<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cybersecurity Careers Archives - Bhatt &amp; Joshi Associates</title>
	<atom:link href="https://bhattandjoshiassociates.com/tag/cybersecurity-careers/feed/" rel="self" type="application/rss+xml" />
	<link>https://bhattandjoshiassociates.com/tag/cybersecurity-careers/</link>
	<description>Best High Court Advocates &#38; Lawyers</description>
	<lastBuildDate>Wed, 04 Feb 2026 08:54:11 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://bhattandjoshiassociates.com/wp-content/uploads/2025/08/cropped-bhatt-and-joshi-associates-logo-32x32.png</url>
	<title>Cybersecurity Careers Archives - Bhatt &amp; Joshi Associates</title>
	<link>https://bhattandjoshiassociates.com/tag/cybersecurity-careers/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Career in Ethical Hacking in India: Legal Framework, Regulations, and Opportunities</title>
		<link>https://bhattandjoshiassociates.com/career-in-ethical-hacking/</link>
		
		<dc:creator><![CDATA[Team]]></dc:creator>
		<pubDate>Sun, 31 Jan 2016 11:04:48 +0000</pubDate>
				<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[Career in Ethical Hacking in India]]></category>
		<category><![CDATA[CERT-In]]></category>
		<category><![CDATA[Cyber Law India]]></category>
		<category><![CDATA[Cybercrime Laws India]]></category>
		<category><![CDATA[Cybersecurity Careers]]></category>
		<category><![CDATA[Cybersecurity Professionals]]></category>
		<category><![CDATA[Ethical Hacker Jobs]]></category>
		<category><![CDATA[Ethical Hacking India]]></category>
		<category><![CDATA[Indian Cyber Laws]]></category>
		<category><![CDATA[Information Technology Act 2000]]></category>
		<guid isPermaLink="false">https://saralkanoon.wordpress.com/?p=109</guid>

					<description><![CDATA[<p>Introduction The digital transformation sweeping across India has created unprecedented opportunities in cybersecurity, particularly in ethical hacking. As organizations increasingly depend on digital infrastructure, the demand for skilled professionals who can identify and address security vulnerabilities has surged dramatically. However, this career path exists within a complex legal framework that distinguishes between authorized security testing [&#8230;]</p>
<p>The post <a href="https://bhattandjoshiassociates.com/career-in-ethical-hacking/">Career in Ethical Hacking in India: Legal Framework, Regulations, and Opportunities</a> appeared first on <a href="https://bhattandjoshiassociates.com">Bhatt &amp; Joshi Associates</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2><b>Introduction</b></h2>
<p>The digital transformation sweeping across India has created unprecedented opportunities in cybersecurity, particularly in ethical hacking. As organizations increasingly depend on digital infrastructure, the demand for skilled professionals who can identify and address security vulnerabilities has surged dramatically. However, this career path exists within a complex legal framework that distinguishes between authorized security testing and criminal activity. Understanding the regulatory landscape is essential for anyone pursuing a career in ethical hacking in India.</p>
<p><span style="font-weight: 400;">The Indian cybersecurity market is experiencing remarkable growth, with projections indicating it will reach approximately 74.35 billion USD by 2030, representing an annual growth rate exceeding 15 percent [1]. This expansion reflects the escalating cyber threats faced by government agencies, financial institutions, and private enterprises. Ethical hackers, also known as white-hat hackers, serve as the frontline defense against these threats by proactively identifying system weaknesses before malicious actors can exploit them.</span></p>
<h2><b>Understanding Ethical Hacking Within India&#8217;s Legal Framework</b></h2>
<h3><b>The Information Technology Act, 2000: Foundation of Cyber Law</b></h3>
<p><span style="font-weight: 400;">The Information Technology Act, 2000 stands as India&#8217;s primary legislation addressing cybercrime and electronic commerce [2]. Enacted by the Indian Parliament on May 17, 2000, and notified on October 17, 2000, this Act provides legal recognition for electronic transactions and establishes penalties for various cybercrimes. The legislation was modeled after the UNCITRAL Model Law on Electronic Commerce 1996, aiming to create a framework for secure digital transactions and e-governance.</span></p>
<p><span style="font-weight: 400;">The Act originally contained 94 sections divided into 13 chapters, though subsequent amendments removed certain provisions. The Information Technology Amendment Act, 2008, significantly revised the original legislation, addressing gaps that emerged as technology evolved and introducing new offenses to combat emerging cyber threats [3].</span></p>
<h3><b>Distinguishing Legal Security Testing from Criminal Hacking</b></h3>
