SlideShare une entreprise Scribd logo
1  sur  34
INFORMATION TECHNOLOGY
ACT, RATHER THAN GIVING
INFORMATION AND
TECHNOLOGY GIVE RISE TO
MORE CYBER CRIMES
Introduction
 Information Technology.
 Application in IT.
 E-commerce.
IT in Banking Sector
 Many facilities provided.
 Conversion of currencies to ‘Plastic Money’.
 IT is increasingly moving from a back office function to a
prime assistant.
 Traditional banking loosing its existence.
 E-banking and its benefits.
Information Technology Act,
2000
The Information Technology Act 2000 (also known as ITA-
2000, or the IT Act) is an Act of the Indian Parliament (No
21 of 2000) notified on October 17, 2000.
 Essence of the ACT
 Purpose
 Objective
 Advantages
 Shortcomings
Key Terms
 Digital Signature
 E Governance
 Encryption
 Decryption
 Computer Source Code
 Cyber Terrorism
 Electronic Documents
Important Sections of IT
Act,2000
1) Section 65-
 Tampering with any computer source code used for a
computer, computer programme, computer system or
computer network.
 Punishment- Imprisonment up to three years, or with fine
which may extend up to two lakh rupees.
2) Section 66-
 Hacking with computer system.
 Punishment- Imprisonment up to three years, or with fine
which may extend up to five lakh rupees, or with both.
3) Section 67-
 Publishing transmitting information which is obscene in
electronic form shall be punished.
 Punishment-
o Imprisonment of either three years and with fine which may
extend to five lakh rupees.
o Imprisonment of either five years and also with fine which
may extend to ten lakh rupees.
4) Penalty for Breach of Confidentiality and Privacy
(Section 72)-
 Any person who has secured access to any electronic
record, book, register, correspondence, information,
document or other material without the consent of the
person concerned.
 Punishment-Imprisonment for two years, or with fine
which may extend to one lakh rupees, or with both.
5) Punishment for publishing Digital Signature Certificate
false in certain particulars (Section 73)-
 Punishment- Imprisonment for two years, or with fine
which may extend to one lakh rupees, or with both.
Amendments in Information
Technology Act, 2008
The IT Amendment Bill 2008 has been passed by the Lok
Sabha and the Rajya Sabha in the last week of December,
2008.
 Different Sections-
 Section 66B
 Section 66C
 Section 66E
 Section 67A
 Section 67B
 Section 72A
Case Study
• The Hyderabad case study.
• Section 66D- Punishments for cheating by personation by
using computer resource (Inserted Vide ITA 2008).
• Punishment-Imprisonment of three years and shall also be
liable to fine which may extend to one lakh rupees.
Cyber Crime
Unlawful acts wherein the computer is either a tool or a target or both
What is Cyber Crime ??
 Criminals can operate anonymously over the
computer networks.
 Hackers invade privacy.
 Hackers destroy “property” in the form of
computer files or records.
 Hackers injure other computer users by
destroying information systems.
 Computer pirates steal intellectual property.
Financial Crimes
 It includes cheating, credit card frauds, money laundering.
Cyber Pornography
 It includes pornographic websites; pornographic magazines
produced using computers (to publish and print the
material) and the Internet (to download and transmit
pornographic pictures, photos, writings etc).
Web Jacking
 This occurs when someone forcefully takes control of a
website (by cracking the password and later changing it).
 Sale of illegal articles
 Phishing
 Online gambling
 Email spoofing
Intellectual Property
crimes-
These include software piracy, copyright infringement,
trademarks violations, theft of computer source code etc.
Cyber Criminals
 Kids (age group (9-16 years)
 Organized hacktivitsts
 Disgruntled employees
 Professional hackers
Case Study
 Case study related to bank.
 Case study related to cyber crime.
Cyber Crime in India
4639
1.4
3
India
online fraud
intrusion or hacking
malicious code
harrassment
Reports registered by RBI for
cyber fraud and the amount spent
for the same
Distribution of targets
Global Cyber Crime
NASSCOM INITIATIVES
 Global Trade Development
 National Skills Registry for IT/ITES Professional (NSR-
ITP)
 Sector Skills Councils
NASSCOM FORUMS
 Gaming Forum
 BPO
 Engineering Services
 Remote Infrastructure Management
Conclusion
 The fundamental approach of the Act is towards validating and
legalising electronic and on-line transactions.
 Awareness must be created.
 It leaves various issues untouched
 The Parliament must ensure that it keeps amending the law and
enacting new laws
 That there are no reliable statistics on the problem
 India is amongst few of the countries in the world which have
any legal framework for e-commerce and e-governance
Suggestions
1) Recruitment
2) Red Coding System
3) Training and Development
4) Domain
5) Vague Definations
Bibliography
 http://www.definitions.net/definition/information
 http://dictionary.reference.com/browse/technology
 http://www.slideshare.net/maruhope/information-technology-act
 http://www.tutor2u.net/business/production/applications-of-IT-
marketing.htm
 http://wiki.answers.com/Q/What_are_applications_of_Informati
on_Technology_in_railwys
 http://www.itsavvy.in/applications-computers-fields
 http://www.definitions.net/definition/information
 http://dictionary.reference.com/browse/technology
 http://www.slideshare.net/maruhope/information-technology-act
 http://www.tutor2u.net/business/production/applications-of-IT-
marketing.htm
 http://wiki.answers.com/Q/What_are_applications_of_Informati
on_Technology_in_railwys
 http://www.itsavvy.in/applications-computers-fields
Thank You!!

