Question map
In India, it is legally mandatory for which of the following to report on cyber security incidents ? 1. Service providers 2. Data centres 3. Body corporate Select the correct answer using the code given below :
Explanation
The correct answer is option D (1, 2 and 3) because service providers, intermediaries, data centers and body corporate shall report the cyber security incidents to CERT-In within a reasonable[1] time frame. This reporting requirement is established under the provisions of section 70B of Information Technology (IT) Act, 2000[2], which mandates CERT-In to handle response and reporting of cyber incidents[2].
All three entities mentioned in the question—service providers (statement 1), data centres (statement 2), and body corporate (statement 3)—are explicitly included in the list of entities that must mandatorily report cyber security incidents to CERT-In. Therefore, all three statements are correct, making option D the right answer.
This comprehensive reporting framework ensures that CERT-In, as India's national agency for cyber security, can effectively perform its function of collection, analysis and dissemination of information on cyber incidents[3].
Sources- [1] https://naavi.org/importantlaws/itrules/jan4_2017_incident_report.pdf
- [2] https://www.cert-in.org.in/PDF/guidelinesgovtentities.pdf
- [3] https://prsindia.org/files/bills_acts/bills_parliament/2021/IT%20Act,%202000.pdf
PROVENANCE & STUDY PATTERN
Guest previewThis question bridges Current Affairs and Statutory Law. While standard books cover the IT Act broadly, the specific 'mandatory reporting' list comes from the 2013 CERT-In Rules, highlighted by 2017-era cyber threats (WannaCry). If a sector (Cyber Security) is in the news, you must know the *obligations* of private players, not just government bodies.
This question can be broken into the following sub-statements. Tap a statement sentence to jump into its detailed analysis.
- Statement 1: As of 2017, are service providers in India legally required to report cyber security incidents?
- Statement 2: As of 2017, are data centres in India legally required to report cyber security incidents?
- Statement 3: As of 2017, are body corporates in India legally required to report cyber security incidents?
- Explicitly states the duty of service providers and similar entities to report incidents to CERT-In.
- The phrasing 'shall report' indicates a legal/mandatory obligation rather than a recommendation.
- Links reporting of cyber security incidents to the statutory provisions of section 70B of the IT Act, 2000, establishing CERT-In's legal role.
- Describes CERT-In functions including 'collection, analysis and dissemination of information on cyber incidents' and 'reporting of cyber incidents', supporting a legal reporting framework.
Describes a licensing regime for Internet Service Providers (400 licences, 128 signed) indicating an existing regulatory framework governing ISPs.
A student could check typical ISP licence conditions (reporting/notification clauses) or compare licence-era regulations around 2017 to see if incident-reporting was mandated.
Reports high counts of cybercrime cases (city-level FIRs) and notes technology makes detection challenging, implying government and police engagement with cyber incidents.
One could infer that high incident levels might motivate legal obligations for providers; verify by looking up 2017 policies or advisories from law enforcement/Ministry of Home Affairs on mandatory reporting.
Shows the government imposed specific rules on digital service providers (equalisation levy withheld by Indian companies), demonstrating precedent for targeted regulation of service providers.
Use this as a pattern that India enacted service-specific regulatory duties; search for contemporaneous cyber/security-specific rules applying analogous obligations (e.g., reporting) to service providers in 2017.
States absence of an enacted Act to regulate cryptocurrencies even after major regulatory steps, illustrating that in some digital domains India lacked formal legislation as of the dates referenced.
As a cautionary counter-pattern, a student could use this to argue that absence of an Act in one tech area means specific legal obligations (like mandatory incident reporting) are not automatic—so they should look for explicit rules or advisories from 2017.
This statement analysis shows book citations, web sources and indirect clues. The first statement (S1) is open for preview.
Login with Google to unlock all statements.
This statement analysis shows book citations, web sources and indirect clues. The first statement (S1) is open for preview.
Login with Google to unlock all statements.
This tab shows concrete study steps: what to underline in books, how to map current affairs, and how to prepare for similar questions.
Login with Google to unlock study guidance.
Discover the small, exam-centric ideas hidden in this question and where they appear in your books and notes.
Login with Google to unlock micro-concepts.
Access hidden traps, elimination shortcuts, and Mains connections that give you an edge on every question.
Login with Google to unlock The Vault.