Internet Security Policy
security purposes and to ensure that this service remains available to all
users, this Government computer system employs commercial software programs to
monitor network traffic to identify unauthorised attempts to upload or change
information, or otherwise cause damage.
for authorised law enforcement investigations, no other attempts are made to
identify individual users or their usage habits. Raw data logs are used for no
other purposes and are scheduled for regular deletion.
attempts to upload information or change information on this service are
strictly prohibited and may be punishable under the Indian IT Act.