Short Note on Security Architecture of E-governance

 Security Architecture

The security architecture of E-governance is a high-level document that sets the security goals of the e-governance project and describes the procedure that needs to be followed by all the e-governance hierarchies such as users, businesses, operators, etc. An appropriate legal framework is absolutely essential for the systematic and sustained growth of e-governance.




Protection of Public Order and Decency

  •  The internet is highly capable of being a saturated and versatile medium at the same time. Its reach is very vast and due to its multimedia capability, its impact can be immediate and profound. So the government has to beware of its potential to create a negative impact on society through the promotion of terrorism, pornography, communalism, violence, etc.
  • Section 67 of the IT Act 2000 of India makes it a punishable offense to “publish or transmit or cause to be published it the electronic form, a material which is lascivious or appeals to the prurient interest or if its effect is such as to tend to deprave and corrupt persons who are likely, having regard to all relevant circumstances, to read, see or hear the matter contained or embodied in it.


Protection of Privacy of Individuals

  • Disclosure of personal information over the internet raises questions related to the privacy of individuals. The United States passes an Act which is “The Privacy Act of 1974”. According to this Act, any organization should follow some steps when it gathered any personal information of any individual- Notice, Choice, Onward Transfer, and Security.


Providing Legal Status to Digital Identities and Transactions

  • One of the fundamental requirements of e-governance projects is their ability to create and sustain the operations of government agencies as well as private agencies. So it’s very necessary to consult the legal status of entities and actions such as ‘legal status is to be provided to the digital identities’, ‘provide the legal recognition to digital assets’, ‘ provide a digital authority to digital transactions, these transactions could be in the areas of G2G, G2B, G2C, etc’.
  • ‘Agreements and contracts in digital form’. To providing the authority to any legal digital transaction or deal the Indian government gave the ‘Information Technology Act 2000’ in October 2000. It specifically takes care of all the issues mentioned above. India followed some provisions of ‘Electronic transaction Act 1998 (Singapore)’ closely while drafting the IT Act 2000.









Comments

Popular posts from this blog

Suppose that a data warehouse consists of the four dimensions; date, spectator, location, and game, and the two measures, count and charge, where charge is the fee that a spectator pays when watching a game on a given date. Spectators may be students, adults, or seniors, with each category having its own charge rate. a) Draw a star schema diagram for the data b) Starting with the base cuboid [date; spectator; location; game], what specific OLAP operations should perform in order to list the total charge paid by student spectators at GM Place in 2004?

Explain Security Management Model of E-Governance.