<p><span style="font-weight: 400;">The critical distinction between ethical hacking and criminal activity lies in authorization and intent. Chapter IX, Section 43 of the Information Technology Act, 2000 prescribes penalties for unauthorized access to computer systems, data theft, virus introduction, and system disruption. Any person who, without permission from the owner or authorized person, accesses a computer system, downloads data, introduces viruses, or causes denial of access faces civil liability with compensation extending up to one crore rupees [4].</span></p>
<p><span style="font-weight: 400;">Chapter XI, Section 66 elevates these contraventions to criminal offenses when committed dishonestly or fraudulently. The provision states that any person who dishonestly or fraudulently commits acts referenced in Section 43 shall face imprisonment for a term extending up to three years, a fine extending up to five lakh rupees, or both. The crucial element distinguishing criminal hacking is the presence of malicious intent, which ethical hackers explicitly lack [5].</span></p>
<p><span style="font-weight: 400;">Ethical hacking becomes lawful when conducted with explicit written authorization from the organization whose systems are being tested. This authorization must clearly define the scope of testing, timeframes, methodologies permitted, and boundaries that must not be crossed. Without such formal consent, even well-intentioned security assessments may be prosecuted under Section 66 of the Information Technology Act, 2000 [6].</span></p>
<h3><b>Constitutional Protections and Landmark Judgment</b></h3>
<p><span style="font-weight: 400;">The constitutional framework protecting digital rights received significant reinforcement through the landmark case of Shreya Singhal v. Union of India, AIR 2015 SC 1523. In this pivotal judgment delivered on March 24, 2015, a two-judge bench comprising Justice R.F. Nariman and Justice J. Chelameswar struck down Section 66A of the Information Technology Act, 2000, declaring it unconstitutional [7].</span></p>
<p><span style="font-weight: 400;">Section 66A had criminalized sending offensive messages through communication services, but the Supreme Court found it excessively vague and overbroad. Justice Nariman, writing for the Court, held that Section 66A &#8220;arbitrarily, excessively and disproportionately invades the right of free speech&#8221; guaranteed under Article 19(1)(a) of the Constitution of India. The Court emphasized that restrictions on fundamental rights must be narrowly tailored and precisely defined to withstand constitutional scrutiny [8].</span></p>
<p><span style="font-weight: 400;">This judgment established important principles for cybersecurity professionals. While the Court struck down Section 66A, it upheld the constitutionality of Section 69A, which permits the government to block access to information for reasons including national security and public order. The Court also read down Section 79, which deals with intermediary liability, requiring that takedown notices must be sanctioned by court orders or government authorities rather than private complaints [9].</span></p>
<h2><b>Regulatory Bodies Governing Cybersecurity in India</b></h2>
<h3><b>Indian Computer Emergency Response Team (CERT-In)</b></h3>
<p><span style="font-weight: 400;">The Indian Computer Emergency Response Team, established in 2004 under Section 70B of the Information Technology Act, 2000, serves as the national nodal agency for responding to cybersecurity incidents. Operating within the Ministry of Electronics and Information Technology, CERT-In performs several critical functions including collecting and analyzing information about cyber incidents, issuing forecasts and alerts, coordinating incident response activities, and providing guidelines on security best practices.</span></p>
<p><span style="font-weight: 400;">On April 28, 2022, CERT-In issued comprehensive directions under sub-section (6) of Section 70B of the Information Technology Act, 2000, significantly expanding cybersecurity compliance requirements. These directions mandate that service providers, intermediaries, data centers, body corporates, and government organizations report cybersecurity incidents to CERT-In within six hours of becoming aware of them. This timeline represents one of the most stringent reporting requirements globally [2].</span></p>
<p><span style="font-weight: 400;">The directions further require entities to maintain logs of all their Information and Communication Technology systems for 180 days within Indian jurisdiction. These logs must be provided to CERT-In upon request or during incident investigations. Failure to comply with CERT-In directions results in penalties including imprisonment for up to one year, fines extending to one lakh rupees, or both.</span></p>
<h3><b>National Critical Information Infrastructure Protection Centre (NCIIPC)</b></h3>