Contenu connexe

Tendances (20)

Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Act
 
E contract
E  contractE  contract
E contract
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
 
Cyber crime against property
Cyber crime against propertyCyber crime against property
Cyber crime against property
 
IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)
 
Cyber law
Cyber lawCyber law
Cyber law
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K Pathak
 
Cyber Law And Ethics
Cyber Law And EthicsCyber Law And Ethics
Cyber Law And Ethics
 
It act 2000
It act 2000It act 2000
It act 2000
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
 
Cyber fraud
Cyber fraudCyber fraud
Cyber fraud
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
IT Act 2000
IT Act 2000IT Act 2000
IT Act 2000
 
Cyber crime in India PPT .pptx
Cyber crime in India PPT .pptxCyber crime in India PPT .pptx
Cyber crime in India PPT .pptx
 
IT Act 2000
IT Act 2000IT Act 2000
IT Act 2000
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 

Similaire à IT Act,2000 - Law

Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importanceAditya Shukla
 
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
PPt on  IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...PPt on  IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...Rahul Bharati
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdfkratoskkd
 
PPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIAPPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIAHardik Solanki
 
Cybercrime Analysis using Criminal Information Management System: An E-Govern...
Cybercrime Analysis using Criminal Information Management System: An E-Govern...Cybercrime Analysis using Criminal Information Management System: An E-Govern...
Cybercrime Analysis using Criminal Information Management System: An E-Govern...Ashish Karan
 
Cyber Law in India.pptx
Cyber Law in India.pptxCyber Law in India.pptx
Cyber Law in India.pptxRahul Bharati
 
CTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha FernandoCTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha Fernandosegughana
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in IndiaShankey Gupta
 
I.T ACT 2000
I.T ACT 2000 I.T ACT 2000
I.T ACT 2000 RAJ ANAND
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in Indiasaumi17
 
Cyber crime p pt
Cyber crime p ptCyber crime p pt
Cyber crime p ptHemant
 
Information technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxInformation technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxRahul Bharati
 
A Comprehensive Analysis of Cybercrime, Data Protection, Privacy, and e comme...
A Comprehensive Analysis of Cybercrime, Data Protection, Privacy, and e comme...A Comprehensive Analysis of Cybercrime, Data Protection, Privacy, and e comme...
A Comprehensive Analysis of Cybercrime, Data Protection, Privacy, and e comme...ijtsrd
 
Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008ATHULYARAJDS
 

Similaire à IT Act,2000 - Law (20)

Indian it act 2000
Indian it act 2000Indian it act 2000
Indian it act 2000
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importance
 
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
PPt on  IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...PPt on  IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdf
 
PPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIAPPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIA
 
cyber .pptx
cyber .pptxcyber .pptx
cyber .pptx
 
Cybercrime Analysis using Criminal Information Management System: An E-Govern...
Cybercrime Analysis using Criminal Information Management System: An E-Govern...Cybercrime Analysis using Criminal Information Management System: An E-Govern...
Cybercrime Analysis using Criminal Information Management System: An E-Govern...
 
Cybercrime and Laws.pptx
Cybercrime and Laws.pptxCybercrime and Laws.pptx
Cybercrime and Laws.pptx
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber Law in India.pptx
Cyber Law in India.pptxCyber Law in India.pptx
Cyber Law in India.pptx
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 
Business Law - Unit 3
Business Law - Unit 3Business Law - Unit 3
Business Law - Unit 3
 
CTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha FernandoCTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha Fernando
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in India
 
I.T ACT 2000
I.T ACT 2000 I.T ACT 2000
I.T ACT 2000
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in India
 
Cyber crime p pt
Cyber crime p ptCyber crime p pt
Cyber crime p pt
 
Information technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxInformation technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptx
 
A Comprehensive Analysis of Cybercrime, Data Protection, Privacy, and e comme...
A Comprehensive Analysis of Cybercrime, Data Protection, Privacy, and e comme...A Comprehensive Analysis of Cybercrime, Data Protection, Privacy, and e comme...
A Comprehensive Analysis of Cybercrime, Data Protection, Privacy, and e comme...
 
Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008
 

Dernier

Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 

Dernier (20)

Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

IT Act,2000 - Law

  • 1. INFORMATION TECHNOLOGY ACT, RATHER THAN GIVING INFORMATION AND TECHNOLOGY GIVE RISE TO MORE CYBER CRIMES
  • 2. Introduction  Information Technology.  Application in IT.  E-commerce.
  • 3. IT in Banking Sector  Many facilities provided.  Conversion of currencies to ‘Plastic Money’.  IT is increasingly moving from a back office function to a prime assistant.  Traditional banking loosing its existence.  E-banking and its benefits.
  • 4. Information Technology Act, 2000 The Information Technology Act 2000 (also known as ITA- 2000, or the IT Act) is an Act of the Indian Parliament (No 21 of 2000) notified on October 17, 2000.  Essence of the ACT  Purpose  Objective  Advantages  Shortcomings
  • 5. Key Terms  Digital Signature  E Governance  Encryption  Decryption  Computer Source Code  Cyber Terrorism  Electronic Documents
  • 6. Important Sections of IT Act,2000 1) Section 65-  Tampering with any computer source code used for a computer, computer programme, computer system or computer network.  Punishment- Imprisonment up to three years, or with fine which may extend up to two lakh rupees.
  • 7. 2) Section 66-  Hacking with computer system.  Punishment- Imprisonment up to three years, or with fine which may extend up to five lakh rupees, or with both.
  • 8. 3) Section 67-  Publishing transmitting information which is obscene in electronic form shall be punished.  Punishment- o Imprisonment of either three years and with fine which may extend to five lakh rupees. o Imprisonment of either five years and also with fine which may extend to ten lakh rupees.
  • 9. 4) Penalty for Breach of Confidentiality and Privacy (Section 72)-  Any person who has secured access to any electronic record, book, register, correspondence, information, document or other material without the consent of the person concerned.  Punishment-Imprisonment for two years, or with fine which may extend to one lakh rupees, or with both.
  • 10. 5) Punishment for publishing Digital Signature Certificate false in certain particulars (Section 73)-  Punishment- Imprisonment for two years, or with fine which may extend to one lakh rupees, or with both.
  • 11. Amendments in Information Technology Act, 2008 The IT Amendment Bill 2008 has been passed by the Lok Sabha and the Rajya Sabha in the last week of December, 2008.  Different Sections-  Section 66B  Section 66C  Section 66E  Section 67A  Section 67B  Section 72A
  • 12. Case Study • The Hyderabad case study. • Section 66D- Punishments for cheating by personation by using computer resource (Inserted Vide ITA 2008). • Punishment-Imprisonment of three years and shall also be liable to fine which may extend to one lakh rupees.
  • 13. Cyber Crime Unlawful acts wherein the computer is either a tool or a target or both
  • 14. What is Cyber Crime ??  Criminals can operate anonymously over the computer networks.  Hackers invade privacy.  Hackers destroy “property” in the form of computer files or records.  Hackers injure other computer users by destroying information systems.  Computer pirates steal intellectual property.
  • 15. Financial Crimes  It includes cheating, credit card frauds, money laundering.
  • 16. Cyber Pornography  It includes pornographic websites; pornographic magazines produced using computers (to publish and print the material) and the Internet (to download and transmit pornographic pictures, photos, writings etc).
  • 17. Web Jacking  This occurs when someone forcefully takes control of a website (by cracking the password and later changing it).
  • 18.  Sale of illegal articles  Phishing  Online gambling  Email spoofing
  • 19. Intellectual Property crimes- These include software piracy, copyright infringement, trademarks violations, theft of computer source code etc.
  • 20. Cyber Criminals  Kids (age group (9-16 years)  Organized hacktivitsts  Disgruntled employees  Professional hackers
  • 21. Case Study  Case study related to bank.  Case study related to cyber crime.
  • 22. Cyber Crime in India
  • 23. 4639 1.4 3 India online fraud intrusion or hacking malicious code harrassment
  • 24. Reports registered by RBI for cyber fraud and the amount spent for the same
  • 27.
  • 28. NASSCOM INITIATIVES  Global Trade Development  National Skills Registry for IT/ITES Professional (NSR- ITP)  Sector Skills Councils
  • 29. NASSCOM FORUMS  Gaming Forum  BPO  Engineering Services  Remote Infrastructure Management
  • 30. Conclusion  The fundamental approach of the Act is towards validating and legalising electronic and on-line transactions.  Awareness must be created.  It leaves various issues untouched  The Parliament must ensure that it keeps amending the law and enacting new laws  That there are no reliable statistics on the problem  India is amongst few of the countries in the world which have any legal framework for e-commerce and e-governance
  • 31. Suggestions 1) Recruitment 2) Red Coding System 3) Training and Development 4) Domain 5) Vague Definations
  • 32. Bibliography  http://www.definitions.net/definition/information  http://dictionary.reference.com/browse/technology  http://www.slideshare.net/maruhope/information-technology-act  http://www.tutor2u.net/business/production/applications-of-IT- marketing.htm  http://wiki.answers.com/Q/What_are_applications_of_Informati on_Technology_in_railwys  http://www.itsavvy.in/applications-computers-fields
  • 33.  http://www.definitions.net/definition/information  http://dictionary.reference.com/browse/technology  http://www.slideshare.net/maruhope/information-technology-act  http://www.tutor2u.net/business/production/applications-of-IT- marketing.htm  http://wiki.answers.com/Q/What_are_applications_of_Informati on_Technology_in_railwys  http://www.itsavvy.in/applications-computers-fields