REGULATORY GOVERNANCE

Directive 20(3)
Compliance Architecture

As a licensed Cloud Service Provider (CSP) and VPS operator, Netnounce infrastructure is built from the ground up to adhere to the Cyber Security Directions of 28.04.2022.

Mandatory Directives

Mandatory Logging

We maintain validated subscriber logs, including IP allocation history and validated KYC details, for a rolling period of 5 years.

/var/log/subscriber_access
WORM_ENABLED
2023|ARCHIVE_SEALED_VOL_2023_A|SHA256:e3b0...4d2
2022|ARCHIVE_SEALED_VOL_2022_A|SHA256:e3b0...4d2
2021|ARCHIVE_SEALED_VOL_2021_A|SHA256:e3b0...4d2
2020|ARCHIVE_SEALED_VOL_2020_A|SHA256:e3b0...4d2
2019|ARCHIVE_SEALED_VOL_2019_A|SHA256:e3b0...4d2
2018|ARCHIVE_SEALED_VOL_2018_A|SHA256:e3b0...4d2
2024|WRITING_STREAM...|ACTIVE
Retention Policy
5 YEARS

Failure to Comply

Non-compliance with KYC norms or log retention policies can lead to penal consequences under the Information Technology Act, 2000. Netnounce enforces a strict Zero Tolerance Policy.

Note: Accounts without verified KYC are automatically suspended after 72 hours.

NTP Stratum-1 Sync
10:42:20.98
Synced with NPL (New Delhi)
Max Drift
±0.002ms
Source
GPS / Atomic

PoC for CERT-In

Our designated Point of Contact (PoC) for cyber security incidents is available 24/7/365 to Govt agencies.

Name: Chief Security Officer
Email: cert-in@netnounce.io
Phone: +91-22-XXXX-XXXX

Need a Compliance Report?

Download our full Directive 20(3) alignment statement for your internal audit team.

Download PDF