Contains the procedure for aggregate monitoring of communications and the procedural safeguards to be observed in them.
Read the Rules: Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009