<p><span style="font-weight: 400;">Established on January 16, 2014, under Section 70A of the Information Technology Act, 2000 (as amended in 2008), the National Critical Information Infrastructure Protection Centre functions as the national nodal agency for protecting Critical Information Infrastructure. Operating under the National Technical Research Organisation within the Prime Minister&#8217;s Office, NCIIPC focuses on sectors deemed critical to national security and economic stability, including energy, banking, telecommunications, transport, and government operations.</span></p>
<p><span style="font-weight: 400;">The Indian cybersecurity framework divides responsibilities between CERT-In, which handles non-critical infrastructure incidents, and NCIIPC, which addresses threats to critical information infrastructure. This bifurcation ensures specialized attention to systems whose compromise could significantly impact national security or public safety.</span></p>
<h2><b>Professional Certifications and Career Pathways</b></h2>
<h3><b>Industry-Recognized Certifications</b></h3>
<p><span style="font-weight: 400;">Professional certifications validate technical competence and demonstrate commitment to ethical standards. The Certified Ethical Hacker certification, offered by the EC-Council, ranks among the most recognized credentials globally. The CEH curriculum covers penetration testing methodologies, vulnerability assessment, attack vectors, and defensive countermeasures. The EC-Council recommends candidates possess at least two years of information security experience before attempting the CEH examination [1].</span></p>
<p><span style="font-weight: 400;">The Offensive Security Certified Professional certification represents the gold standard for hands-on penetration testing skills. Unlike multiple-choice examinations, OSCP requires candidates to complete a rigorous 24-hour practical examination where they must successfully exploit live systems and document their findings in a professional penetration testing report. This certification demonstrates genuine technical proficiency rather than theoretical knowledge alone.</span></p>
<p><span style="font-weight: 400;">The Certified Information Systems Security Professional certification, administered by ISC², targets experienced professionals in security program management and leadership roles. CISSP requires five years of cumulative paid work experience in two or more domains of the CISSP Common Body of Knowledge. This certification emphasizes the strategic and managerial aspects of cybersecurity rather than purely technical skills.</span></p>
<p><span style="font-weight: 400;">CompTIA Security+ provides foundational knowledge covering broad cybersecurity concepts including network security, compliance, operational security, threats, and vulnerabilities. This vendor-neutral certification serves as an excellent entry point for individuals beginning their cybersecurity careers and meets requirements for certain government positions under DoD 8570/8140 mandates.</span></p>
<h3><b>Career Opportunities and Compensation in Ethical Hacking in India</b></h3>
<p><span style="font-weight: 400;">Ethical hackers in India command competitive salaries reflecting the high demand for their specialized skills. Entry-level ethical hackers with CEH certification typically earn between six to fifteen lakh rupees annually, while OSCP-certified penetration testers often receive offers ranging from ten to twenty-five lakh rupees per year. Senior professionals holding multiple advanced certifications and extensive experience can command significantly higher compensation.</span></p>
<p>Career progression for ethical hackers includes various specialized roles, offering a clear growth path for those pursuing a career in ethical hacking in India. Penetration testers conduct authorized simulated attacks to identify vulnerabilities in networks, applications, and systems. Security architects design and implement security solutions to protect organizational infrastructure, requiring deep knowledge of firewalls, encryption, intrusion detection systems, and secure architecture principles. Security consultants provide expert guidance to organizations on improving their security posture, conducting risk assessments, and implementing security strategies.</p>
<p><span style="font-weight: 400;">Chief Information Security Officers occupy senior leadership positions with salaries ranging from twenty lakh to fifty lakh rupees annually, depending on organizational size and complexity. These executives develop organizational security strategies, manage security teams, ensure regulatory compliance, and communicate security risks to executive leadership and boards of directors.</span></p>
<h2><b>Legal Precedents and Case Studies</b></h2>
<h3><b>The MphasiS BPO Fraud Case</b></h3>
<p><span style="font-weight: 400;">In April 2005, India witnessed one of its most significant cybercrime cases when four employees of MphasiS BPO exploited their authorized access to commit fraudulent transactions. The perpetrators had memorized customer account details during their legitimate work activities and subsequently accessed these accounts without authorization to conduct fraudulent transactions totaling substantial sums.</span></p>
