SlideShare une entreprise Scribd logo
1  sur  17
INFORMATION
TECHNOLOGY
ACT
CONTENTS
 Introduction
 Summary
 Objectives
 Amendments
 Offences and penalties
 Cases
 Conclusion
 References
INTRODUCTION
 Information Technology Act is the primary law in
India dealing with cybercrimes and electronic
commerce.
 Act enacted by the parliament of India.
 Date enacted 9 june,2000.
 Date commenced 17 october,2000.
 The bill was finalised by then Minister of IT ,
Promod mahajan.
 Based on United Nations model law on electronic
commerce.
SUMMARY
 IT Act,2000 contains 94 sections, divided in 13
chapters and 4 schedules.
 Law applies to whole of India.
 Persons of other nation can also be indicated
under the law ,if the crime involves a computer
or network located in India.
 India – 12th country in the world to adopt it.
 Regulates e-commerce, facilitates e-
governance and prevents cyber crimes.
OBJECTIVES
 To provide legal recognitions to electronic
record and digital signature to enable
conclusion of contracts through electronic
medium.
 To create civil and criminal liabilities for
contravention.
 To promote usage of electronic records &
digital signatures in government offices and
agencies.
 IT Act aims at amending various Indian Acts to
make them compatible with latest technologies
AMENDMENTS TO IT ACT
 Focusing on data privacy.
 Defining cyber cafe.
 Defining reasonable security practices to be
followed by corporate.
 Inclusion of additional cyber crimes like child
pornography and cyber terrorism.
 Authorizing an inspector to investigate cyber
offences.
E-GOVERNANCE UNDER IT
ACT
FACILITATING E-
GOVERNANCE
 Section 4 provides legal recognition to electronic
records.
 Section 5 confers legal recognition to digital
signatures.
 Section 6 aims to promote use of electronic records
and digital signatures.
 Section 7 allows retention of electronic records akin to
paper based records.
 Publication of rules, regulations, bylaws, and
notifications in electronic gazette is legally recognised.
 Railways has started the internet reservation facility.
 Ministry of company affairs has launched its online
filing automated system.
CYBER
CRIMES
CYBER CRIME SCENARIOS
 Harassment via fake profile on social
networking site.
 Online hate community.
 Account hacking.
 Credit card fraud.
 Web defacement.
 Cyber terrorism.
 Source code theft.
 Online sale of illegal articles.
SECTION OFFENCES PENALTY
65 Tampering with computer
source documents Imprisonment up to three years, or/and with
fine up to ₹200,000
66 Hacking with computer
system
Imprisonment up to three years, or/and with
fine up to ₹500,000
66B Receiving stolen
computers or
communication device Imprisonment up to three years, or/and with
fine up to ₹100,000
66C Using password of
another person
Imprisonment up to three years, or/and with
fine up to ₹100,000
66D
Cheating using computer
resource
Imprisonment up to three years, or/and with
fine up to ₹100,000
66F Act of cyber terrorism Imprisonment up to life.
SECTIONS OFFENCE PENALTY
67B Predating children online Imprisonment up to five
years, or/and with fine up
to ₹1,000,000 on first
conviction. Imprisonment up
to seven years, or/and with
fine up to ₹1,000,000 on
second conviction.
67C Failure to maintain record Imprisonment up to three
years, or/and with fine.
68 Failure to comply with order Imprisonment up to three
years, or/and with fine up to
200,000.
43(A) Compensation for failure to
protect data
Imprisonment up to 3 years
or /and with fine.
71 Misrepresentation Imprisonment up to three
years, or/and with fine up
to ₹100,000
NOTABLE CASES
 Mphasis BPO fraud 2005
 Fake profile of president posted by imposter.
 Bomb hoax mail.
 Cyber terrorism-BSE and NSE.
 1,17,000 cyber crime incidents were reported
from 2014 to 2017.
 In 2017, around 53,000 incidents were
reported.
CONCLUSION
The law provides enabling legal framework
that should anybody commits any of these
cyber crimes, a case can be registered and if
appropriate, relevant electronic evidence is
produced then appropriate conviction can be
done.
REFERNCES
 Information Technology Act, 2000 - Wikipedia
 http://meity.gov.in/content/view-it-act-2000
Information technology act

Contenu connexe

Tendances

Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000V'vek Sharma
 
Laws governing the internet service provider & there rights and liabilities.
Laws governing the internet service provider & there rights and liabilities.Laws governing the internet service provider & there rights and liabilities.
Laws governing the internet service provider & there rights and liabilities.Gaurav Chordia
 
Cyber law
Cyber lawCyber law
Cyber lawabiabel
 
Cyber Governemace In Pakistan
Cyber Governemace In PakistanCyber Governemace In Pakistan
Cyber Governemace In PakistanShakeel Ahmed
 
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...n|u - The Open Security Community
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignmentRini Mahade
 
PPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIAPPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIAHardik Solanki
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technologyTalwant Singh
 
Cyber laws with case studies
Cyber laws with case studiesCyber laws with case studies
Cyber laws with case studiesBhagya Bgk
 
