Cyber Law Academy
Part 13.2

Critical Information Infrastructure (CII)

"Protecting National Digital Assets"

IT Act Section 70, NCIIPC Role, CII Identification Process, Protected Systems Declaration, Sector-Specific Requirements for Power, Banking, Telecom, Transport, and Government.

2.1

CII - Definition and Legal Framework

Critical Information Infrastructure - Definition

IT Act Section 70(1) Explanation:

"Critical Information Infrastructure" means the computer resource, the incapacitation or destruction of which, shall have debilitating impact on:

1. National Security

2. Economy

3. Public Health

4. Safety

Key Characteristic: Debilitating impact if compromised or destroyed

2.2

NCIIPC - Role and Functions

National Critical Information Infrastructure Protection Centre
AspectDetails
Full FormNational Critical Information Infrastructure Protection Centre
Establishment2014 (under NTRO)
ParentNational Technical Research Organisation (NTRO), PMO
Legal BasisIT Act Section 70A
HeadquartersNew Delhi
FunctionProtection of CII in India
NCIIPC Functions under Section 70A

1. Take all measures to protect CII

2. Identify CII across sectors

3. Issue guidelines for CII protection

4. Coordinate with sector regulators

5. Develop and maintain national CII protection strategy

6. Respond to CII security incidents

7. Share threat intelligence with CII operators

2.3

CII Sectors and Maharashtra Examples

SectorCII ExamplesMaharashtra Specific
PowerPower generation plants, transmission grid, distribution systemsMSEDCL, Tata Power Mumbai, BEST
Banking/FinanceCore banking systems, payment gateways, ATM networksRBI Mumbai, NSE, BSE, NPCI
TelecomNetwork operations centers, switching systems, submarine cablesMajor telco operations in Mumbai
TransportAir traffic control, railway signaling, port managementMumbai Airport, Konkan Railway, JNPT
GovernmentE-governance portals, citizen databases, defense systemsMahaOnline, Aaple Sarkar, MH State Data Centre
HealthcareHospital management systems, health databasesMajor hospital chains, CoWIN infrastructure
Emergency Services112 emergency response, disaster management systemsMaharashtra Emergency Response System
2.4

Protected System Declaration and Compliance

Protected System - Compliance Requirements

Under IT Act Section 70:

1. Access Control: Only authorized persons can access

2. Audit Trails: Complete logging of all access

3. Security Measures: Enhanced security controls

4. Incident Reporting: Immediate reporting to NCIIPC/CERT-In

5. Background Verification: Personnel handling CII

ViolationSectionPunishment
Unauthorized access to protected system70(2)Up to 10 years + fine
Attempt to access protected system70(2)Up to 10 years + fine
Misuse of CII information72AUp to 3 years + Rs. 5 lakh fine
Cyber terrorism (CII attack)66FLife imprisonment
2.5

Sector-Specific Regulations

Banking Sector - RBI Guidelines

RBI Cybersecurity Framework (2016, updated):

1. Board-approved IT/Cyber Security Policy

2. Dedicated CISO appointment

3. Security Operations Centre (SOC)

4. Vulnerability Assessment and Penetration Testing (VAPT)

5. Incident reporting to RBI within 2-6 hours

6. Customer data protection measures

Power Sector - CEA Guidelines

Central Electricity Authority Cyber Security Guidelines:

1. SCADA/ICS security measures

2. Air-gapped networks for critical systems

3. OT/IT segmentation

4. Incident response plan

5. Regular security audits

6. Personnel training

Key Points - Part 13.2