{"id":110,"date":"2012-12-21T17:32:46","date_gmt":"2012-12-21T12:02:46","guid":{"rendered":"http:\/\/www.cyberlawcollege.com\/wp\/?page_id=110"},"modified":"2012-12-21T18:19:04","modified_gmt":"2012-12-21T12:49:04","slug":"ita-2008","status":"publish","type":"page","link":"http:\/\/www.cyberlawcollege.com\/wp\/?page_id=110","title":{"rendered":"ITA 2008"},"content":{"rendered":"<div class=\"pf-content\"><p style=\"font-size:20px\"><strong>Due Diligence Training<\/strong><\/p>\n<p>Information Technology Act 2000 as amended in 2008 (ITA 2008) requires &#8220;Due Diligence&#8221; to be followed by IT users in India. <\/p>\n<p>Non compliance of ITA 2008 could result in adverse consequences on the organization and its key executives and impose civil and criminal liabilities.<\/p>\n<p>A part of this &#8220;Due Diligence&#8221; is manpower training on ITA 2008 and its implications.<\/p>\n<p>Cyber Law College specializes in such &#8220;Due Diligence Training&#8221; as required under ITA 2008 for difrerent levels of management and workmen level employees.<\/p>\n<p>Interested persons may contact Naavi\/Cyber Law College. <\/p>\n<div style=\"padding-bottom:20px; padding-top:10px;\" class=\"hupso-share-buttons\"><!-- Hupso Share Buttons - https:\/\/www.hupso.com\/share\/ --><a class=\"hupso_toolbar\" href=\"https:\/\/www.hupso.com\/share\/\"><img src=\"http:\/\/static.hupso.com\/share\/buttons\/share-medium.png\" style=\"border:0px; padding-top:5px; float:left;\" alt=\"Share Button\"\/><\/a><script type=\"text\/javascript\">var hupso_services_t=new Array(\"Twitter\",\"Facebook\",\"Google Plus\",\"Pinterest\",\"Linkedin\");var hupso_background_t=\"#EAF4FF\";var hupso_border_t=\"#66CCFF\";var hupso_toolbar_size_t=\"medium\";var hupso_twitter_via = \"naavi\";var hupso_image_folder_url = \"\";var hupso_twitter_via=\"naavi\";var hupso_url_t=\"\";var hupso_title_t=\"ITA 2008\";<\/script><script type=\"text\/javascript\" src=\"http:\/\/static.hupso.com\/share\/js\/share_toolbar.js\"><\/script><!-- Hupso Share Buttons --><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Due Diligence Training Information Technology Act 2000 as amended in 2008 (ITA 2008) requires &#8220;Due Diligence&#8221; to be followed by IT users in India. Non compliance of ITA 2008 could result in adverse consequences on the organization and its key &hellip; <a href=\"http:\/\/www.cyberlawcollege.com\/wp\/?page_id=110\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n<div style=\"padding-bottom:20px; padding-top:10px;\" class=\"hupso-share-buttons\"><!-- Hupso Share Buttons - https:\/\/www.hupso.com\/share\/ --><a class=\"hupso_toolbar\" href=\"https:\/\/www.hupso.com\/share\/\"><img src=\"http:\/\/static.hupso.com\/share\/buttons\/share-medium.png\" style=\"border:0px; padding-top:5px; float:left;\" alt=\"Share Button\"\/><\/a><script type=\"text\/javascript\">var hupso_services_t=new Array(\"Twitter\",\"Facebook\",\"Google Plus\",\"Pinterest\",\"Linkedin\");var hupso_background_t=\"#EAF4FF\";var hupso_border_t=\"#66CCFF\";var hupso_toolbar_size_t=\"medium\";var hupso_twitter_via = \"naavi\";var hupso_image_folder_url = \"\";var hupso_twitter_via=\"naavi\";var hupso_url_t=\"\";var hupso_title_t=\"ITA 2008\";<\/script><script type=\"text\/javascript\" src=\"http:\/\/static.hupso.com\/share\/js\/share_toolbar.js\"><\/script><!-- Hupso Share Buttons --><\/div>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"open","ping_status":"open","template":"","meta":{"_editorskit_title_hidden":false,"_editorskit_reading_time":0,"_editorskit_is_block_options_detached":false,"_editorskit_block_options_position":"{}","_themeisle_gutenberg_block_has_review":false,"spay_email":""},"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/P3NjGu-1M","_links":{"self":[{"href":"http:\/\/www.cyberlawcollege.com\/wp\/index.php?rest_route=\/wp\/v2\/pages\/110"}],"collection":[{"href":"http:\/\/www.cyberlawcollege.com\/wp\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/www.cyberlawcollege.com\/wp\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/www.cyberlawcollege.com\/wp\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.cyberlawcollege.com\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=110"}],"version-history":[{"count":2,"href":"http:\/\/www.cyberlawcollege.com\/wp\/index.php?rest_route=\/wp\/v2\/pages\/110\/revisions"}],"predecessor-version":[{"id":131,"href":"http:\/\/www.cyberlawcollege.com\/wp\/index.php?rest_route=\/wp\/v2\/pages\/110\/revisions\/131"}],"wp:attachment":[{"href":"http:\/\/www.cyberlawcollege.com\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=110"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}