Chapter VII - RIGHTS AND OBLIGATIONS OF DEPOSITORIES, PARTICIPANTS, ISSUERS, MANNER OF SURRENDER OF CERTIFICATE OF SECURITY AND CREATION OF PLEDGE OR HYPOTHECATION (From Regulation 40 to Regulation 82AA)
Regulation 81C - Appointment, role and responsibilities of chief information security officer
Securities and Exchange Board of India (Depositories and Participants) Regulations, 2018 Chapter VII RIGHTS AND OBLIGATIONS OF DEPOSITORIES, PARTICIPANTS, ISSUERS, MANNER OF SURRENDER OF CERTIFICATE OF SECURITY AND CREATION OF PLEDGE OR HYPOTHECATION
📋
Contents
Cases Cited
Referred In
Notifications
Circulars
Forms
Manuals
Acts
Rules & Regulations
Case Laws New
Ref Provisions New
Plus +
Source NTF
Summary
Similar
Note
Bookmark
Share
✓ Copied successfully !
Print
Print Options
For full text, please login
Login to TaxTMI
Verification Pending
The Email Id has not been verified. Click on the link we have sent on
Chief information security officer required for depositories to manage cybersecurity risks, controls and incident response. Every depository must appoint a chief information security officer responsible for assessing, identifying and mitigating cybersecurity risks and responding to incidents. The CISO must establish standards and controls, direct processes and procedures as per the board approved cybersecurity and cyber resilience policy, and oversee planning, development, maintenance, review and implementation of Information Security Policies and cyber security initiatives.
Cases where this provision is explicitly mentioned in the judgment/order text; may not be exhaustive. To view the complete list of cases mentioning this section, Click here.
Provisions expressly mentioned in the judgment/order text.
Chief information security officer required for depositories to manage cybersecurity risks, controls and incident response.
Every depository must appoint a chief information security officer responsible for assessing, identifying and mitigating cybersecurity risks and responding to incidents. The CISO must establish standards and controls, direct processes and procedures as per the board approved cybersecurity and cyber resilience policy, and oversee planning, development, maintenance, review and implementation of Information Security Policies and cyber security initiatives.
Full Summary is available for active users!
Note: It is a system-generated summary and is for quick reference only.