<p><span style="font-weight: 400;">The accused faced charges under Section 43(a) and Section 66 of the Information Technology Act, 2000, alongside Sections 420 (cheating), 465 (forgery), 467 (forgery of valuable security), and 471 (using forged documents as genuine) of the Indian Penal Code, 1860. The court held that since the acts involved unauthorized access to electronic accounts, they constituted cybercrimes falling squarely within the Information Technology Act&#8217;s purview.</span></p>
<p><span style="font-weight: 400;">This case demonstrates several critical principles for cybersecurity professionals. First, authorized access for legitimate purposes does not extend to activities beyond the scope of authorization. Second, insider threats pose significant risks that organizations must address through continuous monitoring and behavioral analysis. Third, the Indian legal system addresses cybercrimes through a multi-statute approach, combining specialized IT laws with traditional criminal provisions [4].</span></p>
<h3><b>Implications for Ethical Hackers</b></h3>
<p><span style="font-weight: 400;">For ethical hackers, these legal precedents underscore the absolute necessity of obtaining explicit written authorization before conducting any security assessments. The authorization must precisely define what systems may be tested, what methodologies may be employed, what timeframes apply, and what boundaries must not be crossed. Even if an ethical hacker identifies critical vulnerabilities with genuinely beneficial intentions, conducting assessments without proper authorization exposes them to criminal prosecution under Section 66 of the Information Technology Act, 2000.</span></p>
<p><span style="font-weight: 400;">Several documented instances illustrate this principle. In one case, a well-meaning ethical hacker tested a company&#8217;s database security without explicit permission, discovering several significant weaknesses. Despite the hacker&#8217;s intention to improve security, the absence of formal written consent resulted in charges under Section 66 for unauthorized data access. This case emphasized that good intentions do not substitute for proper legal authorization [6].</span></p>
<h2><b>Challenges and Regulatory Gaps</b></h2>
<h3><b>Ambiguity in Legal Framework</b></h3>
<p><span style="font-weight: 400;">Despite the Information Technology Act, 2000 providing a foundation for addressing cybercrimes, significant gaps remain in specifically regulating ethical hacking activities. The Act does not contain explicit provisions recognizing or regulating authorized security testing, creating potential uncertainty for practitioners. This regulatory vacuum means ethical hackers must navigate carefully, ensuring their activities remain clearly within authorized boundaries.</span></p>
<p><span style="font-weight: 400;">The distinction between Section 43&#8217;s civil liability provisions and Section 66&#8217;s criminal penalties depends on proving dishonest or fraudulent intent. However, determining intent can be subjective, potentially exposing ethical hackers to legal risks if their activities are misunderstood or mischaracterized by law enforcement agencies unfamiliar with legitimate security testing methodologies.</span></p>
<h3><b>Public Perception and Misunderstanding</b></h3>
<p><span style="font-weight: 400;">Ethical hackers often face challenges stemming from public and law enforcement misunderstanding of their activities. The general perception equates &#8220;hacking&#8221; with criminal activity, making it difficult for legitimate security professionals to explain their work to non-technical audiences. This misperception can lead to wrongful accusations, reputational damage, and unnecessary legal complications even when ethical hackers operate with proper authorization.</span></p>
<p><span style="font-weight: 400;">Educational initiatives and professional associations play crucial roles in addressing these misunderstandings. Organizations like the Information Security Research Association and various cybersecurity professional groups work to educate law enforcement, judiciary, and the public about the legitimate role of ethical hackers in protecting digital infrastructure.</span></p>
<h2><b>Best Practices for Ethical Hackers in India</b></h2>
<h3><b>Obtaining Proper Authorization</b></h3>
<p><span style="font-weight: 400;">Before commencing any security assessment, ethical hackers must obtain comprehensive written authorization from the organization. This documentation should include specific details about which systems and networks fall within the testing scope, what testing methodologies are permitted, the timeframe during which testing may occur, and any restrictions or sensitive areas that must be avoided.</span></p>
<p><span style="font-weight: 400;">The authorization should be signed by individuals with appropriate authority to grant such permissions, typically senior management or designated security officers. Ethical hackers should maintain copies of all authorization documents and correspondence throughout the engagement and retain them for a reasonable period afterward in case questions arise about the legitimacy of their activities.</span></p>
