Home > Inbox
 Print Friendly Page ||  Email this story


Case Study Special

I read the February issue of Network Magazine and found the case study special to be an interesting read with its write-ups on key IT deployments from various verticals, all selectively compiled in a single issue.

I was glad to learn that the government found space in the best of case studies issue.

— Wing Comdr. Anurodh Kumar Gupta

IT is the key business enabler for various enterprises across verticals. We had cover five sections such as Disaster recovery, Servers, Government, Mobile enablement, document management. These were just a few of the many case studies that we had covered in 2006.

It is an accepted fact that government departments and corporations are taking high-tech initiatives with regards to IT deployments and security. This is also due to the fact that almost all the services offered by these organisations across the country have an online presence.

We had covered three Governments IT deployments that have made their mark in terms of services and security. Kalyan-Dombivli Municipal Corporation (KDMC) on G2C services, the Punjab Government’s Department of IT’s (DoIT) security set-up and the EDI deployment executed by Indian Customs to handle the management of cargo at airport and seaport terminals across the country.

Cyber Law

This is with regards to the focus section in the Network Magazine, February issue. The article titled (Amen!)dments to the Information Technology Act was very informative and interesting to read.

— Richard Nevins,

Recent cases of bank fraud and BPO have resulted in concerns being raised vis-a-vis the role of data protection. Most such crimes have been committed via unauthorised access to the electronic accounts of end-customers. Hence they come under the preview and domain of cyber crimes.

Digital signatures are an application of asymmetric key cryptography and their security is based upon the fact that it is computationally unfeasible to compromise the application with the computing power that is currently available.

If due to some technological innovation, a path-breaking invention or a remarkable discovery, we should be able to overcome this limitation. If such an eventuality comes to pass, digital signatures will no longer be usable as authentication mechanisms and the whole legal superstructure built around the concept will collapse, necessitating an overhaul of the Act itself. We can only hope that the much needed amendments will be judiciously executed by the parliamentary standing committee.

Finally an overall feel of the amendments seems to have rectified most of the drawbacks in the original Act. Despite the Act being in force since 2000 and the increasing use of computers in every sphere, we haven’t seen much court action involving the Act.

Security Survey

This is with regards to the News and Analysis section in Network Magazine. I find the section informative specifically on security aspects. The various the trends and surveys keep me updated on the latest happenings in IT. Looking forward to read more such informative and analytical news.

— Jose Raj,

The Ernst and Young security survey, sought the views of nearly 1,200 senior information security professionals in 48 countries, with 144 respondents from India, representing both multinational and local organisations.

The survey informs that regulatory compliance will continue to dominate information security, challenging organisations in how they sustain compliance and integrate it into an overriding risk management framework and internal control processes.

We always look forward to hearing from you. Please e-mail your comments, suggestions and queries to prashant.rao@expressindia.com or snailmail us at

The Editor
Network Magazine
Business Publications Division
Indian Express Newspapers (Mumbai) Ltd
First Floor, Express Towers
Nariman Point, Mumbai 400021