Cybercrime act of Pakistan 2015 Report
Cybercrime act of Pakistan 2015 ReportCybercrime act of Pakistan 2015 Report
Cybercrime act of Pakistan 2015 ReportAbdul Rehman
 
Cyber crime in details with sections and clause
Cyber crime in details with sections and clauseCyber crime in details with sections and clause
Cyber crime in details with sections and clauseAvinash Tegginmani
 
66a it act APOORVA BILLORE ITMI DELHI
66a it act APOORVA BILLORE ITMI DELHI66a it act APOORVA BILLORE ITMI DELHI
66a it act APOORVA BILLORE ITMI DELHIApoorva Billore
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistanSajeel Bhatti
 

Tendances (19)

Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000
 
Laws governing the internet service provider & there rights and liabilities.
Laws governing the internet service provider & there rights and liabilities.Laws governing the internet service provider & there rights and liabilities.
Laws governing the internet service provider & there rights and liabilities.
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Governemace In Pakistan
Cyber Governemace In PakistanCyber Governemace In Pakistan
Cyber Governemace In Pakistan
 
Presentation1
Presentation1Presentation1
Presentation1
 
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
 
PPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIAPPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIA
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technology
 
Cyber laws with case studies
Cyber laws with case studiesCyber laws with case studies
Cyber laws with case studies
 
Cybercrime act of Pakistan 2015 Report
Cybercrime act of Pakistan 2015 ReportCybercrime act of Pakistan 2015 Report
Cybercrime act of Pakistan 2015 Report
 
Cyber crime in details with sections and clause
Cyber crime in details with sections and clauseCyber crime in details with sections and clause
Cyber crime in details with sections and clause
 
66a it act APOORVA BILLORE ITMI DELHI
66a it act APOORVA BILLORE ITMI DELHI66a it act APOORVA BILLORE ITMI DELHI
66a it act APOORVA BILLORE ITMI DELHI
 
The information technology act,2000
The information technology act,2000The information technology act,2000
The information technology act,2000
 
IT Act,2000 - Law
IT Act,2000 - LawIT Act,2000 - Law
IT Act,2000 - Law
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
 

Similaire à Information technology act

Cyber Law in India.pptx
Cyber Law in India.pptxCyber Law in India.pptx
Cyber Law in India.pptxRahul Bharati
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in Indiasaumi17
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimeSumedhaBhatt2
 
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
PPt on  IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...PPt on  IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...Rahul Bharati
 
Information technology ACT - 2000 (Legal Aspect of Business)
Information technology ACT - 2000 (Legal Aspect of Business)Information technology ACT - 2000 (Legal Aspect of Business)
Information technology ACT - 2000 (Legal Aspect of Business)Parth Patel
 
Information technology act
Information technology actInformation technology act
Information technology actAKSHAY KHATRI
 
Cyber Laws in Pakistan
Cyber Laws in PakistanCyber Laws in Pakistan
Cyber Laws in PakistanAyesha Majid
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdfkratoskkd
 
138740042-cyber-law.pptx
138740042-cyber-law.pptx138740042-cyber-law.pptx
138740042-cyber-law.pptxRahuljain40418
 
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUNDCYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUNDAnkush saini
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importanceAditya Shukla
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws Aman Bhargava
 
I.T ACT 2000
I.T ACT 2000 I.T ACT 2000
I.T ACT 2000 RAJ ANAND
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Actmaruhope
 

Similaire à Information technology act (20)

Cyber Law in India.pptx
Cyber Law in India.pptxCyber Law in India.pptx
Cyber Law in India.pptx
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in India
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
Present Trend of Cyber Crime in Bangladesh
Present Trend of Cyber Crime in BangladeshPresent Trend of Cyber Crime in Bangladesh
Present Trend of Cyber Crime in Bangladesh
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
PPt on  IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...PPt on  IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
 
cyber .pptx
cyber .pptxcyber .pptx
cyber .pptx
 
Information technology ACT - 2000 (Legal Aspect of Business)
Information technology ACT - 2000 (Legal Aspect of Business)Information technology ACT - 2000 (Legal Aspect of Business)
Information technology ACT - 2000 (Legal Aspect of Business)
 
Information technology act
Information technology actInformation technology act
Information technology act
 
Cyber Laws in Pakistan
Cyber Laws in PakistanCyber Laws in Pakistan
Cyber Laws in Pakistan
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdf
 
138740042-cyber-law.pptx
138740042-cyber-law.pptx138740042-cyber-law.pptx
138740042-cyber-law.pptx
 
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUNDCYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importance
 
Cyber law for suresh
Cyber law for sureshCyber law for suresh
Cyber law for suresh
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
I.T ACT 2000
I.T ACT 2000 I.T ACT 2000
I.T ACT 2000
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Act
 

Plus de DeepthiPrabhu9

Cost control and cost reduction techniques
Cost control and cost reduction techniquesCost control and cost reduction techniques
Cost control and cost reduction techniquesDeepthiPrabhu9
 
Exchange rate forecasting techniques.
Exchange rate forecasting techniques.Exchange rate forecasting techniques.
Exchange rate forecasting techniques.DeepthiPrabhu9
 
Currency, jurisdiction and technology
Currency, jurisdiction and technologyCurrency, jurisdiction and technology
Currency, jurisdiction and technologyDeepthiPrabhu9
 

Plus de DeepthiPrabhu9 (6)

Cost control and cost reduction techniques
Cost control and cost reduction techniquesCost control and cost reduction techniques
Cost control and cost reduction techniques
 
Exchange rate forecasting techniques.
Exchange rate forecasting techniques.Exchange rate forecasting techniques.
Exchange rate forecasting techniques.
 