<h3><b>Maintaining Professional Standards</b></h3>
<p><span style="font-weight: 400;">Professional ethical hackers adhere to established codes of conduct and ethical guidelines. These standards emphasize confidentiality regarding discovered vulnerabilities, responsible disclosure practices, avoidance of unnecessary damage during testing, and respect for privacy and data protection principles. Violations of these professional standards can result in certification revocations, professional sanctions, and legal consequences.</span></p>
<p><span style="font-weight: 400;">Responsible disclosure practices require ethical hackers to report discovered vulnerabilities to the affected organization promptly and confidentially, allowing reasonable time for remediation before public disclosure. This approach balances the public interest in security awareness with organizations&#8217; need to address vulnerabilities before malicious actors can exploit them.</span></p>
<h3><b>Continuous Learning and Skill Development</b></h3>
<p><span style="font-weight: 400;">The cybersecurity landscape evolves rapidly, with new vulnerabilities, attack techniques, and defensive technologies emerging constantly. Successful ethical hackers commit to continuous learning through hands-on practice platforms like Hack The Box and TryHackMe, participation in bug bounty programs, attendance at security conferences and training programs, and pursuit of advanced certifications as experience grows.</span></p>
<p><span style="font-weight: 400;">This ongoing education ensures ethical hackers remain current with evolving threats and defense mechanisms while maintaining the technical proficiency required for effective security assessments. Many organizations support their security staff&#8217;s professional development through training budgets, conference attendance, and certification exam fees.</span></p>
<h2><b>Future Outlook and Emerging Trends</b></h2>
<h3><b>Proposed Digital India Act</b></h3>
<p><span style="font-weight: 400;">In 2022, the Indian government announced proposals to replace the Information Technology Act, 2000 with a more comprehensive Digital India Act. This new legislation aims to address contemporary challenges including privacy protection, social media regulation, over-the-top platform governance, intermediary liability, additional cyber offenses, and governance of emerging technologies like artificial intelligence and blockchain.</span></p>
<p><span style="font-weight: 400;">For ethical hackers, the proposed legislation may provide clearer guidance on authorized security testing, bug bounty programs, and responsible disclosure. Industry stakeholders have advocated for explicit recognition of ethical hacking activities within the new legal framework, potentially reducing ambiguity and legal risks for security professionals operating with proper authorization.</span></p>
<h3><b>Growing Demand and Career Opportunities in Ethical Hacking in India</b></h3>
<p><span style="font-weight: 400;">India&#8217;s digital economy growth ensures sustained demand for cybersecurity professionals. Government initiatives promoting digitalization across sectors, increasing cyber threats targeting critical infrastructure, mandatory compliance requirements for data protection and security, and expanding adoption of cloud computing and Internet of Things technologies all contribute to robust career prospects for ethical hacking in India.</span></p>
<p>Organizations across sectors including banking and financial services, healthcare, e-commerce, government agencies, telecommunications, and information technology services actively recruit skilled ethical hackers. The talent shortage in cybersecurity means qualified professionals enjoy strong negotiating positions for compensation and career advancement opportunities in ethical hacking in India.</p>
<h2><b>Conclusion</b></h2>
<p><span style="font-weight: 400;">Pursuing a career in ethical hacking in India offers substantial opportunities for those committed to protecting digital infrastructure. However, success requires not only technical proficiency but also thorough understanding of the legal and regulatory framework governing cybersecurity activities. The Information Technology Act, 2000, as amended, provides the primary legal foundation, distinguishing between authorized security testing and criminal hacking based on permission and intent.</span></p>
<p><span style="font-weight: 400;">Regulatory bodies including CERT-In and NCIIPC establish standards, respond to incidents, and enforce compliance with cybersecurity requirements. Professional certifications from recognized organizations validate expertise and demonstrate commitment to ethical standards. Legal precedents emphasize the critical importance of obtaining explicit written authorization before conducting security assessments, regardless of beneficial intentions.</span></p>
