologies, issuing advisories to financial institutions on how to secure their digital assets.</span></p>
<h2><b>Challenges in Cybersecurity Regulation</b></h2>
<p><span style="font-weight: 400;">Despite CERT-In’s crucial role in regulating cybersecurity, there are several challenges that India faces in building a secure cyberspace.</span></p>
<ol>
<li style="font-weight: 400;" aria-level="1"><b>Cybercrime and Data Breaches</b><span style="font-weight: 400;">: The rapid digital transformation of India’s economy has made the country more vulnerable to cyberattacks, with an increasing number of data breaches, ransomware attacks, and financial fraud. CERT-In’s capacity to respond to these incidents is often stretched thin, given the scale of the threat.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Securing Critical Infrastructure</b><span style="font-weight: 400;">: As more sectors, including energy, healthcare, and transportation, become dependent on digital technologies, securing critical information infrastructure (CII) has become a top priority. CERT-In works closely with CII sectors to prevent cyberattacks, but gaps in cybersecurity practices continue to pose significant risks.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Capacity Building</b><span style="font-weight: 400;">: There is a shortage of skilled cybersecurity professionals in India, which hampers efforts to build a robust defense against cyber threats. CERT-In has initiated several training programs to address this skills gap, but more comprehensive efforts are needed to build a cybersecurity workforce capable of handling the increasing sophistication of cyberattacks.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Evolving Nature of Cyber Threats</b><span style="font-weight: 400;">: Cyber threats are constantly evolving, with attackers using more sophisticated tools and techniques to breach security systems. CERT-In must continually update its threat detection capabilities and invest in research and development to stay ahead of emerging cyber risks.</span></li>
</ol>
<h2><b>Recent Developments in Cybersecurity and CERT-In’s Role</b></h2>
<p><span style="font-weight: 400;">In recent years, CERT-In has stepped up its efforts to safeguard India’s digital infrastructure. With the rapid adoption of digital payment systems and online platforms during the COVID-19 pandemic, CERT-In issued a series of guidelines and advisories to protect users from cyber fraud and phishing attacks.</span></p>
<p><span style="font-weight: 400;">CERT-In has also been working on improving the cybersecurity of India’s critical infrastructure. In collaboration with the National Critical Information Infrastructure Protection Centre (NCIIPC), CERT-In has conducted security audits and issued guidelines for sectors like energy, finance, and healthcare to strengthen their cybersecurity protocols.</span></p>
<p><span style="font-weight: 400;">International cooperation has also become a priority for CERT-In, as cyber threats often transcend national borders. The agency has signed MoUs with various countries and global organizations to share threat intelligence and collaborate on cyber defense initiatives.</span></p>
<h2><b>Conclusion </b></h2>
<p><span style="font-weight: 400;">The Indian Computer Emergency Response Team plays a pivotal role in securing India’s cyberspace, protecting critical infrastructure, and responding to cybersecurity incidents. As cyber threats continue to evolve, CERT-In’s role will become even more critical in ensuring that India’s digital economy remains secure and resilient. While there are challenges, such as capacity building and securing critical infrastructure, the regulatory framework and legal landscape around cybersecurity are evolving to meet these threats. CERT-In must continue to innovate and collaborate with global cybersecurity organizations to stay ahead of emerging risks and protect India’s digital future.</span></p>
<p>&nbsp;</p>
<div style="margin-top: 5px; margin-bottom: 5px;" class="sharethis-inline-share-buttons" ></div><p>The post <a href="https://old.bhattandjoshiassociates.com/cybersecurity-in-india-indian-computer-emergency-response-team-cert-in/">Cybersecurity in India &#8211; Indian Computer Emergency Response Team (CERT-In)</a> appeared first on <a href="https://old.bhattandjoshiassociates.com">Bhatt &amp; Joshi Associates</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
