Optimize IAS
  • Home
  • About Us
  • Courses
    • Prelims Test Series
      • LAQSHYA 2026 Prelims Mentorship
    • Mains Mentorship
      • Arjuna 2026 Mains Mentorship
  • Portal Login
  • Home
  • About Us
  • Courses
    • Prelims Test Series
      • LAQSHYA 2026 Prelims Mentorship
    • Mains Mentorship
      • Arjuna 2026 Mains Mentorship
  • Portal Login

‘Diktat calling for storage of user data may face backlash’

  • May 6, 2022
  • Posted by: OptimizeIAS Team
  • Category: DPN Topics
No Comments

 

 

‘Diktat calling for storage of user data may face backlash’

Subject: Science and Technology

Section: IT

Context – ‘The Ministry of Electronics and Information Technology’s (MeitY) new policy guidelines to virtual private network (VPN) service providers’.

Concept: VPN is used to hide location as well as encrypt information being transferred between the senders to receiver. This could be the data of an enterprise sent over cloud network and storage, or two individuals exchanging files.

Current guidelines:

  • MeitY new directions to virtual private network (VPN) service providers to store data of Indian users for up to five years, may move to oppose the policy.
  • The policy suggests that details, including user name, e-mail address, phone numbers, and IP addresses, among other data, need to be stored for at least five years.
  • Data centre companies and cryptocurrency exchanges, too, need to collect and store user data by
  • The Indian Computer Emergency Response Team (CERTIn), which works under MeitY.
  • Additionally, VPN companies will have to regularly report the cases around the 20 cyber security vulnerabilities listed by CERT-In in its previous directions.

What is a VPN?

  • A virtual private network, or VPN, is an encrypted connection over the Internet from a device to a network.
  • The encrypted connection helps ensure that sensitive data is safely transmitted. It prevents unauthorized people from eavesdropping on the traffic and allows the user to conduct work remotely.
  • VPN technology is widely used in corporate environments.
  • As it is totally disconnected from the rest of the web, it is a secure system. The network can be used safely by the government, companies, and military to utilise system resources.

system resources

How does a virtual private network (VPN) work?

  • A VPN extends a corporate network through encrypted connections made over the Internet. Because the traffic is encrypted between the device and the network, traffic remains private as it travels.
  • An employee can work outside the office and still securely connect to the corporate network. Even smartphones and tablets can connect through a VPN.

Is VPN traffic encrypted?

  • Yes, traffic on the virtual network is sent securely by establishing an encrypted connection across the Internet known as a tunnel.
  • VPN traffic from a device such as a computer, tablet, or smartphone is encrypted as it travels through this tunnel. Offsite employees can then use the virtual network to access the corporate network.

Protocols of VPN

To build stable networks, there are many distinct VPN protocols are used. Some protocols of this kind are listed below

  • IPsec (IP security)
  • PPTP (Point to Point Tunneling Protocol)
  • L2TP (Layer 2 Tunneling Protocol)
  • SSL (Secure Sockets Layer)
  • TLS (Transport Layer Security)
Diktat calling for storage of user data may face backlash Science and tech

Recent Posts

  • Daily Prelims Notes 23 March 2025 March 23, 2025
  • Challenges in Uploading Voting Data March 23, 2025
  • Fertilizers Committee Warns Against Under-Funding of Nutrient Subsidy Schemes March 23, 2025
  • Tavasya: The Fourth Krivak-Class Stealth Frigate Launched March 23, 2025
  • Indo-French Naval Exercise Varuna 2024 March 23, 2025
  • No Mismatch Between Circulating Influenza Strains and Vaccine Strains March 23, 2025
  • South Cascade Glacier March 22, 2025
  • Made-in-India Web Browser March 22, 2025
  • Charting a route for IORA under India’s chairship March 22, 2025
  • Mar-a-Lago Accord and dollar devaluation March 22, 2025

About

If IAS is your destination, begin your journey with Optimize IAS.

Hi There, I am Santosh I have the unique distinction of clearing all 6 UPSC CSE Prelims with huge margins.

I mastered the art of clearing UPSC CSE Prelims and in the process devised an unbeatable strategy to ace Prelims which many students struggle to do.

Contact us

moc.saiezimitpo@tcatnoc

For More Details

Work with Us

Connect With Me

Course Portal
Search