Business travel
Business travelBusiness travel
Business travel
 
Economic integration
Economic integrationEconomic integration
Economic integration
 
Factoring
FactoringFactoring
Factoring
 
Currency, jurisdiction and technology
Currency, jurisdiction and technologyCurrency, jurisdiction and technology
Currency, jurisdiction and technology
 

Dernier

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 

Dernier (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 

Information technology act

  • 2. CONTENTS  Introduction  Summary  Objectives  Amendments  Offences and penalties  Cases  Conclusion  References
  • 3. INTRODUCTION  Information Technology Act is the primary law in India dealing with cybercrimes and electronic commerce.  Act enacted by the parliament of India.  Date enacted 9 june,2000.  Date commenced 17 october,2000.  The bill was finalised by then Minister of IT , Promod mahajan.  Based on United Nations model law on electronic commerce.
  • 4. SUMMARY  IT Act,2000 contains 94 sections, divided in 13 chapters and 4 schedules.  Law applies to whole of India.  Persons of other nation can also be indicated under the law ,if the crime involves a computer or network located in India.  India – 12th country in the world to adopt it.  Regulates e-commerce, facilitates e- governance and prevents cyber crimes.
  • 5. OBJECTIVES  To provide legal recognitions to electronic record and digital signature to enable conclusion of contracts through electronic medium.  To create civil and criminal liabilities for contravention.  To promote usage of electronic records & digital signatures in government offices and agencies.  IT Act aims at amending various Indian Acts to make them compatible with latest technologies
  • 6. AMENDMENTS TO IT ACT  Focusing on data privacy.  Defining cyber cafe.  Defining reasonable security practices to be followed by corporate.  Inclusion of additional cyber crimes like child pornography and cyber terrorism.  Authorizing an inspector to investigate cyber offences.
  • 8. FACILITATING E- GOVERNANCE  Section 4 provides legal recognition to electronic records.  Section 5 confers legal recognition to digital signatures.  Section 6 aims to promote use of electronic records and digital signatures.  Section 7 allows retention of electronic records akin to paper based records.  Publication of rules, regulations, bylaws, and notifications in electronic gazette is legally recognised.  Railways has started the internet reservation facility.  Ministry of company affairs has launched its online filing automated system.
  • 10. CYBER CRIME SCENARIOS  Harassment via fake profile on social networking site.  Online hate community.  Account hacking.  Credit card fraud.  Web defacement.  Cyber terrorism.  Source code theft.  Online sale of illegal articles.
  • 11.
  • 12. SECTION OFFENCES PENALTY 65 Tampering with computer source documents Imprisonment up to three years, or/and with fine up to ₹200,000 66 Hacking with computer system Imprisonment up to three years, or/and with fine up to ₹500,000 66B Receiving stolen computers or communication device Imprisonment up to three years, or/and with fine up to ₹100,000 66C Using password of another person Imprisonment up to three years, or/and with fine up to ₹100,000 66D Cheating using computer resource Imprisonment up to three years, or/and with fine up to ₹100,000 66F Act of cyber terrorism Imprisonment up to life.
  • 13. SECTIONS OFFENCE PENALTY 67B Predating children online Imprisonment up to five years, or/and with fine up to ₹1,000,000 on first conviction. Imprisonment up to seven years, or/and with fine up to ₹1,000,000 on second conviction. 67C Failure to maintain record Imprisonment up to three years, or/and with fine. 68 Failure to comply with order Imprisonment up to three years, or/and with fine up to 200,000. 43(A) Compensation for failure to protect data Imprisonment up to 3 years or /and with fine. 71 Misrepresentation Imprisonment up to three years, or/and with fine up to ₹100,000
  • 14. NOTABLE CASES  Mphasis BPO fraud 2005  Fake profile of president posted by imposter.  Bomb hoax mail.  Cyber terrorism-BSE and NSE.  1,17,000 cyber crime incidents were reported from 2014 to 2017.  In 2017, around 53,000 incidents were reported.
  • 15. CONCLUSION The law provides enabling legal framework that should anybody commits any of these cyber crimes, a case can be registered and if appropriate, relevant electronic evidence is produced then appropriate conviction can be done.
  • 16. REFERNCES  Information Technology Act, 2000 - Wikipedia  http://meity.gov.in/content/view-it-act-2000