<p>As India continues its digital transformation journey, ethical hackers will play increasingly vital roles in safeguarding critical systems and sensitive data. Those who navigate the legal landscape carefully, maintain professional standards, and continuously develop their skills will find rewarding opportunities while building a sustainable career in ethical hacking in India within this dynamic and essential field.</p>
<h2><b>References</b></h2>
<p><span style="font-weight: 400;">[1] Coursera. (2025). </span><i><span style="font-weight: 400;">5 Ethical Hacking Certifications to Bolster Your Career</span></i><span style="font-weight: 400;">. Available at: </span><a href="https://www.coursera.org/in/articles/ethical-hacking-certifications"><span style="font-weight: 400;">https://www.coursera.org/in/articles/ethical-hacking-certifications</span></a><span style="font-weight: 400;"> </span></p>
<p><span style="font-weight: 400;">[2] UpGuard. (2026). </span><i><span style="font-weight: 400;">Top Cybersecurity Regulations in India in 2026</span></i><span style="font-weight: 400;">. Available at: </span><a href="https://www.upguard.com/blog/cybersecurity-regulations-india"><span style="font-weight: 400;">https://www.upguard.com/blog/cybersecurity-regulations-india</span></a><span style="font-weight: 400;"> </span></p>
<p><span style="font-weight: 400;">[3] ClearTax. (2025). </span><i><span style="font-weight: 400;">IT Act 2000: Objectives, Features, Amendments, Sections, Offences and Penalties</span></i><span style="font-weight: 400;">. Available at: </span><a href="https://cleartax.in/s/it-act-2000"><span style="font-weight: 400;">https://cleartax.in/s/it-act-2000</span></a><span style="font-weight: 400;"> </span></p>
<p><span style="font-weight: 400;">[4] Disaster.Shiksha. (2025). </span><i><span style="font-weight: 400;">Understanding Section 43: Penalty for Damage to Computer Systems under IT Act</span></i><span style="font-weight: 400;">. Available at: </span><a href="https://disaster.shiksha/industrial-safety-rules-acts/understanding-section-43-it-act-penalty/"><span style="font-weight: 400;">https://disaster.shiksha/industrial-safety-rules-acts/understanding-section-43-it-act-penalty/</span></a><span style="font-weight: 400;"> </span></p>
<p><span style="font-weight: 400;">[5] Khurana &amp; Khurana. (2022). </span><i><span style="font-weight: 400;">Cyber Crimes And Ethical Hacking In India</span></i><span style="font-weight: 400;">. Available at: </span><a href="https://www.khuranaandkhurana.com/2022/06/27/cyber-crimes-and-ethical-hacking-in-india/"><span style="font-weight: 400;">https://www.khuranaandkhurana.com/2022/06/27/cyber-crimes-and-ethical-hacking-in-india/</span></a><span style="font-weight: 400;"> </span></p>
<p><span style="font-weight: 400;">[6] Boston Institute of Analytics. (2025). </span><i><span style="font-weight: 400;">What Are The Legal Boundaries Of Ethical Hacking In India?</span></i><span style="font-weight: 400;"> Available at: </span><a href="https://bostoninstituteofanalytics.org/blog/what-are-the-legal-boundaries-of-ethical-hacking-in-india/"><span style="font-weight: 400;">https://bostoninstituteofanalytics.org/blog/what-are-the-legal-boundaries-of-ethical-hacking-in-india/</span></a><span style="font-weight: 400;"> </span></p>
<p><span style="font-weight: 400;">[7] Testbook. </span><i><span style="font-weight: 400;">Shreya Singhal vs Union of India: Landmark Case &amp; Download PDF</span></i><span style="font-weight: 400;">. Available at: </span><a href="https://testbook.com/landmark-judgements/shreya-singhal-vs-union-of-india"><span style="font-weight: 400;">https://testbook.com/landmark-judgements/shreya-singhal-vs-union-of-india</span></a><span style="font-weight: 400;"> </span></p>
<p><span style="font-weight: 400;">[8] Indian Kanoon. (2015). </span><i><span style="font-weight: 400;">Shreya Singhal vs Union of India on 24 March, 2015</span></i><span style="font-weight: 400;">. Available at: </span><a href="https://indiankanoon.org/doc/110813550/"><span style="font-weight: 400;">https://indiankanoon.org/doc/110813550/</span></a><span style="font-weight: 400;"> </span></p>
<p><span style="font-weight: 400;">[9] Legal Service India. </span><i><span style="font-weight: 400;">Shreya Singhal v. Union Of India AIR 2015 SC 1523</span></i><span style="font-weight: 400;">. Available at: </span><a href="https://www.legalserviceindia.com/legal/article-10124-shreya-singhal-v-union-of-india-air-2015-sc-1523.html"><span style="font-weight: 400;">https://www.legalserviceindia.com/legal/article-10124-shreya-singhal-v-union-of-india-air-2015-sc-1523.html</span></a><span style="font-weight: 400;"> </span></p>
<p>The post <a href="https://bhattandjoshiassociates.com/career-in-ethical-hacking/">Career in Ethical Hacking in India: Legal Framework, Regulations, and Opportunities</a> appeared first on <a href="https://bhattandjoshiassociates.com">Bhatt &amp; Joshi Associates</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
